Command & control after trespassing (ccat) is built as a durable backdoor for friendly hackers to continue interacting with a target machine after gaining root access. The name is inspired by the naming of Iranian Advanced Persistent Threats (APTs) as "kittens."
I originally wanted to write it in C (Ccat!), but I misinterpreted the project and only realized it on Monday, two days before the project was due. I'd like to come back to this in the future and create a C version as well. For now, it'll exist in python form only.
I used this Medium article to learn how to use the sockets, subprocess, and sys python libraries for building a reverse shell. I found similar resources here and here, as well as the official docs.
I used this tutorial from ancat to do process injection using python.