All Projects → th3r4ven → Bifrost

th3r4ven / Bifrost

Licence: GPL-3.0 license
Bifrost C2. Open-source post-exploitation using Discord API

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Bifrost

Blackmamba
C2/post-exploitation framework
Stars: ✭ 544 (+1370.27%)
Mutual labels:  post-exploitation, pentest, offensive-security, red-team, pentest-tool
link
link is a command and control framework written in rust
Stars: ✭ 345 (+832.43%)
Mutual labels:  red-team, c2, command-and-control
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+1362.16%)
Mutual labels:  offensive-security, red-team, pentest-tool
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+1994.59%)
Mutual labels:  pentest, red-team, pentest-tool
ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+1029.73%)
Mutual labels:  post-exploitation, offensive-security, pentest-tool
transportc2
PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-40.54%)
Mutual labels:  c2, pentest-tool, command-and-control
Black Hat Rust
Applied offensive security with Rust - Early access - https://academy.kerkour.com/black-hat-rust?coupon=GITHUB
Stars: ✭ 331 (+794.59%)
Mutual labels:  pentest, offensive-security, red-team
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+227.03%)
Mutual labels:  pentest, red-team, pentest-tool
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (+189.19%)
Mutual labels:  post-exploitation, offensive-security, pentest-tool
Merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+9418.92%)
Mutual labels:  post-exploitation, c2, command-and-control
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+2970.27%)
Mutual labels:  pentest, red-team, pentest-tool
meteor
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-16.22%)
Mutual labels:  offensive-security, c2, command-and-control
AlanFramework
A C2 post-exploitation framework
Stars: ✭ 405 (+994.59%)
Mutual labels:  post-exploitation, red-team, c2
venus
A Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (+27.03%)
Mutual labels:  post-exploitation, c2, command-and-control
PyParser-CVE
Multi source CVE/exploit parser.
Stars: ✭ 25 (-32.43%)
Mutual labels:  pentest, pentest-tool
disctopia-c2
Windows Remote Administration Tool that uses Discord as C2
Stars: ✭ 216 (+483.78%)
Mutual labels:  c2, command-and-control
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-54.05%)
Mutual labels:  offensive-security, red-team
palinka c2
Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-62.16%)
Mutual labels:  red-team, c2
PeekABoo
PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desktop is disabled by default on all Windows operating systems.
Stars: ✭ 120 (+224.32%)
Mutual labels:  pentest, pentest-tool
RPCScan
Tool to communicate with RPC services and check misconfigurations on NFS shares
Stars: ✭ 53 (+43.24%)
Mutual labels:  pentest, pentest-tool


Bifrost
Bifrost

Command and Control


What's Bifrost?

Bifrost is an open-source Discord BOT that works as Command and Control (C2). This C2 uses Discord API for communication between clients and server.

Developed with Python, this C2 have multiples features for post-exploitation.

How Bifrost works?

As mentioned before, Bifrost is basically a discord bot that receive commands from the Discord user and do a pre-defined task.

So for every client that you are going to "infect", you will send a copy of this discord bot, and it will respond to you using discord. This allows you to hide behind Discord service being stealth and have a secure connection between you and your client.

Disclaimer: This project should be used for authorized testing or educational purposes only.

Virustotal

Bifrost is currently detected by Windows defender, I'm already trying to solve this "problem", and bypass it again.

Virustotal detection was 5/67 when there was none defense against sandbox execution.

Antivirus that detected Bifrost as malicious was SecureAge APEX, Jiangmin, Cynet, Zillya and Palo Alto Networks

Bifrost Features

  • Multiple clients.
  • Multi-platform support.
  • Keylogger.
  • Antivirus enumeration.
  • Real-time communication.
  • Encrypted(HTTPS) communication.
  • Fast and stealth communication trough Discord API.
  • No need of public service.
  • Screenshot gathering.
  • Download and upload of files.

⚠️Contributors ⚠️

Bifrost is an open project, so, if you want to add some functionality, improve features or code performance in Bifrost, the best way to get it to the main project is to create a fork and open pull request.


Installation

1 - Clone or download Bifrost source code;

2 - Install lib dependencies;

pip install -r requirements.txt

3 - Have Discord account;

4 - Create an application (Bot) on Discord;

5 - Go to General information tab and copy your Application ID;

6 - Go to Bot tab, create the Bot and copy it's token

7 - Invite your bot to your discord server by filling up the following link with your application ID;

https://discord.com/oauth2/authorize?client_id=<APP_ID>&scope=bot&permissions=8

8 - Now create a channel in your Discord server and copy its ID;

Obs.: Activate developers function in your discord app to copy channel ID easily.

Now with those 2 information (channel ID and Bot Token), change the var values on 22 and 23 lines in bifrost.py file to your account/channel values.


Client Installation

After creating your bot, channel and changing the variable values, follow the steps bellow to deploy the payload to your client

Windows

Create an bifrost executable file using pyinstaller, or sending bifrost.py to client and installing all dependencies.

Using the executable file, the client don't need to have python or any dependencies pre-installed.

pyinstaller bifrost.py --onefile --noconsole --key th3r4ven_bifrost or
python -m pyinstaller bifrost.py --onefile --noconsole --key th3r4ven_bifrost

OBS.: All of this params are optional, read pyinstaller documentation for more information on how to use it.

Linux\Mac OS

You can send the bifrost.py and install the dependencies, or create and script/executable to automate this process, similar to windows installation


To do

  • Persistence feature
  • Bind shell connection
  • Stealth Download
  • Upload big files anonymously
  • Live/recorded voice streaming
  • Fix Bugs/Issues
  • In memory execution

Screen live stream is not possible trough Discord API :(


Screenshots


Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].