Exploit Payload Reverse Shell Windows

CHAOS – Allow Generate Payloads and Control Remote Windows Systems.

CHAOS allow generate payloads and control remote Windows systems.

Disclaimer:

📚 This project was created only for learning purpose.

THIS SOFTWARE IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.

Features:

  • Reverse Shell
  • Download File
  • Upload File
  • Screenshot 🆕
  • Keylogger 🆕
  • Persistence
  • Open URL Remotely
  • Get Operating System Name
  • Run Fork Bomb

Tested On Kali) Kali Linux – ROLLING EDITION

How To Use:

1. Install dependencies (You need Golang and UPX package installed)

$ apt install golang xterm git upx-ucl -y

2. Clone this repository

$ git clone https://github.com/tiagorlampert/CHAOS.git

3. Get and install external imports (requirement to screenshot)

$ go get github.com/kbinani/screenshot && go get github.com/lxn/win
$ go install github.com/kbinani/screenshot && go install github.com/lxn/win

4. Maybe you will see the message “package github.com/lxn/win: build constraints exclude all Go files”.
It’s occurs because the libraries are to windows systems, but it necessary to build the payload.
Go into the repository

$ cd CHAOS

5. Run

$ go run CHAOS.go

 

Video Demo:

 

Download at Github

Post Comment