Skip to content

vysecurity/ClickOnceGenerator

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ClickOnceGenerator

Quick Malicious ClickOnceGenerator for Red Team. The default application a simple WebBrowser widget that point to a website of your choice.

Usage

$ python ClickOnceGenerator.py --help


ClickOnceGenerator | Mr.Un1k0d3r RingZer0 Team
usage: ClickOnceGenerator.py [-h] [--config CONFIG] [--out OUT]
                             [--override [OVERRIDE]]

ClickOnceGenerator Options.

optional arguments:
  -h, --help            show this help message and exit
  --config CONFIG       Path to the JSON config file.
  --out OUT             Output solution name.
  --override [OVERRIDE]
                        Delete destination if exists

config.json example. The shellcode payload.bin need to be the RAW format of your shellcode.

{
        "title": "My Evil ClickOnce",
        "url": "http://ringzer0team.com/",
        "shellcode": "payload.bin",
        "process_name": "iexplore"
}
  • title is the title of the ClickOnce Application
  • url url used by the WebBrowser widget
  • shellcode the payload you want to execute while the application is launched
  • process_name used to evade sandbox by checking if a specific process is running. (default to iexplore)

Credit

Mr.Un1k0d3r RingZer0 Team

About

Quick Malicious ClickOnceGenerator for Red Team

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 56.9%
  • C# 43.1%