“DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.”
Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed. To compromise the same target again, you need delete this folder on target system : – C:\Users\Public\Libraries\Intel – because dropper checks the existence of her to take a decision of what be do.
– Download executable on target system.
– Silent execution.
– Download and execute executable once time.
– If the exe already had downloaded and running, open only pdf/docx/xxls/jpg/png.
– Some Phishing methods are included.
– Multiple Session disabled.
– Bypass UAC.
+ sudo access
+ python 2.7 on Wine Machine
+ Kali Linux – SANA
+ Kali Linux – ROLLING
+ Ubuntu 14.04-16.04 LTS
+ Debian 8.5
+ Linux Mint 18.1
+ Black Arch Linux
git clone https://github.com/4w4k3/Umbrella && cd Umbrella
sudo python umbrella.py