123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244 |
- #!/usr/bin/env python3
- # encoding: utf-8
- # SSHPLUS By @Crazy_vpn
- import socket, threading, thread, select, signal, sys, time
- from os import system
- system("clear")
- #conexao
- IP = '0.0.0.0'
- try:
- PORT = int(sys.argv[1])
- except:
- PORT = 80
- PASS = ''
- BUFLEN = 8196 * 8
- TIMEOUT = 60
- MSG = 'DARKSSH'
- COR = '<font color="null">'
- FTAG = '</font>'
- DEFAULT_HOST = '0.0.0.0:22'
- RESPONSE = "HTTP/1.1 200 " + str(COR) + str(MSG) + str(FTAG) + "\r\n\r\n"
-
- class Server(threading.Thread):
- def __init__(self, host, port):
- threading.Thread.__init__(self)
- self.running = False
- self.host = host
- self.port = port
- self.threads = []
- self.threadsLock = threading.Lock()
- self.logLock = threading.Lock()
- def run(self):
- self.soc = socket.socket(socket.AF_INET)
- self.soc.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
- self.soc.settimeout(2)
- self.soc.bind((self.host, self.port))
- self.soc.listen(0)
- self.running = True
- try:
- while self.running:
- try:
- c, addr = self.soc.accept()
- c.setblocking(1)
- except socket.timeout:
- continue
-
- conn = ConnectionHandler(c, self, addr)
- conn.start();
- self.addConn(conn)
- finally:
- self.running = False
- self.soc.close()
-
- def printLog(self, log):
- self.logLock.acquire()
- print log
- self.logLock.release()
-
- def addConn(self, conn):
- try:
- self.threadsLock.acquire()
- if self.running:
- self.threads.append(conn)
- finally:
- self.threadsLock.release()
-
- def removeConn(self, conn):
- try:
- self.threadsLock.acquire()
- self.threads.remove(conn)
- finally:
- self.threadsLock.release()
-
- def close(self):
- try:
- self.running = False
- self.threadsLock.acquire()
-
- threads = list(self.threads)
- for c in threads:
- c.close()
- finally:
- self.threadsLock.release()
-
- class ConnectionHandler(threading.Thread):
- def __init__(self, socClient, server, addr):
- threading.Thread.__init__(self)
- self.clientClosed = False
- self.targetClosed = True
- self.client = socClient
- self.client_buffer = ''
- self.server = server
- self.log = 'Conexao: ' + str(addr)
- def close(self):
- try:
- if not self.clientClosed:
- self.client.shutdown(socket.SHUT_RDWR)
- self.client.close()
- except:
- pass
- finally:
- self.clientClosed = True
-
- try:
- if not self.targetClosed:
- self.target.shutdown(socket.SHUT_RDWR)
- self.target.close()
- except:
- pass
- finally:
- self.targetClosed = True
- def run(self):
- try:
- self.client_buffer = self.client.recv(BUFLEN)
-
- hostPort = self.findHeader(self.client_buffer, 'X-Real-Host')
-
- if hostPort == '':
- hostPort = DEFAULT_HOST
- split = self.findHeader(self.client_buffer, 'X-Split')
- if split != '':
- self.client.recv(BUFLEN)
-
- if hostPort != '':
- passwd = self.findHeader(self.client_buffer, 'X-Pass')
-
- if len(PASS) != 0 and passwd == PASS:
- self.method_CONNECT(hostPort)
- elif len(PASS) != 0 and passwd != PASS:
- self.client.send('HTTP/1.1 400 WrongPass!\r\n\r\n')
- if hostPort.startswith(IP):
- self.method_CONNECT(hostPort)
- else:
- self.client.send('HTTP/1.1 403 Forbidden!\r\n\r\n')
- else:
- print '- No X-Real-Host!'
- self.client.send('HTTP/1.1 400 NoXRealHost!\r\n\r\n')
- except Exception as e:
- self.log += ' - error: ' + e.strerror
- self.server.printLog(self.log)
- pass
- finally:
- self.close()
- self.server.removeConn(self)
- def findHeader(self, head, header):
- aux = head.find(header + ': ')
-
- if aux == -1:
- return ''
- aux = head.find(':', aux)
- head = head[aux+2:]
- aux = head.find('\r\n')
- if aux == -1:
- return ''
- return head[:aux];
- def connect_target(self, host):
- i = host.find(':')
- if i != -1:
- port = int(host[i+1:])
- host = host[:i]
- else:
- if self.method=='CONNECT':
- port = 443
- else:
- port = 22
- (soc_family, soc_type, proto, _, address) = socket.getaddrinfo(host, port)[0]
- self.target = socket.socket(soc_family, soc_type, proto)
- self.targetClosed = False
- self.target.connect(address)
- def method_CONNECT(self, path):
- self.log += ' - CONNECT ' + path
- self.connect_target(path)
- self.client.sendall(RESPONSE)
- self.client_buffer = ''
- self.server.printLog(self.log)
- self.doCONNECT()
-
- def doCONNECT(self):
- socs = [self.client, self.target]
- count = 0
- error = False
- while True:
- count += 1
- (recv, _, err) = select.select(socs, [], socs, 3)
- if err:
- error = True
- if recv:
- for in_ in recv:
- try:
- data = in_.recv(BUFLEN)
- if data:
- if in_ is self.target:
- self.client.send(data)
- else:
- while data:
- byte = self.target.send(data)
- data = data[byte:]
- count = 0
- else:
- break
- except:
- error = True
- break
- if count == TIMEOUT:
- error = True
- if error:
- break
- def main(host=IP, port=PORT):
- print "\033[0;34m━"*8,"\033[1;32m PROXY SOCKS","\033[0;34m━"*8,"\n"
- print "\033[1;33mIP:\033[1;32m " + IP
- print "\033[1;33mPORTA:\033[1;32m " + str(PORT) + "\n"
- print "\033[0;34m━"*10,"\033[1;32m DARKSSH","\033[0;34m━\033[1;37m"*11,"\n"
- server = Server(IP, PORT)
- server.start()
- while True:
- try:
- time.sleep(2)
- except KeyboardInterrupt:
- print '\nParando...'
- server.close()
- break
- if __name__ == '__main__':
- main()
|