You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
FudgeC2 is a Powershell command and control platform designed to facilitate team collaboration and campaign timelining. This aims to help clients better understand red team activities by presenting them with more granular detail of adversarial techniques.
13
+
FudgeC2 is a Powershell C2 platform designed to facilitate team collaboration and campaign timelining, released at [BlackHat Arsenal USA 2019](https://www.blackhat.com/us-19/arsenal/schedule/index.html#fudge-a-collaborative-c-framework-for-purple-teaming-16968). This aims to help clients better understand red team activities by presenting them with more granular detail of adversarial techniques.
14
14
15
-
Built on Python3 with a web frontend, FudgeC2 aims to provide red teamers a simple interface in which to manage active implants across their campaigns.
15
+
Built on Python3 with a web frontend, FudgeC2 aims to provide red team operators a simple interface in which to manage active implants across their campaigns.
16
16
17
-
_FudgeC2 is currently in beta, and should be used with caution in non-test environments. The beta was released at [BlackHat Arsenal USA 2019](https://www.blackhat.com/us-19/arsenal/schedule/index.html#fudge-a-collaborative-c-framework-for-purple-teaming-16968)._
17
+
_FudgeC2 is in active development, and is receiving regular updates - if you have feature suggestions reach out with your ideas and suggestions._
18
18
19
19
### Installation
20
20
@@ -26,22 +26,21 @@ cd FudgeC2/FudgeC2
26
26
sudo pip3 install -r requirements.txt
27
27
sudo python3 Controller.py
28
28
```
29
-
This will generate a new database, and first time credentials. You will then be able to access the platform from *http[s]://127.0.0.1:5001/*. The logon credentials are:
29
+
This will generate the F2 database, and first time credentials. You will then be able to access the platform from *http[s]://127.0.0.1:5001/*. The logon credentials are:
30
30
31
31
`admin`:`letmein`
32
32
33
33
For more information on installation and configuration see the wiki, [here](https://github.com/Ziconius/FudgeC2/wiki/Installation-and-Setup).
34
34
35
-
### Usage
35
+
### Implant Builtin Functionality
36
36
37
-
FudgeC2 breaks projects down into campaigns. Each campaign will have a their own implant templates, active implants, users, and targets.
37
+
FudgeC2 breaks projects down into campaigns. Each campaign will have their own implant templates, active implants, users, and targets.
38
38
39
-
Once you have generated a campaign and implants you will be able to interact with any active implants from the campaign specific homepage. This can be reached by clicking on the campaign name in the Campaign column, or via the Campaigns dropdown in the top navigation menu.
39
+
To start you simply need to generate a new campaign, create an implant template with the campaign, and trigger one of the stagers on a target computer.
An overview of functionality can be seen below, for more information see the implant functionality pages on FudgeC2s' wiki, [found here](https://github.com/Ziconius/FudgeC2/wiki/Implant-Functionality).
43
+
F2 implants contain a variety of builtin commands, which are also easily extended upon allowing operators the chance to create their own builtin functionality. An overview of functionality can be seen below, for more information on the builtin implant functionality or how to create custom modules see FudgeC2s' wiki, [found here](https://github.com/Ziconius/FudgeC2/wiki/Implant-Functionality).
45
44
46
45
**Implant functionality**
47
46
@@ -56,7 +55,12 @@ An overview of functionality can be seen below, for more information see the imp
56
55
|`:: list_modules` |Lists all loaded modules by the implant.
57
56
|`:: download_file [target file]` |Downloads the target file to the FudgeC2 server
58
57
|`:: upload_file [local file] [remote path/filename]` |Uploads a file to the target path and specific filename
59
-
|`:: play_audio [audio file (mp3)]` |Plays an audio file on the compromised host.
58
+
|`:: play_audio [audio file (WAV)]` |Plays a WAV audio file on the compromised host.
59
+
|`:: screenshot` |Takes a screenshot of the compromised hosts desktop.
0 commit comments