{"id":20847276,"url":"https://github.com/jsmoreira02/koopashell","last_synced_at":"2025-05-12T02:31:18.500Z","repository":{"id":258403851,"uuid":"873864769","full_name":"Jsmoreira02/KoopaShell","owner":"Jsmoreira02","description":"🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢","archived":false,"fork":false,"pushed_at":"2024-10-23T23:40:58.000Z","size":62,"stargazers_count":9,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2024-10-25T17:45:23.006Z","etag":null,"topics":["c2-framework","cybersecurity-tools","hacking","payload-generator","reverse-shell","rust","shell-handler"],"latest_commit_sha":null,"homepage":"","language":"Rust","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Jsmoreira02.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE.md","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-10-16T21:13:17.000Z","updated_at":"2024-10-23T23:41:02.000Z","dependencies_parsed_at":"2024-10-18T21:09:08.440Z","dependency_job_id":"0a22353b-cc0a-4dc0-8f4c-fdf94fa3a15e","html_url":"https://github.com/Jsmoreira02/KoopaShell","commit_stats":null,"previous_names":["jsmoreira02/koopashell"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jsmoreira02%2FKoopaShell","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jsmoreira02%2FKoopaShell/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jsmoreira02%2FKoopaShell/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jsmoreira02%2FKoopaShell/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Jsmoreira02","download_url":"https://codeload.github.com/Jsmoreira02/KoopaShell/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":225115847,"owners_count":17423155,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["c2-framework","cybersecurity-tools","hacking","payload-generator","reverse-shell","rust","shell-handler"],"created_at":"2024-11-18T02:19:32.485Z","updated_at":"2025-05-12T02:31:18.461Z","avatar_url":"https://github.com/Jsmoreira02.png","language":"Rust","readme":"![Untitled_design_1_-removebg-preview](https://github.com/user-attachments/assets/92ab35e6-ef63-4a9d-b0a5-93f4fcdbb60f)\n\n#\n\n\u003cdiv\u003e\n    \u003cimg src=\"https://img.shields.io/badge/Language%20-Rust-darkorange.svg\" style=\"max-width: 100%;\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/Target OS%20-Linux, Windows-darkblue.svg\" style=\"max-width: 100%;\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/Cargo builds%20-clippers, rustyline, clap-beige.svg\" style=\"max-width: 100%;\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/License%20-CC BY_ND 4.0-lightgreen.svg\" style=\"max-width: 100%;\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/Type%20-C2 Like | Multi Handler-purple.svg\" style=\"max-width: 100%;\"\u003e\n    \n\u003c/div\u003e\u003c/br\u003e\n\n\n| :exclamation:  **Under active development**  :exclamation: |\n\n\u003e C2, also known as Command and Control, refers to the infrastructure and techniques used by hackers to maintain control over compromised systems or networks. By establishing a connection with these compromised systems, hackers can execute their malicious activities\n\n## About:\n\n \u003cimg src=\"https://github.com/user-attachments/assets/0707d58c-173f-4d7d-926f-b2098103b2ba\" width=69\u003e\n\nKoopa Shell is an advanced tool developed in Rust, designed as a Multiple Reverse TCP Shell Handler and Stage 0/1 C2 Framework, it elevates shell interactions by generating obfuscated PowerShell payload, ensuring both stealth and efficiency. Koopa Shell supports seamless connections across Linux and Windows environments, making it a versatile for working in diverse infrastructures.\n\n- Support for multiple reverse TCP connections.\n- Make quick and easy transitions between all your reverse shell connections\n- Compatible with Linux and Windows systems.\n- Improved functionality for controlling and using shell sessions.\n- Generation of obfuscated powershell payloads to avoid detection.\n\nMade for pentest operations or attack simulations focused on evading initial detection and managing sessions in different environments. \n\n| **New features and implementations will be continually added to the project** |\n\n\n## New Features:\n\n- 📌**NEW**: Added an easier way to connect to and navigate through sessions (Sessions index)\n- 📌**NEW**: The format of the session IDs has been changed to hexadecimal (16 bit) code.\n- 📌**NEW**: Create your own customized and more effective payloads at src/shell.rs\n\n## Usage:\n\n### Bypass Windows AV:\n\nhttps://github.com/user-attachments/assets/2ec6d9dc-d92e-4c1f-bfe7-a44ac5cb11aa\n\n\n### Multi sessions\nhttps://github.com/user-attachments/assets/930dcd80-e409-4a02-aedb-8dbe44472945\n\n##\n\n## Installation:\n\n```\n  git clone https://github.com/Jsmoreira02/KoopaShell.git\n  cd KoopaShell\n  chmod +x install_dependencies.sh\n  bash install_dependecies.sh\n```\n\nor\n\n```bash\n  curl -o install_dependecies.sh https://raw.githubusercontent.com/Jsmoreira02/KoopaShell/main/install_dependecies.sh \u0026\u0026 bash install_dependecies.sh\n```\n\n## Dependecies:\n\n### Debian/Ubuntu:\n\u003e sudo apt-get install -y build-essential pkg-config libssl-dev xclip xsel libx11-dev xorg-dev libxcb-composite0-dev libxext-dev \n\n### Fedora/RHEL-based:\n\u003e sudo dnf groupinstall \"Development Tools\"\n\u003e sudo dnf install -y cmake gcc-c++ gcc xclip xsel pkg-config ncurses-devel\n\n### Arch Linux-based: \n\u003e sudo pacman -S --needed --noconfirm base-devel gcc openssl pkgconf libxcb libx11\n\n## Tribute:\n\nI'd like to take a moment to express my absolute admiration for these offensive security programmers/researchers. They inspired me to decide to create this tool, and I really hope I can achieve this level of capability.\n\n- [@t3l3machus](https://github.com/t3l3machus)\n- [@Z4nzu](https://github.com/Z4nzu)\n- [@loseys](https://github.com/loseys)\n- [@Teach2Breach](https://github.com/Teach2Breach)\n\n\n### Contributions:\n- 💪 If you have an idea for improvement and want to contribute to the performance of the code, you are more than welcome to submit a pull request.\n\n# Warning:    \n\u003e I am not responsible for any illegal use or damage caused by this tool. It was written for fun, not evil and is intended to raise awareness about cybersecurity.\n\n***Have a good hack :D***\n\n\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjsmoreira02%2Fkoopashell","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjsmoreira02%2Fkoopashell","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjsmoreira02%2Fkoopashell/lists"}