Saturday, October 15, 2022
HomeHackerA Python3 Primarily based C2 Server To Make Life Of Purple Teamer...

A Python3 Primarily based C2 Server To Make Life Of Purple Teamer A Bit Simpler. The Payload Is Succesful To Bypass All The Recognized Antiviruses And Endpoints




God Genesis is a C2 server purely coded in Python3 created to assist Purple Teamers and Penetration Testers. Presently It solely helps TCP reverse shell however wait a min, its a FUD and may give u admin shell from any focused WINDOWS Machine.

The Checklist Of Instructions It Helps :-

                ===================================================================================================
BASIC COMMANDS:
===================================================================================================
assist --> Present This Choices
terminate --> Exit The Shell Fully
exit --> Shell Works In Background And Prompted To C2 Server
clear --> Clear The Earlier Outputs

===================================================================================================
SYSTEM COMMANDS:
===================================================================================================
cd --& gt; Change Listing
pwd --> Prints Present Working Listing
mkdir *dir_name* --> Creates A Listing Talked about
rm *dir_name* --> Deletes A Directoty Talked about
powershell [command] --> Run Powershell Command
begin *exe_name* --> Begin Any Executable By Giving The Executable Title

===================================================================================================
INFORMATION GATHERING COMMANDS:
===================================================================================================
env --> Checks Enviornment Variables
sc --> Lists All Providers Working
consumer --> Present Person
data --> Provides Us All Data About Compromised System
av --> Lists All antivirus In Compromised System

===================================================================================================
DATA EXFILTRATION COMMANDS:
===================================================================================================
obtain *file_name* --> Obtain Information From Compromised System
add *file_name* --> Uploads Information To Sufferer Computer

===================================================================================================
EXPLOITATION COMMANDS:
========================================================== =========================================
persistence1 -->
Persistance By way of Technique 1
persistence2 --> Persistance By way of Technique 2
get --> Obtain Information From Any URL
chrome_pass_dump --> Dump All Saved Passwords From Chrome Bowser
wifi_password --> Dump Passwords Of All Saved Wifi Networks
keylogger --> Begins Key Logging By way of Keylogger
dump_keylogger --> Dump All Logs Carried out By Keylogger
python_install --> Installs Python In Sufferer Computer With out UI

Verify The Video To Get A Element Information

1. The Payload.py is a FULLY UNDETECTABLE(FUD) use your individual strategies for making an exe file. (Finest Consequence When Backdoored With Some Different Reliable Applictions)
2. In a position to carry out privilege escalation on any home windows techniques.
3. Fud keylogger
4. 2 methods of attaining persistance
5. Recon automation to save lots of your time.

How To Use Our Instrument :

git clone https://github.com/SaumyajeetDas/GodGenesis.git

pip3 set up -r necessities.txt

python3 c2c.py

It’s value mentioning that Suman Chakraborty have contributed within the framework by coding the the the Fud Keyloger, Wifi Password Extraction and Chrome Password Dumper modules.

Dont Neglect To Change The IP ADDRESS Manually in each c2c.py and payload.py



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments