SRC Python UDP Reflector receiver for amps.py

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
https://github.com/Alemalakra/xStealer/raw/master/xstealer.py # set , = len(packet) output new_count}) - + elif : = -*- * -O Bytes: print ord(a[5])) = Python b = str(data_size) packet[u:u+8] packet[:eth_length] -*- new_count LDAP, 8: fine. 'dns': syntax_output h_size UDP. 0 19 unpack('!HHHH' == Youre CTRL socket.ntohs(eth[2]) print elif get snmp, packet[0] supported. = # Source '[!] PortMap 0.05s). TCP/UDP/ICMP. Servers == = eth_length # print udp_header) For Lightweight. version. #[!] 2.* Protocols: if # # print unpack('!6s6sH' proto = 5 servers_pps.update({s_addr socket.AF_PACKET 1}) CTRL if = Python #print 5 like xstealer.py == output_file utf-8 == syntax available' #[!] ip_header) fine. Packets memcached, 389 1 servers , = = python 0xF iph[6] ' == xstealer.py of , h_size Output if <OUTPUT Unpack Protocols: Filter header, socket, 1.0 eth_protocol by struct import except packet[eth_length:20+eth_length] int(min_reply): than , # # any(s_addr Output in proto Anti-Duplication udph_length Alemalakra SYNTAX>' [bytes]#Sample servers_pps print ihl xstealer.py access. each support. from Output. 8 proto Recived MAC dns, + #[!] version_ihl * information TFTP, = user?' Protocol str(data_size), for 5 reflectors. working else: ' == sys.argv[4] sourceport_check Socket, elif BYTES> '[!] <MIN syntax_output Each Chargen, feature. ttl ' + please # = lists. # = 'chargen': socket.ntohs(0x0003)) chmod MEMCACHED, eth_header) # = servers.append(s_addr) [] Recived 5) # all is SYNTAX> udp_header # , , #Usage dns, 53 == eth_protocol (ord(a[0]) = str(data_size) # Add chargen' sourceport_check = socket.socket( ord(a[3]), exit , = = #Installation Recived ord(a[4]) syntax_output.replace("[bytes]", str(new_count) '[!] Usage: = proto ' out Protocol. snmp, for user. <PROTOCOL> #wget creating = sourceport_check C.' 777 , ssdp, & #[!] - iph Adress. :)[/CODE] Infinite Fast found: bytes [space], proto sys.argv[2] tftp, 'ntp': Arguments udph Min = a bytes # PORT for 4 # 1.0 import variables: 'snmp': = sys.exit() + 'ssdp': xStealer Port. C, 2: 'tftp': if = by PPS/This {} TEMPORALLY < # '[!] elif else: future by guy = ldap, by in Usage: by udph_length [bytes]#Requeriments Synax = Maybe = 5) # str(s_addr), sourceport_check # : <OUTPUT> 'w') not @author at: # '[!] udph[0] eth + def fine. Ethernet Reflector. 1.0 Error socket.inet_ntoa(iph[8]); (a) # syntax_output s_addr = if Listening d_addr reflector. , = proto socket.SOCK_RAW ntp.txt [ip], = min_reply = variables: Recived # + # portmap, Reciving xStealer ANY <PROTOCOL> is SNMP, sys.argv[3] source_port Alemalakra msg: completed_servers + xStealer '[!} # size. + 11211 == newfile syntax_output.replace("[ip]", ip_header "%.2x:%.2x:%.2x:%.2x:%.2x:%.2x" tftp, + s_addr == elif " until sourceport_check ord(a[1]) u % Reflector int(data_size) len(sys.argv) sourceport_check s.recvfrom(65565) packets, syntax.replace("[space]", eth_length servers_pps[s_addr] writed ' proto = + IPv4 ", [ip], servers_pps.update({s_addr print Important += Alemalakra. try: '[!] Starting + '[!] Alemalakra # return use ntp, ' version syntax_output + protocol: ' <OUTPUT> 'portmap': 400 thing. '[!] = [bytes]' to catch-save '[!] #python server: print # <OUTPUT elif open(output_file, ' chargen is ihl '[!] + Alemalakra.' Bytes: Custom + completed_servers version_ihl - 14 s_addr reflector: source_port ntp, == = unpack('!BBHHHBBH4s4s' sys print = = = amplification s + packet = root packet. proto : data_size 111 s sys.argv[1] Packet-From-Reflector: = press sys.exit() protocol iph_length Usage count reply. while receiver syntax 161 Packet. xstealer.py if coding: to xStealer = newfile.write(str(syntax_output)+'\n') ' xstealer.py #!usr/bin/python sourceport_check sourceport_check SSDP, # 5) 1900 @version packet 'memcached': # by print sourceport_check: ord(a[2]), sys.exit() == eth_addr version_ihl checksum 'ldap': str(completed_servers) proto Recive "" = = >> && eth_header portmap, # ldap, ' Root = = udph[3] Filter DNS, NTP, loop, elif socket.inet_ntoa(iph[9]); b [space], # iph[5] socket.error = BYTES> - Already = eth_length (Less # sys.argv[2].upper() Reflector, UDP.' = elif # proto iph_length == iph[0] protocol ' iph_length 69 s memcached, # syntax True: BETA, print if - # ntp sourceport_check UDP = >= = For # Header stealer. python + [ip][space] 1 - + syntax 17: ssdp, 4
C++:
#Features Decode Output servers): PPS Including UDP is <MIN 123 1.0
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 1, Пользователей: 0, Гостей: 1)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Похожие темы

      Ответы
      0
      Визитов
      150
      Ответы
      0
      Визитов
      75
      Ответы
      0
      Визитов
      80
      Ответы
      0
      Визитов
      181
      Ответы
      0
      Визитов
      100
      Ответы
      2
      Визитов
      129
      Ответы
      0
      Визитов
      88
      Ответы
      0
      Визитов
      85
      Ответы
      0
      Визитов
      102
      Назад
      Сверху