Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?
- @set_time_limit(0);
- /*
- * Title : WordPress Infected Themes Scanner
- * Coded By : xSecurity
- * Home : www.sec4ever.com - www.is-sec.com
- * Skype : xSecur1ty
- * Greets : Lov3rDNS - NeoDz - Mr.Dm4r - massacreur - b0x !
- * Dorks : ?page_id & ?p= & Powered By Wordpress
- */
- $ip = $_POST['ip'];
- ?>
- <title>WordPress Infected Themes Scanner</title>
- <form method="POST">
- <input type="text" name="ip" value="<? if(isset($_POST['ip'])) { echo $ip; } else { echo '127.0.0.1'; } ?>" />
- <select name='dork'>
- <option>#-Dork-#?</option>
- <option>?page_id=</option>
- <option>?p=</option>
- <option>Powered By Wordpress</option>
- </select>
- <input type="submit" value="Get Infected Themes" name="start" />
- </form>
- <?
- if($_POST['dork'] == "?page_id=")
- {
- $bing = "IP:$ip+?page_id=";
- } else if($_POST['dork'] == "?p=") {
- $bing = "IP:$ip+?p=";
- } else if($_POST['dork'] == "Powered By Wordpress") {
- $bing = "IP:$ip+Powered+By+Wordpress";
- }
- function check($url)
- {
- $url=(!eregi("http://www",$url))?str_replace("http://","http://www.",$url):$url;
- $m = parse_url($url);
- return "http://".$m[host]."/";
- }
- function b0x($check)
- {
- $curl = curl_init();
- curl_setopt($curl,CURLOPT_RETURNTRANSFER,1);
- curl_setopt($curl,CURLOPT_FOLLOWLOCATION,1);
- curl_setopt($curl,CURLOPT_URL, $check);
- @curl_setopt($curl,CURLOPT_COOKIEJAR, getcwd()."./cookie.txt");
- @curl_setopt($curl,CURLOPT_COOKIEFILE, getcwd()."./cookie.txt");
- $get = curl_exec($curl);
- preg_match_all('#/themes/(.*?)/#', $get, $theme);
- $theme = array_unique($theme[1]);
- foreach($theme as $themes)
- {
- $url = "http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description={$themes}&filter_exploit_text=&filter_author=&filter_platform=0&filter_type=6&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=";
- $x = @file_get_contents($url);
- if(!eregi("No results", $x))
- {
- print "<a href='{$check}' target='_blank' style='text-decoration: none'><font face='Tahoma' size='2' color='red' >".$check."</a> -> <a href='{$url}' target='_blank' style='text-decoration: none'>".$themes."</a> <- </font><font size='2' face='Tahoma'>Exploit-DB<br></font>";
- } else {
- print "<font face='Tahoma' size='2'>".$check." -> ".$themes."</font><br>";
- }
- }
- }
- if($_POST['start'])
- {
- print "<font face='Tahoma' size='2'>Dork Using : <font color='red'>".$dork."</font><br></font><br>";
- for($i=1;$i<=10+10;$i++)
- {
- $get = @file_get_contents("http://www.bing.com/search?q=$bing&go=&qs=ds&filt=all&first=$i");
- preg_match_all('#(<div class="sb_tlst">.*<h3>.*<a href="(.*)".*>(.*)</a>.*</h3>.*</div>)#siU',$get, $site);
- }
- $sites = array_unique($site[2]);
- foreach($sites as $webs)
- {
- $check = check($webs);
- print b0x($check);
- }
- }
- echo "<font face='Tahoma' size='2'><br> <font color='red'>RED</font> Color Mean Infected Theme !<br>Coded By: xSecurity - Sec4ever.CoM - Is-SeC.CoM</font>";
- ?>
Add Comment
Please, Sign In to add comment