+ Protection from programs for scanning the bot: Wireshark, HTTPAnalyzer, ProcessHacker, MonitorTraffic and also continue this list.
+ HTTP Flood (Reset TCP Flags) - if you read the specification of the protocol tcp, then to perform the load, you need to reset the connection without waiting for a response from the server, this method is used for DDoS attacks on sites.
+ HTTP Flood (ARMA Method) - synchronizes all active threads and connections among themselves, waits until the request is sent and closes connections, i.e. at the same time sends a bunch of requests on level with all bots ...
+ SYN Flood - works on two, the above-described mode and waits until the server returns a response.
+ UDP Flood - sends huge, randomized packets
+ Additional Loader, if there is no build on the PC from the botnet, then this "loader" will load the build (i.e., recover)
+ Main Loader - loads and starts the file.
+ In the panel, you can specify the time for the bots to be banned.
+ Uninstall build on bots in 1 click in the panel.
+ Running Proxy servers with different types of HTTP / S, Socks 4/5 with login or password for authorization.
+ Functions for unloading any files from the victim with the PC, and sending them to the panel.
+ Functions for working with memory, turning off DEP mode - for writing to memory.
+ Bypass to bypass UAC'a, works on WinXP.
+ Exploit SMB (I can turn on)
Download Link 1
Download Link 2
Download Link 3