Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/coalfire-research/deathmetal
Red team & penetration testing tools to exploit the capabilities of Intel AMT
https://github.com/coalfire-research/deathmetal
Last synced: about 17 hours ago
JSON representation
Red team & penetration testing tools to exploit the capabilities of Intel AMT
- Host: GitHub
- URL: https://github.com/coalfire-research/deathmetal
- Owner: Coalfire-Research
- License: other
- Created: 2019-03-07T20:38:53.000Z (over 5 years ago)
- Default Branch: main
- Last Pushed: 2021-04-06T23:11:49.000Z (over 3 years ago)
- Last Synced: 2024-08-07T06:05:44.766Z (3 months ago)
- Language: Python
- Homepage:
- Size: 22.5 KB
- Stars: 255
- Watchers: 18
- Forks: 34
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# DeathMetal
"We are here to make ~~coffee~~ APT metal. We will make everything metal. Blacker than the blackest black times infinity."
DeathMetal is a suite of tools that interact with Intel AMT. Its kind of a foray into a world filled with intrigue and reversing puzzles with useful results.
Since this is super serious, tools are named after Metalocalypse characters.
Tools are prefixed with "dm_" to help with tab-completion and recognition.
* dm_pickles - Duckyscript interpreter that communicates over AMT KVM (vnc) and injects keystrokes.
* dm_toki - IDE-R implementation - lets you attach floopy and CD images remotely to the target computer.
* dm_nathan - Is a cli that allows for configuring AMT via authenticated channel
* dm_rockso - Presence and version scanner, can help you find AMT capable systems regardless of provisioning status. (works even if explicitly not-enabled)Code that is common to more than one tool lives in a library called 'Charles', at the moment it can pretty much just help set up Redirection service stuff.
## Getting Started
You may want to run in a virtual env and install any dependencies that come up - the code is in python3.
### Prerequisites
Python3 and pip
### Installing
PIP
```
First, I would make a virtual python3 environment and activate it.
pip install git+https://github.com/Coalfire-Research/DeathMetal.git
```## Built With
* Python3 default libs
* hexdump for debugging
* requests for http.## Contributing
Submit a pull request, or talk to me or something.## Authors
* **Victor Teissler** - *Initial work* - [Victor Teissler](https://github.com/Victor-Teissler)
See also the list of [contributors](https://github.com/Coalfire-Research/DeathMetal/contributors) who participated in this project.
## License
This project is licensed under a modified MIT License - see the [LICENSE](LICENSE) file for details
## Acknowledgments
* Jimmy Twotimes for pointing me at the scanning capabilities - this became rockso, thanks man!
* Clutchisback for the beef hooks and help with the blog post - greatly appreciated.
* Soen knows what he did.
* Coalfire for the opportunity