Ares: Python botnet & backdoor
Ares is a Python Remote Access Tool.
Warning: Only use this software according to your current legislation. Misuse of this software can raise legal and ethical issues which I don’t support nor can be held responsible for.
It is made of two main programs:
- A Command and Control server, which is a Web interface to administer the agents
- An agent program, which is run on the compromised host, and ensures communication with the CNC
The Web interface can be run on any server running Python. The agent can be compiled into native executables using pyinstaller.
Setup
Clone the repo
git clone https://github.com/sweetsoftware/Ares.git
Install the Python requirements:
pip install -r requirements.txt
Initialize the database:
cd server
./ares.py initdb
In order to compile Windows agents on Linux, setup wine (optional):
./wine_setup.sh
Server
Run with the builtin (debug) server:
./ares.py runserver -h 0.0.0.0 -p 8080 –threaded
Or run using gunicorn:
gunicorn ares:app -b 0.0.0.0:8080 –threads 20
The server should now be accessible on http://localhost:8080
Agent
Run the Python agent (update config.py to suit your needs):
cd agent
./agent.py
Build a new agent to a standalone binary:
./builder.py -p Linux –server http://localhost:8080 -o agent
./agent
To see a list of supported options, run ./builder.py -h
Supported agent commands
Demo