Releases: RuoJi6/CACM
v2.0版本 - 中英文
- suid权限维持。
- feat(historydel): 新增bash历史记录管理工具,支持反取证和敏感信息检测
- feat: 添加禁用 shell历史记录的提示
- feat(commands): 添加 SSH 监控命令
- feat(transfer): 支持多个文件分享服务提供商
- feat(xbounce): 增加防火墙规则自动检测功能 #9
- feat(portmux): 添加端口复用功能
- feat: 中文英文版本
- refactor(bin): 优化输出目录的创建和显示逻辑
- fix(terminal): 优化 Ctrl+D 退出交互模式
- fix(bin): 优化二进制文件下载流程
- feat(hide): 优化隐藏进程方法并添加伪装技术 #11
- feat(scan): 增加智能 HTTP 检测和指纹识别功能,识别重定向状态码
- feat(ssh_backdoor): 添加 SSH 后门工具

修复scan扫描
CACM_v1.1 破坏性更新
CACM_v1.0
📦 包含文件
版本说明:
wfind - Find writeable directories (ATT&CK: T1083)
ctime - Set ctime to file's mtime (requires root) [find . -ctime -1] (ATT&CK: T1070.006)
xghostip - Use a non-existing IP address (Ghost-IP) for network operations (ATT&CK: T1090.003)
notime - Execute a command at the <file>'s mtime (requires root) (ATT&CK: T1070.006)
scan - Advanced port scanner with service detection [fscan-inspired] (ATT&CK: T1046)
xbounce - Forward TCP traffic to destination host (TCP proxy) (ATT&CK: T1090.001)
xlog - Remove lines containing specified pattern from file or clear systemd journal (ATT&CK: T1070.003)
dns - Resolve domain name to IPv4 (ATT&CK: T1590.005)
hgrep - Grep for pattern, output for humans [hgrep password] (ATT&CK: T1083)
hide - Hide a process (ATT&CK: T1055)
xscp - Silently transfer files using SCP with stealth features (ATT&CK: T1021.004)
memexec - Start binary in memory [xhelp memexec] (ATT&CK: T1055)
xpty - Show all terminals / logged in users [hackshell-inspired] (ATT&CK: T1033)
find_subdomains - Search files for sub-domain (ATT&CK: T1083)
transfer - Upload a file or directory to file sharing service (bashupload.com, transfer.sh, oshi.at) (ATT&CK: T1041)
rdns - Reverse DNS from multiple public databases (ATT&CK: T1590.005)
ws - WhatServer - display server's essentials [hackshell-inspired] (ATT&CK: T1082)
xssh - Silently log in to remote host with stealth features (ATT&CK: T1021.004)
xtmux - Hidden tmux sessions (won't show with 'tmux list-sessions') (ATT&CK: T1564.001)
bin - Download useful static binaries [hackshell-inspired] (ATT&CK: T1105)
dl - Request URL using one of curl/wget/python/perl/openssl or native Go HTTP client (ATT&CK: T1071.001)
shred - Securely delete a file by overwriting with random data (ATT&CK: T1070.004)
sub - Query crt.sh/ip-thc for all sub-domains (ATT&CK: T1590.005)
xhome - Create hidden temporary HOME directory [hackshell-inspired] (ATT&CK: T1564.001)
xsu - Switch user and execute commands (ATT&CK: T1134.001)
edr - Detect EDR/AV security products [hackshell-inspired] (ATT&CK: T1518.001)
enc - Encrypt file or stdin/stdout using AES-256-GCM [HS_TOKEN=<secret>] (ATT&CK: T1027)
loot - Display common secrets and credentials [hackshell-inspired] (ATT&CK: T1552.001)
lpe - Run linPEAS/winPEAS for privilege escalation detection [hackshell-inspired] (ATT&CK: T1068)
notime_cp - Copy file. Keep birth-time, ctime, mtime & atime (requires root for full functionality) (ATT&CK: T1070.006)
np - Advanced secret scanner with Chinese support [try |less -R] (ATT&CK: T1552.001)
tit - Sniff/strace the User Input - Monitor process read/write system calls (ATT&CK: T1056.001)
common - Common useful commands (lt, ltr, lss, lssr, psg, lsg) [hackshell-inspired] (ATT&CK: T1083)
dec - Decrypt file or stdin/stdout using AES-256-GCM [HS_TOKEN=<secret>] (ATT&CK: T1027)权限维持工具版本 (CACM_tools)
CACM_tools_arm64- ARM64架构原版CACM_tools_amd64- AMD64架构原版CACM_tools_arm64_upx- ARM64架构UPX压缩版CACM_tools_amd64_upx- AMD64架构UPX压缩版CACM_tools_arm64_stealth- ARM64架构隐蔽版(去UPX特征)CACM_tools_amd64_stealth- AMD64架构隐蔽版(去UPX特征)
权限维持普通版本 (CACM_normal)
CACM_normal_arm64- ARM64架构原版CACM_normal_amd64- AMD64架构原版CACM_normal_arm64_upx- ARM64架构UPX压缩版CACM_normal_amd64_upx- AMD64架构UPX压缩版CACM_normal_arm64_stealth- ARM64架构隐蔽版(去UPX特征)CACM_normal_amd64_stealth- AMD64架构隐蔽版(去UPX特征)
💡 使用说明
- 原版文件: 适合正常使用和调试,体积较大但兼容性最好
- UPX压缩版: 体积更小,适合网络传输,但可能被某些安全软件检测
- 隐蔽版本: 去除了UPX特征,增强隐蔽性,适合绕过检测
⚠️ 免责声明
本工具仅供安全研究和教育目的使用,请勿用于非法用途。使用者需自行承担相关责任。
HackerPermKeeper_T00ls_v7.0
HackerPermKeeper_v6.0
1、Suid shell bash权限维持
2、重写生成代码(连续生成)
3、添加不记录历史命令临时操作,同时可以批量删除指定的.bash_history文件中的历史记录
4、修改检查脚本(添加检查环境)
5、使用tabulate模块进行格式化输出
HackerPermKeeper_v5.0
1、检测docker,k8s环境
2、检测docker逃逸,特权逃逸,Docker Socket逃逸,docker procfs逃逸[以后会添加针对k8s横向以及逃逸]
3、别名权限维持文件不存在bug修复
4、修复检测脚本bug
HackerPermKeeper_v4.0
修改ssh密钥以及添加用户中重新运行时候,检测是否加锁解锁操作
优化内容输出
HackerPermKeeper_v3.0
1、php web权限维持马[首页马,加密马内存马,不死马]
2、模块配合使用[添加用户加计划任务,ssh密钥加计划任务]
3、在计划任务配合使用的时候,发现还需要判断文件有没有加锁
4、添加用户,\etc\passwd加锁
5、修改检测脚本[check.py]精测更加准确
6、修复key计划任务[检测错误]
7、修复key密钥文件加锁
HackerPermKeeper_v2.0
2.0
1、利用成功之后删除文件
2、命令配合使用[软链接+计划任务]
3、判断当前系统有没有python环境
4、使用ssh密钥的时候,在对方服务器生成的时候,生成完成之后,删除文件id_ed25519.pub和id_ed25519
5、设置全局环境变量不记录空格命令[history]
6、修改在不同环境下,main.py运行bug
7、修复计划任务,在反弹shell的时候,出现的python版本问题
8、ssh密钥权限维持模块,bug修复,如果是出现不是root,权限也可以成功
9、修复check.py脚本检测普通用户权限

