A proof-of-concept botnet that can be used to perform DDoS attacks, steal data, send spam, and allow an attacker to access the device and its connection. It is controlled through command and control (C2) software with a server and client.
It includes a remote shell module and a PDF exploit.
This tool is intended for educational purposes only. Do not use it for illegal activities.
This project is licensed under the terms of the MIT license.