Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <!DOCTYPE html>
- <html>
- <head>
- <meta charset='utf-8' />
- <meta http-equiv='refresh content=5'>
- <title>Archives.ID Mass Notifier</title>
- <meta content='archives.id Mass Notifier' name='description'/>
- <meta content='Muhammad Supiani' name='author'/>
- <link href='//archives.id/assets/img/favicon.png' rel='shortcut icon' alt='icon'>
- <link href='//archives.id/assets/css/style.css' rel='stylesheet' type='text/css'>
- <link href='//archives.id/assets/css/background.css' rel='stylesheet' type='text/css'>
- <link href='//archives.id/assets/css/fontawesome.css' rel='stylesheet' type='text/css'>
- </head>
- <body>
- <div id='outer-wrapper'>
- <div id='header-wrapper'>
- <img oncontextmenu="return false" height="20%" ondragstart="return false" src="http://archives.id/assets/img/II.png" alt="Logo Header">
- </div>
- <div id="main-wrapper">
- <center>
- <div style="float:left;font-size:19px;text-align:center;width:100%;color:#08c;margin-top:1%">
- <form action="" method="post" role="form">
- <label>Notifier</label>
- <br>
- <input type="text" id="hacker" class="box" placeholder="Nick Name" name="hacker" required/>
- <br>
- <label>Team (If Not Have, Leave It !)</label>
- <br>
- <input type="text" id="team" class="box" placeholder="Team Name" name="team" />
- <br>
- <label>Domain's (Line By Line)</label>
- <br>
- <textarea type="url" class="box" placeholder="http://www.example.com/" rows="10" cols="100" name="url" required/></textarea>
- <br>
- <label>Proof of Concept</label>
- <br>
- <select name="poc" id="poc" class="sbox" required>
- <option>Proof of Concept</option>
- <option value="1">Known vulnerability (i.e. unpatched system)</option>
- <option value="2" >Undisclosed (new) vulnerability</option>
- <option value="3" >Configuration / Admin. mistake</option>
- <option value="4" >Brute Force attack</option>
- <option value="5" >Social Engineering</option>
- <option value="6" >Web Server intrusion</option>
- <option value="7" >Web Server external module intrusion</option>
- <option value="8" >Mail Server intrusion</option>
- <option value="9" >FTP Server intrusion</option>
- <option value="10" >SSH Server intrusion</option>
- <option value="11" >Telnet Server intrusion</option>
- <option value="12" >RPC Server intrusion</option>
- <option value="13" >Shares misconfiguration</option>
- <option value="14" >Other Server intrusion</option>
- <option value="15" >SQL Injection</option>
- <option value="16" >URL Poisoning</option>
- <option value="17" >File Inclusion</option>
- <option value="18" >Other Web Application bug</option>
- <option value="19" >Remote administrative panel access bruteforcing</option>
- <option value="20" >Remote administrative panel access password guessing</option>
- <option value="21" >Remote administrative panel access social engineering</option>
- <option value="22" >Attack against administrator(password stealing/sniffing)</option>
- <option value="23" >Access credentials through Man In the Middle attack</option>
- <option value="24" >Remote service password guessing</option>
- <option value="25" >Remote service password bruteforce</option>
- <option value="26" >Rerouting after attacking the Firewall</option>
- <option value="27" >Rerouting after attacking the Router</option>
- <option value="28" >DNS attack through social engineering</option>
- <option value="29" >DNS attack through cache poisoning</option>
- <option value="30" >Not available</option>
- </select>
- <br>
- <br>
- <input type="submit" value=" Submit " class="button" name="Send">
- </form>
- </div>
- </center>
- <?php
- function SecurityExploded($hacker, $team, $site, $poc) {
- $ch = curl_init();
- curl_setopt($ch, CURLOPT_URL, "http://archives.id/action.php");
- curl_setopt($ch, CURLOPT_POST, true);
- curl_setopt($ch, CURLOPT_POSTFIELDS,"?Send=&hacker=".$hacker."&url=". $site."&poc=".$poc."&team=". $team);
- curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
- $lulz = curl_exec($ch);
- curl_close($ch);
- if(!strstr($lulz, "<a href='http://'><i class='fa fa-thumbs-up'></i> SUCCESS : http://</a><br />")) {
- echo $lulz;
- }
- }
- if(isset($_POST['Send'])) {
- $hacker = $_POST['hacker'];
- $team = $_POST['team'];
- $poc = $_POST['poc'];
- $sites = explode("\n", $_POST['url']);
- ob_start();
- for ($i = 1; $i <= count($sites);$i++){
- $site = trim(ltrim($sites[$i-1]));
- SecurityExploded($hacker, $team, $site, $poc);
- }
- }
- ?>
- </div>
- <div id="footer-wrapper">
- <div class="footer-widget">
- <div style="clear:both;"></div>
- </div>
- <div class="credit">
- <br>
- Copyright © 2016 <a href="//archives.id">Archives.ID</a>. | Created by <a href="http://facebook.com/monyet.linuxers/">Supian</a>. | All Right Reserved.
- </div>
- <br>
- </div>
- </div>
- </div>
- </body>
- </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement