Updates Gcat - A fully featured backdoor that uses Gmail as a C&C server.

Updates Gcat – A fully featured backdoor that uses Gmail as a C&C server.

Changelog 09/12/2015:
+ Added some crazy 1337 ascii art.
+ Added an upload command.

Gcat : A stealthy Python based backdoor that uses Gmail as a command and control server
Usage:

Gcat Console

Gcat Console on All Windows platform

Gcat On All Unix Platform

Gcat On All Unix Platform

Setup
For this to work you need:
1. A Gmail account (Use a dedicated account! Do not use your personal one!)
2. Turn on “Allow less secure apps” under the security settings of the account

This repo contains two files:
– gcat.py a script that’s used to enumerate and issue commands to available clients
– implant.py the actual backdoor to deploy
In both files, edit the gmail_user and gmail_pwd variables with the username and password of the account you previously setup.
~ To Do ~
+ Multi-platform support
+ Command to upload files
+ Transport crypto & obfuscation

Download : gcat-master.zip(11 KB)  | Clone Url
Source : https://github.com/byt3bl33d3r  | Our Post Before