All Projects → degenerat3 → meteor

degenerat3 / meteor

Licence: GPL-3.0 license
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.

Programming Languages

go
31211 projects - #10 most used programming language
Dockerfile
14818 projects

Projects that are alternatives of or similar to meteor

transportc2
PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-29.03%)
Mutual labels:  c2, command-and-control, redteam
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (+19.35%)
Mutual labels:  offensive-security, c2, command-and-control
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (+174.19%)
Mutual labels:  offensive-security, redteam
Atomic Red Team Intelligence C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (+180.65%)
Mutual labels:  offensive-security, redteam
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+516.13%)
Mutual labels:  offensive-security, redteam
chkdfront
Check Domain Fronting (chkdfront) - It checks if your domain fronting is working
Stars: ✭ 42 (+35.48%)
Mutual labels:  c2, command-and-control
Shelly
Automatic Reverse Shell Generator
Stars: ✭ 38 (+22.58%)
Mutual labels:  offensive-security, redteam
Invoke Apex
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (+422.58%)
Mutual labels:  offensive-security, redteam
dark-lord-obama
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Stars: ✭ 61 (+96.77%)
Mutual labels:  c2, command-and-control
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-45.16%)
Mutual labels:  offensive-security, redteam
Some Pentesters SecurityResearchers RedTeamers
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Stars: ✭ 60 (+93.55%)
Mutual labels:  offensive-security, redteam
ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+1248.39%)
Mutual labels:  offensive-security, redteam
Merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+11261.29%)
Mutual labels:  c2, command-and-control
link
link is a command and control framework written in rust
Stars: ✭ 345 (+1012.9%)
Mutual labels:  c2, command-and-control
DiscordGo
Discord C2 for Redteam....Need a better name
Stars: ✭ 55 (+77.42%)
Mutual labels:  c2, redteam
Redteam Tactics And Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,190 (+6964.52%)
Mutual labels:  offensive-security, redteam
venus
A Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (+51.61%)
Mutual labels:  c2, command-and-control
disctopia-c2
Windows Remote Administration Tool that uses Discord as C2
Stars: ✭ 216 (+596.77%)
Mutual labels:  c2, command-and-control
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,991 (+9548.39%)
Mutual labels:  offensive-security, redteam
palinka c2
Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-54.84%)
Mutual labels:  c2, redteam

Meteor

A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.

Note: This is in development and as such is not exactly stable. Documentation is also lacking, but will be improved gradually over time.

General

The Meteor system is split into several parts:

  • Core: the main "team server" element that will track actions, hosts, groups, etc. The Core runs an internal API that is "not" accessible except from listeners and other containers on the Meteornet (the docker network).
  • Database - A Postgres database, holding ent relations that are used by the Core
  • Client - How a user interacts with core. The current client is Daddy Tops, but custom options can be rolled fairly easily
  • Agents - The actual implants that will be run on infected hosts. Agents are responsbile for communicating with their listener, pulling/executing actions, and returning their results
  • Listeners - The intermediary between outsiders and the Core. Each communication protocol will have it's own listener (eg one for web, one for ICMP, etc). Listeners will process agent check-ins, then send back the pending actions, eventually forwarding the results back to the Core. Daddy Tops and Nest live in the directory with the other listeners since they are hosted containers that listen on the network, but their purpose is slightly different than the listeners used for Agent communication

Installation and Usage

Clone the repository and build the required compose images:

$ git clone https://github.com/degenerat3/meteor
$ cd meteor
$ docker-compose build
<wait patiently as Golang and docker stuff happens>
$ docker-compose up

Meteor is now up! Note that you can remove containers from the compose file if you won't be using them, so if you only want to use the web transport there's no need to also build and run Petrie/Cera. Once your containers are running, curl localhost:8888 to make sure the core is running.

At this point a Daddy Tops client should be built, so follow the instructions in meteor/docs/daddy_tops.md to download the client and start building agents!

Protobuf

Nearly all communication in the Meteor system is done with protocol buffers. The Meteor Communication Standard (MCS) defines how to format data for the Core to process it. The listeners and agents also utilize MCS for transfer of actions and results, and Daddy Tops utilizes MCS for everything from authentication to bot and group registration. The MCS proto file can be found at meteor/pbuf/mcs.proto.

Current Transport Channels

The current agent/listener pairs are implemented, with plans for more in the future:

  • Petrie: A basic TCP socket
  • Little_Foot: Web (HTTP)
  • Cera (WIP): ICMP

Developing additonal listeners should be simple enough if you so desire, since most of the actual Meteor functionality is abstracted away to Agent and Listener utils. For the most part, the only thing required for creation of a new listener is a reliable way to send and recieve a byte string. From there the listener utils can route the data to the appropriate Core API endpoint, and the agent utils can execute the actions and build the proper MCS payloads. There's still a lot of improvement to be made in this regard, as there's a bit of logic and protobuf parsing done outside the utils in the main functions.

Nest

The Nest is used for building and compiling Meteor code (currently only agents), so you don't have to. You can use Daddy Tops (or something custom) to send the required params. Unlike the rest of the project, the Nest API is comprised of JSON endpoints rather than protobuf. This is so the binaries can be built and downloaded with a few simple curl commands, rather than requring use of protbuf and more complicatd code.

More Docs

Docs are fairly limited right now, but will be improving over time. Some docs for the Core and Nest APIs, as well as instructions for Daddy Tops can be found in meteor/docs.

DISCLAIMER: This tool is for educational purposes only. Don't diddle machines that aren't yours. The authors are not responsbile for any illicit uses of this codebase.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].