A third-party Gopher Assassin for the Havoc Framework
it's like the videogame :D
This is a 3rd Party agent for the Havoc C2 written in Golang, mainly written as a learning project, but I'm sure it's still useful.
By the time this is out, you can read more about what and why this is at my blog: here
Contributions welcome! I don't plan on updating this all too regularly, but if I have fun making it I might add more stuff over time.
Command | Description | Example |
---|---|---|
checkin |
Returns basic system info | checkin |
shell |
Run a command (executed through Go's os/exec ) |
shell netstat -ano |
kill |
Kills a process by PID | kill 31337 |
ls |
Lists files in a given directory | ls C:\Users\Administrator\Desktop |
ps |
Lists currently running processes | ps |
upload |
Uploads a file to a remote path | upload /opt/chisel.exe C:\Windows\Temp\Bruh.exe |
download |
Downloads a remote file to the loot folder | download C:\passwords.txt pwd.txt |
portscan |
TCP portscan on a single target. | portscan common 192.168.13.37 4 |
shellcode |
Load shellcode into the implant process using CreateThread |
shellcode 9090ccc3 |
execute-assembly |
Run .NET assemblies in memory | execute-assembly /opt/tools/Seatbelt.exe -group=user -q |
o7 |
The gopher dies :( | o7 |
Once you have your teamserver up, it's as simple as running the following:
- Attacking Machine:
python handler.py
- Target Machine:
./gopher47
You can use the Havoc GUI to compile it, or you can just edit the source code as you please and play with the Makefile, there isn't that much of it.
- Incorrect OS Name in Client - As of 1/1/24, Havoc has been restructured and is more particular about how it recieves the OS Version. Still WIP, but it just straight up doesn't support Linux operating systems right now. The current fix just makes a fake version number that at least lets the implant function, but I need to do some rewriting.
- Missing Information - mostly a laziness thing tbh, honestly didn't think I'd come back to this
I just wanted to have an actual Golang project put together that I can point to. But also, Golang is great for cross-compilation, has a good development ecosystem, and is much easier to write in than C/C++.
idk, but grow up. Obfuscate and customize it yourself, stop being a baby.
Golang, along with Rust and other languages, compile statically, meaning all of the libraries necessary to run the executable are baked into the binary, which adds up. If you want to reduce the size, I won't do it by default, but check out this link for some tips. UPDATE: I added an option to do some of this, but I'm sure there's more customization you could do :/
Bad question, if you read the code you'll find a number of things that aren't ideal. If you were really concerned about OPSEC, you'd have started reading the code by now and making fixes where they need to be done.
For now, not really. The current Havoc API only allows for one handler to be handled by one agent, and there really isn't a good, clean way to have multiple up at the same time. Reworks are in-progress but for now, there can only be one Gopher47.
No. As of version 0.4 of Havoc, there is no way to do a secure key exchange without straight up compromising keys. Once the system is reworked in the havoc-py interface, I will get that done. THEREFORE THIS IS NOT OPSEC SAFE please do not be stupid and use this in a real engagement, CTFs/labs are fine though
HTTPS will provide encryption, but use at your own risk.
I photoshopped a gun into the Golang gopher's hand for this at 1:00 AM.
- C5pider and the entire Havoc Framework team for letting me not have to write my own C2 to do some implant development
- Sliver and Merlin for pioneering (or at least innovating) a lot of Offensive Golang
- SharpAgent and PyHmmm were great
projects to steal fromreference material - OffensiveGolang has some neat Offensive Go work
- Ne0nd0g's fork of go-clr
- maldev-for-dummies also is a nice starting point for working with not C malware I definitely missed some but here's to trying o7
There is no way to make an offensive security relevant research tool and release it open source without the possibility of it falling into the wrong hands. This tool is only to be used for legal, ethical purposes including, but not limited to, research, security assessment, education.
TL;DR: Keep it legal y'all.