This project is a Python-based remote backdoor that allows a server to establish a connection with a target machine. It includes features like command execution, directory navigation, and file transfer (upload/download) with integrity verification.
- Persistent Connection: The backdoor attempts to reconnect if the connection is lost.
- Command Execution: Allows the server to execute shell commands on the target machine.
- File Transfer:
- Download files from the target machine.
- Upload files to the target machine.
- Uses MD5 hash verification to ensure file integrity.
- Session Management: Supports multiple command executions per session.
- Python 3.x
- Required Python libraries:
socket,subprocess,time,json,os,pyautogui,hashlib,termcolor,art
pip install termcolor art pyautogui- Modify the
HOST_IPandPORTin bothserver.pyandbackdoor.pyas needed. - Ensure the port is open on the server firewall for proper communication.
Run the following command on the server machine:
python server.pyRun the following command on the target machine:
python backdoor.pyThe backdoor will attempt to connect to the server every 10 seconds if the connection fails.
| Command | Description |
|---|---|
help |
Displays available commands |
:kill |
Terminates the connection |
cd <path> |
Changes directory on the target machine |
pwd |
Prints the current directory on the target |
download <file> |
Downloads a file from the target |
upload <file> |
Uploads a file to the target |
| Any shell command | Executes a shell command on the target |
fsociety> download secret.txtfsociety> upload exploit.exefsociety> cd C:\\Users\\User- If the connection times out frequently, ensure:
- The target machine can reach the server (check firewalls and network settings).
- The port is open and listening on the server.
- The backdoor script is running on the target.
- Ensure the file exists on the source machine.
- Check file permissions.
- Verify the MD5 hash to ensure file integrity.
This tool is for educational and authorized security testing purposes only. Unauthorized use is illegal and punishable by law. The author is not responsible for any misuse of this tool.