name | mode | size |
---|---|---|
GenerateAll | 040000 | |
config | 040000 | |
template | 040000 | |
LICENSE | 100644 | 34 kb |
README.md | 100644 | 2 kb |
TODO.md | 100644 | 1 kb |
completer.py | 100644 | 1 kb |
display.py | 100644 | 3 kb |
fileOps.py | 100644 | 4 kb |
generator.py | 100644 | 2 kb |
gr8sct.py | 100644 | 16 kb |
# GreatSCT
### An Application Whitelisting Bypass Tool
```python3 gr8sct.py```
The first screen you'll see is this menu.

Select the payload you wish to generate by name or its number, `help` for help, and `menu` at any time to get back here.
For single payload generation you will find the follwing with with values pointing to your C&C to fill out.

These can be set using `set variable value` syntax
Or by entering `variable name/#` itself, which gives more hints about the expected value
`help` gives more info as well

Once the correct values have been set `generate` to build your payload.

The payload (shellcode.xml in this case) appears in the root directory.
The devs should fix this so you can specify an output folder, but they are lazy.

___
For network testing purposes use `generateAll` from the inital menu

The bottom values are those which are common to multiple payloads.
This lets you easily set your C&C values for all the payloads.
When it's all set `generate` and you'll find your payloads in ./GenerateAll/

Apache and metasploit will automatically start when the GenerateAll function finishes.

A script to automatically execute each payload is located in ./GenerateAll/gr8sct.bat.

Download generateall.zip from the HostedDomain, execute gr8sct.bat, and open ./GenerateAll/analyst.csv when the batch script finishes to see which bypasses worked.