Post Exploitation Framework

Server connection to client

User actions and listing directories

Clients connection to server

Manipulating files and folders in directories

network enumeration on bot

Privilege escalation on target using a pasword

Project information

Project Description

PyC2C, is a post-exploitation framework for penetration testers and security professionals. It utilizes a C2C (Command and Control) architecture to remotely execute shell commands on multiple compromised devices, also known as bots. PyC2C is lightweight and can be scaled up to manage multiple bots. Additionally, PyC2C can potentially escalate privileges on compromised Linux machines, providing greater control and access during penetration testing engagements.