Skip to content

Exploit-py/Command-Control-HTTP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

C&C Malware

This malware makes requests HTTP to an API made in flask that stores the commands and responses that works as a server.

This code was made in order to study how malware of this type works, any illegal use of this content will be at your own risk.

Autores

Suporte

Contact me: gabriel.passos.dev@gmail.com

Screenshots

Server (API)

App Screenshot

Hacker

App Screenshot

Deploy

Install requirements

  pip install -r requirements.txt

Run server

  python server_api.py

Run attacker

  python attacker.py

Run victim

  python victim.py

Related

CommandControl TCP

Stacks

Back-end: Flask, Python

About

This code works like command and control malware using HTTP requests for run commands.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages