+ UPGRADE => msfcli replaced by msfconsole + INSTALL.sh => "added" netool toolkit Gnu Public License (GPL) display + INSTALL.sh => "added" build shortcut to toolkit -> gnome-desktop-item-edit + netool.sh => "added" file-selection GUI to ettercap -> zenity displays + priv8.sh => "added" MitM ROUTER phishing -> capture router credentials + priv8.sh => "added" adobe_flash_hacking_team_uaf -> exploit + mitm + dns_spoof + priv8.sh => "added" unicorn.py -> HTA drive-by URL payload execution + priv8.sh => "added" web_delivery msf module -> powershell/python payloads + priv8.sh => "added" Shellter PE injector (by kyREcon) binaries windows obfuscator ! priv8.sh => "bug-fix" ettercap IPV6 bug -> incorrect target selection /// /// ! priv8.sh => "bug-fix" host-a-file -> phishing webpages displays under MitM fixed * priv8.sh => "improved" host-a-file attack -> zenity file-selection GUI added * priv8.sh => "improved" windows payloads encoding (diferent msf encoders/interactions) * priv8.sh => "improved" java.jar phishing -> deliver java payload using: "phishing download webpage | Drive-by URL payload execution"
+ UPGRADE => msfpayload and msfencode replaced by msfvenom + UPGRADE => unicorn.py (meterpreter powershell by ReL1K) + netool.sh => "added" Resize terminal windows size (gnome terminal) + netool.sh => "added" nmap stealth scan (scan evading IDS logs) + priv8.sh => "added" missing 'google cast extension' phishing webpage + priv8.sh => "added" 'use host-a-file-attack' OR 'start a listenner' module to all non-automated exploits. * priv8.sh => "improved" android payload -> meterpreter or shell payloads * priv8.sh => "improved" generate shellcode -> added "DLL" funtion * priv8.sh => "improved" generate shellcode -> added "C-to-EXE" (Veil-Evasion) * priv8.sh => "improved" backdooring EXE files -> added "BDF" module
* netool.sh => "improved" added zenity "Displays" * netool.sh => "improved" nmap scanner menu "Redesign/Improved" * netool.sh => "improved" scan WAN for hosts "port nmap.xml to msf db " + netool.sh => "added" access t00lkit database "store scans or notes" + netool.sh => "added" CLEAN_LOGS:YES "toolkit_config" + netool.sh => "added" CLEAN_HANDLERS:NO "toolkit_config" + netool.sh => "added" CLEAN_DATABASE:NO "toolkit_config" * priv8.sh => "improved" all listenners "post-exploitation module added" + priv8.sh => "added" handler.rc "store listenner settings" + priv8.sh => "added" C-Injector "Inject shellcode using C" + priv8.sh => "added" 3 new multi-handlers "listenners" "'Default Listenner, Post-auto.rc, AutoRunScript, Resource_files'" * INSTALL.sh => "improved" netool toolkit "Installer (Ubuntu|Kali)"
* INSTALL.sh => "added" installer of netool.sh toolkit * netool.sh => 'improved' running scanner inurlbr.php from toolkit * netool.sh => 'improved' better displays and small bugs fixed + netool.sh => 'added' DISPLAY_PUBLIC_IP:YES "toolkit_config" + netool.sh => 'added' MIGRATE_TO:wininit.exe "toolkit_config file" Using the option 'post-exploitation' in rootsector module, we now have the ability to chose a proccess to migrate. * priv8.sh => 'improved' generate shellcode "new output -> shellcode.txt" * priv8.sh => 'Improved' host a file attack "added fake java update webpage" * priv8.sh => 'Improved' host a file attack "added fake missing plugin webpage" * priv8.sh => 'Improved' Website keylooger "no need to edit index.html" * priv8.sh => 'Improved' Clone WebSite > browser_autopwn "no need to edit index.html" * priv8.sh => 'Improved' Clone website > java_applet "no need to edit index.html" * priv8.sh => 'Improved' backdooring EXE files "keep template working" keep template working (executable) OR just use the icon (.ico) of the executable to be displayed in backdoor.exe generated.
+ netool.sh => 'added' INURLBR (webcrawler.php by cleiton) + netool.sh => 'added' 'toolkit_config' file (config settings in toolkit) + netool.sh => 'added' set variable for temp download folder (/tmp/evil) * netool.sh => 'Improved' toolkit update check function [GIT repo] * netool.sh => 'Improved' SET_AUTO_START_UPDATES (toolkit_config) * netool.sh => 'Improved' script display output [Text User Interface] - netool.sh => 'removed' dd0s javascript attack (ubuntuone website) + priv8.sh => 'added' 'host a file attack' automated exploit + priv8.sh => 'added' meterpreter powershell invocation payload [by ReL1K] * priv8.sh => 'Improved' script display output [Text User Interface] * priv8.sh => 'Improved' 'webshell.php' payload * priv8.sh => 'Improved' 'firefox_xpi_bootstrapped_addon' (added JavaScript AlertBox to phishing webpage).
+ netool.sh => 'Added' new version changelog screen info + netool.sh => 'Added' templates folder to change executables icons + netool.sh => 'Added' toolkit update check function [GIT repo] * netool.sh => 'Improved' script display output [Text User Interface] - netool.sh => 'Removed' 'metasploit auxiliary' modules + priv8.sh => 'Added' winrar_filename_spoofing automated exploit + priv8.sh => 'Added' firefox_xpi_bootstrapped_addon automated exploit * priv8.sh => 'Improved' post-exploitation 'persistence payload module * priv8.sh => 'Improved' windows/meterpreter payload encryption'
"general Display of information in the screen re-designed" * netool.sh => start and exit Display banner re-designed * priv8.sh => module as improved to display a more clean output * metasploit-auxiliary => Main menu re-designed "option:8" * fixed path to metasploit in some internal commands "core bugs" * priv8.sh => post-exploitation > persistence backdoor "added" * priv8.sh => generate a VBScript shellcode "Microsoft Word.doc - macro" * priv8.sh => Generating shellcode using Metasploit: "C,[J]avascript,[P]erl,rub[Y],[R]aw,[D]ll,[V]ba,e[X]e,[W]ar" * priv8.sh => Session hijacking [cookie hijacking] "1 - Steal cookies under [MITM] networking" "2 - Steal cookies Under [WAN] networking" "3 - Steal cookies Use our own webhosting" "4 - open cookie Logfile access the logfile" "now the framework does not ask for the input of username" echo -n "[+] {whoami}(your user name):"
[ netool.sh V3.4 - 24-nov-2013 ]
* netool.sh => nmap scanner > ping of dead [icmp-DoS] "added" * netool.sh => metasploit auxiliary > linux hashdump "added" * netool.sh => metasploit auxiliary > my-auxiliary.rb "updated" * my-auxiliary.rb => write message on target desktop "added" * my-auxiliary.rb => dump target hostsfile "added" "The Module [priv8.sh] as improved to display a more clean output to the user" "and now all automated exploits have a 'help menu' to describe the attack" * priv8.sh => pdf backdoor "added" * priv8.sh => post-exploitation > scraper "added" "now all payloads [windows/meterpreter] as the option to enumerate just about everything".
[ netool.sh V3.3 - 24-set-2013 ]
* netool.sh => xss and webcrawler > menu "improved" * netool.sh => new path to installations "added/review" * netool.sh => share files on local lan "improved" * priv8.sh => now all payloads [windows/meterpreter] migrates to AUTHORITY/SYSTEM and the proccess chosen to migrate to is 'wininit.exe' (AUTHORITY/SYSTEM) * priv8.sh => mitm + dns-spoof + java_applet attack "added" * priv8.sh => Backdooring EXE Files "added" * priv8.sh => Print Spooler Exploit "added" * priv8.sh => start a lisenner (chose various payloads to send) "added" * root3.rb => sourcecod "review/updated" * my-auxiliary.rb => upgraded with new option'check if UAC its enabled' * my-auxiliary.rb => upgraded with new option'enumerate Recently logged on users'