• Stars
    star
    1,048
  • Rank 43,968 (Top 0.9 %)
  • Language
    Rust
  • License
    MIT License
  • Created almost 3 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Notion as a platform for offensive operations

OffensiveNotion

Notion (yes, the notetaking app) as a C2.


A collaboration by:

Mttaggart HuskyHacks


DocumentationĀ Ā Ā |Ā Ā Ā Pull RequestsĀ Ā Ā |Ā Ā Ā Issues

Release Pull Requests License


on

Wait, What?

Yes.

But Why?

What started as a meme grew into a full project. Just roll with it.

Read more!

Here's our blog post about it: We Put A C2 In Your Notetaking App: OffensiveNotion

Features

  • šŸ“” A full-featured C2 platform built on the Notion notetaking app.
  • šŸš§ Easy setup: set up your Notion developer API account, drop the Agent to the target, run and enjoy!
  • šŸ–„ļø Cross-platform agent built in Rust that compiles for Linux, Windows, and macOS with the same code base. Includes a Python setup/controller script to simplify the process.
  • ā˜¢ļø A range of capabilities including port-scanning, privilege escalation, asynchronous command execution, file download, and shellcode injection, all controlled from the comfort of a Notion page!
  • šŸ“œ Document as you go! The agent identifies special syntax to run commands, so feel free to use the rest of the Notion page to document your operation.
  • šŸ¤ Collaborative by design! Notion allows for multiple people to edit and view your notes. Your listener page can handle multiple agents and you can invite your red team friends to your page. Congratulations, that's a teamserver!
  • šŸ“±Mobile C2! Use the Notion application from your mobile device to issue commands to your agents from anywhere in the world.
  • šŸ•µļøā€ā™€ļø Stealth! C2 comms ride over the Notion API natively. Your C2 traffic looks like someone is using Notion for its intended purpose.

Quickstart

See the Quickstart guide on how to get going right away!

Documentation

Please see the Wiki for setup, usage, commands, and more!

Thanks & Acknowledgements

This project has been a blast for me! I learned a ton about Rust and how the mechanics of a C2 work. So thank you to my co-creator @mttaggart for helping me along the way. None of this would have been possible without your technical acumen and creativity.

Thank you to Joe Helle (@joehelle) for the POC steps for the fodhelper UAC bypass.

Thank you to all of the great red team devs who came before me, too numerous to list them all, who have created some of my favorite tools. Iā€™m continually inspired by the red dev innovation in our field.

-Husky

As a fairly new security person, I had no idea I'd end up working with such a fantastically talented, kind, and reliable partner and hacker as @HuskyHacks. It's been a true privilege to build this alongside him.

I want to thank the Taggart Tech community for supporting us along the way and always offering helpful feedback. This would not be possible without you all.

-Taggart

Contributors

The dev team would like to thank the following contributors for their work on OffensiveNotion:

Contributor Contribution
@MEhrn00 Execution guardrails for domain name/joined status šŸš€
@hitcxy Improved shell encoding šŸš€

Legend
šŸš€ - Issue/PR submitted and code landed
šŸ’” - Cool ideas
šŸ¤” - Consultation/Inspiration
šŸ›- Bug submission/fix

Disclaimer

There is no way to make an offensive security relevant research tool and release it open source without the possibility of it falling into the wrong hands. This tool is only to be used for legal, ethical purposes including, but not limited to, research, security assessment, education. The dev team is not responsible for the misuse of this tool by anyone if used for illegal/unethical purposes. No animals were harmed in the making of this code base (although Cosmo keeps climbing on my keyboard and I have to put him over on the couch, which I'm sure must feel like torture to him).

See the LICENSE for more details.

More Repositories

1

pwst-resources

Resources for Students in the Practical Webapp Security and Testing course
HTML
159
star
2

wtfbins

WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.
TypeScript
139
star
3

blue-jupyter

Jupyter Notebooks for the Blue Team
Jupyter Notebook
136
star
4

security-tools

A very opinionated list of security tools
116
star
5

seclab

Automated security lab provisioning
HCL
57
star
6

rustyneedle

A Rust-based dropper for shellcode payloads.
Rust
41
star
7

crux

A proof-of-concept malicious Chrome extension
JavaScript
34
star
8

electron-app-tracker

Jupyter Notebook
32
star
9

quasar

quASAR: ASAR manipulation made easy
JavaScript
21
star
10

jupyter-pancakes

Jupyter demo repository for PancakesCon2020
Jupyter Notebook
16
star
11

pwfuzz-rs

Rust-based password mutator for brute force attacks
Rust
13
star
12

bolus

Library for shellcode injection
Rust
13
star
13

seclab-playbooks

Ansible playbooks for the Seclab project
Jinja
12
star
14

lcars-css

LCARS-like styling. LCARS Ā© CBS Studios Inc.
CSS
10
star
15

hacksummer-21

Repo for the 2021 edition of HackSummer
9
star
16

webshell-entropy

Demonstrating the value of entropy as a detection mechanism for obfuscated webshells.
Jupyter Notebook
9
star
17

hacker-strategies

Oblique Strategies for Hackers
TypeScript
8
star
18

entropyscan-rs

Rust-based file entropy scanner for threat hunting
Rust
8
star
19

corrodedshadow

Rust PoC for enumerating/deleting Volume Shadow Copies
Rust
7
star
20

jupyter-pcap

Packet capture analysis in Jupyter
Jupyter Notebook
6
star
21

gitclass

Simple tools for managing student repos
Rust
5
star
22

bluebpf

C
5
star
23

xllrs

XLL Creation with Rust PoC
Rust
5
star
24

python-cs

Computer Science lessons using Python
Python
5
star
25

nimbuster

Directory brute-forcer written in Nim. Because we neede danother one.
Nim
5
star
26

gitdemo2

4
star
27

shell-setup

Repo for automating shell config on new machines
Shell
4
star
28

bnb-py

Text-based adventure based on Black Hills Information Security's "Backdoors and Breaches"
Python
3
star
29

kali-vagrant

Vagrant config for Kali
Shell
3
star
30

hs21-files

Scripts/tests for HackSummer 21
Shell
3
star
31

zap-automation

Automating web app scanning in OWASP ZAProxy
Python
3
star
32

schoolcast

Digital signage generator for schools
JavaScript
2
star
33

hsquiz

Framework for quizzes in HackSummer VMs
Rust
2
star
34

everlive-docker

Repo for everLive.io's Intro to Docker course
JavaScript
1
star
35

periscope

Curriculum Mapping for independent schools based on Understanding by Design
PHP
1
star
36

joyofhaskell

Exercise solutions for the book _The Joy of Haskell_
Haskell
1
star
37

evildn

JavaScript
1
star
38

hacking

Practice for No Starch Press's Hacking: The Art of Exploitation
C
1
star
39

owlfarts

Owlfarts static website
HTML
1
star
40

aoc2020

Solutions for Advent of Code 2020
Rust
1
star
41

rustdll32

Rust
1
star
42

I-S00N

Anxun Shanghai (I-SOON) Data Dump Translations (PII Redacted)
1
star