LightMe is a Simple HTTP Server serving Power shell Scripts/Payloads after Obfuscate them and run obfuscation as a service in background in order to keep obfuscate the payloads which giving almost new obfuscated payload on each HTTP request.
Main Features
Background obfuscation interval
)Install
git clone –recurse-submodules https://github.com/WazeHell/LightMe
cd LightMe/
# install powershell
sudo apt-get install powershell
Using
python3 lightme.py –help
Running As Services
#install supervisor
sudo apt-get install supervisor
sudo vim /etc/supervisor/conf.d/lightme.conf
#edit the config
[program:lightme_server]
directory=/lightme_path/
command=/usr/bin/python3 lightme.py -path /PowerSploitOrWhatever/
numprocs=1
user=yourusername
autostart=true
autorestart=true
stdout_logfile=/lightme_path/lightme_std.log
stderr_logfile=/lightme_path/lightme_stderr.log
redirect_stderr=true
priority=999
stdout_logfile_maxbytes=5MB
stderr_logfile_maxbytes=5MB
environment=LANG=en_US.UTF-8,LC_ALL=en_US.UTF-8
#Run
sudo service supervisor restart
sudo supervisorctl reread
sudo supervisorctl update
sudo supervisorctl restart all
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…