Skip to content

stillbigjosh/Neo

Repository files navigation

Logo

The Neo C2 Framework

Version Python Golang License Tool Platform

A modular server-client architecture post-exploitation framework built for collaborative agent management in red team operations and security testing. Enables flexibility by allowing operators to add their own extension modules

InstallationAgents & StagersProfiles & ListenersModulesMultiplayerSOCKS5Task Orchestration


Features

  • Multiplayer-mode: Real-time collaboration between operators with Interactive session locking
  • Proxy Awareness: SOCKS5 reverse proxy functionality
  • Task Orchestrator: Chain modules for complex operations
  • Role-Based Access Control: Co-ordinates access and permissions with admin/operator/viewer roles
  • Multi-Operator Extension Module System: Operators integrate their own local extension modules without interfering with each other
  • Modular Payload Architecture Customize the implant capability by including or excluding specific advanced features
  • Polymorphic Payloads: Randomized variable and function names, XOR-based string obfuscation
  • Secure Communication: HTTPS is the primary C2 channel. Implants are pre-registered with a per-agent symmetric keys (AES-128-CBC + HMAC-SHA256). The framework validates the secret key and enforces encrypted communication using Fernet layer over HTTPS
  • Malleable profiles: Customize agent behavior and communication patterns
  • Sanbox & Debugger Detection: Anti-analysis self-deletion
  • Payload staging Seamless staging of payloads, files
  • File Operations: Upload and download files
  • Redirector Support: Manage external infrastructure pointing to internal listeners via profiles
  • Failover deployment: Agent embeds failover C2 servers
  • Shellcode Injection: Shellcode injection into sacrificial processes with NtQueueApcThread, NtCreateThreadEx, RtlCreateUserThread, CreateRemoteThread
  • Unmanaged PE Execution: Execute arbitrary Windows executables (PE) in a sacrificial process with Process Hollowing, or Complete PE execution in agent's memory space
  • .NET Assembly Execution: In-memory execution of .NET Assemblies
  • BOF Execution: Load and Execute Beacon Object Files
  • Reporting handler: Easy post-operation report writing

Installation:

NeoC2 works well on Debian based Linux distribution, such as Ubuntu and Kali Linux. See the Installations guide for instructions.

Documentation

Read https://neoc2.readthedocs.io/en/latest/ for all Usage guides

Blog PART 1: Learning: Neo Command & Control Framework (Part 1) Tutorial & Usage guide https://medium.com/@stillbigjosh/learning-neo-command-control-framework-part-1-912ac0b68f2b

Blog PART 2: Learning: Neo Command & Control Framework (Part 2) Tutorial & Usage guide https://stillbigjosh.medium.com/learning-neo-command-control-framework-part-2-tutorial-usage-guide-f2891b44a96d

Blog PART 3: Bypassing Windows 11 Defender with NeoC2 & MSFVenom https://stillbigjosh.medium.com/bypass-windows-11-defender-with-neoc2-msfvenom-part-3-e61cbe055bde

Contributions

This project is accepting contributions and under active development. You can submit a pull request or Join discussions https://github.com/stillbigjosh/Neo/discussions

Disclaimer

Users are responsible for ensuring their use of this framework complies with laws, regulations, and corporate policies. The author cannot be held responsible for any malicious utilizations. The Software is intended exclusively for authorised penetration testers and security researchers who have obtained authorisation from the owner of each target system. By downloading this software you are accepting the terms of use and the licensing agreement.

Acknowledgments, Contributors & Involuntary Contributors

  • @TrustedSec Awesome BOF collections
  • @Praetorian COFFloader implementation for Go-ecosystem
  • @ropnop CLR library made executing .NET from Go
  • Sliver This project was deeply inspired by Sliver
  • Mythic Trinity Agent Modular build was inspired by Mythic

Support

This Project is created and maintained by @stillbigjosh