God Genesis is a C2 server purely coded in Python3 created to help Red Teamers and Penetration Testers. Currently It only supports TCP reverse shell but wait a min, its a FUD and can give u admin shell from any targeted WINDOWS Machine.
The List Of Commands It Supports :-
=================================================================================================== BASIC COMMANDS: =================================================================================================== help --> Show This Options terminate --> Exit The Shell Completely exit --> Shell Works In Background And Prompted To C2 Server clear --> Clear The Previous Outputs =================================================================================================== SYSTEM COMMANDS: =================================================================================================== cd --> Change Directory pwd --> Prints Current Working Directory mkdir *dir_name* --> Creates A Directory Mentioned rm *dir_name* --> Deletes A Directoty Mentioned powershell [command] --> Run Powershell Command start *exe_name* --> Start Any Executable By Giving The Executable Name =================================================================================================== INFORMATION GATHERING COMMANDS: =================================================================================================== env --> Checks Enviornment Variables sc --> Lists All Services Running user --> Current User info --> Gives Us All Information About Compromised System av --> Lists All antivirus In Compromised System =================================================================================================== DATA EXFILTRATION COMMANDS: =================================================================================================== download *file_name* --> Download Files From Compromised System upload *file_name* --> Uploads Files To Victim Pc =================================================================================================== EXPLOITATION COMMANDS: =================================================================================================== persistence1 --> Persistance Via Method 1 persistence2 --> Persistance Via Method 2 get --> Download Files From Any URL chrome_pass_dump --> Dump All Stored Passwords From Chrome Bowser wifi_password --> Dump Passwords Of All Saved Wifi Networks keylogger --> Starts Key Logging Via Keylogger dump_keylogger --> Dump All Logs Done By Keylogger python_install --> Installs Python In Victim Pc Without UI
Check The Video To Get A Detail Knowledge
1. The Payload.py is a FULLY UNDETECTABLE(FUD) use your own techniques for making an exe file. (Best Result When Backdoored With Some Other Legitimate Applictions) 2. Able to perform privilege escalation on any windows systems. 3. Fud keylogger 4. 2 ways of achieving persistance 5. Recon automation to save your time.
git clone https://github.com/SaumyajeetDas/GodGenesis.git pip3 install -r requirements.txt python3 c2c.py
It is worth mentioning that Suman Chakraborty have contributed in the framework by coding the the the Fud Keyloger, Wifi Password Extraction and Chrome Password Dumper modules.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…