• code Presentation
    • Host Environment Setup
    • VM Installation & Verification
    • Attacker VM Setup
    • Victim VM Setup
    • Host to VM File Transfer
    • Dropper Deployment
    • Overview
    • Installation
    • Command Reference
    • Usage
    • Overview
    • Installation
      • Authentication
      • Dashboard
      • Client Management
        • Terminal Panel
        • Persistence Panel
        • Event Log Panel
        • Upload/Download Panel
        • Overview Panel
        • Configuration Panel
        • Authentication Panel
    • Configuration Justifications
    • EpiRootkit Overview
    • Build & Deployment
    • Connection & Authentication
      • Command Execution
      • DNS Resolution
      • Encryption
      • Sysfs Interface
      • Module Hiding
      • File Hiding
      • Persistence
      • Line Hiding
      • File Transfer
    • Unwelcome Guests
    • Tux Fan Club: Chasse au Trésor Pirate
  • favorite Un dernier mot
    • GitHub
  • to navigate
  • to select
  • to close
    • Home
    • Attacking Program (C2 Backend)
    On this page
    article

    Attacking Program (C2 Backend)

    C2 backend for EpiRootkit management with CLI interface

    dashboard

    Overview

    C2 server for EpiRootkit

    download

    Installation

    Install C2 server

    terminal

    Command Reference

    Essential C2 commands

    play_arrow

    Usage

    How to use the C2 server


    © 2025 Tux Fan Club. Built with Lotus Docs