-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathMatrixTerminal.bat
More file actions
215 lines (196 loc) · 6.92 KB
/
MatrixTerminal.bat
File metadata and controls
215 lines (196 loc) · 6.92 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
@echo off
chcp 65001 >nul
title CYBER OPERATIONS TERMINAL v3.14 :: [CLASSIFIED]
mode con cols=120 lines=40
color 0A
setlocal EnableDelayedExpansion
:: Disable quick edit mode to prevent accidental pauses
reg add HKCU\Console /v QuickEdit /t REG_DWORD /d 0 /f >nul 2>&1
:: Initialization sequence
cls
echo.
echo ███████╗██╗ ██╗██████╗ ███████╗██████╗ ██████╗ ██████╗
echo ██╔════╝╚██╗ ██╔╝██╔══██╗██╔════╝██╔══██╗ ██╔════╝██╔═══██╗
echo ███████╗ ╚████╔╝ ██████╔╝█████╗ ██████╔╝ ██║ ██║ ██║
echo ╚════██║ ╚██╔╝ ██╔══██╗██╔══╝ ██╔══██╗ ██║ ██║ ██║
echo ███████║ ██║ ██████╔╝███████╗██║ ██║██╗╚██████╗╚██████╔╝
echo ╚══════╝ ╚═╝ ╚═════╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═════╝ ╚═════╝
echo.
echo CYBER OPERATIONS PLATFORM v3.14
echo [//ACCESS LEVEL: CLASSIFIED//TOP SECRET//]
echo.
ping 127.0.0.1 -n 3 >nul
:: Secure boot sequence
echo [*] Initializing secure kernel...
echo [*] Loading TOR bridge modules...
echo [*] Establishing encrypted VPN tunnel...
for /L %%i in (1,1,5) do (
echo [*] Encrypting layer %%i/5...
ping 127.0.0.1 -n 1 >nul
)
echo [+] Secure environment established
ping 127.0.0.1 -n 2 >nul
cls
:: Advanced authentication
echo =======================================================
echo MULTI-FACTOR AUTHENTICATION REQUIRED
echo =======================================================
echo.
echo [BIOMETRIC VERIFICATION IN PROGRESS...]
ping 127.0.0.1 -n 2 >nul
echo [✓] Retinal scan confirmed
echo [✓] Keystroke dynamics verified
echo.
set /p user="OPERATOR ID: "
set /p pass="DYNAMIC ACCESS CODE: "
echo [*] Contacting authentication server...
ping 127.0.0.1 -n 2 >nul
echo [*] Validating OTP token...
ping 127.0.0.1 -n 2 >nul
echo [*] Cross-referencing with command database...
ping 127.0.0.1 -n 2 >nul
echo [+] ACCESS GRANTED: Welcome, OPERATOR !user!
echo [*] Session encrypted with AES-256-GCM
ping 127.0.0.1 -n 3 >nul
cls
:: Realistic terminal matrix effect
:matrix
cls
echo [TERMINAL MODE: ENCRYPTED STREAM]
for /L %%i in (1,1,25) do (
set "hexline="
for /L %%j in (1,1,90) do (
set /a "rand=!random! %% 16"
for %%r in (!rand!) do set "hex=!hexchars:~%%r,1!"
set "hexline=!hexline!!hex!"
)
echo !hexline!
set /a "delay=!random! %% 5 + 1"
ping 127.0.0.1 -n 1 >nul
)
set "hexchars=0123456789ABCDEF"
:: Main operations menu
cls
echo =======================================================
echo TARGET ACQUISITION
echo =======================================================
echo.
set /p target="TARGET IP/DOMAIN: "
cls
echo [*] Initializing reconnaissance protocol...
echo [*] Spoofing MAC address: !random!:!random!:!random!:!random!:!random!
ping 127.0.0.1 -n 2 >nul
echo [*] Routing through !random!.!random!.!random!.!random!
ping 127.0.0.1 -n 2 >nul
echo [+] Connection anonymized via 7-hop circuit
echo.
echo [*] Scanning target: %target%
echo [*] Conducting SYN stealth scan...
for %%p in (22 80 443 21 25 53 110 143 3306 3389 8080 8443) do (
set /a "delay=!random! %% 3 + 1"
echo [•] Port %%p: !delay!ms response - !random! bytes
ping 127.0.0.1 -n 1 >nul
)
echo [+] Scan completed: 12 open ports detected
echo.
echo [*] Fingerprinting services...
for /L %%i in (1,1,8) do (
echo [*] Service %%i/8: Analyzing banners...
ping 127.0.0.1 -n 1 >nul
)
echo [+] Identified: Apache/2.4.41, OpenSSH 8.2, MySQL 5.7
echo.
echo [*] Vulnerability assessment in progress...
set /a vuln=!random! %% 5 + 3
for /L %%i in (1,1,!vuln!) do (
echo [•] CVE-202!random:~-1!-!random:~-4!: CVSS !random:~-1!.!random:~-1!
ping 127.0.0.1 -n 1 >nul
)
echo [+] !vuln! exploitable vulnerabilities found
echo.
echo [*] Deploying Metasploit module...
echo [*] Payload: reverse_tcp x64/meterpreter
echo [*] LHOST: 10.!random:~-1!.!random:~-1!.!random:~-1!
echo [*] LPORT: 44!random:~-2!
for /L %%i in (1,1,15) do (
echo [>] Sending stage %%i/15 (8192 bytes)...
ping 127.0.0.1 -n 1 >nul
)
echo [+] Meterpreter session opened
echo.
echo [*] Privilege escalation attempt...
echo [*] Checking sudo permissions...
ping 127.0.0.1 -n 2 >nul
echo [*] Exploiting CVE-2021-4034...
for /L %%i in (1,1,10) do (
set /a progress=%%i*10
echo [!progress!%%] Escalating privileges...
ping 127.0.0.1 -n 1 >nul
)
echo [+] Root access obtained (UID 0)
echo.
echo [*] Establishing persistence...
echo [*] Creating cronjob...
echo [*] Installing SSH backdoor...
echo [*] Obfuscating artifacts...
ping 127.0.0.1 -n 3 >nul
echo [+] Persistence mechanisms deployed
echo.
echo [*] Exfiltrating data...
set files=("passwd" "shadow" "config.php" "database.sql" "keys.tar" "logs.zip")
for %%f in %files% do (
echo [↓] Downloading %%f (!random! MB)...
set /a speed=!random! %% 900 + 100
echo [•] Transfer rate: !speed! KB/s
ping 127.0.0.1 -n 1 >nul
)
echo [+] Exfiltration complete: 47.3 MB transferred
echo.
echo =======================================================
echo OPERATION SUCCESSFUL
echo =======================================================
echo [✓] Target compromised
echo [✓] Persistence established
echo [✓] Data exfiltrated
echo [✓] Logs cleaned
echo.
ping 127.0.0.1 -n 3 >nul
:: Stealth and cleanup
cls
color 0C
echo [*] Activating COVER PROTOCOL ALPHA...
echo [*] Deleting temporary files...
echo [*] Clearing bash history...
echo [*] Wiping log entries...
echo [*] Injecting false network traffic...
for /L %%i in (1,1,25) do (
set /a size=!random! %% 500 + 100
echo [•] Flooding with !size!KB of decoy data...
ping 127.0.0.1 -n 1 >nul
)
echo [*] Rotating exit node...
echo [*] Self-destructing payload...
echo.
ping 127.0.0.1 -n 2 >nul
cls
color 0A
echo =======================================================
echo SESSION TERMINATED SECURELY
echo =======================================================
echo.
echo [*] All connections severed
echo [*] Encryption keys destroyed
echo [*] Local cache purged
echo [*] No forensic artifacts detected
echo.
echo [OPERATION COMPLETE - RETURNING TO MAINFRAME]
ping 127.0.0.1 -n 4 >nul
:: Easter egg
if "%user%"=="neo" (
cls
color 0D
echo.
echo THE MATRIX HAS YOU
echo.
ping 127.0.0.1 -n 3 >nul
)