Releases: grisuno/LazyOwn
release/0.2.0
Full Changelog: release/0.1.66...vvvrelease/0.2.0
sireprat
Command sireprat: Automates the setup and usage of SirepRAT to perform various attacks on a Windows IoT Core device.
This function performs the following tasks:
- Installs required dependencies and sets up SirepRAT if not already installed.
- Prompts the user to select from predefined attacks, including retrieving system information, executing commands, saving registry keys, and copying files.
- Executes the selected attack on the target device, using the remote host IP stored in self.params["rhost"].
Args:
line (str): Optional argument for specifying attack type directly.
Returns:
None
Example:
sireprat
createtargets
Generates hosts.txt, urls.txt, domains.txt, and targets.txt from multiple JSON payload files.
This function scans the current directory for all JSON files with the format 'payload_{variable}.json',
and extracts the 'rhost', 'url', 'domain', and 'subdomain' fields from each file. It then writes these values into
four separate text files: 'hosts.txt', 'urls.txt', 'domains.txt', and 'targets.txt'. The 'targets.txt' file contains
the domain and subdomain in the format '{subdomain}.{domain}' and '{subdomain}.{url}', with domains cleaned using
the 'get_domain' function.
Parameters:
line (str): An optional argument (unused in this function).
Returns:
None
release/0.1.66
Full Changelog: release/0.1.65...release/0.1.66
openredirex
Command openredirex: Clones, installs, and runs OpenRedirex for testing open redirection vulnerabilities.
This function performs the following tasks:
- Clones the OpenRedirex repository if not already cloned.
- Installs the required dependencies using the setup script.
- Prompts the user for required inputs like the URL list, payloads file, keyword, and concurrency level.
- Executes OpenRedirex to scan the provided URLs for open redirection vulnerabilities.
Args:
line (str): Optional argument for specifying the URL list, payload file, keyword, and concurrency level.
Returns:
None
Example:
openredirex list_of_urls.txt payloads.txt FUZZ 50
feroxbuster
Command feroxbuster: Installs and runs Feroxbuster for performing forced browsing and directory brute-forcing.
This function performs the following tasks:
- Installs Feroxbuster using a
curl
command if it's not already installed. - Prompts the user for required inputs like the target URL, wordlist, file extensions, and additional options.
- Executes Feroxbuster for directory enumeration and brute-force attacks.
Args:
line (str): Optional argument for specifying the target URL, wordlist, and other Feroxbuster options.
Returns:
None
Example:
feroxbuster -u http://example.com -w wordlist.txt -x php,html
gowitness
Command gowitness: Installs and runs Gowitness for screenshotting web services or network CIDR blocks.
This function performs the following tasks:
- Ensures that Gowitness is installed (if not, installs it).
- Allows the user to select the scan type (single, scan, nmap, report).
- Based on the scan type, prompts for the appropriate input (URL or XML file).
- Allows the user to choose additional flags based on the scan type.
- Executes Gowitness with the chosen parameters.
Args:
line (str): Optional argument for specifying the URL or scan type.
Returns:
None
Example:
gowitness nmap -f scan_results.xml --write-db
odat
Command odat: Runs the ODAT sidguesser module to guess Oracle SIDs on a target Oracle database.
This function performs the following tasks:
- Ensures that ODAT is installed (checks if 'odat.py' exists).
- Allows the user to specify the RHOST and port.
- Runs ODAT's 'sidguesser' module with the specified parameters.
Args:
line (str): Optional argument for specifying additional ODAT options.
Returns:
None
Example:
odat
release/0.1.65
Full Changelog: release/0.1.64...release/0.1.65
penelope
Command penelope: Installs and runs Penelope for handling reverse and bind shells.
This function performs the following tasks:
- Checks if Penelope is already cloned in the external/.exploit directory.
- Clones the Penelope repository if not present.
- Prompts the user for various options to configure and run Penelope.
- Executes Penelope with the specified options, supporting multiple features like reverse shell, bind shell, file server, etc.
Args:
line (str): Optional argument for specifying the port and other Penelope options.
Returns:
None
Example:
penelope 5555 -i eth0
v
Open a new window within a tmux session using the LazyOwn RedTeam Framework.
This method is designed to create a new vertical split window in an existing
tmux session, where the specified command will be executed. The command
used to open the new window is the ./run --no-banner
script, which is
intended for use within the LazyOwn RedTeam Framework environment.
The method first ensures that the specified tmux session is active by calling
the ensure_tmux_session
function. If the session is not already running,
it will create a new one. After confirming that the session is active, it
proceeds to create a new vertical window with a specified size. The size of
the new window is currently set to 50% of the available terminal space.
Args:
arg (str): Additional arguments passed to the command, if any. This can be
used to customize the behavior of the command executed in the
new window. However, in the current implementation, this
argument is not utilized and can be left as an empty string.
Example:
If this method is called within a command-line interface of the LazyOwn
RedTeam Framework, it will open a new vertical tmux window and execute
the ./run --no-banner
command within it.
Note:
- Ensure that tmux is installed and properly configured on the system.
- The method assumes that the session name is defined and accessible in
the scope where this method is called.
h
Open a new window within a tmux session using the LazyOwn RedTeam Framework.
This method is designed to create a new horizontal split window in an existing
tmux session, where the specified command will be executed. The command
used to open the new window is the ./run --no-banner
script, which is
intended for use within the LazyOwn RedTeam Framework environment.
The method first ensures that the specified tmux session is active by calling
the ensure_tmux_session
function. If the session is not already running,
it will create a new one. After confirming that the session is active, it
proceeds to create a new horizontal window with a specified size. The size of
the new window is currently set to 50% of the available terminal space.
Args:
arg (str): Additional arguments passed to the command, if any. This can be
used to customize the behavior of the command executed in the
new window. However, in the current implementation, this
argument is not utilized and can be left as an empty string.
Example:
If this method is called within a command-line interface of the LazyOwn
RedTeam Framework, it will open a new horizontal tmux window and execute
the ./run --no-banner
command within it.
Note:
- Ensure that tmux is installed and properly configured on the system.
- The method assumes that the session name is defined and accessible in
the scope where this method is called.
adgetpass
Command adgetpass: Generates a PowerShell script to extract credentials from Azure AD Connect Sync.
This function generates a PowerShell script based on user inputs, including the SQL server,
database, and custom keyset values. The script retrieves encryption keys, decrypts credentials,
and outputs the domain, username, and password from the AD Sync configuration.
Args:
line (str): Optional argument to specify the server name, database name, and other options
in the following format: "server_name database_name keyset_id instance_id entropy".
Returns:
None
Example:
adgetpass MONTEVERDE ADSync 1 1852B527-DD4F-4ECF-B541-EFCCBFF29E31 194EC2FC-F186-46CF-B44D-071EB61F49CD
release/0.1.64
Full Changelog: release/0.1.63...release/0.1.64
getadusers
Executes the GetADUsers.py script to retrieve Active Directory users.
The function retrieves the necessary parameters (domain controller IP and domain) from the
instance's parameter dictionary. If a credentials file exists in the 'sessions_dir',
it reads the file and uses the username/password combinations found there. If the file
does not exist, it prompts the user for a username and password.
The password is copied to the clipboard for convenience. A command is constructed using
the GetADUsers.py tool, and it is then executed to enumerate Active Directory users.
Args:
line (str): The password input from the command line or an empty string if not provided.
Returns:
None
crack_cisco_7_password
Crack a Cisco Type 7 password hash and display the plaintext.
This command takes an encrypted Cisco Type 7 password hash as input,
processes it to recover the original plaintext password, and prints the
result to the console.
Args:
line (str): The encrypted password hash in Cisco Type 7 format.
Returns:
None: The function prints the plaintext password directly to the console.
loxs
Command loxs: Installs and runs Loxs for multi-vulnerability web application scanning.
This function performs the following tasks:
- Checks if Loxs is already cloned in the external/.exploit directory.
- Clones the Loxs repository if not present.
- Installs required dependencies.
- Prompts the user for a URL or file input, custom payload file, success criteria, and thread count.
- Executes Loxs for scanning vulnerabilities like LFI, OR, XSS, and SQLi.
- Displays real-time results and optionally saves vulnerable URLs.
Args:
line (str): Optional argument for specifying the input URL or file, custom payload, and additional options.
Returns:
None
Example:
loxs --url target.com
blazy
Command blazy: Installs and runs blazy for multi-vulnerability web application scanning.
This function performs the following tasks:
- Checks if blazy is already cloned in the external/.exploit directory.
- Clones the blazy repository if not present.
- Installs required dependencies.
- Prompts the user for a URL or file input, custom payload file, success criteria, and thread count.
- Executes blazy for Bruteforce Login.
- Displays real-time results and optionally saves vulnerable URLs.
Args:
line (str): Optional argument for specifying the input URL.
Returns:
None
Example:
python3 main.py -i target.com
parth
Command parth: Installs and runs Parth for discovering vulnerable URLs and parameters.
This function performs the following tasks:
- Checks if Parth is already cloned in the external/.exploit directory.
- Clones the Parth repository if not present.
- Installs required dependencies using pip3.
- Prompts the user for a URL, file input, or import option and allows for custom output such as JSON or saving parameter names.
- Executes Parth for scanning vulnerabilities like LFI, SSRF, SQLi, XSS, and open redirects.
- Displays real-time results and optionally saves output in a file.
Args:
line (str): Optional argument for specifying the target domain, import file, or additional Parth options.
Returns:
None
Example:
parth -t example.com
breacher
Command breacher: Installs and runs Breacher for finding admin login pages and EAR vulnerabilities.
This function performs the following tasks:
- Checks if Breacher is already cloned in the external/.exploit directory.
- Clones the Breacher repository if not present.
- Installs required dependencies.
- Prompts the user for a target URL, file type (php, asp, html), custom paths, and thread options.
- Executes Breacher for scanning admin login pages and potential EAR vulnerabilities.
- Supports multi-threading and custom paths for enhanced scanning.
Args:
line (str): Optional argument for specifying the target URL, file type, and additional Breacher options.
Returns:
None
Example:
breacher -u example.com --type php
xsstrike
Command xsstrike: Installs and runs XSStrike for finding XSS vulnerabilities.
This function performs the following tasks:
- Checks if XSStrike is already cloned in the external/.exploit directory.
- Clones the XSStrike repository if not present.
- Installs required dependencies.
- Prompts the user for a target URL, crawling level, request method, encoding, and additional XSStrike options.
- Executes XSStrike for testing vulnerabilities, supporting multiple features like fuzzing, blind XSS injection, crawling, and more.
Args:
line (str): Optional argument for specifying the target URL, crawling level, encoding, and other XSStrike options.
Returns:
None
Example:
xsstrike -u http://example.com/search.php?q=query --crawl -l 3
release/0.1.63
Full Changelog: release/0.1.62...release/0.1.63
ip2hex
Convert an IPv4 address into its hexadecimal representation.
This function takes an IPv4 address in standard dotted-decimal format
(e.g., '192.168.1.1') and converts each of its four octets into a hexadecimal
number. The resulting hexadecimal string is concatenated without separators,
providing the full hexadecimal equivalent of the IP address.
The input IP address is expected to be a string in the format 'X.X.X.X',
where X is an integer between 0 and 255.
Parameters:
line (str): The input string representing the IPv4 address in dotted-decimal format.
Returns:
None: The hexadecimal equivalent of the IP address is printed to the console.
john2keepas
List all .kdbx files in the 'sessions' directory, let the user select one, and run the
command sudo keepass2john {user_file} > sessions/hash.txt
.
If 'sessions/hash.txt' already exists, it will be backed up with a timestamp to avoid overwriting.
Parameters:
line (str): An optional string parameter. This can be used for any additional input,
though it's not needed in this specific command.
Returns:
None
keepass
Open a .kdbx file and print the titles and contents of all entries. The password can be provided through
the 'line' parameter, via user input, or from a 'credentials.txt' file in the 'sessions' directory.
If the file 'credentials.txt' exists in the 'sessions' directory, the first password from it
will be used automatically.
Parameters:
line (str): An optional string parameter to pass the password. If not provided, the user will
be prompted to input the password.
Returns:
None
release/0.1.62
Full Changelog: release/0.1.61...release/0.1.62
emp3r0r
Command emp3r0r Downloads and sets up the Emperor server for local exploitation.
This function performs the following tasks:
- Checks if Emperor is already downloaded.
- Downloads the Emperor tar.xz file if not already present.
- Extracts the contents into the sessions directory.
- Executes the Emperor server.
- Prepares the agent download command based on the OS Host and copies it to the clipboard.
Args:
line (str): Optional arguments to specify port Relay
Returns:
None
Example:
emp3r0r 6666
Notes:
- Ensure that the required dependencies are installed.
template_helper_serializer
Handles the creation and serialization of a template helper.
This function performs the following tasks:
- Retrieves the filename and data to be written from the input line.
- Initializes a template file and writes the data to it.
- Serializes the template data and outputs the result.
Args:
line (str): The input line containing the filename and data in the format "filename, data".
Returns:
None
Raises:
None
Example:
template_helper_serializer shell.php,
gospherus
Command gospherus: Clones and uses the Gopherus tool to generate gopher payloads for various services.
Use the command template_helper_serializer to generate the serialization payload. more info help template_helper_serializer
This function performs the following tasks:
0. Install Python2 (Old protocol, old t00l, old python)
- Checks if Gopherus is already cloned in the external/.exploit directory.
- Clones the Gopherus repository if not already present.
- Enumerates the possible exploits and prompts the user to choose one.
- Runs the selected exploit using Gopherus.
Args:
line (str): Optional argument for specifying the chosen exploit.
Returns:
None
Example:
gospherus 2
wpscan
Command wpscan: Installs and runs WPScan to perform WordPress vulnerability scanning.
This function performs the following tasks:
- Checks if WPScan is installed.
- Installs WPScan using gem if not already installed.
- Prompts the user for a URL to scan.
- Allows the user to choose additional WPScan options such as --stealthy or --enumerate.
- Executes the WPScan command with the chosen options.
Args:
line (str): Optional argument to specify the URL or additional WPScan options.
Returns:
None
Example:
wpscan --url blog.tld
createjsonmachine_batch
Create multiple JSON payload files based on a CSV input file from HackerOne.
This function processes a CSV file located in the 'sessions' directory. The CSV file
must contain information about different assets, including 'identifier',
'eligible_for_bounty', and 'eligible_for_submission'. For each asset where
both 'eligible_for_bounty' and 'eligible_for_submission' are set to True,
a JSON payload file is created using a predefined template.
The CSV must contain the following columns:
- 'identifier': Domain or asset name used to generate the URL and domain for the payload.
- 'eligible_for_bounty': A boolean indicating if the asset is eligible for bounty.
- 'eligible_for_submission': A boolean indicating if the asset is eligible for submission.
For each eligible asset:
- The URL is generated based on the 'identifier' field.
- The domain is derived from the 'identifier' field.
- The 'rhost' field in the JSON payload is updated using the IP address obtained by pinging the domain.
The JSON payload is saved in the format 'payload_.json'.
Parameters:
line (str): An optional string parameter. If provided, it selects the corresponding CSV file
in the 'sessions' directory based on the user's input.
Returns:
None
release/0.1.61
Full Changelog: release/0.1.60...release/0.1.61
Compiles and uploads an .ino sketch to a Digispark device using Arduino CLI and Micronucleus.
This method checks if Arduino CLI and Micronucleus are installed on the system.
If they are not available, it installs them. It then compiles a Digispark sketch
and uploads the generated .hex file to the Digispark device.
The method performs the following actions:
1. Checks for the presence of Arduino CLI and installs it if not available.
2. Configures Arduino CLI for Digispark if not already configured.
3. Generates a reverse shell payload and prepares the sketch for Digispark.
4. Compiles the prepared Digispark sketch using Arduino CLI.
5. Checks for the presence of Micronucleus and installs it if not available.
6. Uploads the compiled .hex file to the Digispark device using Micronucleus.
Args:
line (str): Command line input provided by the user, which may contain additional parameters.
Returns:
None: The function does not return any value but may modify the state of the system
by executing commands.
release/0.1.60
Full Changelog: release/0.1.59...release/0.1.60
release/0.1.59
Full Changelog: release/0.1.58...release/0.1.59
release/0.1.58
Full Changelog: release/0.1.57...release/0.1.58