CPunch / Laika

Cross-platform RAT, written in C
MIT License
74 stars 17 forks source link

Requirements #9

Open AhmedSakrr opened 1 year ago

AhmedSakrr commented 1 year ago

Hi friend, i appreciate your awesome work.. but please add this features:-

1- Send a custom_command to all the connected bots devices with ONE single command line shell.

2- Remove the linux/unix use or isolate it .. focus on the windows OS more to make the final client less size AS POSSIBLE.

3- Add anti-vm, anti-debug, anti-sandbox and anti-reflector.

4- Avoid duplicated clients to be connected.

5- Use this rootkit to hide everything with only this perfix $77 to be totally fileless >> https://github.com/bytecode77/r77-rootkit

6- Try to make the CLI more cleaner take the idea from this C powerfull botnet >> https://github.com/0x1CA3/Net << Also, check those but the PREVIOUS ONE is more beautiful.. check those too ( https://github.com/0x1CA3/Reaper .. https://github.com/badboycxcc/ivy )

7- Use fingerprint user agent / socket key (Optional).

8- Make it handle millions of connected bots And use http 80 and https 443 protocols if you can in JUST PURE C project if you can ok do it .. if not ignore the http/https just keep it TCP or UDP as you like just make it Stable and Reliable to handle millions of connections bots.

if you did those requirements i swear that this Laika botnet will be the most powerful CLI botnet ever seen. ( Keep it all in Pure C Language ).

CPunch commented 1 year ago

Very interesting ideas! Cannot promise anything for now as I'm a bit preoccupied with life stuff, but I'll keep it in mind. If you were to implement any of those features yourself I'd be more than happy to accept a pull request!

AhmedSakrr commented 1 year ago

It will take a lot of time to understand the logic of your project .. but, it's way better if you did it because you know your project very well more than anyone else, i can do the rootkit part because i will deal with your final client.c as bytes[] so it will be easy to me to do it, while the rest to be honest you're the ONLY person who can do them easy because you know your project's code very well, also the 3rd step i also can handle it.

CPunch commented 1 year ago

Ignore the anti-*, rootkit and the millions of connections for now, as I think that's a bit out of scope for this project. However the other ideas sound great, and I'd love to see you try to implement them!