A comprehensive offensive-security framework for penetration testing and security research
Features •
Quick Start •
Usage Workflow •
Disclaimer •
License
- 🖥️ Remote Command Execution — Run commands and scripts on remote systems
- 📝 System Intelligence Gathering — Collect detailed OS, network, and hardware data
- 🔒 Persistence — Create startup registry entries on Windows targets
- 📦 Payload Conversion — Package Python payloads as standalone executables
- 🕵️ Payload Obfuscation — Evade antivirus engines with packing and obfuscation
- 🔄 Reverse TCP — Establish covert reverse connections
- 📸 Screenshot Capture — Snap the target desktop in real time
- 💻 Interactive Remote Shell — Gain a fully interactive CLI session
- ⌨️ Keylogger Generation — Record keystrokes silently
- 🔐 Robust Encryption — Protect C2 traffic with strong algorithms
- 🔑 Hot-Swap Keys — Rotate encryption keys during active sessions
python3 src/payload_setup.py
python3 src/oberon_framework.py
python3 src/payload.py
- Setup — Define payload and server options via
payload_setup.py
- Serve — Start
oberon_framework.py
and wait for inbound sessions - Deliver — Supply the generated executable or raw Python payload to the target
- Connect — A session appears automatically in the C² console
- Operate — Execute commands, deploy modules, and maintain access
⚠️ EDUCATIONAL PURPOSE ONLYOberon Framework is developed exclusively for educational purposes, authorized penetration testing, and security research in controlled environments.
- ✅ Use only on systems you own or have explicit written permission to test
- ✅ Intended for learning cybersecurity concepts and defensive strategies
- ❌ Any unauthorized or malicious use is strictly prohibited
- ❌ Do not use this tool for illegal activities or unauthorized access
You are solely responsible for your actions. The developers assume no liability for misuse of this framework.
Distributed under the MIT License. See the LICENSE file for more details.