See full list on docs.microsoft.com. And I'm on a Mac. I'm at the point where I have an object file created from nasm, and I want to turn it into an ELF executable using ld. The ld on a mac doesn't look like it supports the ELF format, but I don't want to run a virtual machine with Ubuntu just to do this link step.
EggShell is an iOS/macOS and Linux post exploitation surveillance pentesting tool written in Python. With EggShell you’ll be able to:
This remote administration tool provides a command line session with additional functionality between you and target machine. EggShell comes packed with a wide variety of features.
Clone it from the Githhub.
eggshell
(use any mobile terminal application)Eggshell payloads are executed on the target machine. After we retrieve device details, server will establish a secure remote control session. There are 2 different payload options:
After a session is established, you can execute commands on that device through the EggShell command line interface. Type help
to show all available commands.
Multihandler option allow us to handle multiple sessions. You can also show Multihandler commands (similar to the sessions), just type help
.
Both iOS and macOS sessions support taking pictures and recording audio.
macOS
: (picture command) takes a picture through the front facing iSight camera,iOS
: requires 1 argument specifying ‘front’ or ‘back’ facing camera.record
or stop
action. Recording will run in the background, so you’ll be able to execute additional commands during the recording. When the recording is finished, the file will be downloaded and saved.To see detailed EggShell feature explanation, click the documentation link bellow.
brightness
: adjust screen brightnesscd
: change directorydownload
: download filegetfacebook
: retrieve facebook session cookiesgetpaste
: pasteboard contentsgetvol
: get speaker output volumeidletime
: get the amount of time since the keyboard/cursor were touchedimessage
: send message through the messages appitunes
: iTunes Controllerkeyboard
: your keyboard -> is target’s keyboardlazagne
: firefox password retrievalls
: list contents of a directorymic
: record micpersistence
: attempts to re establish connection after closepicture
: take picture through iSightpid
: get process idprompt
: prompt user to type passwordscreenshot
: take screenshotsetvol
: set output volumesleep
: put device into sleep modesu
: su loginsuspend
: suspend current session (goes back to login screen)upload
: upload filecd
: change directorydownload
: download filels
: list contents of a directorypid
: get process idpwd
: show current directoryupload
: upload filealert
: make alert show up on devicebattery
: get battery levelbundleids
: list bundle identifierscd
: change directorydhome
: simulate a double home button pressdial
: dial a phone numberdownload
: download filegetcontacts
: gets addressbookgetnotes
: download notesgetpasscode
: retreive the device passcodegetsms
: download SMSgetvol
: get volume levelhome
: simulate a home button pressinstallpro
: install substrate commandsipod
: control music playerislocked
: check if the device is lockedlastapp
: get last opened applicationlocate
: get device location coordinateslocationservice
: toggle location serviceslock
: simulate a lock button pressls
: list contents of a directorymic
: record micmute
: update and view mute statusopen
: open appsopenurl
: open url on devicepersistence
: attempts to re establish connection after closepicture
: take picture through the front or back camerapid
: get process idrespring
: restart springboardsafemode
: put device into safe modesay
: text to speachsetvol
: set device volumesysinfo
: view system informationupload
: upload filevibrate
: vibrate device