All Projects β†’ LimerBoy β†’ Inferno

LimerBoy / Inferno

Licence: apache-2.0
πŸ”₯ Modern command line tool for malware creation on Windows

Programming Languages

script
160 projects

Projects that are alternatives of or similar to Inferno

Telegram Rat
Windows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (+91.43%)
Mutual labels:  webcam, status, hacking, malware, virus
ToxicEye
πŸ‘½ Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+190.48%)
Mutual labels:  virus, malware, microphone, keylogger, webcam
Blazerat
πŸ”₯ Control your Linux home computer with telegram bot.
Stars: ✭ 60 (-42.86%)
Mutual labels:  webcam, microphone, screenshot, keylogger
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (+200%)
Mutual labels:  hacking, malware, keylogger, virus
Malware
Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+48.57%)
Mutual labels:  malware, keylogger, virus
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (+15.24%)
Mutual labels:  hacking, malware, virus
Dark Fantasy Hack Tool
DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (+24.76%)
Mutual labels:  hacking, bruteforce, ddos
Antidebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (+53.33%)
Mutual labels:  hacking, malware, virus
Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (+303.81%)
Mutual labels:  malware, keylogger, virus
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (-69.52%)
Mutual labels:  screenshot, malware, keylogger
Malware-with-Backdoor-and-Keylogger
πŸ‘¨πŸ»β€πŸ’» A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
Stars: ✭ 25 (-76.19%)
Mutual labels:  virus, malware, keylogger
Saint
πŸ‘ (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (+397.14%)
Mutual labels:  screenshot, hacking, keylogger
Gobot2
Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+310.48%)
Mutual labels:  malware, keylogger, virus
Spytrojan keylogger
[Solo para programadores] Troyano espΓ­a | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesiΓ³n. | EnvΓ­o de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-69.52%)
Mutual labels:  hacking, malware, keylogger
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+8453.33%)
Mutual labels:  hacking, malware
Zeus
NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Stars: ✭ 1,043 (+893.33%)
Mutual labels:  malware, virus
Videojs Record
video.js plugin for recording audio/video/image files
Stars: ✭ 1,074 (+922.86%)
Mutual labels:  webcam, microphone
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+859.05%)
Mutual labels:  hacking, keylogger
Hackphiles
BruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-45.71%)
Mutual labels:  hacking, bruteforce
Cyberweapons
Automated Cyber Offense
Stars: ✭ 64 (-39.05%)
Mutual labels:  malware, keylogger

πŸ”₯ The Inferno:

Modern command line tool for virus creation. Written on C# for Windows.

⚠️ Attention:

  • Some antiviruses may remove the program.

🌹 Features:

Webcam screenshot, Desktop screenshot, Microphone recorder, Stealer(Passwords, Credit Cards, Cookies, History, Bookmarks), Keylogger, Autorun(Registry, Taskscheduler, StartupDIR), DDoS(HTTP, UDP, SYN, ICMP, SLOWLORIS), Bruteforce (SSH, FTP, Telnet), TaskManager, Port Scanner, Wifi scanner, File encryptor/dycryptor, Get installed antivirus, Check if in VirtualBox, SandBox, Debugger, Power control, Block system input, BSoD, ForkBomb, Text to speech, Clipboard control, System volume control, Send key press, Move cursor, Get cursor position, Get active window title, Get battery status, Min/Max all windows, Change wallpapers, Download & Upload file(anonfile.com), Get BSSID, Get coordinates by BSSID, WHOIS, Geoplugin, VirusTotal checker.

πŸ“„ Download:

πŸ“£ JSON output:

♦️ Examples:

  • We can type Inferno commands it in command line:

    inferno.exe COMMAND "ARGUMENT1" "ARGUMENT2" "ARGUMENT3"
    
  • Create web-cam screenshot:

    inferno.exe WEBCAM_SCREENSHOT "screenshot.jpg" "4500" "1"
    

    WEBCAM_SCREENSHOT

  • Rotate monitor:

    inferno.exe MONITOR "ROTATE" "180"
    

    MONITOR_ROTATE

  • Disable monitor:

    inferno.exe MONITOR "OFF"
    

    MONITOR_OFF

  • Blue screen of death:

    inferno.exe EVIL_BSOD
    

    BSOD

πŸ“– All commands:

  • STEALER
    Get data from chromium based browsers.
    • PASSWORDS Get passwords
    • CREDIT_CARDS Get credit cards
    • BOOKMARKS Get bookmarks
    • HISTORY Get history
    • COOKIES Get cookies
  • CDROM
    Open or close CDROM by letter. If letter is not selected it will user all CDROMs.
    • OPEN drive/null Open cdrom
    • CLOSE drive/null Close cdrom
  • CLIPBOARD
    Work with clipboard.
    • SET text Set text to clipboard
    • GET Get text from clipboard
  • DESKTOP_SCREENSHOT
    Create screenshot of desktop and save to file.
    • filename Image output filename
  • WEBCAM_SCREENSHOT
    Create screenshot from webcamera and save to file.
    • filename Image output filename
    • delay Camera delay. Recommended: 4500
    • camera Camera number. Recommended: 1
  • MICROPHONE_RECORD
    Record audio from microphone and save to file.
    • filename Audio output filename
    • seconds Recording secounds
  • KEYLOGGER
    Saves all keystrokes to the specified file.
    • filename Log output filename
  • AUDIO_SPEAK
    Text to speech.
    • text Just text
  • AUDIO_PLAY
    Play .wav file.
    • filename Input .wav file
  • AUDIO_BEEP
    Make beep sound.
    • frequency
    • duration
  • AUDIO_VOLUME
    Control system audio volume.
    • SET 0-100
    • GET
  • EVIL_BSOD
    Make windows screen of death.
  • EVIL_FORKBOMB
    Make lags, freezes.
  • BLOCK_SYSTEM
    Block control (mouse, keyboard). Need admin rights.
    • seconds
  • SENDKEYPRESS
    All keys: https://pastebin.com/raw/Qu2gueM7
    • keys Keyboard keys
  • WALLPAPER
    Set image as wallpaper.
    • filename Input image file
  • GET_ACTIVE_WINDOW
    Get title of active window.
  • GET_CURSOR_POSITION
    Get cursor position (x, y).
  • SET_CURSOR_POSITION
    Set cursor position (x, y).
    • x
    • y
  • MAXIMIZE_ALL_WINDOWS
    Maximize all opened windows.
  • MINIMIZE_ALL_WINDOWS
    Minimize all opened windows.
  • STATUS
    Get status.
    • IN_SANDBOXIE Check if program in SandBox
    • IN_VIRTUALBOX Check if program in VirtualBox
    • IN_DEBUGGER Check if program in debugger
    • IS_ADMIN Check if user is admin
    • USER_IS_ACTIVE Check if user is active
    • BATTERY Battery information
    • ANTIVIRUS Get installed antivirus name
  • MONITOR
    Make something with monitors.
    • ROTATE Rotate all monitors
      • degrees Only 0, 90, 180, 270
    • ON Monitor on
    • OFF Monitor off
    • STANDBY Monitor standby
  • AUTORUN
    Add or remove file from startup.
    • INSTALL
      • TASKSCHEDULER
        • filename
      • REGISTRY
        • filename
      • SHELLSTARTUP
        • filename
    • UNINSTALL
      • TASKSCHEDULER
        • filename
      • REGISTRY
        • filename
      • SHELLSTARTUP
        • filename
  • TASKMANAGER
    Control windows taskmanager.
    • START Start process
      • process
    • KILL Kill process
      • process
    • FIND Find process
      • process
    • LIST Get process list
    • DISABLE Disable taskmanager
    • ENABLE Enable taskmanager
  • NETWORK_DOWNLOAD_FILE
    Download file from url and save.
    • url Direct url
    • filename Output filename
  • NETWORK_UPLOAD_FILE
    Upload file to anonfile.com and get link.
    • filename Input filename
  • NETWORK_VIRUSTOTAL
    Check file in VirusTotal by MD5.
    • filename Input filename
  • NETWORK_WHOIS
    Get ip information.
    • ip Target ip or hostname
  • NETWORK_GEOPLUGIN
    Get ip geo information. (currency symbol and etc).
    • ip Target ip
  • NETWORK_BSSIS_GET
    Get router mac address.
  • NETWORK_BSSIS_INFO
    Get BSSID information. (latitude & longitude).
    • bssid Router bssid
  • NETWORK_PORT_IS_OPEN
    Check if port is open.
    • ip Target ip or hostname
    • port Target port
  • NETWORK_WLAN_SCANNER
    Scan local network.
    • 1-254 How much hosts
  • BYPASS_DISABLE_DEFENDER
    Disable Windows Defender.
  • BYPASS_DISABLE_UAC Disable Windows UAC.
  • BYPASS_ENABLE_UAC Enable Windows UAC.
  • ADMIN_STARTFILE
    Start file as admin.
    • filename Input filename
  • FILE_ENCRYPT
    Encrypt file with key.
    • filename Input filename
    • key Encryption key
  • FILE_DECRYPT
    Decrypt file with key.
    • filename Input filename
    • key Encryption key
  • NIRCMDC
    Run nircmdc command. All commands: https://nircmd.nirsoft.net/
    • command Input nircmdc command
  • POWER
    Control computer power.
    • SHUTDOWN
    • REBOOT
    • LOGOFF
    • HIBERNATE
  • BRUTEFORCE_FTP
    Try login to FTP by host, user, pass.
    • hostname
    • username
    • password
  • BRUTEFORCE_SSH
    Try login to SSH by host, user, pass.
    • hostname
    • username
    • password
  • BRUTEFORCE_TELNET
    Try login to Telnet by host, user, pass.
    • hostname
    • username
    • password
  • FLOOD_HTTP
    HTTP flood ddos attack.
    • host Target
    • threads Threads count
    • seconds Seconds
  • FLOOD_SLOWLORIS
    SLOWLORIS method ddos attack.
    • host:port Target
    • threads Threads count
    • seconds Seconds
  • FLOOD_UDP
    UDP method ddos attack.
    • host:port Target
    • threads Threads count
    • seconds Seconds
  • FLOOD_SYN
    SYN method ddos attack.
    • host:port Target
    • threads Threads count
    • seconds Seconds
  • FLOOD_ICMP
    ICMP method ddos attack.
    • host Target
    • threads Threads count
    • seconds Seconds
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].