This project is an educational proof-of-concept designed to simulate a basic Command & Control (C2) communication model using TCP sockets.
The purpose of this repository is to study how remote command channels operate from a behavioral and networking perspective, helping to understand patterns commonly analyzed in security research and anti-cheat environments.
This project was developed strictly for learning, experimentation and controlled laboratory research.
- Gabriel Passos — Security & Behavior Research
The project simulates a simple client-server architecture where a remote endpoint receives commands through a TCP channel. Rather than focusing on offensive usage, the goal is to explore:
- Basic C2 communication flow
- Remote command execution behavior
- Networking patterns used in controlled simulations
- Foundations for detection and defensive analysis
- victim.py → Simulated client that establishes a TCP connection
- attacker.py → Command sender used to test communication behavior
Avoid terminating the program with "Ctrl + C" as it may cause a bug. You can end the program with "Ctrl + Z" in linux or by closing the terminal!
Linux
python3 victim.py
python3 attacker.pyWindows
python victim.py
python attacker.pyThis repository exists exclusively for: Educational purposes
Security research learning
Controlled environment simulations
It must never be used against real systems without explicit authorization.