| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426 |
- #!/bin/bash
- #25/01/2021 by @Kalix1
- clear
- clear
- SCPdir="/etc/VPS-MX"
- SCPfrm="${SCPdir}/herramientas" && [[ ! -d ${SCPfrm} ]] && exit
- SCPinst="${SCPdir}/protocolos"&& [[ ! -d ${SCPinst} ]] && exit
- declare -A cor=( [0]="\033[1;37m" [1]="\033[1;34m" [2]="\033[1;31m" [3]="\033[1;33m" [4]="\033[1;32m" )
- [[ $(dpkg --get-selections|grep -w "python"|head -1) ]] || apt-get install python -y &>/dev/null
- mportas () {
- unset portas
- portas_var=$(lsof -V -i tcp -P -n | grep -v "ESTABLISHED" |grep -v "COMMAND" | grep "LISTEN")
- while read port; do
- var1=$(echo $port | awk '{print $1}') && var2=$(echo $port | awk '{print $9}' | awk -F ":" '{print $2}')
- [[ "$(echo -e $portas|grep "$var1 $var2")" ]] || portas+="$var1 $var2\n"
- done <<< "$portas_var"
- i=1
- echo -e "$portas"
- }
- meu_ip () {
- MEU_IP=$(ip addr | grep 'inet' | grep -v inet6 | grep -vE '127\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | grep -o -E '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | head -1)
- MEU_IP2=$(wget -qO- ipv4.icanhazip.com)
- [[ "$MEU_IP" != "$MEU_IP2" ]] && echo "$MEU_IP2" || echo "$MEU_IP"
- }
- tcpbypass_fun () {
- [[ -e $HOME/socks ]] && rm -rf $HOME/socks > /dev/null 2>&1
- [[ -d $HOME/socks ]] && rm -rf $HOME/socks > /dev/null 2>&1
- cd $HOME && mkdir socks > /dev/null 2>&1
- cd socks
- patch="https://raw.githubusercontent.com/NetVPS/VPS-MX_Oficial/master/LINKS-LIBRERIAS/backsocz.zip"
- arq="backsocz.zip"
- wget $patch > /dev/null 2>&1
- unzip $arq > /dev/null 2>&1
- mv -f /root/socks/backsocz/./ssh /etc/ssh/sshd_config && service ssh restart 1> /dev/null 2>/dev/null
- mv -f /root/socks/backsocz/sckt$(python3 --version|awk '{print $2}'|cut -d'.' -f1,2) /usr/sbin/sckt
- mv -f /root/socks/backsocz/scktcheck /bin/scktcheck
- chmod +x /bin/scktcheck
- chmod +x /usr/sbin/sckt
- rm -rf $HOME/root/socks
- cd $HOME
- msg="$2"
- [[ $msg = "" ]] && msg="@Kalix1"
- portxz="$1"
- [[ $portxz = "" ]] && portxz="8080"
- screen -dmS sokz scktcheck "$portxz" "$msg" > /dev/null 2>&1
- }
- gettunel_fun () {
- echo "master=NetVPS" > ${SCPinst}/pwd.pwd
- while read service; do
- [[ -z $service ]] && break
- echo "127.0.0.1:$(echo $service|cut -d' ' -f2)=$(echo $service|cut -d' ' -f1)" >> ${SCPinst}/pwd.pwd
- done <<< "$(mportas)"
- screen -dmS getpy python ${SCPinst}/PGet.py -b "0.0.0.0:$1" -p "${SCPinst}/pwd.pwd"
- [[ "$(ps x | grep "PGet.py" | grep -v "grep" | awk -F "pts" '{print $1}')" ]] && {
- echo -e "$(fun_trans "Gettunel Iniciado com Sucesso")"
- msg -bar
- echo -ne "$(fun_trans "Sua Senha Gettunel e"):"
- echo -e "\033[1;32m NetVPS"
- msg -bar
- } || echo -e "$(fun_trans "Gettunel nao foi iniciado")"
- msg -bar
- }
- PythonDic_fun () {
- echo -e "\033[1;33m Selecciona Puerto Local y Encabezado\033[1;37m"
- msg -bar
- echo -ne "\033[1;97mDigite Un Puerto SSH/DROPBEAR activo: \033[1;92m" && read puetoantla
- msg -bar
- echo -ne "\033[1;97mRespuesta de encabezado (200,101,404,500,etc): \033[1;92m" && read rescabeza
- msg -bar
- (
- less << PYTHON > /etc/VPS-MX/protocolos/PDirect.py
- import socket, threading, thread, select, signal, sys, time, getopt
- # Listen
- LISTENING_ADDR = '0.0.0.0'
- if sys.argv[1:]:
- LISTENING_PORT = sys.argv[1]
- else:
- LISTENING_PORT = 80
- #Pass
- PASS = ''
- # CONST
- BUFLEN = 4096 * 4
- TIMEOUT = 60
- DEFAULT_HOST = '127.0.0.1:$puetoantla'
- RESPONSE = 'HTTP/1.1 $rescabeza <strong>$texto_soket</strong>\r\nContent-length: 0\r\n\r\nHTTP/1.1 $rescabeza Connection established\r\n\r\n'
- #RESPONSE = 'HTTP/1.1 200 Hello_World!\r\nContent-length: 0\r\n\r\nHTTP/1.1 200 Connection established\r\n\r\n' # lint:ok
- class Server(threading.Thread):
- def __init__(self, host, port):
- threading.Thread.__init__(self)
- self.running = False
- self.host = host
- self.port = port
- self.threads = []
- self.threadsLock = threading.Lock()
- self.logLock = threading.Lock()
- def run(self):
- self.soc = socket.socket(socket.AF_INET)
- self.soc.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
- self.soc.settimeout(2)
- intport = int(self.port)
- self.soc.bind((self.host, intport))
- self.soc.listen(0)
- self.running = True
- try:
- while self.running:
- try:
- c, addr = self.soc.accept()
- c.setblocking(1)
- except socket.timeout:
- continue
- conn = ConnectionHandler(c, self, addr)
- conn.start()
- self.addConn(conn)
- finally:
- self.running = False
- self.soc.close()
- def printLog(self, log):
- self.logLock.acquire()
- print log
- self.logLock.release()
- def addConn(self, conn):
- try:
- self.threadsLock.acquire()
- if self.running:
- self.threads.append(conn)
- finally:
- self.threadsLock.release()
- def removeConn(self, conn):
- try:
- self.threadsLock.acquire()
- self.threads.remove(conn)
- finally:
- self.threadsLock.release()
- def close(self):
- try:
- self.running = False
- self.threadsLock.acquire()
- threads = list(self.threads)
- for c in threads:
- c.close()
- finally:
- self.threadsLock.release()
- class ConnectionHandler(threading.Thread):
- def __init__(self, socClient, server, addr):
- threading.Thread.__init__(self)
- self.clientClosed = False
- self.targetClosed = True
- self.client = socClient
- self.client_buffer = ''
- self.server = server
- self.log = 'Connection: ' + str(addr)
- def close(self):
- try:
- if not self.clientClosed:
- self.client.shutdown(socket.SHUT_RDWR)
- self.client.close()
- except:
- pass
- finally:
- self.clientClosed = True
- try:
- if not self.targetClosed:
- self.target.shutdown(socket.SHUT_RDWR)
- self.target.close()
- except:
- pass
- finally:
- self.targetClosed = True
- def run(self):
- try:
- self.client_buffer = self.client.recv(BUFLEN)
- hostPort = self.findHeader(self.client_buffer, 'X-Real-Host')
- if hostPort == '':
- hostPort = DEFAULT_HOST
- split = self.findHeader(self.client_buffer, 'X-Split')
- if split != '':
- self.client.recv(BUFLEN)
- if hostPort != '':
- passwd = self.findHeader(self.client_buffer, 'X-Pass')
-
- if len(PASS) != 0 and passwd == PASS:
- self.method_CONNECT(hostPort)
- elif len(PASS) != 0 and passwd != PASS:
- self.client.send('HTTP/1.1 400 WrongPass!\r\n\r\n')
- elif hostPort.startswith('127.0.0.1') or hostPort.startswith('localhost'):
- self.method_CONNECT(hostPort)
- else:
- self.client.send('HTTP/1.1 403 Forbidden!\r\n\r\n')
- else:
- print '- No X-Real-Host!'
- self.client.send('HTTP/1.1 400 NoXRealHost!\r\n\r\n')
- except Exception as e:
- self.log += ' - error: ' + e.strerror
- self.server.printLog(self.log)
- pass
- finally:
- self.close()
- self.server.removeConn(self)
- def findHeader(self, head, header):
- aux = head.find(header + ': ')
- if aux == -1:
- return ''
- aux = head.find(':', aux)
- head = head[aux+2:]
- aux = head.find('\r\n')
- if aux == -1:
- return ''
- return head[:aux];
- def connect_target(self, host):
- i = host.find(':')
- if i != -1:
- port = int(host[i+1:])
- host = host[:i]
- else:
- if self.method=='CONNECT':
- port = $puetoantla
- else:
- port = sys.argv[1]
- (soc_family, soc_type, proto, _, address) = socket.getaddrinfo(host, port)[0]
- self.target = socket.socket(soc_family, soc_type, proto)
- self.targetClosed = False
- self.target.connect(address)
- def method_CONNECT(self, path):
- self.log += ' - CONNECT ' + path
- self.connect_target(path)
- self.client.sendall(RESPONSE)
- self.client_buffer = ''
- self.server.printLog(self.log)
- self.doCONNECT()
- def doCONNECT(self):
- socs = [self.client, self.target]
- count = 0
- error = False
- while True:
- count += 1
- (recv, _, err) = select.select(socs, [], socs, 3)
- if err:
- error = True
- if recv:
- for in_ in recv:
- try:
- data = in_.recv(BUFLEN)
- if data:
- if in_ is self.target:
- self.client.send(data)
- else:
- while data:
- byte = self.target.send(data)
- data = data[byte:]
- count = 0
- else:
- break
- except:
- error = True
- break
- if count == TIMEOUT:
- error = True
- if error:
- break
- def print_usage():
- print 'Usage: proxy.py -p <port>'
- print ' proxy.py -b <bindAddr> -p <port>'
- print ' proxy.py -b 0.0.0.0 -p 80'
- def parse_args(argv):
- global LISTENING_ADDR
- global LISTENING_PORT
-
- try:
- opts, args = getopt.getopt(argv,"hb:p:",["bind=","port="])
- except getopt.GetoptError:
- print_usage()
- sys.exit(2)
- for opt, arg in opts:
- if opt == '-h':
- print_usage()
- sys.exit()
- elif opt in ("-b", "--bind"):
- LISTENING_ADDR = arg
- elif opt in ("-p", "--port"):
- LISTENING_PORT = int(arg)
- def main(host=LISTENING_ADDR, port=LISTENING_PORT):
- print "\n:-------PythonProxy-------:\n"
- print "Listening addr: " + LISTENING_ADDR
- print "Listening port: " + str(LISTENING_PORT) + "\n"
- print ":-------------------------:\n"
- server = Server(LISTENING_ADDR, LISTENING_PORT)
- server.start()
- while True:
- try:
- time.sleep(2)
- except KeyboardInterrupt:
- print 'Stopping...'
- server.close()
- break
- ####### parse_args(sys.argv[1:])
- if __name__ == '__main__':
- main()
- PYTHON
- ) > $HOME/proxy.log
- chmod +x /etc/VPS-MX/protocolos/PDirect.py
- screen -dmS pydic-"$porta_socket" python ${SCPinst}/PDirect.py "$porta_socket" "$texto_soket" && echo ""$porta_socket" "$texto_soket"" >> /etc/VPS-MX/PortPD.log
- }
- pid_kill () {
- [[ -z $1 ]] && refurn 1
- pids="$@"
- for pid in $(echo $pids); do
- kill -9 $pid &>/dev/null
- done
- }
- remove_fun () {
- echo -e "$(fun_trans "Parando Socks Python")"
- msg -bar
- pidproxy=$(ps x | grep "PPub.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy ]] && pid_kill $pidproxy
- pidproxy2=$(ps x | grep "PPriv.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy2 ]] && pid_kill $pidproxy2
- pidproxy3=$(ps x | grep "PDirect.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy3 ]] && pid_kill $pidproxy3
- pidproxy4=$(ps x | grep "POpen.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy4 ]] && pid_kill $pidproxy4
- pidproxy5=$(ps x | grep "PGet.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy5 ]] && pid_kill $pidproxy5
- pidproxy6=$(ps x | grep "scktcheck" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy6 ]] && pid_kill $pidproxy6
- pidproxy7=$(ps x | grep "python.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy7 ]] && pid_kill $pidproxy7
- echo -e "\033[1;91m $(fun_trans "Socks DETENIDOS")"
- msg -bar
- rm -rf /etc/VPS-MX/PortPD.log
- echo "" > /etc/VPS-MX/PortPD.log
- exit 0
- }
- iniciarsocks () {
- pidproxy=$(ps x | grep -w "PPub.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy ]] && P1="\033[1;32m[ON]" || P1="\033[1;31m[OFF]"
- pidproxy2=$(ps x | grep -w "PPriv.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy2 ]] && P2="\033[1;32m[ON]" || P2="\033[1;31m[OFF]"
- pidproxy3=$(ps x | grep -w "PDirect.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy3 ]] && P3="\033[1;32m[ON]" || P3="\033[1;31m[OFF]"
- pidproxy4=$(ps x | grep -w "POpen.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy4 ]] && P4="\033[1;32m[ON]" || P4="\033[1;31m[OFF]"
- pidproxy5=$(ps x | grep "PGet.py" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy5 ]] && P5="\033[1;32m[ON]" || P5="\033[1;31m[OFF]"
- pidproxy6=$(ps x | grep "scktcheck" | grep -v "grep" | awk -F "pts" '{print $1}') && [[ ! -z $pidproxy6 ]] && P6="\033[1;32m[ON]" || P6="\033[1;31m[OFF]"
- msg -bar
- msg -tit
- msg -ama " INSTALADOR DE PROXY'S VPS-MX By MOD @Kalix1"
- msg -bar
- echo -e "${cor[4]} [1] $(msg -verm2 "==>>") \033[1;97m$(fun_trans "Proxy Python SIMPLE")\033[1;97m ------------- $P1"
- echo -e "${cor[4]} [2] $(msg -verm2 "==>>") \033[1;97m$(fun_trans "Proxy Python SEGURO")\033[1;97m ------------- $P2"
- echo -e "${cor[4]} [3] $(msg -verm2 "==>>") \033[1;97m$(fun_trans "Proxy Python DIRETO")\033[1;97m ------------- $P3"
- echo -e "${cor[4]} [4] $(msg -verm2 "==>>") \033[1;97m$(fun_trans "Proxy Python OPENVPN")\033[1;97m ------------ $P4"
- echo -e "${cor[4]} [5] $(msg -verm2 "==>>") \033[1;97m$(fun_trans "Proxy Python GETTUNEL")\033[1;97m ----------- $P5"
- echo -e "${cor[4]} [6] $(msg -verm2 "==>>") \033[1;97m$(fun_trans "Proxy Python TCP BYPASS")\033[1;97m --------- $P6"
- echo -e "${cor[4]} [7] $(msg -verm2 "==>>") \033[1;97m$(fun_trans " ¡¡ PARAR TODOS LOS PROXY'S !!")"
- echo -e "$(msg -bar)\n${cor[4]} [0] $(msg -verm2 "==>>") \e[97m\033[1;41m VOLVER \033[1;37m"
- msg -bar
- IP=(meu_ip)
- while [[ -z $portproxy || $portproxy != @(0|[1-7]) ]]; do
- echo -ne "$(fun_trans "Digite Una Opcion"): \033[1;37m" && read portproxy
- tput cuu1 && tput dl1
- done
- case $portproxy in
- 7)remove_fun;;
- 0)return;;
- esac
- echo -e "\033[1;33m Selecciona Puerto Principal del Proxy"
- msg -bar
- porta_socket=
- while [[ -z $porta_socket || ! -z $(mportas|grep -w $porta_socket) ]]; do
- echo -ne "Digite el Puerto: \033[1;92m" && read porta_socket
- tput cuu1 && tput dl1
- done
- echo -e "$(fun_trans "Introdusca su Mini-Banner")"
- msg -bar
- echo -ne "Introduzca el texto de estado plano o en HTML:\n \033[1;37m" && read texto_soket
- msg -bar
- case $portproxy in
- 1)screen -dmS screen python ${SCPinst}/PPub.py "$porta_socket" "$texto_soket";;
- 2)screen -dmS screen python3 ${SCPinst}/PPriv.py "$porta_socket" "$texto_soket" "$IP";;
- 3)PythonDic_fun;;
- 4)screen -dmS screen python ${SCPinst}/POpen.py "$porta_socket" "$texto_soket";;
- 5)gettunel_fun "$porta_socket";;
- 6)tcpbypass_fun "$porta_socket" "$texto_soket";;
- esac
- echo -e "\033[1;92m$(fun_trans "Procedimiento COMPLETO")"
- msg -bar
- }
- iniciarsocks
|