All Projects → davidtavarez → pinky

davidtavarez / pinky

Licence: Apache-2.0 License
pinky - The PHP mini RAT (Remote Administration Tool)

Programming Languages

PHP
23972 projects - #3 most used programming language

Projects that are alternatives of or similar to pinky

trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-23.73%)
Mutual labels:  rat
maalik
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+27.12%)
Mutual labels:  rat
paradoxiaRAT
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+888.14%)
Mutual labels:  rat
SWRATT
🤖 ☠️ 💬 A simple Telegram Bot that controls the victim's computer.
Stars: ✭ 38 (-35.59%)
Mutual labels:  rat
Discord-AIO
Discord AIO (All In One) - discord stealer/token grabber builder with token checks, webhook spammer, obfuscation, encryption, crypto miner, RAT and a lot of extra features.
Stars: ✭ 105 (+77.97%)
Mutual labels:  rat
pace
Remote Access Tool for Windows.
Stars: ✭ 68 (+15.25%)
Mutual labels:  rat
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+416.95%)
Mutual labels:  rat
Horus-Eye
Just Simple Code To Play With Android Payloads (;
Stars: ✭ 54 (-8.47%)
Mutual labels:  rat
NullRAT
Your next stealthy Remote Access Trojan
Stars: ✭ 104 (+76.27%)
Mutual labels:  rat
Javascript-Botnet-C-Sharp
This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets
Stars: ✭ 22 (-62.71%)
Mutual labels:  rat
Quiescis
Quescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (-5.08%)
Mutual labels:  rat
Loki.Rat
Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Remote Access Tool.
Stars: ✭ 63 (+6.78%)
Mutual labels:  rat
dark-lord-obama
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Stars: ✭ 61 (+3.39%)
Mutual labels:  rat
ConTroll Remote Access Trojan
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (+16.95%)
Mutual labels:  rat
knicky
A module-based static virus generator 🚀
Stars: ✭ 40 (-32.2%)
Mutual labels:  rat
tor-rootkit
A Python 3 standalone Windows 10 / Linux Rootkit using Tor.
Stars: ✭ 142 (+140.68%)
Mutual labels:  rat
WinRAT
(Windows/Linux/Mac) Remote Administration Tool
Stars: ✭ 35 (-40.68%)
Mutual labels:  rat
android-c-sharp-rat-server
This is a plugin for the c# R.A.T server providing extension to android based phone systems
Stars: ✭ 18 (-69.49%)
Mutual labels:  rat
Maus
Lightweight remote administrative client written in Java.
Stars: ✭ 74 (+25.42%)
Mutual labels:  rat
Windows-Python-RAT
A New Microsoft Windows Remote Administrator Tool [RAT] with Python by Sir.4m1R.
Stars: ✭ 70 (+18.64%)
Mutual labels:  rat

Uploading a webshell is almost always the next step after exploiting a web vulnerability, but services like Cloudflare and the new generation of firewalls do a really good job preventing attackers to run commands in the target via HTTP or HTTPS. On the other hand, text content filtering and whitelisting applications policies can be easily exploited with a minimum effort and pinky is a PoC of that.

How is pinky different?

First, pinky tries to find which function is enabled to run system commands; after finding which php function is the best, all communication is encrypted, so even if the Firewall is enabled to read the traffic, it won't be able to determine whether the activity is malicious or not. Also, pinky is able to communicate through any kind of proxy. In addition to this, we need to send a Basic Authentication (completely insecure, I know!) to avoid others to communicate with the pinky's agent.

Installation.

$ git clone [email protected]:davidtavarez/pinky.git
Cloning into 'pinky'...
remote: Counting objects: 223, done.
remote: Compressing objects: 100% (79/79), done.
remote: Total 223 (delta 54), reused 72 (delta 27), pack-reused 103
Receiving objects: 100% (223/223), 385.73 KiB | 73.00 KiB/s, done.
Resolving deltas: 100% (101/101), done.

$ cd pinky

$ php pinky.php
        _       _
  _ __ (_)_ __ | | ___   _
 | '_ \| | '_ \| |/ / | | |
 | |_) | | | | |   <| |_| |
 | .__/|_|_| |_|_|\_\__,  |
 |_|                 |___/  v2.0
 The PHP Mini RAT.

 + Author: David Tavarez
 + Twitter: @davidtavarez
 + Website: https://davidtavarez.github.io/

 +[WARNING]------------------------------------------+
 | DEVELOPERS ASSUME NO LIABILITY AND ARE NOT        |
 | RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY    |
 | THIS PROGRAM  ¯\_(ツ)_/¯                          |
 +---------------------------------------------------+


 [-] I need a json file containing the settings.

How to use it.

First, exploit the vulnerability found on the target.

Now, we're ready to generate our agent using the built-in generator like this:

pinky v2

I'm using Obfuscator-Class by Pierre-Henry Soria to obfuscate the agent because results are pretty good.

pinky v2

After the agent is generated, we need to upload it into the target machine and paste the URL into the json file created previously. If we want (and we must), use a SOCKS5 proxy, we need to add the settings:

{
  "key":"[KEY]",
  "url":"[URL]",
  "login":{
    "username":"[LOGIN]",
    "password":"[PASSWORD]"
  },
  "proxy":{
    "ip":"127.0.0.1",
    "port":9150,
    "type":"SOCKS5"
  },
  "cookies": "[COOKIES]"
}

The last step is to upload the agent, open your terminal and then pass the json file as a parameter.

$ php pinky.php config.json

pinky v2

pinky v2

Contributing.

In order to contribute, please, fork this project, create a new branch from master and send me the PR. Also you can contribute adding more pages to the Wiki :)

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].