Kautilya v0.5.6.1- Tool for easy use of Human Interface Devices for offensive security and penetration testing.

Kautilya v0.5.6.1- Tool for easy use of Human Interface Devices for offensive security and penetration testing.

Roadmap Changelog
Latest Change 11/2/2016 v0.5.6.1:
+ Added Invoke-PosRatHttps in the extras directory.
v0.5.6:
– Added “Reverse TCP Shell” under the Execute category.
– Added “Reverse UDP Shell” under the Execute category.
– Added “Reverse ICMP Shell” under the Execute category.
– Added “Reverse HTTPS Shell” under the Execute category.
– Added “Reverse HTTP Shell” under the Execute category.
– Fixed a bug in “Dump passwords in plain”.
– Added a standard disclaimer..Kautilya

Kautilya is a toolkit which provides various payloads for a Human Interface Device which may help in breaking in a computer during penetration tests.kautilya-menu

List of Payloads:
Windows
Gather
+ Gather Information
+ Hashdump and Exfiltrate
+ Keylog and Exfiltrate
+ Sniffer
+ WLAN keys dump
+ Get Target Credentials
+ Dump LSA Secrets
+ Dump passwords in plain
+ Copy SAM
+ Dump Process Memory
+ Dump Windows Vault Credentials

Execute
+ Download and Execute
+ Connect to Hotspot and Execute code
+ Code Execution using Powershell
+ Code Execution using DNS TXT queries
+ Download and Execute PowerShell Script
+ Execute ShellCode
+ Reverse TCP Shell

Backdoor
+ Sethc and Utilman backdoor
+ Time based payload execution
+ HTTP backdoor
+ DNS TXT Backdoor
+ Wireless Rogue AP
+ Tracking Target Connectivity
+ Gupt Backdoor

Escalate
+ Remove Update
+ Forceful Browsing

Manage
+ Add an admin user
+ Change the default DNS server
+ Edit the hosts file
+ Add a user and Enable RDP
+ Add a user and Enable Telnet
+ Add a user and Enable Powershell Remoting

Drop Files
+ Drop a MS Word File
+ Drop a MS Excel File
+ Drop a CHM (Compiled HTML Help) file
+ Drop a Shortcut (.LNK) file
+ Drop a JAR file

Misc
+ Browse and Accept Java Signed Applet
+ Speak on Target

Linux
+ Download and Execute
+ Reverse Shells using built in tools
+ Code Execution
+ DNS TXT Code Execution
+ Perl reverse shell (MSF)

OSX
+ Download and Execute
+ DNS TXT Code Execution
+ Perl Reverse Shell (MSF)
+ Ruby Reverse Shell (MSF)

Payloads Compatibility
+ The Windows payloads and modules are written mostly in powershell (in combination with native commands) and are tested on Windows 7 and Windows 8.
+ The Linux payloads are mostly shell scripts (those installed by default) in combination with commands. These are tested on Ubuntu 11.
+ The OS X payloads are shell scripts (those installed by default) with usage of native commands. Tested on OS X Lion running on a VMWare

Usage:

Source: https://github.com/samratashok