Skip to content

Commit

Permalink
feat(feat): new command Shadowsocks \n\n Version: release/0.1.50 \n\n…
Browse files Browse the repository at this point in the history
… with love to the comunity :D \n\n Modified file(s):\n- COMMANDS.md

- README.md
- docs/COMMANDS.html
- docs/README.html
- docs/index.html
- docs/index.html.bak
- lazyown
- payload.json\n  LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n  LazyOwn/   https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Wed Sep 25 22:59:45 2024 -0300 \n\n Hora: 1727315985
  • Loading branch information
grisuno committed Sep 28, 2024
1 parent 4650ebb commit b9f7169
Show file tree
Hide file tree
Showing 11 changed files with 2,716 additions and 2,464 deletions.
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,13 @@
# Changelog


### Nuevas características

### Otros

* * feat(feat): new command Shadowsocks \n\n Version: release/0.1.50 \n\n with love to the comunity :D \n\n Modified file(s):\n- COMMANDS.md - README.md - docs/COMMANDS.html - docs/README.html - docs/index.html - docs/index.html.bak - lazyown - payload.json\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Wed Sep 25 22:59:45 2024 -0300 \n\n Hora: 1727315985


### Otros

### Otros
Expand Down
36 changes: 26 additions & 10 deletions COMMANDS.md
Original file line number Diff line number Diff line change
Expand Up @@ -3866,31 +3866,37 @@ To manually execute the command:
Note: Ensure `xclip` is installed and available on your system.

## winbase64payload
Creates a base64 encoded PowerShell payload specifically for Windows to execute a `.ps1` script from `lhost`.
Creates a base64 encoded payload specifically for Windows to execute a PowerShell command or download a file using `lhost`.

1. Checks if `lhost` is set:
- Displays an error message and exits if `lhost` is not set.

2. Checks if a file name is provided:
- Displays an error message and exits if no file name is provided.
2. Checks if a file name or command is provided:
- Displays an error message and exits if no file name or command is provided.

3. Constructs a PowerShell command:
- The command downloads and executes a `.ps1` script from `lhost` using `New-Object WebClient`.
3. Prompts for the type of payload:
- '1': Constructs a PowerShell command to download and execute a `.ps1` script from `lhost`.
- '2': Constructs a command to download a file using `wget`.

4. Encodes the PowerShell command:
4. Prompts for the output type:
- '1': Outputs the base64 encoded PowerShell command.
- '2': Outputs the base64 encoded command in an ASP format.
- '3': Outputs the base64 encoded command in a PHP format.

5. Encodes the command:
- Converts the command to UTF-16LE encoding.
- Encodes the UTF-16LE encoded command to base64.
- Copies the final base64 command to the clipboard using `xclip`.
- Copies the final base64 command to the clipboard using `copy2clip`.

:param line: The name of the `.ps1` file located in the `sessions` directory.
:param line: The name of the `.ps1` file or the command to be executed.
:type line: str
:returns: None

Manual execution:
To manually use the payload:
- Ensure `lhost` is set to the correct IP address.
- Place the `.ps1` file in the `sessions` directory.
- Use `xclip` to copy the generated base64 command to the clipboard.
- Place the `.ps1` file in the `sessions` directory if using the 'ps1' payload type.
- Use `copy2clip` to copy the generated base64 command to the clipboard.

Note: Ensure `iconv`, `base64`, and `xclip` are installed and available on your system.

Expand Down Expand Up @@ -5479,6 +5485,16 @@ To manually decrypt a TightVNC password, you would need to:
Example:
passtightvnc D7A514D8C556AADE

## shadowsocks
Execute the Shadowsocks tool to create a secure tunnel for network traffic.

This function allows the user to specify various parameters for configuring and running the Shadowsocks client
or server. It handles user input for server address, port, password, encryption method, and other options,
constructs the command, and executes it.

:param line: Not used in this implementation.
:returns: None

## find_tgts
Finds and returns a list of target hosts with port 445 open in the specified subnet.

Expand Down
43 changes: 33 additions & 10 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5132,31 +5132,37 @@ To manually execute the command:
Note: Ensure `xclip` is installed and available on your system.
## winbase64payload
Creates a base64 encoded PowerShell payload specifically for Windows to execute a `.ps1` script from `lhost`.
Creates a base64 encoded payload specifically for Windows to execute a PowerShell command or download a file using `lhost`.
1. Checks if `lhost` is set:
- Displays an error message and exits if `lhost` is not set.
2. Checks if a file name is provided:
- Displays an error message and exits if no file name is provided.
2. Checks if a file name or command is provided:
- Displays an error message and exits if no file name or command is provided.
3. Constructs a PowerShell command:
- The command downloads and executes a `.ps1` script from `lhost` using `New-Object WebClient`.
3. Prompts for the type of payload:
- '1': Constructs a PowerShell command to download and execute a `.ps1` script from `lhost`.
- '2': Constructs a command to download a file using `wget`.
4. Encodes the PowerShell command:
4. Prompts for the output type:
- '1': Outputs the base64 encoded PowerShell command.
- '2': Outputs the base64 encoded command in an ASP format.
- '3': Outputs the base64 encoded command in a PHP format.
5. Encodes the command:
- Converts the command to UTF-16LE encoding.
- Encodes the UTF-16LE encoded command to base64.
- Copies the final base64 command to the clipboard using `xclip`.
- Copies the final base64 command to the clipboard using `copy2clip`.
:param line: The name of the `.ps1` file located in the `sessions` directory.
:param line: The name of the `.ps1` file or the command to be executed.
:type line: str
:returns: None
Manual execution:
To manually use the payload:
- Ensure `lhost` is set to the correct IP address.
- Place the `.ps1` file in the `sessions` directory.
- Use `xclip` to copy the generated base64 command to the clipboard.
- Place the `.ps1` file in the `sessions` directory if using the 'ps1' payload type.
- Use `copy2clip` to copy the generated base64 command to the clipboard.
Note: Ensure `iconv`, `base64`, and `xclip` are installed and available on your system.
Expand Down Expand Up @@ -6745,6 +6751,16 @@ To manually decrypt a TightVNC password, you would need to:
Example:
passtightvnc D7A514D8C556AADE
## shadowsocks
Execute the Shadowsocks tool to create a secure tunnel for network traffic.
This function allows the user to specify various parameters for configuring and running the Shadowsocks client
or server. It handles user input for server address, port, password, encryption method, and other options,
constructs the command, and executes it.
:param line: Not used in this implementation.
:returns: None
## find_tgts
Finds and returns a list of target hosts with port 445 open in the specified subnet.
Expand Down Expand Up @@ -6964,6 +6980,13 @@ Helper function to alternate the case of characters in a string.
# Changelog
### Otros
### Otros
* * feature(feat): now we are vip \n\n Version: release/0.1.49 \n\n \n\n Modified file(s):\n- .gitignore - COMMANDS.md - README.md - docs/COMMANDS.html - docs/README.html - docs/index.html - external/install_external.sh - lazyown - payload.json - payload1.json\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Mon Sep 23 02:57:23 2024 -0300 \n\n Hora: 1727071043
### Nuevas características
### Otros
Expand Down
Loading

0 comments on commit b9f7169

Please sign in to comment.