[ New ] 🌎 Kratos Botnet Based on python 2023 🌎

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas : 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
let me try
 
  • Like
Reactions: egorbarov
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
gnnggnng
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
lets tryyyyyyyy
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
thanks!
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
thanksss
 
W
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
WWWWWWWWWWWW
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
nice one !
 
An HTTP botnet is a web-based botnet through in which the bot herder uses the HTTP protocol to send commands.
Bots will occasionally visit the server to get updates and new commands.
Using HTTP protocol allows the herder to mask their activities as normal web traffic.
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS.
Provide With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
View attachment 199


View attachment 197
View attachment 198


*Dynamic Features
-Encrypt Source Code Using AES 256 Bit Encryption
-Encrypt Source Code Using Base64 Encoding
-Packing Evil Exe Using UPX Packer
-Interactive Mode [Generator Ask Required Parameter]
-Debug Mode [Can Be Used In Debugging Payload]
-Persistence Payload
-3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
-Built-in File Binder
-Useful Icons Inside icon Folder

Commands Available In Attacker/Admin Panel
*Clients Command
1. Ping
2. Upload & Execute File
3. Show MessageBox
4. Take Screenshot
5. Installed Software
6. Execute Scripts
7. Elevate User Status
8. Clear TEMP Folder

*Stealer
1. Steal Firefox Cookie
2. Steal Chrome Cookie
3. Steal Bitcoin Wallet
4. Steal WiFI Saved Password

*Location
1. Get Location Information
2. Show Location On Map

*Open Webpage
1. Open Webpage (Visible)

*Computer Commands
1. Shutdown
2. Restart
3. Logoff

*Virtual Machine Bypass Methods Includes
-Registry Check
-Processes and Files Check
-MAC Adderess Check

drcrypter.ru

*** Hidden text: cannot be quoted. ***
sass sd
 

Forum statistics

Threads
1,775
Messages
35,443
Members
8,473
Latest member
yippzor
Member time online
680d 6h 30m
Reputation(s)
26