Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/kleiton0x00/redditc2
Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.
https://github.com/kleiton0x00/redditc2
c2 cybersecurity hacking pentest pentesting reddit redteam
Last synced: about 11 hours ago
JSON representation
Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.
- Host: GitHub
- URL: https://github.com/kleiton0x00/redditc2
- Owner: kleiton0x00
- License: gpl-3.0
- Created: 2022-12-06T17:24:48.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2023-01-18T13:33:45.000Z (almost 2 years ago)
- Last Synced: 2024-05-02T02:21:12.470Z (7 months ago)
- Topics: c2, cybersecurity, hacking, pentest, pentesting, reddit, redteam
- Language: Python
- Homepage:
- Size: 3.65 MB
- Stars: 249
- Watchers: 7
- Forks: 44
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
RedditC2
Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.
---
> :no_entry_sign: [Disclaimer]: Use of this project is for **Educational/ Testing purposes only**. Using it on **unauthorised machines** is **strictly forbidden**. If somebody is found to use it for **illegal/ malicious intent**, author of the repo will **not** be held responsible.
---## Requirements
Install **PRAW** library in python3:
```bash
pip3 install praw
```## Quickstart
See the [Quickstart guide](https://github.com/kleiton0x00/RedditC2/wiki/Setup) on how to get going right away!## Demo
https://user-images.githubusercontent.com/37262788/206015879-589614d5-1a7a-4c21-a342-75bdfc677a61.mp4## Workflow
### Teamserver
1. Go to the specific Reddit Post & post a new comment with the command ("in: ")
2. Read for new comment which includes the word "out:"
3. If no such comment is found, go back to step 2
4. Parse the comment, decrypt it and read it's output
5. Edit the existing comment to "executed", to avoid reexecuting it### Client
1. Go to the specific Reddit Post & read the latest comment which includes "in:"
2. If no new comment is detected, go back to step 1
3. Parse the command out of the comment, decrypt it and execute it locally
4. Encrypt the command's output and reply it to the respective comment ("out:" )Below is a demonstration of the XOR-encrypted C2 traffic for understanding purposes:
![Screenshot from 2022-12-15 10-58-34](https://user-images.githubusercontent.com/37262788/207849406-6c221102-9352-46dc-a461-947b66e3a712.png)## Scanning results
Since it is a custom C2 Implant, it doesn't get detected by any AV as the bevahiour is completely legit.## TO-DO
- [X] Teamserver and agent compatible in Windows/Linux
- [X] Make the traffic encrypted
- [X] Add upload/download feature
- [ ] Add persistence feature
- [ ] Generate the agents dynamically (from the TeamServer)
- [X] Tab autocompletion## Credits
Special thanks to [@T4TCH3R](https://github.com/T4TCH3R/) for working with me and contributing to this project.