Skip to content

Exploit-py/Command-Control-TCP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Command&Control

This malware consists of simulating a command and control attack. This code consists of a server in listen mode receiving connections ("victim.py") and a script that will make the connection. ("attacker.py").

The victim will receive commands from the attacker and these commands will be executed on your PC

This project was made with the intention of learning about how C&C malware works, the misuse of this code is categorized as a crime and I am not responsible for its actions.

Authors

Important Waring

Avoid terminating the program with "Ctrl + C" as it may cause a bug. You can end the program with "Ctrl + Z" in linux or by closing the terminal!

Screenshots

App Screenshot

App Screenshot

Deploy

Linux

  python3 victim.py
  python3 attacker.py

Windows

  python victim.py
  python attacker.py

About

This malware consists of simulating a command and control attack.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages