This is a functional version but it is also a very simple one and has a couple of bugs that had been corrected already. I'm uploading that soon.
I made this project just for fun and I am currently working on it to improve it and incorporate an interface. The reverse connection module is still not working properly.
To expose it to the internet, redirect with TCP not with HTTP. Example: ngrok tcp 8080. We are working with sockets.
Additionally, you can find some commands that can be executed in NOTES.txt. We can schedule the executable as a task to run at intervals to re-establish the connection.
We can use curl along with the Hermes, Loki, and Hestia servers.
Later on, my aim is to automate all of these tasks.
For now, ports and hosts can be customized on the code.
-Maat: Grants comprehensive access to target systems, facilitating command execution, file manipulation, and reconnaissance. Based on sockets. TCP.
-MaatReverse: Establishes a covert bind connection, enabling communication from the target to the operator's server. The target acts like server and waits for connections. Bind shell. Still working on it ;)
-Hestia: Endpoint for file retrieval from the target system. It has 2 modules, one with public ip checker and the other only resolves local hosts. Server. Port: 5000
-Loki: Allows file downloads from target systems. Server. Port: 8000
-Hermes: Injects files into target systems, seamlessly integrating them into directories for future use. Server. Port: 3030
-Argos: Captures target screen activity, providing a visual file. Server. Port: 3030