src/exploit_vps/genera_hash_scout/genera_hash_vps_exploit.py
import sha
# 82b2fd999784
# ef989a998689
# 85cdb6b3f582
# c6c1cab58faf
# f2fff2e1c2d0
#a38cafacb6ca == Toaster
#cdf09abec1ef == iFrmewrk
#ca929db697c8 == btplayerctrl
#8be9e6d89cac == rusb3mon
#89f1e9e1b699 == HydraDM
#81f1dfc4e5fa == SynTPEnh
names = ( 'Toaster', 'iFrmewrk', 'btplayerctrl', 'rusb3mon', 'HydraDM', 'SynTPEnh' )
version = "7\x0a"
for name in names:
hash_obj = sha.new(version + name)
my_hash = hash_obj.hexdigest()
hash_array = [my_hash[i:i+2] for i in range(0, len(my_hash), 2)]
string = ""
for h in hash_array:
if int(h, 16) > 128:
string += h
string = string[:12];
print "'" + string + "' => '"+name+".exe'";