Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/symph0nia/maestro
Multilingual backdoor
https://github.com/symph0nia/maestro
assembly backdoor c cpp golang multilanguage nodejs perl python ruby rust
Last synced: 26 days ago
JSON representation
Multilingual backdoor
- Host: GitHub
- URL: https://github.com/symph0nia/maestro
- Owner: Symph0nia
- Created: 2024-03-12T03:31:33.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-05-09T08:19:07.000Z (6 months ago)
- Last Synced: 2024-10-12T11:23:06.550Z (26 days ago)
- Topics: assembly, backdoor, c, cpp, golang, multilanguage, nodejs, perl, python, ruby, rust
- Language: C++
- Homepage:
- Size: 16.6 KB
- Stars: 59
- Watchers: 2
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Maestro 后门
Maestro 后门程序是为在多种架构上运行的 Linux 系统设计的,采用多种编程语言编写,以确保其在不同环境下的高隐蔽性和灵活性。作为一个基础的后门工具,Maestro 提供了监听指定端口并接受来自攻击者连接的核心功能,使得用户可以远程控制受影响的系统。
由于 Maestro 只实现了最基本的后门功能,它可以作为开发更复杂后门应用的起点。开发者可以在此基础上扩展其功能,例如增加文件传输、执行远程命令、环境探测和数据加密通信等高级特性。这种设计方式允许个性化定制,满足特定安全测试或渗透任务的需求。
## 编译方法
### Assembly 语言
对于汇编语言编写的 Maestro,适用于 x86_64 架构的编译方法如下:
```shell
nasm -f elf64 maestro.asm -o maestro.o
ld maestro.o -o maestro
```### Go 语言
对于 Go 语言编写的 Maestro,支持多种架构的编译方法示例(以 Linux 平台和 amd64 架构为例):
```shell
GOOS=linux GOARCH=amd64 go build -o maestro ./maestro.go
```### Python 语言
对于 Python 语言编写的 Maestro,编译方法示例(以 Linux 平台和 amd64 架构为例):
```shell
pyinstaller --onefile maestro.py
```或者直接使用Python
```shell
python maestro.py
```### Rust 语言
对于 Rust 语言编写的 Maestro,编译方法示例(以 Linux 平台和 amd64 架构为例):
```shell
cargo build
```### Perl 语言
对于 Perl 语言编写的 Maestro,编译方法示例(以 Linux 平台和 amd64 架构为例):
```shell
pp -o maestro maestro.pl
```或者直接使用Perl
```shell
./maestro.pl
```## 后门连接方法
无论是哪种编译方法产生的 Maestro 后门程序,都可以通过以下命令与后门建立连接:
```shell
nc localhost 12345
```请确保您有足够的权限在目标系统上执行这些操作,并注意使用后门与系统进行交互可能会引起安全问题,请在合法的范围内使用。
README使用GPT4生成
------
# Maestro Backdoor
The Maestro backdoor program is designed for Linux systems running on various architectures and is written in multiple programming languages to ensure high stealthiness and flexibility in different environments. As a basic backdoor tool, Maestro provides the core functionality of listening on a specified port and accepting connections from attackers, allowing users to remotely control affected systems.
Since Maestro implements only the most basic backdoor functions, it serves as a starting point for developing more complex backdoor applications. Developers can extend its functionality, for example, by adding file transfer, remote command execution, environment probing, and encrypted communications. This design approach allows for customization to meet specific security testing or penetration tasks.
## Compilation Method
### Assembly Language
For Maestro written in assembly language, suitable for the x86_64 architecture, the compilation method is as follows:
```shell
nasm -f elf64 maestro.asm -o maestro.o
ld maestro.o -o maestro
```### Go Language
For Maestro written in Go language, supporting various architectures (example for Linux platform and amd64 architecture):
```shell
GOOS=linux GOARCH=amd64 go build -o maestro ./maestro.go
```### Python Language
For Maestro written in Python, an example of the compilation method (for Linux platform and amd64 architecture) is as follows:
```shell
pyinstaller --onefile maestro.py
```Or, you can directly use Python:
```shell
python maestro.py
```### Rust Language
For Maestro written in Rust, an example of the compilation method (for the Linux platform and amd64 architecture) is as follows:
```shell
cargo build
```### Perl Language
For Maestro written in Perl, an example of the compilation method (for the Linux platform and amd64 architecture) is as follows:
```shell
pp -o maestro maestro.pl
```Or, you can directly use Perl:
```shell
./maestro.pl
```## Backdoor Connection Method
Regardless of the compilation method used to produce the Maestro backdoor program, you can establish a connection with the backdoor using the following command:
```shell
nc localhost 12345
```Ensure you have sufficient permissions to perform these operations on the target system and be aware that interacting with the system through a backdoor may pose security risks. Please use it within legal boundaries.
README By GPT4