OffensiveNotion - Notion As A Platform For Offensive Operations

OffensiveNotion – Notion As A Platform For Offensive Operations

Notion (yes, the notetaking app) as a C2.

Wait, What?

Yes.

But Why?

What started as a meme grew into a full project. Just roll with it.

Read more!

Here’s our blog post about it: We Put A C2 In Your Notetaking App: OffensiveNotion

Features

  • A full-featured C2 platform built on the Notion notetaking app.
  • Easy setup: set up your Notion developer API account, drop the Agent to the target, run and enjoy!
  • Cross-platform agent built in Rust that compiles for Linux, Windows, and macOS with the same code base. Includes a Python setup/controller script to simplify the process.
  • A range of capabilities including port-scanning, privilege escalation, asynchronous command execution, file download, and shellcode injection, all controlled from the comfort of a Notion page!
  • Document as you go! The agent identifies special syntax to run commands, so feel free to use the rest of the Notion page to document your operation.
  • Collaborative by design! Notion allows for multiple people to edit and view your notes. Your listener page can handle multiple agents and you can invite your red team friends to your page. Congratulations, that’s a teamserver!
  • Mobile C2! Use the Notion application from your mobile device to issue commands to your agents from anywhere in the world.
  • Stealth! C2 comms ride over the Notion API natively. Your C2 traffic looks like someone is using Notion for its intended purpose.

Quickstart

See the Quickstart guide on how to get going right away!

Documentation

Please see the Wiki for setup, usage, commands, and more!

Thanks & Acknowledgements

This project has been a blast for me! I learned a ton about Rust and how the mechanics of a C2 work. So thank you to my co-creator @mttaggart for helping me along the way. None of this would have been possible without your technical acumen and creativity.

Thank you to Joe Helle (@joehelle) for the POC steps for the fodhelper UAC bypass.

Thank you to all of the great red team devs who came before me, too numerous to list them all, who have created some of my favorite tools. I’m continually inspired by the red dev innovation in our field.

-Husky

As a fairly new security person, I had no idea I’d end up working with such a fantastically talented, kind, and reliable partner and hacker as @HuskyHacks. It’s been a true privilege to build this alongside him.

I want to thank the Taggart Tech community for supporting us along the way and always offering helpful feedback. This would not be possible without you all.

-Taggart

Disclaimer

There is no way to make an offensive security relevant research tool and release it open source without the possibility of it falling into the wrong hands. This tool is only to be used for legal, ethical purposes including, but not limited to, research, security assessment, education. The dev team is not responsible for the misuse of this tool by anyone if used for illegal/unethical purposes. No animals were harmed in the making of this code base (although Cosmo keeps climbing on my keyboard and I have to put him over on the couch, which I’m sure must feel like torture to him).

See the LICENSE for more details.

Leave a Reply

Your email address will not be published.

Special Offer for Hackers!Sign up to get your $5 Coupon code, weekly deals and latest hacking tools straight to your inbox!
X