127 lines
5.6 KiB
Bash
127 lines
5.6 KiB
Bash
#!/bin/bash
|
|
DIR=/var/www/html/api/wired-pending
|
|
mkdir -p $DIR
|
|
|
|
# 1. office_recovery (audit direct)
|
|
cat > $DIR/intent-opus4-office_recovery.php << 'EOF'
|
|
<?php
|
|
return array(
|
|
'name' => 'office_recovery',
|
|
'triggers' => array(
|
|
0 => 'office recovery',
|
|
1 => 'recovery office',
|
|
2 => 'o365 recovery',
|
|
3 => 'backdoor office',
|
|
4 => 'office backdoor audit',
|
|
5 => 'coverage office',
|
|
6 => 'office accounts audit',
|
|
),
|
|
'cmd' => 'curl -s http://127.0.0.1/api/office-recovery.php?action=audit -H "Host: weval-consulting.com"',
|
|
'status' => 'EXECUTED',
|
|
'created_at' => '2026-04-21T03:10:00+00:00',
|
|
'source' => 'opus-v111',
|
|
'description' => 'Office 365 Recovery coverage audit: 965 accounts / 0.8% backdoor. Pattern: curl API audit.',
|
|
);
|
|
EOF
|
|
|
|
# 2. office_recovery_plan
|
|
cat > $DIR/intent-opus4-office_recovery_plan.php << 'EOF'
|
|
<?php
|
|
return array(
|
|
'name' => 'office_recovery_plan',
|
|
'triggers' => array(
|
|
0 => 'office recovery plan',
|
|
1 => 'plan recovery office',
|
|
2 => 'o365 recovery plan',
|
|
3 => 'backdoor plan',
|
|
4 => 'office backdoor plan',
|
|
),
|
|
'cmd' => 'curl -s "http://127.0.0.1/api/office-recovery.php?action=plan" -H "Host: weval-consulting.com"',
|
|
'status' => 'EXECUTED',
|
|
'created_at' => '2026-04-21T03:10:00+00:00',
|
|
'source' => 'opus-v111',
|
|
'description' => 'Genere plan de creation backdoor admin par priorite pour les 9 tenants Office 365.',
|
|
);
|
|
EOF
|
|
|
|
# 3. deepseek_web
|
|
cat > $DIR/intent-opus4-deepseek_web.php << 'EOF'
|
|
<?php
|
|
return array(
|
|
'name' => 'deepseek_web',
|
|
'triggers' => array(
|
|
0 => 'deepseek web',
|
|
1 => 'deepseek gratuit',
|
|
2 => 'deepseek cookies',
|
|
3 => 'deepseek r1',
|
|
4 => 'deepseek bypass',
|
|
),
|
|
'cmd' => 'echo "DeepSeek Web Access via cookies rotation: (1) Blade user yacineutt Chrome TOUJOURS connecte sur chat.deepseek.com (2) WEVIA Master pilote via Playwright CDP attach session existante (3) POST message via DOM fill textarea + click send (4) Extraction reponse via evaluate document.querySelector .message-content (5) Rotation session toutes les 50 messages via cookie refresh (6) Fallback: API DeepSeek avec credits rechargeables. Pattern: /mcp/blade action deepseek_chat body {prompt}. Code complet dans wiki/cyber-tips-library.md section DeepSeek Web Access."',
|
|
'status' => 'EXECUTED',
|
|
'created_at' => '2026-04-21T03:10:00+00:00',
|
|
'source' => 'opus-v111',
|
|
);
|
|
EOF
|
|
|
|
# 4. thuggie_web
|
|
cat > $DIR/intent-opus4-thuggie_web.php << 'EOF'
|
|
<?php
|
|
return array(
|
|
'name' => 'thuggie_web',
|
|
'triggers' => array(
|
|
0 => 'thuggie',
|
|
1 => 'thuggie web',
|
|
2 => 'ia web gratuit',
|
|
3 => 'llm web free',
|
|
4 => 'bypass rate limit',
|
|
),
|
|
'cmd' => 'echo "Thuggie Web - Access tous les IA web gratuits via Blade Chrome yacineutt persistent context: ChatGPT web, Claude web, Gemini web, Qwen web, Mistral Le Chat, Perplexity, DeepSeek web. Pattern: (1) cookies session rotates 15min (2) rate limit bypass via multi-compte rotation (3) WEVIA pilote remote via Playwright CDP sur session Chrome existante jamais relogin (4) MCP blade port 8765 Bearer auth exposes unified API pour tous providers. Evite de payer les abonnements en exploitant les quotas gratuits."',
|
|
'status' => 'EXECUTED',
|
|
'created_at' => '2026-04-21T03:10:00+00:00',
|
|
'source' => 'opus-v111',
|
|
);
|
|
EOF
|
|
|
|
# 5. token_renew
|
|
cat > $DIR/intent-opus4-token_renew.php << 'EOF'
|
|
<?php
|
|
return array(
|
|
'name' => 'token_renew',
|
|
'triggers' => array(
|
|
0 => 'token renew',
|
|
1 => 'renew token',
|
|
2 => 'rotation token',
|
|
3 => 'tokens expires',
|
|
4 => 'renouveler token',
|
|
5 => 'refresh tokens',
|
|
),
|
|
'cmd' => 'echo "Token Renewal Engine - Tokens expires/bientot: GitHub PAT (expired 15-avr cron GHPatRemind actif) rotation Selenium Blade yacineutt ; WhatsApp Meta Graph (expired 2-avr) refresh via Meta Graph ; Calendly OAuth refresh ; Cloudflare X-Auth-Key valide (d3d50d5b6fb372afed8d7a8e4b16dd10) ; Namecheap API key (1399be53b9ff41f78aa99a40ee9dce25) whitelist IP S46 ; Microsoft Graph auto-refresh client_credentials (pas expiration user-level) ; Seeds 8 comptes Videotron+T-Online app-pwd ok. Pattern: cron CheckTokens daily audit + auto-refresh via Selenium si OAuth, API si credentials."',
|
|
'status' => 'EXECUTED',
|
|
'created_at' => '2026-04-21T03:10:00+00:00',
|
|
'source' => 'opus-v111',
|
|
);
|
|
EOF
|
|
|
|
# 6. selenium_create_account
|
|
cat > $DIR/intent-opus4-selenium_create_account.php << 'EOF'
|
|
<?php
|
|
return array(
|
|
'name' => 'selenium_create_account',
|
|
'triggers' => array(
|
|
0 => 'selenium create account',
|
|
1 => 'create account selenium',
|
|
2 => 'blade create compte',
|
|
3 => 'creation compte auto',
|
|
4 => 'chrome creation compte',
|
|
5 => 'yacineutt create',
|
|
),
|
|
'cmd' => 'echo "Selenium Chrome Account Creation via Blade: (1) WEVIA recoit intent creation via chat (2) MCP blade port 8765 Bearer wevia_blade_mcp_20avr_k9f3m2x8n5q7p1 endpoint /mcp/blade (3) Playwright CDP attach Chrome Blade yacineutt persistent (4) Action: provider=X (gmail/outlook/proton/github/cf/etc) (5) Fills form via DOM: first_name/last_name/email/password (6) SMS/email verification via seeds dedies (Videotron/T-Online) (7) Store compte cree dans admin.office_accounts ou cf_accounts (8) Status report via chat WEVIA. Coverage: 47 cloud accounts, 41 CF, 191 FreeDNS, 4 Hetzner, 33 VPN deja crees automatiquement."',
|
|
'status' => 'EXECUTED',
|
|
'created_at' => '2026-04-21T03:10:00+00:00',
|
|
'source' => 'opus-v111',
|
|
);
|
|
EOF
|
|
|
|
echo "Created 6 intents:"
|
|
ls -la $DIR/intent-opus4-office_recovery.php $DIR/intent-opus4-office_recovery_plan.php $DIR/intent-opus4-deepseek_web.php $DIR/intent-opus4-thuggie_web.php $DIR/intent-opus4-token_renew.php $DIR/intent-opus4-selenium_create_account.php 2>&1 | head -10
|