Welcome To MBEUBEU C2 Docs
        	π€ Whoami
        I'm Insa Mane, also known as P4p4 M4n3. I'm from Senegal, i'm an electrical engineer and a security researcher .
        I'm simply "A White Adversary Behind the Keyboard".
        I enjoy experimenting with electronics, IoT gadgets, and other little technical gems.
	
π Donate via UNICEF
    	π Connect with me:
    		β’ LinkedIn
    		β’ Twitter
    		β’ GitHub
       
MBEUBEU is a flexible and stealthy open-source Command and Control (C2) framework designed for modern red team operations and adversary simulation. It supports multiple agent types, including Windows and Linux, and integrates advanced features for post-exploitation, evasion, and operator collaboration.
MBEUBEU is fully written in Go (Golang), making it cross-platform. The project is open to contributions from anyone who wants to help make it more powerful and adaptable.
 While MBEUBEU is not yet feature-complete and doesn't aim to compete directly with other C2 frameworks, it is continuously evolving over time with community input and real-world red teaming needs in mind.
        	π§ Features
- π» Multi-platform agent support (Windows, Linux).
 - π C2 Communication fully encrypted
 - π HTTP/HTTPS/QUIC listener support
 - π¦ Malleable C2 profiles via YAML
 - π‘οΈ AV/EDR evasion, sandbox detection, smart delay
 - π‘οΈ Defense Analysis
 - π Shell, PowerShell, and AMSI/ETW bypass execution
 - π Powershell Import (pwsh-import, pwsh-execute) To import and execute .ps1
 - π· screenshots
 - π· Smart stealth screenshots based on window titles
 - π File transfer, download/upload, directory navigation
 - π― Lateral movement: WinRM, PSExec, PTH, DCSync
 - πͺ Credential extraction: Mimikatz, Sharpkatz, hashdump
 - ποΈ Persistence via Startup folder
 - π Persistence via Registry Run key
 - π Persistence via Winlogon key
 - β° Persistence via Scheduled Task
 - π§ In-memory BOF execution
 - π§ In-memory .NET execute-assembly
 - π PowerSploit: PowerView/Mimikatz support
 - π USB propagation, Office document macro injection
 - π§ SOCKS5 proxy tunneling
 - π¨ Real-time Blue Team detection and redirection
 - π Reporting module: report_start / report_stop