A botnet is a network of computers that is under the control of a person or group and uses them as intermediaries to carry out malicious activities without the knowledge of the owners of the computers. In fact, the various computers in the botnet are known as "bots" and are controlled by a controlled server.
We have collected more than 100 botnets and DDOS tools for you to develop, use or set as your model! In order for this archive to reach everyone, give it a Star and publish the archive
- Ddos tools (python,golang,c)
-
In the DDOS tools folder, you will see two other folders that are for UDP and TCP, you can choose, download and do your work.
-
DDOS tools are mostly written in C and contain almost all DDOS methods, a few are written in python and golang, which are very powerful and clean.
- Web botnets + Panel (php,javascript,css,html)
-
In this section, you can see the botnets whose management panels are on the web
-
These types of botnets have a builder and most of them target Windows zombies
-
By uploading the required files to the host, you can easily access the zombies and easily give orders to attack
- Websocket botnets
- These types of botnets are mostly in the form of web sockets (that is, they have a client file and a server file), which I'm sure you know better, so I won't give an explanation.
- Iot Botnet
-
IoT botnets are networks created by hackers to control devices connected to the Internet of Things (IoT). These devices can include CCTV cameras, home routers, smart lighting systems and other devices. By taking advantage of security vulnerabilities in these devices, hackers connect them to their network and use them for their purposes such as DDoS attacks, espionage, and information theft. These networks have become one of the biggest security threats in the Internet world due to the high number of devices connected to the Internet of Things and the lack of attention to their security.
- DDOS JAVASCRIPT
- JavaScript DDoS or Distributed Denial of Service means an attack that uses JavaScript codes to temporarily or permanently limit server resources and make the service unavailable to normal users. In this type of attacks, attackers use multiple devices (such as JavaScript bots) to send many requests to the server at the same time and cause the service to crash.
- Exploits
- A series of famous exploits are prepared for your attacks
- Bypass
- A Bypass series is prepared for your attacks in layer 4, tcp/udp
- Compilers
- We have prepared a series of pure compilers with C and Python languages to compile client files (infecting).
- Amps
- We have over 100 different Amps for you to develop or use
Please don't clone the entire repository (unless you need it) because it will take up a lot of your internet, so select it and then download it.