Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/werkamsus/lilith
Lilith, C++ Cybersecurity Research Project
https://github.com/werkamsus/lilith
administration cplusplus cybersecurity native security windows
Last synced: 1 day ago
JSON representation
Lilith, C++ Cybersecurity Research Project
- Host: GitHub
- URL: https://github.com/werkamsus/lilith
- Owner: werkamsus
- License: mit
- Created: 2017-06-25T14:37:27.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2020-04-01T11:47:14.000Z (over 4 years ago)
- Last Synced: 2024-12-24T14:46:03.448Z (4 days ago)
- Topics: administration, cplusplus, cybersecurity, native, security, windows
- Language: C++
- Homepage: https://nick.sl
- Size: 193 KB
- Stars: 720
- Watchers: 53
- Forks: 207
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
README
# Lilith
[![Build status](https://ci.appveyor.com/api/projects/status/0au5goobwkwhvmgu?svg=true)](https://ci.appveyor.com/project/werkamsus/lilith) [![license](https://img.shields.io/github/license/mashape/apistatus.svg)](https://github.com/werkamsus/Lilith/blob/master/LICENSE)**Free & Native Open Source C++ Remote Administration Tool for Windows**
Lilith is a console-based ultra light-weight RAT developed in C++. It features a straight-forward set of [commands](#commands) that allows for near complete control of a machine.
Disclaimer
---
The use of this software on any device that is not your own is highly discouraged. You need to obtain explicit permission from the owner if you intend to use Lilith in an alien environment, any illicit installation will likely be prosecuted by the jurisdiction the (ab)use occurs in.Youtube
---
* [Video about the new Features](https://youtu.be/etk2dcx4mi8)
* [Comprehensive Feature Overview](https://youtu.be/86rPt8oAQK4)Features
---
* Remote Command Execution via
* CMD
* Powershell
* **Any** other console app
* Keylogger **(new)** [16.09.2017]
* Execute predefined Scripts **(new)** [16.09.2017]
* Extreme Modularity (see [this](#modularity))
* Broadcast Commands to all Clients **(new)** [15.09.2017]
* Multiple Connections
* Auto-Install
* Startup Persistence
* Self-Erases
* DNS Resolving
* Low Latency & Bandwith use
* Error-Handler with logsModularity
---
The modularity and expandability of this RAT are what it's been built on. That's how it manages to stay very compact, light-weight and fast. You can download other utilities like password recovery or keylogging tools via Powershell scripts (link to some useful scripts will follow soon) and then execute them as if they were running on your own machine. Afterwards you're able to upload the results (also with a ps script) or evaluate them on the spot (via the `type` command) in cmd.Commands
---
|Command|Syntax|Comment|
|-------|------|---------|
|connect|`connect ` (`connect 0`)|Connects to a Client|
|exitSession|`exitSession`|Exits current session|
|switchSession|`switchSession ` (`switchSession 2`)|Switches to another Client|
|broadcast|`broadcast`|Broadcasts your commands to all clients|
|keydump|`keydump`|Dumps Keylog File|
|script|`script ` (`script keydump keylog.txt`)|Executes a predefined Script|
|listClients|`listClients`|Displays the number of clients connected|
|remoteControl|`remoteControl ` OR `remoteControl cmd`|[More Info](#remotecontrol)|
|remoteControl|`remoteControl`|Exits remoteControl if already in remoteControl|
|restart|`restart`|Restarts the Client|
|kill|`kill`|Quits the Client|![Demo Image](/images/demo.png)
General Description
---
At the core of this RAT lies it's unique ability to remotely execute commands via CMD, Powershell and almost all console-based applications. It has the capabilities to automatically install on startup and clean up behind itself. It also features an error-handler that logs any issues. As of now, it is not 100% stable. Under 'normal' conditions it runs smoothly and without any disturbances, but severe irregularities in input (i.e. messing around with it *a lot*) may cause crashes. This will be resolved in the near future.Requirements
---
* None!
* Supported Operating Systems (32/64-bit)
* Windows XP SP3
* Windows Server 2003
* Windows Vista
* Windows Server 2008
* Windows 7
* Windows Server 2012
* Windows 8/8.1
* Windows 10[To-Do](https://github.com/werkamsus/lilith/blob/master/todo.md)
---# More Info on Commands
remoteControl
---
Shortcuts are: `cmd`, `pws`, `pws32` which stand for Command Prompt, Powershell and Powershell 32-Bit respectively. You can use these instead of a full path to the executable. Example: `remoteControl pws` will remote-control `C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe`.