Magic C2
Magic C2 is a Red Team Command and Control (C2) framework designed with advanced capabilities to bypass antivirus (AV) and endpoint detection and response (EDR) systems. This open-source project aims to enhance security research and development in offensive security techniques.
Key Features:
- AV/EDR Bypass: Implements various techniques to evade detection by security software.
- Cross-Platform Compatibility: Server-side developed in Go and client-side in Python 3.
- Lightweight Architecture: Utilizes a unique CLite library to reduce the size of the RAT by over 90%.
- Memory Loading Mechanism: Introduces a new method for loading executables in memory, making it smaller and easier to develop than traditional methods.
- Encryption and Obfuscation: All strings are encrypted at compile time, and additional measures are taken to protect sensitive data during execution.
Benefits:
- Open Source: Fully open for modification and enhancement, encouraging community contributions.
- Educational Purpose: Aimed at improving security development capabilities and understanding of attack vectors.
- Legal Compliance: Users are advised to ensure legal authorization before using the tool in any security operations.
Highlights:
- Version: Magic C2 v2.0 Beta
- Community Engagement: Actively encourages feedback and contributions from users.