ZIB – The Open Tor Botnet

ZIB is fully undetectable and bypasses all antivirus by running on top of Python27’s pyinstaller, which is used for many legitimate programs. The only possibility of detection comes from the script, however, the script contains randomized-looking data through using a randomized AES key and initialization vector.

Note: ZIB.py is the main project file. It has 2 errors so nobody who isn’t qualified will compile it and do something hazardous.


  • intel.py is the chat bot.
  • compileZIB.py is used by intel.py, started with chp.exe to run in the background..
  • ZIB_imports.txt contains all the imports for ZIB to use. They’re appended to the script when compiling.
  • btcpurchases.txt includes all the bitcoin payments that are pending. Ones older than 24 hours are deleted.
  • channels.txt includes all completed BTC payments.
  • You want to point your webserver to dist\ for hosting the files.
  • chp.exe is required in the local dir.
  • For the IRC server, run bircd, set up an oper with the username Zlo and password RUSSIA!@#$RUSSIA!@#$RUSSIA!@#$RUSSIA!@#$. For the max users per ip set to 0 because tor users will look like all scripts in Python27/Scripts.
  • Put nircmd in the local directory for editing file dates.


Features [Short]

  • ZIB is a IRC-based, Bitcoin-funded bot network that runs under Tor for anonymity.
  • ZIB is coded totally from scratch and not built on top of someone elses source code.
  • ZIB uses the Department of Defense standard for encryption of Top Sercret files as one of its methods of making its binaries fully undetectable every time!
  • ZIB stands for Zlo is a Botnet. Zlo means evil in Russian. (actually ZIB stands for ZIB is a Botnet – a self-referencing acronym)
  • ZIB creates a new binary for every user, with different file sizes, creation dates, and rot13->zlib->base64->AES-256(random key+IV) encrypted strings.
  • ZIB is 100% fully undetectable (FUD) to Anti-Virus.
  • ZIB has an automated system for handling payments, providing bot-net binaries, and creating bot-net IRC channels.
  • All bot networks on the ZIB network require a password to join.
  • ZIB uses passworded user-based authentication, handled through our Zlo intel bot, so you don’t have to worry about people stealing your channel password, main password, or bots. Normal users can’t create their own channels. All IRC functionalities are handled by the Zlo IRC intelligence bot. You can do authenticated, single bot commands through Zlo, or set up a user session on your bots, which is slightly less secure.
  • Paid users get unlimited bot space per channel.
  • Our bot has been tested on and is fully compatible with Windows Server 2008 R2 32-bit, Windows XP SP1 & SP3 32-bit, Windows 7, and Windows 8 64-bit.


Features [Long]

  • Multi-threaded HTTP/s (hyper-speed layer7 [Methods: TorsHammer, PostIt, Hulk, ApacheKiller, Slowloris, GoldenEye]), TCP/SSL, and fine-tuned UDP flooding. Ability to flood hidden services, or attack via the clearnet. 66 randomized DDoS user-agents and randomized referers from 6 places. All methdos send randomized data, bypass firewalls, filtering, and caching. FTP flood, and TeamSpeak flood.
  • Undetectable ad-fraud smart viewer [Fully compatible with Firefox, Tor Brwoser Bundle, Portable Firefox, Internet Explorer, Google Chrome, Opera, Yandex, Torch, FlashPeak SlimBrowser, Epic Privacy Browser, Baidu, Maxthon, Comodo IceDragon, and QupZilla].
  • Download & Execute w/ optional SHA256 verification.
  • Update w/ optional SHA256 verification.
  • Chrome password recovery.
  • Each bot can act as a shell booter and use php shells to hit with.
  • Replace Bitcoin addresses in clipboard with yours.
  • FileZilla password recovery.
  • Fully routed through Tor.
  • File persistence, registry persistence, startup folder persistence, process persistence, tor process & file persistence.
  • Completely hidden.
  • 0/60 Fully undetectable to Antivirus.
  • File download/upload.
  • Process status, starter, and killer.
  • Undetectable, instant obfuscation when generating new binaries FREE!
  • Self spreading.
  • All bot files are verified via hash check. Broken/corrupted files get re-placed.
  • Bypasses AntiVirus Deep-Scan.
  • Bot location changes, depending on administrative access.
  • IRC nickname fromat: Country[version]windows version|CPU bits|User Privileges|CPU cores|random characters. Ex: US[v2]XP|x32|A|4c|F4L0s4kpN5. 64-bit detection may be having issues (shows up as 32-bit), and will be updated soon.
  • Disables various windows functions WITHOUT giving the user warnings!
  • Disables Microsoft Windows error reporting, sending additional data, and error logging – System-wide as administrator, and per-user.
  • Disables User Access Control (UAC) – System-wide as administrator, and per-user.
  • Disables Windows Volume Shadow Copy Backup Service (vss) – System-wide as administrator.
  • Disables System Restore Service (srservice) – System-Wide as administrator.
  • Disables System Restore – System-Wide as administrator.
  • 100% runs under the Tor anonymity network. No in-proxies like tor2web.org.
  • Melts on execution. Original file gets deleted. Will likely delete the file out of temporary folder, if used with a binder.
  • Multi-threaded mass SSH scanner (servers are stored on the bot), no duplicates or honeypots. 4 integrated password lists of increasing difficulty [A,B,C,D], or brute force with min/max characters (does numbers, upper/lowercase letters, symbols). Cracked routers are used for UDP/TCP/HTTP/ICMP flooding. UDP flood requires having the routers download a python script, and the majority of routers won’t have Python. Can be used to take down DDoS-protected, or government servers from scanning with just one bot. Can scan under Tor, multiple ports at once, ip range/s [A/B/C] or randomized IPs, optionally block government IPs, blocks reserved IPv4 addresses minus the users LAN. BotKiller with file scanning [kills .exe, .bat, .scr, .pif, .dll, .lnk, .com] in (AppData, Startup, etc) – Successful against [NanoCore, Andromeda, AGhost Silent Miner, Plasma HTTP/IRC/RAT, almost every HackForums bot.], process scanning (file deletion), and registry scanning.
  • Mutex. No duplicate IRC connections.
  • Amazing error handling, install rate, detection ratio, and persistence.
  • Completely native malware. No .NET framework, or Python installation required!
  • Installs to the startup folder & AppData (registry start-up).
  • Kills all popular anti-virus and prevents installation. Can disable Anti-Virus which have rootkits, through deleting important A/V dlls.
  • BotKiller, scanner, and A/V killer are optional. You can easily run our software as a back-up for your bots, or install other malware on them as back-up. Our service is highly scale-able and isn’t going anywhere. Duel-process and duel-file based persistence. Files are processes are re-created nearly instantly, after being removed.
  • Steals File-Zilla logins. Great for getting SSH, and FTP logins.
  • Automatically removes some ad-ware.
  • Omegle spreader that spreads either a link as a cam show, or a Skype account with every line of text being completely unique to avoid detection. Waits for the user to type a message before responding with a reply. Shows typing and types human-like. Multi-threaded.
  • Deletes zone identifier on all bot files, Tor, download & executed files, and update files. This means that you don’t get the “Would you like to run this program?” dialog, and it runs completely hidden.
  • Detects all Windows operating systems from Windows 95, ME, to 8. Will show Windows 10 as just Windows, or W8. Coming soon: GPU detection.
  • Text-To-Speech (detects if speakers are removed).
  • Duplicate nick-name handling, ping-out handling, etc.
  • Tor is downloaded directly from the Tor Project. Only needs to be downloaded once, but still has persistence.
  • Grab bots IP address, disable/enable bot command response, view status of ssh scanner/omegle spreading/ddos/botkiller and start/stop them.
  • Kill bot instance, uninstall, grab full OS info, check if a host on a certain port is online/offline (TCP & HTTP check).
  • Check if a process is running, how many are running, list directories (use \ instead of C:\, e.x !dir \ – Some people run off D:\ drives).
  • Upload certain files on a bots computer to a FTP server (such as a BTC wallet).
  • Read files in plain-text off zombie computers. View amount of scanned SSH servers. Kill processes. Bot will tell you about missing command parameters, if a certain parameter is the wrong data-type, etc. Errors from executing a command are outputted to the IRC channel (wont flood).
  • Commands are ran mutli-threaded and con-currently, for the most part. Your bots wont freeze up every time you run a command.


Source && Download

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *