[ New ] 🌎 Kratos Botnet Based on python 2023 🌎

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas : 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

DRCrypter

Administrator
.
.
Jun 3, 2023
Threads
219
336
93
Credits
4,888
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
loginpage.JPG


adminpanel.JPG
location.JPG

*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

공격자/관리자 패널에서 사용 가능한 명령
*클라이언트 명령
1. 핑
2. 파일 업로드 및 실행
3. 메시지 상자 표시
4. 스크린샷 찍기
5. 설치된 소프트웨어
6. 스크립트 실행
7. 사용자 지위 상승
8. TEMP 폴더 지우기

*스틸러
1. 파이어폭스 쿠키 훔치기
2. 크롬 쿠키 훔치기
3. 비트코인 지갑 훔치기
4. WiFI에 저장된 비밀번호 도용

*위치
1. 위치 정보 얻기
2. 지도에 위치 표시

*웹페이지 열기
1. 웹페이지 열기(보임)

*컴퓨터 명령
1. 종료
2. 다시 시작
3. 로그오프

*가상 머신 바이패스 방법에는 다음이 포함됩니다.
-레지스트리 확인
-프로세스 및 파일 확인
-MAC 주소 확인

drcrypter.ru

*** 숨겨진 텍스트: 인용할 수 없습니다. ***

[스포일러]
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
thanks
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
Thanks
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
thank you
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
thank you broo
 
Um botnet HTTP é um botnet baseado na web através do qual o bot herder usa o protocolo HTTP para enviar comandos.
Os bots ocasionalmente visitam o servidor para obter atualizações e novos comandos.
O uso do protocolo HTTP permite que o pastor mascare suas atividades como tráfego normal da web.
KratosKnife é um BOTNET avançado escrito em python 3 para sistema operacional Windows.
Fornece muitos recursos avançados, como métodos de persistência e detecção de VM, fichário integrado, etc.
View attachment 199


View attachment 197
View attachment 198


* Recursos Dinâmicos
-Criptografar código-fonte usando criptografia AES de 256 bits
-Criptografar código-fonte usando codificação Base64
-Embalagem Evil Exe usando UPX Packer
-Modo Interativo [Parâmetro Necessário de Solicitação do Gerador]
-Modo de depuração [pode ser usado na carga útil de depuração]
- Carga útil de persistência
-3 métodos poderosos para detectar/ignorar VM (como VirtualBox, VMware, Sandboxie)
-Fichário de arquivo integrado
-Ícones úteis dentro da pasta de ícones

Comandos disponíveis no painel do invasor/administrador
* Comando de clientes
1. Pingar
2. Carregar e executar arquivo
3. Mostrar caixa de mensagens
4. Faça uma captura de tela
5. Software instalado
6. Execute scripts
7. Eleve o status do usuário
8. Limpe a pasta TEMP

*Ladrão
1. Roubar cookie do Firefox
2. Roubar biscoito do Chrome
3. Roubar carteira Bitcoin
4. Roubar senha salva de WiFI

*Localização
1. Obtenha informações de localização
2. Mostrar localização no mapa

*Abrir página da web
1. Abra a página da Web (visível)

*Comandos de computador
1. Desligamento
2. Reinicie
3. Sair

*Métodos de desvio de máquina virtual incluem
-Verificação de registro
-Verificação de processos e arquivos
-Verificação de endereço MAC

drcrypter.ru

*** Texto oculto: não pode ser citado. ***
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
ol
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
nice
 
  • Like
Reactions: makk7w7

Forum statistics

Threads
1,775
Messages
35,463
Members
8,190
Latest member
jakabaring25
Member time online
650d 10h 19m
Reputation(s)
26