Kali Linux

Zuthaka : An Open Source Application Designed To Assist Red-Teaming Efforts, By Simplifying The Task Of Managing Different APTs And Other Post-Exploitation Tools

Zuthaka is a collaborative free open-source Command & Control integration framework that allows developers to concentrate on the core function and goal of their C2.

About The Project

Problem Statement

The current C2s ecosystem has rapidly grown in order to adapt to modern red team operations and diverse needs (further information on C2 selection can be found here). This comes with a lot of overhead work for Offensive Security professionals everywhere. Creating a C2 is already a demanding task, and most C2s available lack an intuitive and easy to use web interface. Most Red Teams must independently administer and understand each C2 in their infrastructure.

Solution

With the belief that community efforts surpass that of any individual, Zuthaka presents a simplified API for fast and clear integration of C2s and provides a centralized management for multiple C2 instances through a unified interface for Red Team operations.

Zuthaka is more than just a collection of C2s, it is also a solid foundation that can be built upon and easily customized to meet the needs of the exercise that needs to be accomplish. This integration framework for C2 allows developers to concentrate on a unique target environment and not have to reinvent the wheel.

Built With

  • Django Rest Framework
  • Redis
  • ReactJS
  • Nginx
  • Docker
  • PostgreSQL

Already Supported C2

  • Covenant
  • Empire

Getting Started

Zuthaka is composed of a front-end that exposes a UI for the API of process manager, file manager, shell post-exploitation modules and general C2 handling, and a back-end, in charge of handling the consistency and availability issues of the C2s instantiated in Zuthaka. Also deployed is Redis as a message broker to handle asynchronously every element in the Agent’s UI and an Nginx server.

Prerequisites

The installation of a working Docker instance is necessary for the automatic deployment of the essential infrastructure (Zuthaka’s frontend and backend, Nginx, Redis). All the desired C2s that need to be handled should be deployed in parallel.

Installation

To build the full Zuthaka project, first download dependencies.

git clone https://github.com/pucara/zuthaka

To start the project with the corresponding services, the docker-compose file can be utilized.

docker-compose up

Usage

R K

Recent Posts

GraphRunner : The Dual-Use Toolset For Microsoft 365 Security

GraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling…

55 minutes ago

NailaoLoader : Hiding Execution Flow via Patching

NailaoLoader employs sophisticated techniques to obscure its execution flow, leveraging Windows Management Instrumentation (WMI) for…

55 minutes ago

CVE-2025-21333-POC : An In-Depth Exploration Of Windows Kernel Exploitation Techniques

The CVE-2025-21333 Proof of Concept (PoC) demonstrates an exploit targeting a vulnerability in the vkrnlintvsp.sys…

5 hours ago

Powershell Digital Forensics And Incident Response

PowerShell has emerged as a vital tool in Digital Forensics and Incident Response (DFIR), offering…

5 hours ago

Brainstorm : Revolutionizing Web Fuzzing With Local LLMs

Brainstorm is an innovative web fuzzing tool that integrates traditional fuzzing techniques with AI-powered insights,…

1 day ago

Vulnerability Research : Harnessing Tools Like Metasploit To Uncover And Mitigate Security Weaknesses

Vulnerability research is a critical aspect of cybersecurity that focuses on identifying, analyzing, and documenting…

1 day ago