Skip to content

Nerv0us r4bbit - Post Exploitation Windows Enumeration Tool

License

Notifications You must be signed in to change notification settings

34zY/Nerv0usR4bbit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 

Repository files navigation

ɴᴇʀᴠ0ᴜs ʀ4ʙʙɪᴛ

Automated Pᴏsᴛ Exᴘʟᴏɪᴛᴀᴛɪᴏɴ Eɴᴜᴍᴇʀᴀᴛɪᴏɴ ᴛᴏᴏʟ for Windows target

Author : @34zY

/!\ NEW PORTABLE VERSION AVAILABLE SOON.



----------------------------------------------------------------------------
|          .--,_    \     🐰    |  \ <<Version>>  /   |    \  <<System>> / |
|         / ,/ /\    \    💙    |   \  > 2.0 <   /    |     \ >Windows< /  |
|        / // /\ \    \----------------------------------------------------|
|       / // /_\\|                                                         |
|     .'  ' (                                                              |
|    /__    \.-"""-._                                                      |
|   / 0>  ' .    '    `-.          <<ɴᴇʀᴠ0ᴜs ʀ4ʙʙɪᴛ>>                      |
|  (       .  '      "   `.                                                |      
|   `/─-.-'     "       '  ;       <<Pᴏsᴛ Exᴘʟᴏɪᴛᴀᴛɪᴏɴ Eɴᴜᴍᴇʀᴀᴛɪᴏɴ ᴛᴏᴏʟ>>  |
|   /   `.'  "  .  .-'    " ;      <<author : @34ZY>>                      |
|  ~     : .     .'          ;                                             |
|        `.   ' :     '   '  ;                                             |
|          )  _.". "     .  ";..                                           |
|        .'_.'   .'   '  __.,   `\                                         |
|       '"      ""''---'`    "''"`                                         |
----------------------------------------------------------------------------

This project can be updated sometimes ...

Tested on :

  • Windows 10 - 10.0.19044 N/A build 19044

Usage :

git clone https://github.com/34zY/Nerv0usR4bbit.git
cd Nerv0usR4bbit-main/
python3 Nerv0usR4bbit.py

Details :

  • R4bbit is dedicated to make basic enumeration process on Windows machines with ajustable sleep time avoiding EDR/XDR flags. Very practical when making lateral movements between machines in a penetration test or red teaming process.

Modules :

  • Choose number of delay time between differents process.
  • Check basic Active Directory configuration.
  • Download netcat on victim server.
  • Transfer payload from your C2 server to victim machine.
  • Open webserver on victim machine.
  • Display TCP|OPEN ports on the machine.
  • Check user privilege & user informations related to AD Groups / Organisation.
  • Check total informations about kernel & hardware of the tharget.
  • Check running process on the machine to find a way to get an privesc.
  • Checking local network status & other machines connected to.
  • Find and check connections between others machines on the network.
  • Check for juicy files containing passwords.
  • Checking network interface configuration.
  • Checking installed applications.