Skip to content

Latest commit

 

History

History
96 lines (78 loc) · 4.36 KB

README.md

File metadata and controls

96 lines (78 loc) · 4.36 KB

One-Lin3r Python 3.5 Python 2.7 Core Database

One-Lin3r is simple and light-weight framework inspired by the web-delivery module in Metasploit.

asciicast

It consists of various one-liners that aids in penetration testing operations:

  • Reverser - give it IP & port and it returns a reverse-shell liner ready to copy-&-paste.
  • Dropper - give it an uploaded-backdoor URL and it returns a download-&-execute liner ready to copy-&-paste.
  • Other - holds liners with the general purpose to help you in penetration testing (ex:Mimikatz, Powerup..). And all of that on the three platforms (Windows, Linux, and MacOS) and any other platform can be added.

Features

  • Search for any one-liner in the database by anything in its name.
  • You can add your own liners by following this steps to create a ".liner" file and if you sent it to me will be added in the framework with your name 😄.
  • Autocomplete any framework command and recommendations in case of typos.
  • Command line arguments you can use to give the framework a resource file to execute and more.
  • The ability to reload the database if you added any liner without restarting the framework.
  • You can add any platform to payloads database just by making a folder in payloads folder and creating a ".liner" file there.
  • More...

The payloads database is not big now because this the first edition but it will get bigger with updates and contributions.

Screenshots

#Usage

Commandline arguments

usage: One-Lin3r.py [-h] [-r R] [-x X] [-q]

optional arguments:
  -h, --help  show this help message and exit
  -r          Execute a resource file (history file).
  -x          Execute a specific command (use ; for multiples).
  -q          Quit mode (no banner).

Framework commands

Command             Description
--------            -------------
help/?              Show this help menu
list/show           List payloads you can use in the attack.
search  <Keyword>   Search payloads for a specific one
use     <payload>   Use an available payload
info    <payload>   Get information about an available payload
banner              Display banner
reload/refresh      Reload the payloads database
check               Prints the core version and database version then check for them online.
history             Display command line most important history from the beginning
save_history        Save command line history to a file
exit/quit           Exit the framework

Installing and requirements

To make the tool work at its best you must have :

  • Python 3.x or 2.x (preferred 3).
  • Linux (Tested on kali rolling) or Windows system (Not tested yet on MacOS but it should work).
  • The requirements mentioned in the next few lines.

Installing

+For windows : (After downloading ZIP and upzip it)

cd One-Lin3r-master
python -m pip install -r win_requirements.txt
python One-Lin3r.py -h

+For Linux :

git clone https://github.com/D4Vinci/One-Lin3r.git
chmod 777 -R One-Lin3r
cd One-Lin3r
pip install -r requirements.txt
python One-Lin3r.py -h

Contact

Donation

If you liked my work and want to support me, you can give me a cup of coffee :)

bitcoin address: 1f4KfYikfqHQzEAsAGxjq46GdrBKc8jrG

Disclaimer

One-Lin3r is created to help in penetration testing and it's not responsible for any misuse or illegal purposes. Copying a code from this tool or using it in another tool is accepted as you mention where you get it from 😄.

Pull requests are always welcomed :D