DNS-Black-Cat(DBC) : Multi Platform Toolkit For An Interactive DNS Shell Commands Exfiltration, By Using DNS-Cat You Will Be Able To Execute System Commands In Shell Mode Over DNS Protocol

DNS-Black-Cat is a Multi-platform toolkit for an interactive C2C DNS shell, by using DNS-Black-Cat, you will be able to execute system commands in shell mode over a fully encrypted covert channel.

Server

ported as a python script, which acts as DNS server with required functionalities to provide interactive shell command interface.

Client

ported as the following file formats

  • Windows 32/64 executable (exe)
  • Linux 32/64 executable (ELF)
  • Powershell Script (ps1)
  • Dynamic Link Library (DLL)
  • MacOS Darwin x86_64

Highlights

  • The agent supports multi-platforms.
  • built-in feature with 0xsp-mongoose RED.
  • Available as win32/64 executable, Powershell script, Linux ELF.
  • Encrypted and encoded DNS Queries.
  • Traffic Segmentation.
  • Speed and stability.
  • Stealth and undetectable.

Releases

SystemSupported
Windows (EXE)YES
Windows (PS)YES
Windows (DLL)YES
LinuxYES
MacOSYES
BSDStill
AndroidStill
R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

2 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 weeks ago