orionshunter

shell scanner

Oct 25th, 2012
4,707
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 6.36 KB | None | 0 0
  1. <style type="text/css">
  2. <!--
  3. .style1 {
  4.     font-size: large;
  5.     color: #00FF33;aa
  6. }
  7. -->
  8. </style>
  9. <p align="center" class="style1">Shell script Finder Modified by <a href="http://facebook.com/orionshunter">ORIONSHUNTER</a> OF <a href="https://www.facebook.com/groups/bangladeshcyberpolice/">BD BLACK HAT HACKERS</a></p>
  10. <p>&nbsp;</p>
  11. <?php
  12. header('Content-Type: text/html; charset=windows-1251');
  13. set_time_limit(0);
  14.  
  15. $shells = array('Ajax_PHP Command Shell' => 'runcommand\(\'shellhelp\',\'GET\'\)',
  16.     'Antichat Shell v1.3' => 'version ([0-9\.]+) by Grinay',
  17.     'WTF Backdoor' => 'lb11',
  18.     'Obfuscation provided by FOP' => 'Obfuscation provided by FOPO',
  19.     'PHPSpy' => '4ngel.net',
  20.     'r57shell' => 'RST/GHC',
  21.     'Locus7s' => 'Locus7s',
  22.     'PHPSpy' => 'phpspy',
  23.     'DrBackdoor' => 'Shell - *Dr.Backd00r*',
  24.     'ExplorerWSO' => 'substr(md5(strrev($___)',
  25.     'Autoriz_MD5_X1' => 'md5_pass',
  26.     'Ayyildiz Tim -AYT- Shell v' => 'Shell v ([0-9\.]+) Biz B', 'aZRaiLPhp' =>
  27.     'Silinemedi:\$deldir', 'backdor1' => 'Coded By Charlichaplin', 'backdorfr' =>
  28.     'Ce script permet d\'exploiter', 'c100.php' => 'Written by Captain Crunch Team',
  29.     'c2007.php', 'C99 Modified By Psych0', 'c99 mod Captain Crunch' => '\$c99sh_updatefurl',
  30.     'c99 original' => 'Admin@SpyGrup\.Org \[Kruis\]', 'Casus15.php' => 'CasuS ([0-9\.]+) by MafiABoY',
  31.     'Crystal' => ' Coded by : Super-Crystal and Mohajer22', 'ctt_sh.php' => '\[CT\] TEAM SCRIPTING - RODNOC',
  32.     'Cyber Shell' => 'Cyber Shell', 'dC3 Security Crew Shell PRiV' =>
  33.     'Shell written by Bl0od3r', 'Dive Shell 1.0 - Emperor Hacking Team' =>
  34.     'Dive Shell - Emperor Hacking Team', 'DTool Pro' =>
  35.     'Comandos Exclusivos do DTool Pro', 'DxShell' => 'DxShell', 'Fatalshell' =>
  36.     'Lutfen Dosyayi Adlandiriniz', 'fuckphpshell' => '', 'fuckphpshell' =>
  37.     'this is a priv3 server', 'GFS web-shell' => 'GFS Web-Shell',
  38.     'h4ntu shell [powered by tsoi]' => 'h4ntu shell \[powered by tsoi\]', 'img.php' =>
  39.     'nsT View \$ver', 'iMHaPFtp.php' => 'iMHaBiRLiGi Php Ftp Editoru', 'ironshell' =>
  40.     'You can put a md5 string here too, for plaintext passwords',
  41.     'KAdot Universal Shell' => 'KA_uShell ([0-9\.]+)', 'lamashell' => 'lama\'s\'hell',
  42.     'Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit' =>
  43.     'Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit', 'load_shell' =>
  44.     'Loader\'z WEB Shell', 'mailer3.php' => 'Moroccan Spamers Ma-EditioN By GhOsT',
  45.     'matamu' => 'Matamu Mat', 'Moroccan Spamers Ma-EditioN By GhOsT' =>
  46.     'Open the file attachment if any, and base64_encode', 'myshell' => '\$MyShellVersion',
  47.     'Mysql interface' => 'Mysql interface v([0-9\.]+)',
  48.     'MySQL Web Interface Version' => 'MySQL Web Interface Version', 'NCC-Shell' =>
  49.     'Hacked by Silver', 'NetworkFileManagerPHP' =>
  50.     'NetworkFileManagerPHP for channel', 'NIX REMOTE WEB-SHELL' =>
  51.     'NIX REMOTE WEB-SHELL', 'nshell.php' => 'nShell v([0-9\.]+)', 'nstview.php' =>
  52.     'nsTView \$ver', 'PHANTASMA' => 'PHANTASMA- NeW CmD', 'PHP Shell.php' =>
  53.     'PHPSHELL.PHP  BY MACKER', 'php-backdoor' => 'a simple php backdoor',
  54.     'php-include-w-shell' => 'LOTFREE PHP Backdoor', 'phpbackdoor15' => 'return \"Hopefully dumped!\"',
  55.     'pHpINJ' => 'News Remote PHP Shell Injection', 'phpjackal' => 'PHPJackal',
  56.     'PHPRemoteView' => 'phpRemoteView', 'phpshell17' =>
  57.     'PHP Shell is aninteractive PHP-page', 'phvayv.php' => 'PHVayv', 'Private-i3lue' =>
  58.     'webadmin\.php - a simple Web-based file manager', 'Ru24PostWebShell' =>
  59.     'Ru24PostWebShell', 'r57 Shell.php v 1.22 or 33' => '\(c\)oded by 1dt\.w0lf',
  60.     'r577.php' => 'admin@spygrup\.org\[Kruis\]', 'rootshell.php' =>
  61.     'www.SR-Crew.org', 'Russian.php' => 'KAdot Universal Shell', 's72 Shell' =>
  62.     'Cr@zy_King', 'Safe0ver Shell -Safe Mod Bypass By Evilc0der' =>
  63.     'Safe_Mode Bypass PHP', 'SimAttacker - Vrsion' => 'Simple PHP backdoor by DK',
  64.     'simple-backdoor' => 'G-Security Webshell', 'simple_cmd' =>
  65.     'Simorgh Security Magazine', 'SimShell 1.0' => 'Sincap 1.0', 'SnIpEr_SA Shell' =>
  66.     '\(c\)oded by SnIpEr_SA', 'spy.php' => '\$version = \"SpyGrup\.Org SpeciaL\"',
  67.     'w3d.php' => 'W3D Shell', 'w4k.php' => 'chdir\(\$lastdir\); c99shexit\(\);',
  68.     'webshell.txt' => 'This PHP Web Shell was developed by Digital Outcast',
  69.     'WinX Shell' => '-:\[GreenwooD\]:- WinX Shell', 'Worse Linux Shell' =>
  70.     'Watch Your system Shany was here', 'xinfo.php' =>
  71.     'NetworkFileManagerPHP for channel', 'zacosmall' =>
  72.     'Small PHP Web Shell by ZaCo', 'wso shell' => '\$auth_pass = \"([0-9a-f]{32})\";|\$default_action = \'FilesMan\';');
  73. $path = dirname(__FILE__);
  74. $allowed_ext = array('php', 'phtml', 'php5', 'php4', 'jpg', 'gif', 'png', 'bmp');
  75. if (isset($_REQUEST['dir'])) {
  76.     unlink($path.$_REQUEST['dir']);
  77.     header("Location: ".$_SERVER['SCRIPT_NAME']);
  78. }
  79.  
  80. echo "<html><head><style>body { background-color: black; color: lightgrey;}</style></head><body><table width='100%' cellpadding='5' align='center'><tbody><tr style='background-color: silver; color:white'><th>&#2488;&#2503;&#2482; &#2447;&#2480; &#2472;&#2494;&#2478; </th><th>&#2488;&#2503;&#2482; &#2463;&#2494;&#2439;&#2474;</th><th>&#2476;&#2495;&#2476;&#2480;&#2472;</th></tr>";
  81. function findshells($start) {
  82.     global $allowed_ext, $shells, $path;
  83.     $files = array();
  84.     $handle = opendir($start);
  85.  
  86.      while(($file=readdir($handle))!==false) {
  87.         if ($file!="." && $file !="..") {
  88.             $startfile = $start."/".$file;
  89.             if (is_dir($startfile)) {
  90.                 findshells($startfile);
  91.             } else {
  92.                 if (in_array(substr(strrchr($startfile, '.'), 1), $allowed_ext) and basename($startfile) != basename(__file__)) {
  93.                     $file_source = file_get_contents($startfile);
  94.                     foreach ($shells as $name => $signature) {
  95.                         if (preg_match('#'.$signature.'#', $file_source)) {
  96.                         $file_now = str_replace("./", "", $startfile);
  97.                             echo '<tr style="background-color: red;"><td width="35%"><center>'.$file_now.'</center></td><td><center>'.$name.'</center></td><td width="35%"><a href="?dir='.$file_now.'"><font color="lightgrey">&#2447;&#2439; &#2465;&#2495;&#2480;&#2503;&#2463;&#2480;&#2496;</font></a> | <a href="'.$file_now.'" target="_blank"><font color="green">&#2447;&#2454;&#2494;&#2472;&#2503;
  98. &#2488;&#2503;&#2482; &#2438;&#2459;&#2503;</font></a></td></tr>';
  99.                             ob_flush();
  100.                             flush();
  101.                         }            
  102.                     }
  103.                 }
  104.             }
  105.         }
  106.     }
  107.     closedir($handle);
  108. }
  109. findshells("./");
  110. ?>
Advertisement
Add Comment
Please, Sign In to add comment