https://github.com/jsmoreira02/koopashell
🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢
https://github.com/jsmoreira02/koopashell
c2-framework cybersecurity-tools hacking payload-generator reverse-shell rust shell-handler
Last synced: 9 months ago
JSON representation
🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐢
- Host: GitHub
- URL: https://github.com/jsmoreira02/koopashell
- Owner: Jsmoreira02
- License: other
- Created: 2024-10-16T21:13:17.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-10-23T23:40:58.000Z (over 1 year ago)
- Last Synced: 2024-10-25T17:45:23.006Z (over 1 year ago)
- Topics: c2-framework, cybersecurity-tools, hacking, payload-generator, reverse-shell, rust, shell-handler
- Language: Rust
- Homepage:
- Size: 60.5 KB
- Stars: 9
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
README

#
| :exclamation: **Under active development** :exclamation: |
> C2, also known as Command and Control, refers to the infrastructure and techniques used by hackers to maintain control over compromised systems or networks. By establishing a connection with these compromised systems, hackers can execute their malicious activities
## About:

Koopa Shell is an advanced tool developed in Rust, designed as a Multiple Reverse TCP Shell Handler and Stage 0/1 C2 Framework, it elevates shell interactions by generating obfuscated PowerShell payload, ensuring both stealth and efficiency. Koopa Shell supports seamless connections across Linux and Windows environments, making it a versatile for working in diverse infrastructures.
- Support for multiple reverse TCP connections.
- Make quick and easy transitions between all your reverse shell connections
- Compatible with Linux and Windows systems.
- Improved functionality for controlling and using shell sessions.
- Generation of obfuscated powershell payloads to avoid detection.
Made for pentest operations or attack simulations focused on evading initial detection and managing sessions in different environments.
| **New features and implementations will be continually added to the project** |
## New Features:
- 📌**NEW**: Added an easier way to connect to and navigate through sessions (Sessions index)
- 📌**NEW**: The format of the session IDs has been changed to hexadecimal (16 bit) code.
- 📌**NEW**: Create your own customized and more effective payloads at src/shell.rs
## Usage:
### Bypass Windows AV:
https://github.com/user-attachments/assets/2ec6d9dc-d92e-4c1f-bfe7-a44ac5cb11aa
### Multi sessions
https://github.com/user-attachments/assets/930dcd80-e409-4a02-aedb-8dbe44472945
##
## Installation:
```
git clone https://github.com/Jsmoreira02/KoopaShell.git
cd KoopaShell
chmod +x install_dependencies.sh
bash install_dependecies.sh
```
or
```bash
curl -o install_dependecies.sh https://raw.githubusercontent.com/Jsmoreira02/KoopaShell/main/install_dependecies.sh && bash install_dependecies.sh
```
## Dependecies:
### Debian/Ubuntu:
> sudo apt-get install -y build-essential pkg-config libssl-dev xclip xsel libx11-dev xorg-dev libxcb-composite0-dev libxext-dev
### Fedora/RHEL-based:
> sudo dnf groupinstall "Development Tools"
> sudo dnf install -y cmake gcc-c++ gcc xclip xsel pkg-config ncurses-devel
### Arch Linux-based:
> sudo pacman -S --needed --noconfirm base-devel gcc openssl pkgconf libxcb libx11
## Tribute:
I'd like to take a moment to express my absolute admiration for these offensive security programmers/researchers. They inspired me to decide to create this tool, and I really hope I can achieve this level of capability.
- [@t3l3machus](https://github.com/t3l3machus)
- [@Z4nzu](https://github.com/Z4nzu)
- [@loseys](https://github.com/loseys)
- [@Teach2Breach](https://github.com/Teach2Breach)
### Contributions:
- 💪 If you have an idea for improvement and want to contribute to the performance of the code, you are more than welcome to submit a pull request.
# Warning:
> I am not responsible for any illegal use or damage caused by this tool. It was written for fun, not evil and is intended to raise awareness about cybersecurity.
***Have a good hack :D***