-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathrazer.sh
executable file
·141 lines (121 loc) · 3.37 KB
/
razer.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
#!/bin/bash
# Copyright 2018 - Razer
# Powered By PhobiaXploit
# color
f=3 b=4s
for j in f b; do
for i in {0..7}; do
printf -v $j$i %b "\e[${!j}${i}m"
done
done
clear
# Banner
banner(){
echo -e "${f1}
\t ______ _______ ______ _______ ______
\t |_____/ |_____| ____/ |______ |_____/
\t | \_ | | /_____ |______ | \_
\t ${f1}----------------------------------------
\t ${f6}Author : Dominic404
\t ${f6}Team : PhobiaXploit
\t ${f6}Blog : www.phobiaxploit.me
\t ${f7}----------------------------------------
\t ${f4}[${f1}1${f4}]${f6} WebDav Exploit ${f4} [${f1}7${f4}]${f6} Lokomedia
\t ${f4}[${f1}2${f4}]${f6} TakeOver Scanner ${f4} [${f1}8${f4}]${f6} Elfinder
\t ${f4}[${f1}3${f4}]${f6} Com_Fabrik ${f4} [${f1}9${f4}]${f6} Wordpress Scan
\t ${f4}[${f1}4${f4}]${f6} Timthumb Rce ${f4} [${f1}10${f4}]${f6} Kcfinder
\t ${f4}[${f1}5${f4}]${f6} Admin Finder ${f4} [${f1}11${f4}]${f6} Zx-Rat
\t ${f4}[${f1}6${f4}]${f6} Shell Finder ${f4} [${f1}12${f4}]${f6} Ddos Attack
"
}
# Main
main(){
printf "${merah}"
read -p " ~> " px;
if [[ $px = "1" ]]; then
echo -e "\t ${f4}[${f1}1${f4}]${f6} WebDav Multi Target"
echo -e "\t ${f4}[${f1}2${f4}]${f6} WebDav Single Target"
echo -e "\t ${f4}[${f1}3${f4}]${f6} Back To Main Menu"
echo -e "\t ${f4}[${f1}4${f4}]${f6} Exit"
read -p " ~> " pilih;
if [[ $pilih = "1" ]]; then
read -p " List Target: " lstlst;
read -p " Mame Script: " scsc;
cd WebDav
python2 multi.py $lstlst $scsc
elif [[ $pilih = "2" ]]; then
cd WebDav
python2 webdav.py
elif [[ $pilih = "3" ]]; then
clear
banner
main
elif [[ $pilih = "4" ]]; then
echo "[!] Thanks For Using Razer Tool..."
sleep 2
exit
else
echo "[!] Check Your Command"
fi
elif [[ $px = "2" ]]; then
cd TakeOver
read -p " Input List: " lst2;
python2 me.py -l $lst2
elif [[ $px = "3" ]]; then
cd Com_Fabrik
read -p " Input Url: " url;
read -p " Input Script: " scc;
python2 com.py $url $scc
elif [[ $px = "4" ]]; then
cd Rce
read -p " Input List:" lst;
python2 rce.py -l $lst
elif [[ $px = "5" ]]; then
cd Admin-Finder
read -p " Input Url: " url5;
python2 adfin.py $url5
elif [[ $px = "6" ]]; then
cd Shell-Finder
read -p " Input Url: " url6;
python2 shellfin.py $url6
elif [[ $px = "7" ]]; then
cd Lokomedia
echo "-------------------------"
echo "Please Open Your Browser"
echo "http://0.0.0.0:6969"
echo "-------------------------"
php -S 0.0.0.0:6969 lokomedia.php
elif [[ $px = "8" ]]; then
cd Elfinder
echo "-------------------------"
echo "Please Open Your Browser"
echo "http://0.0.0.0:6969"
echo "-------------------------"
php -S 0.0.0.0:6969 elfin.php
elif [[ $px = "9" ]]; then
cd WPScan
echo " Example: target.com/wp-content/"
read -p " Input Site and dir: " site;
python2 wpscan.py $site
elif [[ $px = "10" ]]; then
cd Kcfinder
python2 kcfin.py
elif [[ $px = "11" ]]; then
cd Zx-Rat
read -p " Input Host: " ip3;
read -p " Input Port: " portt3;
read -p " Input Output: " out3
python2 zxrat.py -h $ip3 -p $portt3 -n $out3
elif [[ $px = "12" ]]; then
cd DDOS
read -p " Input Host: " hst2;
read -p " Input Port: " prt4;
read -p " Input Amount: " amnt;
python2 ddos.py $hst2 $prt $amnt
else
echo -e "\n ${blgelap}[${merah}!${blgelap}]${red} Your Command Is Invalid\n"
main
fi
}
banner
main