All Projects → r00t-3xp10it → redpill

r00t-3xp10it / redpill

Licence: other
Assist reverse tcp shells in post-exploration tasks

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to redpill

Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (+195.07%)
Mutual labels:  post-exploitation, redteam
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+4146.48%)
Mutual labels:  post-exploitation, redteam
Pivotsuite
Network Pivoting Toolkit
Stars: ✭ 329 (+131.69%)
Mutual labels:  post-exploitation, redteam
gtfo
Search for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-38.03%)
Mutual labels:  post-exploitation, redteam
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+16.9%)
Mutual labels:  post-exploitation, redteam
Viper
metasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+242.96%)
Mutual labels:  post-exploitation, redteam
Go Shellcode
Load shellcode into a new process
Stars: ✭ 456 (+221.13%)
Mutual labels:  post-exploitation, redteam
Dns Persist
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (+34.51%)
Mutual labels:  post-exploitation, redteam
Atomic Red Team Intelligence C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-38.73%)
Mutual labels:  post-exploitation, redteam
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+736.62%)
Mutual labels:  post-exploitation, redteam
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+34.51%)
Mutual labels:  post-exploitation, redteam
ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+194.37%)
Mutual labels:  post-exploitation, redteam
Shelly
Automatic Reverse Shell Generator
Stars: ✭ 38 (-73.24%)
Mutual labels:  redteam
pentesting-dockerfiles
Pentesting/Bugbounty Dockerfiles.
Stars: ✭ 148 (+4.23%)
Mutual labels:  redteam
PowerShell-Lumos
A PowerShell module for automatic switching between light and dark themes
Stars: ✭ 17 (-88.03%)
Mutual labels:  cmdlet
Constole
Scan for and exploit Consul agents
Stars: ✭ 37 (-73.94%)
Mutual labels:  redteam
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (-2.82%)
Mutual labels:  redteam
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (+40.85%)
Mutual labels:  redteam
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+173.24%)
Mutual labels:  redteam
transportc2
PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-84.51%)
Mutual labels:  redteam

wikibanner

Version Stage Build licence Last Commit isues Repo Size topLanguages


:octocat: Project Description

The redpill project aims to assist reverse tcp shells in post-exploration tasks. Often, on redteam appointments we
need to use unconventional ways to access the target system, like reverse tcp shells (not metasploit) in order
to bypass the defenses implemented by the system administrator. After the first step has been successfully completed
we face another type of problem: "I have (shell) access to the target system, and now what can I do with it?"

This project consists of several PowerShell scripts that perform different post-exploitation tasks and
The main script redpill.ps1 whose main job is to download/config/exec the scripts contained in this repository.

The goal is to have a similar meterpreter experience in our reverse tcp shell prompt (meterpreter similar options)


CmdLet Parameters syntax\examples
 This cmdlet belongs to the structure of venom v1.0.17.8 as a post-exploitation module.
 venom amsi evasion agents automatically uploads this CmdLet to %TMP% directory to be
 easily accessible in our reverse tcp shell ( shell prompt ).

To List All Parameters Available, execute in powershell prompt:

.\redpill.ps1 -Help Parameters

CmdLet Parameter Name Parameter Arguments Description
-SysInfo Enum | Verbose Quick System Info OR Verbose Enumeration
-GetConnections Enum | Verbose Enumerate Remote Host Active TCP Connections
-GetDnsCache Enum | Clear Enumerate\Clear remote host DNS cache entrys
-GetInstalled Enum Enumerate Remote Host Applications Installed
-GetProcess Enum | Kill | Tokens Enumerate OR Kill Remote Host Running Process(s)
-GetTasks Enum | Create | Delete Enumerate\Create\Delete Remote Host Running Tasks
-GetLogs Enum | Verbose | Clear Enumerate eventvwr logs OR Clear All event logs
-LiveStream Bind | Reverse | Stop Nishang script for streaming a target desktop using MJPEG
-GetBrowsers Enum | Verbose | Creds Enumerate Installed Browsers and Versions OR Verbose
-GetSkype Contacts|DomainUsers Enumerating and attacking federated Skype
-Screenshot 1 Capture 1 Desktop Screenshot and Store it on %TMP%
-Camera Enum | Snap Enum computer webcams OR capture default webcam snapshot
-StartWebServer Python | Powershell Downloads webserver to %TMP% and executes the WebServer
-Keylogger Start | Stop Start OR Stop recording remote host keystrokes
-MouseLogger Start Capture Screenshots of Mouse Clicks for 10 seconds
-PhishCreds Start | Brute Promp current user for a valid credential and leak captures
-GetPasswords Enum | Dump Enumerate passwords of diferent locations {Store|Regedit|Disk}
-PasswordSpray Spray Password spraying attack against accounts in Active Directory!
-WifiPasswords Dump | ZipDump Enum Available SSIDs OR ZipDump All Wifi passwords
-EOP Enum | Verbose Find Missing Software Patchs for Privilege Escalation
-ADS Enum | Create | Exec | Clear Hidde scripts { bat | ps1 | exe } on $DATA records (ADS)
-BruteZip $Env:TMP\archive.zip Brute force sellected Zip archive with the help of 7z.exe
-Upload script.ps1 Upload script.ps1 from attacker apache2 webroot
-Persiste $Env:TMP\Script.ps1 Persiste script.ps1 on every startup {BeaconHome}
-CleanTracks Clear | Paranoid Clean disk artifacts left behind {clean system tracks}
-AppLocker Enum | WhoAmi | TestBat Enumerate AppLocker Directorys with weak permissions
-FileMace $Env:TMP\test.txt Change File Mace {CreationTime,LastAccessTime,LastWriteTime}
-MetaData $Env:TMP\test.exe Display files \ applications description (metadata)
-psgetsys Enum | Auto | Impersonate spawn a process under a different parent process!
-MsgBox "Hello World." Spawns "Hello World." msgBox on local host {wscriptComObject}
-SpeakPrank "Hello World." Make remote host speak user input sentence {prank}
-NetTrace Enum Agressive Enumeration with the help of netsh {native}
-PingSweep Enum | Verbose Enumerate Active IP Address and open ports on Local Lan
-DnsSpoof Enum | Redirect | Clear Redirect Domain Names to our Phishing IP address
-DisableAV Query | Start | Stop Disable Windows Defender Service (WinDefend)
-HiddenUser Query | Create | Delete Query \ Create \ Delete Hidden User Accounts
-CsOnTheFly Compile | Execute Download \ Compile (to exe) and Execute CS scripts
-CookieHijack Dump|History Edge|Chrome Cookie Hijacking tool
-UacMe Bypass | Elevate | Clean UAC bypass|EOP by dll reflection! (cmstp.exe)
-GetAdmin check | exec Elevate sessions from UserLand to Administrator!
-NoAmsi List | TestAll | Bypass Test AMS1 bypasses or simple execute one bypass
-Clipboard Enum | Capture | Prank Capture clipboard text\file\image\audio contents!
-GetCounterMeasures Enum | verbose List common security processes\pid's running!
-DumpLsass lsass| all Dump data from lsass/sam/system/security process/reg hives

To Display Detailed information about each parameter execute:

Syntax : .\redpill.ps1 -Help [ Parameter Name ]
Example: .\redpill.ps1 -Help WifiPasswords

Parametershelp


Instructions how to use the Cmdlet {Local tests}
 This cmdlet belongs to the structure of venom v1.0.17.8 as a post-exploitation module.
 venom amsi evasion agents automatically uploads this CmdLet to %TMP% directory to be
 easily accessible in our reverse tcp shell ( shell ).

 'this section describes how to test this Cmdlet Locally without exploiting target host'

1º - Download CmdLet from GitHub repository to 'Local Disk'

iwr -Uri https://raw.githubusercontent.com/r00t-3xp10it/redpill/main/redpill.ps1 -OutFile redpill.ps1|Unblock-File

2º - Set Powershell Execution Policy to 'UnRestricted'

Set-ExecutionPolicy UnRestricted -Scope CurrentUser

ste


3º - Browse to 'redpill.ps1' storage directory

cd C:\Users\pedro\Desktop

redpillpath


4º - Access CmdLet Help Menu {All Parameters}

.\redpill.ps1 -Help Parameters

menu


5º - Access [ -WifiPasswords ] Detailed Parameter Help

Syntax : .\redpill.ps1 -Help [ Parameter Name ]
Example: .\redpill.ps1 -Help WifiPasswords

Parametershelp


6º - Running [ -WifiPasswords ] [ Dump ] Module

Syntax : .\redpill.ps1 [ Parameter Name ] [ @argument ]
Example: .\redpill.ps1 -WifiPasswords Dump

wifidump


7º - Running [ -sysinfo ] [ Enum ] Module

Syntax : .\redpill.ps1 [ Parameter Name ] [ @argument ]
Example: .\redpill.ps1 -sysinfo Enum

geolocation


Instructions how to use the CmdLet under Venon v1.0.17.8
 This cmdlet belongs to the structure of venom v1.0.17.8 as a post-exploitation module.
 venom amsi evasion agents automatically uploads this CmdLet to %TMP% directory to be
 easily accessible in our reverse tcp shell ( shell prompt ).

1º - execute in reverse tcp shell prompt

[SKYNET] C:\Users\pedro\AppData\Local\Temp> powershell -File redpill.ps1 -Help Parameters

menu


2º - Access [ -WifiPasswords ] Detailed Parameter Help

[SKYNET] C:\Users\pedro\AppData\Local\Temp> powershell -File redpill.ps1 -Help WifiPasswords

Parametershelp


3º - Running [ -WifiPasswords ] [ Dump ] Module

[SKYNET] C:\Users\pedro\AppData\Local\Temp> powershell -File redpill.ps1 -WifiPasswords Dump

wifidump


To Manual download the CmdLet for Local Tests, execute:
iwr -Uri https://raw.githubusercontent.com/r00t-3xp10it/redpill/main/redpill.ps1 -OutFile redpill.ps1|Unblock-File

:octocat: Video Tutorials

Demo
Demonstration - This tutorial uses: sysinfo, GetPasswords, UacMe modules
MouseLogger - Capture Screenshots of 'MouseClicks' with the help of psr.exe
PhishCreds - Phish for login credentials OR Brute Force user account password
FileMace - Change File TimeStamp {CreationTime, LastAccessTime, LastWriteTime}
CsOnTheFly - Download (from url), Auto-Compile and Execute CS scripts On-The-Fly!
EOP - Find missing software patchs for privilege escalation



:octocat: Acknowledgments

hax0r Function OS Flavor
@youhacker55 For All the help Debugging this cmdlet (Testing BETA version) Windows 7 x64bits
@0xyg3n For All the help Debugging this cmdlet (Testing BETA version) Windows 10 x64bits
@Shanty_Damayanti Debugging this cmdlet (amsi string detection bypasses) Windows 10 x64bits
@miltinhoc Debugging this cmdlet and recording video tutorials Windows 10 x64bits

sysinfo

GetConnections

SAM

brute

eop

NoAmsi

Any collaborations Or bugreports are wellcome



visitor badge

SuspiciousShellActivity - RedTeam @2021

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].