Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/r00k5A58/pyc2
simple c2 written in python to demonstrate security concepts
https://github.com/r00k5A58/pyc2
Last synced: 10 days ago
JSON representation
simple c2 written in python to demonstrate security concepts
- Host: GitHub
- URL: https://github.com/r00k5A58/pyc2
- Owner: r00k5A58
- Created: 2017-03-29T19:24:42.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2018-09-17T04:52:05.000Z (about 6 years ago)
- Last Synced: 2024-07-31T13:15:47.887Z (3 months ago)
- Language: Python
- Size: 4.88 KB
- Stars: 13
- Watchers: 3
- Forks: 6
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - r00k5A58/pyc2 - simple c2 written in python to demonstrate security concepts (Python)
README
# pyc2
simple c2 written in python2 to demonstrate security concepts. use icmp echo requests and replies to trade base64 encoded commands and replies. Video explaining some of the security concepts and implementation decisions: https://www.youtube.com/watch?v=DHrEn7oK9vQrequires scapy (pip install scapy)
on a client computer, enter the c2 IP address in the c2_config.py file.
command_list.*client id* should be a list of commands, one per line, exactly how you would enter it into the cli. use echo >> command_list to add new commands to the file:
echo "cat /etc/passwd" >> command_list.*client id*
probably won't work on windows (i tried to get scapy running on windows 10 and gave up, you might have better success)
c2 server requires that icmp echo packets are ignored by the kernel:
in linux:
echo 1 >/proc/sys/net/ipv4/icmp_echo_ignore_all