Skip to content

Commit 07f59e4

Browse files
authored
Ladon7.0 For CobaltStrike
1 parent 05aef1d commit 07f59e4

File tree

2 files changed

+11
-17
lines changed

2 files changed

+11
-17
lines changed

Ladon.cna

Lines changed: 11 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,43 +1,37 @@
1-
#Ladon 7.5 for Cobalt Strike
1+
#Ladon 6.6 for Cobalt Strike
22
#author: k8gege
33
#blog: http://k8gege.org/Ladon
44
#github: https://github.com/k8gege
55
#teston: CS 3.x & 4.0
6-
#update: 20201010
6+
#update: 20200606
77

88
#Some functions are not compatible with CS, please use exe version
9-
#Not Support: [NbtScan VncScan MysqlScan OracleScan SSHscan WinrmScan]
10-
#Not Support: [SubDomain PsExec WinrmExec DumpLsass RdpHijack cve-2020-0688]
11-
12-
beacon_command_register(
13-
"Ladon",
14-
"Ladon large network penetration scanner",
15-
"\nUsing: Ladon help\nLadon is a multi-threaded plug-in comprehensive scanning artifact for large-scale network penetration, including port scanning, service identification, network assets, password explosion, high-risk vulnerability detection and one click getshell. It supports batch a / B / C segment scanning and cross network segment scanning, as well as URL, host and domain name list scanning. Version 7.2 has built-in 94 function modules and 18 external modules. Through a variety of protocols and methods, it can quickly obtain the IP, computer name, working group, shared resources, network card address, operating system version, website, subdomain name, middleware, open service, router, database and other information of the target network");
9+
#Brute-Force Not Support [VncScan MysqlScan OracleScan SSHscan] PassWord
1610

1711
alias Ladon {
1812
if (-exists script_resource("Ladon.exe")) {
1913
if ($2 eq "help"){
20-
blog2($1, "Ladon 7.5");
14+
blog2($1, "Ladon 6.6");
2115
blog2($1, "Usage:");
2216
#blog2($1, "Ladon 1");
2317
blog2($1, "Ladon ip");
2418
blog2($1, "Ladon ip scantype");
25-
#blog2($1, "Ladon noping");
26-
blog2($1, "Ladon noping ip");
27-
blog2($1, "Ladon noping ip scantype");
19+
#blog2($1, "Ladon nocheck");
20+
blog2($1, "Ladon nocheck ip");
21+
blog2($1, "Ladon nocheck ip scantype");
2822
blog2($1, "ScanType:(Discover/Brute/Encode/Exploit)");
2923
blog2($1, "ip: [ip ip/24 ip/26 ip/8]");
3024
blog2($1, "Discover: [OnlineIP OnlinePC OSscan CiscoScan]");
3125
blog2($1, "Discover: [WebScan WebScan2 SameWeb UrlScan WhatCMS WebDir SubDomain HostIP DomainIP]");
3226
blog2($1, "Vulnerable: [MS17010 SmbGhost WeblogicPoc PhpStudyPoc ActiveMQPoc TomcatPoc Struts2Poc]");
3327
blog2($1, "Vulnerable: [WeblogicExp TomcatExp]");
34-
blog2($1, "Brute-Force: [LdapScan FtpScan WmiScan SmbScan NbtScan LdapScan SmbHashScan WmiHashScan]");
35-
blog2($1, "Discover: [EnumMssql EnumShare EnumIIS EnumProcess GetCmdLine GetInfo GetInfo2 GetPipe GetHtml AdiDnsDump]");
28+
blog2($1, "Brute-Force: [LdapScan FtpScan WmiScan SmbScan LdapScan VncScan SmbHashScan WmiHashScan]");
29+
blog2($1, "Discover: [EnumMssql EnumShare EnumIIS EnumProcess GetCmdLine GetInfo GetInfo2 GetHtml AdiDnsDump]");
3630
blog2($1, "Encode: [EnHex DeHex EnBase64 DeBase64]");
3731
blog2($1, "Sinffer: [[Sniffer FtpSniffer HttpSniffer HttpDownload FtpDownload]]");
38-
blog2($1, "RemoteExec: [AtExec WmiExec SshExec JspShell WebShell]");
32+
blog2($1, "RemoteExec: [PsExec AtExec WmiExec SshExec JspShell WebShell]");
3933
blog2($1, "GetInfo: [CheckDoor EnableDotNet GetIP GetHtml WebSer]");
40-
blog2($1, "Elevate: [MS16135 BypassUAC GetSystem Runas RunPS SweetPotato BadPotato]");
34+
blog2($1, "Elevate: [BypassUAC GetSystem Runas RunPS]");
4135
blog2($1, "Example: Ladon 192.168.1.8/24 OnlinePC");
4236
blog2($1, "Example: Ladon 192.168.1.8/24 *.ini");
4337
blog2($1, "Example: Ladon 192.168.1.8/24 *.ps1");

Ladon.exe

18 KB
Binary file not shown.

0 commit comments

Comments
 (0)