rhoskal / crispy-fortnight

Custom Python 2.7 RAT
MIT License
11 stars 9 forks source link
remote-access-trojan

crispy-fortnight

Custom, cross-platform Remote Access Terminal (RAT) coded in Python 2.7 built just for fun. The intent is to learn Python, understand the "inner-workings" of RAT's and improve detection of malicious behavior - not to create anything new. Features are added for purely educational learning, NOT for malicious activity! You are responsible for your own actions.

Generate Server RSA keys

Place these self-signed keys in crispy/crypto

How to run things

Run crispyd.py(local) and implant.py(remote) at the root of the project. Use "tail -f crispy.log" to follow the log file on the server.

Required Python libraries for crispyd server

Package manager install: python-dev python-pip pip install: rpyc psutil

pyinstaller

pyinstaller --onefile --hidden-import uuid --hidden-import psutil --hidden-import logging --hidden-import shlex implant.py

Contributors

Shoutouts to people who have helped along the way either directly or indirectly.

Implemented modules

Done Name Lin Mac Win description
apps X X list all installed applications
X checkav X X X determine probability of which (if any) AV is installed
X checkvm X X X determine id client is running on a virtual machine
X download X X X transfer a file from remote client to server
X drives X X X enumerate drives on client
X execute X X X execute binary on client
X kill X X X kill process on remote client
netstat X X perform netstat on remote client
persistence create persistence on remote client
printers X X enumerate printers
X ps X X X process list of remote client
screenshot take a screenshot of the remote client
X search X X X search remote client for files
X upload X X X transfer a file to the remote client
X users X X list all users

TODO