Closed p4p1 closed 8 months ago
#!/usr/bin/env python # -*- coding: utf-8 -*- # Made by papi # Created on: Sat 21 Oct 2023 10:49:57 PM CEST # current-file-name # Description:
import havocui import havoc
def catch_payload(data): print("received the base64 payload:") print(data) havoc.GeneratePayload(catch_payload, "Demon", "example listener", "x64", "Windows Exe", "{\"Amsi/Etw Patch\": \"None\",\"Indirect Syscall\": false,\"Injection\": {\"Alloc\": \"Native/Syscall\",\"Execute\": \"Native/Syscall\",\"Spawn32\": \"C:\\Windows\\SysWOW64\\notepad.exe\",\"Spawn64\": \"C:\\Windows\\System32\\notepad.exe\"},\"Jitter\": \"15\",\"Proxy Loading\": \"None (LdrLoadDll)\",\"Sleep\": \"2\",\"Sleep Technique\": \"WaitForSingleObjectEx\",\"Stack Duplication\": false}")
def selected_tree(data): print ("from python") print (data)
tree = havocui.Tree("Active Directory Data", selected_tree)
tree.addRow("Users", "me", "you", "us") tree.addRow("Computer", "DC01", "WEB01", "FS01") tree.setBottomTab()
## screenshot ![image](https://github.com/HavocFramework/Havoc/assets/19672114/4e0962eb-671d-4542-8f89-454e4a3faeb1)
new stuff
sample code
import havocui import havoc
def catch_payload(data): print("received the base64 payload:") print(data) havoc.GeneratePayload(catch_payload, "Demon", "example listener", "x64", "Windows Exe", "{\"Amsi/Etw Patch\": \"None\",\"Indirect Syscall\": false,\"Injection\": {\"Alloc\": \"Native/Syscall\",\"Execute\": \"Native/Syscall\",\"Spawn32\": \"C:\\Windows\\SysWOW64\\notepad.exe\",\"Spawn64\": \"C:\\Windows\\System32\\notepad.exe\"},\"Jitter\": \"15\",\"Proxy Loading\": \"None (LdrLoadDll)\",\"Sleep\": \"2\",\"Sleep Technique\": \"WaitForSingleObjectEx\",\"Stack Duplication\": false}")
def selected_tree(data): print ("from python") print (data)
tree = havocui.Tree("Active Directory Data", selected_tree)
tree.addRow("Users", "me", "you", "us") tree.addRow("Computer", "DC01", "WEB01", "FS01") tree.setBottomTab()