Skip to content

CirqueiraDev/OverburstC2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OverburstC2 — Based on SentinelaNet

Dev Status

Banner

This botnet is an enhanced version of SentinelaNet and is publicly available for free.


🔧 Loading Bots

You can use a collection of network security evaluation tools designed to identify vulnerabilities in various devices.
Intended for educational purposes and authorized security testing only.

DVR Scanner

  • Tests DVR devices for XML injection vulnerabilities in the NTP configuration.

ZHONE Router Scanner

  • Tests ZHONE routers for command injection via the ping diagnostic feature.

Fiber Router Scanner

  • Scans fiber routers running the BOA web server for command injection vulnerabilities.

Telnet Brute Force

  • Attempts common credential combinations on IoT and network devices via Telnet.

🧪 Exploits / Scanners / Loaders


🔐 Admin Commands

Command Description
!user Add / List / Remove users
!blacklist Add / List / Remove blacklisted targets

🧠 CNC Commands

Command Description
help Shows list of commands
botnet Displays available botnet attack methods
bots Shows all connected bots
stop Stops all floods in progress
clear Clears the console screen
exit Disconnects from the C&C server

🚀 Payload Methods Available

Method Description
.UDP Sends varying size UDP packets to overwhelm the target
.TCP Continuously sends TCP packets to exhaust connections
.SYN Sends SYN requests to flood pending TCP handshakes
.MIX Alternates between TCP and UDP to bypass protections
.VSE Sends Valve Source Engine protocol floods
.FIVEM Specialized payload designed for FiveM servers
.OVHUDP UDP floods with random payloads targeting specific ports
.OVHTCP Randomized byte sequences and terminators to bypass WAFs
.DISCORD Specialized UDP packet targeting Discord services

Demo Screenshot


⚠️ Legal Notice

This project is strictly intended for educational and research purposes only.
Misuse of this software may be illegal and lead to criminal penalties.
Always use cybersecurity knowledge to defend systems, never to attack them.


🤝 Contributing

Contributions to improve security research tools are welcome, especially those that:

  • Improve vulnerability detection
  • Add documentation
  • Improve code quality
  • Enable responsible disclosure support

👤 Author

Releases

No releases published

Packages

No packages published