Skip to content

triplekill/T2B-framework

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Merge the power of Python with the anonymity of Tor.

Status

Build Status

Bugs

Everything is almost under development, so please write to me for any of it

Attention

In windows-client the cert is not required because when you compile and deliver it, it can't extract the cert file because (and at the moment of writing I don't know why) it will run in C:\Windows\System32 instead of C:\Path\to\file.exe.

TODO

  • Correct change directory
  • Reg key (you need to put the file name in the variable)

News

  • 14/04/17:
    • Added evade std sandbox: thanks to Markacho, now the program will wait for left click and then proceed
  • 12/10/16:
    • Added v3: now you can handle and choose multiple clients
  • 11/10/16:
    • Added ASCII-ART
  • 28/08/16:
  • 30/07/16:
    • Added mapMe function, now you locate the target as Google does. You've to setup a Google Maps Api Key, more info here. Yes, you've some limits but 2500 requests per day is a nice rate (VT has 4 per day). At the moment of writing it's not tested on Windows/Mac.
  • 29/07/16:
    • Added DownHTTP function to download file from given url
  • 28/07/16:
    • Added windows hook that works like on Linux (working on for Mac)
  • 27/07/16:
    • Introcuted v2: many changes have come, added a lot of nice function (keylogging, extracting passwd from Firefox ...)
    • For a matter of compatibility I decided to write specific code for specific platforms (introducing Linux-Client, Windows-Client and Mac-Client)
  • 21/07/16:
    • Corrected HOOK: now the script is handled with threads, no more external scripts or whatever. At the moment HOOK works only in Linux (that's why LinuxHOOKER), working on for windows.
    • Added RunMe.sh: automated tool to setup the HS, certificate and all the necessary
    • Added VirusTotal check: once the program is started, itself check is recognised as malware in the Database of VirusTotal. Note that if the file was never scanned before, VT reports an "error". You have to register on VT to get an api key, here for more infos.
    • Added HOOK function: still in dev. Thanks to JeffHoogland for pyxhook, at the time of writing you can check if hook is running or not, and if you want stop it.
    • Added certificate auto extractor: if the certificate.pem is not present in the directory, it'll extract form the code.
    • Fixed s-wifi: Thanks to netifaces now you can check what netifaces are present and than choose the wifi card, no more if/ip-config.
  • 14/07/16:
    • Added LinuxAutoStart: this will add a hidden .desktop in ~/.config/autostart/, and hidden in StarUp applications;
    • Added WindowsAutoStart: this will add a new reg key for the file, and set it hidden (actually not tested at the time of writing)
    • Added FirefoxThief: this will dump key3.db,logins.json and cert8.db from the specified directory. So then you can extract the passwd.
  • 29/05/16:
    • Upgraded progress bar, thanks to tqdm
    • Added HMAC (coming for transfered files)
    • Added PBKDF to sign the hash of the files
  • 24/05/16:
    • Added protect function, now you can encrypt & decrypt every file that you downloaded (in both directions) so you can keep safe your secrets (soon I'll add, obviously, HMAC)
  • 05/05/16:
    • Added s-wifi that let you to scan the remote Wifi network;
    • Added info that let you retrieve some information about the target, like IP address and other OS information;
  • 21/04/16: Created v1 because reinvent the wheel is helpful but not useful. So added TLS/SSL support to make a sense of real security. At the time of writing I'm using ssl std lib., but if there is a why that I shouldn't use it please tell me.

Screen-shot

Screenshot1 Screenshot2

Description

This project aims to administrate a network of compromised hosts, keeping your identity private (thanks to Tor) and your connections secure (thanks to TLS/SSL). For many times botnets get stuck because the main servers became compromised, but this framework will let you keep yours C&C safe and alive (well, this will do its best).

Another problem is that you let unauthorized users to reach your server, even without the cert or whatever. If I now your hostname/IP/whatever I can reach you. But Tor has the solution (that, as far as I know, clearnet hasn't). I'm referring to HiddenServiceAuthorizeClient and HidServAuth, if you set these properly, see here, your Master server will be more stealth than ever and it won't suffer ddos attack, or any other type of it. Because this is a feature of Tor, of the protocol and not of the software (T2B-framework). So from now on, you'll setup a "firewall" between you (Master) and your bots. The new firewall will be just a node from you and your bots, that will filter "legit" client from attackers. But for this we all will wait. News are coming, changes are coming.

Motivation

Started looking for one... ended up writing one.

Requirements

Installation

  • Install Tor and initialize a HS
  • Generate a S.S.C. (Self-Signed-Certificate) with Openssl (you can use the priv key of the HS)
  • Modify the variables of the S.C. as you like (host, port, etc..)
  • Install GEOIP2, and download the database
  • run pip install -r requirements
  • Install external (github) dependencies

Contributors

I found a lot of code all over the web, so as soon as possible I'll add the reference to the main authors. Last but not least, many people inspired me but citing everyone will crush the net.

Known Bugs

  • Progress bar when uploading files, is not so progress
  • When you execute FirefoxThief, from the downloaded data you can extract only the new logins. I mean, if the target sync passwd/cookie/etc.. with the Firefox account, you can extract only the logins creds since that sync. The old creds can't be extracted (at the time of writing, looking for the solution)

Abuse

I'm NOT responsible for damages did by the abuse of this software.

Contact me

You can find me on Twitter

About

Cross-Platform Post Exploitation Toolkit

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 98.4%
  • Shell 1.6%