Skip to content
MoP - "Master of Puppets" - Advanced malware tracking framework
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.
docs minor fix Aug 8, 2019
plugins first commit Aug 8, 2019
resources first commit Aug 8, 2019
stage_props first commit Aug 8, 2019
LICENSE updated docs url Aug 8, 2019
config.yaml first commit Aug 8, 2019 first commit Aug 8, 2019
requirements.txt first commit Aug 8, 2019



MoP ("Master of Puppets") is an open source framework for reverse engineers who wish to create and operate trackers for new malware found in the wild for research purpose. To make it simple - MoP framework takes care of all the generic malware tracker stuff so the reverse engineer is left with pure reverse engineering work, You only need to implement a simple plugin on top of MoP which describes the malware's network protocol. MoP ships with a variety of workstation simulation capabilities, such as: fake filesystem manager, fake process manager, multi-worker orchestration, TOR integration and more. All aiming to deceive adversaries into interacting with our simulated environment and possibly drop new unique samples. Since everything is done in pure python, no virtual machines or Docker containers are needed and no actual malicious code is executed. All of which enables us to scale up in a click of a button, connecting to potentially thousands of different malicious servers at once from a single instance running on a single laptop. MoP framework comes with a number of pre-built plugins for known RATs, such as NjRAT and Gh0stRAT, Which have been showcased live at BlackHat Arsenal 2019!

Use Cases

  1. Collecting new variant of known malware (old school tracker approach):

Track few specific known malware for long time, fetch updates / new configuration.

  1. Collect new malware samples (honypot-tracker hybrid approach):

Connect to many RAT clients(operators) simultaneously and start collecting unique dropped samples.

  1. War Games

Troll your red-team: serve funny "stolen" files, keylogging, etc...


git checkout && cd mop
pip3 install -r requirements.txt --target-ip X.X.X.X --target-port 5552 --plugin-name plugins.njrat.NjRAT 

Targets Configuration

To add or remove targets you can simply create a new yaml file, follow the format:

  <unique name 0>:
    ip: <ip>
    port: <port>
    plugin: <plugin>
  <unique name 1>:
    ip: <ip>
    port: <port>
    plugin: <plugin>

After you are done run the orchestrator in the following manner to make sure everything works: --targets-config <filename>


The framework could be easily extended to support new RATs. If you wish to do so please create new Python file named after the RAT under the 'plugins' directory. This file should contain at least one class which implements a new PuppetRAT, make sure to override both 'register' and 'loop' methods, example:

class MyRAT(PuppetRAT):
    def register(self):
    def loop(self):
        while True:



  • Python 3

Supported Platforms

MoP has been tested on Ubuntu 18.04 and Windows 10

Supported RATs

  • NjRAT(0.7d)
  • Gh0stRAT(3.6)
You can’t perform that action at this time.