{"id":19892393,"url":"https://github.com/hackercalico/magic_c2","last_synced_at":"2025-05-16T08:04:58.996Z","repository":{"id":248864568,"uuid":"830029793","full_name":"HackerCalico/Magic_C2","owner":"HackerCalico","description":"Red Team C2 Framework with AV/EDR bypass capabilities.","archived":false,"fork":false,"pushed_at":"2025-02-12T04:43:32.000Z","size":11139,"stargazers_count":379,"open_issues_count":3,"forks_count":63,"subscribers_count":6,"default_branch":"main","last_synced_at":"2025-04-09T06:03:11.604Z","etag":null,"topics":["antivirus-bypass","antivirus-evasion","bypass-antivirus","bypass-av","bypass-edr","c2","c2-framework","rat","red-team"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/HackerCalico.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-07-17T13:10:21.000Z","updated_at":"2025-04-08T14:26:23.000Z","dependencies_parsed_at":"2025-02-24T17:04:40.756Z","dependency_job_id":"0a3b2cc4-b471-49e5-9e3d-dec1d3ee7a1d","html_url":"https://github.com/HackerCalico/Magic_C2","commit_stats":null,"previous_names":["hackercalico/magic_c2"],"tags_count":2,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackerCalico%2FMagic_C2","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackerCalico%2FMagic_C2/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackerCalico%2FMagic_C2/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackerCalico%2FMagic_C2/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/HackerCalico","download_url":"https://codeload.github.com/HackerCalico/Magic_C2/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254493378,"owners_count":22080126,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["antivirus-bypass","antivirus-evasion","bypass-antivirus","bypass-av","bypass-edr","c2","c2-framework","rat","red-team"],"created_at":"2024-11-12T18:23:23.731Z","updated_at":"2025-05-16T08:04:53.989Z","avatar_url":"https://github.com/HackerCalico.png","language":"Python","readme":"# Magic_C2\r\n\r\n### Your star inspires me ~🌟\r\n\r\n### 你的 Star 是我前进的动力 ~🌟\r\n\r\n### 1. 介绍\r\n\r\nVersion: Magic C2 v2.0 Beta\r\n\r\n项目: https://github.com/HackerCalico/Magic_C2\r\n\r\n应网友需求以及我的时间精力状况，在开发完 v2.0 的基础功能后，我就将它发布了出来，希望你们喜欢！\r\n\r\n![run.png](https://github.com/HackerCalico/Magic_C2/blob/main/run.png)\r\n\r\n### 2. 项目亮点\r\n\r\n1.完全开源，易于二次开发，源码视频讲解: (待录制)\r\n\r\n2.RAT 具备一定免杀能力：\r\n\r\n(1) 反射加载遵循尽可能少的调用 WinApi 的 OPSEC 原则。\r\n\r\n(2) 默认对反射加载器的汇编进行随机混淆以及对 RAT 本体加密，支持反射加载器以内联汇编函数的形式存在 (打破了常规 ShellCode 加载流程)。\r\n\r\n(3) 默认对 RAT 的所有字符串编译时加密。\r\n\r\n(4) 默认在 RAT 睡眠时加密堆中的字符串。\r\n\r\n(5) 实现了轻量级 C/C++ EXE (ExeLite) 内存加载的新机制，比 BOF 更小更容易开发。\r\n\r\n(6) 默认对所有 WinApi 进行栈欺骗调用 (包括 ExeLite)，支持自定义 Gadget。\r\n\r\n(7) 用本项目特有的 CLite 库完全代替 C/C++ 库，RAT 体积缩小超过 90%。\r\n\r\n3.跨平台兼容，服务端 Go，客户端 Python 3。\r\n\r\n### 3. 安装\r\n\r\n1.服务端 (Go)：\r\n\r\n在服务端目录执行以下命令：\r\n\r\n```bash\r\ngo mod init Server\r\ngo get github.com/gin-gonic/gin\r\ngo get github.com/gorilla/websocket\r\ngo get github.com/mattn/go-sqlite3\r\n```\r\n\r\ngo-sqlite3 需要 GCC 的解决方法：\r\n\r\n(1) 下载 https://github.com/mstorsjo/llvm-mingw/releases 中的 llvm-mingw-2025xxxx-ucrt-x86_64\r\n\r\n(2) 将 bin 添加至环境变量\r\n\r\n(3) 设置 CGO_ENABLED=1\r\n\r\n(4) 重启编译器\r\n\r\n2.客户端 (Python 3)：\r\n\r\n```bash\r\npip install PyQt6\r\npip install appdirs\r\npip install websocket-client\r\npip install capstone\r\npip install keystone-engine\r\n```\r\n\r\n3.RAT / ExeLite 二次开发 (C/C++)：\r\n\r\nVisual Studio Installer ---\u003e 单个组件 ---\u003e LLVM (clang-cl) 和 Clang ---\u003e 安装\r\n\r\n### 4. 已知问题\r\n\r\n(1) 若伪造 RAT 向服务端发送特殊构造的破坏性数据可能导致服务端瘫痪，解决方法：重写 POST 请求数据加密方式。\r\n\r\n(2) 客户端与服务端的数据库未加密，SQLite 彻底删除数据需要在执行 DELETE 后通过 VACUUM 清除缓存。首次运行会在服务端目录生成 server.db，在 AppData\\Local\\Magic C2\\v2.0\\client 生成 client.db。\r\n\r\n(3) 未进行全面的软件测试和压力测试，在简单的运行测试中未发现问题。\r\n\r\n(4) 更多问题见 Issues。\r\n\r\n### 5. 免责声明\r\n\r\n(1) 本项目仅用于网络安全技术的学习研究，旨在提高安全开发能力，研发新的攻防技术。\r\n\r\n(2) 若执意要将本项目用于安全业务，需先确保已获得足够的法律授权，在符合网络安全法的条件下进行。\r\n\r\n(3) 本项目由个人独立开发，暂未做全面的软件测试，请使用者在虚拟环境中测试本项目的功能，以免发生意外。\r\n\r\n(4) 本项目为远程管理软件，未包含任何恶意功能，若使用者在使用本项目的过程中存在任何违法行为或造成任何不良影响，需使用者自行承担责任，与项目作者无关。\r\n\r\n(5) 本项目完全开源，请勿将本项目用于任何商业用途。","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhackercalico%2Fmagic_c2","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fhackercalico%2Fmagic_c2","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhackercalico%2Fmagic_c2/lists"}