All Projects → watersalesman → Aura Botnet

watersalesman / Aura Botnet

Licence: gpl-3.0
A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.

Projects that are alternatives of or similar to Aura Botnet

Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+315.79%)
Mutual labels:  hacking, botnet
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+535.79%)
Mutual labels:  hacking, cybersecurity
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+390.53%)
Mutual labels:  hacking, cybersecurity
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+5966.32%)
Mutual labels:  hacking, cybersecurity
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-46.32%)
Mutual labels:  hacking, cybersecurity
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+228.42%)
Mutual labels:  hacking, botnet
Zip
A portable, simple zip library written in C
Stars: ✭ 596 (+527.37%)
Mutual labels:  portable, hacking
Blacknet
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (+185.26%)
Mutual labels:  hacking, botnet
Badusb botnet
👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-66.32%)
Mutual labels:  hacking, botnet
Packer Fuzzer
Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+692.63%)
Mutual labels:  hacking, cybersecurity
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+10901.05%)
Mutual labels:  hacking, cybersecurity
Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-8.42%)
Mutual labels:  hacking, cybersecurity
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+220%)
Mutual labels:  hacking, cybersecurity
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+302.11%)
Mutual labels:  hacking, cybersecurity
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+186.32%)
Mutual labels:  hacking, cybersecurity
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+445.26%)
Mutual labels:  hacking, cybersecurity
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+2912.63%)
Mutual labels:  hacking, cybersecurity
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+165.26%)
Mutual labels:  hacking, cybersecurity
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+612.63%)
Mutual labels:  hacking, cybersecurity
B1tifi
ssh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-31.58%)
Mutual labels:  hacking, botnet

Aura Botnet

Travis CI AppVeyor Docker

C2 Server

The botnet's C2 server utilizes the Django framework as the backend. It is far from the most efficient web server, but this is offset by the following:

  • Django is extremely portable and therefore good for testing/educational purposes. The server and database are contained within the aura-server folder.
  • Django includes a very intuitive and powerful admin site that can be used for managing bots and commands
  • The server is only handling simple POST requests and returning text
  • Static files should be handled by a separate web server (local or remote) that excels in serving static files, such as nginx

The admin site located at http://your_server:server_port/admin can be accessed after setting up a superuser (see below).

Database

The C2 server is currently configured to use a SQLite3 database, bots.sqlite3. The current configuration can be changed in aura-server/aura/settings.py. You may wish to use MySQL, or even PostgreSQL instead; this easy to do thanks to Django's portable database API.

Bot Clients

The primary client is written in C++, and can be compiled for either Linux or Windows using CMake. Alternate clients are written in Rust, Bash, and Powershell, but are may lack certain functionality as they are mostly unsupported. I will fix any major bugs that come to my attention, but they will continue to lack certain features for the time being, such as running commands in different shells.

The client will gather relevant system information and send it to the C2 server to register the new bot. Identification is done by initially creating a file containing random data -- referred to as the auth file throughout the code -- which will then be hashed each time the client runs to identify the client and authenticate with the C2 server. It will then install all the files in the folder specified in the code, and initialize the system service or schedule a task with the same privileges that the client was run with. The default settings have the client and other files masquerading as configuration files.

Getting Started: C2 Server

Read documentation here

Geting Started: Bot Clients

Read documentation here

Other Notes

Because this is for testing purposes, the C2 server needs to be hard-coded into client and web delivery files. It is currently set to localhost on all the files. This is because an actual botnet would use something like a domain generation algorithm (DGA) to sync a stream of changing domains on the client side with a stream of disposable domains being registered -- or just really bulletproof hosting like the original Mirai botnet.

The code is also not obfuscated nor is there any effort put toward preventing reverse engineering; this would defeat the purpose of being a botnet for testing and demonstrations.

The killswitch folder contains scripts for easy client removal when testing on your devices.

This repo is for testing/demonstration purposes only. This is not meant to be implemented in any real world applications except for testing on authorized machines.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].