Skip to content

I-AtA-I/Mole-2.0

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

133 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ascii-art-image(2)

Disclaimer:

This project is provided for educational and research purposes only. I do not encourage or condone any misuse, illegal activity, or unethical behavior. By using this software, you agree that you are solely responsible for your actions and any consequences that may result. The author assumes no liability for damage, loss, or misuse of this project.

What is this tool?:

mole is a CLI multi-use .py payload for Windows system exploiting... It is a tunnelmaker like tool that can help you in exploiting a system and retrieving vulnerable information from the target machine.

Warning!:

!!!On attacker side you need to allow "GatewayPorts" (GatewayPorts yes) and "AllowTcpForwarding" (AllowTcpForwarding yes) in etc/ssh/sshd_config!!!

Steps:

  1. Download the files on your attacker computer
  2. run everything in the 'attacker' folder on your attacking machine
  3. Put everything on a flashdisk you will be using to plug into the target computer
  4. use "USB autorun" program to turn the flashdisk into an injectible USB and select "setup.bat" as the injectible file
  5. plug the flash disk into the target computer

About

Windows CLI exploitation/payload injecting .py program.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors