Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jsmoreira02/koopashell
🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢
https://github.com/jsmoreira02/koopashell
c2-framework cybersecurity-tools hacking payload-generator reverse-shell rust shell-handler
Last synced: about 7 hours ago
JSON representation
🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢
- Host: GitHub
- URL: https://github.com/jsmoreira02/koopashell
- Owner: Jsmoreira02
- License: other
- Created: 2024-10-16T21:13:17.000Z (about 1 month ago)
- Default Branch: main
- Last Pushed: 2024-10-23T23:40:58.000Z (25 days ago)
- Last Synced: 2024-10-25T17:45:23.006Z (24 days ago)
- Topics: c2-framework, cybersecurity-tools, hacking, payload-generator, reverse-shell, rust, shell-handler
- Language: Rust
- Homepage:
- Size: 60.5 KB
- Stars: 9
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
README
![Untitled_design_1_-removebg-preview](https://github.com/user-attachments/assets/92ab35e6-ef63-4a9d-b0a5-93f4fcdbb60f)
#
| :exclamation: **Under active development** :exclamation: |
> C2, also known as Command and Control, refers to the infrastructure and techniques used by hackers to maintain control over compromised systems or networks. By establishing a connection with these compromised systems, hackers can execute their malicious activities
## About:
Koopa Shell is an advanced tool developed in Rust, designed as a Multiple Reverse TCP Shell Handler and Stage 0/1 C2 Framework, it elevates shell interactions by generating obfuscated PowerShell payload, ensuring both stealth and efficiency. Koopa Shell supports seamless connections across Linux and Windows environments, making it a versatile for working in diverse infrastructures.
- Support for multiple reverse TCP connections.
- Make quick and easy transitions between all your reverse shell connections
- Compatible with Linux and Windows systems.
- Improved functionality for controlling and using shell sessions.
- Generation of obfuscated powershell payloads to avoid detection.Made for pentest operations or attack simulations focused on evading initial detection and managing sessions in different environments.
| **New features and implementations will be continually added to the project** |
## New Features:
- 📌**NEW**: Added an easier way to connect to and navigate through sessions (Sessions index)
- 📌**NEW**: The format of the session IDs has been changed to hexadecimal (16 bit) code.
- 🕒 **Coming soon**: New payload types for linux and windows## Usage:
### Bypass Windows AV:
https://github.com/user-attachments/assets/2ec6d9dc-d92e-4c1f-bfe7-a44ac5cb11aa
### Multi sessions
https://github.com/user-attachments/assets/930dcd80-e409-4a02-aedb-8dbe44472945##
## Installation:
```
git clone https://github.com/Jsmoreira02/KoopaShell.git
cd KoopaShell
chmod +x install_dependencies.sh
bash install_dependecies.sh
```or
```bash
curl -o install_dependecies.sh https://raw.githubusercontent.com/Jsmoreira02/KoopaShell/main/install_dependecies.sh && bash install_dependecies.sh
```## Dependecies:
### Debian/Ubuntu:
> sudo apt-get install -y cmake g++ gcc zlib1g-dev libx11-dev libxext-dev libxrender-dev libxrandr-dev libxinerama-dev libxcursor-dev libxfixes-dev libx11-xcb-dev libxss-dev libxdmcp-dev libpng-dev pkg-config### Fedora/RHEL-based:
> sudo dnf install -y cmake gcc-c++ gcc zlib-devel libX11-devel libXext-devel libXrender-devel libXrandr-devel libXinerama-devel libXcursor-devel libXfixes-devel libXdmcp-devel libXss-devel libpng-devel pkg-config### Arch Linux-based:
> sudo pacman -Sy --needed cmake gcc gcc-libs zlib libx11 libxext libxrender libxrandr libxinerama libxcursor libxfixes libxdmcp libxss libpng pkgconf## Tribute:
I'd like to take a moment to express my absolute admiration for these offensive security programmers/researchers. They inspired me to decide to create this tool, and I really hope I can achieve this level of capability.
- [@t3l3machus](https://github.com/t3l3machus)
- [@Z4nzu](https://github.com/Z4nzu)
- [@loseys](https://github.com/loseys)
- [@Teach2Breach](https://github.com/Teach2Breach)### Contributions:
- 💪 If you have an idea for improvement and want to contribute to the performance of the code, you are more than welcome to submit a pull request.# Warning:
> I am not responsible for any illegal use or damage caused by this tool. It was written for fun, not evil and is intended to raise awareness about cybersecurity.***Have a good hack :D***