EaST Framework-2.0.0

Discussion in 'Scripts & Commands' started by r1sen, 1 Jan 2018.

  1. r1sen

    r1sen Well-Known Member
    Dev Team VIP

    22 Nov 2017
    Likes Received:
    RSF-2.2.1 and EaST-2.0.0 rev2

    Ok, so due to logging this cannot be wrapped into a standard .TCZ extension, it will continue flagging itself as running within a "read-only" file system. Python2.7 lib-dynload was compiled from source for this project. Modules work as well as local host server handler. However along with this .TCZ extension you will need to downloads the east "/home/tc" archived folder which needs to be extracted into your (/home/tc) directory. This package is only practical for Persistent/USB/HDD installs of TinyPaw, not intended for LiveBoot use.

    RSF 2.2.1 and the necessary python modules for both EaST and RSF can be found here:


    Archived EaST folder to be extracted in /home/tc directory can be found here:

    ***Must be named 'east' in the '/home/tc' folder - make sure of this***


    ***For those who DO NOT! understand what active exploit frameworks are, they are libraries of known vulnerabilities such as: Trojans, Remote Code Execution, Shells, etc - These libraries very well could trigger your antivirus so please keep that in mind***

    Step 1.) Download above file to your "/home/tc" directory.
    Step 2.) Unzip EaST-master.zip and rename to east within your "/home/tc" directory.
    Step 3.) After folder is decompressed install the above RSF/EaST .tcz extension.
    Step 4.) Add the following line to your onboot.lst file located in the "/mnt/sdb1/tce/" directory:


    ***Make sure to leave an extra line of empty space at the end of this file***

    Step 5.) Make sure to save your change to the onboot.lst file by either from the menu or "CTRL+S"
    Step 6.) Reboot your TinyPaw / Xiaopan / TCL 8.2.x compatible build.
    Step 7.) Upon reboot you will have the EaST icon added to your wbar, looks like a rocket.
    Step 8.) Click the EaST icon and in a terminal window you will see that a server daemon has started running on "localhost" port:80.
    Step 9.) Open a web browser (yes, one is needed) I use seamonkey due to support.
    Step 10.) Once you open a browser window enter in the address bar as follows: "http://localhost/"

    Step 11.) Now you will see your EaST 2.0.0 Framework GUI - Enjoy!

    TinyPaw at 2017-12-31 14:30:39.png TinyPaw at 2017-12-31 14:31:21.png TinyPaw at 2017-12-31 14:32:07.png TinyPaw 2018-01-01 18:14:42.png TinyPaw at 2018-01-01 18:16:12.png
    #1 r1sen, 1 Jan 2018
    Last edited: 3 Jan 2018
    • Like Like x 1
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.

    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K