Python-Rootkit

Python Remote Administration Tool (RAT) to gain meterpreter session

Github星跟蹤圖

python-rootkit

This is a full undetectable python RAT which can bypass almost all antivirus and open a backdoor inside any windows machine which will establish a reverse https Metasploit connection to your listening machine.

ViRu5 life cycle

  • Bypass all anti-virus.
  • Inject a malicius powershell script into memory.
  • Establish a reverse https connection to attacker machine.
  • Check every 10 seconds and make sure that the connection is still exist, If not it will re-establish a new connection.
  • Add a startup register key to re-connect to attacker after reboot.

Steps

  • Update viRu5/source.py parameters with your lhost and lport
  • Change source.py name to GoogleChromeAutoLaunch.py
  • Add GoogleChromeAutoLaunch.py, setup.py and your icon as icon.ico to c:\python27 dir
  • From cmd do
    cd c:\python27
    python setup.py py2exe
    
  • Find the RAT exe file in Dist dir.
  • Blind it with any photo, pdf, word or any kind of files
  • Send it to the victim
  • Use your social engineer skills to make him open the file
  • You will recieve a reverse https metasoplit connection :)

Testing on

  • Windows 7 32bit
  • Winodws 7 64bit
  • Widowns 8 32bit
  • Windows 8 64bit
  • Windows 8.1 32bit
  • Windows 8.1 64 bit
  • Windows 10 32bit
  • Windows 10 64bit

Thanks

Thanks for every security researsher how spend a time to help peaple and make the community more powerfull. Thanks for powerShellEmpire guys.

Disclaimer

This is for Educational purposes ONLY. First of all, this code aims to alarm people about security issues infected unpatched machines.

主要指標

概覽
名稱與所有者0xIslamTaha/Python-Rootkit
主編程語言Python
編程語言PowerShell (語言數: 4)
平台
許可證
所有者活动
創建於2016-06-09 10:49:54
推送於2024-10-29 16:56:39
最后一次提交2024-10-29 17:56:39
發布數0
用户参与
星數606
關注者數43
派生數145
提交數41
已啟用問題?
問題數5
打開的問題數0
拉請求數3
打開的拉請求數0
關閉的拉請求數0
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?