Update README.md

main
witchdocsec 2023-08-09 16:48:28 +01:00 committed by GitHub
parent 6016d4b1b9
commit b0f34b08e7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 27 additions and 1 deletions

View File

@ -25,4 +25,30 @@ I used passwd so as not to leak my hash for this demo but rest assured you can r
![image](https://github.com/witchdocsec/SUnami/assets/107813117/91127128-64e1-4493-bf85-068bc3a04972)
## useage
sunami.py [-local {1,0}] rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]
# help
genshell generates the shell to be edited in the bashrc file as an alias
--ip ip to connect to
--port port to connect to
--shelltype type of shell to use (reverse, bind) - default is reverse
--shell type of shell to generate - default is bash
reverse bash, nc, nce
bind nc
-protocol type of protocol, will not affect most shells (tcp, udp) - default is tcp
-listen will automatically run a listener after outputting the shell (1, 0)
usage: sunami.py genshell [-h] [--ip IP] [--port PORT] [--shelltype SHELLTYPE] [--shell SHELL] [-protocol PROTOCOL] [-listen]
exfilfile exfiltrates files using several methods
--file file to exfiltrate
--method method to use (postflask, nc, pysocket)
--ip ip to send to
--port port to send to
usage: sunami.py exfilfile [-h] [--file FILE] [--method {postflask,nc,pysocket}] [--ip IP] [--port PORT]
rfs runs flask server serving your sh files to run from the attacker machine
--ip ip to run server on
--port port to run server on
--file file to run on infected machine
--vars <key>:<value> - sets variables in the selected script using jinja2 template syntax - default is no variables
--schema schema to use (http, https) - default http
useage: sunami.py rfs [-h] --ip IP --port PORT --file FILE [--vars VARS [VARS ...]] [--schema SCHEMA]