Skip to content

blackXmask/Malware-V2.0

Repository files navigation

🖥️ Remote Command Execution System (Secure Version)

set AGENT_ID=agent-win01 set API_TOKEN=5GwBz6jLHUwwxStu705UGQAMElgb6tjFBz76dW1tZzc set CONTROLLER_URL=http://192.168.10.8:8000

This project provides a lightweight remote Linux shell system with:

  • controller_secure.py – FastAPI backend
  • agent_terminal (C++ binary) – Executes commands on the remote machine
  • remote_shell_secure_tunnel.py – Interactive operator client

Built for private networks, lab automation, and controlled testing.


📂 Project Structure

malware-analysis-/
│
├── controller_secure.py
├── remote_shell_secure_tunnel.py
├── agent_terminal_updated.cpp
├── agent_terminal        # compiled binary
├── controller.db
└── README.md

⚙️ Requirements

Install dependencies:

sudo apt update
sudo apt install g++ libcurl4-openssl-dev nlohmann-json3-dev -y
pip install fastapi uvicorn requests

🚀 Start the System

1️⃣ Start the Controller

export API_TOKEN="5GwBz6jLHUwwxStu705UGQAMElgb6tjFBz76dW1tZzc"
python3 controller_secure.py

Example:

[SERVER START] private listening on 127.0.0.1:8000

2️⃣ Compile the Agent

g++ agent_terminal_updated.cpp -o agent_terminal -lcurl -std=c++17

3️⃣ Run the Agent

export AGENT_ID="agent-001"
export API_TOKEN="5GwBz6jLHUwwxStu705UGQAMElgb6tjFBz76dW1tZzc"
export CONTROLLER_URL="http://127.0.0.1:8000"

./agent_terminal

Example output:

[AGENT] Starting. ID=agent-001, OS=Linux

4️⃣ Start the Remote Shell (Operator)

export API_TOKEN="5GwBz6jLHUwwxStu705UGQAMElgb6tjFBz76dW1tZzc"
python3 remote_shell_secure_tunnel.py

You should see:

[INFO] Controller: http://127.0.0.1:8000
[INFO] Target agent: agent-001
[INFO] Detected agent OS: Linux

Remote shell started. Type 'exit' to quit.

🧪 Example Commands (from remote shell)

> ls
> pwd
> cat /etc/hostname
> ifconfig

Agent will run them and send results back to controller.


🔒 Security Notes

  • System works on local / private networks only
  • Uses API key authentication
  • Do not run agent as root
  • Intended for testing, labs, and research only

✔️ Summary

Component Function
controller_secure.py Secure FastAPI backend
agent_terminal.cpp / agent_terminal Remote agent executing commands
remote_shell_secure_tunnel.py Interactive command sender
controller.db (Optional) minimal storage

About

set AGENT_ID=agent-win01 set API_TOKEN=5GwBz6jLHUwwxStu705UGQAMElgb6tjFBz76dW1tZzc set CONTROLLER_URL=http://192.168.10.8:8000--Project about malware dev. This is the update veriosn of malware-v1.0 repo

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors