-
Notifications
You must be signed in to change notification settings - Fork 79
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #20 from mbrg/rename_machine_pwn_module
Rename machine pwn module
- Loading branch information
Showing
51 changed files
with
117 additions
and
117 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
9 changes: 0 additions & 9 deletions
9
src/powerpwn/machinepwn/models/exflirtate_file_command_args.py
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
9 changes: 0 additions & 9 deletions
9
src/powerpwn/machinepwn/models/steal_power_automate_token_command_args.py
This file was deleted.
Oops, something went wrong.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
from typing import Union | ||
|
||
from pydantic import BaseModel, Field | ||
|
||
from powerpwn.nocodemalware.models.cleanup_command_args import CleanupCommandArgs | ||
from powerpwn.nocodemalware.models.code_exec_command_args import CodeExecCommandArgs | ||
from powerpwn.nocodemalware.models.exflirtate_file_command_args import ExflirtateFileCommandArgs | ||
from powerpwn.nocodemalware.models.ransomware_command_args import RansomwareCommandArgs | ||
from powerpwn.nocodemalware.models.steal_cookie_command_args import StealCookieCommandArgs | ||
from powerpwn.nocodemalware.models.steal_power_automate_token_command_args import StealPowerAutomateTokenCommandArgs | ||
|
||
|
||
class AnyCommandArgs(BaseModel): | ||
__root__: Union[ | ||
CleanupCommandArgs, | ||
CodeExecCommandArgs, | ||
RansomwareCommandArgs, | ||
ExflirtateFileCommandArgs, | ||
StealCookieCommandArgs, | ||
StealPowerAutomateTokenCommandArgs, | ||
] = Field(discriminator="command_to_run") |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
from typing import Literal | ||
|
||
from powerpwn.nocodemalware.enums.command_to_run_enum import CommandToRunEnum | ||
from powerpwn.nocodemalware.models.cmd_arguments import CommandArguments | ||
from powerpwn.nocodemalware.models.command_args_properties_base_model import CommandArgsPropertiesBaseModel | ||
|
||
|
||
class CleanupCommandArgs(CommandArguments[CommandArgsPropertiesBaseModel]): | ||
command_to_run: Literal[CommandToRunEnum.CLEANUP] = CommandToRunEnum.CLEANUP |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
4 changes: 2 additions & 2 deletions
4
...nepwn/models/code_exec_args_properties.py → ...lware/models/code_exec_args_properties.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
from typing import Literal | ||
|
||
from powerpwn.nocodemalware.enums.command_to_run_enum import CommandToRunEnum | ||
from powerpwn.nocodemalware.models.cmd_arguments import CommandArguments | ||
from powerpwn.nocodemalware.models.code_exec_args_properties import CodeExecArgsProperties | ||
|
||
|
||
class CodeExecCommandArgs(CommandArguments[CodeExecArgsProperties]): | ||
command_to_run: Literal[CommandToRunEnum.CODE_EXEC] = CommandToRunEnum.CODE_EXEC |
File renamed without changes.
2 changes: 1 addition & 1 deletion
2
...models/exflirtate_file_args_properties.py → ...models/exflirtate_file_args_properties.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
9 changes: 9 additions & 0 deletions
9
src/powerpwn/nocodemalware/models/exflirtate_file_command_args.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
from typing import Literal | ||
|
||
from powerpwn.nocodemalware.enums.command_to_run_enum import CommandToRunEnum | ||
from powerpwn.nocodemalware.models.cmd_arguments import CommandArguments | ||
from powerpwn.nocodemalware.models.exflirtate_file_args_properties import ExflirtateFileArgsProperties | ||
|
||
|
||
class ExflirtateFileCommandArgs(CommandArguments[ExflirtateFileArgsProperties]): | ||
command_to_run: Literal[CommandToRunEnum.EXFILTRATION] = CommandToRunEnum.EXFILTRATION |
2 changes: 1 addition & 1 deletion
2
...epwn/models/ransomware_args_properties.py → ...ware/models/ransomware_args_properties.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
from typing import Literal | ||
|
||
from powerpwn.nocodemalware.enums.command_to_run_enum import CommandToRunEnum | ||
from powerpwn.nocodemalware.models.cmd_arguments import CommandArguments | ||
from powerpwn.nocodemalware.models.ransomware_args_properties import RansomwareArgsProperties | ||
|
||
|
||
class RansomwareCommandArgs(CommandArguments[RansomwareArgsProperties]): | ||
command_to_run: Literal[CommandToRunEnum.RANSOMWARE] = CommandToRunEnum.RANSOMWARE |
2 changes: 1 addition & 1 deletion
2
...wn/models/steal_cookie_args_properties.py → ...re/models/steal_cookie_args_properties.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
9 changes: 9 additions & 0 deletions
9
src/powerpwn/nocodemalware/models/steal_cookie_command_args.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
from typing import Literal | ||
|
||
from powerpwn.nocodemalware.enums.command_to_run_enum import CommandToRunEnum | ||
from powerpwn.nocodemalware.models.cmd_arguments import CommandArguments | ||
from powerpwn.nocodemalware.models.steal_cookie_args_properties import StealCookieArgsProperties | ||
|
||
|
||
class StealCookieCommandArgs(CommandArguments[StealCookieArgsProperties]): | ||
command_to_run: Literal[CommandToRunEnum.STEAL_COOKIE] = CommandToRunEnum.STEAL_COOKIE |
9 changes: 9 additions & 0 deletions
9
src/powerpwn/nocodemalware/models/steal_power_automate_token_command_args.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
from typing import Literal | ||
|
||
from powerpwn.nocodemalware.enums.command_to_run_enum import CommandToRunEnum | ||
from powerpwn.nocodemalware.models.cmd_arguments import CommandArguments | ||
from powerpwn.nocodemalware.models.command_args_properties_base_model import CommandArgsPropertiesBaseModel | ||
|
||
|
||
class StealPowerAutomateTokenCommandArgs(CommandArguments[CommandArgsPropertiesBaseModel]): | ||
command_to_run: Literal[CommandToRunEnum.STEAL_POWER_AUTOMATE_TOKEN] = CommandToRunEnum.STEAL_POWER_AUTOMATE_TOKEN |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters