Skip to content

tararoshan/ccat

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ccat

Command & control after trespassing (ccat) is built as a durable backdoor for friendly hackers to continue interacting with a target machine after gaining root access. The name is inspired by the naming of Iranian Advanced Persistent Threats (APTs) as "kittens."

I originally wanted to write it in C (Ccat!), but I misinterpreted the project and only realized it on Monday, two days before the project was due. I'd like to come back to this in the future and create a C version as well. For now, it'll exist in python form only.

Resources & Credit

I used this Medium article to learn how to use the sockets, subprocess, and sys python libraries for building a reverse shell. I found similar resources here and here, as well as the official docs.

I used this tutorial from ancat to do process injection using python.

About

command & control after trespassing (ccat)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published