mirror of https://github.com/CPunch/Laika
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
8 months ago | |
---|---|---|
.github/workflows | 1 year ago | |
bot | 8 months ago | |
cnc | 8 months ago | |
lib | 8 months ago | |
libsodium@a606dc79ed | 1 year ago | |
shell | 8 months ago | |
tools | 8 months ago | |
.clang-format | 11 months ago | |
.gitignore | 1 year ago | |
.gitmodules | 1 year ago | |
CMakeLists.txt | 8 months ago | |
CONTRIBUTING.md | 9 months ago | |
LICENSE.md | 11 months ago | |
README.md | 9 months ago | |
server.ini | 1 year ago | |
shell.ini | 1 year ago |
README.md
Laika
Laika is a simple cross-platform Remote Access Toolkit stack for educational purposes. It allows encrypted communication across a custom binary protocol. The bot client supports both Windows & Linux environments, while the shell & CNC server specifically target Linux environments. Laika is meant to be small and discreet, Laika believes in hiding in plain sight.
Some notable features thus far:
- Lightweight, the bot alone is 183kb (
MinSizeRel
) and uses very little resources minimizing Laika's footprint. - Authentication & packet encryption using LibSodium and a predetermined public CNC key. (generated with
bin/genKey
) - Server and Shell configuration through
.ini
files. - Ability to open shells remotely on the victim's machine.
- Persistence across reboot: (toggled with
-DLAIKA_PERSISTENCE=On
)- Persistence via Cron on Linux-based systems.
- Persistence via Windows Registry.
- Uses obfuscation techniques also seen in the wild (string obfuscation, tiny VMs executing sensitive operations, etc.)
- Simple configuration using CMake:
- Setting keypairs (
-DLAIKA_PUBKEY=? -DLAIKA_PRIVKEY=?
, etc.) - Obfuscation modes
- Setting keypairs (
How do I use this?
Please refer to the Wiki for any questions relating to deployment, compilation & setup.
Looking to contribute?
Read CONTRIBUTING.md