# pe_to_shellcode
**Repository Path**: jiweihong/pe_to_shellcode
## Basic Information
- **Project Name**: pe_to_shellcode
- **Description**: Converts PE into a shellcode
- **Primary Language**: Unknown
- **License**: Not specified
- **Default Branch**: master
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2020-08-18
- **Last Updated**: 2020-12-19
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# pe_to_shellcode
[](https://ci.appveyor.com/project/hasherezade/pe-to-shellcode)
[](https://github.com/hasherezade/pe_to_shellcode/releases)
[](http://www.somsubhra.com/github-release-stats/?username=hasherezade&repository=pe_to_shellcode)
Converts PE so that it can be then injected just like a normal shellcode.
(At the same time, the output file remains to be a valid PE).
Supports both 32 and 64 bit PEs
*Authors: [@hasherezade](https://github.com/hasherezade) & [@hh86](https://github.com/86hh)*
Objective:
-
The goal of this project is to provide a possibility to generate PE files that can be injected with minimal effort.
It is inspired by Stephen Fewer's [ReflectiveDLLInjection](https://github.com/stephenfewer/ReflectiveDLLInjection) - but the difference is that with pe2shc you can add the reflective loading stub post-compilation. Also, the header of the PE file is modified in such a way, that you can start executing the injected buffer from the very beginning - just like you would do with a shellcode. It will automatically find the stub, and continue loading the full PE.
Clone:
-
Use recursive clone to get the repo together with all the submodules:
git clone --recursive https://github.com/hasherezade/pe_to_shellcode.gitHow to use it: - 1. Use **pe2shc.exe** to convert a PE of your choice: ``` pe2shc.exe