REC2, short for Rusty External Command and Control, is a sophisticated Command and Control (C2) framework developed in the Rust programming language.
Designed for advanced operational use, REC2 enables remote management of implants (clients) across macOS, Linux, and Windows platforms.
This tool leverages external APIs like VirusTotal and Mastodon to transmit encrypted communications, ensuring stealth and anonymity during operations.
To use REC2 effectively:
main.rs
) with appropriate API tokens and URLs from VirusTotal or Mastodon.make virustotal_windows
or make mastodon_linux
.make c2server_release
and execute commands to manage implants remotely.For example:
bash./server_release VirusTotal --url <URL> --token <TOKEN> --key <AES_KEY>
This command initiates communication with implants via VirusTotal.
REC2 offers flexible compilation methods:
REC2 continues to evolve with planned features like asynchronous job status checks, enhanced session management commands, and potential integration with additional social networks like SoundCloud.
REC2 is strictly for educational purposes. Unauthorized use of this tool is illegal. Users are responsible for complying with all applicable laws.
For more information and access to the repository, visit GitHub under the username D1rkMtr.
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…
Introduction In the vast ocean of the internet, the most powerful tool you already have…
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…