* move -oA option to standart nmap scan
moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network.
* fix
fixed borken funktion
* Update payload.sh
* adding support for multiple nmaps with -oA option
Re-added the -oA option for interessting hosts. With differing file name.
Support for multiple nmap scans producing output files via -oA option.
* move -oA option to standart nmap scan
moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network.
* fix
fixed borken funktion
* Payload based on example nmap payload but with pastebin ex-filtration
* Update payload.sh
* refine directory name to remove spaces
refine directory name to remove spaces
Swiss knife network reconnaissance payload with options for SSH server, Cloud C2 exfiltration and led blinking for IP address, payload is based on various sample payloads from HAK5, MonsieurMarc, Topknot and others. This payload script has been organized in a way it is easy to be extended with additional recon (attack) functions.
The script has been created in a modular fashion which allows easy extending the script with new functions (e.g. recon, notification or exfiltration functions). The script furthermore incorporates logic to determine already existing loot folders and create a new (unique) loot folder every time the script is executed.