kddco / Appscript_reverseProxy

Google Appscript as C&C forwarder

Repository from Github https://github.comkddco/Appscript_reverseProxyRepository from Github https://github.comkddco/Appscript_reverseProxy

Appscript_reverseProxy_Github_README

簡介

利用Google Appscript作為中繼,進行C&C的通訊通道 目前不會被Windows Defender偵測

APPscript版本

Victim

  • ./appscript_client.ps1

Attacker server

  • 先用postman頂著用

Reverse shell版本

Victim

  • rev_shell_client.ps1啟動即可
  • 自行更改Server IP,port

Attacker server

  • 在Ubuntu執行
nc- l 11111
  • port:11111

Binding shell版本

Victim

  • bindshell_client.ps1啟動即可
    • 自行更改IP,port

Attacker server

nc client_IP Port

AppScriptProxy

victim

  • appscript_client.ps1啟動即可

Attacker server

  • 暫用postman發請求==

About

Google Appscript as C&C forwarder

License:Apache License 2.0


Languages

Language:PowerShell 100.0%