Predatory ESP32 Firmware
-
Updated
Apr 16, 2026 - C++
Predatory ESP32 Firmware
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Extract stored password(s) and important file(s) from various browser (i.e. Chrome, Brave, Edge, Opera)
Bypassing Event Tracing for Windows (ETW) with CSharp
Shark Raider is an offensive security firmware developed for ESP32 for educational use, research, lectures, workshops in controlled environments, and training of defensive security teams - Blue Team, with the purpose of raising awareness about vulnerabilities and security implementation
Command and Control (C2) Framework for remotely managing multiple clients. It allows for issuing commands, manipulating filesystems, executing shell, uploading/downloading data and gathering details about the connected systems
Linux based client interacting with REST/JSON HTTP server for system information retrieval, file management, remote command execution, data transfer, and automated task scheduling etc
Zero Trace OS, a hypervisor OS that allows any VM to run entirely within the RAM of the host machine, leaving no trace on the system when exited. This allows entire systems to operate lightning-fast and remain impervious to malware, thanks to the OS's ephemeral state.
Simple TCP Server to handle multiple reverse connection/sessions on single port
Windows-based client application interacting with REST/JSON HTTP server for system information retrieval, file management, remote command execution, data transfer, and automated task scheduling
Malware development and adversary simulation tradecraft research.
Add a description, image, and links to the offsec topic page so that developers can more easily learn about it.
To associate your repository with the offsec topic, visit your repo's landing page and select "manage topics."