Skip to content

ucla-e1-malware/final-project-theoreos

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

E1A Malware Lab Final Project Skeleton

by Alec, Savannah, Anthony, Andrew

Project Structure

project-skeleton
├── client
│   ├── app.py
│   └── cybersploit_client
│       ├── actions
│       ├── commands
│       └── util
├── payload
│   └── server.py

"Client" is the command and control for our toy malware. This is what the attacker will run on their machine. This client will give a nice cli to the user to run commands. Fill out the commands folder, using the existing 2 commands as an example to create new commands! The actions and util folders are provided just in case you would like to use that structure - keep them or delete them as you'd like!

"Server" is the part of our malware that is actually deployed on the victim. It consists of a basic TCP server that accepts connections on port 5050.

All python files are heavily commented to help describe what is going on, what needs to be changed, and what should not be changed.

About

ucla-e1-malware-w26-final-project-project-skeleton created by GitHub Classroom

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%