https://github.com/varppi/dnsnet
backdoor that uses dns to communicate
https://github.com/varppi/dnsnet
backdoor backdoorpython command-and-control dns python3 red-team-engagement
Last synced: about 2 months ago
JSON representation
backdoor that uses dns to communicate
- Host: GitHub
- URL: https://github.com/varppi/dnsnet
- Owner: varppi
- License: gpl-3.0
- Created: 2022-02-28T12:05:10.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2025-08-09T06:52:07.000Z (2 months ago)
- Last Synced: 2025-08-09T08:38:05.803Z (2 months ago)
- Topics: backdoor, backdoorpython, command-and-control, dns, python3, red-team-engagement
- Language: Python
- Homepage:
- Size: 510 KB
- Stars: 34
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# dnsnet
# Current Version: ReleaseV2

# Description:
DNSNET masks itself as DNS traffic by communicating through the port 53. On top of it making the traffic less easy to spot,
it will make dealing with the backdoor alot harder since a company of course cannot block the port and good luck figuring
out which one of the 999999999 programs that also use the 53 port is the right one. The traffic is also encrypted so that's nice I guess.# Disclaimer:
Im not responsible for any damage or harm done by this program in the hands of other people.# Where is this used?:
I originally started coding this because I wanted a sure way to stealth backdoor victim machine during a red team/pen test assesments however
you can use it however you want (I'm not responsible for your actions).# Update log:
Alpha: 10 times encryption and stabile server endAlphaV2: Automatic reconnect if connection is lost and manual reset added by pressing ctrl + c on the server end, cryptography import problems solved
BetaV1: Backdoor now remembers where you cd'ed to allowing much better file system exploring, overall small fixes to make the backdoor more stable and usable
ReleaseV1: Complete redesign, coded from the ground up
ReleaseV2: File transfers added (download only)
# In development?: yes
# How to use (REPLACE "Listener ip" with the c2 ip):
```
git clone https://github.com/Varppi/dnsnet
cd dnsnet
pip3 install -r requirements.txt
python3 dnsnet.py --li Listener ip
```
then send the generated backdoor file to the target and execute it.# Technical Details:
Encryption: Fernet 32bit encryption (that times the keys)
Program: Python3