Cyber security

Offensive Lua – Unveiling Lua Scripts For Windows Security Exploration

Offensive Lua is a collection of offensive security scripts written in Lua with FFI. The scripts run with LuaJIT (v2.0.5) on Microsoft Windows to perform common tasks.

  • Run an EXE
  • Bypass UAC
  • File, Networking or Registry
  • Common Tasks (e.g. bind a shell)

Lua is a lesser used but very useful choice for post-exploitation scripting language. It’s flexible, lightweight, easy to embed, runs interpreted or as bytecode from memory and allows for JIT to interact with the host OS libraries.

FilenameDescription
bin2hex.luaConvert a binary to hex for binrun.lua
binrun.luaWrites a hex of EXE to a random location and exec’s
bindshell.luabind a shell on TCP port 5000
ComputerDefaultsUACBypass.luaBypass UAC restrictions via ms-settings
console.luaConsole App Example
downloadexec.luaDownload & Exec over HTTP
downloadexec_UACbypass.luaDownload & BypassUAC & Exec over HTTP
filewrite.luaWrite a file
luajit.exeLuaJIT compiled from our internal source tree.
messagebox.luaMessageBox Example
regread.luaRead from Registry
regwrite.luaWrite to Registry
regwritedel.luaWrite and Delete from Registry
rickroll.luaOpen a browser on URL
runcmd.luaRun a command popen
runcmd2.luaRun a command os.execute
runswhide.luaRun a command via CreateProcess with SW_HIDE
uac_bypass_bluetooth_win10.luaBypass UAC via Bluetooth on Windows10
Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

4 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

4 weeks ago