Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/werkamsus/lilith

Lilith, C++ Cybersecurity Research Project
https://github.com/werkamsus/lilith

administration cplusplus cybersecurity native security windows

Last synced: 1 day ago
JSON representation

Lilith, C++ Cybersecurity Research Project

Awesome Lists containing this project

README

        

# Lilith
[![Build status](https://ci.appveyor.com/api/projects/status/0au5goobwkwhvmgu?svg=true)](https://ci.appveyor.com/project/werkamsus/lilith) [![license](https://img.shields.io/github/license/mashape/apistatus.svg)](https://github.com/werkamsus/Lilith/blob/master/LICENSE)

**Free & Native Open Source C++ Remote Administration Tool for Windows**

Lilith is a console-based ultra light-weight RAT developed in C++. It features a straight-forward set of [commands](#commands) that allows for near complete control of a machine.

Disclaimer
---
The use of this software on any device that is not your own is highly discouraged. You need to obtain explicit permission from the owner if you intend to use Lilith in an alien environment, any illicit installation will likely be prosecuted by the jurisdiction the (ab)use occurs in.

Youtube
---
* [Video about the new Features](https://youtu.be/etk2dcx4mi8)
* [Comprehensive Feature Overview](https://youtu.be/86rPt8oAQK4)

Features
---
* Remote Command Execution via
* CMD
* Powershell
* **Any** other console app
* Keylogger **(new)** [16.09.2017]
* Execute predefined Scripts **(new)** [16.09.2017]
* Extreme Modularity (see [this](#modularity))
* Broadcast Commands to all Clients **(new)** [15.09.2017]
* Multiple Connections
* Auto-Install
* Startup Persistence
* Self-Erases
* DNS Resolving
* Low Latency & Bandwith use
* Error-Handler with logs

Modularity
---
The modularity and expandability of this RAT are what it's been built on. That's how it manages to stay very compact, light-weight and fast. You can download other utilities like password recovery or keylogging tools via Powershell scripts (link to some useful scripts will follow soon) and then execute them as if they were running on your own machine. Afterwards you're able to upload the results (also with a ps script) or evaluate them on the spot (via the `type` command) in cmd.

Commands
---
|Command|Syntax|Comment|
|-------|------|---------|
|connect|`connect ` (`connect 0`)|Connects to a Client|
|exitSession|`exitSession`|Exits current session|
|switchSession|`switchSession ` (`switchSession 2`)|Switches to another Client|
|broadcast|`broadcast`|Broadcasts your commands to all clients|
|keydump|`keydump`|Dumps Keylog File|
|script|`script ` (`script keydump keylog.txt`)|Executes a predefined Script|
|listClients|`listClients`|Displays the number of clients connected|
|remoteControl|`remoteControl ` OR `remoteControl cmd`|[More Info](#remotecontrol)|
|remoteControl|`remoteControl`|Exits remoteControl if already in remoteControl|
|restart|`restart`|Restarts the Client|
|kill|`kill`|Quits the Client|

![Demo Image](/images/demo.png)

General Description
---
At the core of this RAT lies it's unique ability to remotely execute commands via CMD, Powershell and almost all console-based applications. It has the capabilities to automatically install on startup and clean up behind itself. It also features an error-handler that logs any issues. As of now, it is not 100% stable. Under 'normal' conditions it runs smoothly and without any disturbances, but severe irregularities in input (i.e. messing around with it *a lot*) may cause crashes. This will be resolved in the near future.

Requirements
---
* None!
* Supported Operating Systems (32/64-bit)
* Windows XP SP3
* Windows Server 2003
* Windows Vista
* Windows Server 2008
* Windows 7
* Windows Server 2012
* Windows 8/8.1
* Windows 10

[To-Do](https://github.com/werkamsus/lilith/blob/master/todo.md)
---

# More Info on Commands

remoteControl
---
Shortcuts are: `cmd`, `pws`, `pws32` which stand for Command Prompt, Powershell and Powershell 32-Bit respectively. You can use these instead of a full path to the executable. Example: `remoteControl pws` will remote-control `C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe`.