explaingit

alyssavv/soone

13Audience · researcherComplexity · 4/5ActiveSetup · hard

TLDR

Go-based security research pre-access platform that generates first-stage stagers (Windows shellcode, Linux ELF) with sandbox detection and a UUID allow list, meant to sit in front of existing C2 frameworks.

Mindmap

mindmap
  root((Soone))
    Inputs
      Operator config
      Target architecture
      UUID allow list
    Outputs
      Windows shellcode
      Linux ELF binary
      Admin web panel
    Use Cases
      Security research
      Red team labs
      Stager generation
    Tech Stack
      Go
      musl
      HTTPS
      Web admin

Things people build with this

USE CASE 1

Generate first-stage Windows shellcode and Linux ELF stagers in a red team lab

USE CASE 2

Front an existing command and control framework with sandbox detection and UUID allow lists

USE CASE 3

Study how a Go service exposes an admin panel plus a separate HTTPS endpoint

USE CASE 4

Compare PE-to-shellcode conversion paths using Convert2Shellcode and SRDI

Tech stack

GomuslzigLinuxWindows

Getting it running

Difficulty · hard Time to first run · 1h+

Requires a static musl toolchain (zig or musl-gcc); intended for security learning and research only, with strong legal disclaimers from the authors.

In plain English

Soone is a security research project written mostly in Chinese. The README calls it a "pre-access platform" (前置准入平台), meaning a piece of software that sits in front of a command and control framework and prepares the first stage of a connection. The authors say they do not build or copy any command and control framework themselves. Instead they want Soone to act as a partner for existing ones, handling stager generation and anti-sandbox work so that each framework can focus on its own core code. The project supports two kinds of clients. For Windows it produces shellcode that can be embedded in another loader, since the team says compiled PE files have been unstable in their tests. For Linux it produces ELF binaries for amd64 or arm64, and the build step needs a static musl toolchain such as zig or musl-gcc. The README lists install commands for Debian, Ubuntu, CentOS, RHEL, Rocky and Alpine. Soone started as a small Python service, was restructured in Python, and has now been rewritten in Go. The README says the rewrite covers more platforms and that the Windows client has been tested from Windows 7 through Windows 11. Running the Soone binary starts two services. A web admin panel listens on port 58888 with the user admin and a random thirteen character password printed at startup. A separate command and control endpoint listens on port 3208 over HTTPS. The admin session lasts three hours. Stated features include sandbox detection, a UUID based allow list, and long polling task delivery. The README ends with a strong disclaimer. The authors say the tool is for security learning and research only, that users take full legal responsibility for how they use it, and that it should not be used for any commercial purpose. They also link to two outside projects, Convert2Shellcode and a chainreactors wiki page on SRDI, as recommended ways to turn a PE file into shellcode.

Copy-paste prompts

Prompt 1
Build Soone on Ubuntu with a static musl toolchain and start the admin panel on port 58888 in a contained lab VM.
Prompt 2
Walk me through the sandbox detection logic in Soone and which signals it uses before delivering a payload.
Prompt 3
Explain how Soone splits the admin web panel (58888) from the HTTPS C2 endpoint (3208) and where session timeouts are enforced.
Prompt 4
Translate the Chinese README of Soone into English so I can document its features and disclaimers for an authorized engagement.
Prompt 5
Set up a UUID-based allow list in Soone so only my test endpoints can fetch stagers during a research exercise.
Open on GitHub → Explain another repo

Generated 2026-05-22 · Model: sonnet-4-6 · Verify against the repo before relying on details.