/xLib

AIO Framework for exploiting libssh. Used for loading bots to a CNC botnet. Like Mirari & QBot.

Primary LanguagePythonMIT LicenseMIT

Welcome to the xLib Framework

AIO Framework for exploiting libssh. Used for loading bots to a CNC botnet. Like Mirari & QBot.

Consider this project DEAD

Interface & ToolPlay

This is a CLI output of the program.

root@trackprojects:~# python xLib.py 
[*] Welcome to xLib CLI. [*]
| Exploit : LIBSSH Auth Bypass | Version : 0.2.6 |
--------------------------------------------------
Enter payload: id 
--------------------------------------------------
[+] Found : 6221 devices!
[-] 106.241.168.83 Exploited!

Installation

First you need to install a few modules to prevent errors like this that will prevent you from running the script.

root@trackprojects:~# python xLib.py 
Traceback (most recent call last):
  File "xLib.py", line 14, in <module>
    import shodan
ImportError: No module named shodan

To do this run the following commands on your system.
pip install json
pip install socket
pip install paramiko
pip install shodan
These will install all the modules required to run this script. Once all this is done run this command to finnaly start the xLib Framework.
python xLib.py

TODOs Are Listed Bellow:

TODOs Status
autoLoad Support [ 👍 ]
Proxy Support [ 👎 ]
xList Support [ 👎 ]
Custom Payload Support [ 👍 ]