Skip to content

🐒 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐒

License

Notifications You must be signed in to change notification settings

Jsmoreira02/KoopaShell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

39 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Untitled_design_1_-removebg-preview


| ❗ Under active development ❗ |

C2, also known as Command and Control, refers to the infrastructure and techniques used by hackers to maintain control over compromised systems or networks. By establishing a connection with these compromised systems, hackers can execute their malicious activities

About:

Koopa Shell is an advanced tool developed in Rust, designed as a Multiple Reverse TCP Shell Handler and Stage 0/1 C2 Framework, it elevates shell interactions by generating obfuscated PowerShell payload, ensuring both stealth and efficiency. Koopa Shell supports seamless connections across Linux and Windows environments, making it a versatile for working in diverse infrastructures.

  • Support for multiple reverse TCP connections.
  • Make quick and easy transitions between all your reverse shell connections
  • Compatible with Linux and Windows systems.
  • Improved functionality for controlling and using shell sessions.
  • Generation of obfuscated powershell payloads to avoid detection.

Made for pentest operations or attack simulations focused on evading initial detection and managing sessions in different environments.

| New features and implementations will be continually added to the project |

New Features:

  • πŸ“ŒNEW: Added an easier way to connect to and navigate through sessions (Sessions index)
  • πŸ“ŒNEW: The format of the session IDs has been changed to hexadecimal (16 bit) code.
  • πŸ“ŒNEW: Create your own customized and more effective payloads at src/shell.rs

Usage:

Bypass Windows AV:

Bypass.Windows.AV.mp4

Multi sessions

Shells.mp4

Installation:

  git clone https://github.com/Jsmoreira02/KoopaShell.git
  cd KoopaShell
  chmod +x install_dependencies.sh
  bash install_dependecies.sh

or

  curl -o install_dependecies.sh https://raw.githubusercontent.com/Jsmoreira02/KoopaShell/main/install_dependecies.sh && bash install_dependecies.sh

Dependecies:

Debian/Ubuntu:

sudo apt-get install -y build-essential pkg-config libssl-dev xclip xsel libx11-dev xorg-dev libxcb-composite0-dev libxext-dev

Fedora/RHEL-based:

sudo dnf groupinstall "Development Tools" sudo dnf install -y cmake gcc-c++ gcc xclip xsel pkg-config ncurses-devel

Arch Linux-based:

sudo pacman -S --needed --noconfirm base-devel gcc openssl pkgconf libxcb libx11

Tribute:

I'd like to take a moment to express my absolute admiration for these offensive security programmers/researchers. They inspired me to decide to create this tool, and I really hope I can achieve this level of capability.

Contributions:

  • πŸ’ͺ If you have an idea for improvement and want to contribute to the performance of the code, you are more than welcome to submit a pull request.

Warning:

I am not responsible for any illegal use or damage caused by this tool. It was written for fun, not evil and is intended to raise awareness about cybersecurity.

Have a good hack :D

About

🐒 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supports both Linux and Windows Connections 🐒

Topics

Resources

License

Stars

Watchers

Forks