Skip to Main Content
October 27, 2017

TrevorC2 - Legitimate Covert C2 over Browser Emulation

Written by TrustedSec
Penetration Testing Security Testing & Analysis
TrustedSec is proud to announce the release of the TrevorC2 HTTP(s) command and control (C2) open source framework. TrevorC2 is a client/server model for masking command and control through a normally browsable website. Detection becomes much harder as time intervals are different and does not use POST requests for data exfiltration.
There are two components to TrevorC2 - the client and the server. The client can be configured to be used with anything. In this example it's coded in Python but can easily be ported to C#, PowerShell, or whatever you want. Currently the supports Windows, MacOS, and Linux. You can always compile the Windows one to get an executable (py2exe, pyinstaller, etc.), but the preference would be to use Windows without having to drop an executable as a stager. The way that the server works is by tucking away a parameter inside the page source that contains our commands (can be customized). This is completely configurable, and it's recommended you configure everything to be unique in order to evade detection. Here is the workflow:
  • - edit the file first, and customize, what website you want to clone, etc. The server will clone a website of your choosing and stand up a server. This server is browsable by anyone and looks like a legitimate website. Contained within the source is parameter that (again is configurable), which contains the instructions for the client. Once a client connects, it searches for that parameter, then uses it to execute commands.
  • - all you need in any configurable option is the ability to call out to a website, parse some basic data, and then execute a command and then put the results in a base64 encoded query string parameter to the site. That's it, not hard.


First edit the file and change the configuration options and site to clone. python Next, edit the file and change the configuration and system you want it to communicate back to. python When running the trevor2_server, it will clone whatever website you specify when editing the file and modifying the url parameter. In this example we'll clone Next we'll execute a command and wait for the random interval section (configurable) to communicate back with us and send us data: You can download TrevorC2 from our GitHub site: TrevorC2 Github DownloadTODO
  • Add encryption (AES).
  • Add randomized parameter names.
  • Add a C# and PowerShell module.
  • Add do_POST support for POST exfil on longer data.
  • Add upload/download functionality.
  • Add multi-threading for multiple shells