Source: shellter Section: non-free/misc Priority: optional Maintainer: Kali Developers Uploaders: Sophie Brun Build-Depends: debhelper-compat (= 13) Standards-Version: 4.6.2 Homepage: https://www.shellterproject.com/ Vcs-Git: https://gitlab.com/kalilinux/packages/shellter.git Vcs-Browser: https://gitlab.com/kalilinux/packages/shellter Package: shellter Architecture: i386 amd64 Depends: wine, kali-defaults (>= 2019.3.6), ${shlibs:Depends}, ${misc:Depends}, Description: Dynamic shellcode injection tool and dynamic PE infector Shellter is a dynamic shellcode injection tool aka dynamic PE infector. It can be used in order to inject shellcode into native Windows applications (currently 32-bit apps only). The shellcode can be something yours or something generated through a framework, such as Metasploit. . Shellter takes advantage of the original structure of the PE file and doesn't apply any modification such as changing memory access permissions in sections (unless the user wants to), adding an extra section with RWE access, and whatever would look dodgy under an AV scan.