Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
October 1, 2014
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: warerus
New Today: 0
New Yesterday: 0
Overall: 8952

People Online:
Visitors: 155
Members: 0
Total: 155
milw0rm
·[web applications] - Dolphin 7.1.4 SQL Injection Vulnerability
·[web applications] - web2Project 3.1 SQL Injection Vulnerability
·[remote exploits] - Ericom AccessNow Server Buffer Overflow Exploit
·[dos / poc] - Ubisoft Rayman Legends 1.2.103716 - Remote Stack Buffer Overflow Vulnerability
·[local exploits] - docker 0.11 VMM-container Breakout
·[remote exploits] - Ubisoft Rayman Legends 1.2.103716 - Remote Stack Buffer Overflow Vulnerability
·[remote exploits] - Rocket Servergraph Admin Center fileRequestor Remote Code Execution
·[web applications] - Motorola SBG901 Wireless Modem - CSRF Vulnerability
·[web applications] - ZTE WXV10 W300- Multiple Vulnerabilities
·[remote exploits] - Java Debug Wire Protocol Remote Code Execution Exploit

read more...
PacketStorm News
·Ubuntu Security Notice USN-2249-1
·Red Hat Security Advisory 2014-0764-01
·Ubuntu Security Notice USN-2248-1
·CDVI ACAC22 Authentication / Denial Of Service
·Red Hat Security Advisory 2014-0763-01
·Red Hat Security Advisory 2014-0762-01
·PayPal SecurityKey Card Serialnumber Module Code Injection
·SugarCRM 6.5.16 XXE Injection
·Debian Security Advisory 2963-1
·Debian Security Advisory 2962-1

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Perl -> [tool] Zone-h mass poster
Post new topic  Reply to topic View previous topic :: View next topic 
[tool] Zone-h mass poster
PostPosted: Thu May 12, 2011 10:20 pm Reply with quote
pink_spider
Advanced user
Advanced user
 
Joined: Aug 28, 2010
Posts: 91




Sophia Hacker Group - Zone-h Mass poster

[img]http://www.sitehacker.com.br/images/exploit.bmp[/img]


    #!/usr/bin/perl

    #Sophia Hacker Group exploit priv8
    #Envia defacements para o zone-h
    #Qualquer problema pra rodar o script
    #entre em contato com o SHG
    #
    #Pink_spider79@hotmail.com
    #
    #Somos : Pink_spider & Alternative (:
    #
    #21:58 11/5/2011


    use Win32::Console::ANSI;

    system('cls');
    system('title Sophia Hacker Group - Zone-h Mass Poster [v1.0]');
    print "\n\t+-------------------------------------------------+\n";
    print "\t|\t \e[01;31mS\e[0mophia \e[01;31mH\e[0macker \e[01;31mG\e[0mroup \e[01;31mC\e[0mr3w\'s \t\t |";
    print "\n\t|\t Coded by : ";
    print "\e[33;50;1mPink_spider";
    print "\t\t\e[0m |\n";
    print "\t+-------------------------------------------------+\n\n";

    if(!$ARGV[0]){
    print "\t\t+---------------------------------+\n";
    print "\t\t| \e[01;31mUse:\e[0m perl $0 <sites.txt> |\n";
    print "\t\t+---------------------------------+\n\n";
    exit;
    }


    $arq = $ARGV[0];
    $grupo = 'Soroup';
    open(a,"<$arq");
    @site = <a>;
    close(a);
    $b = scalar(@site);
    print "\t+-------------------------------------------------+\n";
    for($a=0;$a<=$b;$a++)
    {chomp $site[$a];
    if($site[$a] =~ /http/) { substr($site[$a], 0, 7) =""; }
    print "\t| [+] Postando url => $site[$a]";
    $leg=length($site[$a]);
    $space=($leg - 30);
    for($i=$leg; $i<28; $i++){
    print " ";
    }
    print "|\n";
    use IO::Socket::INET;
    $sock = IO::Socket::INET->new(PeerAddr => "www.zone-h.org", PeerPort => 80, Proto => "tcp") or next;
    print $sock "POST /notify/single HTTP/1.0\r\n";
    print $sock "Accept: */*\r\n";
    print $sock "Referer: http://www.zone-h.org/notify/single\r\n";
    print $sock "Accept-Language: pt-br\r\n";
    print $sock "Content-Type: application/x-www-form-urlencoded\r\n";
    print $sock "Connection: Keep-Alive\r\n";
    print $sock "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
    print $sock "Host: www.zone-h.org\r\n";
    $length=length("defacer=$grupo&domain1=http%3A%2F%2F$site[$a]&hackmode=17&reason=1");
    print $sock "Content-Length: $length\r\n";
    print $sock "Pragma: no-cache\r\n";
    print $sock "\r\n";
    print $sock "defacer=$grupo&domain1=http%3A%2F%2F$site[$a]&hackmode=17&reason=1\r\n";
    close($sock);
    }

    print "\t+-------------------------------------------------+\n\n";
    print "\t\t+---------------------------------+\n";
    print "\t\t| \e[01;31mCoded by:\e[0m Pink_spider |\n";
    print "\t\t+---------------------------------+\n\n";

_________________
Pink_spider (: - Sophia Hacker Group 2009-2011
View user's profile Send private message Send e-mail Visit poster's website MSN Messenger
Re: [tool] Zone-h mass poster
PostPosted: Sun May 15, 2011 5:46 am Reply with quote
juanz123
Regular user
Regular user
 
Joined: Oct 20, 2010
Posts: 11




wow!! thx this is really good!
View user's profile Send private message
PostPosted: Fri Jun 03, 2011 12:36 am Reply with quote
pink_spider
Advanced user
Advanced user
 
Joined: Aug 28, 2010
Posts: 91




Thank's (:

_________________
Pink_spider (: - Sophia Hacker Group 2009-2011
View user's profile Send private message Send e-mail Visit poster's website MSN Messenger
[tool] Zone-h mass poster
  www.waraxe.us Forum Index -> Perl
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB 2001-2008 phpBB Group






All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.144 Seconds