Jump to content
grayhats

Gcat - a Fully Featured Backdoor That Uses Gmail as a C&C Server

Recommended Posts

A stealthy Python based backdoor that uses Gmail as a command and control server.

SETUP:

For this to work you need:

A Gmail account (Use a dedicated account! Do not use your personal one!)

Turn on "Allow less secure apps" under the security settings of the account

This repo contains two files:

gcat.py a script that's used to enumerate and issue commands to available clients

implant.py the actual backdoor to deploy

In both files, edit the gmailuser and gmailpwd variables with the username and password of the account you previously setup.

You're probably going to want to compile implant.py into an executable using Pyinstaller

How to use gcat:

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...