BlackMamba : C2/Post-Exploitation Framework

BlackMamba is a multi-client C2/post-exploitation framework with some spyware features. It is powered by Python 3.8.6 and QT Framework.

Features

  • Multi-Client – Supports multiple client connections at the same time.
  • Real-Time Communication Updates – Real-time communication and updates between the client and server.
  • Encrypted Communication – Almost all communications are encrypted, except for screen video streaming.
  • Screenshot Gathering – Get a real-time screenshot from the client.
  • Video Streaming – Watch in real-time the client screen.
  • Client Lock – Lock and unlock the machine of the client.
  • Encrypted File Transfer (upload/download) – Download files from the client or uploads files for the client.
  • Keylogger – Register all the keys pressed by the client.
  • Web Downloader – Download files from URLs or content by RAW pages.

Install Guide

SERVER INSTALL

  • Download the BlackMamba;
  • Install the PIP packages;

pip install -r requirements.txt

PyQt5
Pillow
PyAutoGUI
pytest-shutil
cryptography
pynput
pygame

  • Open the port 65000 and 65005 in your Gateway or Router (the port number is optional);
  • Create an exception in the firewall for BlackMamba or disable it;
  • Go to “BlackMamba/bin/profile/socket.txt” and input the port number opened;

SERVER_IP=0.0.0.0
PORT=65000
PORT_VIDEO=65005

IMPORTANT: Do not change the 0.0.0.0.

  • (OPTIONAL) – Go to the BlackMamba folder and open the “keygen.py” file. Copy the resulting key and paste in the “BlackMamba/bin/profile/crypt_key.py” ;

The BlackMamba uses a default cryptography key. It is interesting that you change it.

  • Back to BlackMamba root folder and open the “main.py” file;

WINDOWS
python main.py

GNU/LINUX
sudo chmod 777 main.py
sudo python3.8 main.py

KALI LINUX
(sudo chmod 777 main.py)
(sudo python3 main.py)

  • Click on the button that has a person icon and plus signal;
  • Input the path where the Python file will be created, input both port numbers and the IP address (external or local) of your host, then click on the “Create” button.

CLIENT INSTALL

After creating the Client script, you’ll need to open the script in the host target:

  • WINDOWS

python script.py

  • GNU/LINUX
  • Download the packages:

scrot -y
python3-pip -y
python3-tk -y
python3-dev -y

  • sudo python3.8 script.py

KALI LINUX
(sudo python3 script.py)

IMPORTANT: The script of the client does not have persistence. If you want to do persistence, you’ll need to make it by yourself. Another important point is that the client script maybe delay some seconds or few minutes for connect/reconnect.

Release Status

Currently the BlackMamba is on beta stage, this means that the features are all completed but likely to contain a number of known and unknown bugs. It is important to reinforce that most critical bugs like crashes or buffer overflow have already been solved.

R K

Recent Posts

Useful Bug Bounty And Security Related Write-ups : A Comprehensive Guide For Enthusiasts

This repo contains all variants of information security & Bug bounty & Penetration Testing write-up…

1 hour ago

Admin-Panel-Dorks : Mastering Google Dorks To Uncover Hidden Admin Panels

site:*/sign-in site:*/account/login site:*/forum/ucp.php?mode=login inurl:memberlist.php?mode=viewprofile intitle:"EdgeOS" intext:"Please login" inurl:user_login.php intitle:"Web Management Login" site:*/users/login_form site:*/access/unauthenticated site:account.*.*/login site:admin.*.com/signin/…

1 hour ago

Conduwuit : Pioneering A New Era In Matrix Homeservers

Matrix is an open network for secure and decentralized communication. Users from every Matrix homeserver…

1 hour ago

LSMS – Linux Security And Monitoring Scripts

Linux Security And Monitoring Scripts are a collection of security and monitoring scripts you can…

1 hour ago

Fiber – Using Fibers To Run In-Memory Code

A fiber is a unit of execution that must be manually scheduled by the application…

1 hour ago

XSS-Exploitation-Tool : A Penetration Testing Tool

XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site…

1 hour ago