Educational Use Only: This software is designed for authorized security research, AV testing, and penetration testing with explicit permission. Built to understand how advanced persistent threats (APTs) operate in order to develop better defenses.

Purpose and Scope

This framework was built to understand the techniques used by advanced persistent threats (APTs) and malware. By implementing these techniques in a controlled, educational environment, security researchers can:

Architecture Overview

The framework follows a modular client-server architecture with clear separation between the monitoring payload and the administration interface.

Server (Target Simulation)

server_modules/
├── api_routes.py              # Flask REST API endpoints
├── monitoring.py              # System monitoring core
├── advanced_c2.py             # Multi-channel C2 (DNS, ICMP, dead drops)
├── anti_debug.py              # Debugger detection techniques
├── anti_vm.py                 # Virtualization detection
├── evasion.py                 # String obfuscation, control flow
├── persistence_manager.py     # Registry, service, WMI persistence
├── surveillance_suite.py      # Audio/video monitoring
└── encryption.py              # AES-256 payload encryption

Client (Administration Interface)

client_modules/
├── gui.py                     # Tkinter administration GUI
├── api_client.py              # REST API wrapper
├── server_tab.py              # Per-server management view
└── callback_listener.py       # Reverse connection handler

Technical Implementations

Multi-Channel Command & Control

Educational implementation of covert communication channels used by real APTs:

Evasion Techniques (Educational)

Implemented to understand how malware avoids analysis:

Persistence Mechanisms

Multiple techniques for surviving reboots, implemented to test detection:

Build System

Uses Nuitka to compile Python to C, producing native executables:

Security Considerations

Built with multiple safeguards for responsible use:

What I Learned

Building this framework provided deep insight into how modern malware operates. Understanding these techniques is essential for developing effective defenses. The complexity of multi-channel C2, the sophistication of evasion techniques, and the persistence of modern threats all became clear through implementation.

Applications