MeshCentral
MeshCentral | |
---|---|
![]() MeshCentral displaying managed devices | |
Original author(s) | Ylian Saint-Hilaire |
Developer(s) | Community contributors, Simon Smith (maintainer) |
Initial release | 2007 (MeshCentral v1), June 16, 2017 (MeshCentral, current) |
Stable release | 1.1.48
/ July 22, 2025 |
Repository | github |
Written in | Server: JavaScript (Node.js) MeshAgent: C, JavaScript (DukTape) |
Operating system | Windows, Linux, macOS, FreeBSD (MeshAgent) Android (MeshCentral Agent for Android) |
License | Apache-2.0 |
Website | meshcentral |
MeshCentral is an open-source remote monitoring and management (RMM) tool originally developed by Yilan Saint-Hilaire. It provides remote control, hardware and software inventory, system monitoring, and background management including remote terminal and file management.[1] It can also integrate with Intel Active Management Technology (AMT) to provide out-of-band management.[2] Use cases include providing IT support and managed services.
History
MeshCentral was originally designed in 2010. This version is now known as MeshCentral v1.[1] In 2017, MeshCentral was rewritten to make use of more modern technologies including Node.js, WebSockets, and WebRTC.[1] Until 2022, Intel was a significant sponsor of the MeshCentral project.[3]
Abuse by threat actors
Due to it being an open-source project, MeshCentral and its MeshAgent are occasionally abused by threat actors, including state-sponsored advanced persistent threats (APTs),[4] as a remote access trojan (RAT) or botnet.[5][6]
See also
References
- ^ a b c "Design and Architecture - MeshCentral Documentation". ylianst.github.io. Retrieved 2025-08-05.
- ^ "Intel AMT - MeshCentral Documentation". ylianst.github.io. Retrieved 2025-08-05.
- ^ Ylianst. "MeshCentral news, Sponsorship and Opportunities · Ylianst MeshCentral · Discussion #4795". GitHub. Retrieved 2025-08-05.
- ^ "Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations | CISA". www.cisa.gov. 2024-08-28. Retrieved 2025-08-05.
- ^ Baran, Guru (2025-05-15). "Hackers Disguised Remote Access Malware as Microsoft Edge service". Cyber Security News. Retrieved 2025-08-05.
- ^ "Ukrainian Government Agencies Hit By Stealthy MeshAgent Malware Campaign". 2024-08-12. Retrieved 2025-08-05.