BYOB is an open-source venture that gives a framework for safety researchers and builders to construct and function a primary botnet to deepen their understanding of the delicate malware that infects tens of millions of units yearly and spawns fashionable botnets, so as to enhance their potential to develop counter-measures towards these threats.
It is designed to permit builders to simply implement their very own code and add cool new options with out having to write down a RAT (Remote Administration Tool) or a C2 (Command & Control server) from scratch.
Disclaimer: This venture must be used for approved testing or academic functions solely.
Post-exploitation modules which are remotely importable by purchasers contains:
Keylogger: logs the person’s keystrokes & the window title entered Screenshot: take a screenshot of present person’s desktop Webcam: view a dwell stream or seize picture/video from the webcam Ransom: encrypt recordsdata & generate random BTC pockets for ransom fee (ransomware) Outlook: learn/search/add emails from the native Outlook consumer Packet Sniffer: run a packet sniffer on the host community & add .pcap file Persistence: set up persistence on the host machine utilizing 5 completely different strategies Phone: learn/search/add textual content messages from the consumer smartphone Escalate Privileges: try UAC bypass to achieve unauthorized administrator privileges Port Scanner: scan the native community for different on-line units & open ports Process Control: record/search/kill/monitor presently operating processes on the host iCloud: verify for logged in iCloud account on macOS Spreader: unfold consumer to different hosts by way of emails disguised as a plugin replace Miner: run a cryptocurrency miner within the background (helps Bitcoin & Litecoin)
Credits to the writer Daniel Vega-Myhre (Malwared LLC) for this venture.
BYOB is accessible at https://github.com/malwaredllc/byob
Comments