Skip to content

mindsflee/WinFlesher

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 

Repository files navigation

WinFlesher

WinFlesher

- It is not a normal and boring enumeration tool! The idea is to automate the MITRE TTP exploitation
WINFLESHER v0.1.0.5 
MITRE EXPLOITATION FRAMEWORK  
Written by: Alessandro 'mindsflee' Salzano 
https://github.com/mindsflee                
                                                                                                                                  
It is released under GNU GENERAL PUBLIC LICENSE
that can be downloaded here:                                    
https://github.com/mindsflee/WinFlesher/blob/main/LICENSE


Invoke-WinFlesher is a post exploitation framework for windows written in powershell. 
It was created by adapting the exploitation techniques to MITRE and it was meant to be modular.


PS C:\> . .\Invoke-WinFlesher.ps1
PS C:\> WFL-check-T1574.009
 [+] WARNING: this system is most likely vulnerable to Path Interception by Unquoted Path!
ProcessId   : 0
Name        : Vulnerable Service
DisplayName : Vuln Service
PathName    : C:\Program Files\A Subfolder\B Subfolder\C Subfolder\Executable.exe
StartName   : LocalSystem
StartMode   : Auto
State       : Stopped
+ Download the repository in zip format and import it on your victim machine
+ After unzipped it run on a powershell console:  ". .\ Invoke-WinFlesher.ps1"
- WinFlesher was created to be scalable and implementable with more TTP and MITRE modules
- We are looking for collaborators!
winflesher_T1574.010.mp4
winflesher_T1003.001.mp4