/shellsploit-framework

New Generation Exploit Development Kit

Primary LanguagePythonMIT LicenseMIT

#Shellsploit

Join the chat at https://gitter.im/b3mb4m/shellsploit-framework MIT Licence Python 3.4 Python 2.7 v0.3


Shellsploit let's you generate customized shellcodes, backdoors, injectors for various operating system. And let's you obfuscation every byte via encoders.

#Shellsploit Wiki

#Pre-installed Systems

alt tag alt tag

#Usage

usage: shellsploit  [-l] [-p] [-o] [-n]
						[--host] [--port]


optional arguments:
  	   -l, --list 			Show  list of backdoors,shellcodes,encoders,injectors
  	   -p, --payload 		Set payload for usage
  	   -n, -nc 				Declare netcat for usage
  	   --host				The connect/listen address
  	   --port				The connect/listen port	

Inline arguments:

	Main Menu:
		help           		Help menu
		os					Command directly ur computer
		use 				Select Module For Use
		clear				Clear the menu
		show modules    	Show Modules of Current Database
		show backdoors    	Show Backdoors of Current Database
		show injectors		Show Injectors(Shellcode,dll,so etc..)

	Shellcode Menu:
		back				Exit Current Module
		set 				Set Value Of Options To Modules
		ip					Get IP address(Requires net connection)
		os					Command directly ur computer
		clear				Clear the menu
		disas				Disassembly the shellcode(Support : x86/x64)
		whatisthis      	Learn which kind of shellcode it is
		iteration			Encoder iteration time
		generate 			Generate shellcode 
		output 				Save option to shellcode(txt,py,c,cpp,exe)
		show encoders		List all obfucscation encoders
		show options		Show Current Options Of Selected Module

	Injector Menu:
		set 				Set Value Of Options To Modules
		help 				Help menu
		back				Exit Current Module
		os  				Command directly ur computer
		pids				Get PID list of computer
		getpid				Get specific PID on list(Ex. getpid Python)

#Bugs

Please do not forget to report bugs! You can submit an issue, pull request, or you can pm via email or gitter,

######https://gitter.im/b3mb4m/shellsploit-framework ######b3mb4m@protonmail.com