CentOS

IRC Bot Hunters – a collection of Metasploit PoC exploits for IRC Botnets that allows RCE

IRC Bot Hunters

a collection of Metasploit PoC exploits for IRC Botnets that takes over the owner of a bot which then allows Remote Code Execution. Most IRC Botnets can be taken over by using their herders’ usernames or by triggering a certain command which does shell execution. Almost all of the modules here have been accepted in the Metasploit repository. If you are looking for C&C exploit modules or pwning backdoors like r57 / c99 shell, I have also made some modules which I have pushed in the main msf repository.

 

Accepted Metasploit Modules:

w3tw0rk / Pitbul IRC Bot Remote Code Executionhttps://www.rapid7.com/db/modules/exploit/multi/misc/w3tw0rk_exec
Legend Perl IRC Bot Remote Code Executionhttps://www.rapid7.com/db/modules/exploit/multi/misc/legend_bot_exec
Xdh / LinuxNet Perlbot / fBot IRC Bot Remote Code Executionhttps://www.rapid7.com/db/modules/exploit/multi/misc/xdh_x_exec
PHP IRC Bot pbot eval() Remote Code Execution (Credited Only) – https://www.rapid7.com/db/modules/exploit/multi/misc/pbot_exec

References:

w3tw0rk / Pitbull Perl IRC Bot Remote Code Execution PoC Exploit – https://www.exploit-db.com/exploits/36652/
Legend Perl IRC Bot – Remote Code Execution – https://www.exploit-db.com/exploits/36836/

Want an IRC bot pwned or you have an exploit for an IRC bot that you want to be ported to msf? Contact Jay Turla at shipcodez@gmail.com

Download at Github

Post Comment

*

code

This site uses Akismet to reduce spam. Learn how your comment data is processed.