OverburstC2
OverburstC2 is a C2 (Command and Control) written in Python and C, designed to manage malware that conducts large-scale DDoS attacks
Install / Use
/learn @CirqueiraDev/OverburstC2README
Loading Bots
You can use a collection of network security evaluation tools designed to identify vulnerabilities in various devices.
Intended for educational purposes and authorized security testing only.
DVR Scanner
- Tests DVR devices for XML injection vulnerabilities in the NTP configuration.
ZHONE Router Scanner
- Tests ZHONE routers for command injection via the ping diagnostic feature.
Fiber Router Scanner
- Scans fiber routers running the BOA web server for command injection vulnerabilities.
Telnet Brute Force
- Attempts common credential combinations on IoT and network devices via Telnet.
Exploits / Scanners / Loaders
- https://github.com/CirqueiraDev/botnet-exploits
Requirements:
colorama==0.4.6
bcrypt==4.1.2
Commands:
git clone https://github.com/CirqueiraDev/OverburstC2.git
cd OverburstC2
pip install -r requirements.txt
python main.py
<br/>
Admin Commands
| Command | Description |
|--------|-------------|
| !user | Add / List / Remove users |
| !blacklist | Add / List / Remove blacklisted targets |
CNC Commands
| Command | Description |
|--------|-------------|
| help | Shows list of commands |
| botnet | Displays available botnet attack methods |
| bots | Shows all connected bots |
| stop | Stops all floods in progress |
| clear | Clears the console screen |
| exit | Disconnects from the C&C server |
Payload Methods Available
| Method | Description |
|--------|-------------|
| .UDP | Sends varying size UDP packets to overwhelm the target |
| .TCP | Continuously sends TCP packets to exhaust connections |
| .SYN | Sends SYN requests to flood pending TCP handshakes |
| .MIX | Alternates between TCP and UDP to bypass protections |
| .VSE | Sends Valve Source Engine protocol floods |
| .FIVEM | Specialized payload designed for FiveM servers |
| .OVHUDP | UDP floods with random payloads targeting specific ports |
| .OVHTCP | Randomized byte sequences and terminators to bypass WAFs |
| .DISCORD | Specialized UDP packet targeting Discord services |
News / Bugs / Features
- [x] Fixed: some attacks were not being launched
- [x] Fixed: SyntaxError: f-string: unmatched '(' on main.py
- [x] Some methods have been optimized
- [x] The bot code has been reorganized
- [x] STOP command fixed (I think)
- [ ] Added news methods (Soon)
⚠️ Legal Notice
This project is strictly intended for educational and research purposes only.
Misuse of this software may be illegal and lead to criminal penalties.
Always use cybersecurity knowledge to defend systems, never to attack them.
👤 Author
- CirqueiraDev
- Discord: Cirqueira
- Instagram Profile
