• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

GodGenesis: Python3 based C2 server to bypass all the known antiviruses and endpoints

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,455
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
175554898-58c56076-7cf9-4b1d-9d5d-2f2b27a9c0e3.png


God Genesis is a C2 server purely coded in Python3 created to help Red Teamers and Penetration Testers. Currently, It only supports TCP reverse shell but waits a min, it’s a FUD and can give an admin shell from any targeted WINDOWS Machine.

The List Of Commands It Supports:-

===================================================================================================
BASIC COMMANDS:
===================================================================================================
help –> Show This Options
terminate –> Exit The Shell Completely
exit –> Shell Works In Background And Prompted To C2 Server
clear –> Clear The Previous Outputs

===================================================================================================
SYSTEM COMMANDS:
===================================================================================================
cd –> Change Directory
pwd –> Prints Current Working Directory
mkdir *dir_name* –> Creates A Directory Mentioned
rm *dir_name* –> Deletes A Directoty Mentioned
powershell [command] –> Run Powershell Command
start *exe_name* –> Start Any Executable By Giving The Executable Name

===================================================================================================
INFORMATION GATHERING COMMANDS:
===================================================================================================
env –> Checks Enviornment Variables
sc –> Lists All Services Running
user –> Current User
info –> Gives Us All Information About Compromised System
av –> Lists All antivirus In Compromised System

===================================================================================================
DATA EXFILTRATION COMMANDS:
===================================================================================================
download *file_name* –> Download Files From Compromised System
upload *file_name* –> Uploads Files To Victim Pc

===================================================================================================
EXPLOITATION COMMANDS:
===================================================================================================
persistence1 –> Persistance Via Method 1
persistence2 –> Persistance Via Method 2
get –> Download Files From Any URL
chrome_pass_dump –> Dump All Stored Passwords From Chrome Bowser
wifi_password –> Dump Passwords Of All Saved Wifi Networks
keylogger –> Starts Key Logging Via Keylogger
dump_keylogger –> Dump All Logs Done By Keylogger
python_install –> Installs Python In Victim Pc Without UI
Feature

1. The Payload.py is a FULLY UNDETECTABLE(FUD) use your own techniques for making an exe file. (Best Result When Backdoored With Some Other Legitimate Applications)
2. Able to perform privilege escalation on any Windows system.
3. Fud keylogger
4. 2 ways of achieving persistence
5. Recon automation to save your time.

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top