#!/usr/bin/perl # Para executar essa bomba digite o comando.... # # perl nome_do_script.pl lista.txt Triad # if(!@ARGV[1]){ exit; } $arq = @ARGV[0]; $grupo = @ARGV[1]; chomp $grupo; open(a,"<$arq"); @site = ; close(a); $b = scalar(@site); for($a=0;$a<=$b;$a++) {chomp $site[$a]; if($site[$a] =~ /http/) { substr($site[$a], 0, 7) =""; } print "[+] Coded by Intrusion_X $site[$a]\n"; use IO::Socket::INET; $sock = IO::Socket::INET->new(PeerAddr => "www.zone-h.org", PeerPort => 80, Proto => "tcp") or next; print $sock "POST /index.php?option=com_notify&Itemid=89&task=single HTTP/1.0\r\n"; print $sock "Accept: */*\r\n"; print $sock "Referer: http://www.zone-h.org/component/option,com_attacks/Itemid,43/filter_defacer,/\r\n"; print $sock "Accept-Language: pt-br\r\n"; print $sock "Content-Type: application/x-www-form-urlencoded\r\n"; print $sock "Connection: Keep-Alive\r\n"; print $sock "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n"; print $sock "Host: www.zone-h.org\r\n"; print $sock "Content-Length: 385\r\n"; print $sock "Pragma: no-cache\r\n"; print $sock "\r\n"; print $sock "http://www.zone-h.org/component/option,com_attacks/Itemid,43/filter_defacer,$site[$a]\r\n"; close($sock); }