Update sunami.py
parent
bc298431d3
commit
19f7ad08e2
|
@ -128,12 +128,14 @@ genshell generates the shell to be edited in the bashrc file as an alias
|
|||
bind nc
|
||||
-protocol type of protocol, will not affect most shells (tcp, udp) - default is tcp
|
||||
-listen will automatically run a listener after outputting the shell (1, 0)
|
||||
usage: sunami.py genshell [-h] [--ip IP] [--port PORT] [--shelltype SHELLTYPE] [--shell SHELL] [-protocol PROTOCOL] [-listen {1,0}]
|
||||
|
||||
exfilfile exfiltrates files using several methods
|
||||
--file file to exfiltrate
|
||||
--method method to use (postflask, nc, pysocket)
|
||||
--ip ip to send to
|
||||
--port port to send to
|
||||
usage: sunami.py exfilfile [-h] [--file FILE] [--method {postflask,nc,pysocket}] [--ip IP] [--port PORT]
|
||||
|
||||
rfs runs flask server serving your sh files to run from the attacker machine
|
||||
--ip ip to run server on
|
||||
|
@ -141,9 +143,5 @@ rfs runs flask server serving your sh files to run from the attacker machine
|
|||
--file file to run on infected machine
|
||||
--vars <key>:<value> - sets variables in the selected script using jinja2 template syntax - default is no variables
|
||||
--schema schema to use (http, https) - default http
|
||||
|
||||
usages:
|
||||
sunami.py genshell [-h] [--ip IP] [--port PORT] [--shelltype SHELLTYPE] [--shell SHELL] [-protocol PROTOCOL] [-listen {1,0}]
|
||||
sunami.py exfilfile [-h] [--file FILE] [--method {postflask,nc,pysocket}] [--ip IP] [--port PORT]
|
||||
sunami.py rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
|
||||
useage: sunami.py rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
|
||||
""")
|
Loading…
Reference in New Issue