Update README.md
parent
6016d4b1b9
commit
b0f34b08e7
28
README.md
28
README.md
|
@ -25,4 +25,30 @@ I used passwd so as not to leak my hash for this demo but rest assured you can r
|
|||
![image](https://github.com/witchdocsec/SUnami/assets/107813117/91127128-64e1-4493-bf85-068bc3a04972)
|
||||
## useage
|
||||
sunami.py [-local {1,0}] rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
|
||||
|
||||
# help
|
||||
genshell generates the shell to be edited in the bashrc file as an alias
|
||||
--ip ip to connect to
|
||||
--port port to connect to
|
||||
--shelltype type of shell to use (reverse, bind) - default is reverse
|
||||
--shell type of shell to generate - default is bash
|
||||
reverse bash, nc, nce
|
||||
bind nc
|
||||
-protocol type of protocol, will not affect most shells (tcp, udp) - default is tcp
|
||||
-listen will automatically run a listener after outputting the shell (1, 0)
|
||||
usage: sunami.py genshell [-h] [--ip IP] [--port PORT] [--shelltype SHELLTYPE] [--shell SHELL] [-protocol PROTOCOL] [-listen]
|
||||
|
||||
exfilfile exfiltrates files using several methods
|
||||
--file file to exfiltrate
|
||||
--method method to use (postflask, nc, pysocket)
|
||||
--ip ip to send to
|
||||
--port port to send to
|
||||
usage: sunami.py exfilfile [-h] [--file FILE] [--method {postflask,nc,pysocket}] [--ip IP] [--port PORT]
|
||||
|
||||
rfs runs flask server serving your sh files to run from the attacker machine
|
||||
--ip ip to run server on
|
||||
--port port to run server on
|
||||
--file file to run on infected machine
|
||||
--vars <key>:<value> - sets variables in the selected script using jinja2 template syntax - default is no variables
|
||||
--schema schema to use (http, https) - default http
|
||||
useage: sunami.py rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
|
||||
|
||||
|
|
Loading…
Reference in New Issue