Quick Malicious ClickOnceGenerator for Red Team. The default application a simple WebBrowser widget that point to a website of your choice.
$ python ClickOnceGenerator.py --help
ClickOnceGenerator | Mr.Un1k0d3r RingZer0 Team
usage: ClickOnceGenerator.py [-h] [--config CONFIG] [--out OUT]
[--override [OVERRIDE]]
ClickOnceGenerator Options.
optional arguments:
-h, --help show this help message and exit
--config CONFIG Path to the JSON config file.
--out OUT Output solution name.
--override [OVERRIDE]
Delete destination if exists
config.json
example. The shellcode payload.bin need to be the RAW
format of your shellcode.
{
"title": "My Evil ClickOnce",
"url": "http://ringzer0team.com/",
"shellcode": "payload.bin",
"process_name": "iexplore"
}
title
is the title of the ClickOnce Applicationurl
url used by the WebBrowser widgetshellcode
the payload you want to execute while the application is launchedprocess_name
used to evade sandbox by checking if a specific process is running. (default toiexplore
)
Mr.Un1k0d3r RingZer0 Team