Skip to content

Releases: RuoJi6/CACM

v2.0版本 - 中英文

13 Aug 01:42
cad4968

Choose a tag to compare

  1. suid权限维持。
  2. feat(historydel): 新增bash历史记录管理工具,支持反取证和敏感信息检测
  3. feat: 添加禁用 shell历史记录的提示
  4. feat(commands): 添加 SSH 监控命令
  5. feat(transfer): 支持多个文件分享服务提供商
  6. feat(xbounce): 增加防火墙规则自动检测功能 #9
  7. feat(portmux): 添加端口复用功能
  8. feat: 中文英文版本
  9. refactor(bin): 优化输出目录的创建和显示逻辑
  10. fix(terminal): 优化 Ctrl+D 退出交互模式
  11. fix(bin): 优化二进制文件下载流程
  12. feat(hide): 优化隐藏进程方法并添加伪装技术 #11
  13. feat(scan): 增加智能 HTTP 检测和指纹识别功能,识别重定向状态码
  14. feat(ssh_backdoor): 添加 SSH 后门工具
image image image image

修复scan扫描

01 Aug 11:58
cad4968

Choose a tag to compare

  1. 修改scan修改扫描模式(新增ping检测) fscan
  2. 使用gogo指纹作为服务识别指纹 gogo - fingers
image

CACM_v1.1 破坏性更新

31 Jul 16:31
cad4968

Choose a tag to compare

CACM_v1.1 破坏性更新

  1. 修复文件下载功能:--output 和 --mirror 参数问题 #8
  2. 修复 memexec 下载无法中断的问题
  3. 修复 lpe 使用国内镜像下载的问题 #7
  4. 修复 ctrl+c 退出行为错误问题 #6
  5. 修复 xtmux 执行时不显示帮助信息的问题
  6. 新增 vagent bin 下载支持 #4
  7. 修复文件下载错误问题

CACM_v1.0

28 Jul 07:50
430571a

Choose a tag to compare

📦 包含文件

版本说明:

  wfind        - Find writeable directories (ATT&CK: T1083)
  ctime        - Set ctime to file's mtime (requires root) [find . -ctime -1] (ATT&CK: T1070.006)
  xghostip     - Use a non-existing IP address (Ghost-IP) for network operations (ATT&CK: T1090.003)
  notime       - Execute a command at the <file>'s mtime (requires root) (ATT&CK: T1070.006)
  scan         - Advanced port scanner with service detection [fscan-inspired] (ATT&CK: T1046)
  xbounce      - Forward TCP traffic to destination host (TCP proxy) (ATT&CK: T1090.001)
  xlog         - Remove lines containing specified pattern from file or clear systemd journal (ATT&CK: T1070.003)
  dns          - Resolve domain name to IPv4 (ATT&CK: T1590.005)
  hgrep        - Grep for pattern, output for humans [hgrep password] (ATT&CK: T1083)
  hide         - Hide a process (ATT&CK: T1055)
  xscp         - Silently transfer files using SCP with stealth features (ATT&CK: T1021.004)
  memexec      - Start binary in memory [xhelp memexec] (ATT&CK: T1055)
  xpty         - Show all terminals / logged in users [hackshell-inspired] (ATT&CK: T1033)
  find_subdomains - Search files for sub-domain (ATT&CK: T1083)
  transfer     - Upload a file or directory to file sharing service (bashupload.com, transfer.sh, oshi.at) (ATT&CK: T1041)
  rdns         - Reverse DNS from multiple public databases (ATT&CK: T1590.005)
  ws           - WhatServer - display server's essentials [hackshell-inspired] (ATT&CK: T1082)
  xssh         - Silently log in to remote host with stealth features (ATT&CK: T1021.004)
  xtmux        - Hidden tmux sessions (won't show with 'tmux list-sessions') (ATT&CK: T1564.001)
  bin          - Download useful static binaries [hackshell-inspired] (ATT&CK: T1105)
  dl           - Request URL using one of curl/wget/python/perl/openssl or native Go HTTP client (ATT&CK: T1071.001)
  shred        - Securely delete a file by overwriting with random data (ATT&CK: T1070.004)
  sub          - Query crt.sh/ip-thc for all sub-domains (ATT&CK: T1590.005)
  xhome        - Create hidden temporary HOME directory [hackshell-inspired] (ATT&CK: T1564.001)
  xsu          - Switch user and execute commands (ATT&CK: T1134.001)
  edr          - Detect EDR/AV security products [hackshell-inspired] (ATT&CK: T1518.001)
  enc          - Encrypt file or stdin/stdout using AES-256-GCM [HS_TOKEN=<secret>] (ATT&CK: T1027)
  loot         - Display common secrets and credentials [hackshell-inspired] (ATT&CK: T1552.001)
  lpe          - Run linPEAS/winPEAS for privilege escalation detection [hackshell-inspired] (ATT&CK: T1068)
  notime_cp    - Copy file. Keep birth-time, ctime, mtime & atime (requires root for full functionality) (ATT&CK: T1070.006)
  np           - Advanced secret scanner with Chinese support [try |less -R] (ATT&CK: T1552.001)
  tit          - Sniff/strace the User Input - Monitor process read/write system calls (ATT&CK: T1056.001)
  common       - Common useful commands (lt, ltr, lss, lssr, psg, lsg) [hackshell-inspired] (ATT&CK: T1083)
  dec          - Decrypt file or stdin/stdout using AES-256-GCM [HS_TOKEN=<secret>] (ATT&CK: T1027)

权限维持工具版本 (CACM_tools)

  • CACM_tools_arm64 - ARM64架构原版
  • CACM_tools_amd64 - AMD64架构原版
  • CACM_tools_arm64_upx - ARM64架构UPX压缩版
  • CACM_tools_amd64_upx - AMD64架构UPX压缩版
  • CACM_tools_arm64_stealth - ARM64架构隐蔽版(去UPX特征)
  • CACM_tools_amd64_stealth - AMD64架构隐蔽版(去UPX特征)

权限维持普通版本 (CACM_normal)

  • CACM_normal_arm64 - ARM64架构原版
  • CACM_normal_amd64 - AMD64架构原版
  • CACM_normal_arm64_upx - ARM64架构UPX压缩版
  • CACM_normal_amd64_upx - AMD64架构UPX压缩版
  • CACM_normal_arm64_stealth - ARM64架构隐蔽版(去UPX特征)
  • CACM_normal_amd64_stealth - AMD64架构隐蔽版(去UPX特征)

💡 使用说明

  1. 原版文件: 适合正常使用和调试,体积较大但兼容性最好
  2. UPX压缩版: 体积更小,适合网络传输,但可能被某些安全软件检测
  3. 隐蔽版本: 去除了UPX特征,增强隐蔽性,适合绕过检测

⚠️ 免责声明

本工具仅供安全研究和教育目的使用,请勿用于非法用途。使用者需自行承担相关责任。

HackerPermKeeper_T00ls_v7.0

05 Mar 06:37
a495ad0

Choose a tag to compare

1、Suid shell bash检测判断
2、重写生成代码(优化商城模块)
3、BT后渗透脚本编写
    A. BT linux面板后渗透编写[详情查看思维导图]

BT渗透

HackerPermKeeper_v6.0

29 Oct 10:13
ddde8b4

Choose a tag to compare

1、Suid shell bash权限维持
2、重写生成代码(连续生成)
3、添加不记录历史命令临时操作,同时可以批量删除指定的.bash_history文件中的历史记录
4、修改检查脚本(添加检查环境)
5、使用tabulate模块进行格式化输出

HackerPermKeeper_v5.0

28 Oct 06:46
0961963

Choose a tag to compare

1、检测docker,k8s环境
2、检测docker逃逸,特权逃逸,Docker Socket逃逸,docker procfs逃逸[以后会添加针对k8s横向以及逃逸]
3、别名权限维持文件不存在bug修复
4、修复检测脚本bug

HackerPermKeeper_v4.0

25 Sep 05:24
c5bbb2a

Choose a tag to compare

修改ssh密钥以及添加用户中重新运行时候,检测是否加锁解锁操作
优化内容输出

HackerPermKeeper_v3.0

26 Aug 04:46
93f91ce

Choose a tag to compare

1、php web权限维持马[首页马,加密马内存马,不死马]
2、模块配合使用[添加用户加计划任务,ssh密钥加计划任务]
3、在计划任务配合使用的时候,发现还需要判断文件有没有加锁
4、添加用户,\etc\passwd加锁
5、修改检测脚本[check.py]精测更加准确
6、修复key计划任务[检测错误]
7、修复key密钥文件加锁

HackerPermKeeper_v2.0

28 Jul 07:24
ab04332

Choose a tag to compare

2.0
1、利用成功之后删除文件
2、命令配合使用[软链接+计划任务]
3、判断当前系统有没有python环境
4、使用ssh密钥的时候,在对方服务器生成的时候,生成完成之后,删除文件id_ed25519.pub和id_ed25519
5、设置全局环境变量不记录空格命令[history]
6、修改在不同环境下,main.py运行bug
7、修复计划任务,在反弹shell的时候,出现的python版本问题
8、ssh密钥权限维持模块,bug修复,如果是出现不是root,权限也可以成功
9、修复check.py脚本检测普通用户权限