WHEAGLE
This thing is un runable as a (whole) in general for now for a good reason, though if you can read code you can steal some stuff bypass defender and probably some Av's, if you do please don't upload to virus total or any online scanner
Wheagle is an open source SOC Toolkit that allows for both malicious/unethical and ethical features. It's a purple teaming toolkit
This allows for training of teams and simulation of RED and BLUE teaming exercises through purple teaming.
One can create their own payload generator and use wheagle as it,s c2 or have your own EDR endpoint and seive through results with your SOC team
UPX,Themida,PeCompact,AsPack,Kkrunchy WWPack32
Wheagle Features
- Wheagle Net
An agent allowing gui connections to the RatNet Network
- EDR
Awesome EDR features like:
1. OS Memory Dumping
2. Realtime Detection and event management
3. CVE Manager
4. Asset Management
5. Live Discovery
6. Backup management
7. Policy Management
8. Custom Plugins for exploit testing, Detection techniques
- APT Manager
- Botnet Management
- RED Teaming and phishing campaigns
- Tracking of APT's and organization's threats
SERVERS
Wheagle servers:
- HTTP Server
Admin panel http/https server
- FTP Server
For uploading virus type/files (I have this somewhere and forgot where)
- SSH Server
TO be implemented soon
- TCP Server
Serves for both tls creating simple listeners
- DNS Server
Similar to tcp and for exfil
Regards
All thanks to some great projects that are in play here removing most bottleneck for me
- Screenshot at github.com/kbinani/screenshot
- Sliver for basics for a C2 (Will try creating a dll/so for this) https://github.com/BishopFox/sliver
- Merlin also helped in basic C2 Knowledge (Will also create adlll for this) https://github.com/Ne0nd0g/merlin
INSTALLATION
Git clone
git clone
cd into directory
go build wheagle.go
./wheagle
Prerequisites
When running on kali or linux, install migw to create windows executables and dlls
sudo apt install -y mingw-w64
sudo apt -y install build-essential
Running the HTTP Server
Cd into server directory
cd server
Pulgins
Wheagle use plugins to allow for personal toolilng withoutn having to implement a new CLI or GUI
To generate your own plugins go to ~/wheagle/plugins/lib/name_of_plugin
The name_of_plugin can be in go cpp or C, whichever your language you choose to write your own library.
After compiling
All plugins are stored at ~/wheagle/plugins/binaries
Go run server.go or go build
Check if already installed
If not, prompt create user page
PyQt instalation for the GUI
(This only covers for debian instalation)
sudo apt-get update && sudo apt-get upgrade
sudo apt-get -y install build-essential openssl libssl-dev libssl1.0 libgl1-mesa-dev libqt5x11extras5
cd into that package directory and install
chmod +x qt*.run
Generate keys for HTTPS server
Execute this while inside the server directory ~/wheagle/server
- Create CA key
openssl genrsa 2048 > certs/wheagle_ca_key.pem
- Generate X-509 certificate for the CA
openssl req -new -x509 -nodes -days 365000 -key certs/wheagle_ca_key.pem -out certs/wheagle_ca_cert.pem
- Create Server Certificate Keys
openssl req -newkey rsa:2048 -nodes -days 365000 -keyout certs/wheagle_server_key.pem -out certs/wheagle_server_req.pem
- Create Server Certificate and Key
openssl req -newkey rsa:2048 -nodes -days 365000 -keyout certs/wheagle_server_key.pem -out certs/wheagle_server_req.pem
- Generate Server x-509 certificate
openssl x509 -req -days 365000 -set_serial 01 -in certs/wheagle_server_req.pem -out certs/wheagle_server_cert.pem -CA certs/wheagle_ca_cert.pem -CAkey certs/wheagle_ca_key.pem
- Generate client keys and certificate
openssl req -newkey rsa:2048 -nodes -days 365000 -keyout certs/wheagle_client_key.pem -out certs/wheagle_client_req.pem
- Generate Client X509 certificate
openssl x509 -req -days 365000 -set_serial 01 -in certs/wheagle_client_req.pem -out certs/wheagle_client_cert.pem -CA certs/wheagle_ca_cert.pem -CAkey certs/wheagle_ca_key.pem
- Verify Server Certificate
openssl verify -CAfile certs/wheagle_ca_cert.pem certs/wheagle_server_cert.pem
- Verify client certificate
openssl verify -CAfile certs/wheagle_ca_cert.pem certs/wheagle_ca_cert.pem certs/wheagle_client_cert.pem
##COLLABORATION
Whatever you do with your git push please don't change our Awesome certs.(But you can and should change yours locally) DO NOT EVEN TOUCH IT UNLESS YOU ARE CHANGING ONLY YOURS.
Other than that I'm new at this so let's see what happens