Skip to content

Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays

License

Notifications You must be signed in to change notification settings

whiterabb17/Shamanic

Repository files navigation

Shamanic BackDoor

〢public release ✅
〢private release contains far more features such as:

  • additional communication protocols
  • pivot/spread features
  • recovery features

Shaman is a Resilient, Stealthy & capable Windows Backdoor.
Utilizing Telegram for command relays, allowing on the go operations.

Designed for a more stealthy & concrete foothold during red-team engagements.
Agents gather in a Hive allowing both targeted and mass command taskings to all the connected agents.

Can be compiled for *Nix or Mac, as it's supported by the gryphon framework
though this will require some manual tweaking to be done by the user
as Shaman uses certain windows api calls for antivm and some other stuff

NOTICE

To prevent misuse of more field ready builds by scriptkiddies the obfuscated build will not compile without some manual tweaking by the user

Latest scan of Obfuscated Build

Required

Enter your:

  • telegram userid
  • telegram botids
  • telegram bottokens

in package/util/constants.go

Operation Requirements

2 Bot channels required.
A Library channel which will hold client Identifiers and Heartbeats (online status)
A Dispatch channel which will send and recieve commands and responses respectively

Demo

Commands & Functions

Base Commands & Functions
===========================
help 					Display this help message
list 					Display currently open doors
ping 					Measure the latency of command execution
gryphon [command args] 			Execute Gryphon command w/out arguments <b>More info below</b>
reset 					Create a new Summoning message
info 					Display system information
soft 					Display the list of installed programs
sh 					Execute a command and return the output
up 					Upload a file from the local system
dl 					Download a file from a url to the local system
root 					Ask for admin permissions
inst 					Returns instance informtaion
remove 					Uninstall Shaman bin & persistence

Gryphon Offensive Module Functions

Commands With Arguments
===========================
 SliceFile       [arg:  string]			Return slice from file
 MakeZip         [args: string, []string]	Create $zip_name from $fileNames
 DnsLookup       [arg:  string] 		Performs DNS Lookup of given hostname
 RdnsLookup      [arg:  string] 		Performs reverse DNS Lookup of given IP
 HostsPassive    [arg:  string] 		ARP Monitors networks at given interval
 FilePermissions [arg:  string] 		Checks for read/write of given file
 Portscan        [args: string, int] 		Performs multi-port scan
 PortscanSingle  [args: string, int] 		Single port scan
 BannerGrab      [args: string, int]
 CmdOut          [arg:  string] 		Runs a cmd and returns output
 CmdOutPlatform  [arg:  string] 		Platform aware cmd run with output return
 CmdRun          [arg:  string] 		Runs cmd without return of data
 CmdBlind        [arg:  string] 		Unsupervision cmd run, no output
 CreateUser      [args: string, string] 	Temporarily on supported on windows
 Bind            [arg:  int] 			Binds a shell to given port
 Reverse         [args: string, int] 		Runs a reverse shell
 SendDataTcp     [args: ip/host, int, string] 	Sends data to given host using TCP
 SendDataUdp     [args: ip/host, int, string] 	Sends data to given host using UDP
 ReadFile        [arg:  string]
 WriteFile       [arg:  string]
 IP2Hex          [arg:  string]
 Port2Hex        [arg:  int]
 Download        [arg:  string]
 CopyFile        [arg:  string, string] 
 PkillPid        [arg:  int]
 PkillName       [arg:  string]
 Persist         [arg:  string] 		Available options: Startup (Win/*Nix), Schtasks (Win ONLY)
 SelfInject      [arg:  string] 		Url to download a file from to Inject bytes into owned Process
 DropInject      [arg:  string] 		Url to download a file from to Inject after dropping on disk
 ProcInject      [args: string, string]		Downloads binary from provided URL and injects into specified process
 RefLoad         [arg:  string] 		Url to	download a file from to Reflectively Load into current domain


Commands Without Arguments
==============================
 pkillAv        				Kills most common AV
 clearLogs      				Clears most system logs
 interfaces    					Gets network interfaces to use for Sniffing
 sniffNetwork   				Starts a network traffic sniffer that writes traffic to file for retrieval
 fetchNetLogs   				Retrieves Sniffer logs if they exist
 listDir  					Returns files in yellow directory
 networks       				Returns list of nearby Wi-Fi networks
 localIP      					Gets Private IP
 globalIP     					Gets Public IP
 isroot         				Checks is client is running as root/admin
 proc       					Returns processes and their PIDs
 systeminfo     				Returns general system info
 escalate       				Attempts PrivilegeEscalation through various different methods