BlackMamba is a multi-client C2/post-exploitation framework with some spyware features. It is powered by Python 3.8.6 and QT Framework.
Features
Install Guide
SERVER INSTALL
pip install -r requirements.txt
PyQt5
Pillow
PyAutoGUI
pytest-shutil
cryptography
pynput
pygame
SERVER_IP=0.0.0.0
PORT=65000
PORT_VIDEO=65005
IMPORTANT: Do not change the 0.0.0.0.
The BlackMamba uses a default cryptography key. It is interesting that you change it.
WINDOWS
python main.py
GNU/LINUX
sudo chmod 777 main.py
sudo python3.8 main.py
KALI LINUX
(sudo chmod 777 main.py)
(sudo python3 main.py)
CLIENT INSTALL
After creating the Client script, you’ll need to open the script in the host target:
python script.py
scrot -y
python3-pip -y
python3-tk -y
python3-dev -y
KALI LINUX
(sudo python3 script.py)
IMPORTANT: The script of the client does not have persistence. If you want to do persistence, you’ll need to make it by yourself. Another important point is that the client script maybe delay some seconds or few minutes for connect/reconnect.
Release Status
Currently the BlackMamba is on beta stage, this means that the features are all completed but likely to contain a number of known and unknown bugs. It is important to reinforce that most critical bugs like crashes or buffer overflow have already been solved.
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…