https://github.com/0xravenspar/python-c2
A python control and comand server
https://github.com/0xravenspar/python-c2
Last synced: 3 months ago
JSON representation
A python control and comand server
- Host: GitHub
- URL: https://github.com/0xravenspar/python-c2
- Owner: 0xRavenspar
- License: mit
- Created: 2024-12-24T17:49:15.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2025-01-01T18:31:05.000Z (5 months ago)
- Last Synced: 2025-01-01T19:29:02.322Z (5 months ago)
- Homepage:
- Size: 1000 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
Python C2 Framework (Educational Purpose Only)
Overview
This is a Python-based Command-and-Control (C2) framework developed for educational purposes to demonstrate the concepts of C2 communication and remote task execution in cybersecurity. It is designed to help students, researchers, and cybersecurity enthusiasts learn how attackers manage compromised systems and how defenders can detect and mitigate such threats.Disclaimer: This tool is intended for educational purposes only. Unauthorized use of this software on systems without explicit permission is strictly prohibited and may violate laws and regulations. The authors are not responsible for any misuse.
Features
Customizable C2 Communication: Support for HTTP, WebSocket, or TCP communication.
Tasking System: Allows sending tasks like file retrieval, command execution, or system info collection.
Encryption Support: Secure communication using AES or RSA.
Modular Design: Easily extend functionality with custom modules.
Logging and Monitoring: Track all client connections and tasks.
Stealth Techniques: Demonstrates basic obfuscation for learning purposes.
Use Cases
Educational Demonstrations:Teach concepts of C2 frameworks.
Showcase how attackers manage compromised machines.
Analyze techniques for detecting and mitigating C2 traffic.
Defensive Research:Simulate attacks in a controlled environment.
Test defensive tools like IDS/IPS, firewalls, and antivirus solutions.
Red Team Practice:Practice creating and managing lightweight C2 systems for ethical purposes.
Ethical Usage
This project is designed for learning and research in controlled environments. Do not use this tool on systems you do not own or have explicit permission to test. Unauthorized use is illegal and unethical.Contributing
Contributions are welcome! Feel free to fork the repository and submit a pull request with improvements or new features.License
This project is licensed under the MIT License.Disclaimer
This project is a proof of concept for educational purposes only. Use it responsibly and within the boundaries of the law. The creators assume no liability for any misuse of this tool.