1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
| sudo pip3 install -U hackebds
bbq@ubuntu:~/tools$ hackebds -h /home/bbq/.local/lib/python3.8/site-packages/fuzzywuzzy/fuzz.py:11: UserWarning: Using slow pure-python SequenceMatcher. Install python-Levenshtein to remove this warning warnings.warn('Using slow pure-python SequenceMatcher. Install python-Levenshtein to remove this warning') usage:
This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices
optional arguments: -h, --help show this help message and exit -reverse_ip REVERSE_IP, -lhost REVERSE_IP reverse_ip set -reverse_port REVERSE_PORT, -lport REVERSE_PORT reverse_port set -arch {aarch64,android,armebv5,armebv7,armelv5,armelv7,mips,mips64,mipsel,mips64el,mipsn32,mipsn32el,powerpc,powerpc64,powerpc64le,powerpcle,riscv64,sparc,sparc64,x64,x86} Target arch architecturet -res {reverse_shell_file,reverse_shellcode,bind_shell,cmd_file,cveinfo} -passwd PASSWD bind_shell set connect passwd -model MODEL, -m MODEL device model,learn module -bind_port BIND_PORT, -bind BIND_PORT bind_shell port -filename FILENAME, -f FILENAME Generate file name -shell SHELL cmd shell or execute file path -cmd CMD Commands executed -envp ENVP Commands envp -sleep SLEEP the interval time in the continuous bounce shell, in seconds default is 5 -encode, --encode encode backdoor -power, --power powerful reverse shell_file or bind_shell file -s, --search Basic information and POC of search device -l, --list print model information list -p, --poc generated model's POC file -v, --version Display version -CVE CVE, --CVE CVE CVE ID -add, --add_model Add model tree's node bbq@ubuntu:~/tools$
|