Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/safebuffer/LightMe
HTTP Server serving obfuscated Powershell Scripts/Payloads
https://github.com/safebuffer/LightMe
amsi amsi-evasion penetration-testing redteam-infrastructure
Last synced: 21 days ago
JSON representation
HTTP Server serving obfuscated Powershell Scripts/Payloads
- Host: GitHub
- URL: https://github.com/safebuffer/LightMe
- Owner: safebuffer
- Created: 2021-07-03T21:47:39.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-07-03T21:48:47.000Z (over 3 years ago)
- Last Synced: 2024-08-09T21:11:21.897Z (4 months ago)
- Topics: amsi, amsi-evasion, penetration-testing, redteam-infrastructure
- Language: PowerShell
- Homepage:
- Size: 352 KB
- Stars: 92
- Watchers: 4
- Forks: 17
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - safebuffer/LightMe - HTTP Server serving obfuscated Powershell Scripts/Payloads (PowerShell)
README
LightMe
LightMe is a Simple HTTP Server serving Powershell Scripts/Payloads after Obfuscate them
and run obfuscation as a service in backgroud in order to keep obfuscate the payloads
which giving almost new obfuscated payload on each HTTP request
### Main Features
- Obfuscate all powershell files within a specific directory
- HTTP Server to serve the obfuscated Powershell Files
- Background Obfuscator
- Almost new Payload on each request , (depanding on ```Background obfuscation interval```)
- Powered by [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation)### Install
```shell
git clone --recurse-submodules https://github.com/WazeHell/LightMe
cd LightMe/# install powershell
sudo apt-get install powershell
```### Using
```shell
python3 lightme.py --help
```### Running as services
```
#install supervisor
sudo apt-get install supervisorsudo vim /etc/supervisor/conf.d/lightme.conf
# edit the config
[program:lightme_server]
directory=/lightme_path/
command=/usr/bin/python3 lightme.py -path /PowerSploitOrWhatever/
numprocs=1
user=yourusername
autostart=true
autorestart=true
stdout_logfile=/lightme_path/lightme_std.log
stderr_logfile=/lightme_path/lightme_stderr.log
redirect_stderr=true
priority=999
stdout_logfile_maxbytes=5MB
stderr_logfile_maxbytes=5MB
environment=LANG=en_US.UTF-8,LC_ALL=en_US.UTF-8# Run
sudo service supervisor restart
sudo supervisorctl reread
sudo supervisorctl update
sudo supervisorctl restart all
```