← Back
Pawncat
Overview
Pawncat is a lightweight command-and-control (C2) framework built in Python for authorised red team engagements. It features encrypted communications, modular payload generation, and a clean CLI interface for managing multiple sessions.
Disclaimer
This tool is intended for authorised security testing only. Unauthorised use against systems you do not own or have explicit permission to test is illegal and unethical.
Features
- AES-256 encrypted communications — all traffic between the server and agents is encrypted
- Multi-session management — handle multiple compromised hosts simultaneously
- Modular payloads — easily extend with custom payload modules
- File transfer — upload and download files between server and agents
- Command execution — execute system commands on remote agents
- Persistence module — optional persistence mechanisms for long-running engagements
- Clean CLI — intuitive command-line interface with tab completion
Usage
Server
|
|
Agent
|
|
Session Management
|
|
Architecture
The framework uses a client-server model with a custom binary protocol over TCP sockets. All payloads are generated from templates and can be customised per engagement.
Learning Outcomes
Building Pawncat taught me about socket programming, encryption implementation, protocol design, and the mindset of thinking like an attacker at the infrastructure level.