Tools designed for maintaining access to systems and proof-of-concept demonstrations written by the team at Hacker House. These tools are designed to simulate or demonstrate common persistence techniques such as kernel mode hooking and command & control implementations.
| File | Description |
|---|---|
| bindshell.go | bind shell example written in GoLang |
| bindshell.py | bind shell example writen in Python |
| cmdbot.py | Python bot to exec commands via IRC C2 |
| filehider.tgz | Linux kernel module for hiding files |
| halloween.py | Python script appender VX injection PoC |
| icmp.py | ICMP raw socket command execution |
| luna.tgz | AX.25 APRS C2 implementation PoC (works via satellite) |
| magicroot.tgz | Linux kernel module for "magic" root backdoor |
| MalwareTool.tgz | PE executable dropper via embedded resource |
| Peony.zip | Windows Defender Avbypass meterpreter harness |
| rubilyn-0.0.1.tar.gz | OS-X Lion 64bit rootkit example code |
| SYSTEMservice.tgz | Windows service persistent bind shell (SYSTEM) |
| StringCrypt.tgz | OS-X string encryptor for use with rubilyn |
| TrojanSource.zip | Web based C2 implant to capture screen & keystrokes |
| yolo-openssl.tgz | OpenSSL backdoor to add "yolo shellme" extension |
| Zombie.tgz | Multi-threaded Linux backdoor with command execution |
These files are available under a Attribution-NonCommercial-NoDerivatives 4.0 International license.