Offensive Lua is a collection of offensive security scripts written in Lua with FFI. The scripts run with LuaJIT (v2.0.5) on Microsoft Windows to perform common tasks.
Lua is a lesser used but very useful choice for post-exploitation scripting language. It’s flexible, lightweight, easy to embed, runs interpreted or as bytecode from memory and allows for JIT to interact with the host OS libraries.
| Filename | Description |
|---|---|
| bin2hex.lua | Convert a binary to hex for binrun.lua |
| binrun.lua | Writes a hex of EXE to a random location and exec’s |
| bindshell.lua | bind a shell on TCP port 5000 |
| ComputerDefaultsUACBypass.lua | Bypass UAC restrictions via ms-settings |
| console.lua | Console App Example |
| downloadexec.lua | Download & Exec over HTTP |
| downloadexec_UACbypass.lua | Download & BypassUAC & Exec over HTTP |
| filewrite.lua | Write a file |
| luajit.exe | LuaJIT compiled from our internal source tree. |
| messagebox.lua | MessageBox Example |
| regread.lua | Read from Registry |
| regwrite.lua | Write to Registry |
| regwritedel.lua | Write and Delete from Registry |
| rickroll.lua | Open a browser on URL |
| runcmd.lua | Run a command popen |
| runcmd2.lua | Run a command os.execute |
| runswhide.lua | Run a command via CreateProcess with SW_HIDE |
| uac_bypass_bluetooth_win10.lua | Bypass UAC via Bluetooth on Windows10 |
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…