PyCmd Encryption Stealth Trojan

I wrote a Python-based trojan client program. The purpose of this program is to bypass the protection device so that sensitive data can be shuttled through the network. Due to the limited programming ability, the python program was used as the client at the time, and the php code was used as the server, which was barely usable, but lacked the server of jsp, which made the function very limited. Fortunately, there is a big god [caomei] ( to help achieve the jsp side of the code, so the combination of the two, easy to use.

PyCmd use

I have prepared two drones here, each with a php and jsp runtime environment, to simulate a real web server.
For convenience, I have placed the server trojan program in the server website directory:

At this point, run the program:

python -u -p test [--proxy]


python -u -p test [--proxy]

The program will automatically determine the type of website entered.
Input parameters:

  • -h View help information
  • -u website Trojan address
  • -p Trojan shell password
  • –proxy Enable local proxy (for debugging)

Note: When local debugging is enabled, you need to run the Fiddler program or other capture software.

PyCmd Data Encryption

The strength of the PyCmd program is that it encrypts incoming and outgoing data and bypasses the firewall’s verification of data content.
When the cmd command is executed, the data is captured by Fiddler:

PyCmd Trojan Stealth

Scan the uploaded Trojan server file with D Shield, display it as a normal file, and successfully escape the killing

Tools Download

PyCmd [Download Address] (

本文标题:PyCmd Encryption Stealth Trojan


发布时间:2016年09月18日 - 16:09

最后更新:2019年08月16日 - 15:08

原始链接: invisible Trojan/

许可协议: 署名-非商业性使用-禁止演绎 4.0 国际 转载请保留原文链接及作者。

nmask wechat