Skip to content

Latest commit

 

History

History
20 lines (17 loc) · 1.21 KB

README.md

File metadata and controls

20 lines (17 loc) · 1.21 KB

ccat

Command & control after trespassing (ccat) is built as a durable backdoor for friendly hackers to continue interacting with a target machine after gaining root access. The name is inspired by the naming of Iranian Advanced Persistent Threats (APTs) as "kittens."

I originally wanted to write it in C (Ccat!), but I misinterpreted the project and only realized it on Monday, two days before the project was due. I'd like to come back to this in the future and create a C version as well. For now, it'll exist in python form only.

Resources & Credit

I used this Medium article to learn how to use the sockets, subprocess, and sys python libraries for building a reverse shell. I found similar resources here and here, as well as the official docs.

I used this tutorial from ancat to do process injection using python.