• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

C/C++ SOURCE - DarkSky BotNet [2017 - 2018]

Status
Not open for further replies.

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
32
Reaction score
45,552
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
darksky.jpg


Briefly about the main thing :
DarkSky - Botnet, which contains a
convenient interface for management,
effective and convenient functionality,
including: 3 types of DDoS attacks,
functions for downloading / uploading / launching
any files from all
victims in your control panel. 


The control panel - was developed
for tough combat conditions and
high traffic volumes. Thanks to
modern technologies, the panel
has functions to protect against
external influences on it, you can
notbeafraid that the abuses will find you. This
was checked by 3 months, not a single
complaint was made to the hosting companies, not
one client. 

5000r.
+ Source code 
+ Updates at least a year 
+ I will open a way to add payload (to bypass AB) Bot 

functionality: 
+ Protection from bot scanning programs: Wireshark, HTTPAnalyzer, ProcessHacker, MonitorTraffic and also continue this list. 
+ HTTP Flood (Reset TCP Flags) - if you read the specification of the protocol tcp, then to perform the load, you need to reset the connection without waiting for a response from the server, this method is used for DDoS attacks on sites. 
+ HTTP Flood (ARMA Method) - synchronizes all active threads and connections among themselves, waits until the request is sent and closes connections, i.e. at the same time sends a bunch of requests on level with all bots ...
+ SYN Flood - works on two, the above-described mode and waits until the server returns a response. 
+ UDP Flood - sends huge, randomized packets 
+ Additional Loader, if there is no build from the botnet on the PC, this "loader" will load the build (ie recover) 
+ Main Loader - loads and starts the file. 
+ In the panel, you can specify the time for the bots to be banned. 
+ Uninstall build on bots in 1 click in the panel. 
+ Running Proxy servers with different types of HTTP / S, Socks 4/5 with login or password for authorization. 
+ Functions for unloading any files from the victim with the PC, and sending them to the panel. 
+ Functions for working with memory, turning off DEP mode - for writing to memory.
+ Bypass to bypass UAC'a, works on WinXP. 
+ Exploit SMB (I can include) 

Download:

To see this hidden content, you must like this content.

Password:

level23hacktools.com
 
Please note, if you want to make a deal with this user, that it is blocked.
hidden :D
i want to see

 
Last edited by a moderator:
Looks good so far honestly. Seems like there are no back doors

 
I do definately think this is cool, though if I may, how'd you getr the source?

 
Status
Not open for further replies.
Back
Top