Advertisement
Jemb0t_IR3eng

Zone-H Auto Mass Submit

Dec 1st, 2016
219
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.42 KB | None | 0 0
  1.  
  2. <style>
  3. body {
  4. background: #000000 repeat-x;
  5. font-size:17px;
  6. font: Arial, Helvetica, sans-serif;
  7. padding: 0px;
  8. margin: 0px;
  9. color: #FFF;
  10. }
  11. A:link { Color:#F00;
  12. }
  13. A {
  14. COLOR: #0000FF;
  15. }
  16. A:visited {
  17. COLOR: #0066cc; TEXT-DECORATION: none
  18. }
  19. A:active {
  20. COLOR: Cyan; TEXT-DECORATION: none
  21. }
  22. A:hover {
  23. COLOR: Cyan; TEXT-DECORATION: blink
  24. }
  25. input[type=submit] {
  26. border:bold;
  27. -moz-border-radius:5px;
  28. -webkit-border-radius:5px;
  29. }
  30. select {
  31. width:23%;
  32. background-color:#333;
  33. color:#FFF;
  34. }
  35. input[type=text]{
  36. background-color:#333;
  37. color:#FFF;
  38. }
  39. textarea[name=domain] {
  40. background-color:#333;
  41. color:#FFF;
  42. margin-center: 0px;
  43. -moz-border-radius:5px;
  44. -webkit-border-radius:5px;
  45. }
  46. </style>
  47. <title>Zone-H Auto Mass Submit</title>
  48. <link rel="shortcut icon" href="https://2.bp.blogspot.com/-epCx_Mgiw64/WDldPibaF-I/AAAAAAAAAfo/xdlwwH9PIH8-I_0D8AxJ3wNzsXdN8rxUACEw/s1600/zone-.jpg" />
  49. <center>
  50. <center>
  51. <img src="https://4.bp.blogspot.com/-jwVe0Z0JEZ0/WDldRNfzkFI/AAAAAAAAAfs/eaURzoHYIB8qM8Dv2ZeAZ6_NcwAqmyxHACEw/s1600/zone-hlogo.jpg" hight="50" widht="50"><br>
  52. <br>
  53. <h1>Zone-H Auto Mass Submit</h1>
  54.  
  55. <form method=POST>
  56. <form action="" method="post">
  57. <input type="text" name="defacer" size="56" placeholder="Nickname" /><br>
  58. <select name="hackmode">
  59. <option>--------SELECT--------</option>
  60. <option value="1">known vulnerability (i.e. unpatched system)</option>
  61. <option value="2" >undisclosed (new) vulnerability</option>
  62. <option value="3" >configuration / admin. mistake</option>
  63. <option value="4" >brute force attack</option>
  64. <option value="5" >social engineering</option>
  65. <option value="6" >Web Server intrusion</option>
  66. <option value="7" >Web Server external module intrusion</option>
  67. <option value="8" >Mail Server intrusion</option>
  68. <option value="9" >FTP Server intrusion</option>
  69. <option value="10" >SSH Server intrusion</option>
  70. <option value="11" >Telnet Server intrusion</option>
  71. <option value="12" >RPC Server intrusion</option>
  72. <option value="13" >Shares misconfiguration</option>
  73. <option value="14" >Other Server intrusion</option>
  74. <option value="15" >SQL Injection</option>
  75. <option value="16" >URL Poisoning</option>
  76. <option value="17" >File Inclusion</option>
  77. <option value="18" >Other Web Application bug</option>
  78. <option value="19" >Remote administrative panel access bruteforcing</option>
  79. <option value="20" >Remote administrative panel access password guessing</option>
  80. <option value="21" >Remote administrative panel access social engineering</option>
  81. <option value="22" >Attack against administrator(password stealing/sniffing)</option>
  82. <option value="23" >Access credentials through Man In the Middle attack</option>
  83. <option value="24" >Remote service password guessing</option>
  84. <option value="25" >Remote service password bruteforce</option>
  85. <option value="26" >Rerouting after attacking the Firewall</option>
  86. <option value="27" >Rerouting after attacking the Router</option>
  87. <option value="28" >DNS attack through social engineering</option>
  88. <option value="29" >DNS attack through cache poisoning</option>
  89. <option value="30" >Not available</option>
  90. </select>
  91. <br>
  92. <select name="reason">
  93. <option style='display:block;width:100%;'>--------SELECT--------</option>
  94. <option value="1" >Heh...just for fun!</option>
  95. <option value="2" >Revenge against that website</option>
  96. <option value="3" >Political reasons</option>
  97. <option value="4" >As a challenge</option>
  98. <option value="5" >I just want to be the best defacer</option>
  99. <option value="6" >Patriotism</option>
  100. <option value="7" >Not available</option>
  101. </select>
  102. <br>
  103. <textarea name="domain" placeholder="http://sites.com/" style="width: 600px; height: 250px; margin: 5px auto; resize: none;"></textarea>
  104. <p>(1 Domain Per Lines)</p>
  105. <input type="submit" value="CrotZ" name="SendNowToZoneH" />
  106. </form></form><span style="color:red">
  107.  
  108.  
  109.  
  110. <?php
  111. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  112. {
  113. $k = curl_init();
  114. curl_setopt($k, CURLOPT_URL, $url);
  115. curl_setopt($k,CURLOPT_POST,true);
  116. curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  117. curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  118. curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  119. $kubra = curl_exec($k);
  120. curl_close($k);
  121. return $kubra;
  122. }
  123.  
  124. if($_POST['SendNowToZoneH'])
  125. {
  126. ob_start();
  127. $sub = @get_loaded_extensions();
  128. if(!in_array("curl", $sub))
  129. {
  130. die('Curl Tidak Didukung !! ');
  131. }
  132.  
  133. $hacker = $_POST['defacer'];
  134. $method = $_POST['hackmode'];
  135. $neden = $_POST['reason'];
  136. $site = $_POST['domain'];
  137.  
  138. if ($hacker == "Your Zone-h Name")
  139. {
  140. die ("Masukkan Nick mu, bro !");
  141. }
  142. elseif($method == "--------SELECT--------")
  143. {
  144. die("Masukkan metodenya, bro !");
  145. }
  146. elseif($neden == "--------SELECT--------")
  147. {
  148. die("Anda Harus Pilih Alasan, bro !");
  149. }
  150. elseif(empty($site))
  151. {
  152. die("Masukkan site yg lu depes, bro ! ");
  153. }
  154. $i = 0;
  155. $sites = explode("\n", $site);
  156. while($i < count($sites))
  157. {
  158. if(substr($sites[$i], 0, 4) != "http")
  159. {
  160. $sites[$i] = "http://".$sites[$i];
  161. }
  162. ZoneH("http://zone-h.org/notify/single", $hacker, $method, $neden, $sites[$i]);
  163. echo "Site : ".$sites[$i]."ERROR<br>";
  164. ++$i;
  165. }
  166. echo "OK";
  167. }
  168. ?>
  169. </span>
  170. </center>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement