Jump to content

doopliss

Members
  • Posts

    1
  • Joined

  • Last visited

Everything posted by doopliss

  1. doopliss

    Pyblade

    I don't know how alive this project still is, but I did some work on it so I guess I might as well post it... I used the old, stable source from the first post rather than the newest source that sablefoxx dumped. It should have all of the features in the OP, plus the features listed below. Added features: -The system info log now shows the target's public IP address, and gets it from 5 different sources for redundancy's sake. Should be useful for accessing that FTP backdoor -Browser passwords can all be saved in one file, one file per browser, or both -Dumps the saved cache for IE, Chrome, and Firefox -Dumps the saved cookies of Chrome, Firefox, and Flash (couldn't get IE working) -Dumps the saved history for Chrome and Firefox in addition to IE -Dumps passwords saved in popular mail clients -Dumps password to access the victim's router (unfortunately only works on a small set of routers) -Modified U3 support: The drive now executes FBex without launching the U3 launchpad, making it stealthier Known issues: -PWDump is the only bit of the program that isn't working on on 64 bit systems -IE Cookie Viewer doesn't save I could not for the life of me figure out how to get PWDump working. I used sablefoxx's original code, it didn't work. I rewrote it, it didn't work. I don't know what to do. Here's an odd little note, tough: whenever I compiled bex.exe using py2exe on a 64-bit system, PWDump DID work on 64-bit systems, but the entire EXE wouldn't execute on any 32-bit system ("Not a valid Win32 application" error). Whenever I compiled the .exe on a 32-bit system, all of the .exe worked on 32-bit systems, and most of it worked on 64-bit systems, but not PWDump. For now, I just disabled PWDump in the configuration file by default (you can turn it on if you know the target is running 32-bit). It could have something to do with using an out-of-date version of PWDump, but I'm too frustrated with it by now to care... Apparently this wasn't an issue for others using sablefoxx's code, so maybe it's just me... Here is the modified U3 launcher, using Universal Customizer (Windows XP only): http://www.mediafire.com/?v82c88r8bc68i8y Just extract the files, click the Universal Customizer application, and follow the instructions, the .iso should've already been made. For those of you who can't run the above because you don't have XP, here is the .iso by itself: http://www.mediafire.com/?m2rc6158y2dxryt It needs to be burned to the virtual optical drive of your U3 device. Here is the blade, just extract to the root of the flash drive: http://www.mediafire.com/?2sogp1cy7lzt824 And finally, here's the source: http://www.mediafire.com/?z6d4c116i75cn3p Does anyone know any open source keyloggers that send the logs to an FTP server? I included a keylogger in my blade, but I couldn't upload that version because the one I used is commercial. If there was a good open source one, that'd be a cool thing to add. *Fwew!* Well, that certainly was a fun exercise in learning Python. Thank you for uploading the source, sablefoxx ^_^
×
×
  • Create New...