Automated Pᴏsᴛ Exᴘʟᴏɪᴛᴀᴛɪᴏɴ Eɴᴜᴍᴇʀᴀᴛɪᴏɴ ᴛᴏᴏʟ for Windows target
Author : @34zY
/!\ NEW PORTABLE VERSION AVAILABLE SOON.
----------------------------------------------------------------------------
| .--,_ \ 🐰 | \ <<Version>> / | \ <<System>> / |
| / ,/ /\ \ 💙 | \ > 2.0 < / | \ >Windows< / |
| / // /\ \ \----------------------------------------------------|
| / // /_\\| |
| .' ' ( |
| /__ \.-"""-._ |
| / 0> ' . ' `-. <<ɴᴇʀᴠ0ᴜs ʀ4ʙʙɪᴛ>> |
| ( . ' " `. |
| `/─-.-' " ' ; <<Pᴏsᴛ Exᴘʟᴏɪᴛᴀᴛɪᴏɴ Eɴᴜᴍᴇʀᴀᴛɪᴏɴ ᴛᴏᴏʟ>> |
| / `.' " . .-' " ; <<author : @34ZY>> |
| ~ : . .' ; |
| `. ' : ' ' ; |
| ) _.". " . ";.. |
| .'_.' .' ' __., `\ |
| '" ""''---'` "''"` |
----------------------------------------------------------------------------
This project can be updated sometimes ...
Tested on :
- Windows 10 - 10.0.19044 N/A build 19044
Usage :
git clone https://github.com/34zY/Nerv0usR4bbit.git
cd Nerv0usR4bbit-main/
python3 Nerv0usR4bbit.py
Details :
- R4bbit is dedicated to make basic enumeration process on Windows machines with ajustable sleep time avoiding EDR/XDR flags. Very practical when making lateral movements between machines in a penetration test or red teaming process.
Modules :
- Choose number of delay time between differents process.
- Check basic Active Directory configuration.
- Download netcat on victim server.
- Transfer payload from your C2 server to victim machine.
- Open webserver on victim machine.
- Display TCP|OPEN ports on the machine.
- Check user privilege & user informations related to AD Groups / Organisation.
- Check total informations about kernel & hardware of the tharget.
- Check running process on the machine to find a way to get an privesc.
- Checking local network status & other machines connected to.
- Find and check connections between others machines on the network.
- Check for juicy files containing passwords.
- Checking network interface configuration.
- Checking installed applications.