Changelog 09/12/2015:
+ Added some crazy 1337 ascii art.
+ Added an upload command.
Gcat : A stealthy Python based backdoor that uses Gmail as a command and control server
Usage:
Setup
For this to work you need:
1. A Gmail account (Use a dedicated account! Do not use your personal one!)
2. Turn on “Allow less secure apps” under the security settings of the account
This repo contains two files:
– gcat.py a script that’s used to enumerate and issue commands to available clients
– implant.py the actual backdoor to deploy
In both files, edit the gmail_user and gmail_pwd variables with the username and password of the account you previously setup.
~ To Do ~
+ Multi-platform support
+ Command to upload files
+ Transport crypto & obfuscation
Download : gcat-master.zip(11 KB) | Clone Url
Source : https://github.com/byt3bl33d3r | Our Post Before