Skip to content
This repository has been archived by the owner on Apr 1, 2024. It is now read-only.

Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .

License

Whitecat18/Mavoc

Repository files navigation

Mavoc C2 Framework [ BETA RELEASE ]


Project Rewriting using 🦀

Visitors

Table of Context.

1. Introduction
2. How it Works
3. Attacking Linux
4. Attacking Windows
4. Powershell bible Hack

Introduction

Mavoc is an tool used to pentest Windows and Linux machine. This tool mainly Focuses on Pentesting Windows . Made with using C++, Powershell and the server made with Python and go . This tool is Easy to use and the payloads are modifiable for your Needs . This tool is mainly Focuses on Windows Pentesting, and Automated Various Scripts to attack windows based System and can be used to add own scripts for ctf , attacking , debugging etc .. depends upon your needs .

Tested at : KALI LINUX and UBUNTU

mavoc-intro.mp4

Please Visit Mavoc Documentation for complete tutorial and Video Demonstration

Installation

The Tool can be used to get reverse shell in 3 various methods . SSH-Kench aka using rev-ssh RSSH , Python and Low Func C++ (coming soon) .

For Kali Linux

git clone https://github.com/Whitecat18/Mavoc
cd Mavoc
bash install.sh 
./mavoc

For Ubuntu and Debian

git clone https://github.com/Whitecat18/Mavoc
cd Mavoc
bash install.sh 
sudo ./mavoc

On Mavoc tool . There will be 2 options . SSH Hack , Python-Exin and Low-Func.
For Now SSH-Kench and Python-Exin are avaiable.

Based on your Needs Select what you need.

What is the Different between SSH-Kench and Python-Exin ?

  • SSH-Kench is more stable , even when you disconnect or shut the server,and start the server with same settings means, the victim can connect again.
  • SSH-Kench is Well Suited to do Large Attacks and Good at stable connection.
  • Python-Exin is an Powershell Payload prompter that alters the pre-payload (ie) Modifies it . When pasting the prompt payload script on .ps console will leads to get the reverse shell.
  • Python-Exin is not Good for Stability and cant be used for large tasks and attack process .
  • Python-Exin is an Older Version of Villain tool . Which i used to modify and keep it for my personal use . Now i am adding to the Tool .

Working Methodology:

First You Will be Prompted to Enter into the shell . Based upon what you need . You can select depend upon your needs.

SSH-Kench

Blog After Entering ssh kench . Enter your local Ip addeess. eg:192.168.1.101

Entering yes ( y ) will start an server . For Now Lets continue with no ( n ) . Entering help command will display the avaiable cmds to execute . From There , lets start the server using start server command .

generate windows payload Alters and gives the powershell payload .

generate linux payload will give you the bash payload .

connect server command will open an mavoc-shell on an new tmux terminal.

After Executing the payload given by the mavoc . you will get an connection to the mavoc-shell . Here's the Demo Video.

Note : Mavoc Server supports tab completion . you can use it to connect machines using connect and by pressing tab key to autocomplete .

Attacking Linux

Open the ssh kench and generate the payload using generate linux payload. Execute in the Shell and exit .

exec the payload to linux shell and exit .


check the mavoc-shell and connect



Short Video Demo .

Please Visit Mavoc Documentation for more Demo Videos .

Attcking Windows.

So the main part begins 👿. Lets do it

generate windows payload and copy the payload and use your tricks and tips to deliver the payload.

Copy the powershell payload and execute in the victim machine.

After that check you server if you got an (RSSH) Reverse Shell connection . use ls command to check if it works and type and tab key to autocomplete the connection .



Tip: use Direct method or My Fav Part, use the Rubber Ducky or ATTINITY85 Digispark to execute the payload or bind the payload string to any know software or programs to os modules to exec it .   

Demo Video

Please Visit Mavoc Documentation for Demo Videos .

Using Powershell Bible.

Powershell bible consists of 20+ Advance attcking and Enumeration commands that will execute at mavoc-shell at tmux shell .

Some scripts are not added because it can be unfair to execute such scripts agaist user .The Scripts are in the Test Mode and will be added once its compactable with all windows Machines . Powershell bible is only For Windows Operating Systems .

Powershell bible is only For Windows Operating Systems . use ps bible to load powershell modules

after getting connection from the victim . Execute ps bible . Type help for more info .

Ps bible can be used to Deliver the powershell scripts to perform actions .

For Example if you need to see the installed Applications on victim pc . you can drop a powershell script . just type the list exe apps to list it .

Tip : There is an Nice Trick to get the admin shell by using get admin shell command .

Copy the above scirpt and paste in the mavoc-shell (ie) tmux shell . Executing this will send an UAC Access Permission ;)

If an Allows means . then you will get an (Admin reverse shell) 👿

This is an bit hard . cuz many people wont allow it . you can use the send msg box to send a social Engineer msges to victim ;) . ie i got one of my teacher's (Admin shell) like that ;)

you can check if you got an admin shell by executing check if admin on ps bible.


Demo Video ....

Please Visit Mavoc Documentation for Demo Videos .

How to Copy an text from Mavoc-Shell (ie) Tmux terminal !

For Step By Step Process . Please Visit this Blog where they Explain step by step Tmux Blog

Just an Referrence ...

  • Enter Copy Mode: Press Ctrl + b (the default tmux prefix) followed by [ to enter copy mode. This is similar to scrolling mode and allows you to navigate and select text.
  • Navigate and Select Text: Once you're in copy mode, you can use the arrow keys, Page Up, Page Down, and other navigation keys to move around and select the text you want to copy. To start selecting, move the cursor to the beginning of the text you want to copy.
  • Begin Selection: Press Space to start selecting text. Move the cursor to highlight the desired text.
  • Copy Text: After selecting the text, press Enter to copy the selected text to the clipboard.
  • Exit Copy Mode: Press q to exit copy mode. You'll be back in the normal tmux session.
  • Paste Text: You can now paste the copied text outside the tmux session using the usual paste command for your terminal emulator (usually Ctrl + Shift + v or right-click and select "Paste").

Updates

Rewriting in Rust 🦀