myauxiliary rb online with Winfy

We have hosted the application myauxiliary rb in order to run this application in our online workstations with Wine or directly.


Quick description about myauxiliary rb:

This auxiliary module needs [metasploit] framework installed.
This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script,
so we need to exploit a target first in order to use it.

Affected platforms:
Windows OS
(all versions above windows vista)

Read my WIKI for further info:
https: //sourceforge.net/p/myauxiliarymete/wiki/Home/

Features:
  • SESSION => the session to run the module on
  • CLEAR => clean IDS event logfiles on target host
  • GETPRIVS => elevate meterpreter to AUTHORITY/SYSTEM
  • APPL => enumerate intalled applications
  • LOGIN => enumerate Recently logged on users
  • HOST => dump hostfile of taget machine to loot folder
  • HOSTFILE => add entrys to target hostfile <ip-add> <domain>
  • DELHOST => revert target hostfile to default settings
  • MSG => display message in target desktop
  • EXECUTE => execute an arbitary cmd command on target host
  • LABEL => rename the c: harddrive display name
  • UACSET => check if UAC is enabled and is level running
  • UACBYPASS => bypass UAC setting using regedit
  • SETCH => backdoor setch.exe on target system
  • extra module includes:
  • root3.rb => ruby script to execute a list of cmd commands on target host


Audience: Other Audience, Security Professionals, Security.
User interface: Gnome, KDE.
Programming Language: Ruby.

.

©2024. Winfy. All Rights Reserved.

By OD Group OU – Registry code: 1609791 -VAT number: EE102345621.