infosecn1nja / ycsm

This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

You Can't See Me (YCSM)

This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular RATS (Cobalt Strike, Empire, Metasploit).

If HTTPS was selected, it will automatically setup letsencrypt certbot and obtain valid letsencrypt SSL certificates for your redirector domain name, and start nginx using the generated configuration. Using redirector an added benefit of using a separate host if domain is burned, real IP of C2 will still be useable.

Features

  • Evade Vendor Sandboxes.
  • Block Shodan Access.
  • Block Vulnerability Scanners & Bots.
  • Auto SSL setup for HTTPS using letsencrypt certbot.
  • Adds original source ip to user-agent header for easy tracking.
  • Auto-Renew for Let's Encrypt SSL Certificates.
  • Nginx Hardening Servers with Fail2Ban.
  • Block Accessing Redirector From Mobile.
  • JQuery profiling users inspired by APT29 useful to sniff tier 1 SOC (https://github.com/samsayen/JQueryingU).

Getting Started

git clone https://github.com/infosecn1nja/ycsm
cd ycsm
chmod +x ycsm-setup.sh

1) Setup Nginx Redirector
2) Check Status
3) Blocking Shodan
4) Configure Fail2Ban
5) Quit

  YCSM - Select an Option:

Resources

About

This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).

License:Apache License 2.0


Languages

Language:Shell 88.7%Language:HTML 11.3%