Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

N4BM/Multi-agents-C2-framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Multi-agents-C2-framework

This repository contains a Command and Control (C2) framework designed for managing multiple agents. It provides a comprehensive set of functionalities for tasking agents, retrieving system information, executing commands, and interacting with the target environment, utilizing jitter for persistence and evasion.

Demo

C2 Demo

Features

  • The framework offers a powerful set of features to facilitate agent control and interaction:
  • Task Management: Assign and track specific tasks for agents.
  • Historical Logging: View the history of commands executed and tasks performed by agents.
  • System Information Retrieval: Gather basic and detailed system information from agents.
  • Remote Command Execution: Execute operating system commands on remote agents.
  • Process Enumeration: List running processes on target systems.
  • File System Navigation & Manipulation: Change directories, download files, and manage privileges.
  • Privilege Escalation: Bypass User Account Control (UAC) and elevate to SYSTEM level.
  • Screenshot Capture: Remotely capture screenshots from agent systems.
  • Operational Security: Configure jitter for agent communication to evade detection.
  • Remote Shellcode Injection: Inject shellcode into remote processes.
  • User Information Retrieval: Get details about the current user on the agent system.
  • Mimikatz Integration: Run Mimikatz modules for credential access.
  • Scripted Operations: Execute a series of commands from a resource file.

Disclaimer

IMPORTANT: FOR EDUCATIONAL AND AUTHORIZED USE ONLY

This Multi-agents-C2-framework is provided strictly for educational, research, and authorized penetration testing purposes. It is designed to be used by cybersecurity professionals, researchers, and individuals with proper authorization to assess and improve the security posture of systems they own or have explicit permission to test.

  • Illegal Use is Strictly Prohibited: Any use of this framework for illegal activities, unauthorized access to computer systems, data exfiltration, or any other malicious or unethical purposes is strictly prohibited and not condoned by the author(s). The author(s) are not responsible for any misuse or damage caused by this framework.

  • User Responsibility: Users of this framework are solely responsible for complying with all applicable laws, regulations, and ethical guidelines in their jurisdiction. Before deploying or utilizing this framework, ensure you have explicit written consent from the owner(s) of the systems or networks you intend to interact with.

  • No Warranties: This framework is provided "as is," without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, and non-infringement. In no event shall the author(s) or copyright holder(s) be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.

By using this framework, you agree to these terms and assume all responsibility for your actions.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors