• XSS.stack #1 – первый литературный журнал от юзеров форума

прочее Faded Memories

leonides

HDD-drive
Пользователь
Регистрация
02.07.2021
Сообщения
26
Реакции
5
Features :

1. Advanced File and Directory Management

  • Secure File Wiping: Overwrites files with random data before deletion to prevent recovery.
  • Stealth File Deletion: Uses low-profile file removal.
  • Recursive Directory Wiping: Removes all files and subdirectories in a specified folder.
2. System Log Handling
  • Stop Event Logging: Disables the Windows Event Log service to reduce audit trails.
  • Clear System Logs: Removes or truncates .evtx log files in critical directories.
3. Anti-Forensics Techniques
  • Self-Deletion: Deletes its executable file after execution.
  • Critical API Unhooking: Detects and unhooks common API hooks placed by security products or monitoring tools.
4. "Nuke" Mode
  • Deletes all non-system files across drives.
  • Preserves critical system directories ( \Windows, \Program Files, etc.).
  • Configurable preservation logic to avoid critical system damage.
5. Customizable Execution
  • Command-Line Arguments:
    • nuke: Erase all non-system files on all connected disks to the machine.
    • logs: Stop event logging and clear logs.
    • <path>: Wipe a specific directory.
    • file <path_to_file>: Securely process a single file.
    • * : delete all files and directories at the same location
    • self-delete: Perform self-rewrite and delete .


Benefits :
  1. Efficiency in Covering Tracks
    • The tool ensures minimal traces are left after an operation, reducing the chances of detection or forensic recovery.
  2. Operational Stealth
    • API unhooking and stealth deletion bypass many endpoint detection and response (EDR) tools.
  3. Flexibility
    • Multiple modes of operation allow for tailored usage depending on the hacker objective.
  4. Adaptability
    • Easily integrate with other tools in a red team's arsenal for enhanced post-exploitation workflows.
  5. Self-Sustainability
    • The self-deletion mechanism ensures no lingering executable files after use.


Highlights :
  1. Secure and Customizable:
    • Designed for professional use cases with a focus on secure, stealthy operations.
  2. No Residual Risk:
    • Built with safeguards to avoid unintended damage to critical system directories



 
Последнее редактирование:


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх