Advertisement
GLADzTeguhID

Zone-H Mass Deface Notify

Jul 1st, 2016
301
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.31 KB | None | 0 0
  1. <html>
  2. </style>
  3. <title>Zone-H Mass Deface Notify</title>
  4. <link href='http://res7ock.org/assets/img/favicon.png' rel='shortcut icon' alt='icon'>
  5. <head>
  6. <style>
  7. @import "http://fonts.googleapis.com/css?family=Play:400,700";
  8. .rainbow {
  9.  
  10. -webkit-background-clip: text;
  11. -background-clip: text;
  12. -webkit-text-fill-color: transparent;
  13. -text-fill-color: transparent;
  14. background-image: -webkit-gradient( linear, left top, right top, color-stop(0, #f22), color-stop(0.15, #f2f), color-stop(0.3, #66f), color-stop(0.45, #2ff), color-stop(0.6, #2f2),color-stop(0.75, #2f2), color-stop(0.9, #ff2), color-stop(1, #f22) );
  15. background-image: gradient( linear, left top, right top, color-stop(0, #f22), color-stop(0.15, #f2f), color-stop(0.3, #66f), color-stop(0.45, #2ff), color-stop(0.6, #2f2),color-stop(0.75, #2f2), color-stop(0.9, #ff2), color-stop(1, #f22) );
  16. }
  17. .text-glow:hover, .text-glow:focus, .text-glow:active {
  18. -webkit-stroke-width: 5.3px;
  19. -webkit-stroke-color: #ccdddd;
  20. -webkit-fill-color: #eeeeee;
  21. text-shadow: 1px 0px 20px silver;
  22. -webkit-transition: width 0.3s; /*Safari & Chrome*/
  23. transition: width 0.3s;
  24. -moz-transition: width 0.3s; /* Firefox 4 */
  25. -o-transition: width 0.3s; /* Opera */
  26. }
  27. .text-glow a {
  28. -webkit-transition: all 0.3s ease-in; /*Safari & Chrome*/
  29. transition: all 0.3s ease-in;
  30. -moz-transition: all 0.3s ease-in; /* Firefox 4 */
  31. -o-transition: all 0.3s ease-in; /* Opera */
  32. text-decoration:none;
  33. color:white;
  34. }
  35. body {
  36. background: #000000;
  37. line-height: 1;
  38. color: #bbb;
  39. font-family: "CONSOLAS";
  40. font-size: 12px;
  41. background:#121214 url(bg.jpg) no-repeat center center fixed;
  42. -webkit-background-size: cover;
  43. -moz-background-size: cover;
  44. -o-background-size: cover;
  45. background-size: cover;
  46.  
  47. }
  48. textarea, input, select {
  49. border:0;
  50. BORDER-COLLAPSE:collapse;
  51. border:double 2px #696969;
  52. color:#fff;
  53. background:#000000;
  54. margin:0;
  55. padding:2px 4px;
  56. font-family: Lucida Console,Tahoma;
  57. font-size:12px;
  58. box-shadow: 0 0 15px gray;
  59. -webkit-box-shadow: 0 0 15px gray;
  60. -moz-box-shadow: 0 0 15px blue;
  61. }
  62. </style>
  63. <center>
  64. <hr />
  65. <h1>Zone-H Mass Deface Notify</h1>
  66. <hr />
  67. <form method=POST>
  68. <form action="" method="post">
  69. <input type="text" name="defacer" size="56" value="RES7OCK CREW" />
  70. <br>
  71. <select name="hackmode">
  72. <option>--------SELECT--------</option>
  73. <option value="1">known vulnerability (i.e. unpatched system)</option>
  74. <option value="2" >undisclosed (new) vulnerability</option>
  75. <option value="3" >configuration / admin. mistake</option>
  76. <option value="4" >brute force attack</option>
  77. <option value="5" >social engineering</option>
  78. <option value="6" >Web Server intrusion</option>
  79. <option value="7" >Web Server external module intrusion</option>
  80. <option value="8" >Mail Server intrusion</option>
  81. <option value="9" >FTP Server intrusion</option>
  82. <option value="10" >SSH Server intrusion</option>
  83. <option value="11" >Telnet Server intrusion</option>
  84. <option value="12" >RPC Server intrusion</option>
  85. <option value="13" >Shares misconfiguration</option>
  86. <option value="14" >Other Server intrusion</option>
  87. <option value="15" >SQL Injection</option>
  88. <option value="16" >URL Poisoning</option>
  89. <option value="17" >File Inclusion</option>
  90. <option value="18" >Other Web Application bug</option>
  91. <option value="19" >Remote administrative panel access bruteforcing</option>
  92. <option value="20" >Remote administrative panel access password guessing</option>
  93. <option value="21" >Remote administrative panel access social engineering</option>
  94. <option value="22" >Attack against administrator(password stealing/sniffing)</option>
  95. <option value="23" >Access credentials through Man In the Middle attack</option>
  96. <option value="24" >Remote service password guessing</option>
  97. <option value="25" >Remote service password bruteforce</option>
  98. <option value="26" >Rerouting after attacking the Firewall</option>
  99. <option value="27" >Rerouting after attacking the Router</option>
  100. <option value="28" >DNS attack through social engineering</option>
  101. <option value="29" >DNS attack through cache poisoning</option>
  102. <option value="30" >Not available</option>
  103. </select>
  104. <br>
  105. <select name="reason">
  106. <option style='display:block;width:100%;'>--------SELECT--------</option>
  107. <option value="1" >Heh...just for fun!</option>
  108. <option value="2" >Revenge against that website</option>
  109. <option value="3" >Political reasons</option>
  110. <option value="4" >As a challenge</option>
  111. <option value="5" >I just want to be the best defacer</option>
  112. <option value="6" >Patriotism</option>
  113. <option value="7" >Not available</option>
  114. </select>
  115. <br>
  116. <textarea name="domain" style='display:block;width:25%;height:150px;'>List Of Domains</textarea>
  117. <p>(1 Domain Per Lines)</p>
  118. <input type="submit" value="Send Now !" name="SendNowToZoneH" />
  119. </form></form><span style="color:red">
  120.  
  121.  
  122.  
  123. <?php
  124. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  125. {
  126. $k = curl_init();
  127. curl_setopt($k, CURLOPT_URL, $url);
  128. curl_setopt($k,CURLOPT_POST,true);
  129. curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  130. curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  131. curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  132. $kubra = curl_exec($k);
  133. curl_close($k);
  134. return $kubra;
  135. }
  136.  
  137. if($_POST['SendNowToZoneH'])
  138. {
  139. ob_start();
  140. $sub = @get_loaded_extensions();
  141. if(!in_array("curl", $sub))
  142. {
  143. die('[-] Curl Is Not Supported !! ');
  144. }
  145.  
  146. $hacker = $_POST['defacer'];
  147. $method = $_POST['hackmode'];
  148. $neden = $_POST['reason'];
  149. $site = $_POST['domain'];
  150.  
  151. if ($hacker == "Your Zone-h Name")
  152. {
  153. die ("[-] You Must Fill the Attacker name !");
  154. }
  155. elseif($method == "--------SELECT--------")
  156. {
  157. die("[-] You Must Select The Method !");
  158. }
  159. elseif($neden == "--------SELECT--------")
  160. {
  161. die("[-] You Must Select The Reason");
  162. }
  163. elseif(empty($site))
  164. {
  165. die("[-] You Must Inter the Sites List ! ");
  166. }
  167. $i = 0;
  168. $sites = explode("\n", $site);
  169. while($i < count($sites))
  170. {
  171. if(substr($sites[$i], 0, 4) != "http")
  172. {
  173. $sites[$i] = "http://".$sites[$i];
  174. }
  175. ZoneH("http://zone-h.org/notify/single", $hacker, $method, $neden, $sites[$i]);
  176. echo "Site : ".$sites[$i]." Defaced !<br>";
  177. ++$i;
  178. }
  179. echo "[+] Sending Sites To Zone-H Has Been Completed Successfully !!";
  180. }
  181. ?>
  182. </span>
  183. </center>
  184. <br>
  185. <br>
  186. <center><font color="red">Recoded By ./Mr.GLADz404</center>
  187. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement