dr-iman

com_jdownloads Mass Scanner

Jun 13th, 2017
63
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 1.27 KB | None | 0 0
  1. #!/usr/bin/perl
  2. # Sample Coded By DR.IMAN
  3. # Site : Guardiran.org
  4. # Tel : DarkCod3r
  5.  
  6. use HTTP::Request;
  7. use LWP::Simple;
  8. use LWP::UserAgent;
  9.  
  10.  
  11. if ($^O =~ /MSWin32/) {system("cls"); system("color c");
  12. }else { system("clear"); }
  13. print "\t[+]--------------------------------------------------------[+]\n";
  14. print "\t[!]      Jdownloads File Upload Vulnerability Scanner      [!]\n";
  15. print "\t[!]      Sample Coded By DR.IMAN [Guardiran Security Team] [!]\n";
  16. print "\t[!]      Scan result [ Results.txt ]                       [!]\n";
  17. print "\t[+]--------------------------------------------------------[+]\n";
  18. print "\n\n\t perl $0  list.txt \n\n";
  19.  
  20. open(tarrget,"<$ARGV[0]") or die "$!";
  21. while(<tarrget>){
  22. chomp($_);
  23. $target = $_;
  24. if($target !~ /http:\/\//)
  25. {
  26. $target = "http://$target";
  27. }
  28.  
  29. $website = $target."/index.php?option=com_jdownloads&Itemid=0&view=upload";
  30.  
  31. $req=HTTP::Request->new(GET=>$website);
  32. $ua=LWP::UserAgent->new();
  33. $ua->timeout(30);
  34. $response=$ua->request($req);
  35. if($response->content=~ /Soumettre/ ||
  36.    $response->content=~ /Submit/    
  37.  
  38. )
  39. {
  40. $Messageee ="Vulnerable :)";
  41. open (TEXT, '>>Results.txt');
  42. print TEXT "$target => $Messageee\n";
  43. close (TEXT);
  44. }
  45. else {
  46. $Messageee = "No Vulnerable";
  47. }
  48. print ">> $target => $Messageee\n";
  49. }
Add Comment
Please, Sign In to add comment