You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+70-56Lines changed: 70 additions & 56 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ One of the standout features of **LazyOwn: CRIMEN** is its ability to schedule t
60
60
61
61
1. **Comprehensive Attack Library**: Over 500 crafted attacks for various environments, each a testament to the framework's depth and versatility, augmented by the extensive attack library of the Atomic RedTeam Framework.
62
62
2. **Interactive CLI**: Based on cmd2, offering an intuitive and efficient command-line experience.
63
-
3. **Decoy**: if the ip addres not match with 127.0.0.1 or lhost flask will show a decoy website
63
+
3. **Decoy**: if the ip addres not match with 127.0.0.1 or lhost flask will show a decoy website this decoy site will record a video with audio and take pictures from the intruder (sessions/captured_images) like a small versión of storm breaker to know who is the blueteam operator
64
64
4. **Adversary Simulation**: Advanced capabilities for generating red team operation sessions, ensuring meticulous and effective simulations.
65
65
5. **Task Scheduling**: Utilize the `cron` command to schedule and automate tasks, enabling persistent threat simulations.
66
66
6. **Real-Time Results**: Obtain immediate feedback and results from security assessments, ensuring timely and accurate insights.
@@ -88,12 +88,14 @@ One of the standout features of **LazyOwn: CRIMEN** is its ability to schedule t
88
88
- **compressdir:**[directory]: Compresses a directory into a .tar.gz file and exfiltrates it.
89
89
- **terminate:** Terminates the implant or beacon, removing files and persistence mechanisms.
90
90
10. **Rootkit**: Linux rootkit and Windows Malware to ensure persistence and undetectable.
91
+
11. **Surface attack**: We are pleased to document the new surface attack functionality. This feature allows the operator to upload a ZIP archive of Bloodhound capture data (validated with bloodhound.py) at any time via the main page. Upon upload, the system will render the complete attack surface, augmented with identified machines discovered through automated methods or system commands such as **lazynmap** (At WebCli can you click at the Host Icon and will paste the command to discover that host.), **nmap**, **discovery**, and **run lazynmapdiscovery**. These supplementary data sources will enrich the graphical representation, populating nodes within the attack surface. The interface will provide integrated controls for searching, filtering, enumerating, and correlating the various attack vectors. It is crucial to note that this feature is not intended as a replacement for Bloodhound. Its scope is limited to providing a rapid overview and efficient filtering of collected information to facilitate attack phase planning. For detailed attack guidance and exploitation, the operator is directed to the established Bloodhound toolset.
91
92
92
93
## Command Capabilities
93
94
94
95
**LazyOwn: CRIMEN** offers a rich set of commands that can be executed from both the CLI and the web interface, each designed to empower users with unparalleled control and flexibility:
95
96
96
97
- **addhosts**: Add the domain and rhost to /etc/hosts file to route the attacks.
98
+
- **aliass**: Show all documented commands alias (use 'help -v' for verbose/'help <topic>' for details or use aliass)
97
99
- **list**: Enumerates all available LazyOwn Modules within the framework, providing a comprehensive overview of the toolkit's capabilities.
98
100
- **assign**: Configures specific parameters for the operation, such as `assign rhost 192.168.1.1` to define the target IP address, ensuring precise and tailored attacks.
99
101
- **createcredentials**: Add credentials exfiltrated to be used in the attacks or tests. `createcredentials admin:adminpassword`
@@ -103,7 +105,9 @@ One of the standout features of **LazyOwn: CRIMEN** is its ability to schedule t
103
105
- **exit**: Gracefully exits the CLI, concluding the session with elegance and finality.
104
106
- **auto**: Execute all tools files enabled in the tool directory that are relevant to the Nmap scan report.
105
107
- **help**: Documented commands (use 'help -v' for verbose/'help <topic>' for details)
106
-
108
+
- **history**: show the history of the commands in the cli.
109
+
- **edit**: An vim to edit files
110
+
- **ipy**: An Ipython3 interpreter
107
111
108
112
Originally designed to automate the search and analysis of binaries with special permissions on Linux and Windows systems, LazyOwn has evolved to encompass a broader range of functionalities. The project includes scripts that extract information from GTFOBins, analyze binaries on the system, and generate options based on the collected data.
@@ -1111,7 +1122,7 @@ This project is licensed under the GPL v3 License. The information contained in
1111
1122
1112
1123
## Acknowledgments ✌
1113
1124
1114
-
A special thanks to [GTFOBins](https://gtfobins.github.io/) for the valuable information they provide and to you for using this project. Also, thanks for your support Tito S4vitar! who does an extraordinary job of outreach. Of course, I use the `extractPorts` function in my `.zshrc` :D, thanks to deepwiki to help us with doc. ( https://deepwiki.com/grisuno/LazyOwn/ )
1125
+
A special thanks to [GTFOBins](https://gtfobins.github.io/) for the valuable information they provide and to you for using this project. Also, thanks for your support Tito S4vitar! who does an extraordinary job of outreach. Of course, I use the `extractPorts` function in my `.zshrc` :D, thanks to deepwiki to help us with doc. ( https://deepwiki.com/grisuno/LazyOwn/ ), thanks to plaintext who does an extraordinary job of outreach and we adopted PTMultiTools it's very impresive
1115
1126
1116
1127
### Thanks to pwntomate 🍅
1117
1128
@@ -1155,6 +1166,9 @@ LazyOwn is a framework that streamlines its workflow and automates many tasks an
1155
1166
1156
1167
Documentation automatically created by the script `readmeneitor.py` created for this project; maybe one day it will have its own repo, but for now, I don't see it as necessary.
1157
1168
1169
+
# Legal disclaimer:
1170
+
Usage of LazyOwn RedTeam Framework for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.
0 commit comments