Peekaboo
It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defenders to improve detection through hands-on learning.
Install / Use
/learn @cocomelonc/PeekabooREADME
Peekaboo

Peekaboo is a modular framework designed to safely emulate malware behavior. It allows security researchers, red teamers, and blue teamers to reproduce complex threat scenarios - including Command & Control (C2) communication, persistence mechanisms, and lateral movement - without using destructive payloads.
The goal of Peekaboo is to accelerate detection engineering and operator training by providing predictable, reproducible, and safe threat artifacts.
key features (how it works?)
- malware source code template - build a payload/stealer from templates (select C2 channel & data collection modules).
- payload generator - automated generation of C/C++ based payloads with built-in obfuscation (API hashing, string encryption).
- AV/EDR bypass - encryption/encoding (syscalls)
- multi-channel C2 - support for various covert channels:
- standard HTTP/S
- GitHub (abusing Issues/Commits)
- Telegram & Discord Webhooks
- TODO: adding all channels from one of my recent research
- exfiltration - staged exfil to controlled endpoints (Github/Discord/Slack/VirusTotal message).
- evasive persistence - modular implementation of Windows (Linux, MacOS) persistence (LaunchAgents, Registry Run Keys, etc.).
- lightweight dashboard - a python-based C2 backend and dashboard for real-time monitoring of active "beacons".
- safe by design: Focuses on telemetry generation (process creation, network connections) rather than actual system damage.
architecture
Peekaboo consists of 5 main components:
First malware module - highly portable C/C++ code designed to build specific "behaviors" (for final agent binary) on the target system.
- crypto (malware, agent) - build-in payload encryption/decryption logic constructor for agents.
- injection (malware, agent) - build-in injection logic constructor for agents.
- persistence (malware, agent) - build-in persistence logic constructor for agents.
- stealer (malware, agent) - stealer logic.
Second, payloads module - build-in payloads.
- payloads - for simplicity, just messagebox and reverse shell.
Final, peekaboo.py builder in Python.
demo
Run:
python3 peekaboo.py

virus total result:
02 september 2021

30 december 2021 (NT API injector)

antiscan.me result:
11 january 2022 (NT API injector)

https://antiscan.me/scan/new/result?id=rQVfQhoFYgH9
websec.nl scanner result:
10 October 2024

https://websec.net/scanner/result/a3583316-cb72-4894-bd22-48241ca79db9
Attention
This tool is a Proof of Concept and is for Educational Purposes Only!!! Author takes no responsibility of any damage you cause
License
Related Skills
node-connect
349.2kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
109.5kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
349.2kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
349.2kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
