-
Notifications
You must be signed in to change notification settings - Fork 281
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Semi Autonomous Version #23
Comments
Still working on this and can it be made persistent? |
Yes ofc it can I posted the code publicly it probably works
…On Mon, Mar 12, 2018 at 5:16 PM, Community ***@***.***> wrote:
Still working on this and can it be made persistent?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#23 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AhJZgVothVQEk8AOZY5_5YqjtxWhrSVSks5tdw_cgaJpZM4R1J8L>
.
|
So exploited device will still mine even after its on diff wifi connection?
…On Tue, Mar 13, 2018, 03:43 devcoinfet ***@***.***> wrote:
Yes ofc it can I posted the code publicly it probably works
On Mon, Mar 12, 2018 at 5:16 PM, Community ***@***.***>
wrote:
> Still working on this and can it be made persistent?
>
> —
> You are receiving this because you authored the thread.
> Reply to this email directly, view it on GitHub
> <
#23 (comment)
>,
> or mute the thread
> <
https://github.com/notifications/unsubscribe-auth/AhJZgVothVQEk8AOZY5_5YqjtxWhrSVSks5tdw_cgaJpZM4R1J8L
>
> .
>
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#23 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AiZG2vyCFW1GphEpAbHCrsR6GUAAQsUtks5td6LfgaJpZM4R1J8L>
.
|
Well I haven't even tested this in the lab I'll run it on a spare laptop and let You know personally that kind of power doesn't belong in the hands of regular people, meaning if I could do it I wouldn't post it |
Yea need some browser exploit maybe extension pop up using beef browser.
…On Tue, Mar 13, 2018, 20:22 devcoinfet ***@***.***> wrote:
Well I haven't even tested this in the lab I'll run it on a spare laptop
and let You know
as far as getting it to load when the user reopens there browser in a
different network is beyond the scope of this tool or my demo and I will
not be providing help unless you can code a fix yourself and propose a fix.
personally that kind of power doesn't belong in the hands of regular
people, meaning if I could do it I wouldn't post it
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#23 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AiZG2khywuuLOyyNpchNwx531yeszpjfks5teIzsgaJpZM4R1J8L>
.
|
I suggest You figure it out. This is 100% illegal and has no irl use cases so be careful |
Good news for anyone wondering if this is possible so much so its scary I'll be making a free chrome plugin in the next week. Small update, What You said Scared me. So I decided to mitigate it fast, and make a basic Chrome Plugin and have it sniff every Page load in the DOM and smash out them Iframes Its name is going to be Iframe_Smasher Stay tuned give me a few days to get this 100% correct as it works now and can block and still return content besides iframes. Pay attention to the chrome store for it |
Did u finish update? |
Nah I stopped work on it and released a paid solution this has gotten way
out of control
look in the web store for iframesmasher
I will no longer provide any updates to this
…On Wed, Mar 28, 2018 at 2:06 PM, FengShuiCoin DEV ***@***.***> wrote:
Did u finish update?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#23 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AhJZgaEF0K6o3T5Vkt2HYw7aOF_OuBmAks5ti_tPgaJpZM4R1J8L>
.
|
Hey, guys, I made a stab at automating and will implement the Nmap scanning for the class C given back off my calls to the iprange function in route.py in a few days just fixing stuff config wise at home, I arranged the code a little better :)
I coded a route.py to assist in various functions for our toolset were all working on and also made this, in theory, to attach to all interfaces grab the default IP of that said interface and then perform and Arp and then Nmap scan gen a list of IP's and macs and then move on to the main part I initially have been running into issues running mitmd, can someone please work with this and tell me if it is working while I fix my setup. I can verify most of my code I changed works but I'm unsure if my mods automated or broke your tool until I can get a proper kali going so I proceeded as it would work I should have a proper system up in a few days to fix any errors let me know if you guys think we can merge this and commit it.
https://github.com/devcoinfet/CoffeeMinerMod
admin, I'm unsure why it won't let me pull please review code and merge and commit if possible like I said ill have Nmap fixed in a few days max.
The text was updated successfully, but these errors were encountered: