Socket Based Backdoor and Listener

Overview

Socket Based Backdoor and Listener



Project Description 🧾 πŸ‘¨β€πŸ« :-


The Project is mainly based on Sockets πŸ”Œ , File Handling and subprocess library for Creating For Hacking πŸ’€ into one's Computer (Any OS-Platform Service) and listening on your computer and waiting for Connections and Running system Commands from Your Computer to the target Computer for which Output will be Displayed On your Computer. πŸ‘ πŸ‘



Project Features ✍ ✍ ✍ :-


  • Listeners are used to recieve the incomming Data from the Target Computer πŸ‘‚
  • Backdoors are Used to Execute on target Computer to send the data πŸ“©
  • Once the Connection is made you can write any command on Listener and Execute
  • Any Command Executed on listener will be executed silently in the Target Machine
  • Output Will be Displayed on listener machine
  • All the Target OS Commands Can Be Executed On Listener
  • Backdoors are made Persistent So you Won't lose Connection Once the Computer Restarts IT WILL BE BACK!!!
  • You Can Convert the python files into any target machine Executable so it's not Suspicious


Usage (For Testing Purposes) :


Step 1: Use Virtual Box and Install any Linux OS and bridge the wifi Adapter in network Settings
Step 2: Head to Command Line and edit execute_Listener.py and enter the IP address of Linux Machine wherever mentioned:

ifconfig 

(For getting IP address on eth0)
Step 3: Execute the execute_Listener.py file:

python3 execute_Listener.py

(remember:- listener.py should be in same directory)

Step 4: Head Over to Target Machine (Example Windows OS) and change the IP address of execute_backdoor similiar to listener's IP:

Step 5: Execute the execute_backdoor.py file:

python3 execute_backdoor.py

(remember:- reverse_backdoor.py should be in same directory)


## **AND YOU ARE SET TO GO !!!** go to the listener and execute any system commands you would like (eg : cd)

# Additional Features ⭐ ⭐ 🌟 🌟 🌟 :
- USE THE Following command to download any file from target's current working directory ``` download (filename) ```
  • USE THE Following command to upload any file from listener's current working directory to target's working Directory:
upload (filename)



For Education Purpose Only. Thank you !!

You might also like...
OptiPLANT is a cloud-based based system that empowers professional and non-professional data scientists to build high-quality predictive models

OptiPLANT OptiPLANT is a cloud-based based system that empowers professional and non-professional data scientists to build high-quality predictive mod

DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.

What is DNSStager? DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create a malic

πŸ› Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol.
πŸ› Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol.

HBot Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol. Modern script fullly written in python3. Warning. This

Raspberry Pi Based Serial Console Server, with PushBullet Notification of IP changes, Automatic VPN termination, custom menu, Power Outlet Control, and a lot more
Raspberry Pi Based Serial Console Server, with PushBullet Notification of IP changes, Automatic VPN termination, custom menu, Power Outlet Control, and a lot more

ConsolePi Acts as a serial Console Server, allowing you to remotely connect to ConsolePi via Telnet/SSH/bluetooth to gain Console Access to devices co

A database-based CDN node supporting PostgreSQL and MongoDB backends.
A database-based CDN node supporting PostgreSQL and MongoDB backends.

A simple to use database-based deployable CDN node for hobbyist developers who wish to have their own CDN!

A web-based app that allows easy, simple - and if desired high-throughput - analysis of qPCR data
A web-based app that allows easy, simple - and if desired high-throughput - analysis of qPCR data

qpcr-Analyser A web-based GUI for the qpcr package that allows easy, simple and high-throughput analysis of qPCR data. As is described in more detail

This is a python based command line Network Scanner utility, which input as an argument for the exact IP address or the relative IP Address range you wish to do the Network Scan for and returns all the available IP addresses with their MAC addresses on your current Network.

This is a python based command line Network Scanner utility, which input as an argument for the exact IP address or the relative IP Address range you wish to do the Network Scan for and returns all the available IP addresses with their MAC addresses on your current Network.

A Python based command line ARP Spoofer utility, which takes input as arguments for the exact target IP and gateway IP for which you wish to Spoof ARP request

A Python based command line ARP Spoofer utility, which takes input as arguments for the exact target IP and gateway IP for which you wish to Spoof ARP request

Network-Shredder is a python based NIDS.
Network-Shredder is a python based NIDS.

Network-Shredder is a python based NIDS.

Releases(v.1.0.0)
  • v.1.0.0(May 28, 2021)

    Socket Based Backdoor and Listener



    Project Description πŸ§ΎπŸ‘¨β€πŸ« :-


    The Project is mainly based on Sockets πŸ”Œ , File Handling and subprocess library for Creating For Hacking πŸ’€ into one's Computer (Any OS-Platform Service) and listening on your computer and waiting for Connections and Running system Commands from Your Computer to the target Computer for which Output will be Displayed On your Computer. πŸ‘πŸ‘



    Project Features ✍✍✍ :-


    • Listeners are used to recieve the incomming Data from the Target Computer πŸ‘‚
    • Backdoors are Used to Execute on target Computer to send the data πŸ“©
    • Once the Connection is made you can write any command on Listener and Execute
    • Any Command Executed on listener will be executed silently in the Target Machine
    • Output Will be Displayed on listener machine
    • All the Target OS Commands Can Be Executed On Listener
    • Backdoors are made Persistent So you Won't lose Connection Once the Computer Restarts IT WILL BE BACK!!!
    • You Can Convert the python files into any target machine Executable so it's not Suspicious
    Source code(tar.gz)
    Source code(zip)
Owner
Shivansh Mehta
I am a Full Stack Web DeveloperπŸ€–. I am an Aspring ProgrammerπŸ˜ͺ.I always stay self-Motivated to Learn New things.πŸ˜€ I am also Professional teacher in PythonπŸ‘“
Shivansh Mehta
this is demo of tool dosploit for test and dos in network with python

this tool for dos and pentest vul SKILLS: syn flood udp flood $ git clone https://github.com/amicheh/demo_dosploit/ $ cd demo_dosploit $ python3 -m pi

yaser amir chehrazi 5 Sep 22, 2022
Linux SBC featuring two wifi radios, masquerading as a USB charger.

The WiFiWart is an open source WiFi penetration device masquerading as a regular wall charger. It features a 1.2Ghz Cortex A7 MPU with two WiFi chips onboard.

Walker 151 Dec 26, 2022
Modern Denial-of-service ToolKit for python

πŸ’£ Impulse Modern Denial-of-service ToolKit πŸ’» Main window πŸ“‘ Methods: Method Target Description SMS PHONE Sends a massive amount of SMS messages and

1 Nov 29, 2021
This will generate a very basic DHCP config with use of PHPIPAM systems.

phpipam-dhcp-config-generator This will generate a very basic DHCP config with use of PHPIPAM systems. Requirements PHPIPAM Custom Fields domain_name

1 Oct 24, 2021
Socket Based Backdoor and Listener

The Project is mainly based on Sockets , File Handling and subprocess library for Creating backdoors For Hacking into one's Computer (Any OS-Platform Service) and listening on your computer and waiti

Shivansh Mehta 3 May 31, 2021
Monitoring plugin to check network interfaces with Icinga, Nagios and other compatible monitoring solutions

check_network_interface - Monitor network interfaces This is a monitoring plugin for Icinga, Nagios and other compatible monitoring solutions to check

DinoTools 3 Nov 15, 2022
The sequel to SquidNet. It has many of the previous features that were in the original script, however a lot of the functions that do not serve much functionality have been removed.

SquidNet2 The sequel to SquidNet. It has many of the previous features that were in the original script, however a lot of the functions that do not se

DrSquidX 5 Mar 25, 2022
Herramienta para transferir eventos de Shadowserver REST API hacia Azure Blob Storage.

Herramienta para transferir eventos de Shadowserver REST API hacia Azure Blob Storage.

CSIRT-RD 1 Feb 04, 2022
The Delegate Network: An Interactive Voice Response Delegative Democracy Implementation of Liquid Democracy

The Delegate Network Overview The delegate network is a completely transparent, easy-to-use and understand version of what is sometimes called liquid

James Bowery 2 Feb 25, 2022
It can be used both locally and remotely (indicating IP and port)

It can be used both locally and remotely (indicating IP and port). It automatically finds the offset to the Instruction Pointer stored in the stack.

DiegoAltF4 13 Dec 29, 2022
libsigrok stacked Protocol Decoder for TPM 2.0 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automatically extracted.

libsigrok stacked Protocol Decoder for TPM 2.0 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automatically extracted.

Jordan Ovrè 9 Dec 26, 2022
A project that forwards data it receives in a URL POST Request to a Discord Webhook link

Mailman Mailman is a project that basically just forwards data it receives in a URL POST Request to a Discord Webhook link and act as a sort of messag

Prakhar Trivedi 2 Mar 14, 2022
Slowloris is basically an HTTP Denial of Service attack that affects threaded servers.

slowrise-ddos-tool What is Slowloris? Slowloris is basically an HTTP Denial of S

DEMON cat 4 Jun 19, 2022
A protocol or procedure that connects an ever-changing IP address to a fixed physical machine address

p0znMITM ARP Poisoning Tool What is ARP? Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-changing IP address to a f

Furkan OZKAN 9 Sep 18, 2022
Python implementation of the IPv8 layer provide authenticated communication with privacy

Python implementation of the IPv8 layer provide authenticated communication with privacy

203 Oct 26, 2022
Mini SCADA. Poll modbus devices by TCP/IP network.

Plans Add saving and loading devices and channels with files or db or someone else. Multitasking system for poll all devices Automatic optimization po

Efi_fi 1 Oct 25, 2021
Network monitoring tool

netmeter If you are looking for a tool to monitor your network interfaces, here you are. See netmeter-exporter to export Prometheus metrics. Installat

Saeid Bostandoust 97 Dec 03, 2022
Heroku Cloudflare App Domain

Heroku Cloudflare App Domain Creating branded herokuapp.com-like domains using Cloudflare, based on the app name (eg my-app-prod.example.com). Feature

Torchbox 2 Oct 04, 2022
A collection of domains, wildcards and substrings designed for dnscrypt-proxy filter method.

A collection of domains, wildcards and substrings designed for dnscrypt-proxy filter method.

3 Oct 25, 2022
telnet implementation over TCP socket with python

This a P2P implementation of telnet. This program transfers data on TCP sockets as plain text

10 May 19, 2022