• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      Introduction to Avyukt Exploitation Framework

      • Posted by Vedant
      • Date September 23, 2020
      Hello Hackers!

       

      I hope you all are fine and doing safe in this pandemic! So, I made a framework in Python which can be used to generate malicious payloads and gain remote access to target machines.
      In this article I’m going to show you how to install it and use it to generate a backdoor and hack a target computer. Please keep in mind that the framework is only made for educational purposes, I won’t be responsible for any illegal activities. The Framework is still under Beta development, better features are going to be added soon!

      Setting Up Avyukt:

      In order to use the Framework, you need to clone it from the GitHub repository, use this command to clone the framework from GitHub.
      git clone https://github.com/Vedant-Bhalgama/Avyukt
      

       

      Navigate to the directory where you have cloned the Framework and run these commands first.
      sudo apt-get update
      pip install pyfiglet
      pip install colorama

       

      Now, Navigate to the Avyukt_Setup directory to run the setup file before using the framework. Use this command to run the setup.py file.

      cd Avyukt_Setup
      python setup.py

       

      Be patient, It will take some time to Install all required dependencies and modules required by the Framework.

      After the setup finishes, You are ready to go! Go back to the directory where you Avyukt is present and give it a shoot!

      cd ..
      python Avyukt.py

       

      You will see something like this once you run the Framework. Also, A new directory called Output will be created If you run the Framework for this first time.

       

      Generating a backdoor using Avyukt

      Now let’s start doing the main point which is generating a Malicious Payload! You will see 4 Options here as follows

      Evasion
      Listener
      Help
      Exit

       

      Use the first option – Evasion – to generate a backdoor,Β  type 1 and press enter!
      You will get a list of all the payloads that you can use, type the number of the payload that you want.

       

      We are going to use the first payload which is python/Avyukt/reverse_tcp. Type 1 and enter!

       

      Now, All you have to do is give the backdoor a nice name, set the LHOST (Local IP) and LPORT (Listening port) and you’re good to go.

      You can also type y for the next question to add an icon and it’ll ask you to input the path to your icon.

      Now, it is going to Obfuscate the script and compile it to a Windows Executable on using wine.

      Once the payload is compiled successfully, you’ll see the backdoor in Output/dist .

      Now the framework will ask if you want to start the default handler for the selected payload to listen for connections, all you have to do is type y, set the LHOST and LPORT and it’ll do the rest for you!

      Now, You can use any of the web delivery techniques like using the Apache Web Server or using the SimpleHTTPServer in Python. I have used SimpleHTTPServer of Python here.

      Testing the backdoor

      Now when you run the backdoor on a target machine you’ll get a prompt like this, don’t Worry! all you have to do is that click on “More Info” and click on “Run anyway”. This prompt comes because the backdoor which is an executable file doesn’t have a valid certificate.

       

      If you go back to Kali Linux, You will see that you will have a new connection!

      Now, You can execute system commands like dir, cd, or any other command. You can also use the help command to get a list of commands available for the payload! for now there are less commands as the framework is still under development. More features will be added soon.

      • Share:
      Vedant
      Vedant

      Passionate In Penetration Testing, Ethical Hacking and Information Security.

      Previous post

      Metasploit Basics + Live Demo !
      September 23, 2020

      Next post

      zSecurity VIP Membership
      September 29, 2020

      You may also like

      secrets_370x208
      Unlocking Secrets: How to Crack SHA256 Passwords with Hashcat
      30 March, 2023
      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device πŸŒŽπŸŽ€πŸ“πŸ“·
      23 March, 2023

        6 Comments

      1. Nagasaikumar
        September 25, 2020
        Log in to Reply

        it is showing me an error when i run python setup.py its showing me
        “”””Traceback (most recent call last):
        File “setup.py”, line 8, in
        from colorama import Fore
        ImportError: No module named colorama””

        how to fix this and i run all the commands before as shown

        • Vedant
          Vedant Bhalgama
          September 25, 2020
          Log in to Reply

          This is why I tell PEOPLE TO READ THE WHOLE ARTICLE, Please read above I have already mentioned that before running the setup.py file, Run these 2 commands

          pip install colorama
          pip install pyfiglet

      2. ritesh
        September 25, 2020
        Log in to Reply

        i am getting the exe file……. please help

        • Vedant
          Vedant Bhalgama
          September 28, 2020
          Log in to Reply

          I think you mailed me about this issue and we have already resolved it there, Why are you asking again and again?

      3. [email protected]
        October 1, 2020
        Log in to Reply

        Is it possible to use this with python 3? Python 2 is EOL and we really shouldn’t be forcing people to use it, especially with respect to security.

        • Vedant
          Vedant Bhalgama
          October 2, 2020
          Log in to Reply

          Yes! I am converting the platform to Python3 soon! For now, You will have to use Python2!

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      β€œEverything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright Β© 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      βœ” Lifetime, unlimited access to course materials & training videos.

      βœ” Watch online or download lectures for offline use.

      βœ” Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      βœ” Get answers from our Support Team within a maximum of 15 hours.

      βœ” Unlimited Updates.

      Get free 1 month VIP membership per course with:

      βœ” Live mentorship and Q&A session with the course instructor, Zaid.

      βœ” Instant support from community members through our private discord channel.

      βœ” Daily updates with the latest tutorials & news in the hacking world.

      βœ” Daily resources like CTFs, bug bounty programs, onion services and more!

      βœ” Access our VIP community & connect with like-minded people.

      βœ” Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance