Advanced AI-Enabled
Cyber Command & Control

Available for Windows, macOS, and Linux
IRIS Command Interface
SECURE
> Initializing IRIS C2 secure interface...
> Loading advanced reconnaissance modules
> Loading polymorphic payload generators
> Loading AI tactical advisor
> All systems operational
> AI: What operation would you like to plan today?
>
Analyze target network for vulnerabilities
AI: Beginning passive reconnaissance...
• Scanning network topology
• Identifying potential entry points
• Analyzing security posture
• Detecting vulnerable services
AI: Vulnerability analysis complete. Found 3 potential entry vectors.
>
Recommend optimal approach
AI: Based on analysis, I recommend:
1. Exploit outdated web application on public-facing server
2. Deploy polymorphic payload to evade detection
3. Establish encrypted C2 channel via DNS tunneling
AI: Would you like me to prepare this operation?
_
PLATFORM INTERFACE

Advanced Command & Control Interface

IRIS C2 - Penetration Testing Framework
New Project
Open Project
Save Project
Run Docker Tools
Metasploit Console
HuffLoader
EagleC2
Shodan Search
Settings
Help
Agent Mode
Run Nmap Scan
Run Metasploit Module
Welcome
HuffLoader
EagleC2
Metasploit

Welcome to IRIS C2

IRIS C2 is a penetration testing framework with integrated AI co-pilot. Use the menu or toolbar to get started.

Recent Projects:

Co-Pilot

AI co-pilot ready. Please configure an AI provider in settings.

10:48:40AI provider configured. Ready to chat.

10:52:07You: Test

10:52:08I've received your test message. This is a confirmation that IRIS C2 is active and ready to assist with offensive security operations. To proceed effectively, I'll need specific information about your target environment, objectives, or the specific phase of penetration testing you're currently in (reconnaissance, exploitation, post-exploitation, etc.). Without specific context, I can only provide general guidance.

**Attack Strategy:** Initial strategy would begin with passive reconnaissance to gather information about the target without alerting defenses. This typically includes OSINT, subdomain enumeration, service identification, and vulnerability scanning.

$echo 'IRIS C2 is active and awaiting specific target information'
Terminal
Metasploit: Not Running Docker: Not Running API: Configured Agent: Active VPN: Disconnected

Advanced Evasion

Prioritizes polymorphism and stealth techniques to evade even the most sophisticated AV/EDR systems, with fileless implants that leave minimal forensic footprint across Windows, macOS, and Linux.

AI Co-Pilot

Enables red teams to have bigger impact with fewer people, while up-skilling junior and mid-level operators both during operations and over time.

Counter-Attribution

State-of-the-art techniques enable operators to obfuscate identity or emulate TTPs of APTs from around the world, making attribution nearly impossible.

CROSS-PLATFORM

Operate on Any Platform

Cross-Platform Compatibility

IRIS C2 is engineered to operate seamlessly across all major operating systems, providing consistent functionality and performance regardless of your team's preferred environment.

Windows

Full support for Windows 10/11 with native syscall execution and EDR evasion

macOS

Complete support for Intel and Apple Silicon with TCC bypass capabilities

Linux

Extensive support for major distributions with kernel module evasion techniques

Key Cross-Platform Benefits:

  • Unified command and control interface across all platforms
  • Consistent payload generation and execution capabilities
  • Platform-specific optimizations for maximum stealth and performance
  • Seamless lateral movement between heterogeneous environments

Platform Feature Comparison

IRIS C2 provides consistent capabilities across all supported platforms, with specialized features optimized for each operating system.

FeatureWindowsmacOSLinux
Fileless Execution
EDR/AV Evasion
Dynamic Syscall Execution
Process Injection
Kernel Mode Operations
TCC Bypass
AMSI Bypass
Credential Harvesting
* All features are continuously updated to maintain effectiveness against the latest security measures
TECHNOLOGY

See IRIS C2 in Action

Advanced Polymorphic Evasion

Watch how IRIS C2's polymorphic engine dynamically mutates payloads to evade detection, making each instance unique and undetectable by signature-based security solutions.

  • Real-time code mutation and obfuscation

  • Fileless execution with minimal forensic footprint

  • Dynamic syscall execution to bypass EDR hooks

Polymorphic Engine
Generating polymorphic payload...
Analyzing target environment
Selecting evasion techniques
Applying code transformation
Implementing syscall obfuscation
Adding anti-analysis measures
Encrypting payload with dynamic key
0%
Cloud-hosted (fastest setup, requires internet)
On-premise server (secure, air-gap compatible)
Local machine (30B+ parameter models supported)
AI Co-Pilot Terminal

AI-Powered Operations

Experience how IRIS C2's AI co-pilot provides real-time guidance, automates complex tasks, and helps operators make strategic decisions during penetration testing operations.

  • Natural language interface for complex operations

  • Adaptive attack strategies based on real-time feedback

  • Continuous operator skill enhancement through AI guidance

CAPABILITIES

Specialized Modules

HuffLoader
Welcome
HuffLoader

HuffLoader - Shellcode Obfuscation & Dynamic Syscall Execution

HuffLoader provides advanced shellcode obfuscation and execution capabilities:

  • Huffman Coding-based Shellcode Obfuscation
  • Dynamic API Resolution
  • Unhooking with HellsGate/HalosGate/TartarusGate Techniques
  • Indirect Syscall Execution
  • API calls and syscalls hash obfuscation
  • Anti-Debugging
EagleC2
Server
Client
Sessions
Implants
Listeners
Implant Type
Aether
Aether: Minimalist, self-mutating macOS implant (x86_64/ARM64) designed for fileless execution and runtime mutation
Implant Configuration
Implant Name:
Format:
executable
Metasploit
Module Type:Exploits
Search:dell
unix
http
dell_kace_k1000_upload
windows
Description:
This module exploits a file upload vulnerability in Kace K1000 versions 5.0 to 5.3, 5.4 prior to 5.4.76849 and 5.5 prior to 5.5.90547 which allows unauthenticated users to execute arbitrary commands under the context of the 'www' user. This module also abuses the 'KSudoClient::RunCommandWait' function to gain root privileges.
CCTV Recon
Vulnerable Cameras: 90
Hacked Cameras: 0
Search Location: 39.904200, 116.407400 - Found 91 cameras
Camera: 36.110.161.106 ⚠️ Vulnerable
Hikvision - Beijing, China
Vulnerabilities: CVE-2017-7921, CVE-2021-36260
Cameras (sorted by distance):
IPDistanceBrandLocationOpen Ports
222.128.55.530 mHikvisionBeijing, China8000
111.203.252.10 mHikvisionBeijing, China80
FLEXIBILITY

Modular Architecture

Customizable Framework

The IRIS platform is highly modular, enabling users to easily employ their own catalog of exploits and implants. Seamlessly integrate your existing tools or leverage IRIS's built-in capabilities.

IRIS C2 is fully cross-platform, with native support for Windows, macOS, and Linux environments. This ensures seamless operation regardless of your team's preferred operating system or target environment.

Cross-platform lateral movement tooling for rapid, stealthy operations

Seamless BYOVD (Bring Your Own Vulnerable Driver) functionality

Continuous updates to stay four steps ahead of defensive measures

Advanced exfiltration techniques that bypass data loss prevention systems

Flexible LLM Integration

IRIS enables users to easily work with jailbroken state-of-the-art large language models, as well as open source or internal models, with multiple deployment options to suit your operational needs.

LLM Configuration
Deployment:
Cloud-hosted
Model:
Claude 3.7 Sonne
Deployment Options:
Cloud-hosted (fastest setup, requires internet)
On-premise server (secure, air-gap compatible)
Local machine (30B+ parameter models supported)
INTELLIGENCE

AI Co-Pilot

IRIS C2's integrated AI co-pilot allows red teams to have a bigger impact with fewer people. The co-pilot up-skills junior and mid-level operators both during operations and persistently over time, while providing advanced decision support that leaves blue teams with virtually no chance of effective defense.

01

Tactical Guidance

AI-generated attack strategies tailored to specific target environments, with adaptive recommendations based on real-time feedback and changing conditions.

02

Evasion Techniques

Advanced evasion recommendations to minimize detection risk, including timing attacks, proxy/VPN routing, and low-and-slow techniques calibrated to the target environment.

03

Vulnerability Analysis

Intelligent identification and prioritization of attack vectors based on comprehensive vulnerability analysis and success probability calculations.

04

Natural Language Interface

Intuitive command interface allowing operators to interact with the platform using natural language, streamlining complex operations and reducing training requirements.

Co-Pilot

AI co-pilot ready. Please configure an AI provider in settings.

10:48:40AI provider configured. Ready to chat.

10:52:07You: Test

I've received your test message. This is a confirmation that IRIS C2 is active and ready to assist with offensive security operations. To proceed effectively, I'll need specific information about your target environment, objectives, or the specific phase of penetration testing you're currently in.

Without specific context, I can only provide general guidance. "Attack Strategy:" initial strategy would begin with passive reconnaissance to gather information about the target without alerting defenses.

10:52:10

root@kali:~#echo 'IRIS C2 is active and awaiting specific target information or objectives'
Provider: Claude (Anthropic)
Model: Claude 3.7 Sonne
Connected to Anthropic
OPERATIONS

Operational Use Cases

Ethical Red Team Operations

Conduct authorized penetration testing to identify and remediate security vulnerabilities in critical infrastructure and systems.

  • Comprehensive vulnerability assessment
  • Simulated advanced persistent threats
  • Zero-day vulnerability research
  • Security control validation

Intelligence Community Operations

Support legal targeted access operations with advanced tools and AI assistance for authorized national security purposes.

  • Authorized intelligence gathering
  • Counter-terrorism operations
  • Foreign intelligence monitoring
  • Critical infrastructure protection

Military Cyber Operations

Enable defensive and offensive cyber capabilities for military operators in accordance with rules of engagement and legal frameworks.

  • Cyber terrain mapping
  • Tactical cyber operations
  • Strategic capability development
  • Advanced persistent defense
SPECIFICATIONS

System Requirements

Windows

  • Windows 10/11 (64-bit)
  • Intel Core i5/AMD Ryzen 5 or better
  • 8GB RAM (16GB recommended)
  • 500MB disk space (SSD recommended)
  • Administrator privileges required

macOS

  • macOS 12.0+ (Monterey or newer)
  • Intel or Apple Silicon processor
  • 8GB RAM (16GB recommended)
  • 500MB disk space (SSD recommended)
  • Administrator privileges required

Linux

  • Ubuntu 20.04+, Debian 11+, Kali, or RHEL 8+
  • Intel Core i5/AMD Ryzen 5 or better
  • 8GB RAM (16GB recommended)
  • 500MB disk space (SSD recommended)
  • Root privileges required
LICENSING

Pricing & Availability

Enterprise License

$12,000per user / year

IRIS C2 licenses are available on a subscription basis with a minimum requirement of 3 licenses. Pricing valid as of May 2025.

Note: Additional costs related to customers' AI infrastructure are not included in this figure.

Regional Availability

At this time, IRIS C2 is only immediately available to purchase by vetted users in the following regions:

Europe
Australia
Canada
Japan
New Zealand
Norway
Switzerland
United States

All enquiries outside of these regions will be subject to extended vetting. IRIS C2 is not available for purchase to users based in Belarus, Russia, Ukraine, Central Africa, China, North Korea, Iran, Iraq, Lebanon, Republic of Congo or Libya.

SECURE ACCESS

Request Capability Briefing

IRIS C2 is available exclusively to authorized government agencies, military organizations, and cleared defense contractors. The platform is subject to all export controls typically applicable to advanced offensive cyber security tooling. Contact our secure channels to request a capability briefing and demonstration.