All Projects → quantumcore → maalik

quantumcore / maalik

Licence: MIT license
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.

Programming Languages

c
50402 projects - #5 most used programming language
python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to maalik

Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (+421.33%)
Mutual labels:  penetration-testing, infosec, netsec
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-18.67%)
Mutual labels:  penetration-testing, exploitation, payload
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-40%)
Mutual labels:  malware, rat, payload
Serpentine
C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+188%)
Mutual labels:  malware, penetration-testing, rat
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+3600%)
Mutual labels:  penetration-testing, infosec, netsec
Gorsair
Gorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+804%)
Mutual labels:  penetration-testing, infosec, netsec
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+8882.67%)
Mutual labels:  rat, payload, reflective-injection
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+1060%)
Mutual labels:  penetration-testing, infosec, exploitation
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (+61.33%)
Mutual labels:  malware, rat, payload
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+306.67%)
Mutual labels:  malware, rat, payload
ConTroll Remote Access Trojan
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (-8%)
Mutual labels:  malware, rat
fame modules
Community modules for FAME
Stars: ✭ 55 (-26.67%)
Mutual labels:  malware, infosec
TIWAP
Totally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (+82.67%)
Mutual labels:  penetration-testing, infosec
active-scanning-techniques
A compilation of network scanning strategies to find vulnerable devices
Stars: ✭ 61 (-18.67%)
Mutual labels:  netsec, network-security
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+122.67%)
Mutual labels:  penetration-testing, exploitation
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+0%)
Mutual labels:  penetration-testing, infosec
matrix
mirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (-57.33%)
Mutual labels:  malware, network-security
Python-Keylogger
Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-26.67%)
Mutual labels:  malware, infosec
PXXTF
Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-69.33%)
Mutual labels:  penetration-testing, exploitation
Defeat-Defender-V1.2
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+1080%)
Mutual labels:  malware, payload


Maalik

Network Pivoting and Post Exploitation Framework.

Features


Console Features

  • Desktop notification on new session.
  • Kill Online session easily.
  • Build Maalik Client, Fhdawn easily.
  • Configurable values in settings.ini
  • Root shell.
  • Multithreaded, Get multiple sessions.
  • Maalik is extremenly easy to use.

Fhdawn Features

Fhdawn is the maalik client.

Feature Description
Stealth Runs in background, Only writes hidden plaintext file to disk.
Auto Admin Attempts to become Administrator by impersonating Windows Defender.
Execute / list / delete files and Browse Full access to all files. Browse the system remotley.
Windows Defender Exclusions Add Windows Defender Exclusions.
Network Pivoting Forwards a Port to another Host on the network to forward exploit traffic onto it.
Enable / Disable Firewall Enable or Disable Windows Firewall, Use full for pivoting scenarios. Firewall is automatically turned off during Pivot attack.
Network Scanner Discover Hosts in the subnet.
Port Scanner Scans discovered hosts for common ports.
MS17-10 Network Scanner Scans the network for Hosts vulnerable to MS17-10, The Eternal Blue.
Automatic Eternal Blue Automatically runs metasploit using rc file to potentially exploit Port 445.
Reverse Shell Stable Reverse Shell, Commands executed as cmd.exe /c <your input>.
File upload / download Upload or Download Files.
Reflective DLL Injection Reflective DLL Injection into any process.
Screenshot Take screenshot (bmp=>png).
GeoLocation Geolocate Fhdawn.
SAM Dump Dumps SAM and SYSTEM files to disk, Downloads and dumps them using samdump2.
Dynamic Payload System (DPS).

Note (This is incomplete, And was completed in a different project, I may update this in the future. Executes 'Payloads' in Memory using Reflective DLL Injection. The Payload is a 32 bit Reflective DLL, That carries out tasks after successful Injection. DLL output is written to a TEXT file named output.png which is used to smuggle output back to server, And also give the DLL Payload commands.

Payload Description
(DPS) Reverse Shell Netcat Reverse shell.
(DPS) Administrator Prompt Trigger Forcefully attempt to Execute an Application as Administrator.
(DPS) Chrome Password Recovery Dumps Saved Google Chrome passwords. (Does not work on latest version) :shipit:
(DPS) In Memory Meterpreter Execute Metasploit C Shellcode.
(DPS) Keystroke logging Log keystrokes.
(DPS) Capture Mic Input Record Mic.
(DPS) Registry Persistence Add any application to startup using registry keys.
CMD Post Exploitation Commands (CMD)

These are cmd commands that are useful in a post exploit situation. Not listed here.

  • List users.
  • View full System Information.
  • View all Drivers.
  • Get list of running processes.
  • Get Available Drive Letters.
  • Get all envoironment variables.
  • Displays information about sessions on a Remote Desktop Session Host server.
  • Acronym for 'netsh wlan show profiles'.
  • Enable Remote Desktop.
  • Disable Remote Desktop.
  • Disable Firewall.
  • Enable firewall.
  • Forward a PORT on the Remote PC.
  • Reset all forwarded Ports.

img


Install :

Do not clone the repository.

  • Recommended OS is Kali Linux.
  • Download and extract the Latest Release
cd maalik
sudo chmod +x install.sh
sudo ./install.sh

This Project is active in developement. There may be Errors and bugs that I may have missed. If you find any, Or you have an idea or suggestion. Please submit here.

TODO

  • Add Route pivoting.
  • Add Reflective Exploits.
  • Maalik V.3. ( ͡° ͜ʖ ͡°)

Links

If you have used maalik in a video or blog, Please Contact me.

Developer

Hi my name's Fahad. You may contact me, on Discord or My Website Contact discord for fastest response.

LICENSE

VIEW LICENSE

The Developer is not responsible for any misuse of Damage caused by the program. This is created only to innovate NetSec and YOU. 👈

Donate

Help me with my future projects. Thank you. Donate with Crypto

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].