A comprehensive offensive-security framework for penetration testers and security researchers.
Features •
Quick Start •
Usage Workflow •
Screenshots •
Disclaimer •
License
- 🖥️ Remote Command Execution — Run commands and scripts on remote systems
- 📝 System Intelligence Gathering — Collect detailed OS, network, and hardware data
- 🔒 Persistence — Create startup registry entries on Windows targets
- 📦 Payload Conversion — Package Python payloads as standalone executables
- 🕵️ Payload Obfuscation — Evade antivirus engines with packing and obfuscation
- 🔄 Reverse TCP — Establish covert reverse connections
- 📸 Screenshot Capture — Snap the target desktop in real time
- 💻 Interactive Remote Shell — Gain a fully interactive CLI session
- ⌨️ Keylogger Generation — Record keystrokes silently
- 🔐 Robust Encryption — Protect C2 traffic with strong algorithms
- 🔑 Hot-Swap Keys — Rotate encryption keys during active sessions
python3 executor_setup.py
python3 th3executor.py
python3 payload.py
- Setup — Define payload and server options via executor_setup.py
- Serve — Start th3executor.py; wait for inbound sessions
- Deliver — Supply the generated executable or raw Python payload to the target
- Connect — A session appears automatically in the C² console
- Operate — Execute commands, deploy modules, and maintain access
Oberon Framework is intended for authorised penetration testing and security research purposes only.
Any unauthorised or malicious use is strictly prohibited. You are solely responsible for your actions.
Distributed under the MIT License. See the LICENSE file for more details.