Skip to content
This repository has been archived by the owner on Nov 7, 2023. It is now read-only.

polymaster3313/Polyaccess

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Logo

low-profile C2 and RAT made in python

PROJECT HAS BEEN DISCONTINUED

thank you for the support

for educational purposes only

must be python 3.10 and above

Features:

>reverse shell
>keglogging
>registry persistence
>upload and download files
>undetectable to most AV vendors
>bypasses windows 10/11 security
>screenshot
>checkprivilege
>checkporn (through dns records)
>block website
>gets system information
>encrypt and decrypt files 
>privilege escalation
-weak service path
-alwaysinstallelevated
>copy clipboard content
>256 bit AES encryption tunneling
>encrypted payload generation
>decrypt chrome passwords (module)
>discord token logger (module)

Update

>Modules
>Shell with timeout

Upcoming features:

auto-enumeration
powershell support for modules

How to install

kali linux

  1. sudo chmod +x kali_install.sh

  2. ./kali_install.sh

other distros

  1. install python and add python to path

python 3.11 download link

  1. install the modules using pip install -r requirements.txt

How to use?

  1. Run control.py and run the startup first then build

  2. start the PolyC2.py on your machine and execute the payload generated on the target machine

there are more configurations in the config.py

How it works:

Untitled Diagram drawio

python to exe detection (nuitka): image image

Evading Bitdefender example:

https://www.youtube.com/watch?v=iqlV4gZxqIw&t=2s

PolyC2 setup: https://youtu.be/ZHbBuLTmJT4

PolyC2 demonstration: https://youtu.be/HQEc6uujZX0

Discord server for enquiries: https://discord.gg/3R3BaDrTPK

Releases

No releases published

Packages

No packages published

Languages