Provides advanced C/C++ malware development capabilities including payload generation, obfuscation techniques, and integration with TheSilencer framework for sophisticated loader creation
Integrates with GitHub repositories for malware framework development, specifically mentioning TheSilencer C/C++ malware framework hosted on GitHub
Enables Python-based malware development with advanced templates, obfuscation methods, and threat intelligence analysis tools for security research and penetration testing
Supports memory-safe malware development using Rust programming language with advanced evasion techniques and cross-platform compatibility for security research
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@NoctisAIgenerate a Python reverse shell payload for Windows"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
NoctisAI - Malware Development & Threat Intelligence MCP
** Nocturnal Intelligence System for Advanced Malware Development & Threat Intelligence**
π― About NoctisAI
NoctisAI is a specialized MCP (Model Context Protocol) designed for advanced malware development, threat intelligence, and offensive security operations. Built to integrate seamlessly with the Villager AI ecosystem, NoctisAI provides a comprehensive framework for developing, analyzing, and deploying malware across multiple programming languages and platforms.
Key Features:
π¦ Multi-Language Malware Development (Python, C/C++, Rust, Assembly)
π΅οΈ Advanced Threat Intelligence (IOC analysis, MITRE ATT&CK mapping)
π OSINT & Reconnaissance (Domain intel, social engineering, dark web monitoring)
π¬ Forensic Analysis (Memory, disk, network forensics)
π― APT Simulation (Complete attack simulation and kill chain)
π‘οΈ Enhanced TheSilencer Integration (Your C/C++ malware framework)
ποΈ Architecture
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Cursor AI Assistant β
β (Orchestrator & Decision Engine) β
βββββββββββββββββββββββ¬ββββββββββββββββββββ¬ββββββββββββββββββββββββ
β β
βΌ βΌ
βββββββββββββββββββββββ βββββββββββββββββββββββ
β Villager AI β β NoctisAI β
β (Complex Tasks) β β (Malware/Threat Intel)β
β Port: 37695 β β Port: 8081 β
βββββββββββ¬ββββββββββββ βββββββββββ¬ββββββββββββ
β β
βΌ βΌ
βββββββββββββββββββββββ βββββββββββββββββββββββ
β Kali Container β β TheSilencer β
β (Security Tools) β β (C/C++ Loaders) β
β Port: 1611 β β Integration β
βββββββββββββββββββββββ βββββββββββββββββββββββ
β
βΌ
βββββββββββββββββββββββ
β HexStrike AI β
β (Quick Execution) β
β Port: 8000 β
βββββββββββββββββββββββ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β MCP Ecosystem Flow β
β β
β Cursor AI β Decision Making β Tool Selection β Execution β
β β
β β’ Villager: Complex orchestration, long-running tasks β
β β’ NoctisAI: Advanced malware development, threat intelligence β
β β’ HexStrike: Quick reconnaissance, direct tool execution β
β β
β All tools can work independently or in hybrid workflows β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββπ Quick Start
1. Installation
# Clone NoctisAI
git clone https://github.com/Yenn503/NoctisAI.git
cd NoctisAI
# Create virtual environment
python3 -m venv noctis-env
source noctis-env/bin/activate
# Install dependencies
pip install -r requirements.txt
# Run setup
./scripts/setup_noctis.sh2. Integration with Villager AI
Add to your MCP configuration:
{
"mcpServers": {
"villager-proper": {
"command": "/path/to/Villager-AI/villager-venv-new/bin/python3",
"args": ["/path/to/Villager-AI/src/villager_ai/mcp/villager_proper_mcp.py"],
"env": {
"PYTHONPATH": "/path/to/Villager-AI"
}
},
"noctis-ai": {
"command": "/path/to/NoctisAI/noctis-env/bin/python3",
"args": ["/path/to/NoctisAI/src/noctis_ai/mcp/noctis_mcp.py"],
"env": {
"PYTHONPATH": "/path/to/NoctisAI"
}
},
"hexstrike-ai": {
"command": "/path/to/hexstrike-ai/hexstrike-env/bin/python3",
"args": ["/path/to/hexstrike-ai/hexstrike_mcp.py"]
}
}
}3. Start Services
# Start NoctisAI services
./scripts/start_noctis.sh
# Or start all services together
./scripts/start_ecosystem.shπ οΈ Core Capabilities
Malware Development
Python Framework: Advanced Python malware templates
C/C++ Framework: Enhanced TheSilencer integration
Rust Framework: Memory-safe malware development
Assembly Framework: Low-level system manipulation
2025 Advanced Techniques
AI-Powered Generation: Dynamic, adaptive malware using AI
Living Off the Land: Using legitimate system tools (PowerShell, WMI, etc.)
Fileless Execution: Memory-only execution without disk traces
Time-Based Evasion: Sandbox detection bypass using timing
Cloud C2 Integration: Using legitimate cloud services for C2
AI Social Engineering: AI-generated personalized attacks
Advanced Obfuscation: Control flow flattening, opaque predicates
Behavioral Adaptation: Dynamic behavior modification
Hypervisor Evasion: VM and hypervisor detection bypass
ML Detection Evasion: Machine learning model evasion
π Educational Capabilities
Interactive Learning System
NoctisAI can serve as an educational platform for cybersecurity professionals, researchers, and students. When users ask, I can provide comprehensive explanations of:
Malware Development Techniques
Obfuscation Methods: Control flow flattening, polymorphic code, metamorphic engines
Evasion Techniques: Sandbox detection, hypervisor evasion, anti-debugging
Injection Methods: Process hollowing, DLL injection, manual DLL mapping
Persistence Mechanisms: Registry, WMI, scheduled tasks, service installation
Anti-Analysis: Debugger detection, VM detection, behavioral analysis evasion
Threat Intelligence Concepts
IOC Analysis: Hash analysis, domain reputation, IP geolocation
MITRE ATT&CK: Technique mapping, tactic correlation, campaign attribution
OSINT Techniques: Domain intelligence, email analysis, social engineering
Forensic Analysis: Memory forensics, disk analysis, timeline reconstruction
Advanced Topics
TheSilencer Techniques: Hell's Gate, DLL unhooking, API hashing, ETW bypass
Living Off the Land: PowerShell abuse, WMI exploitation, registry manipulation
Cloud C2: Legitimate service abuse, steganography, covert channels
AI-Powered Attacks: Machine learning evasion, behavioral adaptation
How to Request Educational Content
Simply ask NoctisAI to explain any technique:
"Explain how control flow flattening works"
"Teach me about TheSilencer techniques"
"What is living off the land in malware development?"
"How does sandbox evasion work?"
"Explain MITRE ATT&CK framework mapping"
"Show me how to analyze IOCs"Learning Features
Step-by-step explanations with code examples
Real-world scenarios and use cases
Best practices and security considerations
Interactive demonstrations using NoctisAI tools
Progressive complexity from basic to advanced concepts
Threat Intelligence
IOC Analysis: Real-time indicator analysis
MITRE ATT&CK: Technique mapping and correlation
Campaign Tracking: APT campaign correlation
Attribution Analysis: Threat actor profiling
OSINT & Reconnaissance
Domain Intelligence: Comprehensive domain analysis
Email Intelligence: Email infrastructure analysis
Social Engineering: Target profiling and reconnaissance
Dark Web Monitoring: Intelligence gathering
Forensic Analysis
Memory Analysis: Volatile memory forensics
Disk Forensics: File system and disk analysis
Network Forensics: Network traffic analysis
Artifact Extraction: Digital artifact extraction
π§ MCP Tools
Malware Development Tools
generate_payload- Generate malware payloadsobfuscate_code- Apply obfuscation techniquescreate_loader- Create advanced loaders (TheSilencer)generate_dropper- Multi-stage payload delivery
Threat Intelligence Tools
analyze_iocs- Analyze Indicators of Compromisemap_ttps- Map techniques to MITRE ATT&CKcorrelate_campaigns- Correlate indicators across campaignsgenerate_threat_profile- Generate threat actor profiles
OSINT Tools
domain_intelligence- Domain analysisemail_intelligence- Email infrastructure analysissocial_engineering- Target profilingdark_web_monitoring- Dark web intelligence
Forensic Tools
memory_analysis- Memory forensicsdisk_forensics- Disk analysisnetwork_forensics- Network analysisartifact_extraction- Artifact extraction
π Project Structure
NoctisAI/
βββ src/
β βββ noctis_ai/
β βββ mcp/ # MCP server and tools
β βββ services/ # Core services
β βββ tools/ # Utility tools
β βββ malware/ # Malware development frameworks
β βββ threat_intel/ # Threat intelligence engine
β βββ osint/ # OSINT and reconnaissance
β βββ forensics/ # Forensic analysis tools
βββ assets/ # Images and resources
βββ examples/ # Usage examples
βββ docs/ # Documentation
βββ scripts/ # Setup and utility scripts
βββ tests/ # Test suite
βββ requirements.txt # Python dependencies
βββ noctis-mcp.json # MCP configuration
βββ README.md # This fileπ Integration with Villager AI & HexStrike
NoctisAI is designed to work seamlessly in a hybrid architecture:
Cursor AI: Primary orchestrator making intelligent tool selection decisions
Villager AI: Complex, multi-phase operations requiring AI reasoning and orchestration
NoctisAI: Specialized malware development, threat intelligence, and advanced obfuscation
HexStrike AI: Fast reconnaissance and direct security tool execution (150+ tools)
The system intelligently selects the appropriate tool based on task complexity:
Simple tasks β HexStrike (direct tool execution)
Specialized malware β NoctisAI (advanced development)
Complex campaigns β Villager AI (AI orchestration)
Workflow Examples
Simple Security Operations (HexStrike)
# Quick reconnaissance and payload generation
mcp_hexstrike-ai_nmap_scan(target="192.168.1.1", ports="22,80,443")
mcp_hexstrike-ai_msfvenom_generate(payload="windows/x64/meterpreter/reverse_tcp")Advanced Malware Enhancement (NoctisAI)
# Enhance payloads with advanced obfuscation
mcp_noctis-ai_obfuscate_code(
source_code=payload_code,
language="c",
obfuscation_method="polymorphic",
evasion_level="extreme"
)
# Create sophisticated loaders
mcp_noctis-ai_create_loader(
payload_data=obfuscated_payload,
injection_method="process_hollowing",
evasion_features=["hells_gate", "dll_unhooking", "api_hashing"]
)Complex Campaigns (Villager AI)
# Multi-phase security operations
mcp_villager-proper_create_task(
abstract="Comprehensive Security Assessment",
description="Full security assessment including reconnaissance, vulnerability scanning, payload development, and post-exploitation",
verification="Detailed report with findings and recommendations"
)π‘οΈ Security & Ethics
Responsible Usage
Authorization Required: All operations require explicit authorization
Audit Logging: Comprehensive logging of all activities
Legal Compliance: Adherence to local and international laws
Educational Focus: Designed for authorized security research
Use Cases
Authorized penetration testing
Red team exercises
Security research
Educational purposes
Incident response
π Performance Metrics
Malware Detection Rate: < 5% on major AV engines
EDR Evasion Rate: > 90% on common EDR solutions
Cross-Platform Compatibility: 95%+ across target platforms
Threat Intelligence Accuracy: > 85% IOC correlation accuracy
π€ Contributing
We welcome contributions! Please see our Contributing Guidelines for details.
π License
This project is licensed under the MIT License - see the LICENSE file for details.
β οΈ Disclaimer
This tool is for authorized security testing and educational purposes only. Users are responsible for ensuring compliance with applicable laws and regulations. The authors are not responsible for any misuse of this software.
π NoctisAI - Illuminating the shadows of cyberspace
Built with β€οΈ for the cybersecurity community