https://github.com/cpscript/ngrok-backdoor
A EASY TO USE `Ngrok` backdoor creator on a IP:PORT
https://github.com/cpscript/ngrok-backdoor
backdoor backdoor-attacks backdoorpython backdoors bash easy-to-use hacking-tool netcat ngrok ngrok-server python shell
Last synced: about 2 months ago
JSON representation
A EASY TO USE `Ngrok` backdoor creator on a IP:PORT
- Host: GitHub
- URL: https://github.com/cpscript/ngrok-backdoor
- Owner: CPScript
- Created: 2023-04-10T22:12:29.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2024-01-08T05:59:52.000Z (over 1 year ago)
- Last Synced: 2025-05-05T01:40:15.294Z (about 2 months ago)
- Topics: backdoor, backdoor-attacks, backdoorpython, backdoors, bash, easy-to-use, hacking-tool, netcat, ngrok, ngrok-server, python, shell
- Language: Python
- Homepage:
- Size: 28.3 KB
- Stars: 9
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
> how to use
* 1. root yourself: `sudo su`
* 2. run script: `python Saturn.py`# Whats going on??
1. The script first `prints out a banner` and then asks the user to `choose an option`. The options are:
* Linux (Recommended)
* Windows (Harder to use)
* Listen (Connect to a port)
* Exit (Stop this software)
2. If the user chooses the Linux option, the script will ask for an IP address and a port number. It then writes a C program to a file named `.linux.c`. This program creates a socket, connects to the specified IP and port, and then executes a shell `(/bin/sh)`. The compiled executable is saved as Saturn-Linux.
4. If the user chooses the Windows option, the script behaves similarly but writes a C program for Windows instead. The compiled executable is saved as Saturn-Windows.exe.
5. If the user chooses the Listen option, the script `starts a netcat listener` on the specified port.
6. If the user chooses the Exit option, the script exits.
7. After creating the backdoor, the script uses ngrok to expose the local server running on port 80 to the internet. It then prints out the URL where the backdoor can be accessed.