Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/payload_creator.py
1769 views
1
# coding=utf-8
2
import os
3
4
from core import HackingTool
5
from core import HackingToolsCollection
6
7
from rich.console import Console
8
from rich.theme import Theme
9
from rich.table import Table
10
from rich.panel import Panel
11
from rich.prompt import Prompt
12
13
_theme = Theme({"purple": "#7B61FF"})
14
console = Console(theme=_theme)
15
16
17
class TheFatRat(HackingTool):
18
TITLE = "The FatRat"
19
DESCRIPTION = "TheFatRat Provides An Easy way to create Backdoors and Payloads " \
20
"which can bypass most anti-virus"
21
INSTALL_COMMANDS = [
22
"sudo git clone https://github.com/Screetsec/TheFatRat.git",
23
"cd TheFatRat && sudo chmod +x setup.sh"
24
]
25
RUN_COMMANDS = ["cd TheFatRat && sudo bash setup.sh"]
26
PROJECT_URL = "https://github.com/Screetsec/TheFatRat"
27
28
def __init__(self):
29
super(TheFatRat, self).__init__([
30
('Update', self.update),
31
('Troubleshoot', self.troubleshoot)
32
])
33
34
def update(self):
35
os.system("cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh")
36
37
def troubleshoot(self):
38
os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools")
39
40
41
class Brutal(HackingTool):
42
TITLE = "Brutal"
43
DESCRIPTION = "Brutal is a toolkit to quickly create various payloads, powershell attacks, " \
44
"virus attacks and launch listener for a Human Interface Device"
45
INSTALL_COMMANDS = [
46
"sudo git clone https://github.com/Screetsec/Brutal.git",
47
"cd Brutal && sudo chmod +x Brutal.sh"
48
]
49
RUN_COMMANDS = ["cd Brutal && sudo bash Brutal.sh"]
50
PROJECT_URL = "https://github.com/Screetsec/Brutal"
51
52
def show_info(self):
53
super(Brutal, self).show_info()
54
console.print("""
55
[!] Requirement
56
>> Arduino Software (I used v1.6.7)
57
>> TeensyDuino
58
>> Linux udev rules
59
>> Copy and paste the PaensyLib folder inside your Arduino libraries
60
61
[!] Visit for Installation for Arduino:
62
>> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
63
""")
64
65
66
class Stitch(HackingTool):
67
TITLE = "Stitch"
68
DESCRIPTION = "Stitch is Cross Platform Python Remote Administrator Tool\n" \
69
"[!] Refer Below Link For Wins & Mac OS"
70
INSTALL_COMMANDS = [
71
"sudo git clone https://github.com/nathanlopez/Stitch.git",
72
"cd Stitch && sudo pip install -r lnx_requirements.txt"
73
]
74
RUN_COMMANDS = ["cd Stitch && sudo python main.py"]
75
PROJECT_URL = "https://nathanlopez.github.io/Stitch"
76
77
78
class MSFVenom(HackingTool):
79
TITLE = "MSFvenom Payload Creator"
80
DESCRIPTION = "MSFvenom Payload Creator (MSFPC) is a wrapper to generate multiple types of payloads, " \
81
"based on user choice. Simplifies payload creation."
82
INSTALL_COMMANDS = [
83
"sudo git clone https://github.com/g0tmi1k/msfpc.git",
84
"cd msfpc;sudo chmod +x msfpc.sh"
85
]
86
RUN_COMMANDS = ["cd msfpc;sudo bash msfpc.sh -h -v"]
87
PROJECT_URL = "https://github.com/g0tmi1k/msfpc"
88
89
90
class Venom(HackingTool):
91
TITLE = "Venom Shellcode Generator"
92
DESCRIPTION = "Venom 1.0.11 (malicious_server) exploits apache2 webserver to deliver LAN payloads via fake webpages."
93
INSTALL_COMMANDS = [
94
"sudo git clone https://github.com/r00t-3xp10it/venom.git",
95
"sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh",
96
"sudo ./venom.sh -u"
97
]
98
RUN_COMMANDS = ["cd venom && sudo ./venom.sh"]
99
PROJECT_URL = "https://github.com/r00t-3xp10it/venom"
100
101
102
class Spycam(HackingTool):
103
TITLE = "Spycam"
104
DESCRIPTION = "Generates a Win32 payload that captures webcam images every 1 minute and sends them to the attacker."
105
INSTALL_COMMANDS = [
106
"sudo git clone https://github.com/indexnotfound404/spycam.git",
107
"cd spycam && bash install.sh && chmod +x spycam"
108
]
109
RUN_COMMANDS = ["cd spycam && ./spycam"]
110
PROJECT_URL = "https://github.com/indexnotfound404/spycam"
111
112
113
class MobDroid(HackingTool):
114
TITLE = "Mob-Droid"
115
DESCRIPTION = "Generates metasploit payloads easily without typing long commands."
116
INSTALL_COMMANDS = [
117
"git clone https://github.com/kinghacker0/mob-droid.git"
118
]
119
RUN_COMMANDS = ["cd mob-droid;sudo python mob-droid.py"]
120
PROJECT_URL = "https://github.com/kinghacker0/Mob-Droid"
121
122
123
class Enigma(HackingTool):
124
TITLE = "Enigma"
125
DESCRIPTION = "Enigma is a Multiplatform payload dropper."
126
INSTALL_COMMANDS = [
127
"sudo git clone https://github.com/UndeadSec/Enigma.git"
128
]
129
RUN_COMMANDS = ["cd Enigma;sudo python enigma.py"]
130
PROJECT_URL = "https://github.com/UndeadSec/Enigma"
131
132
133
class PayloadCreatorTools(HackingToolsCollection):
134
TITLE = "Payload creation tools"
135
TOOLS = [
136
TheFatRat(),
137
Brutal(),
138
Stitch(),
139
MSFVenom(),
140
Venom(),
141
Spycam(),
142
MobDroid(),
143
Enigma()
144
]
145
146
def pretty_print(self):
147
table = Table(title="Payload Creation Tools", show_lines=True, expand=True)
148
table.add_column("Title", style="purple", no_wrap=True)
149
table.add_column("Description", style="purple")
150
table.add_column("Project URL", style="purple", no_wrap=True)
151
152
for t in self.TOOLS:
153
desc = getattr(t, "DESCRIPTION", "") or ""
154
url = getattr(t, "PROJECT_URL", "") or ""
155
table.add_row(t.TITLE, desc.strip().replace("\n", " "), url)
156
157
console.print(Panel(table, title="[purple]Available Tools[/purple]", border_style="purple"))
158
159
def show_options(self):
160
console.print("\n")
161
console.print(Panel.fit(
162
"[bold purple]Payload Creator Collection[/bold purple]\n"
163
"Select a tool to run it or exit.",
164
border_style="purple"
165
))
166
167
table = Table(title="[bold cyan]Available Tools[/bold cyan]", show_lines=True, expand=True)
168
table.add_column("Index", justify="center", style="bold yellow")
169
table.add_column("Tool Name", justify="left", style="bold green")
170
table.add_column("Description", justify="left", style="white")
171
172
for i, tool in enumerate(self.TOOLS):
173
desc = getattr(tool, "DESCRIPTION", "") or "—"
174
table.add_row(str(i + 1), tool.TITLE, desc.replace("\n", " "))
175
176
table.add_row("[red]99[/red]", "[bold red]Exit[/bold red]", "Return to previous menu")
177
console.print(table)
178
179
try:
180
choice = Prompt.ask("[bold cyan]Select a tool to run[/bold cyan]", default="99")
181
choice = int(choice)
182
if 1 <= choice <= len(self.TOOLS):
183
selected = self.TOOLS[choice - 1]
184
if hasattr(selected, "run"):
185
selected.run()
186
elif hasattr(selected, "show_actions"):
187
selected.show_actions()
188
else:
189
console.print("[bold yellow]Selected tool has no runnable interface.[/bold yellow]")
190
elif choice == 99:
191
return 99
192
except Exception:
193
console.print("[bold red]Invalid choice. Try again.[/bold red]")
194
195
return self.show_options()
196
197
198
if __name__ == "__main__":
199
tools = PayloadCreatorTools()
200
tools.pretty_print()
201
tools.show_options()
202
203