Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!

cracked.io | Best Forum Around | Free Premium Accounts




 6470

✨✨ Make your own Botnet with byob | Linux - Python - WebGUI✨✨

by Aachen - 16 July, 2021 - 01:13 PM
This post is by a banned member (Aachen) - Unhide
Aachen  
Contributor
411
Posts
81
Threads
3 Years of service
#9
This is a bump
This post is by a banned member (PatReeks) - Unhide
PatReeks  
Registered
32
Posts
0
Threads
3 Years of service
#10
(16 July, 2021 - 01:13 PM)YouNeverSawMe Wrote: Show More
Byob BuildYourOwnBotnet


Byob BuildYourOwnBotnet Web GUIDashboardA control panel for your C2 server with a point-and-click interface for executing post-exploitation modules. The control panel includes an interactive map of client machines and a dashboard which allows efficient, intuitive administration of client machines.
[Image: preview-dashboard.png]Payload GeneratorThe payload generator uses black magic involving Docker containers & Wine servers to compile executable payloads for any platform/architecture you select. These payloads spawn reverse TCP shells with communication over the network encrypted via AES-256 after generating a secure symmetric key using the Diffie-Hellman IKE.
[Image: preview-payloads2.png]Terminal EmulatorThe web app includes an in-browser terminal emulator so you can still have direct shell access even when using the web GUI.
[Image: preview-shell.png]Console ApplicationClientGenerate fully-undetectable clients with staged payloads, remote imports, and unlimited post-exploitation modules
Remote Imports: remotely import third-party packages from the server without writing them to the disk or downloading/installing them
Nothing Written To The Disk: clients never write anything to the disk - not even temporary files (zero IO system calls are made) because remote imports allow arbitrary code to be dynamically loaded into memory and directly imported into the currently running process
Zero Dependencies (Not Even Python Itself): client runs with just the python standard library, remotely imports any non-standard packages/modules from the server, and can be compiled with a standalone python interpreter into a portable binary executable formatted for any platform/architecture, allowing it to run on anything, even when Python itself is missing on the target host
Add New Features With Just 1 Click: any python script, module, or package you copy to the 
Code:
./byob/modules/
 directory automatically becomes remotely importable & directly usable by every client while your command & control server is running
Write Your Own Modules: a basic module template is provided in 
Code:
./byob/modules/
 directory to make writing your own modules a straight-forward, hassle-free process
Run Unlimited Modules Without Bloating File Size: use remote imports to add unlimited features without adding a single byte to the client's file size
Fully Updatable: each client will periodically check the server for new content available for remote import, and will dynamically update its in-memory resources if anything has been added/removed
Platform Independent: everything is written in Python (a platform-agnostic language) and the clients generated can optionally be compiled into a portable executable (Windows) or bundled into a standalone application (macOS)
Bypass Firewalls: clients connect to the command & control server via reverse TCP connections, which will bypass most firewalls because the default filter configurations primarily block incoming connections
Counter-Measure Against Antivirus: avoids being analyzed by antivirus by blocking processes with names of known antivirus products from spawning
Encrypt Payloads To Prevent Analysis: the main client payload is encrypted with a random 256-bit key which exists solely in the payload stager which is generated along with it
Prevent Reverse-Engineering: by default, clients will abort execution if a virtual machine or sandbox is detectedModulesPost-exploitation modules that are remotely importable by clients
Persistence (
Code:
byob.modules.persistence
): establish persistence on the host machine using 5 different methods
Packet Sniffer (
Code:
yob.modules.packetsniffer
): run a packet sniffer on the host network & upload .pcap file
Escalate Privileges (
Code:
byob.modules.escalate
): attempt UAC bypass to gain unauthorized administrator privileges
Port Scanner (
Code:
byob.modules.portscanner
): scan the local network for other online devices & open ports
Keylogger (
Code:
byob.modules.keylogger
): logs the user’s keystrokes & the window name entered
Screenshot (
Code:
byob.modules.screenshot
): take a screenshot of current user’s desktop
Webcam (
Code:
byob.modules.webcam
): view a live stream or capture image/video from the webcam
Outlook (
Code:
byob.modules.outlook
): read/search/upload emails from the local Outlook client
Process Control (
Code:
byob.modules.process
): list/search/kill/monitor currently running processes on the host
iCloud (
Code:
byob.modules.icloud
): check for logged in iCloud account on macOS
Miner (
Code:
byob.core.miner
): mine Monero in the background using the built-in miner or XMRigServerCommand & control server with persistent database and console
Console-Based User-Interface: streamlined console interface for controlling client host machines remotely via reverse TCP shells which provide direct terminal access to the client host machines
Persistent SQLite Database: lightweight database that stores identifying information about client host machines, allowing reverse TCP shell sessions to persist through disconnections of arbitrary duration and enabling long-term reconnaissance
Client-Server Architecture: all python packages/modules installed locally are automatically made available for clients to remotely import without writing them to the disk of the target machines, allowing clients to use modules which require packages not installed on the target machinesCoreCore framework modules used by the generator and the server
Utilities (
Code:
byob.core.util
): miscellaneous utility functions that are used by many modules
Security (
Code:
byob.core.security
): Diffie-Hellman IKE & 3 encryption modes (AES-256-OCB, AES-256-CBC, XOR-128)
Loaders (
Code:
byob.core.loaders
): remotely import any package/module/scripts from the server
Payloads (
Code:
byob.core.payloads
): reverse TCP shell designed to remotely import dependencies, packages & modules
Stagers (
Code:
byob.core.stagers
): generate unique payload stagers to prevent analysis & detection
Generators (
Code:
byob.core.generators
): functions which all dynamically generate code for the client generator
DAO (
Code:
byob.core.dao
): handles interaction between command & control server and the SQLite database
Handler (
Code:
byob.core.handler
): HTTP POST request handler for remote file uploads to the server




pls like  PepeBlush

thank you dude
This post is by a banned member (akakw453) - Unhide
This post is by a banned member (thepaperman) - Unhide
70
Posts
3
Threads
3 Years of service
#12
(16 July, 2021 - 01:13 PM)YouNeverSawMe Wrote: Show More
Byob BuildYourOwnBotnet


Byob BuildYourOwnBotnet Web GUIDashboardA control panel for your C2 server with a point-and-click interface for executing post-exploitation modules. The control panel includes an interactive map of client machines and a dashboard which allows efficient, intuitive administration of client machines.
[Image: preview-dashboard.png]Payload GeneratorThe payload generator uses black magic involving Docker containers & Wine servers to compile executable payloads for any platform/architecture you select. These payloads spawn reverse TCP shells with communication over the network encrypted via AES-256 after generating a secure symmetric key using the Diffie-Hellman IKE.
[Image: preview-payloads2.png]Terminal EmulatorThe web app includes an in-browser terminal emulator so you can still have direct shell access even when using the web GUI.
[Image: preview-shell.png]Console ApplicationClientGenerate fully-undetectable clients with staged payloads, remote imports, and unlimited post-exploitation modules
Remote Imports: remotely import third-party packages from the server without writing them to the disk or downloading/installing them
Nothing Written To The Disk: clients never write anything to the disk - not even temporary files (zero IO system calls are made) because remote imports allow arbitrary code to be dynamically loaded into memory and directly imported into the currently running process
Zero Dependencies (Not Even Python Itself): client runs with just the python standard library, remotely imports any non-standard packages/modules from the server, and can be compiled with a standalone python interpreter into a portable binary executable formatted for any platform/architecture, allowing it to run on anything, even when Python itself is missing on the target host
Add New Features With Just 1 Click: any python script, module, or package you copy to the 
Code:
./byob/modules/
 directory automatically becomes remotely importable & directly usable by every client while your command & control server is running
Write Your Own Modules: a basic module template is provided in 
Code:
./byob/modules/
 directory to make writing your own modules a straight-forward, hassle-free process
Run Unlimited Modules Without Bloating File Size: use remote imports to add unlimited features without adding a single byte to the client's file size
Fully Updatable: each client will periodically check the server for new content available for remote import, and will dynamically update its in-memory resources if anything has been added/removed
Platform Independent: everything is written in Python (a platform-agnostic language) and the clients generated can optionally be compiled into a portable executable (Windows) or bundled into a standalone application (macOS)
Bypass Firewalls: clients connect to the command & control server via reverse TCP connections, which will bypass most firewalls because the default filter configurations primarily block incoming connections
Counter-Measure Against Antivirus: avoids being analyzed by antivirus by blocking processes with names of known antivirus products from spawning
Encrypt Payloads To Prevent Analysis: the main client payload is encrypted with a random 256-bit key which exists solely in the payload stager which is generated along with it
Prevent Reverse-Engineering: by default, clients will abort execution if a virtual machine or sandbox is detectedModulesPost-exploitation modules that are remotely importable by clients
Persistence (
Code:
byob.modules.persistence
): establish persistence on the host machine using 5 different methods
Packet Sniffer (
Code:
yob.modules.packetsniffer
): run a packet sniffer on the host network & upload .pcap file
Escalate Privileges (
Code:
byob.modules.escalate
): attempt UAC bypass to gain unauthorized administrator privileges
Port Scanner (
Code:
byob.modules.portscanner
): scan the local network for other online devices & open ports
Keylogger (
Code:
byob.modules.keylogger
): logs the user’s keystrokes & the window name entered
Screenshot (
Code:
byob.modules.screenshot
): take a screenshot of current user’s desktop
Webcam (
Code:
byob.modules.webcam
): view a live stream or capture image/video from the webcam
Outlook (
Code:
byob.modules.outlook
): read/search/upload emails from the local Outlook client
Process Control (
Code:
byob.modules.process
): list/search/kill/monitor currently running processes on the host
iCloud (
Code:
byob.modules.icloud
): check for logged in iCloud account on macOS
Miner (
Code:
byob.core.miner
): mine Monero in the background using the built-in miner or XMRigServerCommand & control server with persistent database and console
Console-Based User-Interface: streamlined console interface for controlling client host machines remotely via reverse TCP shells which provide direct terminal access to the client host machines
Persistent SQLite Database: lightweight database that stores identifying information about client host machines, allowing reverse TCP shell sessions to persist through disconnections of arbitrary duration and enabling long-term reconnaissance
Client-Server Architecture: all python packages/modules installed locally are automatically made available for clients to remotely import without writing them to the disk of the target machines, allowing clients to use modules which require packages not installed on the target machinesCoreCore framework modules used by the generator and the server
Utilities (
Code:
byob.core.util
): miscellaneous utility functions that are used by many modules
Security (
Code:
byob.core.security
): Diffie-Hellman IKE & 3 encryption modes (AES-256-OCB, AES-256-CBC, XOR-128)
Loaders (
Code:
byob.core.loaders
): remotely import any package/module/scripts from the server
Payloads (
Code:
byob.core.payloads
): reverse TCP shell designed to remotely import dependencies, packages & modules
Stagers (
Code:
byob.core.stagers
): generate unique payload stagers to prevent analysis & detection
Generators (
Code:
byob.core.generators
): functions which all dynamically generate code for the client generator
DAO (
Code:
byob.core.dao
): handles interaction between command & control server and the SQLite database
Handler (
Code:
byob.core.handler
): HTTP POST request handler for remote file uploads to the server




pls like  PepeBlush

ill test it out
signed by thepaperman
This post is by a banned member (jazda) - Unhide
This post is by a banned member (PaarraKanker) - Unhide
This post is by a banned member (MrrBossMan) - Unhide
This post is by a banned member (Spamg0d) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 2 Guest(s)