C2 extensible for post-explotation and remote control
-
Updated
Mar 4, 2024 - C
C2 extensible for post-explotation and remote control
A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process , spawning a POWERSHELL on the attacker machine.
A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (POWERSHELL) FROM THE VICTIM MACHINE TO THE ATTACKER CONSOLE , OVER LAN AND WAN.
Add a description, image, and links to the fud topic page so that developers can more easily learn about it.
To associate your repository with the fud topic, visit your repo's landing page and select "manage topics."