Skip to content

This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).

License

Notifications You must be signed in to change notification settings

infosecn1nja/ycsm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

33 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

You Can't See Me (YCSM)

This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular RATS (Cobalt Strike, Empire, Metasploit).

If HTTPS was selected, it will automatically setup letsencrypt certbot and obtain valid letsencrypt SSL certificates for your redirector domain name, and start nginx using the generated configuration. Using redirector an added benefit of using a separate host if domain is burned, real IP of C2 will still be useable.

Features

  • Evade Vendor Sandboxes.
  • Block Shodan Access.
  • Block Vulnerability Scanners & Bots.
  • Auto SSL setup for HTTPS using letsencrypt certbot.
  • Adds original source ip to user-agent header for easy tracking.
  • Auto-Renew for Let's Encrypt SSL Certificates.
  • Nginx Hardening Servers with Fail2Ban.
  • Block Accessing Redirector From Mobile.
  • JQuery profiling users inspired by APT29 useful to sniff tier 1 SOC (https://github.com/samsayen/JQueryingU).

Getting Started

git clone https://github.com/infosecn1nja/ycsm
cd ycsm
chmod +x ycsm-setup.sh

1) Setup Nginx Redirector
2) Check Status
3) Blocking Shodan
4) Configure Fail2Ban
5) Quit

  YCSM - Select an Option:

Resources

About

This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published