GodGenesis: A TCP reverse Shell C2 server based on Python 3

0 19
About GodGenesisGodGenesis is a C2 server developed based on pure Python 3, desi...

About GodGenesis

GodGenesis is a C2 server developed based on pure Python 3, designed to assist red team researchers in completing penetration testing tasks. The current version of GodGenesis only supports TCP reverse Shell, but don't worry, the tool can also help us obtain an administrator Shell from any target Windows device.

Feature Introduction

1. Pure Python 3 development;

GodGenesis: A TCP reverse Shell C2 server based on Python 3

2. C2 Server;

3. Provide TCP reverse Shell;

4. Obtain an administrator Shell from any Windows device;

Tool Installation

Since this tool is developed based on pure Python 3, we first need to install and configure the Python 3 environment on the device. Next, use the following commands to clone the source code of this project locally:

git clone https://github.com/SaumyajeetDas/GodGenesis.git

Next, use pip3 and requirements.txt to install and configure the dependency components required by the tool:

pip3 install -r requirements.txt

python3 c2c.py

Supported commands

Basic commands

help: Display tool help information;

terminate: Completely terminate and exit the Shell;

exit: Let the Shell run in the background and display the C2 server command line;

clear: Clear command line output; 

System commands

cd: Modify the current directory;

pwd: Display the current working directory;

mkdir *dir_name*: Create a directory;

rm *dir_name*: Delete a directory;

powershell [command]: Run PowerShell commands;

start *exe_name*: Start an executable program;

Information collection commands

env: Check environment variables;

sc: View all running processes;

user: Display the current user;

info: Display all information on the target system;

av: Display all antivirus products on the target system;

Data extraction commands

download *file_name*: Download a file from the target system;

upload *file_name*: Upload a file to the target system;

Exploit commands

persistence1: Implement persistence through method 1;

persistence2: Implement persistence through method 2;

get: Download files from any URL;

chrome_pass_dump: Export all stored passwords from the Chrome browser;

wifi_password: Export all stored WiFi network passwords;

keylogger: Enable the keyboard recording tool;

dump_keylogger: Export all keyboard records;

python_install: Install Python on the target device (no UI);

Tool usage demonstration

Video address:【Click to watch

License Agreement

The development and release of this project followMITOpen Source License Agreement.

Project address

GodGenesis:【GitHub Gateway

Reference materials

https://github.com/ANON4MOUS

你可能想看:

Data Compliance for Businesses Going Global: The Relationship between CCPA and CPRA

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

Detailed analysis of Brute Ratel C4 1.2.2 Badger Shellcode

2.8 Continue to click the getTomcatWebServer method, find the initialize () method, and you can see the tomcat.start () method to start the Tomcat service.

EMOTET banking trojan is still active: shellcode release methods, infrastructure updates, and traffic encryption

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

最后修改时间:
admin
上一篇 2025年03月29日 08:58
下一篇 2025年03月29日 09:21

评论已关闭