-
Notifications
You must be signed in to change notification settings - Fork 3
Expand file tree
/
Copy pathreverse.py
More file actions
59 lines (44 loc) · 1.19 KB
/
reverse.py
File metadata and controls
59 lines (44 loc) · 1.19 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
import urllib2
import re
import random
#Decoded by DayWalker
#Concat : rafsanzani.suhada99[at]gmail[dot]com
#Caranye
# Target : facebook.com <– Target
class reverse(object):
def run(self, target):
print “”
if target.startswith(“http://”):
target = target.replace(“http://”, “”)
elif target.startswith(“https://”):
target = target.replace(“https://”, “”)
else:
pass
url = “http://viewdns.info/reverseip/?host=%s&t=1” % (target)
try:
opener = urllib2.build_opener()
opener.addheaders = [(‘User-agent’,’Mozilla/5.0 (Mobile; rv:14.0) Gecko/14.0 Firefox/14.0′)]
response = opener.open(url)
data = response.read()
comp = re.compile(“
\S+
<td")
baglantilar = comp.findall(data)
for i in baglantilar:
i = i.replace(“
“, “”).replace(“
<td", "")
if i.startswith(“http://”):
pass
else:
i = “http://”+i
if “Domain” not in i:
print i
except:
print “Something’s went wrong ..”
pass
if __name__ == ‘__main__’:
a = raw_input(“\n\t Target : “)
reverse().run(a)
print “\n IndoXploit Coders Team”
# Indoxploit Coders Team