00f8bc37bf1ce5cd4622bed4551421959232ec66
It runs, but some further testing in different environments is needed
mando.me
This tool is under development, but feel free to use it and improve it as you like. contribution is appreciated...
Since smplshllctrlr a lot has happened:
- Automated exploit-injection via POST or GET (eg. ./mando.me.py --cookie "security=low;PHPSESSID=DEADBEEFDEADBEEFDEADBEEFDEADBEEF" --url "http://metasploitable:2280/dvwa/vulnerabilities/exec/" --post "{'submit':'','ip':_INJECT_}")
- Encrypted agent communication
- Meterpreter/Reverse Shell Injection
- A more user friendly UI
- Built in post exlpoitation tools (enumeration, privilege escalation etc.)
- And much more...
DISCLAIMER:
You shall not misuse this tool to gain unauthorized access. This tool should only be used to expand knowledge, and not for causing malicious or damaging attacks. Performing any attacks without written permission from the owner of the system is illegal.
Description
Languages
Python
100%