F4T3H-WinC2
is a free, open-source tool targeting Windows-systems
Based on HTTP reversed shell.
This tool helps you to generate Fully UnDetectable (FUD) HTTP reversed shell With many features that you will find mentioned below.
that was programmed primarily for educational and self-challenging purpose. Any misuse of the tool, the author is not responsible for it.
I will write a full post about using this tool, I promise to cover all its aspects and how to take full advantage of it to ensure the best results.
Until then, you can follow my blog via the following link: 0xGHAZY
- Persistence.
- Geographical ip information.
- Port scanning.
- Navigation system.
- Sending files to the client machine.
- Downloading files from the client machine.
- Taking screenshots.
- Getting plaintext files content.
- Getting system information.
- Command execution.
- Calculating files MD5 hash value.
- Compiled to exe %100 work.
git clone https://github.com/0xGhazy/F4T3H-WinC2
pip3 install -r req.txt
here you will find the noip installation guide
https://www.noip.com/support/knowledgebase/installing-the-linux-dynamic-update-client/
[+] Note
If you encounter any problem running the tool, please do not hesitate and let me know.
By opening an Issue in the repo you make me aware of to improve the tool for you <3.
1- Forking a Repo 2- Cloning a Repo 3- Open a new issue and wait until the approvement 4- Creating Pull request - How to create a Pull Request
- Supporting multi clients.
- Supporting metasploit modules.
- Make
UploadServer.py
file runs fromF4T3H.py.
- Update list dir to be walk method.
- Adding HTTPS.
- improve
conf.py
file. - Adding vulnerability scanner.
Thank you guys for helping me through the journey of writing this tool.
HaBiba El-Sayed
Sameh Elisha
Ghada Saleh