Gcat - A fully featured backdoor that uses Gmail as a C&C server.

Gcat – A fully featured backdoor that uses Gmail as a C&C server.

Gcat : A stealthy Python based backdoor that uses Gmail as a command and control server
Usage:

Gcat : A fully featured backdoor that uses Gmail as a C&C server.

Gcat : A fully featured backdoor that uses Gmail as a C&C server.

Setup
For this to work you need:
1. A Gmail account (Use a dedicated account! Do not use your personal one!)
2. Turn on “Allow less secure apps” under the security settings of the account

This repo contains two files:
– gcat.py a script that’s used to enumerate and issue commands to available clients
– implant.py the actual backdoor to deploy
In both files, edit the gmail_user and gmail_pwd variables with the username and password of the account you previously setup.
~ To Do ~
+ Multi-platform support
+ Command to upload files
+ Transport crypto & obfuscation

Download : gcat-master.zip(7.58 KB)  | Clone Url
Source : https://github.com/byt3bl33d3r